show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

Unsubscribe
Unsubscribe
Mingguan
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

Unsubscribe
Unsubscribe
Mingguan
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
  continue reading
 
Artwork

1
Caffeinated Risk

McCreight & Leece

Unsubscribe
Unsubscribe
Bulanan
 
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
  continue reading
 
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
  continue reading
 
Artwork

1
Cyber Focus

The McCrary Institute

Unsubscribe
Unsubscribe
Mingguan
 
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
This podcast series offers risk intelligence and analysis from RANE Network. RANE is a risk intelligence company that provides business professionals with access to critical insights, analysis, and support, enabling them to better anticipate, monitor, and respond to emerging risks and threats. In the RANE podcast series, risk management experts and thought leaders share best practices for managing business risk, geopolitical risk, physical and cyber security risks, compliance risk, and other ...
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. brad@securit360.com
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

Unsubscribe
Unsubscribe
Mingguan
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

Unsubscribe
Unsubscribe
Mingguan
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
Public Risk Management

Public Risk Management Association (PRIMA)

Unsubscribe
Unsubscribe
Bulanan+
 
Delve into the public sector risk management domain with PRIMA's Risk Management Podcast Series. This innovative, time-efficient, educational resource is designed to afford risk management professionals the opportunity to learn-on-the-go! Listen to PRIMA podcasts to remain cognizant of important issues affecting the public risk management community!
  continue reading
 
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the b ...
  continue reading
 
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
  continue reading
 
Artwork
 
VerSprite is a leader in risk-based cybersecurity services and PASTA threat modeling, enabling businesses to improve the protection of critical assets, ensure compliance, and manage risk. Our mission is to help you understand and improve your organization’s cybersecurity posture. With cyberattacks increasing in number and sophistication daily, it is essential to protect your organization’s assets, protect your clients, and maintain the same, excellent reputation and trust you have worked har ...
  continue reading
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
  continue reading
 
Artwork

1
The Security Podcasts

www.securitymagazine.com

Unsubscribe
Unsubscribe
Bulanan+
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
  continue reading
 
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
  continue reading
 
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

Unsubscribe
Unsubscribe
Bulanan
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork

1
KBKAST

KBI.Media

Unsubscribe
Unsubscribe
Mingguan+
 
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber®
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

Unsubscribe
Unsubscribe
Mingguan
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Artwork
 
Welcome to the Razorwire podcast where we share information, best practices and up to date news in cyber security and infosec. Our mission is to help you become a better cyber security professional and support our vision of creating an agile community of cyber professionals who are stronger than ever before. This show is first and foremost about sharing knowledge and benefiting from collaboration. We bring you the advice and wisdom of both your host, James Rees, and his guests to build on th ...
  continue reading
 
Artwork

1
To The Point - Cybersecurity

Forcepoint | Global Cybersecurity Leader | Security. Simplified.

Unsubscribe
Unsubscribe
Bulanan+
 
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
  continue reading
 
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
  continue reading
 
Loading …
show series
 
Securing the Vote: Addressing Election Vulnerabilities in 2024 In this episode of Cybersecurity Diaries, Nathan from StationX delves into the critical vulnerabilities and security measures essential for protecting election integrity. With the U.S. presidential election approaching, concerns about voting system security are peaking. The episode cove…
  continue reading
 
Every vendor you trust and every employee you hire could be your next security crisis—explore the realities of third party risk and insider threats on this episode of Razorwire! Join us for a discussion on the multifaceted challenges of third party risk and how they can destabilise your organisation. From the growing complexities of cloud providers…
  continue reading
 
Listen in to the latest edition of the Risk & Business Podcast, which is available on all audio platforms and in video form on YouTube! In today’s fast-evolving threat landscape, organisations are struggling to fill critical cyber roles, making skilled talent harder to find. In this episode, we are joined by Advent IM Head of Outsourcing (Andrew Co…
  continue reading
 
On this episode, David Beardshaw, CISO of 3VRM, joins Yonatan Lipschitz. They discuss the importance of third-party risk management (TPRM) and its role in securing organizations. They explore the definition of TPRM and the risks associated with third-party relationships. They also discuss the challenges of questionnaire-based assessments and the ne…
  continue reading
 
Hosts Vivek Ponnada and Sandeep Lota share their insights on and exploring topics such as: ✅ Emerging threats to ICS over the next 12-18 months ✅ Evolving strategies for integrating IT and OT cybersecurity ✅ The future role of AI in ICS cybersecurity ✅ Fostering collaboration between IT and OT teams Visit Our Website Follow Us on LinkedIn…
  continue reading
 
In this episode of Cyber Talks, Rich Raether, CIO of Quarles & Brady, and Andrew DeBratto, CISO of Hunton Andrews Kurth LLP, discuss their decades-long journey in IT and cybersecurity. They recount shared projects, including navigating early security challenges, and reflect on how the industry has transformed, focusing on threat management and resi…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest Karthik Krishnan, founder and CEO, Concentric AI. In this ep…
  continue reading
 
In this episode, Jeffrey talks to Cindy Seipert, an InfoSec GRC analyst at Health Catalyst. They discuss movies that challenge our identity, Cindy’s unique career path from the military to the tech industry and her experiences as a woman in cybersecurity.Oleh Jeffrey Wheatman
  continue reading
 
Send us a text Peter Warmka is a former Senior Intelligence Officer with the CIA having over 20 years of experience in breaching the security of target organizations overseas. He is an Adjunct Professor at Webster University's Masters in Cybersecurity Program, Founder of Orlando, Florida-based firm Counterintelligence Institute, LLC, and author of …
  continue reading
 
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) for a special episode for Cybersecurity Awareness Month, sourcing five tips from a range of Ivanti employees on how your organization and its users can stay secure. Join the conversation online on LinkedIn (linkedin.com/company/Ivanti…
  continue reading
 
In this episode of Cyber Focus, host Frank Cilluffo sits down with Sonya Proctor, Assistant Administrator for Surface Operations at TSA (Transportation Security Administration). Proctor discusses TSA's evolving role in securing pipelines and other surface transportation sectors, emphasizing the agency's expanded cybersecurity focus following the Co…
  continue reading
 
In this episode, we dive deep into the newly released Microsoft Digital Defense Report 2024, which offers a comprehensive look at the latest trends in the global cybersecurity landscape. From evolving cyber threats and attack strategies to Microsoft's analysis of the most vulnerable sectors, we break down the key findings and what they mean for bus…
  continue reading
 
In this episode, we sit down with Yuri Miloslavsky, CEO of Sharepass, as he discusses the risks associated with digital footprints in information sharing. Yuri delves into the importance of awareness about the vulnerabilities introduced by our online activities and the challenges of balancing security with user convenience. We explore the cybersecu…
  continue reading
 
Apple proposes 45-day maximum certificate life. SEC fines four companies for downplaying their SolarWinds attack severity. Google adds 5 new features to Messenger including inappropriate content. Does AI-driven local device-side filtering resolve the encryption dilemma forever? The very nice looking "Session" messenger leaves Australia for Switzerl…
  continue reading
 
Apple proposes 45-day maximum certificate life. SEC fines four companies for downplaying their SolarWinds attack severity. Google adds 5 new features to Messenger including inappropriate content. Does AI-driven local device-side filtering resolve the encryption dilemma forever? The very nice looking "Session" messenger leaves Australia for Switzerl…
  continue reading
 
Is cybersecurity gatekeeping holding back the industry? Naomi Buckwalter, Senior Director of Product Security at Contrast Security and Founder of the Cybersecurity Gatebreakers Foundation, argues that fresh talent and open doors are crucial for industry growth. In this episode, Naomi challenges why industry hiring norms fall short, shares candid st…
  continue reading
 
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Identity continues to be one of the most used attack vectors by cybercrim…
  continue reading
 
From the notorious Ticketmaster hack during Taylor Swift's ticket sales to the geopolitical cyber issues involving heavyweights like China and Israel, Maggie provides a comprehensive overview of the current cyber landscape. We'll explore the bipartisan effort needed to safeguard US infrastructure, including the vulnerabilities of our satellite syst…
  continue reading
 
Identity continues to be one of the most used attack vectors by cybercriminals. From phishing to credential stuffing to password spraying – threat actors are finding new ways to infiltrate systems and cause costly problems to companies. David Bradbury, Chief Security Officer at Okta, joins Security Weekly's Mandy Logan to discuss today's threat lan…
  continue reading
 
Our Q3 2024 APT Quarterly Highlights Report reveals intensified cyber activities from APT groups in Iran, Russia, China, and North Korea, indicating heightened espionage efforts. Iran’s MuddyWater and APT34 leveraged custom malware like BugSleep, while Russia’s APT29 and APT28 capitalized on zero-day vulnerabilities for sophisticated infiltration. …
  continue reading
 
This is the second of a two-part conversation between Steve and Brian Lord, who is currently the Chief Executive Officer of Protection Group International. Prior to joining PGI, Brian served as the Deputy Director of a UK Government Agency governing the organization's Cyber and Intelligence Operations. Today, Steve and Brian discuss the proliferati…
  continue reading
 
Send the hosts a message - try it now! TL;DR: On this week's episode, Jim, James, and I sit down to a Halloween "scary story" episode. You know the feeling... that sinking feeling of dread when you can't quite put your finger on what's wrong but something is definitely wrong. Something scary, and nefarious is happening... and usually it's coming fr…
  continue reading
 
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Show Notes: https://securityweekly.com/bsw-370…
  continue reading
 
Claroty Chief Strategy Officer Grant Geyer joins the Nexus Podcast to discuss the results of a survey of 1,100 cybersecurity leaders and practitioners on the business impact of disruptions from cyberattacks on cyber-physical systems. The financial losses are steep from these attacks impacting connected systems that are so central to our way of life…
  continue reading
 
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=audio&utm_medium=podcast&utm_campaign=podcast Today on Cyber Work, Jonathan Braley from the Food and Agriculture Information Sharing and Analysis Center (Food and Ag ISAC) delves into the critical security challenges i…
  continue reading
 
Welcome to another episode of The Dirty South Cybersecurity Podcast! 🎙️ In this episode, your hosts Tony and Q0PHI dive deep into the world of Application Security (AppSec). They tackle the burning question: Is AppSec dead? 🤔 Join the discussion as they explore the rise of Application Security Posture Management (ASPM) and debate whether ASPM is th…
  continue reading
 
Join Tony UV and Q0PHI80 at Black Hat 2024 as they discuss these 5 key topics: 1) Crowdstrike Incident - Security Issue, Incident or Neither? 2) QA Testing Today - For Better or for Worse? 3)Geopolitics in the Role of Cybercrime- Forgotten X-Factor or Integrated Background Influence? 4)Automated Pen Testing- Fact or Fiction for the Future? 5) Role …
  continue reading
 
Enjoying the content? Let us know your feedback! Lets face it, the cyber crooks are always lurking aroud waiting for an opportunity to come in. They choose the path of least resistant and password is often their way in. Unfortunately password is still with us and for sometime to come too. In today episode, we’re digging deep into top common types o…
  continue reading
 
In this episode of RANE Insights, RANE Founder David Lawrence sits down with Dr. Mark Gold for the third episode in a multi-part discussion on the relationship between addiction and enterprise risk. Dr. Gold is an author, inventor, and mentor who has had over 1,000 peer-reviewed publications since beginning his academic career at the University of …
  continue reading
 
Ivanti Virtual Traffic Manager (vTM) users – A critical authentication bypass flaw (CVSS 9.8) is now being actively exploited! This vulnerability allows unauthenticated attackers to gain admin control over your systems. Patch now to prevent unauthorized access, data theft, or malware deployment. Public exploit code is already circulating. Stay secu…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Damon Fleury, chief product officer, SpyCloud. In this epis…
  continue reading
 
Where does Zero Trust fall short, and why these failings encourage cyber-crime Expanding Zero Trust to protect the data itself Identifying, classifying, and securing sensitive data through automation This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Jean Carlos, VP Cyber Security, BOXT https://www.linkedin.com/in/je…
  continue reading
 
Technological change is inevitable and often one of the aspects that attracts people toward careers in information and operational technology. Although risk management is a part of navigating advancement in any area, the fundamental flaw in any management system is our human tendencies. This episode explores how organizations can make slow, steady …
  continue reading
 
Debunking the Biggest Myths About Cybersecurity Careers Join Nathan from StationX as he debunks common myths about cybersecurity careers in this episode of Cybersecurity Diaries. Learn why cybersecurity isn't just about hacking or coding, and discover the diverse roles that go beyond technical expertise. Nathan clears up misconceptions about job re…
  continue reading
 
In this episode replay, Spencer and Darrius break down the complexities of credential protection, discussing everything from user education and tools to threat modeling and guardrails. Plus, we delve into the world of protecting credentials within scripts and code. This is a must-listen for all IT admins, CISOs and any other IT/Security professiona…
  continue reading
 
In this episode, Jeffrey talks with Keren de Via, Go-to-Market Director at Cyturus Technologies. Keren has a deep cybersecurity background and was the first female Combat Communications and Cyber Defense Officer in the Israel Defense Forces. They discuss movies where a character experiences a perspective-shifting transformation, Keren’s transition …
  continue reading
 
In this episode of Cyber Focus, host Frank Cilluffo discusses cybersecurity priorities for the incoming administration with Mark Montgomery, co-author and leader of the Cyber Solarium 2.0 Commission, and George Barnes, former deputy director of the NSA. They delve into the McCrary Institute's new presidential transition report that presents a strat…
  continue reading
 
Loading …

Panduan Rujukan Pantas

Podcast Teratas