Cyber Security 公开
[search 0]
更多
Download the App!
show episodes
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address theaustralianciso@gmail.com to make comments, pose questions or even ask to be o ...
  continue reading
 
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
  continue reading
 
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Artwork
 
Welcome to the Razorwire podcast where we share information, best practices and up to date news in cyber security. Our mission is to help you become a better cyber security professional and support our vision of creating an agile community of cyber professionals who are stronger than ever before. This show is first and foremost about sharing knowledge and benefiting from collaboration. We bring you the advice and wisdom of both your host, James Rees, and his guests to build on the strength a ...
  continue reading
 
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
  continue reading
 
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
  continue reading
 
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
  continue reading
 
北欧に居住していた古代民族にとって、サウナストーンと呼ばれる石の熱と、石に水をかけて立ち上る蒸気は、人間の生命力として考えられていました。サウナは今日でも、健康のためだけではなく、人々の意見交換の場としても使用されています WithSecureの日本語ポッドキャスト『Cyber SecurityサウナJapan』は、社内外のセキュリティエキスパートをホスト/ゲストとして、様々なことが起こっているセキュリティ業界でのホットなトレンドやテクノロジーに関する情報、そしてインサイトをお届けしていきます。
  continue reading
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
  continue reading
 
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 31,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
  continue reading
 
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
  continue reading
 
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
  continue reading
 
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
  continue reading
 
Selva Kumar is SAP Career Trainer specializing in SAP Career Coaching, identifying skills for getting a Job. You can reach me @ 302 494 9476 or Email: info@expressgrc.com Download Free SAP GRC Guide. http://expressgrc.com/sap-grc-10-1-step-step-guide/
  continue reading
 
Your all in one comprehensive view of what is happening across the real estate industry -- straight from some of the industry's earliest technology adopters and foremost experts in Technology, Marketing, Government Policy, Brokerage, Capital, Construction & Cyber Security in Real Estate. The show is broken down into three parts: Part I: Introductions and what's new for each panelist and the business sector Part II: Sector Focus on the past month's most prominent news and paradigm shifts Part ...
  continue reading
 
The cyber security podcast from SE LABS ®. Understand cybersecurity and other security issues. Practical and insightful, our experts have experience in attacking and defending in the physical and digital worlds. Peek behind the curtain with DE:CODED. More at http://decodedcyber.com!
  continue reading
 
Cyber Security Course Arabic كيف ابدأ في مجال أمن المعلومات الأمن الإلكتروني كيفية شراء البيتكوين في المملكة العربية السعودية ببطاقة الائتمان أسرع طريقة في ثواني تذكر الاشتراك عبر هذا الرابط ، كي تحصل على خصم 10٪ من جميع رسوم شراء البيتكوين على بيانس https://www.binance.com/en/register?ref=F2IKGVD8 جزاكم الله خيرا
  continue reading
 
Artwork

1
Cyber Security Grey Beard®

Cyber Security Grey Beard®

Unsubscribe
Unsubscribe
每月
 
Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession.
  continue reading
 
The DailyCyber Podcast and New Live Stream every Wednesday at 6:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
  continue reading
 
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

Unsubscribe
Unsubscribe
每月
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Artwork
 
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
  continue reading
 
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
  continue reading
 
Welcome to the new realities of cyber security podcast series, where we'll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to GDPR, this series covers topical issues that matter.
  continue reading
 
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
  continue reading
 
Artwork

1
Cyber Security Leadership

Yaron Levi & Jeff Snyder

Unsubscribe
Unsubscribe
每月
 
We believe in empowering security leaders to maximize their strengths, equip them with the skills needed for the top security job and inspire them to become the leaders that their organizations and teams require and deserve. In this podcast Jeff Snyder, Executive coach and Cybersecurity Recruiter since 1997, and Yaron Levi, CISO and Security Advisor will share their experiences and the lessons learned in order to empower others to become the best version of themselves. This is our way to giv ...
  continue reading
 
“DarkWeb.Today – Hackers & Cyber Security” is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that are central to our ...
  continue reading
 
Artwork

1
Cyber Security Interviews

Douglas A. Brush | Weekly Interviews w/ InfoSec Pros

Unsubscribe
Unsubscribe
每月
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
  continue reading
 
Loading …
show series
 
Meta to close Threads in Turkey Palo Alto fixes backdoor zero-day Details on Microsoft’s security overhaul Thanks to today's episode sponsor, Conveyor What are infosec teams measuring these days? More often than not, their impact on sales. As infosec teams become hands on in the sales cycle, proving your value becomes key. A director of GRC said la…
  continue reading
 
Quick Palo Alto Networks Global Protect Vulnerablity Update CVE-2024-3400 https://isc.sans.edu/diary/30838 Delinea patches critical vulnerability in secret manager https://trust.delinea.com/?tcuUid=17aaf4ef-ada9-46d5-bf97-abd3b07daae3 Lancom Windows Setup Assistant May Reset Password https://www.lancom-systems.com/service-support/general-security-i…
  continue reading
 
How infosec leaders can support product teams incorporating generative AI Using AI to improve compliance processes and ongoing vulnerability monitoring Mitigating and minimising AI-based information security risks with ISO 42001 This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Dean Sapp, SVP, Information Security, P…
  continue reading
 
Welcome to Compromising Positions! This week we are joined by Dr David Burkus, one of the world’s leading business thinkers and best-selling author of five books on the topic of business and leadership. Dr Burkus has worked with the leadership teams of some internationally known names such as PepsiCo, Adobe and NASA. In this episode, “Storytelling …
  continue reading
 
In this episode of the Resilience Podcast, Javier Garcia-Quintela, the CISO of Spanish energy giant, Repsol, discusses his personal journey into cybersecurity and the importance of building relationships and collaboration within the industry. He also addresses the energy sector's challenges, including the lack of cybersecurity skills and the growin…
  continue reading
 
What are the strategic directions for AI in homeland security. Attending Milipol APAC and TechX Summit 2024, we speak with Physicist and former Yale University Professor, Dimitri Kusnezov, Under Secretary for S&T, US Department of Homeland Security. Nominated by President Biden in 2021, Dimitri Kusnezov was the deputy under secretary for artificial…
  continue reading
 
A dev perspective on application security: Dive deep into the pivotal nexus of cybersecurity, application security, and software development in our latest podcast episode featuring Josh Goldberg, a renowned figure in the TypeScript ecosystem. This episode sheds light on the evolving realm of secure coding practices, acknowledging the progress achie…
  continue reading
 
Join CRECo.ai Real Estate Roundtable Hosts as they discuss upcoming regulatory proposals to eliminate 1031 Exchanges, how GCs & Design Build Engineering are in a frenzy, all while brokerage navigates tumultuous news around buy side broker compensation. This month's Roundtable Hosts: Andreas Senie, Host, Founder CRECollaborative (CRECo.ai), Technolo…
  continue reading
 
Welcome to Razorwire, the cutting-edge podcast where we slice through the complexity of cybersecurity and risk management to bring you insights from industry leaders. I’m your host, Jim and in today’s episode, we unravel the intricacies of FAIR (Factor Analysis of Information Risk) risk methodology with none other than its creator, Jack Jones. Jack…
  continue reading
 
In this episode, I've invited Benjamin Pomerleau to talk about phishing! He's our product owner of our service: Phishing Training. This means, he's getting paid to phish our customers and teach them how to spot them, which makes him perfect to talk about phishing. Benjamin talks about why technical solutions are not enough despite spam filters, two…
  continue reading
 
Hello and welcome back to USB our Guest, Cyber Security tips. I’m Theo, here to help you break down cyber security news and hacks and how they affect you. However, today I am interviewing Anyaacii a Linux in HPC Administrator. We recorded the interview in an open discord voice channel with video while monitoring chat with Text-to-speech developed b…
  continue reading
 
House passes reauthorization of U.S. surveillance program Roku says 576,000 accounts compromised in latest security breach Microsoft breach exposed federal agencies Thanks to today's episode sponsor, Conveyor It’s Conveyor again, the market-leading AI software for answering security questionnaires and securely sharing your security posture and docu…
  continue reading
 
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Mike Levin, deputy CISO, 3M Thanks to our show sponsor, Vanta When it comes to ensuring your company has top-notch security practices, things can get complicated fast. With Vanta, you can automate compliance for in-demand frameworks like…
  continue reading
 
Palo Alto Networks fixes several DoS vulnerabilities in PAN-OS operating system Sisense breach exposes customers to potential supply chain attack Threat actors gaming GitHub Search Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for…
  continue reading
 
BatBadBut: You can't securely execute commands on Windows https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/ FortiClient Linux Remote Code Execution https://www.fortiguard.com/psirt/FG-IR-23-087 Apple Threat Notifications and Protecting Against Mercenary Spyware https://support.apple.com/en-us/102174 New Tech…
  continue reading
 
CISA expands automated malware analysis US Cyber Command launched “hunt forward” missions Spectre v2: Linux Boogaloo CHECK OUT Capture the CISO season 2 here. Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-demand frameworks …
  continue reading
 
Rust Command API code execution vulnerability CVE-2024-24576 https://blog.rust-lang.org/2024/04/09/cve-2024-24576.html Adobe Updates: Magento Adobe Commerce CVE-2024-20759 CVE-2024-20758 https://helpx.adobe.com/security/products/magento/apsb24-18.html https://helpx.adobe.com/security.html Fortinet FortiOS And FortiProxy Vulnerability CVE-2023-41677…
  continue reading
 
Ukraine's head of cybersecurity suspended and assigned to combat zone Over 90,000 LG Smart TVs exposed to remote attack Microsoft exposed internal passwords in security lapse Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-de…
  continue reading
 
Cyberattack causes major disruptions for UK vet firm Data privacy bill pushes forward with bipartisan support Department of Justice hack exposes hundreds of thousands Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-demand fra…
  continue reading
 
A Use Case for Adding Threat Hunting to Your Security Operations Team. https://isc.sans.edu/diary/30816 Notepad++ Parasite Site https://notepad-plus-plus.org/news/help-to-take-down-parasite-site/ Hugging Face Pickle File Vulnerablities https://huggingface.co/blog/hugging-face-wiz-security-blog Google Considers V8 Sandbox no longer experimental http…
  continue reading
 
With the rapidly evolving challenges in global travel, trade, and security, we speak to Australian Border Force Commissioner, Michael Outram APM at the Milipol APAC and TechX Summit 2024 in Singapore. We discuss how border security been affected by technology and the current landscape, emerging threats, and the importance of fostering collaboration…
  continue reading
 
Government warns hospitals of hackers targeting IT help desks U.S. government contractor Acuity responds to alleged Five Eyes breach New York City becomes latest in municipal government hack attempts Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can auto…
  continue reading
 
Heartbleed 10th Anniversary https://heartbleed.com/ Possible Libarchive Backdoor Vulnerability https://github.com/libarchive/libarchive/pull/1609 Magento XML Backdoor https://sansec.io/research/magento-xml-backdoor Google Public DNS's approach to fight against cache poisoning attacks https://security.googleblog.com/2024/03/google-public-dnss-approa…
  continue reading
 
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by David Spark with guest Steve Gentry, Advisor, Clari Thanks to our show sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-demand frameworks like SOC 2, ISO 27001, and HI…
  continue reading
 
Closing the cybersecurity gap - acting fast against critical threats Aligning to current compliance standards without the heavy-lifting Leveraging AI-powered tools to maximise your security investments This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Mike Johnson, Global Cyber Threat & Incident Response Manager, Ver…
  continue reading
 
Classified Five Eyes data theft announced Cancer center data breach affects 800,000 Android Pixel phone zero-day flaws being exploited by forensic companies Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-demand frameworks li…
  continue reading
 
Slicing up DoNex with Binary Ninja https://isc.sans.edu/diary/Slicing%20up%20DoNex%20with%20Binary%20Ninja/30812 HTTP/2 Continuation Flood https://nowotarski.info/http2-continuation-flood-technical-details/ Dangers of CSS in HTML Email https://lutrasecurity.com/en/articles/kobold-letters/ Dan Mazzella: Infostealers in Automotive Headunits https://w…
  continue reading
 
Report criticizes Microsoft’s Chinese hack response NIST needs help with vulnerability backlog Chrome tests feature to prevent session hijacking Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-demand frameworks like SOC 2, IS…
  continue reading
 
Playing with xzbot: Some things you can learn from SSH traffic https://isc.sans.edu/forums/diary/Some%20things%20you%20can%20learn%20from%20SSH%20traffic/30808/ Google Proposes Device Bound Session Credentials (DBSC) https://blog.chromium.org/2024/04/fighting-cookie-theft-using-device.html Four More Ivanti Vulnerabilities https://forums.ivanti.com/…
  continue reading
 
Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This week we are joined by Jenn Calland, a seasoned Data Analyst, Analytics Engineer, former Platform…
  continue reading
 
CISA releases draft rule for cyber incident reporting Google now blocks spoofed emails for better phishing protection Breach at online shopping platform PandaBuy affects 1.3 million customers Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate com…
  continue reading
 
Chrome Incognito Mode Settlement https://www.wired.com/story/google-chrome-incognito-mode-data-deletion-settlement/ Google E-Mail Sender Guidelines FAQ https://support.google.com/a/answer/14229414?hl=en&fl=1&sjid=2270464422796374445-NC Cisco Updates and VPN Best Practices https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-de…
  continue reading
 
Google to delete Incognito tracking data Hallucinated software packages as a security vulnerability FCC investigating phone infrastructure security Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-demand frameworks like SOC 2,…
  continue reading
 
Loading …

快速参考指南