show episodes
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
  continue reading
 
Artwork
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Unsubscribe
Unsubscribe
每周+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Artwork

1
How Hacks Happen

Many Worlds Productions

Unsubscribe
Unsubscribe
每月
 
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
  continue reading
 
Artwork
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork
 
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
  continue reading
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Artwork
 
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Artwork
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Artwork

1
Click Here

Recorded Future News

Unsubscribe
Unsubscribe
每周+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
  continue reading
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
  continue reading
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
The Cyber Ways Podcast brings academic cyber security research into the "real world." We interview top academic researchers to find how their research can be put into practice by cyber security professionals. Our focus is on behavioral aspects of cyber security. Occasionally, we touch on related topics, such as information privacy and surveillance.Each episode discusses one published, peer-reviewed article to reveal the practical implications of the research. Your hosts, Tom Stafford and Cra ...
  continue reading
 
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address talkingcybersec@gmail.com to make comments, pose questions or even ask to be on ...
  continue reading
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
“DarkWeb.Today – Hackers & Cyber Security” is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that are central to our ...
  continue reading
 
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
每周
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the b ...
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

Unsubscribe
Unsubscribe
每月+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Artwork
 
We are in the midst of a data driven revolution, and it is going to change everything. This podcast is all about the intersection of business intelligence, data analytics, AI, privacy, data protection, cyber and information security. Hosted by Kate Carruthers this podcast will explore the new frontiers as data creates an entirely new economy.
  continue reading
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
The purpose of "FounderStoriez Channel" is to interview Entrepreneurs from around the world to share their story, experience, and wisdom with you so you can learn from them and be inspired.
  continue reading
 
Loading …
show series
 
We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational technology (OT). Comprehensive Supply Chain Security - Crosley detailed the various stages in the supply chain—design, development, and fabrication—where both deliberate and accidental abuses can occur. Each stage presents…
  continue reading
 
Crypto Wars: The Ongoing Battle Between Privacy and Security Join Nathan from StationX as he delves into the history of the 'Crypto Wars,' a decades-long conflict over encryption between governments, technology companies, and privacy advocates. This episode covers major moments like the Clipper Chip controversy, the impact of the U.S. Patriot Act p…
  continue reading
 
Send us a text Ever wondered about the real difference between a data leak and a data breach? Join me, Sean Gerber, on the latest episode of the CISSP Cyber Training Podcast as we unpack the nuances between these two critical cybersecurity concepts. Learn how data leaks often result from human mistakes like weak passwords, while data breaches invol…
  continue reading
 
DragonForce uses ransomware’s greatest hits Salt Typhoon strikes US ISPs Finding SpAIware on the ChatGPT Mac app Thanks to today's episode sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire Automation, security & compliance te…
  continue reading
 
A proactive approach to third-party risk - continuous monitoring of suppliers Using threat intelligence to identify third-party risk Effectively working with partners to mitigate third-party security risks This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Chuck Brooks, Adjunct Professor, Georgetown University https:/…
  continue reading
 
DNS Reflection Update and Corrupted DNS Requests https://isc.sans.edu/diary/DNS%20Reflection%20Update%20and%20Odd%20Corrupted%20DNS%20Requests/31296 CVE-2024-28987 Solarwinds Web Help Desk Hardcoded Credentials Vulnerability https://www.horizon3.ai/attack-research/cve-2024-28987-solarwinds-web-help-desk-hardcoded-credential-vulnerability-deep-dive/…
  continue reading
 
In today's episode, I've invited my dear colleague, Jonas Klærke Hejlskov, into the studio. He's here to talk about 5 misconceptions about security awareness training we see all the time. The misconceptions are: 1. A Few Big Events Are Enough for your security training 2. Grouping Training Topics By Category 3. Training Alone Makes You Secure 4. Tr…
  continue reading
 
Evilginx: MFA Bypass Tool, Kaspersky's Exit & FTC's Data Surveillance Report - Cyber Security Today In this episode of Cyber Security Today, host Jim Love discusses a new cyber security tool called Evilginx that bypasses multi factor authentication (MFA), Kaspersky's unexpected software replacement for North American users, ESET's patches for criti…
  continue reading
 
We sat down with Tim Conway and Robert Lee, two leading cybersecurity experts, to discuss pressing issues in OT cybersecurity. CrowdStrike Lessons Learned Tim and Robert began by examining the CrowdStrike incident from July 2024. They highlighted the dangers of over-relying on trusted technology without sufficient testing and verification, and the …
  continue reading
 
Send the hosts a message - try it now! TL;DR: This week Jason Clark and Nathan Smolenski join Jim Tiller and I on part 1 of a 2-part series on data security. It's a topic whose time has come, and we're going to start in part 1 with fully analyzing the problem, how we got here, and just how ugly the beast is. YouTube vide: https://youtube.com/live/Q…
  continue reading
 
In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kellett delve into key cybersecurity topics. They discuss a recent statement by CISA director Jen Easterly on holding software manufacturers accountable for product defects rather than vulnerabilities, and the need for derogatory names for threat actors to deter cybercri…
  continue reading
 
We have been talking about migrating to IPv6 for years. However, with the rapid growth of mobile devices and cloud adoption, this can no longer be put off. Many network engineers and security practitioners have not focused their attention on developing the skills to properly implement and secure IPv6 creating a shortage of expertise. In this episod…
  continue reading
 
Welcome to Cyber Balance, the podcast dedicated to helping cybersecurity professionals achieve financial freedom and mental well-being. I'm your host, Tarek Taylor. Each week, we'll dive into strategies for balancing your career, finances, and mental health in this fast-paced industry. Whether you're looking to manage your income, invest wisely, or…
  continue reading
 
Lee comes on the show to discuss: EU CRA - https://en.wikipedia.org/wiki/CyberResilienceAct - its impact on bringing products to market and the challenges of enforcing such laws that require products to be "Secure" Recent legislation on disputes for federal agency fines - Chevron deference rule - supreme court decision, uncertainty, more or less cl…
  continue reading
 
Decoding Zero Trust Security for Cloud Native Environments In this episode of Cyber Sentries, John Richards welcomes Zack Butcher, Founding Engineer at Tetrate, to explore the critical components of zero trust security for cloud native and microservice environments. Zack, with deep expertise from his time at Google and work with NIST, shares practi…
  continue reading
 
Today, on Cyber Work Hacks, my guest, Infosec Skills author Cicero Chimbanda, gave us a Hack involving the role of Cybersecurity Manager. Studying security management techniques academically is one thing, but how do you develop your security manager skills ON THE JOB? Cicero has many insights, and we talk a bit about the importance of rapport and u…
  continue reading
 
Send us a text Ever wondered what it takes to stay one step ahead of cybercriminals? This episode, featuring cybersecurity expert Chris Hale, promises to unravel the complexities of safeguarding digital fortresses while sharing invaluable lessons from the frontlines. Chris’s journey from a help desk technician to the founder of his own cybersecurit…
  continue reading
 
Loading …

快速参考指南