It Security halka açık
[search 0]
Daha fazla
Download the App!
show episodes
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
Haftalık
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

Unsubscribe
Unsubscribe
Haftalık
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
  continue reading
 
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

Unsubscribe
Unsubscribe
Haftalık+
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Surveillance Report

Techlore & The New Oil

Unsubscribe
Unsubscribe
Haftalık+
 
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
  continue reading
 
Join the brightest SolarWinds minds and IT industry influencers, as they cut through the jargon and give you the tools you need to grow and keep your tech knowledge razor-sharp. Come with questions—leave with actionable steps and practical insights. Have ideas for future episodes or topics? Tweet us @ SolarWinds using #TechPod.
  continue reading
 
Artwork

1
Ctrl+Alt+Azure

Tobias Zimmergren, Jussi Roine

Unsubscribe
Unsubscribe
Haftalık
 
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
  continue reading
 
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy weekly episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Mission.org is a media studio producing content for world-cla ...
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
The Cloudcast

Massive Studios

Unsubscribe
Unsubscribe
Haftalık+
 
The Cloudcast (@cloudcastpod) is the industry's #1 Cloud Computing podcast, and the place where Cloud meets AI. Co-hosts Aaron Delp (@aarondelp) & Brian Gracely (@bgracely) speak with technology and business leaders that are shaping the future of business. Topics will include Cloud Computing | AI | AGI | ChatGPT | Open Source | AWS | Azure | GCP | Platform Engineering | DevOps | Big Data | ML | Security | Kubernetes | AppDev | SaaS | PaaS .
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
  continue reading
 
Artwork

1
Breaches & Brews

Rivial Data Security

Unsubscribe
Unsubscribe
Aylık
 
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
  continue reading
 
Artwork
 
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
  continue reading
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

Unsubscribe
Unsubscribe
Haftalık
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
  continue reading
 
Artwork

1
IT Ops Query

TechTarget Editorial

Unsubscribe
Unsubscribe
Aylık+
 
This podcast distills the signal from the noise about enterprise IT digital transformation and operations in the era of Agile, DevOps and distributed applications. Interviews feature expert guests in conversation with IT journalism veteran Beth Pariseau, Senior News Writer at TechTarget.
  continue reading
 
Artwork
 
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
  continue reading
 
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
  continue reading
 
Emagine the Future is a cybersecurity and technology podcast aimed to offer ambitious technology and national security professionals with actionable insights and unique stories from proven industry leaders. Each week, we release conversations with experts from the intelligence, defense, civilian, and private sectors where we discuss current events, career and skill development, technology and national security, and the future. Obtain the edge you need to stay current, to accelerate your deve ...
  continue reading
 
This is the She Said Privacy / He Said Security podcast with Jodi and Justin Daniels. Like any good marriage, Jodi and Justin will debate, evaluate, and sometimes quarrel about how privacy and security impact business in the 21st century.
  continue reading
 
Artwork

1
Keep It Juicy

Helen Mitternight

Unsubscribe
Unsubscribe
Aylık
 
A lifestyle podcast for over-50s who know how to squeeze every bit of juice out of life. Host Helen Mitternight hosts weekly interviews with experts on relationships, sex, health, finance and lifestyle and people who are doing it right -- "Juicys."
  continue reading
 
Artwork

1
The Precision-Guided Podcast

Georgetown Security Studies Review

Unsubscribe
Unsubscribe
Aylık+
 
The official podcast of the Georgetown Security Studies Review (GSSR), discussing all things national security, history, military, and foreign policy. GSSR is the official flagship publication of Georgetown University's Center for Security Studies, featuring both online commentary and a biannual academic journal. Find out more about GSSR here: https://georgetownsecuritystudiesreview.org/
  continue reading
 
Artwork
 
Den offisielle podkast siden til de gretne gamle gubbene i "BlåSkjerm Brødrene" (BluesScreen Brothers), sett på scener rundt omkring i verden på diverse IT- konferanser. Brødrene er Olav Tvedt (@OlavTwitt), Alexander Solaat Rødland [@AlexSolaat], Pål-Erik Winther (@PeWinther) og Marius Solbakken (@mariussmellum). Dukker også opp forskjellige gjester av varierende kvalitet ;-) Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Next in Tech

S&P Global Market Intelligence

Unsubscribe
Unsubscribe
Haftalık
 
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
  continue reading
 
Loading …
show series
 
Donald Trump's election has created an opportunity for the desperately needed reboot in foreign policies as well as domestic ones in order to take appropriate corrective action. Of course, it is essential to have an accurate understanding of the magnitude of the problems Mr. Trump is now confronting, as well as the options for fixing those problems…
  continue reading
 
Anna Hall is an educator, mother of two, and Co-founder of Embody, a privacy-forward menstrual health and wellness app. In this episode… As awareness grows around health data privacy, misconceptions about protecting menstrual health data remain widespread. That’s because menstrual health data is often commodified and can be shared or sold without e…
  continue reading
 
We’d love to hear from you!! What is Space Security 1. Geopolitical Rivalries and Militarization of Space 2. Space Situational Awareness (SSA) and Monitoring 3. Threat of Anti-Satellite (ASAT) Weapons 4. Cybersecurity and Electronic Warfare in Space 5. Space Traffic Management (STM) and Orbital Debris 6. International Law and Governance Measures to…
  continue reading
 
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
  continue reading
 
What happens when two sets of threat researchers from Talos and Splunk's SURGe team meet? Aside from some highly controversial opinions and omissions about the best horror movie, the team discuss what security trends are FUD, and what's actually fearful/ most challenging at the moment. Also, what is the security industry not aware of enough, and al…
  continue reading
 
In today's episode of Cybersecurity Today, host Jim Love covers stories including, Cisco releases an emergency patch for a vulnerability exploited in brute force attacks, Delta Airlines sues CrowdStrike over a problematic software update leading to flight disruptions, UnitedHealth confirms the massive data breach at Change Healthcare affecting 100 …
  continue reading
 
In this episode, we talk about: Security tools don’t get a free pass when it comes to involving end users as part of the design process. People studying and building ML-based security tools make a lot of assumptions. Instead of wasting time on assumptions, why not learn from security practitioners directly? Businesses (and academia) are investing a…
  continue reading
 
President-elect Trump has begun putting into place his Cabinet and a common denominator is that the emerging national security team shares his longstanding conviction that the Chinese Communist Party is not a competitor. It is a determined and increasingly dangerous enemy. While nominees to some key positions remain to be formally announced, Mr. Tr…
  continue reading
 
Grant Newsham, Senior Research Fellow, Japan Forum for Strategic Studies I spoke with Grant Newsham in a wide-ranging conversation about the challenges we face from the Chinese Communist Party, what specifically Donald Trump is going to have to do to defeat that mortal threat, and whether the people he is pulling in to work with him have a similar …
  continue reading
 
Lena Ghamrawi, Senior Privacy Counsel and Data Protection Officer at Quora, is the founder of The Privacy Coach, where she provides career coaching services to help folks pave their privacy path. In this episode, Ghamrawi joins host Taylor Fox to discuss her background at Quora, what inspired her to start The Privacy Coach, how she helps people bre…
  continue reading
 
Send the hosts a message - try it now! TL;DR: On this spicy episode where returning guest Erik Bloch joins us, we host Lee Kushner to talk about the talent gap. Is there a talent gap? Who's to blame for the mess we're in right now? And of course, what to do next? For anyone who's job hunting, trying to understand the cyber job market, or trying to …
  continue reading
 
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.Cybercrime Magazine tarafından oluşturuldu
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
You may or may not be using multi factor authentication – which sends a unique code to your phone every time you log into company websites, email accounts and cloud services – but if you’re not, you really should be. To understand why, we go to Ohio’s Bazetta township, which lost more than $100,000 to cybercriminals after the township fiscal office…
  continue reading
 
Burton Kelso, The Technology Expert, is the weekly consumer products contributor for the Cybercrime Magazine Podcast. In this episode of Consumer Security, he joins host Sam White to share tips and tricks to help listeners avoid hackers and keep their devices and gadgets safe. For more tech tips from Burton, visit https://burtonkelso.com • For more…
  continue reading
 
Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take control of their digital assets. In this episode, Ron and Wes discuss the importance of asset visibility in cybersecurity, outlining the potential of CAASM (Cy…
  continue reading
 
API Security for Everyone Listen to Agent of Influence with Buchi Reddy, Founder & CEO, of Levo.ai to dive deep into proactive API security measures and how to simplify API inventory. + + + Find more episodes on YouTube or wherever you listen to podcasts, as well as at netspi.com/agentofinfluence.NetSPI's Nabil Hannan / Featuring Buchi Reddy tarafından oluşturuldu
  continue reading
 
Are data-driven decisions overrated? On this special roundtable episode, we challenge the conventional wisdom that more data always leads to better outcomes. Our guests, Kevin McEvilly, Andrew Fox, and Mike Della Porta, discuss the pitfalls of relying solely on analytics and the importance of human insight in crafting successful marketing strategie…
  continue reading
 
Security expert Josh Vanhoose joins the podcast to discuss his journey into cybersecurity, the importance of real-world experience, and how to humanize security, with hosts Chrystal Taylor and Sean Sebring. They explore how to transition into cybersecurity, the significance of entry-level certifications, and the tools available for learning. © 2024…
  continue reading
 
Streamline Your Cybersecurity with Flare Here: https://try.flare.io/unsupervised-learning/ In this conversation, I speak with Jason Haddix, founder of Arcanum Security and CISO at Flare. We talk about: Flare's Unique Approach to Threat Intelligence: How Flare's capability to uncover compromised credentials and cookies from the dark web and private …
  continue reading
 
Today a grateful nation honors the service of its military veterans. While they all deserve our appreciation, I want to pay special tribute to some of our most unsung heroes. The Biden administration forced servicemen and women to submit to what turns out to have been an unapproved, experimental and dangerous COVID-19 gene therapy, not an authorize…
  continue reading
 
Talking Cyber is a Cybercrime Magazine podcast series that covers the latest news and breaking stories on the cybereconomy, hackers, intrusions, privacy, security and much more. In this episode, host Amanda Glassner is joined by Heather Engel, Managing Partner at Strategic Cyber Partners, to discuss how police use of automated license-plate reader …
  continue reading
 
Guests: Ante Gojsalic, Co-Founder & CTO at SplxAI Topics: What are some of the unique challenges in securing GenAI applications compared to traditional apps? What current attack surfaces are most concerning for GenAI apps, and how do you see these evolving in the future? Do you have your very own list of top 5 GenAI threats? Everybody seem to! What…
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
Malvertising is short for malicious advertising, and attacks and compromises systems by spreading advertisements injected with malicious code. Confidence Staveley, Africa’s most celebrated female cybersecurity leader, is the founder of the Cybersafe Foundation, a Non-Governmental Organization on a mission to facilitate pockets of changes that ensur…
  continue reading
 
The Network and Information Security Directive 2 (NIS2) is now in effect, and larger enterprises, affected by the regulation, are working hard on meeting its stringent requirements. But where does that leave smaller organizations in the supply chain?For SMEs, it's not just about meeting compliance mandates. Following NIS2 principles, even if not re…
  continue reading
 
On the last day of Cybersecurity Awareness Month (CAM), Oct. 31, Cybersecurity Ventures released "Hackerpocalypse: The Human Risk", on its Cybercrime Magazine YouTube channel. We'll be promoting the 13-minute video all year round in order to drive as much awareness as possible every month, and not just in October. In this episode, host Paul John Sp…
  continue reading
 
A special thank you to our sponsor Digital Era Group (https://www.digitaleragroup.com/) 🔊 Episode Summary: In this special episode of The Professional CISO Show, host David Malicoat takes you directly into the energy of the North Texas ISSA CSC 12 Annual Conference. This engaging episode highlights discussions with key cybersecurity leaders who are…
  continue reading
 
CyberSecurity Today: Zip File Attacks, iPhone Reboots, and LLM Vulnerabilities In today's episode, host Jim Love discusses hackers leveraging zip file concatenation to evade detection, mysterious iPhone reboots hindering police investigations, and Mozilla's Odin's in-depth analysis of security issues in a large language model. Discover how cybercri…
  continue reading
 
In this episode of the Defensive Security Podcast, we discuss the theft of cloud credentials, the exploitation of SharePoint vulnerabilities, evolving malware techniques, and the importance of cyber due diligence for suppliers. They reflect on the challenges of managing secrets, the implications of auto-updates, and the need for robust risk managem…
  continue reading
 
While there will be plenty of evaluation of how the 2024 US elections played out, we take a look at 13 tips that we can learn from the campaigns that can be used for tech communications. SHOW: 871 SHOW TRANSCRIPT: The Cloudcast #871 Transcript SHOW VIDEO: https://youtube.com/@TheCloudcastNET CLOUD NEWS OF THE WEEK: http://bit.ly/cloudcast-cnotw CHE…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
Jailbreaking AI: Behind the Guardrails with Mozilla's Marco Figueroa In this episode of 'Cyber Security Today,' host Jim Love talks with Marco Figueroa, the Gen AI Bug Bounty Program Manager for Mozilla's ODIN project. They explore the challenges and methods of bypassing guardrails in large language models like ChatGPT. Discussion points include ja…
  continue reading
 
Donald Trump’s victory in the presidential election was decisive, and Pennsylvania is a big reason why. Not only did Trump win the commonwealth himself, he funneled strong Republican turnout to key down-ballot races as well. Why did PA flip red, after voters elected a Democratic governor and U.S. Senator just two years ago? What could a second Trum…
  continue reading
 
According to HackRead, Game Freak, the developer behind the Pokémon franchise, has been hit by a massive data breach, now being referred to as the “Teraleak.” The leak has revealed hundreds of gigabytes of allegedly stolen sensitive internal data, from early Pokémon games to upcoming projects. In this episode, host Paul John Spaulding is joined by …
  continue reading
 
Debra Baker, formerly CISO at RedSeal, is the founder of TrustedCISO. In this episode, she joins host Charlie Osborne to discuss the aftermath of the massive cyberattack suffered by Ticketmaster earlier this year, which includes a class action lawsuit, dimished customer trust, and more. • For more on cybersecurity, visit https://cybersecurityventur…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
The crushing victory by Donald Trump in the 2004 election is, as he himself noted, a miracle. It takes nothing away from the sustained and selfless work of the candidate, his team or his voters to say that this was, first and foremost, a product of the hand of God – and truly an answer to prayer. As a result, our beloved country has been given anot…
  continue reading
 
On this election day, I want to pray for America. Dear God, Thank you for the privilege of being a citizen of this country at a time such as this and for granting us a say in who leads her and the policies that will determine how she fares in a perilous era. Indeed, America faces challenges, both foreign and domestic, so great, my God, that only wi…
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
FBI Warnings, TikTok's Canadian Shutdown, Major Data Breach Arrests & More | Cybersecurity Today In this episode of Cybersecurity Today, host Jim Love highlights the FBI's warning about growing phishing attacks exploiting government email credentials, leading to potential data theft and ransomware attacks. The Canadian government orders TikTok to s…
  continue reading
 
Want a quick download of the latest releases, updates, and tips for Microsoft 365 Copilot? With ongoing updates and new releases, it can be hard to keep up with all the great things you can do in M365 Copilot. Valorem Reply’s Modern Work experts are offering a Microsoft 365 Copilot Newsroom series where we compile the most important news and learni…
  continue reading
 
In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard for no PoC, an LLM that discovers software vulnerabilities, absurd fines, long usernames and Okta, and paying a ransom with dough! Show Notes: https://securityweekly.com…
  continue reading
 
Shawn Loveland is the COO at Resecurity, which has identified a spike in malicious campaigns targeting AI agents and Conversational AI platforms that leverage chatbots to provide automated, human-like interactions for consumers. In this episode, Loveland joins host Heather Engel to discuss this, breaking down the difference between conversational A…
  continue reading
 
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.Cybercrime Magazine tarafından oluşturuldu
  continue reading
 
We chatted with Kayne about education systems security, funding for cyber tools and services, and what the future of education might look like to fill more cyber roles. In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard …
  continue reading
 
Loading …

Hızlı referans rehberi