Player FM - Internet Radio Done Right
Checked 14h ago
เพิ่มแล้วเมื่อ thirty สัปดาห์ที่ผ่านมา
内容由CISO Marketplace提供。所有播客内容(包括剧集、图形和播客描述)均由 CISO Marketplace 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal。
Player FM -播客应用
使用Player FM应用程序离线!
使用Player FM应用程序离线!
值得一听的播客
赞助
We're trying something different this week: a full post-show breakdown of every episode in the latest season of Black Mirror! Ari Romero is joined by Tudum's Black Mirror expert, Keisha Hatchett, to give you all the nuance, the insider commentary, and the details you might have missed in this incredible new season. Plus commentary from creator & showrunner Charlie Brooker! SPOILER ALERT: We're talking about the new season in detail and revealing key plot points. If you haven't watched yet, and you don't want to know what happens, turn back now! You can watch all seven seasons of Black Mirror now in your personalized virtual theater . Follow Netflix Podcasts and read more about Black Mirror on Tudum.com .…
Safe Internet By Default: Spain's Approach to Protecting Children Online
Manage episode 446921888 series 3604885
内容由CISO Marketplace提供。所有播客内容(包括剧集、图形和播客描述)均由 CISO Marketplace 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal。
This episode examines Spain's proactive approach to online child safety. We explore the Spanish Data Protection Agency's (AEPD) innovative framework for age verification and its emphasis on safeguarding children's rights in the digital age. COPAA, KOSA, TDPSA
125集单集
Manage episode 446921888 series 3604885
内容由CISO Marketplace提供。所有播客内容(包括剧集、图形和播客描述)均由 CISO Marketplace 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal。
This episode examines Spain's proactive approach to online child safety. We explore the Spanish Data Protection Agency's (AEPD) innovative framework for age verification and its emphasis on safeguarding children's rights in the digital age. COPAA, KOSA, TDPSA
125集单集
ทุกตอน
×Explore the complex and widespread cybersecurity threat landscape currently facing the European Union. This episode delves into the findings of recent reports, highlighting how geopolitical tensions and the rapid pace of digitisation are fueling a surge in malicious cyber activity. We discuss the substantial threat level assessed for the EU, meaning direct targeting and serious disruptions are realistic possibilities [previous turn]. You'll learn about the most reported attacks, including Denial-of-Service (DoS/DDoS/RDoS) and ransomware, and how threats against data are also prevalent. We break down the key threat actors – from financially motivated cybercriminals and well-funded state-nexus groups focused on espionage and disruption, to increasingly unpredictable hacktivists driven by geopolitical events. Discover how threats are evolving, including the shift in ransomware tactics, the rise of hacker-for-hire services, the use of AI in creating fake content and misinformation, and the persistent danger posed by the exploitation of unpatched vulnerabilities and sophisticated supply chain attacks. We also look at which sectors are most targeted, including public administration and transport, and peer into the future to understand how emerging technologies like AI and quantum computing will shape the threat landscape towards 2030. www.compliancehub.wiki/understanding-the-evolving-cybersecurity-threat-landscape-in-the-eu-an-in-depth-analysis-for-compliance/ https://gdpriso.com/ https://baseline.compliancehub.wiki/…
Incident response is a critical part of cybersecurity risk management and should be integrated across organizational operations. This episode explores the recommendations and considerations for incorporating cybersecurity incident response throughout an organization’s cybersecurity risk management activities, as described by the new NIST Special Publication (SP) 800-61 Revision 3. We'll discuss how NIST SP 800-61r3, a CSF 2.0 Community Profile, uses the NIST Cybersecurity Framework (CSF) 2.0 Functions to provide a common language and structure for these efforts. Learn how the Govern, Identify, and Protect functions support preparation activities, while the Detect, Respond, and Recover functions cover the incident response itself. We'll also highlight the crucial role of continuous improvement, feeding lessons learned back into the overall strategy. This guidance aims to help organizations prepare for incidents, reduce their number and impact, and improve the efficiency and effectiveness of detection, response, and recovery activities. This episode is intended for cybersecurity program leadership, cybersecurity personnel, and others responsible for handling cybersecurity incidents www.compliancehub.wiki/beyond-reaction-integrating-incident-response-into-your-cybersecurity-risk-management-strategy-with-nist-sp-800-61r3 https://irmaturityassessment.com https://cyberinsurancecalc.com…
Achieving cyber resilience is a complex and dynamic journey with no one-size-fits-all solution. This episode explores how organizations can significantly improve their cyber resilience posture by leveraging the shared experiences, insights, and front-line practices of their peers and the wider ecosystem. Drawing on insights from the Cyber Resilience Compass initiative, we discuss why sharing what works in practice is essential for building collective knowledge in the field. You'll hear how participating in consultations and workshops, engaging in information-sharing networks like ISACs and CERTs, collaborating with external parties, and learning from real-world case studies can provide vital inspiration and direction. Discover how this collaborative approach helps organizations identify effective strategies, shape their resilience roadmaps, make well-informed decisions, and transition towards a more consistent and future-ready approach, ultimately enhancing the resilience of the entire ecosystem. breached.company/navigating-the-digital-storm-why-shared-experiences-are-your-compass-to-cyber-resilience…
Join us as we delve into the European Data Protection Board's (EDPB) 2024 Annual Report to understand how they championed data protection in a year marked by significant technological and regulatory shifts. This episode will cover the key milestones and priorities outlined in the EDPB's 2024-2027 Strategy, designed to strengthen, modernise, and harmonise data protection across Europe www.compliancehub.wiki/edpb-2024-navigating-the-complexities-of-data-protection-in-a-rapidly-evolving-digital-landscape…
Join us as we delve into the key findings of the FBI's 2024 Internet Crime Complaint Center (IC3) Annual Report. This year marks the 25th anniversary of IC3, which serves as the primary destination for the public to report cyber-enabled crime and fraud. The report reveals a staggering new record for losses reported to IC3, totaling $16.6 billion in 2024. This represents a 33 percent increase from 2023. We'll explore the most impactful crime types by reported loss, including Investment fraud ($6.57 billion), Business Email Compromise ($2.77 billion), and Tech Support scams ($1.46 billion), which are collectively responsible for the bulk of reported losses. A major factor contributing to these losses is the increasing use of cryptocurrency, which served as a descriptor in 149,686 complaints and was associated with $9.3 billion in losses in 2024, a 66% increase in losses. We'll also examine the significant impact on different age groups, noting that individuals over the age of 60 suffered the most losses ($4.885 billion) and submitted the most complaints (147,127). For this age group, Investment fraud ($1.834 billion) and Tech Support scams ($982 million) resulted in the highest reported losses, and cryptocurrency was referenced in 33,369 complaints with over $2.8 billion in losses. The episode will also touch upon the IC3's core functions including collection, analysis, public awareness, and referrals, its role in partnering with law enforcement and the private sector, and notable efforts like the IC3 Recovery Asset Team which assists in freezing funds for victims of fraudulent transactions, demonstrating a 66% success rate in 2024, and Operation Level Up, which successfully notified victims of cryptocurrency investment fraud, resulting in estimated savings breached.company/the-2024-ic3-report-record-cybercrime-losses-highlight-escalating-digital-threats…
Navigate the complex cybersecurity landscape of Q2 and Summer 2025 as we delve into the escalating convergence of AI-driven cyberattacks, the persistent vulnerabilities of the expanding Internet of Things (IoT), and the challenges of establishing robust security and governance frameworks. Based on recent Q1 2025 incident data and expert projections, this episode explores the weaponization of AI in phishing, malware, and social engineering, the continued exploitation of poorly secured IoT devices, and the evolving tactics of ransomware and state-sponsored actors. We'll also discuss the crucial need for proactive defense, AI-augmented security, and adaptation to a fragmenting global regulatory environment. breached.company/strategic-cybersecurity-outlook-ai-iot-and-threat-actor-convergence-in-q2-summer-2025…
The first four months of 2025 witnessed an alarming surge in global cybersecurity incidents, with ransomware attacks reaching unprecedented levels. Join us as we dissect the key trends, including the evolution of ransomware tactics like double extortion, the increasing sophistication of social engineering fueled by AI and deepfakes, and the persistent exploitation of software vulnerabilities. We'll delve into major incidents like the crippling attack on Change Healthcare and the record-breaking Bybit cryptocurrency theft, highlighting the most targeted sectors such as healthcare, education, government, and manufacturing. Finally, we'll examine how organizations, law enforcement, and the evolving global regulatory environment, with key legislation like the EU's NIS2 and DORA, are grappling with this escalating cyber threat. breached.company/global-cybersecurity-incident-review-january-april-2025…
This podcast delves into the NIST Privacy Framework 1.1, a voluntary tool developed to help organizations identify and manage privacy risk while fostering innovation and protecting individuals' privacy. We explore its three core components: Core, Organizational Profiles, and Tiers, and how they enable organizations to understand, assess, prioritize, and communicate their privacy activities. Learn how to use this framework to build customer trust, meet compliance obligations, and facilitate dialogue about privacy practices. www.compliancehub.wiki/navigating-the-complex-world-of-privacy-with-the-nist-privacy-framework-1-1…
Dive into the dynamic world of offensive cybersecurity with insights from leading experts and real-world scenarios. We explore the critical role of techniques like penetration testing, adversary simulation, and red team exercises in proactively identifying vulnerabilities and strengthening defenses against evolving cyber threats. Understand how adopting an adversarial mindset and employing continuous assessment methodologies are essential for navigating today's complex threat landscape and building a resilient security posture. www.securitycareers.help/dont-just-scan-test-choosing-the-right-penetration-testing-partner https://cisomarketplace.services https://generatepolicy.com…
Explore the rapidly evolving landscape where artificial intelligence intersects with criminality and societal risks. Drawing on expert research, this podcast delves into the transformative potential of AI-enabled crime, from sophisticated financial fraud using deepfakes to the generation of child sexual abuse material, and the challenges this poses for law enforcement. We also examine the critical need for robust AI incident reporting mechanisms, as proposed with standardized key components for documenting AI-related harms and near misses. Join us as we unpack the threats, the defenses, and the policy reforms necessary to navigate this complex new frontier. breached.company/navigating-the-ai-frontier-confronting-ai-enabled-crime-through-robust-incident-reporting https://airiskassess.com https://cisomarketplace.services…
We delve into the urgent need for organizations to prepare for the era of quantum computing, which threatens to break today's standard encryption methods. We examine the "harvest now, break later" (HNDL) threat, where malicious actors are already collecting encrypted data for future decryption by quantum computers. Drawing upon information from sources like NIST and expert analysis, we discuss the development and standardization of quantum-resistant cryptographic algorithms such as CRYSTALS-Kyber (ML-KEM) and CRYSTALS-Dilithium (ML-DSA). We provide CISOs and cybersecurity professionals with key strategic considerations for a successful quantum-safe transition, including conducting a comprehensive cryptographic inventory and quantum risk assessment (QRA), prioritizing systems for migration, engaging with vendors, and fostering crypto agility. Join us as we navigate the challenges and opportunities of this critical cybersecurity revolution and help you take the necessary quantum leap to secure your future. www.securitycareers.help/the-quantum-clock-is-ticking-your-guide-to-navigating-the-post-quantum-cryptography-era https://quantumsecurity.ai https://risk.quantumsecurity.ai/…
Explore the escalating threats posed by artificial intelligence incidents, sophisticated disinformation campaigns like the Doppelgänger network targeting nations from France to Israel, and the cyber espionage activities of threat actors such as UAC-0050 and UAC-0006 as revealed by Intrinsec's analysis. We delve into the tactics, infrastructure, and narratives employed in these digital battlegrounds, drawing insights directly from recent intelligence reports. Understand the key components of AI incident reporting, the disinformation narratives amplified across different countries, and the evolving techniques of cyber intrusion sets targeting critical infrastructure and institutions. Join us as we unpack the complex landscape of AI risks, influence operations, and cyber warfare. breached.company/the-unseen-frontlines-navigating-the-intertwined-threats-of-ai-incidents-disinformation-and-cyber-espionage…
This podcast we are exploring the critical cybersecurity challenges facing today's interconnected urban environments. We delve into the evolving threats arising from smart city infrastructure and the Internet of Things (IoT), including ransomware attacks on critical infrastructure, the expanded attack surface created by interconnected devices, and strategies for building cyber resilience. Join us as we discuss best practices for municipalities, the importance of public trust, and the role of AI in both cyberattacks and defense. Stay informed and learn how we can collectively protect the future of our smart cities. www.securitycareers.help/navigating-the-cyber-threat-landscape-of-smart-cities https://cybersafe.city https://risk.secureiotoffice.world https://risk.secureiot.house…
Is your attack surface spiraling out of control with multi-cloud, SaaS, and third-party integrations? Join us as we delve into how AI-powered automation is becoming critical for modern Attack Surface Management (ASM). We'll explore the challenges organizations face in achieving comprehensive visibility and how AI provides viable solutions for enhanced asset discovery, proactive threat detection, intelligent risk prioritization, and faster incident response. Learn how AI acts as a force multiplier in cybersecurity, enabling a shift from reactive to proactive defense against evolving cyber threats. www.securitycareers.help/why-ai-powered-attack-surface-management-is-your-new-strategic-imperative https://risk.quantumsecurity.ai/ https://airiskassess.com/…
Welcome to Deep Dive, where we tackle complex topics head-on. In this episode, we delve into the fascinating and increasingly concerning world of deepfakes: AI-generated audio and visual content designed to deceive. We'll explore the technology behind deepfakes, from face-swapping to voice cloning the threats they pose to individuals, organizations, and even democratic processes and the ongoing efforts to detect and mitigate this emerging challenge. Join us as we break down the science fiction of today into the cybersecurity reality of tomorrow. www.myprivacy.blog/the-deepfake-dilemma-navigating-the-age-of-ai-generated-deception…
C
CISO Insights: Voices in Cybersecurity

In a world increasingly shaped by digital interactions and artificial intelligence, online scams are becoming more sophisticated and pervasive. Scam Savvy delves into the tactics employed by fraudsters, from exploiting emotions in charity and romance scams to leveraging AI for deepfakes and personalized phishing attacks. We unmask these deceptive practices and equip you with the knowledge to protect yourself in the evolving landscape of online crime. www.scamwatchhq.com/navigating-the-digital-deception-understanding-and-avoiding-online-scams-in-the-age-of-ai https://identityrisk.myprivacy.blog…
C
CISO Insights: Voices in Cybersecurity

This podcast dives into the critical world of vulnerability disclosure programs (VDPs), exploring how organizations and security researchers work together to identify and address security weaknesses. We'll examine the core principles that underpin effective VDPs, including establishing clear reporting channels and defined scopes, the importance of timely responses and good-faith engagement, and the crucial role of safe harbor provisions. We'll also delve into modern best practices such as automation in triage, integration with security workflows, adherence to coordinated vulnerability disclosure (CVD) norms, and the benefits of transparency in building community trust. Join us to understand how VDPs are becoming a strategic necessity for cyber resilience, fostering a collaborative security ecosystem. www.hackernoob.tips/diving-deep-a-researchers-guide-to-navigating-vulnerability-disclosure-programs www.securitycareers.help/establishing-a-vulnerability-disclosure-program-a-cisos-perspective https://irmaturityassessment.com https://cyberinsurancecalc.com…
Navigating the complex landscape of U.S. state data privacy laws can be challenging. Join us as we break down the key aspects of these regulations, including consumer rights, business obligations, data breach notification requirements, and enforcement trends. We'll explore the nuances of laws like the California Consumer Privacy Act (CCPA), the Virginia Consumer Data Protection Act (CDPA), the Colorado Privacy Act (CPA), and emerging legislation like the New York Privacy Act (if passed), helping businesses and consumers understand their rights and responsibilities in an ever-evolving digital world. www.compliancehub.wiki/navigating-the-maze-an-in-depth-look-at-u-s-state-data-privacy-laws https://globalcompliancemap.com https://cisomarketplace.services…
C
CISO Insights: Voices in Cybersecurity

Explore the exciting future of cryptocurrency payments through the lens of cybersecurity and privacy. We delve into the potential benefits and significant risks, offering insights into best practices and the crucial role of regulation in this evolving landscape. www.myprivacy.blog/navigating-the-crypto-landscape-an-in-depth-look-at-privacy-in-the-future-of-payments www.compliancehub.wiki/navigating-the-crossroads-compliance-and-privacy-in-the-cryptocurrency-realm…
C
CISO Insights: Voices in Cybersecurity

This podcast delves into the critical aspects of data privacy laws like GDPR and the Connecticut Data Privacy Law, alongside the essential Payment Card Industry Data Security Standard (PCI DSS) compliance for e-commerce success. We explore how retailers can craft clear privacy policies, manage user consent effectively, and implement stringent security measures to protect customer data and ensure secure online transactions in the evolving digital landscape. Join us for insights on building customer trust through adherence to regulations and best practices in digital retail security. www.compliancehub.wiki/navigating-the-complexities-of-compliance-in-digital-retail-a-comprehensive-guide…
C
CISO Insights: Voices in Cybersecurity

Dive deep into the rapidly evolving landscape of AI-powered cyberattacks with insights from cutting-edge research, including the framework for evaluating AI cyber capabilities developed by Google DeepMind. Explore how AI is shifting the balance between offense and defense in cybersecurity, potentially lowering the cost and complexity of sophisticated attacks while demanding new strategies for protection. Join us as we unpack the key findings, potential future threats, and essential considerations for safeguarding your digital world in the age of increasingly capable AI adversaries. breached.company/the-ai-cyberattack-horizon-understanding-the-emerging-threat https://airiskassess.com https://globalcompliancemap.com…
C
CISO Insights: Voices in Cybersecurity

Delve into the principles and practical applications of Zero Trust Architecture (ZTA), a modern cybersecurity paradigm that moves away from traditional perimeter-based security by embracing the core tenet of "never trust, always verify". Learn about the key components, tenets, and benefits of ZTA, as well as strategies for implementation in today's complex and distributed IT environments, including cloud, remote users, and diverse devices. https://www.zerotrustciso.com www.securitycareers.help/building-a-career-in-a-zero-trust-world-understanding-the-foundational-principles-of-modern-cybersecurity…
C
CISO Insights: Voices in Cybersecurity

Explore the critical cybersecurity challenges facing the financial services industry today, from the increased risk of data breaches and sophisticated cyber attacks to emerging threats like quantum computing and client-side vulnerabilities. Drawing insights from the cutting-edge solutions featured in the CYBERTECH100, we delve into innovative technologies like AI-powered threat detection, behavioral biometrics, post-quantum cryptography, and centralized access management that are revolutionizing how financial institutions protect their assets and customers. Join us as we unpack the complexities of the digital finance landscape and discover how to stay ahead of evolving cyber risks. www.compliancehub.wiki/navigating-the-digital-maze-a-comprehensive-guide-to-e-commerce-compliance…
C
CISO Insights: Voices in Cybersecurity

Navigating the complex world of healthcare cybersecurity. Join us as we delve into the HIPAA Security Rule, its purpose in safeguarding electronic Protected Health Information (ePHI), and the latest updates addressing evolving threats like AI and quantum computing. We'll break down compliance requirements, explore the impact of the HIPAA Omnibus Rule, and discuss best practices for maintaining the confidentiality, integrity, and availability of sensitive patient data. Stay informed and secure your digital healthcare landscape. www.compliancehub.wiki/mastering-hipaa-security-rule-compliance-protecting-your-digital-healthcare-landscape…
C
CISO Insights: Voices in Cybersecurity

Join us for SOC Insights, the podcast dedicated to demystifying the world of the Security Operations Center. We delve into the core functions of a SOC including collection, detection, triage, investigation, and incident response. Explore essential SOC tools like SIEMs, Threat Intelligence Platforms, and Incident Management Systems. Understand the critical role of threat intelligence, the proactive practice of threat hunting and the importance of metrics for measuring SOC performance. We'll also discuss the challenges faced by SOC teams, such as alert triage, the need for skilled staff, and the integration of automation and orchestration. Whether you're a seasoned security professional or new to the field, SOC Insights provides valuable perspectives on building and operating an effective cyber defense. www.securitycareers.help/the-nerve-center-of-cyber-defense-understanding-and-building-effective-security-operations-centers…
C
CISO Insights: Voices in Cybersecurity

Explore the dynamic landscape of digital forensics in the face of rapidly evolving technologies. We delve into the impact of trends like IoT, 5G networks, AI-driven attacks, advanced file systems (APFS, NTFS), cloud integration, and sophisticated anti-forensic techniques across Mac OS, network infrastructures, and Windows platforms. Join us as we unravel the challenges and emerging solutions for investigators striving to uncover digital evidence in an increasingly complex world. www.hackernoob.tips/digital-forensics-on-the-edge-navigating-emerging-technologies-across-platforms…
C
CISO Insights: Voices in Cybersecurity

Delve into the critical security vulnerabilities of Artificial Intelligence, exploring the dangerous world of prompt injection, leaking, and jailbreaking as highlighted in SANS' Critical AI Security Controls and real-world adversarial misuse of generative AI like Gemini by government-backed actors. Understand how malicious actors attempt to bypass safety controls, extract sensitive information and manipulate LLMs for nefarious purposes, drawing insights from documented cases involving Iranian, PRC, North Korean, and Russian threat actors. Learn about the offensive techniques used and the ongoing challenge of securing AI systems,…
C
CISO Insights: Voices in Cybersecurity

This podcast explores the multifaceted impact of artificial intelligence on the landscape of cybersecurity and military strategy. We delve into how AI is being leveraged for advanced cyber defense, including identifying vulnerabilities and accelerating incident response. while also examining the emerging cyberattack capabilities that AI can enable. Furthermore, we analyze the broader strategic risks and opportunities presented by the growing military use of AI, considering its implications for national security, international competition, and the future of conflict. www.myprivacy.blog/the-ai-revolution-in-cyber-and-strategy-a-double-edged-sword…
C
CISO Insights: Voices in Cybersecurity

Join us as we delve into the critical realm of risk management for General-Purpose AI (GPAI) and foundation models. Drawing insights from the UC Berkeley Center for Long-Term Cybersecurity's profile, we explore the unique risks associated with these increasingly multi-purpose AI systems, from their large-scale impact and potential for misuse to the challenges posed by emergent behaviors We examine frameworks and best practices for identifying, analyzing, and mitigating these risks, aligning with standards like the NIST AI Risk Management Framework and considering the implications of emerging regulations This podcast is essential listening for developers, policymakers, and anyone seeking to understand and responsibly navigate the rapidly evolving landscape of advanced AI.…
C
CISO Insights: Voices in Cybersecurity

Navigate the world of SOC 2 compliance specifically for SaaS companies. We break down the Trust Services Criteria (Security, Availability, Processing Integrity, Confidentiality, and Privacy) explain the difference between Type I and Type II audits, and offer best practices for achieving and maintaining your SOC 2 certification to build customer trust and gain a competitive advantage. Learn how to prepare for your audit, understand the importance of continuous monitoring, and leverage your SOC 2 report for business growth. www.compliancehub.wiki/soc-2-compliance-for-saas-companies-a-technical-deep-dive…
C
CISO Insights: Voices in Cybersecurity

Explore how artificial intelligence is transforming the core of organizational collaboration. We delve into the groundbreaking research from "The Cybernetic Teammate" study, revealing how AI-powered tools are impacting team performance, breaking down expertise silos, and even influencing social engagement in the workplace. Discover how individual AI users are matching and sometimes exceeding the output of traditional teams, and what this means for the future of work and organizational design. www.securitycareers.help/the-rise-of-the-cybernetic-teammate-how-ai-is-redefining-collaboration-in-the-modern-workplace Thank you to our sponsor: https://cyberagent.exchange…
C
CISO Insights: Voices in Cybersecurity

This podcast dives deep into the 2025 Annual Threat Assessment by the U.S. Intelligence Community, analyzing the most serious threats to U.S. national security posed by major state actors like China and Russia, non-state transnational criminals and terrorists such as ISIS, and the growing trend of adversarial cooperation. We explore the nuanced intelligence, long-term strategic challenges, and evolving tactics that shape the global security landscape. breached.company/the-shifting-global-security-landscape-insights-from-the-2025-annual-threat-assessment/…
C
CISO Insights: Voices in Cybersecurity

This podcast dives into the shocking findings of a live honeypot experiment that recorded over 570,000 cyber attacks in just seven days. We explore the attack trends, including brute-force attempts, stolen credentials, automated bots, and known vulnerabilities, offering valuable insights for SOC analysts, security researchers, and anyone curious about real-world cyber threats. Learn about attacker behavior, commonly exploited vulnerabilities, and actionable steps to make security teams smarter and better prepared. breached.company/the-relentless-tide-understanding-global-cyber-attacks-and-breaches…
C
CISO Insights: Voices in Cybersecurity

Delve into the critical artificial intelligence trends shaping 2025, as highlighted in the statworx AI Trends Report. This podcast explores the rapid advancements in AI, the ongoing global competition for AI supremacy, the impact of European regulations like the AI Act, and the potential bursting of the AI investment bubble, offering insights for businesses and decision-makers.…
C
CISO Insights: Voices in Cybersecurity

Explore the dynamic world of artificial intelligence through a global lens, examining key trends identified in India and Africa. We delve into the balance between AI innovation and regulatory frameworks. Discover how AI is being applied for public sector transformation in India, addressing accessibility and leveraging multilingual capabilities. We also critically analyze the concept of trustworthy AI from African perspectives, considering ethical implications, data justice, and the need for Afrocentric approaches that prioritize local values and community benefits over global tech interests. Join us as we navigate the complexities of AI development and deployment across diverse cultural and societal landscapes, discussing challenges like bias, governance, and the crucial pursuit of responsible and trustworthy AI for all. https://www.compliancehub.wiki/navigating-the-ai-landscape-compliance-considerations-in-india-and-africa…
C
CISO Insights: Voices in Cybersecurity

Delve into the key cybercrime trends observed in 2024 by Israel National Crime Directorate (INCD), from the pervasive use of infostealers and the rise of encryption-less ransomware to the emerging threats involving AI and decentralized technologies. We analyze how cybercriminals are adapting their tactics, the impact of law enforcement actions, and what these shifts foreshadow for the cyber threat landscape in 2025. breached.company/understanding-the-2024-cyber-threat-landscape-insights-for-our-community…
C
CISO Insights: Voices in Cybersecurity

This podcast delves into the findings of the European Union Serious and Organised Crime Threat Assessment (EU-SOCTA) 2025, exploring the changing DNA of serious and organised crime in Europe as it becomes increasingly nurtured online and accelerated by AI and other new technologies. We examine the destabilising impact of these criminal activities on society, the growing intersection with hybrid threats, and the key areas of concern identified by Europol, including cyber-attacks, online fraud, drug trafficking, and more. Join us as we unpack the intelligence-led analysis shaping the EU's fight against these evolving threats breached.company/understanding-the-evolving-threat-landscape-following-a-data-breach…
C
CISO Insights: Voices in Cybersecurity

This podcast delves into the findings of Red Canary's 2025 Threat Detection Report, dissecting the major cybersecurity trends observed in 2024. We explore the surge in ransomware, increasingly sophisticated initial access techniques like "paste and run," the dramatic rise of identity attacks targeting cloud environments, persistent vulnerability exploitation, the proliferation of stealer malware on Windows and macOS, the emergence of state-sponsored insider threats, the consistent abuse of VPNs, the growing landscape of cloud attacks, and the dominance of stealers in Mac malware. Understand the implications of these trends and how organizations can shift their security strategies towards early detection and effective response across endpoints, identities, and cloud resources, moving beyond prevention to identify and mitigate threats before they cause significant harm. breached.company/learning-from-the-shadows-key-insights-from-the-red-canary-2025-threat-detection-report-for-breached-companies…
C
CISO Insights: Voices in Cybersecurity

Are you struggling to understand and manage your organization's data security risks? Based on the latest insights, we delve into the key challenges hindering effective data protection, including gaps in risk understanding, the critical misalignment between management and staff on security strategies, the limitations of existing security tools, and the shift from reactive compliance to proactive, risk-based approaches. Join us as we unpack these issues and explore the path towards a stronger data security posture. www.securitycareers.help/bridging-the-gaps-in-the-cloud-why-understanding-and-alignment-are-key-to-effective-data-security-risk-management…
C
CISO Insights: Voices in Cybersecurity

Dive into the alarming world of secrets sprawl, exploring the growing number of exposed API keys, passwords, and other sensitive credentials across development environments, collaboration tools, and cloud platforms. Based on the latest data analysis from GitGuardian's "The State of Secrets Sprawl 2025" report, we uncover the primary risk categories and attack vectors, the cascade effect of minor leaks, and the critical timelines that make rapid remediation essential. We'll also discuss the challenges organizations face, from the limitations of secrets managers and the dangers of excessive permissions to the persistent problem of unfixed exposed credentials and the overlooked risks in collaboration tools. Join us to understand the real-world impact of secrets sprawl and learn strategies for effective management and mitigation. www.securitycareers.help/the-state-of-secrets-sprawl-a-critical-risk-imperative-for-cisos www.compliancehub.wiki/secrets-sprawl-a-compliance-nightmare-leading-to-potential-privacy-fines…
C
CISO Insights: Voices in Cybersecurity

This podcast breaks down the complexities of the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) framework. We delve into the fundamental differences between Level 1's basic safeguarding requirements, Level 2's alignment with NIST SP 800-171 Rev 2, and Level 3's enhanced security based on NIST SP 800-172 and government assessment. Understand the distinct security requirements, assessment processes (self-assessment vs. certification by C3PAOs or DIBCAC), and prerequisites for each level to ensure your organization can confidently navigate the CMMC landscape. www.compliancehub.wiki/navigating-cmmc-compliance-for-your-defense-contractor-website…
C
CISO Insights: Voices in Cybersecurity

This podcast delves into the growing privacy vulnerabilities and cybersecurity risks inherent in the deeply interconnected systems of modern smart cities. We explore the challenges of data protection, the expanding attack surface created by IoT devices, and the governance and regulatory gaps that can leave urban environments vulnerable to exploitation. Join us as we examine the threats and discuss potential solutions for building more secure and privacy-respecting smart urban futures. www.secureiotoffice.world/the-intelligent-workspace-leveraging-iot-for-a-smarter-office www.secureiot.house/securing-your-connected-sanctuary-navigating-privacy-and-cyber-threats-in-your-smart-home…
C
CISO Insights: Voices in Cybersecurity

This podcast delves into the findings of Lithuania's "National Threat Assessment 2025," dissecting the primary external state actors posing the most significant risks to its national security. We examine the multifaceted threats emanating from an increasingly aggressive Russia, Belarus with its growing dependence, and an increasingly hostile China, exploring their strategies and potential impact on Lithuania and the wider region. breached.company/unpacking-the-perils-why-lithuanias-2025-security-threats-demand-your-attention…
C
CISO Insights: Voices in Cybersecurity

In an era where cyber and physical threats increasingly intersect, critical infrastructure faces unprecedented risks. This podcast delves into the crucial need for security convergence, exploring how organizations can break down security silos between IT, physical security, and operational technology (OT) to achieve a holistic and resilient defense. We examine the challenges of converging disparate security cultures and technologies, and highlight the benefits of a unified approach, including improved risk management, efficiency, and protection against hybrid threats. Drawing on expert insights and real-world examples, we explore strategies for strategic alignment, joint risk assessments, and the implementation of frameworks that foster collaboration and a stronger security posture for the foundational systems that underpin modern society. www.secureiotoffice.world/bridging-the-divide-why-converged-security-is-imperative-for-protecting-critical-infrastructure www.securitycareers.help/the-evolving-role-of-the-ciso-leading-converged-security-teams-in-a-cyber-physical-world…
C
CISO Insights: Voices in Cybersecurity

In this episode, we delve into the alarming rise of edge device exploitation in 2024 from the Check Point Threat Intel report, where cybercriminals and nation-states alike targeted routers, firewalls, and VPN appliances to gain initial access, establish ORBs for covert operations, and leverage a surge in zero-day vulnerabilities. We explore the tactics of groups like Raptor Train and Magnet Goblin, the challenges of patching these critical devices, and the implications for network security in the evolving threat landscape. breached.company/edge-wars-unpacking-the-escalating-exploitation-of-network-perimeters-in-2024…
欢迎使用Player FM
Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。