Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Welcome to “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidenc ...
…
continue reading
1
Cybersecurity Basement – der Podcast für echten Security-Content
suresecure GmbH, Michael Döhmen, Andreas Papadaniil
Herzlich Willkommen im Cybersecurity Basement. In unserem Podcast spricht Michael Döhmen alle 14 Tage mit spannenden Gästen über Themen aus dem Bereich Cybersecurity. Dabei legen wir großen Wert auf Objektivität gelegt. Kein suresecure-Feature-Fucking, sondern ein seriöser, authentischer und ehrlicher Austausch aus Theorie und Praxis. Der Podcast richtet sich an IT- und Security-Entscheider und alle, die es mal werden wollen. Hier gibts kein Blabla, sondern Security als Handwerk. Ehrlich auf ...
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
Der wöchentliche Podcast "Cybersecurity ist Chefsache - Der Podcast!" ist eine Plattform, auf der verschiedene Experten aus der Welt der Digitalisierung & Cybersecurity zusammenkommen, um über aktuelle Themen, Trends und praktische Anwendungen zu sprechen. Der Gastgeber Nico Werner lädt dazu Freunde, Kollegen oder gleichgesinnte aus allen Branche ein, um Ihre Erfahrungen und Meinungen zu teilen und um aktuelle Themen rund um Digitalisierung, Cybersecurity, OT-Sicherheit, Datenschutz und Info ...
…
continue reading
1234, come la password che non dovreste mai scegliere. Come la password che la maggior parte degli utenti sceglie. Dalle truffe online agli intrighi internazionali, in ogni puntata approfondiamo la storia di cybersecurity del momento. A cura di Alberto Giuffrè
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
A bi-weekly podcast where pressing cybersecurity and information technology issues are discussed.
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
…
continue reading
In the ever-evolving world of cybersecurity, keeping updated on the latest developments is crucial. The Cybersecurity Digest is your curated source for the most recent cybersecurity updates. Our goal is to bring you a comprehensive roundup of news, ensuring you’re well-informed and ahead of the curve. Stay Informed to Stay Secure.
…
continue reading
Welcome to CISO Insights, the official podcast of CISO Marketplace, where we dive deep into the latest trends, challenges, and innovations in cybersecurity. Each episode features expert commentary, practical advice, and cutting-edge insights to help Chief Information Security Officers (CISOs) navigate today’s complex threat landscape. From risk management and compliance to advanced threat detection and emerging technologies, CISO Insights delivers the knowledge you need to stay ahead in an e ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
”Digital Defenders” is a must-listen podcast for anyone interested in staying ahead in the ever-evolving field of cybersecurity. Hosted by industry veterans, each episode delves into the latest threats, emerging technologies, and cybersecurity strategies. From interviews with leading experts to deep dives into case studies of significant security breaches, this podcast provides a comprehensive overview of the landscape. Whether you’re a professional in the field, a business owner concerned a ...
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
Welcome to Security Sutra, a sub-podcast of Startuprad.io™, dedicated to safeguarding your startup against cyber threats in today's digital landscape. As part of one of the top 20 entrepreneurship podcasts on Apple Podcasts worldwide, we bring you vital insights into cybersecurity, blending deep tech with entrepreneurship to empower your startup. Our podcast features a diverse range of guests, including industry-leading cybersecurity entrepreneurs, Emmy winners, New York Times best-selling a ...
…
continue reading
Cybersecurity Thought Leader Kevin Greene, explores the latest news and developments in cybersecurity and information assurance on his debut podcast, "Cybersecurity Insights & Perspectives”... Follow him at @iamkevtorious
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Discussion
…
continue reading
1
Cloud Legacy: Carve Out, Merger & Cybersecurity für Unternehmen
Markus Prahl, Geschäftsführer der Sequafy GmbH
In meinem wöchentlichen Podcast Cloud Legacy dreht sich alles um die faszinierende Welt von IT-seitigen Carve-Outs und Unternehmenszusammenschlüssen. Dabei beleuchte ich die komplexen Prozesse hinter IT Carve-Out und Merger und spreche auch immer wieder mit wechselnden Experten und Brancheninsidern über diese Themen. Wir diskutieren über Best Practices aus erfolgreich abgeschlossenen oder noch laufenden Projekten, analysieren aktuelle Trends und Innovationen im Bereich der IT-Integration und ...
…
continue reading
1
The Cyber Go-To-Market podcast for cybersecurity sales and marketing teams. Save Cybr Donut!
Andrew Monaghan
The podcast for sales and marketing teams that tackles the question: How can Cybr Donut grow ARR to $10m by the end of 2025? We talk with cybersecurity CROs, CMOs, CEOs, as well as sales and marketing experts in our movement to Save Cybr Donut. Listen in, and you will get proven strategies to - help you get more leads - win more customers, and, - create your killer go-to-market growth engine. If you are a seller, marketer, leader, CEO, or founder at a cybersecurity company, you are in the ri ...
…
continue reading
Cybersicherheit kann man auch hören, in unserem Podcast. Abonnieren sie uns und hören sie, was Experten aus der Branche zu sagen haben, ohne dass sie selbst ein Experte sein müssen, um es zu verstehen.
…
continue reading
Your daily cybersecurity news for cyber professionals.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Host John Bambenek discusses complex cybersecurity issues
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
SAE International explores critical topics in transportation cybersecurity with industry, government, and legal experts.
…
continue reading
Ingram Micro Cloud BeNeLux presents a monthly cybersecurity podcast. In this podcast you get the hottest and latest cybersecurity updates. Every month we take a deep dive in one specific cybersecurity subject with the best experts in the business.
…
continue reading
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: info@4s-ag.de https://www.4s-ag.de
…
continue reading
Tired of IT issues disrupting your business? We break down how proactive IT support with 24/7 monitoring can save your business money and boost productivity. Learn how GuardTech is like having a dedicated IT team, for the cost of a cup of coffee per employee. Is your business facing constant IT problems? We discuss the cost-effective solution that provides continuous monitoring, expert advice and comprehensive reporting. Don't wait for another IT crisis, tune in to learn how to safeguard you ...
…
continue reading
Byte-sized tutorials to prepare for Comptia Network+ exam, and for beginners who want to enter into cybersecurity.
…
continue reading
n this episode, we delve into the world of emerging technologies and their profound impacts on cybersecurity jobs. As new technologies continue to reshape industries, the demand for skilled cybersecurity professionals is more critical than ever. Join us as we explore: Key emerging technologies, including AI, IoT, blockchain, and quantum computing. How these technologies are transforming the cybersecurity landscape. The new skill sets and knowledge areas that cybersecurity professionals need ...
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
Cybersecurity in Yoruba - #CyberPodYoruba
…
continue reading
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono di ogni tipo: le imprese (dalle grandi multinazionali alle Piccole e Medie Imprese); gli enti e le organizzazioni di ogni ordine e grado; i privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell’attacco, entità della struttura attaccata o danni provocati. Altri sono stati meno esposti alla luce dei media, ma hanno comunque creato grav ...
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
…
continue reading
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
Wibu-Systems hat es sich zur Aufgabe gemacht, vielseitige und sichere Technologien zu entwickeln, die Herstellern von Software und intelligenten Geräten die Möglichkeit liefert ihre Produkte vor Piraterie, Reverse Engineering, Manipulation, Sabotage und Spionage zu schützen. Mit CodeMeter, einer umfassenden und preisgekrönte Suite von hardware- und softwarebasierten Lösungen, ist dies möglich.
…
continue reading
1
The Cyber Kill Chain framework - Play-Book for Hackers
4:31
4:31
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
4:31
The Cyber Kill Chain framework outlines the seven distinct stages of a cyberattack, starting with reconnaissance where attackers gather information about their target and ending with action on objectives where the attacker achieves their ultimate goal. Each stage represents a critical point of vulnerability, from weaponizing malware to exploiting v…
…
continue reading
1
Digital Wild West: Greed, Chaos, and the Cyber Arms Race
13:09
13:09
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
13:09
From water bills held hostage to artists losing their savings, this week's cyberattacks expose our digital vulnerabilities. We unpack the motives, the players, and the tech shaping this digital battleground. Plus, what you can do to protect yourself.Oleh CISO Marketplace
…
continue reading
1
North Korean sponsored hackers target tech job seekers with phoney job interviews. Cyber Security Today for Friday, October 11, 2024
8:00
8:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
8:00
Cybersecurity Today: Data Breaches and Malware Threats In this episode of Cybersecurity Today, host Jim Love discusses the hacking incidents involving the Internet Archive and Fidelity, exposing millions of users' data. Highlights include the Internet Archive breach attributed to the Black Meta Hacktivist group, affecting 31 million users, and Fide…
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 81
15:12
15:12
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
15:12
In Part 2 of a 2-part series, Chris Steffen and Ken Buckler from EMA compile a list of points that people should be thinking about during Cybersecurity Awareness Month.Oleh Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
Mythenknacker 02: Email geöffnet und schon gehackt?
17:14
17:14
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
17:14
In dieser Folge von „MythenKnacker“ diskutieren Nico Werner und Dave, was es wirklich bedeutet, gehackt zu werden, und welche Schritte oft nötig sind, um eine Cyberattacke zu starten. Sie räumen mit dem Mythos auf, dass der einfache Klick auf einen Link oder das Öffnen einer E-Mail automatisch zum Hack führt. Stattdessen erklären sie die typischen …
…
continue reading
1
Why “Always Be Collaborating” Should Overshadow “Always Be Closing” in Security Sales
27:17
27:17
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
27:17
In this episode, Jeffrey talks to entrepreneur and four-time CISO Demetrios Lazarikos — aka Laz. Laz is the founder and IT security consultant of Blue Lava Consulting. They discuss why security salespeople should look for ways to solve problems instead of focusing solely on closing and how CISOs can better communicate to a wider audience.…
…
continue reading
1
Episode 104: Inside the First Year of a Cybersecurity Career
32:56
32:56
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
32:56
In episode 104 of Cybersecurity Where You Are, Sean Atkinson is joined by Kennidi Ortega, Information Security Analyst at the Center for Internet Security® (CIS®). Together, they explore the experience of a first-year analyst and how they might make the most of getting started in a cybersecurity career. Here are some highlights from our episode: 01…
…
continue reading
1
The Human Factor: Outsmarting Cyber Threats with Awareness - Ep 118
19:57
19:57
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
19:57
In this episode, we are joined by Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance (NCA), to discuss the NCA’s mission, current initiatives, and the importance of cybersecurity education. They highlight key programs, their collaboration with CISA on cybersecurity campaigns, and their efforts to simplify cybersecurity for t…
…
continue reading
1
Fixing Cybr Donut's pipeline crisis: proven strategies for rapid cybersecurity pipeline generation - Joseph Barringhaus, VP of Marketing, Sonrai Security
45:23
45:23
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
45:23
Like the go-to-market team at Cybr Donut, are you struggling to build a strong sales pipeline and wondering how to utilize events effectively? Do you want to know why your customers choose your products and leverage that to boost sales? Join us in this episode as we explore practical strategies that can help your sales and marketing teams hit your …
…
continue reading
1
How CISOs Are Bridging the Gap between OT and IT Cybersecurity
35:14
35:14
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
35:14
In this rewind episode, we explore the critical role CISOs play in bridging the gap between operational technology (OT) and enterprise cybersecurity. With manufacturing and critical infrastructure facing increasing cyber threats, CISOs must navigate both the boardroom and the plant floor to secure complex environments without disrupting production.…
…
continue reading
1
E24 - Lessons from Hurricane Helene: Enhancing Resilience and Preparedness
35:01
35:01
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
35:01
Crisis Management: Lessons from Hurricane Helene In this episode of Off the Wire, hosts Anthony and Tanner discuss the impact of Hurricane Helene on regions like Western North Carolina and Eastern Tennessee, focusing on technological challenges and solutions. Tanner, from Blue Ridge Energy, shares insights into infrastructure resilience and the imp…
…
continue reading
1
Israele-Iran, i risvolti cyber della crisi
6:08
6:08
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:08
Con Pierguido Iezzi facciamo il punto sugli aspetti cyber della guerra, in particolare sullo scontro tra Israele e IranOleh Sky TG 24
…
continue reading
1
Be Yoda, Not Luke - Mastering Emotional Intelligence in Cybersecurity with Adam Anderson
53:53
53:53
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
53:53
Send us a text In this episode, we have an insightful conversation with Adam Anderson, a seasoned cybersecurity professional, entrepreneur, and author. Adam shares his journey from a technical "keyboard warrior" to realizing the power of emotional intelligence (EIQ) in building a successful cybersecurity career. We discuss the critical differences …
…
continue reading
1
Will Quantum Computers Steal Your Job or Save the World an Expert Explains
41:13
41:13
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
41:13
In this episode of Cybersecurity Chronicles, host Sean Mahoney sits down with quantum computing expert John O’Malley to talk about the world of quantum computing. John worked with the NIST Post Quantum Encryption Standards Committee, after having previously led Change Healthcare's Identity and Access Management (before the breach). They delve into …
…
continue reading
Attend S3CCON? Enjoy experiencing the recap. Miss S3CCON? Hear what was awesome, what we learned, and what to look forward to in 2025! Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode now at https://bit.ly/47eYPTK Listen on Apple Podcasts, Spotify and anywhere you get you're podcasts.…
…
continue reading
1
September 2024 Startup News: Intel Halts €30B Project, Magic AI Raises $320M, Flink Expands in Europe
48:20
48:20
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
48:20
Welcome to the September 2024 Startup News from Startuprad.io! This episode covers the most impactful developments in the startup scenes of Germany, Austria, and Switzerland. Stay informed about key trends, funding rounds, and industry shifts that could influence your business or investment decisions. Key Highlights: Intel Pauses €30B Chip Factory …
…
continue reading
1
2 podcasters discover they are AI when they thought they were human
4:03
4:03
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
4:03
Oleh bernard
…
continue reading
1
Kritische Infrastruktur im Visier: Cyberkriminalität im Gesundheitssektor
29:24
29:24
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
29:24
In der aktuellen Podcast-Episode sprechen Michael und Andreas über Cyberkriminalität im Gesundheitssektor. Warum sind Krankenhäuser so häufig Ziel von Angriffen? Welche Rolle spielt dabei das Krankenhauszukunftsgesetz (KHZG)? Und was passiert, wenn Hacker Erfolg haben? Die Folgen können gravierend sein: Behandlungsstopp, Aufnahmesperre und mehr. Di…
…
continue reading
1
#057 - So vermeidet man Schatten-IT während dem Merger!
17:01
17:01
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
17:01
In dieser Folge geht es um das Thema Shadow IT, insbesondere im Kontext von Unternehmensübernahmen und Fusionen. Markus spricht darüber, warum Schatten-IT in vielen Unternehmen existiert, welche Risiken sie bei Mergern und Integrationen birgt und warum die IT-Abteilung nicht immer alles im Griff hat. Außerdem beleuchtet er die Hintergründe, warum M…
…
continue reading
1
Vulnerability Intelligence with Securin CEO Ram Movva
22:18
22:18
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
22:18
Securin CEO Ram Movva joins the show to talk all things vulnerability intelligence: how to prioritize according to risk, how to manage your external attack surface and emerging trends in ransomware and security. Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)Oleh Ivanti: Cybersecurity and Information Technology Solutions
…
continue reading
1
Episode #124: Urgent Release - Major Two Factor Authentication Vulnerability Discovered
42:06
42:06
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
42:06
In this urgent episode, the Cyber Rants crew welcomes Silent Sector’s Chief Cybersecurity Architect, Brian Contario, to discuss his game-changing discovery of a critical vulnerability in the Two-Factor Authentication Enrollment Process. This vulnerability has the potential to impact hundreds of millions of accounts globally and poses a serious thre…
…
continue reading
1
A day in the life of a vCISO - Audio
36:09
36:09
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
36:09
The Role and Impact of Fractional Security Officers in Small Businesses In this episode, cybersecurity experts William McBurrow and Christophe Foulon delve into the world of fractional Chief Security Officers (CSOs). They explore the unique challenges faced by small businesses in building security risk management programs and how fractional securit…
…
continue reading
1
Celebrate Cybersecurity Awareness Month: Mastering Cyber Safety with Yale's Bee Cyber Fit Training Program
15:20
15:20
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
15:20
Is your cybersecurity muscle strong enough to withstand digital threats? Join us as we reveal the alarming truth that a staggering 82% of data breaches are linked to human error and explore how you can fortify your digital defenses. October is Cybersecurity Awareness Month! Discover how simple, manageable actions can make a difference and why start…
…
continue reading
1
Enhancing Cyber Defense with Adaptive Firewalls and Collective Intelligence with Philippe Humeau
37:30
37:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
37:30
Welcome to "To The Point Cybersecurity," the podcast where we dive deep into the most pressing issues in global cybersecurity, explore emerging threats, and discuss innovative solutions. In this episode, titled "E302 - Philippe_mixdown," our hosts Rachael Lyon and Vince Spina welcome Philippe Humeau, CEO of CrowdSec, an expert in adaptive cybersecu…
…
continue reading
1
Brass Tacks #6 - Building Cyber Resilience: Aligning People, Processes, Tech, & Compliance
17:35
17:35
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
17:35
In this episode of Brass Tacks - Talking Cybersecurity, Daniele Mancini, Field CISO at #Fortinet explains the three main drivers of change for #cybersecurity and the challenges these present for the #CISO:➡️ The explosion in data volumes➡️ The increasing speed of innovation➡️ The growing interconnection of the digital ecosystemTune in for a discuss…
…
continue reading
1
#22 - Security Awareness Training (part 2)
55:47
55:47
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
55:47
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Intro Agenda Who are you wearing? Hot Topic Security Awareness Training Phishing Social engineering OPSEC That’s a Wrap Cybersecuritygrowth.com and cybersecuritygrowth.com/blog Live on Twitch bi-weekly, Fridays at 10:30 AM EDT, 7:30 AM PDT, 3:30 PM GMT in your …
…
continue reading