Cybersecurity відкриті
[search 0]
більше
Download the App!
show episodes
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
A podcast about cybersecurity and the people that keep the internet safe.The podcast is built as a series of segments: we will be looking back at the last couple of weeks in cybersecurity news, talking to different people in the industry about their thoughts and experiences, we're going to break apart some of the TTPs being used by adversaries, and we will even cover a little bit of hacker history.
  continue reading
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
  continue reading
 
Interviews with founders, startup-advising CISOs, venture capitalists, and analysts discussing the issues of cybersecurity, new threats, and emerging technology. The Genealogy of Cyber Security brings listeners into forward-thinking conversations with industry visionaries, to explore big ideas, and discuss out-innovating the competition.
  continue reading
 
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono imprese, dalle grandi multinazionali alle piccole piccole aziende locali, enti e organizzazioni di ogni ordine e grado, e privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell'attacco, entità della struttura attaccata o danni provocati. Sophos te ne racconta 5 nella stagione 2020 della serie podcast "Sotto Attacco | i grandi crimini ...
  continue reading
 
Cybersecurity affects us all whether we are at home, managing a company, supporting clients, or even running a state or local government. Join the Center for Internet Security’s Sean Atkinson and Tony Sager as they discuss trends and threats, ways to implement controls and infrastructure, explore best practices, and interview experts in the industry. If you are interested in learning more about how to grow your cybersecurity program, CIS and its volunteer community are here to bring clarity ...
  continue reading
 
1234, come la password che non dovreste mai scegliere. Come la password che la maggior parte degli utenti sceglie. Dalle truffe online agli intrighi internazionali, in ogni puntata approfondiamo la storia di cybersecurity del momento. A cura di Alberto Giuffrè Questo show fa parte del network Spreaker Prime. Se sei interessato a fare pubblicità in questo podcast, contattaci su https://www.spreaker.com/show/4610094/advertisement
  continue reading
 
Shon Gerber from the Reduce Cyber Risk and CISSP Cyber Training podcasts provides valuable insight, guidance, and training to you each week that only a senior cybersecurity expert can perform. Shon has over 21+ years of experience in cybersecurity from large corporations, government, and even as a college professor. Shon provides you the information and knowledge you need pass the CISSP exam the first time along with practical steps needed to enhance and grow your cybersecurity career. Shon ...
  continue reading
 
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
  continue reading
 
C
Cybersecurity Sense
Series avatar that links to series pageSeries avatar that links to series page

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
Щомісяця
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
The Cybersecurity Startup Revenue Podcast helps startups grow sales faster. Whether you are a seller, marketer, leader, or founder, you hear proven strategies to help cybersecurity startups get more leads, more customers, and optimize their marketing and sales processes. All from people who know a thing or ten about building great cybersecurity startups. For sales rep, VP Sales, CRO, marketing, CMO, founder, CEO, and investors at cybersecurity startups. Guaranteed* to be the best resource fo ...
  continue reading
 
The Secure Talk Cybersecurity podcast reviews the latest threats, tips, and trends related to cybersecurity, cryptocurrencies, and compliance. Host Mark Shriner interviews leading cybersecurity and cryptocurrency executives to discuss best practices related to IT security, data protection, cryptocurrency investment and usage.
  continue reading
 
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
  continue reading
 
Securely HERS is a cybersecurity podcast dedicated to providing women with practical advice and guidance to protect their personal and professional lives from cyber threats. Hosted by cybersecurity expert Veronica Duff, each episode features discussions on the latest cybersecurity trends, tips on how to secure personal devices and accounts, and interviews with industry professionals on various topics related to cybersecurity. Whether you're a beginner or an experienced user, Securely HERS pr ...
  continue reading
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
  continue reading
 
Security and cybersecurity are critical concerns for any modern business, and startups are no exception. In order to compete in the digital age, startups need to be aware of the latest security threats and have a plan to protect their data and systems. The Startuprad.io security and cybersecurity track is designed to help companies stay ahead of the curve. We interview entrepreneurs who are active in the space and bring you the latest news from the world of cyber security. Our goal is to hel ...
  continue reading
 
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
  continue reading
 
“It’s 5:05!'' is a daily audio news cast highlighting security and open source stories from around the world. We filter for the real cybersecurity and open source stories in the news, so you won't have to. Each day, a global team of journalists contribute stories they found interesting in their daily research from the previous 24 hours. We present them to you in an easy to listen to format, making the resources available at the end of each episode so you can do a deep dive on stories you fin ...
  continue reading
 
In today’s digital age, we are more vulnerable than ever to cyber-attacks that can compromise our personal information and security. That’s why it’s crucial to stay informed and proactive when it comes to cybersecurity. Join us on this podcast as we explore the world of cybersecurity and provide practical tips and strategies for protecting yourself online. From strong passwords to safe browsing habits, we’ll cover a range of topics aimed at helping you safeguard your personal information and ...
  continue reading
 
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
  continue reading
 
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by The CyberWire as a public service.
  continue reading
 
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
  continue reading
 
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
  continue reading
 
Wibu-Systems hat es sich zur Aufgabe gemacht, vielseitige und sichere Technologien zu entwickeln, die Herstellern von Software und intelligenten Geräten die Möglichkeit liefert ihre Produkte vor Piraterie, Reverse Engineering, Manipulation, Sabotage und Spionage zu schützen. Mit CodeMeter, einer umfassenden und preisgekrönte Suite von hardware- und softwarebasierten Lösungen, ist dies möglich.
  continue reading
 
Loading …
show series
 
Like what you hear? You can tip us here: https://www.buymeacoffee.com/Startuprad.io Our Sponsor Startupraven The best way to identify investors and cooperation partners for early-stage startups. Sign up for early access here: https://startupraven.com/ Find all options to follow us and subscribe here: https://linktr.ee/startupradio Welcome to our su…
  continue reading
 
🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value. Edwin Kwan: Researchers have published a paper demonstrating how a malicious website can exploit a vulnerability in the GPU to perform a cross origin atta…
  continue reading
 
Do you know how to protect your device from the Xenomorph Banking Trojan? Join us as we dive into the murky waters of Android security threats with our enlightening guest, Blake Rea. We unmask the frightening reality of this new Trojan, aimed solely at Android users. With a chilling focus on over 35 financial institutions and some crypto wallets, t…
  continue reading
 
**Episode Summary: Ricky Martinez @ DigitalEra** 🤔 Are you a cybersecurity startup looking to accelerate your sales and revenue growth? How can you effectively evaluate new vendors and establish mutually beneficial partnerships? Are delighted customers and partners crucial for your success in the early stages? Tune in to this episode of the Cyberse…
  continue reading
 
This week, Audra is joined by Megan Stifel, chief strategy officer for the Institute for Security and Technology, to discuss how ransomware has evolved from a business nuisance to now a threat to national security. Megan also shares how the United States' overall response to ransomware has the potential to impact the types of attacks faced by its o…
  continue reading
 
In this special episode, Ephraim sits down with two longtime employees, Damien & David, as they discuss FIT's journey from startup to a leader in the cybersecurity space. Or watch the in-person podcast here: https://youtu.be/JXo_iuYW-Y0FIT Cybersecurity
  continue reading
 
Jeffrey Wheatman is joined in this episode by Evgeniy Kharam, a fellow Cyber Evangelist! Today we are discussing learning from your mistakes, Avatar, CGI, New Zealand, firewalls, and security architecture.Jeffrey Wheatman
  continue reading
 
Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.Shon Gerber, CISO, CISSP, Cybersecurity Author and Entrepreneur
  continue reading
 
Innovation Sandbox finalist and Relyance AI Founder Abhi Sharma discuss privacy and compliance in a world where every company is a software company, and DevOps code produces so many data flows with your private and regulated data. Abhi points out a privacy solution must govern DevOps, “privacy is in the code.” Abhi discusses NLP, LLMs, OpenAI, and …
  continue reading
 
On the special episode of The Cybersecurity Defenders Podcast we take a close look at the MGM cyberattack that took place in September 2023. On September 11 numerous MGM Resorts International properties in Las Vegas and throughout the United States were attacked by ransomware which shut down many aspects of its IT. Checking in and out, reservations…
  continue reading
 
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the aging cybersecurity workforce.Enterprise Management Associates + DEVOPSdigest
  continue reading
 
6 maggio 2023. Ma potrebbe essere stato anche il 7 maggio, o il 6 aprile. Potrebbe essere il prossimo 6 ottobre. La data, in questa storia, conta poco. Quel che conta, è quello che è successo. E’ successo che in un’azienda italiana - una di quelle che fanno parte delle Piccole e Medie Imprese, cioè la famosa “spina dorsale” dell’economia del nostro…
  continue reading
 
About Josh Varghese: Josh Varghese, founder of Traceroute, is a seasoned industrial networking expert who has dedicated himself to serving the dynamic industrial/OT market. With nearly a decade of experience as a technical lead at Industrial Networking Solutions, where he established their technical support and application engineering department, J…
  continue reading
 
In this episode, host Bidemi Ologunde talked about the increasing cost of watching content on streaming services. === Work from home, earn some extra income, and test new products before they hit the shelves. Earn up to $500 per week. >>> Click here to learn more <<< === Moxie Press & Co. is a small company making awesome things: Guides for writing…
  continue reading
 
Redfly cyberespionage targets a national grid. DHS Threat Assessment looks at critical infrastructure threats. A look at the ICS threat landscape. DoE grants for research into distributed energy cybersecurity. CISA offers free vulnerability scanning for water infrastructure. CISA issues ICS advisories. Guest Michael Toecker, Cyber Security Advisor …
  continue reading
 
Cosa accade in un’azienda quando c’è un attacco informatico? Ne parliamo con Gabriele Zanoni di Mandiant Questo show fa parte del network Spreaker Prime. Se sei interessato a fare pubblicità in questo podcast, contattaci su https://www.spreaker.com/show/4610094/advertisementSky TG 24
  continue reading
 
Let's face it, the end of the year is the busiest time in many areas of business - but fear not! Cybersecurity shouldn't be an end-of-year rush to catch up. This week the guys break down what you can do to make the 4th quarter easier for you so you can actually enjoy some time off during the holidays. They share their observations and insights so y…
  continue reading
 
Shaina Lanchin Zarrin is the Head of the Digital Department at the pioneering B2B marketing powerhouse - Xtra-mile, an Israeli-based marketing agency that specializes in lead generation for B2B technology and cybersecurity vendors.
  continue reading
 
In episode 64 of Cybersecurity Where You Are, co-host Sean Atkinson initiates a series around establishing an underlying policy for your organization's cybersecurity program. He begins by discussing how a policy provides an overview of the business rules, or standards, that will feature in the program. With each standard, he clarifies that you can …
  continue reading
 
https://www.yourcyberpath.com/105/ In this episode, we are returning to the Security Design Principles series, this time with Work Factor. Work factor refers to how much work it’s going to take an adversary to attack your assets and succeed in doing so. This is coming directly from the world of physical security that was imported into the cybersecu…
  continue reading
 
In this week's episode of the Kill Chain Podcast hosts Terry Reinert and Marcus Q discuss how a breach of an OT system can compromise a business's enterprise network. We discuss the ways in which attackers can compromise a fleet vehicle to deliver a ransomware payload to an IT system. Want to learn more about securing your fleets, platforms, or mis…
  continue reading
 
You know you may be a target. But what about your family? How could a hacker leverage those closest to you to gain advanced access to your work? Recently on the And Security For All podcast, Alias CISO Jonathan Kimmitt and Security Team Lead Tanner Shinn discussed this question. You can listen to their conversation here. On this episode of the Secu…
  continue reading
 
Tune in to the August edition of our PCI Monthly Update. We kick off with a sneak peek into the upcoming PCI North America Community Meeting in Portland and introduce the newly launched PCI Community Job Board—a dedicated platform for security talent and job postings in the payment industry. Next, we delve into Requirement 5, shedding light on anti…
  continue reading
 
Prepare for a chilling journey into the digital world of deception, where illusion often trumps reality and even the most innocent can become targets. I'm your host, Veronica Duff, and I promise you a mind-blowing exploration of cyber trickery, from deep fakes to impersonation scams, and how you can stay one step ahead in this ever-evolving digital…
  continue reading
 
A coordinated law enforcement effort codenamed Operation Duck Hunt has felled QakBot, a notorious Windows malware family thats estimated to have compromised over 700,000 computers globally and facilitated financial fraud as well as ransomware.To that end, the U.S. Justice Department (DoJ) said the malware is being deleted from victim computers, pre…
  continue reading
 
Today, we're diving deeper into the intricate web of deception in the digital realm. It's a world where nothing is as it seems, and the more aware we are, the better equipped we become. The art of deception is as old as time, but it’s digital manifestations. They’re novel, sophisticated, and ever-evolving. From deep fakes to impersonation scams, we…
  continue reading
 
Loading …

Короткий довідник