show episodes
 
Artwork

1
Darknet Diaries

Jack Rhysider

Unsubscribe
Unsubscribe
חודשי
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
  continue reading
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Artwork
 
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

Unsubscribe
Unsubscribe
חודשי+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Artwork

1
C.S. Cyber

Shawn Waldman

Unsubscribe
Unsubscribe
שבועי
 
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
  continue reading
 
Artwork

1
Cyber Inspiration

Evgeniy Kharam and Security Architecture

Unsubscribe
Unsubscribe
חודשי+
 
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Unsubscribe
Unsubscribe
שבועי+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Artwork
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Click Here

Recorded Future News

Unsubscribe
Unsubscribe
שבועי+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork

1
How Hacks Happen

Many Worlds Productions

Unsubscribe
Unsubscribe
חודשי
 
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
  continue reading
 
Artwork

1
Cyber Defense Radio

Cyber Defense Magazine

Unsubscribe
Unsubscribe
חודשי+
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

Unsubscribe
Unsubscribe
חודשי
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Artwork
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork

1
Cyber Adjustment

Cyber Adjustment

Unsubscribe
Unsubscribe
יומי+
 
Cyber Adjustment is a podcast dedicated to addressing the most pressing topics in the chiropractic industry today. Produced by digital marketing expert Amin Said, each episode dives into the latest trends, challenges, and innovations affecting chiropractors, with actionable strategies to enhance your online presence and grow your practice. Whether you're navigating patient acquisition, digital marketing, or industry developments, Cyber Adjustment provides expert insights to help your practic ...
  continue reading
 
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. brad@securit360.com
  continue reading
 
Artwork

1
Cyber Focus

The McCrary Institute

Unsubscribe
Unsubscribe
שבועי
 
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
  continue reading
 
Artwork

1
The cyber weekly

Deogratius Okello and Josephine Olok

Unsubscribe
Unsubscribe
חודשי+
 
Cybersecurity and book review and how cybersecurity needs to be managed how to speak to a board and many more. If this is something in your ballpark. Join the club.
  continue reading
 
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
  continue reading
 
Artwork

1
Cyber Coffee Hour

Dr. Joseph J. Burt-Miller Jr. and Alfredzo Nash

Unsubscribe
Unsubscribe
חודשי+
 
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

Unsubscribe
Unsubscribe
חודשי
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy-to-understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
  continue reading
 
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

Unsubscribe
Unsubscribe
שבועי+
 
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
The Cyber Tap

Purdue cyberTAP

Unsubscribe
Unsubscribe
חודשי
 
Join George and Jim from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
  continue reading
 
Loading …
show series
 
Pokémon game developer breached TrickMo hits with 40 new trojan variants Nation-state actor exploits Ivanti zero-days Thanks to today’s episode sponsor, Conveyor It’s spooky season, and nothing’s scarier than all of your account execs asking if you’re done with their customer security questionnaires. Don’t worry—Conveyor is here to help. Conveyor’s…
  continue reading
 
Phishing Page Delivered Through a Blob URL https://isc.sans.edu/diary/Phishing%20Page%20Delivered%20Through%20a%20%20Blob%20URL/31350 Fortinet Fortigate CVE 2024-23113 deep dive https://labs.watchtowr.com/fortinet-fortigate-cve-2024-23113-a-super-complex-vulnerability-in-a-super-secure-appliance-in-2024/ This New Supply Chain Attack Technique Can T…
  continue reading
 
We delve into the world of cybercrime with special guest Darren Mott, a former FBI agent who transitioned from teaching to law enforcement. He shares his journey into the FBI, the evolution of cyber investigations, and the challenges faced in tackling digital piracy. Mott discusses the creation of Operation Sudden Urge, an undercover operation aime…
  continue reading
 
In this episode of Cyber Coffee Hour, we chat with Tori, an emerging cybersecurity professional, on an exciting journey! With a Master's in Forensic Studies and a Bachelor's in Psychology from Stevenson University, Tori is diving into the tech world by earning her CompTIA A+, Network+, and Security+ certifications. Her investigative skills and atte…
  continue reading
 
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=audio&utm_campaign=podcast Paige Hanson from SecureLabs discusses identity theft management and her extensive experience as a security communicator. With nearly 20 years in consumer and digital safet…
  continue reading
 
Send us a text Unlock the secrets of cybersecurity in our latest episode where we promise to transform your understanding of access control mechanisms. We kick things off by dissecting the discretionary access controls (DAC) and the power dynamics behind resource ownership. Discover why assigning ownership is crucial to sidestep security pitfalls a…
  continue reading
 
Reading books and watching videos is not enough to grow your cyber career. You need access to a lab where you can practice what you learned. In this episode, Jeff shares how he built a home lab using a mini-PC and free software. If you are looking to build a lab and don’t want to spend a lot of money, you will want to listen to this episode. Cyber …
  continue reading
 
Windows PPTP and L2TP Deprecation https://techcommunity.microsoft.com/t5/windows-server-news-and-best/pptp-and-l2tp-deprecation-a-new-era-of-secure-connectivity/ba-p/4263956 BIG-IP LTM Systems Unencrypted Cookie Exploitation https://www.cisa.gov/news-events/alerts/2024/10/10/best-practices-configure-big-ip-ltm-systems-encrypt-http-persistence-cooki…
  continue reading
 
In this episode we walk you through a timeline of how a criminal gets from point A to point B when they are pulling off a successful credential stuffing attack. And spoiler alert, it all starts on a darknet marketplace. Walk away feeling confident on how to protect yourself from a credential stuffing attack. We also sneak in a Fraud File segment wh…
  continue reading
 
Episode 282: Exploiting Trust in Cybersecurity Practices In episode 282 of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kallett discuss several cybersecurity topics. They highlight a phishing attack outlined by Microsoft, where cybercriminals leverage file-hosting services like OneDrive and Dropbox to exploit trust and compromise ide…
  continue reading
 
In this Episode: In this episode, Alex Campbell shares his journey from Zimbabwe to Canada, with stops along the way in Europe, where he gained experience in a wide array of industries, eventually leading to his current role at Healthy Planet. Alex talks about the evolution of Healthy Planet from a small family-run health store to a well-known Cana…
  continue reading
 
Darnley discusses the recent cyberattack that targeted one of the internet's most important digital archives. We'll explore how hackers infiltrated the Wayback Machine, compromising the personal data of millions and threatening the integrity of historical records stored online. Could this hack rewrite internet history? Click here to send future epi…
  continue reading
 
Show notes Online training with INE https://ine.com/ Online training with Hack the Box https://www.hackthebox.com/ Book recommendation Scaling People Tactics Management https://www.amazon.com/Scaling-People-Tactics-Management-Building/dp/1953953212 Hooked how to build Habit forming Products https://www.amazon.com/Hooked-How-Build-Habit-Forming-Prod…
  continue reading
 
In this episode of the Cyber Uncut podcast, hosts David Hollingworth and Daniel Croft detail multiple Australian hacks, theft of frequent flyer points, LockBit striking back, and the launch of the Australian Cyber Network. Croft gets things started with a rundown of Australia’s first standalone cyber security legislation before outlining a recent i…
  continue reading
 
George and Jim are joined by Dr. Joe Beckman to discuss the recent National Public Data breach and the reach of its impact. ------------------------- Follow us on all the things: Twitter: @PCyberTAP LinkedIn: Purdue cyberTAP Email the Cyber Tap with suggestions (or be a guest) cybertappodcast@purdue.edu To learn more about Purdue cyberTAP's educati…
  continue reading
 
In this episode of Cyber Inspiration Podcast, Jaap Mantel from Data & More shares invaluable insights on data compliance, classification, and governance. He walks us through the company's founding, its unique Microsoft-influenced approach, and their expansion into North America. Jaap emphasizes the importance of strong company culture, maintaining …
  continue reading
 
Stuxnet: The Cyber Weapon That Changed Warfare Forever Journey deep into the Natanz nuclear facility in Iran, a fortress of concrete and steel, where the world's first known cyber weapon, Stuxnet, unleashed unprecedented physical destruction without a single bomb. Discover how this sophisticated malware evaded top-notch defenses, wreaked havoc on c…
  continue reading
 
Welcome To C.S. Cyber, Thanks For Clicking And Enjoy The Episode! ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/alerts/ to subscribe. ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on T…
  continue reading
 
Send us a text This podcast is for chiropractors who are passionate about providing exceptional care and building successful businesses. In today's competitive landscape, it's essential to embrace both the art and science of chiropractic. We'll explore how to combine traditional principles of holistic care with modern tools and technologies to crea…
  continue reading
 
In this replay episode, Spencer is joined by Daniel Perkins, a Senior Information Security Officer at SecurIT360 to discuss the intricacies of vulnerability management, the important prerequisites to vulnerability management, and best practices, and provide actionable strategies to level up your vulnerability management program. Blog: https://offse…
  continue reading
 
Jason Shockey, CISO of Cenlar FSB, and 25 year veteran of cybersecurity, has a formula for running an excellent cybersecurity program. He studied a great deal in his various cybersecurity roles before leaping into a CISO role, and the studying paid off! Jason and Allan and Drew discuss the following: Identifying Common Pitfalls Promoting Team Well-…
  continue reading
 
In this episode of Cyber Focus, host Frank Cilluffo talks with Bob Kolasky, Senior Vice President at Exeter and former head of the National Risk Management Center at CISA. The conversation covers key topics related to supply chain risk, security, and national defense. Bob provides insights into the evolving threats within supply chains, especially …
  continue reading
 
- First off, for folks not familiar with your background, can you tell us a bit about that and how you got to the role you're in now? - We see rapid adoption of AI and security inevitably trying to keep up, where should folks start? - There are some really interesting intersections when it comes to AI and supply chain, what are some of them? - We s…
  continue reading
 
Meeting your operational and legal obligations - getting your foundations in order Cyber-proofing your organisation with comprehensive cyber-security training and awareness Developing cyber-hygiene to defend against cyber-criminals using emerging technology This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Paul Holla…
  continue reading
 
Welcome, witches, wizards, and cybersecurity sleuths! You’ve entered, Only Malware in the Building. Join us each month to brew potions of knowledge and crack the curses of today’s most intriguing cyber mysteries. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building …
  continue reading
 
Send us a text Thoughts about the emergence of The Cyber Age. What do I think are the 5 major technologies and their applications which are forming The Cyber Age and are continuing to form it. I also discuss my thoughts about cyber-forming, cyber risks, and the cyber attack space. My LinkedIn home page is: https://www.linkedin.com/in/barryrabkin/ -…
  continue reading
 
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Carsten Willems CEO of VMRay (@vmray) (https://www.vmray.com/), a Germany-based cyber security company that offers industry-leading technologies for advanced threat analysis, detection and protection. Gain new insights into cybersecurity from our always fr…
  continue reading
 
We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational technology (OT). Comprehensive Supply Chain Security - Crosley detailed the various stages in the supply chain—design, development, and fabrication—where both deliberate and accidental abuses can occur. Each stage presents…
  continue reading
 
Salt Typhoon infiltrates US ISPs. Researchers hack the connected features in Kia vehicles.WiFi portals in UK train stations suffer Islamophobic graffiti. International partners release a joint guide for protecting Active Directory. A key house committee approves an AI vulnerability reporting bill. India’s largest health insurer sues Telegram over l…
  continue reading
 
השימוש בספריות קוד פתוח הפך לפרקטיקה מקובלת בכול פיתוח תוכנה, קיצור משך הפיתוח הוא משמעותי אבל טומן בחובו סיכונים עיסקיים וסיכוני סייבר משמעותים ללקוחות. המעבר של העולם התפעולי לבקרים מבוססי מערכת הפעלה סטנדרטית ותאומים דיגיטלים מוזיל עלויות ובאותה נשימה חושף את הסביבה התפעולית לסיכוני סייבר מוכרים מסביבות המחשוב הסטנדרטיות. נחשון פינקו מארח את צבי…
  continue reading
 
Discover how cutting-edge reinsurance strategies and public-private collaboration can address the biggest risks in cyber insurance In this episode, Oliver Brew, Cyber Practice Leader at Lockton Re, brings 25 years of experience to discuss the evolving cyber insurance landscape. He explores how advancements in technology are shaping the industry, fr…
  continue reading
 
In this episode, Thea from CyberNorth meets with Nicola Taylor from ScotlandIS to talk about its work on nurturing future talent in cyber security and, in particular its focus on the Experience Gap. Find out more about ScotlandIS October is CyberFest - book your tickets now!
  continue reading
 
Loading …

מדריך עזר מהיר