show episodes
 
Artwork
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
  continue reading
 
Exploring both the practical realities and the exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Sjoukje & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Exp ...
  continue reading
 
Artwork
 
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Click Here

Recorded Future News

Unsubscribe
Unsubscribe
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork

51
Cyber Uncut

Momentum Media

Unsubscribe
Unsubscribe
Monthly+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Artwork
 
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
  continue reading
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Cyber Inspiration

Evgeniy Kharam and Security Architecture

Unsubscribe
Unsubscribe
Monthly+
 
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
  continue reading
 
Artwork

1
Cyber Defense Radio

Cyber Defense Magazine

Unsubscribe
Unsubscribe
Monthly+
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
Artwork
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Artwork

1
Cyber Focus

The McCrary Institute

Unsubscribe
Unsubscribe
Weekly
 
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
  continue reading
 
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
  continue reading
 
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
  continue reading
 
Artwork

1
The cyber weekly

Deogratius Okello and Josephine Olok

Unsubscribe
Unsubscribe
Monthly+
 
Cybersecurity and book review and how cybersecurity needs to be managed how to speak to a board and many more. If this is something in your ballpark. Join the club.
  continue reading
 
Artwork

1
Mr. B The Cyber Tech Educator

Mr. Victor Benvenuto, The Cyber Tech Educator

Unsubscribe
Unsubscribe
Daily
 
CTE (Career Technical Education) Interviews Cybersecurity Tutorials Cyber World News Computer Science & Tech Topics Career Hacks, Education Trends, and More! The preferred podcast show for CTE students, the high school community, magnet students, academic experts, and cyber educators.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

Unsubscribe
Unsubscribe
Weekly+
 
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
Simply Cyber

Gerald Auger, PhD

Unsubscribe
Unsubscribe
Daily
 
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
  continue reading
 
Artwork

1
How Hacks Happen

Many Worlds Productions

Unsubscribe
Unsubscribe
Monthly
 
Hacks, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

Unsubscribe
Unsubscribe
Monthly
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Creating connections and conversations about people, technology and the intersection of health and wellbeing. Recorded through the "cyber synaptic space." Catherine speaks to people who are considered experts in their fields. Important information for parents, teachers, professionals and anyone who wants to learn about cyberspace, digital parenting, security, data protection, counselling, health, wellbeing, personal growth and development. This is your acoustic & neuroplastic ride that will ...
  continue reading
 
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
  continue reading
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
  continue reading
 
The Cyber Social Hub is an online community of digital investigators. Join your host, Kevin DeLong as he discusses with a variety of guests on topics in the field of digital investigations and sometimes terrible ”dad” jokes. We talk to investigators, researchers, and vendors to get you the information you need to find the truth about digital incidents! Join us at https://cybersocialhub.com for FREE and be part of the community. If you want to see the video version of this podcast, watch us o ...
  continue reading
 
Artwork
 
Your Favorite Existentialist-Anarchist Internet BadassCommentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
  continue reading
 
Loading …
show series
 
In this episode we sit down with GenAI and Security Leader Steve Wilson to discuss securing the explosive adoption of GenAI and LLM's. Steve is the leader of the OWASP Top 10 for LLM's and the upcoming book The Developer's Playbook for LLM Security: Building Secure AI Applications - - First off, for those not familiar with your background, can you …
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
  continue reading
 
Your organization runs on commercial software far more than it does open source. But all you are delivered is binaries. What is your technical control to ensure that you are safe from this software? Such software is composed of: Open source libraries Proprietary code 3rd-party proprietary libraries You need to be able to see it, understand it, prob…
  continue reading
 
Text us feedback! Let's talk about cyber risk classification in this episode of The Cyber Threat Perspective. Brad and Tyler provide a high-level overview of various types of cyber risk encountered in penetration testing. -Reputational Risk -Financial Risk -Operational Risk -Direct Risk -Indirect Risk -Lateral Risk -Strategic Risk -Compliance Risk …
  continue reading
 
In this episode of Cyber Focus, Frank Cilluffo chats with Charles DeBeck, a cyber threat intelligence expert from Google Cloud, about the latest insights from their Threat Horizons report. They explore how cyber threats are evolving, particularly in cloud environments, with a focus on issues like weak passwords and system misconfigurations that lea…
  continue reading
 
Texas credit union user data exposed in another MOVEit breach US Marshals Service disputes ransomware gang's breach claims Park’N Fly notifies 1 million customers of data breach Thanks to today's episode sponsor, Scrut Automation Scrut Automation allows compliance and risk teams of any size to establish enterprise-grade security programs. Their bes…
  continue reading
 
In this episode, Roland Clouthier, former CSO of TikTok and cybersecurity expert, explores the role of AI in cybersecurity, the evolving landscape of cloud security, and the critical importance of identity management. Roland shares insights on how to effectively allocate security budgets, the importance of understanding risk tolerance, and the need…
  continue reading
 
Why is Python so Popular to Infect Windows Hosts https://isc.sans.edu/diary/Why%20Is%20Python%20so%20Popular%20to%20Infect%20Windows%20Hosts%3F/31208 OFBiz Vulnerability Update https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://nvd.nist.gov/vuln/detail/CVE-2024-38856 Versa Directory Vulnerability Exploited https://versa-networks.c…
  continue reading
 
Bryan Seely joins us is a refreshing and hilariously entertaining episode. Bryan is a world-famous cyber security expert, ethical hacker and former U.S. Marine. He is known for his book (Web of Lies) and for intercepting calls to the U.S. Secret Service & FBI, as well as finding major exploits at LinkedIn and several government 3-Letter agencies. C…
  continue reading
 
Hacktivists respond to the arrest of Telegram’s CEO in France. Stealthy Linux malware stayed undetected for two years. Versa Networks patches a zero-day vulnerability. Google has patched its tenth zero-day vulnerability of 2024. Researchers at Arkose labs document Greasy Opal. A flaw in Microsoft 365 Copilot allowed attackers to exfiltrate sensitiv…
  continue reading
 
Welcome to the inaugural episode of the Contested Ground podcast, where hosts Major General (Ret’d) Marcus Thompson, Phil Tarrant and Liam Garman unpack how nations vie for influence below the threshold of armed conflict. In this episode, the hosts unpack how foreign actors sought to stoke tensions during the recent English riots and how social med…
  continue reading
 
In this episode, Jerry Bell and Andrew Kalat discuss various topics in the cybersecurity landscape, including the influence of cyber insurance on risk reduction for companies and how insurers offer guidance to lower risks. They touch upon the potential challenges with cybersecurity maturity in organizations and the consultant effect. The episode al…
  continue reading
 
Today on Cyber Work Hacks, my guest is Infosec Skills author and teacher Cicero Chimbanda. Chimbanda's Skills path concerns building the soft skills needed to succeed as a Cybersecurity Manager. For today’s Hack, Chimbanda tells us his best tip for Security Managers to keep their security teams fulfilled and connected. As we speak, many companies a…
  continue reading
 
Hey friends! 👋 Welcome to the Cyber Balance Podcast, hosted by Terrick Taylor. Our first guest this week is none other than Christopher Watkins, a seasoned cloud security engineer at WP Engine. Ever wondered how someone gets into cybersecurity? Chris shares his fascinating journey, from an unexpected start in the Army to becoming a key player in cl…
  continue reading
 
In this episode Dr. Jeff discusses the increasing demand for network engineers to learn security. What network security knowledge is required Impact of Zero Trust on network design How to develop the knowledge and skills required for a network engineer Will network engineer and network security engineer become one and the same Cyber Job Hacks is th…
  continue reading
 
In this episode, Phil Jackman from CyberNorth talks with Callum Duncan, Managing Director of Sencode, provider of Penetration Testing And Cyber Security Services, based in Middlesbrough. Duncan's interests cover, among many other things, gaming developments around Open Source Large Language models and the use of "Agents". What are they, how is this…
  continue reading
 
In this episode… In this episode of The Cyber Business Podcast, host Matthew Connor sits down with Todd Holzman, a renowned leadership coach and CEO of Holzman Leadership, who has spent over three decades helping top executives and organizations improve their communication and leadership skills. Todd shares his unique journey from being a leadershi…
  continue reading
 
This is the eleventh episode of the C.S. Cyber video podcast series. In this episode we talk about browser security with a special guest. ✅ Become a supporter of the show! https://www.buzzsprout.com/2373619/su... ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/alerts/ t…
  continue reading
 
In this episode, we sit down with Secret Service Agent William Mack to discuss a series of high-profile cryptocurrency money laundering investigations; From transnational money laundering operations to domestic wire fraud, we discuss the investigation and the cyber criminal organizations behind the scams.…
  continue reading
 
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Tim Eades Cofounder and CEO of Anetac who shares cybersecurity insights on identity vulnerabilities for service accounts which are privileged, non-human accounts that are commonly used for automated tasks or for allowing applications to interact with other…
  continue reading
 
In this episode, I dive into the critical importance of Cyber Threat Intelligence (CTI) and how it helps organisations stay ahead of attackers. Learn about the practice of gathering, analyzing, and applying information to understand potential or existing threats. I break down the three levels of CTI: strategic, tactical, and operational intelligenc…
  continue reading
 
In this week's episode we bring on Maurice the ISACA Kampala Chapter President, who shares the benefits of the chapter. Show notes ISACA Kampala Chapter conference registration https://eainfosec.org/ ISACA Website https://www.isaca.org/ Which ISACA Certificate is right for you? https://www.isaca.org/resources/infographics/which-isaca-certification-…
  continue reading
 
U.S. water systems deliver safe and affordable drinking water to millions of people, while also supporting agriculture, industry, and power generation. However, this critical infrastructure faces significant challenges from aging facilities, increasing demand, and emerging cyberthreats. Our report outlines the key threats to water infrastructure, t…
  continue reading
 
Welcome to C.E.L. podcast episode 14. Get into the thrilling world of JROTC with Major Ashley Coleman and SSG (R) Stephen Grant, our JROTC maestros, in this electrifying episode of The C.E.L. Podcast! Mr. B sits down with these seasoned instructors to uncover their military journeys, the inspiration behind becoming JROTC leaders, and the unique way…
  continue reading
 
In this interview, we sat down with Greg Smith (Head of Global Product and Solution Marketing, Certinia) to get his insights into the stages of data maturity within the AI adoption journey. Greg advices that a key distinction in the nature of data handling between generative and predictive AI. Unlike predictive AI, which primarily analyzes existing…
  continue reading
 
In this episode, Derik Belair, Co-Founder and CEO of Augmentt Technology, takes us through the fascinating journey of building a platform designed to help MSPs manage and secure Microsoft environments. Derik shares how the idea for Augmentt Technology was born during a sailing trip, spurred by a market shift toward cloud and SaaS solutions. He walk…
  continue reading
 
מפעלים משתנים ומכניסים דיגיטציה למערכות הייצור על מנת להישאר רלוונטיים מול עלויות העבודה הזולה במזרח ולהגדיל את שורת הרווח באותם אמצעי ייצור. מה המשמעויות ואיך זה משפיע רוחבית כולל ובמיוחד בתחום הסייבר. נחשון פינקו מארח את אריאל לסרי מנכ"ל רוקוול ישראל בשיחה על עבר, הווה ועתיד התעשייה ואיך רוקוול נכנסה לעולם הסייבר. לאן הולכת התעשייה המשמעויות של כ…
  continue reading
 
In this episode, Erin McLean chats with Mark Benaquista, a seasoned cybersecurity leader and Managing Director at Thomas H. Lee Partners. Mark shares his career journey from starting as an associate at JPMorgan to leading cybersecurity portfolios across various industries. He offers valuable insights into the importance of aligning technology with …
  continue reading
 
In today's episode I sit down with my good friend and esteemed colleague Kathleen Sinclair who has written the book F*ck aging.She is an incredibly wise colleague and she's talking all things tech, aging, kicking the second half of your life with gusto, and what you can help yourself with.Kathleen is almost 80 and is not 'growing old gracefully' as…
  continue reading
 
Ever wondered how scams really work? In this episode, we are joined by scam expert Shameela Gonzalez as we dive into the shady world of scammers. From pulling on heart strings to encouraging the purchase of questionable Taylor Swift tickets, nothing is off limits for these criminals. Let this episode be your guide on how to spot a scam and stay one…
  continue reading
 
Anthropology and cyber security might not be the first two words you would connect in an association game. But maybe they should. We've invited Laura Lynggard Nielsen who works at Alexandra Instituttet as a Senior Security Anthropologist. She uses methods from anthropology to uncover how organizations can create stronger cyber security. You can lea…
  continue reading
 
Welcome back to New Cyber Frontier! Today we speak with guest Dejan Milojicic, Hewlett Packard Enterprises Senior Scientist and Chair of IEEE Future Directions Industry Advisory Board. IEEE has recently announced the release of an epic work effort spanning several years, supported by experts from many industries and backgrounds. The resultant IEEE …
  continue reading
 
Send us a Text Message. This month's guest on the Cyber Insider webinar series is Geoff White. From billion-dollar cyber heists to global financial crime rings and crypto-gangsters – Geoff White has covered it all. His next book, Rinsed, will reveal technology’s impact on the world of money laundering. It springs from his work on the hit podcast an…
  continue reading
 
Loading …

Quick Reference Guide