Cybersecurity halka açık
[search 0]
Daha fazla

Download the App!

show episodes
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
The Secure Talk Cybersecurity podcast reviews the latest threats, tips, and trends related to cybersecurity, cryptocurrencies, and compliance. Host Mark Shriner interviews leading cybersecurity and cryptocurrency executives to discuss best practices related to IT security, data protection, cryptocurrency investment and usage.
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
 
A podcast about cybersecurity and the people that keep the internet safe.The podcast is built as a series of segments: we will be looking back at the last couple of weeks in cybersecurity news, talking to different people in the industry about their thoughts and experiences, we're going to break apart some of the TTPs being used by adversaries, and we will even cover a little bit of hacker history.
 
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono imprese, dalle grandi multinazionali alle piccole piccole aziende locali, enti e organizzazioni di ogni ordine e grado, e privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell'attacco, entità della struttura attaccata o danni provocati. Sophos te ne racconta 5 nella stagione 2020 della serie podcast "Sotto Attacco | i grandi crimini ...
 
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Alias Secure AF Cybersecurity Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cybersecurity topics with coworkers and special guests. No matter where you are on the cybersecurity knowledge ladder, there's an episode here for you.
 
Cybersecurity affects us all whether we are at home, managing a company, supporting clients, or even running a state or local government. Join the Center for Internet Security’s Sean Atkinson and Tony Sager as they discuss trends and threats, ways to implement controls and infrastructure, explore best practices, and interview experts in the industry. If you are interested in learning more about how to grow your cybersecurity program, CIS and its volunteer community are here to bring clarity ...
 
“It’s 5:05!'' is a daily audio news cast highlighting security and open source stories from around the world. We filter for the real cybersecurity and open source stories in the news, so you won't have to. Each day, a global team of journalists contribute stories they found interesting in their daily research from the previous 24 hours. We present them to you in an easy to listen to format, making the resources available at the end of each episode so you can do a deep dive on stories you fin ...
 
Security and cybersecurity are critical concerns for any modern business, and startups are no exception. In order to compete in the digital age, startups need to be aware of the latest security threats and have a plan to protect their data and systems. The Startuprad.io security and cybersecurity track is designed to help companies stay ahead of the curve. We interview entrepreneurs who are active in the space and bring you the latest news from the world of cyber security. Our goal is to hel ...
 
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
 
Cyber risk is a complex topic and part of a larger picture in your organization. Cyber risk is a strategic necessity for any organization to increase cyber resilience. In this podcast, we will have an open conversation on governance, risk, and compliance to move your organization from as-is to the next level. Here we will have discussions on program assessments, control assessments, risk identification, risk register, mitigation plans, and much more.
 
Today, software is the power that moves society. To stay in control over their intellectual property and remain competitive on the market software publishers and intelligent device manufacturers need to integrate top-notch protections against counterfeiting, reverse engineering, and tampering and implement an orchestration of license models that fully respond to the customer’s needs on a global scale. CodeMeter by Wibu-Systems is a comprehensive and award-winning suite of hardware-, software ...
 
C
Cybersecurity Stories

1
Cybersecurity Stories

Mark van Horik, ProteQtor IT Security

Unsubscribe
Unsubscribe
Aylık
 
Cybersecurity Stories is een reeks verhalen over de vele online risico’s die ons werk en privéleven bedreigen en hoe we ons daar tegen kunnen beschermen. In deze podcast hoort u de verhalen van Nederlandse en buitenlandse gasten die u meenemen in hun wereld en hun strijd tegen cybercriminelen. Waardoor u beter inzicht krijgt hoe oplichters, ransomware-aanvallers en andere kwaadwillenden te werk gaan. Daarnaast krijgt u uiteenlopende tips en adviezen om u beter tegen al die online gevaren te ...
 
Pour a glass and sit down with one of cybersecurity's most battle-worn CISOs Andy Bennett as he and his guests break down the complex problems, concepts, and technologies facing cybersecurity professionals today while exploring the complex flavors of our favorite distilled spirits. It's a free-flowing long-form conversation. Grab a seat and listen to security professionals break down cyber threats and actionable ways to be more resilient and prepared in the face of the world's biggest issues ...
 
When it comes to cybersecurity, reacting to a threat isn’t always enough; you have to get ahead and stay ahead of the escalating risks. Join Sid Yenamandra, co-founder & CEO of Entreda, the leading provider of comprehensive cybersecurity software tools for wealth managers and other regulated industries, as he interviews business professionals about what’s keeping them up at night, and how they’re successfully mitigating the looming vulnerabilities that may exist within their firms.
 
Wibu-Systems hat es sich zur Aufgabe gemacht, vielseitige und sichere Technologien zu entwickeln, die Herstellern von Software und intelligenten Geräten die Möglichkeit liefert ihre Produkte vor Piraterie, Reverse Engineering, Manipulation, Sabotage und Spionage zu schützen. Mit CodeMeter, einer umfassenden und preisgekrönte Suite von hardware- und softwarebasierten Lösungen, ist dies möglich.
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
 
It’s really a conversation about what they did before, why did they pivot in cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way. About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share the ...
 
VerSprite is a leader in risk-based cybersecurity services and PASTA threat modeling, enabling businesses to improve the protection of critical assets, ensure compliance, and manage risk. Our mission is to help you understand and improve your organization’s cybersecurity posture. With cyberattacks increasing in number and sophistication daily, it is essential to protect your organization’s assets, protect your clients, and maintain the same, excellent reputation and trust you have worked har ...
 
Hello everyone! We created this channel to promote a better world by improving digital security and privacy. This is done by better education and information that anyone can use on a daily basis providing simple guidance. I welcome feedback, so if you have an idea please let me know by posting it inside the videos or by an email to: Podcast@thecybersecurityinsider.com I’m your host - Yigal Behar
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://anchor.fm/amplifiedandintensified/support
 
CSIS looks at how rapidly changing technology and cybersecurity are affecting the world in the twenty-first century. Issues covered include intelligence, surveillance, encryption, privacy, military technology, space, and more. Programs leading the research on this topic include the Strategic Technologies Program and the International Security Program. Find the latest research from our scholars and CSIS events on this topic below.
 
T
The Cybersecurity Podcast

1
The Cybersecurity Podcast

New America and The Christian Science Monitor

Unsubscribe
Unsubscribe
Aylık
 
Cybersecurity is not just computers and digital processes. Whether it's the threat or the response, the most important, and most interesting, part of the story is the people behind the keyboard. That’s why we’re launching The Cybersecurity Podcast, a monthly program featuring key leaders and thinkers in this space. Our half-hour podcast will go beyond the headlines to discuss some of the most pressing issues and newest ideas in cybersecurity.
 
Loading …
show series
 
Hey! It’s 5:05, Wednesday, February 1, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from Derek Weeks in Bethesda, Maryland, Olimpiu Pop in Transylvania, Romania, Ian Garret in Arlington, Virginia, Katy Craig in San Diego, California and Edwin Kwan in Sydney, Australia. Let’…
 
This episode was recorded on 2/1/2023 Welcome to the Take Five Podcast from Fortinet where we provide five cybersecurity tips and best practices for today’s technology leaders. This podcast series taps into the experience of our Fortinet field CISO team and the work being done with and through our ecosystem of partners, customers, and industry expe…
 
Steve Orrin, Federal Chief Technology Office & Senior Principal Engineer for Intel talks about how he works with various government agencies to develop and deliver cybersecurity solutions. He explains the differences between working with enterprise customers compared to working with government agencies. He also explains how the federal government i…
 
Planning to go through your very first SOC 2 audit? If so, this series will be a binge worthy and enlightening adventure! This week, the guys walk you through the first few SOC 2 audit requirements with a step-by-step approach. They share what your auditor will be looking for, tips to prepare, and the pitfalls that might catch you off guard. Pick u…
 
Il 24 settembre 2022, a Brooklyn, è un sabato sereno: 20 gradi, poche nuvole e un sacco di gente che si riposa dalle fatiche della settimana. I parchi sono pieni di famiglie, giovani coppie, di ragazzi che si lanciano un pallone da football, di persone che si rilassano leggendo, ascoltando canzoni e podcast, mangiando qualcosa sull’erba. Sulla Heig…
 
This week, we welcome back Dustin Moody, a mathematician in the NIST Computer Security Division who teaches us about the risks posed by quantum computers and shares updates on the status of NIST’s post-quantum cryptography standardization project. As quantum computers move from sci-fi to reality, Dustin elaborates on the functionality of quantum co…
 
Title: Cybersecurity Growth #3 - So You Wanna Be A CISO Opening When You Arrived instrumental as theme song Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. I’m your host Shawn Valle, Exec Director and CISO of Cybersecurity Growth Former Chief Security Officer of Rapid7 and former CISO of Tricentis Musician h…
 
In this episode, host Bidemi Ologunde discussed several topics surrounding online dating with Nermin Amin, a return guest on the podcast (Episode 122). Some of the topics include: the good, bad, and ugly sides of online dating, featuring some of her own very interesting experiences; social anxiety and the difficulty of striking up conversations wit…
 
Over three decades, Lucian has served in the White House, the Pentagon, and in Congress providing budget, policy, and management leadership for U.S. national security programs. He served as an Assistant Secretary of Defense managing the world’s largest real property portfolio valued at a trillion dollars. Lucian was responsible for identifying and …
 
Antivirus has become a necessary tool for preventing cyber incidents; while the market is crowded, you need to look for antivirus software that fits your organization’s needs. NIST has guidance that you can leverage; NIST 800-83 recommends key capabilities that an antivirus software must have: Scanning startup files and boot records Real-time scann…
 
In this episode of the Cybersecurity Defenders podcast, we recount some hacker history and tell the story of Amit Serper, a hacker and reverse engineer, who was instrumental in stopping the most devastating cyber attack in history: NotPetya. On 27 June 2017, a major global cyberattack began (Ukrainian companies were among the first to state they we…
 
Happy 2023, as well as a happy Chinese New Year of the Rabbit. 2023 Chris and Joe will again bring you startup news once a month (with a small summer break) wrapping up what was going on — and we found noteworthy — in the GSA / DACH startups scene. Our Highlights: WeFox is under fire for growing with acquisitions of insurance broker pools, BioNTech…
 
The NOTAM outage was reportedly caused by a corrupted file. The World Economic forum sees geopolitical instability as a source of cyber risk. The Copper Mountain Mining Corporation is working to recover its IT systems following a ransomware attack. DNV's fleet management software sustains a ransomware attack. Ukrainian hacktivists conducted DDoS at…
 
https://www.yourcyberpath.com/88/ In this episode we arrive at the end of our five-part series talking about the CIA NA Pentagram, this time discussing the last pillar, Authentication. Authentication is always associated with passwords and how you can prove that you are who you say you are. When you hear Authentication, always have things like toke…
 
Stay up to date with the latest in PCI compliance. In this episode, William Parks, Andy Kerr, and Kyle Hinterberg discuss the latest in PCI news and how to master Requirement 1 while preparing for PCI 4.0. For any questions, feel free to reach out to us here: Kyle Hinterberg: kyle.hinterberg@lbmc.com Andy Kerr: andy.kerr@lbmc.com William Parks: wil…
 
Marcellus Buchheit, Wibu-Systems USA’s president and CEO, is interviewed by Scott Mackenzie, host of the popular IndustrialTalk podcast series, at the Q4 2022 Industry IoT Consortium (IIC) meeting held in Austin, TX. Marcellus is the co-chair of the IIC’s Trustworthiness Working Group, dedicated to exploring the five aspects of trustworthiness – sa…
 
In episode 47 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Sawyer Miller, Senior Manager of Cyber Risk at risk3sixty LLC. Together, they discuss security and compliance. Their discussion explores various ways that security and compliance can align even though they are different business considerations. (Spoiler alert: risk and…
 
APIs are critical for modern mobile, SaaS, and Web applications. They are used in every industry, from banks, retail, medical, and transportation to IoT, autonomous vehicles, and intelligent cities. It is an interface that allows a product or service to talk to other products or services. This makes API security very important for any organization …
 
Loading …

Hızlı referans rehberi