Cybersecurity ציבורי
[search 0]
עוד
Download the App!
show episodes
 
Artwork

1
Cybervize Cybersecurity

Alexander Busse | Cybervize

Unsubscribe
Unsubscribe
חודשי
 
Cybersicherheit kann man auch hören, in unserem Podcast. Abonnieren sie uns und hören sie, was Experten aus der Branche zu sagen haben, ohne dass sie selbst ein Experte sein müssen, um es zu verstehen.
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: info@4s-ag.de https://www.4s-ag.de
  continue reading
 
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
Artwork
 
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
  continue reading
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
  continue reading
 
1234, come la password che non dovreste mai scegliere. Come la password che la maggior parte degli utenti sceglie. Dalle truffe online agli intrighi internazionali, in ogni puntata approfondiamo la storia di cybersecurity del momento. A cura di Alberto Giuffrè
  continue reading
 
Welcome to "Cybersecurity for Your Mom," the podcast where Joey breaks down the complex world of cybersecurity for everyone to understand. Join host Joey Wagner as he takes you on a journey through the ever-evolving landscape of cyber security. In each installment, Joey will demystify the intricacies of cybersecurity, offering insights into current events, in-depth discussions on cutting-edge cybersecurity topics, and the latest trends in the technology industry.
  continue reading
 
In this EM360 podcast, we investigate the cutting edge Cybersecurity issues that organisations are facing today. These discussions are led by the organisations at the forefront of defence as they walk us through the issues people are facing and how to effectively implement prevention strategies.
  continue reading
 
Artwork

1
Cybersecurity Where You Are

Center for Internet Security

Unsubscribe
Unsubscribe
חודשי+
 
Welcome to “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all whether we are surfing the web at home, managing a company, supporting clients, or running a state or local government. Join Sean Atkinson and Tony Sager of CIS every other Wednesday as they discuss trends and threats, identify ways to implement controls and infrastructure, explore best practices, and interview experts in the industry. Together, we’ll clarify these ...
  continue reading
 
Artwork

1
Fortinet Cybersecurity Podcast

Fortinet Cybersecurity Podcast

Unsubscribe
Unsubscribe
חודשי+
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
  continue reading
 
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cybersecurity, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber security, co ...
  continue reading
 
Safeguarding your startup against cyber threats is non-negotiable in today's digital landscape. That's why our Startuprad.io presents the Security and Cybersecurity track, a dedicated space where deep tech meets entrepreneurship, empowering startups with vital insights into cybersecurity. In this podcast, we go beyond the headlines, providing comprehensive training and up-to-the-minute cybersecurity news tailored for entrepreneurs. Our interviews feature industry-leading entrepreneurs active ...
  continue reading
 
Artwork

1
Cybersecurity Basement – der Podcast für echten Security-Content

suresecure GmbH, Michael Döhmen, Andreas Papadaniil

Unsubscribe
Unsubscribe
חודשי
 
Herzlich Willkommen im Cybersecurity Basement. In unserem Podcast sprechen vor allem Andreas Papadaniil und Michael Döhmen alle 14 Tage über Themen aus dem Bereich Cybersecurity. Dabei legen wir großen Wert auf Objektivität gelegt. Kein suresecure-Feature-Fucking, sondern ein seriöser, authentischer und ehrlicher Austausch aus Theorie und Praxis. Der Podcast richtet sich an IT- und Security-Entscheider und alle, die es mal werden wollen. Hier gibts kein Blabla, sondern Security als Handwerk. ...
  continue reading
 
“It’s 5:05!'' is a daily audio news cast highlighting security and open source stories from around the world. We filter for the real cybersecurity and open source stories in the news, so you won't have to. Each day, a global team of journalists contribute stories they found interesting in their daily research from the previous 24 hours. We present them to you in an easy to listen to format, making the resources available at the end of each episode so you can do a deep dive on stories you fin ...
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Artwork

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
חודשי
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
Artwork

1
Cybersecurity Risk

Dr. Bill Souza

Unsubscribe
Unsubscribe
חודשי+
 
Cyber risk is a complex topic and part of a larger picture in your organization. Cyber risk is a strategic necessity for any organization to increase cyber resilience. In this podcast, we will have an open conversation on governance, risk, and compliance to move your organization from as-is to the next level. Here we will have discussions on program assessments, control assessments, risk identification, risk register, mitigation plans, and much more.
  continue reading
 
Cybersecurity on the Front Lines is a podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Nomic Networks' CEO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
  continue reading
 
Artwork

1
HACK MY CYBERSECURITY!

Ingram Micro Cloud

Unsubscribe
Unsubscribe
חודשי
 
Ingram Micro Cloud BeNeLux presents a monthly cybersecurity podcast. In this podcast you get the hottest and latest cybersecurity updates. Every month we take a deep dive in one specific cybersecurity subject with the best experts in the business.
  continue reading
 
Artwork

1
Cybersecurity Careers

Niloufer Tamboly

Unsubscribe
Unsubscribe
חודשי
 
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
  continue reading
 
Join James Farrow, the voice of Cyft.ai, as he explores the brightest minds in cybersecurity. Each week, he embarks on a deep dive into often-overlooked topics with industry experts. On this journey, you'll be exposed to game-changing insights, all designed to help you fortify your business and grow your career. Thanks for tuning in.
  continue reading
 
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
  continue reading
 
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
  continue reading
 
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
  continue reading
 
Wibu-Systems hat es sich zur Aufgabe gemacht, vielseitige und sichere Technologien zu entwickeln, die Herstellern von Software und intelligenten Geräten die Möglichkeit liefert ihre Produkte vor Piraterie, Reverse Engineering, Manipulation, Sabotage und Spionage zu schützen. Mit CodeMeter, einer umfassenden und preisgekrönte Suite von hardware- und softwarebasierten Lösungen, ist dies möglich.
  continue reading
 
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono di ogni tipo: le imprese (dalle grandi multinazionali alle Piccole e Medie Imprese); gli enti e le organizzazioni di ogni ordine e grado; i privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell’attacco, entità della struttura attaccata o danni provocati. Altri sono stati meno esposti alla luce dei media, ma hanno comunque creato grav ...
  continue reading
 
Loading …
show series
 
It's March 1st, 2024 and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is around the anticipation of advancements in quantum computing and the massive overhauls of technology taking place. We have perspectives from Trac Bannon in Camp Hill, Pennsylvania, Olimpiu Pop from Transyl…
  continue reading
 
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss supply chain security concerns and revisit the latest CMMC guidance.על ידי Enterprise Management Associates + DEVOPSdigest
  continue reading
 
🚀 Welcome to Startuprad.io – Your Ultimate Destination for Tech Entrepreneurship News! 🌟 Interested in Working with us? Have a look here: https://www.passionfroot.me/startupradio Subscribe Here https://linktr.ee/startupradio In this episode, we dive deep into the latest tech and startup highlights shaping the landscape of innovation. Join us as we …
  continue reading
 
Join us for another insightful episode of the Bee Cyber Fit podcast that builds on our January episode about building cyber habits that are simple and sustainable. We discuss the outcomes of our 21-day Cyber Habit Challenge at Yale, designed to bolster cybersecurity know-how among the university community. We know that even the smallest of habits c…
  continue reading
 
In episode 77 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. Together, they discuss how to use data to inform your decision-making in cybersecurity. They begin by discussing the cybersecurity industry's lack of maturity in its use of data. From there, they…
  continue reading
 
In this conversation about threat hunting, Stan and Rob dive into why it's become such a crucial part of cybersecurity. They talk about how threat hunting isn't just about reacting to problems anymore, but it's become this proactive, creative way of spotting and tackling security issues before they become big headaches. They reflect on how the role…
  continue reading
 
Un nuovo rapporto di Microsoft e OpenAI rivela come alcuni gruppi criminali – legati a Russia, Cina, Iran e Corea del Nord – utilizzino l’intelligenza artificiale per la raccolta di informazioni. Un rapporto utilizzato anche grazie a ChatGPT. Ospite Tamara Zancan responsabile dell'area Cybersecurity di Microsoft Italia…
  continue reading
 
🎙️ Tune-in for another edition of FortinetLIVE as #Fortinet’s Don Walling is joined by Sherron Burgess, Chair, Board of Directors, #Cyversity to discuss fostering diverse talent and creating exciting career opportunities in #cyber. 👩‍💻👉 https://www.fortinet.com/training/education-outreach-program?utm_source=social&utm_medium=soundcloud-org&utm_camp…
  continue reading
 
Joining us this week is Peter W. Singer, a New York Times bestselling author of books including Ghost Fleet, LikeWar and the techno-thriller Burn In. He shares details on the New America volunteer, non-profit organization and its awesome #SharetheMicinCyber program helping to bring diversity of thought to the cybersecurity front lines. We also disc…
  continue reading
 
Dino Busalachi and Jim Cook, the CTO and COO of VELTA Technology respectively, discuss the intersection between IT (Information Technology) and OT (Operational Technology) in the cybersecurity landscape. They emphasize that, while IT security measures have their value, they cannot be applied as-is to the OT environment due to significant variations…
  continue reading
 
Scheduling a cybersecurity engagement can be stressful, for client and pentester alike. Both want the same thing - a well conducted, accurate assessment of the client infrastructure to provide the best value add to bolster cybersecurity. It helps to start from a shared set of standard expectations and practices. On this episode of the SecureAF Podc…
  continue reading
 
In dieser Folge geht es um Punkt C aus Artikel 21 der NIS2-Richtlinie, der sich mit dem Business Continuity Management befasst. Michael und Andreas betonen die Bedeutung eines effektiven Incident Response Plans und diskutieren Best Practices für mehrstufige Backups. Außerdem beleuchten wir die Wichtigkeit von Recovery-Tests, um sicherzustellen, das…
  continue reading
 
Five Eyes publish report on Volt Typhoon. Volt Typhoon targets emergency management services in the US. Siemens and Schneider Electric issue patches. Guest is Magpie Graham, Principal Adversary Hunter Technical Director at Dragos, sharing the findings of Dragos Cybersecurity Year in Review report. The Learning Lab segment will return next episode. …
  continue reading
 
In today's cyber landscape, breaches are often disclosed by criminals before victims are even aware, leaving companies scrambling to manage the fallout. Crafting a swift and effective response is essential to safeguarding trust and reputation. Join us this week with corporate communications expert Kevin Dinino, President of KCD PR, as he shares key…
  continue reading
 
Automated Security Validation. Involving tools, scripts and platforms to emulate true-to-life attacks, Automated Security Validation is a key part of assessing the readiness of the security infrastructure and guiding prioritized remediation. But how does this implementation of automation really work to empower human expertise? How does all of this …
  continue reading
 
What's next after season 2? About this Episode In the grand wrap-up of season two of the podcast 'Your Cyber Path', hosts Kip Boyle and Jason Dion reflect on their four-year podcast journey. They also reveal that for the time being, there won't be a season three as originally planned. Several factors have influenced this decision, the primary being…
  continue reading
 
Breaking into Cybersecurity Leadership Roselle Safran Roselle Safran on LinkedIn https://www.linkedin.com/in/rosellesafran/ Sponsored by CPF Coaching LLC - http://cpf-coaching.com The Breaking into Cybersecurity: It’s a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cyber…
  continue reading
 
Alarmed by "Have you heard cybersecurity is a business issue?" But WORRIED your education left you UNPREPARED to face it? Colleges and certificate programs rarely teach business, communication, or sales skills crucial for cybersecurity careers. Don't fret! My YouTube video talks about the essential soft skills missing from your education. Learn how…
  continue reading
 
In der heutigen Folge unseres Cybervize Podcasts haben wir die Ehre, Tobias Glemser, Geschäftsführer der Secuvera, zu begrüßen. Tobias ist eine anerkannte Persönlichkeit in der Welt der Cybersecurity, bekannt für seine tiefgehenden Kenntnisse und starken Meinungen zum Zustand der Cybersicherheit. Mein Gespräch mit ihm, das im Kontext seines Editori…
  continue reading
 
Loading …

מדריך עזר מהיר