show episodes
 
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Unsubscribe
Unsubscribe
每周+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Artwork

1
The Hacker's Cache

Kyser Clark - Cybersecurity

Unsubscribe
Unsubscribe
每周
 
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
  continue reading
 
Tip of the Iceberg features conversations between members of the fresh produce industry and the editors of trade publications The Packer and PMG. Topics will include current events and provide insight into the opportunities and challenges for different segments of the industry today, including growers, marketers, wholesalers, foodservice operators, retailers and more.
  continue reading
 
”Digital Defenders” is a must-listen podcast for anyone interested in staying ahead in the ever-evolving field of cybersecurity. Hosted by industry veterans, each episode delves into the latest threats, emerging technologies, and cybersecurity strategies. From interviews with leading experts to deep dives into case studies of significant security breaches, this podcast provides a comprehensive overview of the landscape. Whether you’re a professional in the field, a business owner concerned a ...
  continue reading
 
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
  continue reading
 
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
  continue reading
 
Technology tips and insights to help protect your business! We offer weekly interviews with industry experts and leaders from companies like Coca-Cola, Verizon and AT&T to share their insights on cybersecurity and other technology topics. Join your host, Shaun St.Hill, the CEO of Tech and Main!
  continue reading
 
Artwork

1
The Security Podcasts

www.securitymagazine.com

Unsubscribe
Unsubscribe
每月+
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
  continue reading
 
CyberSound is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
  continue reading
 
Artwork

1
AFP Conversations

Association for Financial Professionals: Treasury and Finance Professional

Unsubscribe
Unsubscribe
每月
 
Corporate treasury and finance executives discuss their biggest challenges and insights: blockchain, fintech, cybersecurity, payments, risk, FP&A, budgeting, forecasting, leadership, career development, and more.
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

Unsubscribe
Unsubscribe
每月+
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Artwork
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
Artwork
 
Join George and Jim from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
  continue reading
 
Artwork

1
Manager Memo podcast

Len Samborowski, MBA Associate Professor, Nichols College

Unsubscribe
Unsubscribe
每周
 
A biweekly podcast focused on the planning, organizing, leading, and evaluating functions of management. Interviews with leading business practitioners provide tantalizing tips, wizardly wisdom and energized encouragement to our listeners.
  continue reading
 
Practical, concrete advice for lawyers who want to use technology to simplify and streamline their work to gain massive freedom and fulfillment. If you're a solo lawyer or run a small firm, the most critical areas of focus should be automation/AI, outsourcing, marketing, cybersecurity, and remote work skills. And that's what this podcast will help you with.
  continue reading
 
Artwork
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Artwork

1
Treasury Talk PODCAST

Treasury Talk with MI Treasurer Rachael Eubanks

Unsubscribe
Unsubscribe
每月
 
Welcome to Treasury Talk, a podcast for Michigan taxpayers hosted by State Treasurer, Rachael Eubanks. Our trending topics with Subject Matter Experts will include cybersecurity, tax prep tips, education savings plans, the budget and our economy, and leadership best practices. Listen for take-aways that will support you, your family and and your business!
  continue reading
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
每周
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Insightful interviews with authors, experts, entrepreneurs, and thought leaders who share valuable marketing tips, growth strategies, and resources. Hosted by John Jantsch, one of America's top small business marketing experts, this show is dedicated to helping you craft effective marketing strategies that will grow your business. Whether you're a small business owner, marketing professional, or marketing agency owner, you'll gain valuable insights and actionable advice on topics such as mar ...
  continue reading
 
Artwork

1
Left to Our Own Devices

Cybellum Technologies LTD

Unsubscribe
Unsubscribe
每月+
 
Introducing Left to Our Own Devices - the podcast dedicated to everything product security. Every other week, we will be talking with a different cybersecurity policymaker, engineer, or industry leader to hear their war stories and get their insider tips for surviving the product security jungle. From Medical SBOMs, to WP. 29 and the latest industrial security threats, this is your place to catch up and learn from the pros. Left to Our Own Devices is brought to you by Cybellum. To learn more ...
  continue reading
 
Welcome to the SmartStay Show, your go-to podcast for mastering Short-Term Rentals on Airbnb, Vrbo, and beyond. For more Airbnb tips, visit smartstayshow.com and smartstaycoaching.com. Hosted by 30-time Airbnb Superhost Jason Muth and Real Estate Attorney Rory Gill, we equip you with the tools to launch, manage, and optimize your vacation rental like a pro. Unlike other shows, we specifically cater to owners of small-but-mighty portfolios who self-manage their properties. Each episode delive ...
  continue reading
 
Uncle Marv’s IT Business Podcast is a show designed for IT professionals and Managed Service Providers. The podcast aims to provide actionable advice and tips that help IT businesses grow and thrive in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, and industry pioneers who share their experiences, insights, and strategies for success. These discussions often cover topics such as: - Cloud computing and AI advancements - M ...
  continue reading
 
Welcome to the KeyHire Solutions Podcast – where we cover the issues, people and processes that matter to small businesses. From the current employment market to cybersecurity, we’re here to help you stop grinding and start growing. Join us for bi-weekly chats with our human capital expert and CEO of KeyHire Solutions, Corey Harlock. For years, KeyHire has been helping small businesses optimize their organizational design and processes to increase efficiency and profitability. We'll share ti ...
  continue reading
 
Artwork

1
That Tech Pod

Laura Milstein, Gabriela Schulte and Kevin Albert

Unsubscribe
Unsubscribe
每周
 
Welcome to That Tech Pod, a podcast co-hosted by Laura Milstein, Gabi Schulte and Kevin Albert. Each Tuesday, That Tech Pod will feature in depth discussions about data privacy, cybersecurity, eDiscovery, and tech innovations with heavy hitters in the industry. Subscribe so you don't miss an episode! Visit thattechpod.com for more information.
  continue reading
 
Tech with Newton is an informative technology podcast for tech enthusiasts, newcomers to tech, tech professionals, and anyone looking to break into the industry. It is a podcast committed to educating and empowering technology careers worldwide. In each episode, the host, Newton, a seasoned IT consultant, explores the latest interesting technology news, trends, insights, and innovations, as well as career development tips and tricks to turbocharge careers in tech.
  continue reading
 
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
  continue reading
 
Artwork

1
Command+Shift+Left

Hosted by Filip & Or

Unsubscribe
Unsubscribe
每月
 
Command+Shift+Left is a podcast that helps you navigate the treacherous waters of the software development, ops, and security world, while also diving into the hot current trends in the industry. Join us, and embark on a journey through hilarious real-world stories, pro-tips and hacks for navigating your way around developer security.
  continue reading
 
Welcome to Cyber Talk by Troy Williams, where we break down the latest trends in cybersecurity, AI, and digital privacy. Each episode provides practical tips, expert insights, and real-world strategies to help you safeguard your digital life. Whether you’re tech-savvy or just starting, join us on this journey to stay ahead of cyber threats and protect your personal information in an increasingly connected world.
  continue reading
 
Artwork
 
Welcome to AcoraCast - The forefront of expertise and innovation, with the freshest IT, cyber security and AI insights brought to you by Acora. Tune in as we unravel the latest trends, tips, and tools, all tailored to empower you in your role as an IT or Security Trailblazer. Interested in seeing what else Acora can do? Visit our website.
  continue reading
 
Hosted by Ryan Irvine & Aaron Dunn, the podcast is highly interactive taking listener questions each week on individual Canadian & U.S. stocks as well as stock portfolio building strategies. The podcast focuses on high quality Canadian Dividend growth stocks, unknown & profitable Canadian Small-Cap stocks, U.S. tech leaders and high growth small-cap stocks. We also provide simple portfolio building tips for DIY investors. Weekly show highlights include: - Case For & Against Any Stock: our Ry ...
  continue reading
 
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Artwork
 
A podcast about a diverse range of topics hosted by a writer and nerd Colby Ebaugh. We will explore things like writing tips, literary critique, gaming, cybersecurity and more in shorter more bite sized episodes then dive deep in interviews with amazing people during longer form episodes. No matter what your interests are, you are likely to find something you like here!
  continue reading
 
Welcome to The Defender's Journal (our next step up from The Tech Stack), where we delve into the lives and minds of leading professionals in the cybersecurity space. Discover their unique stories, motivations, perspectives on the industry, and tips for long-term success! *Interested in joining us on the show? Please connect with Cameron Wenham or Jeff Harrod!
  continue reading
 
Welcome to the Tactical Cyber Podcast, where we transform strategic cyber insights into actionable tactics for everyday implementation. Join your hosts, retired FBI Supervisory Special Agent Darren Mott, and Risk Advisory Practice Leader at Warren Averett, Paul Perry. Together, they bring decades of experience from the front lines of cybersecurity and risk management to help business owners and individuals take the actions that will keep their business and personal digital data safe. Each ep ...
  continue reading
 
Artwork

1
The Burnout Club

Patrice Bonfiglio

Unsubscribe
Unsubscribe
每月+
 
Welcome to The Burnout Club, where success and burnout collide. Hosted by Patrice Bonfiglio, a hedge fund industry veteran and multi-role dynamo, this podcast is your new community for tackling burnout head-on. With nearly 20 years in high-pressure environments, Patrice knows firsthand that managing burnout is key to sustaining success—both in business and life.
  continue reading
 
Artwork

1
2 Cyber Chicks

Simply Cyber Media Group

Unsubscribe
Unsubscribe
每月
 
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
  continue reading
 
Welcome to Transformation Ground Control, the podcast where we explore tech-agnostic digital transformation and digital strategy best practices with industry thought leaders. On this show, Eric Kimberling, Kyler Cheatham, and other industry leaders discuss digital transformation strategies, tips, and lessons. We also discuss organizational change management, ERP software implementations, emerging tech trends, business process improvement strategies, and other important topics - all without t ...
  continue reading
 
Loading …
show series
 
In this episode, we delve into the critical preparations for the impending Category 5 Hurricane Milton. Recognizing the immense power and potential devastation of such a storm, we outline the essential steps to ensure safety and preparedness. We discuss the importance of having a solid evacuation plan, identifying safe routes, and establishing a fa…
  continue reading
 
Today we're excited to welcome Jonathan Steele, an experienced family law attorney from Chicago. Jonathan brings a unique perspective to our show, as he not only practices family law but has also become an expert in cybersecurity - an area that is increasingly important for his clients. We look forward to tapping into Jonathan's wealth of knowledge…
  continue reading
 
In the never-ending vortex of Silicon Valley's hype cycle, it's easy to get lost in the sea of superficial success stories and forget that true innovation often requires patience, persistence, and a willingness to disrupt the status quo – not just a fancy logo or a tweet from a billionaire CEO. Inside of the froth however, there are investors and v…
  continue reading
 
What if there was more to making those impactful decisions that you haven’t considered? Let’s talk about how being open minded can directly impact the success of tool selection and optimization in your company. Is a SOC report enough or are there other criteria needed to make that risk based decision? Let’s discuss cognitive biases in tool selectio…
  continue reading
 
Nerd-out with us this episode, as we dissect the fundamental problems and challenges with traditional passwords. 🤓🔤 Join Matt and 1Password's Principal Product Designer, Sierre Wolfkostin, as they discuss if passkeys are the answer, and if passwordless authentication is the game-changer we've been waiting for. In Watchtower Weekly we're horrified t…
  continue reading
 
Top Free OSINT Tools | Scan Everything!" from the YouTube channel "iMentor" discusses the use of open-source intelligence (OSINT) tools for cybersecurity purposes. The video highlights three specific tools: GitHub Dog Search, which can be used to find sensitive information in GitHub repositories, Instagram OSINT tool, which can extract data from In…
  continue reading
 
Cybersecurity Incident Response Lifecycle, a structured process for organizations to effectively manage and mitigate cybersecurity incidents. The framework outlines seven key steps: preparation, identification, containment, eradication, recovery, lessons learned, and communication. Each step emphasizes a specific aspect of incident response, from e…
  continue reading
 
Today we're excited to welcome ZEONA MCINTYRE, a real estate expert known for her creative financing strategies and unique approach to building wealth through short-term and medium-term rentals. ZEONA has an infectious energy and a passion for helping others achieve financial freedom, and we're thrilled to have her join us on the podcast today. "My…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Jerich Beason, CISO, WM. Joining us is Teresa Tonthat, vp, associate CIO, Texas Children's Hospital. This episode was recorded live at HOU.SEC.CON. In this episode: Connecting with the business K…
  continue reading
 
Believe it or no, it's possible to work as "digital nomad lawyer" and spend all your time traveling the world. Our guest Brian Dixon knows this first hand. In this episode, you'll learn about his journey from a traditional law practice to fulltime globetrotter. Listen and learn which practice areas are best suited to this kind of life, and which te…
  continue reading
 
In today’s episode of The Daily Threat, we dive into three alarming cybersecurity stories you can’t afford to miss! Learn how hackers are hijacking robotic vacuums, exposing sensitive healthcare data, and why popular ad-blockers may soon become ineffective. Protect your business with these vital insights! 👉 Read more about the stories: Robotic Vacu…
  continue reading
 
Today Kevin and Laura speak with Dana Samuelson, the Founder and President of American Gold Exchange (AGE), a leading national precious metals and rare coin company specializing in dealer-to-dealer trading and direct-to-consumer sales. We talk about the precious metals market, the US economy and interest rates hikes and the effect on precious metal…
  continue reading
 
Send us a text Unlock the secrets of cybersecurity in our latest episode where we promise to transform your understanding of access control mechanisms. We kick things off by dissecting the discretionary access controls (DAC) and the power dynamics behind resource ownership. Discover why assigning ownership is crucial to sidestep security pitfalls a…
  continue reading
 
Mitigating Insider Threats in SMBs: Strategies for Success This video addresses the significant security concern of insider threats in small and medium-sized businesses (SMBs). It explores how such threats, often arising from individuals with authorized access who misuse their privileges, can result in data breaches, financial losses, and reputatio…
  continue reading
 
In the milestone 350th episode of the Shared Security Podcast, the hosts reflect on 15 years of podcasting, and the podcast's evolution from its beginnings in 2009. They discuss the impact of a current hurricane on Florida, offering advice on using iPhone and Android satellite communication features during emergencies. The 'Aware Much' segment focu…
  continue reading
 
This article from Forbes profiles Daniella Pierson, a 27-year-old Latinx entrepreneur, who built The Newsette, a successful newsletter and marketing agency, into a multi-million dollar company. The article highlights Pierson’s journey, including her early struggles with OCD, her success in building a profitable business, and her recent investment i…
  continue reading
 
Daily men's newsletter that covers cultural trends, business insights, beauty tips, and wellness advice. The newsletter aims to be engaging and informative, offering a brief overview of current events and trends, alongside practical tips and recommendations. The template includes sections dedicated to each category, with suggested topics such as fi…
  continue reading
 
Sid Mohasseb, the Entrepreneur Philosopher is a published author, serial entrepreneur, venture capitalist, public speaker, and thought provoker. Sid shares his thoughts on the Five Pillars of organizational effectiveness and how business leaders strive as they transition from a profit-to-reason mindset. Along the way we discuss – not IKEA (4:13), t…
  continue reading
 
The Cyber Kill Chain framework outlines the seven distinct stages of a cyberattack, starting with reconnaissance where attackers gather information about their target and ending with action on objectives where the attacker achieves their ultimate goal. Each stage represents a critical point of vulnerability, from weaponizing malware to exploiting v…
  continue reading
 
The source provides information about PLAUD NOTE, a voice recorder powered by ChatGPT that offers features like one-press recording, transcription, and summarization. The text highlights the product's key benefits, including its ability to transcribe audio recordings into accurate text and generate summaries using AI, making it a valuable tool for …
  continue reading
 
The text is a transcript from a YouTube video about a cybersecurity tabletop exercise called "Operation Data Lock." The exercise simulates a ransomware attack on a fictional financial services firm, highlighting the importance of preparedness and rapid response in the face of cyber threats. The video demonstrates the critical steps involved in mana…
  continue reading
 
The provided text is an excerpt from the online publication Uncrate.com, which focuses on curated lifestyle products and experiences. It highlights various items, including the Tesla Cybercab, a self-driving taxi set to be released in 2026, as well as luxury cars from Rolls-Royce and Bentley. Additionally, the excerpt features a selection of "Featu…
  continue reading
 
The provided text compares the Apple iPhone 16 and Huawei Mate XT, highlighting their key features and differences. Both phones offer powerful performance, high-quality cameras, and advanced operating systems. The iPhone 16 excels in its traditional sleek design, powerful processor, and robust app ecosystem, while the Huawei Mate XT stands out with…
  continue reading
 
Darnley discusses the recent cyberattack that targeted one of the internet's most important digital archives. We'll explore how hackers infiltrated the Wayback Machine, compromising the personal data of millions and threatening the integrity of historical records stored online. Could this hack rewrite internet history? Click here to send future epi…
  continue reading
 
Today, we’re excited to welcome Chris Petzy to the show. Chris is a highly successful short-term rental operator, real estate investor, and executive coach. With a background in corporate America, Chris made the leap into real estate, and his journey is nothing short of inspiring. Chris Petzy is a real estate investor, short-term rental operator, a…
  continue reading
 
In today’s episode of The Daily Threat, we dive into three alarming cybersecurity stories that every business leader needs to hear. Hackers breached Dr.Web antivirus software, scammers are exploiting Hurricane Milton, and Siemens devices face dangerous vulnerabilities. Learn what these threats mean for your business and how you can stay protected! …
  continue reading
 
Introduction to Aaron Painter and Nametag: Uncle Marv introduces Aaron Painter, highlighting his role as CEO of Nametag, a platform dedicated to enhancing identity verification processes to prevent impersonation and fraud. The North Korean Hacker Incident: The conversation kicks off with a discussion about the notorious case of a North Korean hacke…
  continue reading
 
The article reports that Akira and Fog ransomware gangs are exploiting a critical vulnerability in Veeam Backup & Replication (VBR) software. This vulnerability, tracked as CVE-2024-40711, allows attackers to gain remote code execution (RCE) on vulnerable servers. This allows them to access and encrypt sensitive data, leading to ransomware attacks.…
  continue reading
 
George and Jim are joined by Dr. Joe Beckman to discuss the recent National Public Data breach and the reach of its impact. ------------------------- Follow us on all the things: Twitter: @PCyberTAP LinkedIn: Purdue cyberTAP Email the Cyber Tap with suggestions (or be a guest) cybertappodcast@purdue.edu To learn more about Purdue cyberTAP's educati…
  continue reading
 
FraudGPT is a dangerous AI tool that has emerged on the dark web, designed specifically for cybercriminal activity. It is a subscription-based service offering access to sophisticated malicious tools like phishing, cracking, and carding, posing a significant threat to cybersecurity. FraudGPT's capabilities extend beyond mass phishing, as it can cre…
  continue reading
 
Coming in at number four of your favorite episodes lately: In this episode of the Duct Tape Marketing Podcast, I interviewed Alyson Caffrey, the founder of Operations Agency and the co-creator of the operations simplified framework, which is aimed at streamlining the backend operations for digital and creative agencies. She also authorizes The Sabb…
  continue reading
 
The text is an excerpt from an online magazine and shop called Uncrate, focusing on luxury goods for men. The excerpt features a specific watch, the Richard Mille RM 65-01 McLaren Automatic Split-Seconds Chronograph W1, alongside other luxury watches and products like a Nike Tech Windrunner Hoodie, a Joymode Sexual Performance Booster, and an HP La…
  continue reading
 
Apple Vision Pro is a new head-mounted spatial computer from Apple that seamlessly blends the digital world with the physical world. With this device, users can work, watch videos, relive memories, and connect with others in revolutionary ways. It features a high-resolution micro-OLED display system, advanced Spatial Audio, and a sophisticated arra…
  continue reading
 
The text provides a detailed overview of the iPhone 16 Pro and iPhone 16 Pro Max, highlighting new features and design improvements. It focuses on Apple Intelligence, a personal intelligence system designed to help users write, express themselves, and get things done effortlessly. The text also covers the new Camera Control feature, which allows fo…
  continue reading
 
We hope you enjoy Part 2 of this conversation! Discover how microcredentials can give you a competitive edge in today's job market. In this episode, we explore the benefits of microcredentialing, how it helps you gain job-ready skills, and why it’s a flexible option for students and professionals. UMBC's Digital Credentialing initiative offers cutt…
  continue reading
 
Send us a text Unlock the secrets of the OSI and TCP/IP models with Sean Gerber as your guide on the CISSP Cyber Training Podcast. Ever wondered how the presentation layer manages to format and translate data seamlessly for the application layer? Or how the network layer deftly routes packets across networks? Prepare to gain a comprehensive underst…
  continue reading
 
In this episode, we explore the surprising 3:1 ratio between getting an MVP ready and reaching full maturity. We also dive into the challenges of cloud spot pricing and how unpredictable it can be for customers. Then, we look at the intriguing world of chaos engineering, where companies purposely break their systems to build stronger infrastructure…
  continue reading
 
In this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, speaks with Del Rodillas, Distinguished Product Manager for OT Security Solutions at Palo Alto Networks. Del shares insights from his extensive experience in the OT security landscape, covering crucial aspects of building a strong OT security framework.…
  continue reading
 
In today’s episode of The Daily Threat, we dive into three critical cybersecurity threats businesses face in 2024. From 31 new ransomware groups to a dangerous 2FA bypass for Microsoft 365, and even a breach at ADT Inc., these are risks you can’t afford to ignore! Stay vigilant, protect your business, and learn how to stay ahead of cybercriminals. …
  continue reading
 
Uncle Marv kicks off the show by introducing Tim Coach and his new position at Cynomi. Tim explains the company's name, inspired by the manta ray from Finding Nemo, symbolizing protection and guidance in cybersecurity. The conversation dives into Cynomi's VCISO platform, which simplifies security assessments and compliance roadmaps for MSPs. Tim hi…
  continue reading
 
Uncle Marv kicks off with the latest on Hurricane Milton, now a Category 4 storm with 155 mph winds, expected to make landfall near Sarasota around 10-12 PM. He emphasizes the storm's massive size, affecting areas from the Panhandle to the Keys. Using the Windy.com app, Marv illustrates the storm's path and potential impacts. He shares emergency nu…
  continue reading
 
The source provides an overview of the Kindle Edition of The 6th Protocol, a novel by Nguyen Tai Nguyen. The story follows a group of individuals who must work together to stop a rogue IRA agent from unleashing a deadly encryption virus on the world. The novel explores themes of power, betrayal, and the struggle for control in a world where technol…
  continue reading
 
Unit 8200 is a highly classified Israeli cyber warfare unit with a long history dating back to the founding of Israel. Known for its size, scope, and sophistication, the unit's primary focus is signals intelligence (SIGINT), which involves intercepting and analyzing electronic communications. Unit 8200 is responsible for a wide range of activities,…
  continue reading
 
Meta has released a new open-source AI model called Llama 3.1, which is designed to compete with ChatGPT. The model is trained on a massive dataset and is capable of a range of tasks, including generating synthetic data and transferring knowledge to smaller models. Llama 3.1 powers Meta's AI assistant and is also available for developers to use. Wh…
  continue reading
 
Join 2 Cyber Chicks for a personal discussion filled with reflection, as Jax and Erika chat through navigating challenging workplace situations. From delivering messages that resonate to leading with empathy and understanding; seeking to understand while promoting a collaborative environment; and, the importance of building trust with your team and…
  continue reading
 
Loading …

快速参考指南