In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
theCUBEresearch principal Cybersecurity analyst Jon Oltsik hosts the newest SiliconANGLE podcast focusing on bridging the gap between Cybersecurity and all other parts of tech
…
continue reading
Der wöchentliche Podcast "Cybersecurity ist Chefsache" ist eine Plattform, auf der verschiedene Experten aus der Welt der Digitalisierung & Cybersecurity zusammenkommen, um über aktuelle Themen, Trends und praktische Anwendungen zu sprechen. Der Gastgeber Nico Freitag dazu Freunde, Kollegen oder gleichgesinnte aus allen Branche ein, um Ihre Erfahrungen und Meinungen zu teilen und um aktuelle Themen rund um Digitalisierung, Cybersecurity, OT-Sicherheit, Datenschutz und Informationssicherheit ...
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
1234, come la password che non dovreste mai scegliere. Come la password che la maggior parte degli utenti sceglie. Dalle truffe online agli intrighi internazionali, in ogni puntata approfondiamo la storia di cybersecurity del momento. A cura di Alberto Giuffrè
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading

1
Cybersecurity, Privacy, Risk Management, Cryptocurrencies, Fintech, Information Technology
Shahid Sharif
Career guidance & consulting services in Information Technology, Cybersecurity, Privacy, Risk Management, Cryptocurrencies, & Fintech #self improvement # productivity #cybersecurity #security #privacy #risk #fintech #blockchain #cryptocurrencies
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
A bi-weekly podcast that helps you curb cybersecurity risk and tackle technology challenges
…
continue reading
In this episode, Tyler and Bob break down cybersecurity in a fun, human way—no tech jargon overload, just real tips and tricks to keep your business safe. From password tricks and phishing scams to the importance of backups and cloud security, they share easy-to-follow advice with plenty of humour and relatable insights. If you’ve ever ignored an update or used ”password123,” this one’s for you. Tune in, laugh a little, and learn how to become a cybersecurity rockstar!
…
continue reading
Hear directly from the frontlines. Our podcast features candid conversations with our own experts as well as external experts driving cybersecurity forward. Real stories, real solutions, real impact.
…
continue reading
Hosted by Niles Benghauser of CTO Security, this podcast covers a wide range of developments in the world of cybersecurity and managed information technology (IT).
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Andy Kerr and Kyle Hinterberg, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
This first-of-its-kind audio drama from Dell explores what it takes to navigate the perilous and shifting terrain of the modern cybersecurity landscape, and how to best prepare yourself for what may be lurking around the next corner. Whether you're a tech professional or simply curious about the security of your personal data, these stories will help strengthen your defenses against a new kind of enemy. One you may not be expecting.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
Welcome to Security Sutra, a sub-podcast of Startuprad.io™, dedicated to safeguarding your startup against cyber threats in today's digital landscape. As part of one of the top 20 entrepreneurship podcasts on Apple Podcasts worldwide, we bring you vital insights into cybersecurity, blending deep tech with entrepreneurship to empower your startup. Our podcast features a diverse range of guests, including industry-leading cybersecurity entrepreneurs, Emmy winners, New York Times best-selling a ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Our latest TIAKI thought leadership to help determined leaders achieve differentiation in the global sports ecosystem. Listen to our expert analysis and bold thinking to help you achieve the extraordinary in sport.
…
continue reading
Discussion
…
continue reading
Cybersecurity Ally is Fortra’s cybersecurity podcast covering security, today’s cyber threats, and everything you need for cyber news today. Listen now!
…
continue reading

1
The Cyber Go-To-Market podcast for cybersecurity sales and marketing teams. Save Cybr Donut!
Andrew Monaghan
The podcast for sales and marketing teams that tackles the question: How can Cybr Donut grow ARR to $10m by the end of 2025? We talk with cybersecurity CROs, CMOs, CEOs, as well as sales and marketing experts in our movement to Save Cybr Donut. Listen in, and you will get proven strategies to - help you get more leads - win more customers, and, - create your killer go-to-market growth engine. If you are a seller, marketer, leader, CEO, or founder at a cybersecurity company, you are in the ri ...
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Cybersicherheit kann man auch hören, in unserem Podcast. Abonnieren sie uns und hören sie, was Experten aus der Branche zu sagen haben, ohne dass sie selbst ein Experte sein müssen, um es zu verstehen.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Your daily cybersecurity news for cyber professionals.
…
continue reading
Cybersecurity Thought Leader Kevin Greene, explores the latest news and developments in cybersecurity and information assurance on his debut podcast, "Cybersecurity Insights & Perspectives”... Follow him at @iamkevtorious
…
continue reading
In an age where cyber threats evolve with lightning speed, traditional defenses are no longer enough. AI in Cybersecurity: Protecting the Digital Future is your guide to understanding how artificial intelligence is revolutionizing the fight against digital crime. This comprehensive book delves into AI’s transformative role in cybersecurity, from identifying and mitigating sophisticated threats to mastering critical concepts like machine learning and anomaly detection.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Host John Bambenek discusses complex cybersecurity issues
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
SAE International explores critical topics in transportation cybersecurity with industry, government, and legal experts.
…
continue reading
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: [email protected] https://www.4s-ag.de
…
continue reading
Ingram Micro Cloud BeNeLux presents a monthly cybersecurity podcast. In this podcast you get the hottest and latest cybersecurity updates. Every month we take a deep dive in one specific cybersecurity subject with the best experts in the business.
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading

1
Converging Worlds: Securing IoT, OT, and Critical Infrastructure
27:32
27:32
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
27:32The digital transformation journey in critical infrastructure organizations and other sectors like healthcare is increasingly connecting operational technology (OT) and integrating Internet of Things (IoT) devices. While this convergence of OT and IT creates efficiencies, it also introduces new vulnerabilities and expands the attack surface for cyb…
…
continue reading

1
The Monthly Cybersecurity Review: Data Breaches, Ransomware, and Critical Infrastructure
56:44
56:44
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
56:44In this episode of 'Cybersecurity Today', host Jim Love is joined by panelists Laura Payne from White Tuque and David Shipley from Beauceron Security to review significant cybersecurity events over the past month. The discussion covers various impactful stories such as the disappearance of a professor, a data breach at Hertz, and government officia…
…
continue reading

1
Cybersecurity Company CEO Charged for Planting Malware
3:43
3:43
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
3:43- CEO of a Cybersecurity Company Charged for Planting Malware. - Microsoft to Expand Hotpatching. - Apple Airplay is Being Exploited. - Ransomware Cripples Hospitals. Support the show Remember... Even with top-tier security, human negligence and/or error can compromise systems. Invest in employee training—it’s the ultimate safeguard. Stay Informed,…
…
continue reading

1
Cybersecurity Awesomeness Podcast - Episode 109
11:54
11:54
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
11:54Chris Steffen and Ken Buckler from EMA discuss how the bad guys are using AI to perform cyberattacks.Oleh Enterprise Management Associates + DEVOPSdigest
…
continue reading

1
Mastering Cybersecurity: Part 2 – Securing Systems and Environments
40:33
40:33
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
40:33In this episode, Steve and John dive into why securing systems is a must-know skill in cybersecurity. Learn the basics of system hardening, access control, and logging, plus practical tools and labs to get hands-on. They also explore how AI can boost your defense game — and why thinking like both an attacker and defender will set you apart. +++++++…
…
continue reading

1
Making “Channel First” Work (And Pay!) in Cybersecurity
24:29
24:29
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
24:29Are you struggling to scale your cybersecurity sales team effectively while launching a disruptive new product? Wondering how to build a winning go-to-market culture, especially when working channel-first? Trying to figure out how to attract and enable the right channel partners to drive real revenue growth? This episode dives deep into the practic…
…
continue reading

1
How AI Is Transforming Industrial Tech — Visionaries Club’s Bold VC Strategy
56:59
56:59
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
56:59Opening What happens when Europe's top startup operators become VCs — and use AI to disrupt billion-euro legacy sectors? Today’s episode uncovers how Marton Sarkadi Nagy, Partner at Visionaries Club, is backing founders who are rewriting the playbook for industrial tech innovation. What You'll Learn: 🔧 How applied AI is replacing legacy SaaS and tr…
…
continue reading

1
Regulated, Ruthless & Ready: Inside James Hait’s Wealth Fortress | Out of the Dark
59:32
59:32
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
59:32In this episode of Out of the Dark, host Niles Benghouser sits down with James Hait, founder of Victory Wealth Services, to dive deep into what it really takes to run a successful, secure, and compliant financial services firm. James shares how his company navigates complex SEC regulations, prepares for audits, and fosters a strong internal culture…
…
continue reading

1
51. Behind the Likes: What Small Business Owners Must Know About Social Media Fraud
59:00
59:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
59:00In this episode of UnHacked, hosts Justin Shelley and Mario Zake are joined by Tim O'Hearn, author and former software engineer, to explore the darker side of social media engagement strategies. Tim shares insights from his personal journey of creating social media bots and discusses the implications of fake activity on platforms like Instagram. Th…
…
continue reading

1
Episode 135: Five Lightning Chats at RSAC Conference 2025
23:30
23:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
23:30In episode 135 of Cybersecurity Where You Are, Sean Atkinson is joined live at RSAC Conference 2025 by five attendees, including two Center for Internet Security® (CIS®) employees. He conducts a lightning chat with each attendee to get their thoughts about the conference, how it reflects the changing cybersecurity industry, and the role CIS plays i…
…
continue reading

1
Beyond the Breach: Cyber Intel from the FBI's Former Cyber Chief
30:07
30:07
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
30:07In this episode of Reimagining Cyber, Rob Aragao welcomes Matt Gorham, former Assistant Director of the FBI’s Cyber Division and current leader of PwC’s Cyber and Risk Innovation Institute. Gorham shares critical insights from his 25-year FBI career and discusses the evolution of ransomware—especially the rise of ransomware-as-a-service models and …
…
continue reading

1
Traffico aereo, ricercatori italiani scoprono criticità in un software
5:57
5:57
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
5:57Un gruppo di ricercatori ha identificato due vulnerabilità nel sistema di prevenzione delle collisioni aeree adottato dagli aeromobili civiliOleh Sky TG 24
…
continue reading

1
Balancing Policy, Technology, and Security: Expert Advice from Former Deputy Federal CIO Maria Roat
33:19
33:19
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
33:19Welcome back to To the Point Cybersecurity Podcast, brought to you by Forcepoint! In this week’s episode, hosts Rachael Lyon and Jonathan Knepher are joined—once again—by the remarkable Maria Roat, former US Deputy Federal Chief Information Officer and past CIO of the Small Business Administration. With over three decades of federal IT and cybersec…
…
continue reading

1
Visibility Revisited: Trends Shaping the Future of OT Cybersecurity
35:09
35:09
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
35:09In this special rewind episode we highlight outside influences shaping control system integrity, the impact of AI, emerging technologies, and the dynamics of building a career in OT cybersecurity. Drawing from frontline experiences and industry events like the S4 Conference, the discussion explores the growing organizational shift toward dedicated …
…
continue reading

1
Network for Rent: The Criminal Market Built on Outdated Routers
9:37
9:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
9:37Cybercriminals are exploiting outdated routers to build massive proxy networks that hide malware operations, fraud, and credential theft—right under the radar of enterprise defenses. In this episode, Sherri and Matt unpack the FBI’s May 2025 alert, the role of TheMoon malware, and how the Faceless proxy service industrializes anonymity for hire. Le…
…
continue reading

1
Fortinet ON AIR #5 - Navigating AI, Misinformation & Cyber Resilience with Orange Cyberdefense
21:56
21:56
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
21:56Fortinet ON AIR is a video podcast series recorded live at Mobile World Congress 2025 in Barcelona, featuring expert voices from across the telecommunications ecosystem.In each episode, we dive into the evolving cybersecurity landscape—exploring how telcos and service providers can stay secure, resilient, and competitive in a fast-changing digital …
…
continue reading

1
Episode 88: Two-Time CISO Showdown Champion (and Chad)
46:05
46:05
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
46:05Alias Cybersecurity Jonathan Kimmitt is joined by Chad Kliewer to discuss the exciting CISO Showdown competition between Chief Information Security Officers (CISOs) at BSidesOK. They delve into the history of the showdown, how it works, and highlight significance of the championship belt. Tune in as they share insights and fun facts about this uniq…
…
continue reading
Monzy Merza, CEO and Co founder of Crogl joins theCUBE Research Principal Analyst of Cybersecurity Jon Oltsik for another episode of The Cybersecurity BridgeOleh SiliconANGLE
…
continue reading

1
Pi-hole: The Open Source DNS Firewall Revolutionizing Network Security
39:50
39:50
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
39:50Your network is talking behind your back—but Pi-hole is listening. Join The Audit as Pi-hole co-founders Dan Schaefer and Adam Warner reveal how their open-source DNS sinkhole technology has become the secret weapon for over 200,000 privacy-conscious users worldwide. In this episode, we discuss: How Pi-hole evolved from a simple ad blocker to a cri…
…
continue reading

1
Alte Anlagen, neue Gefahren: OT-Pentests als Schlüssel zur sicheren Produktion
1:22:54
1:22:54
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:22:54Erweitere dein Wissen über industrielle Cybersicherheit mit "Cybersecurity ist Chefsache". In dieser spannenden Episode spricht Nico Freitag mit Sebastian Froede, Geschäftsführer bei Pentaris Security GmbH, über OT-Pentests und die wahren Herausforderungen in der Absicherung industrieller Steuerungsanlagen. Sebastian teilt seine Erfahrungen aus übe…
…
continue reading

1
Bulletproof IT Changes: A Comprehensive Framework for Zero-Downtime Implementations
8:52
8:52
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
8:52Discover the complete framework for implementing IT changes without business disruption. This episode breaks down the three critical pillars of effective change management and provides step-by-step guidance for before, during, and after any technology change. Learn how to: • Build and maintain a robust Configuration Management Database • Implement …
…
continue reading

1
End Compliance Theatre: How Automation Can Save Your Business
30:38
30:38
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
30:38In this eye-opening episode of Cybersecurity Chronicles, we tackle a critical challenge facing executives today: the devastating impact of cyberattack downtime. Join Netswitch's VP Sean Mahoney, CFO Bernard Mendoza, and cyber resilience expert Steve Piggott as they move beyond "compliance theatre" to discuss why automated disaster recovery (DR) isn…
…
continue reading

1
Recent UK Retail Ransomware Carnage is the ‘Canary in a Coalmine’ Moment for Sport
19:58
19:58
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
19:58Send us a text Hey everyone, and welcome back to the show! Today we're discussing a critical warning sign for the sports industry: the recent wave of ransomware attacks hitting UK retailers. This TIAKI article argues that this "carnage" serves as a stark "canary in a coalmine" final warning, highlighting the urgent need for sports organizations to …
…
continue reading

1
🌐 Cybersecurity Unmasked 🌐 EP 15: IT Security Mistakes to Avoid
13:29
13:29
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
13:29In this episode of Cybersecurity Unmasked, we cover common IT security mistakes small businesses make, inspired by our blog, Top IT Security Mistakes. Learn how our trusted Managed IT Services Toronto and professional IT company support can keep your business safe.Oleh ITBizTek
…
continue reading
In this episode of Risk & Reels, Jeffrey Wheatman sits down with Craig Taylor, CEO of CyberHoot, to talk about how small businesses are navigating the evolving world of cybersecurity compliance—especially the demanding standards of CMMC. From Apollo 13-style ingenuity to the unintended consequences of regulation, Craig shares a 30-year perspective …
…
continue reading

1
Unlocking Business Value From NIS2: The Consultant’s Role | Interview with Philippe Cornette
57:38
57:38
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
57:38In this episode of the Secure and Simple Podcast, host Dejan Kosutic interviews Philippe Cornette, an interim CISO and founding partner at DigiSôter consultancy, to discuss the challenges and opportunities in cybersecurity consulting. They delve into the importance of aligning cybersecurity projects with business value, the evolving nature of cyber…
…
continue reading

1
E39 - Can you hear me now? The changing role of communication in the workplace
44:14
44:14
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
44:14Is the Phone Call Dead? Office Communications in Modern Workspaces In this episode of 'Off the Wire,' IT executives Tanner and Anthony dive into the evolution of office communications, discussing whether phone calls are becoming obsolete. They explore the use of chat applications like Microsoft Teams, the rise of email, and the role of face-to-face…
…
continue reading
An ambulance gets rerouted. A stable patient becomes critical. And no one — not dispatch, not the hospital, not the medics — knows why. Turns out, the problem wasn’t the traffic. It wasn’t the hospital. It was the AI. On the latest episode, a medical center rolls out a brand new generative AI system to streamline operations… and it backfires. Badly…
…
continue reading

1
Inside the DARPA AI Cyber Challenge: Securing Tomorrow’s Critical Infrastructure Through AI and Healthy Competition | An RSAC Conference 2025 Conversation with Andrew Carney | On Location Coverage with ...
27:35
27:35
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
27:35During RSAC Conference 2025, Andrew Carney, Program Manager at DARPA, and (remotely via video) Dr. Kathleen Fisher, Professor at Tufts University and Program Manager for the AI Cyber Challenge (AIxCC), guide attendees through an immersive experience called Northbridge—a fictional city designed to showcase the critical role of AI in securing infrast…
…
continue reading

1
Part 2: Solving the Top 10 Problems with Vulnerability Management
38:32
38:32
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
38:32Once again, we're back with all the answers. Traditional vulnerability management comes with many pitfalls, and we're counting down the solutions to all the problems you might be running into. Ivanti's Chris Goettl and Robert Waters break down the back five on our list: a periodic approach to remediation, poor prioritization, lack of business conte…
…
continue reading

1
Identity, Access, and You: Leveling Up Your Cybersecurity Game at Yale and at Home
31:21
31:21
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
31:21What does airport security have to do with protecting your online identity? 🛫💻 Plenty, actually. In this episode, we chat with Dan Tinari from Yale’s Information Security Office, who breaks down identity and access management (IAM) in a way that actually makes sense—and might even make you smile. 😄 Whether you're logging in at Yale or keeping your …
…
continue reading