show episodes
 
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
GDPR Now! is brought to you by Data Protection 4 Business and Thisisdpo! Our podcast focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of speciali ...
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Grace, James and Nick are on a mission to find the best works of the fanfiction community. Join us each week as we explore a new fandom, learn about the most popular fan couples ("Ships") and review them objectively. Expect adult content and discussion of sexual topics throughout. Intro music by Matthew Dommett, more of his work can be found here: https://soundcloud.com/matthew-dommett
 
This is “Life, Death and Data Breach”, a podcast about the pains and pitfalls of dealing with sensitive data in large and unorganized company repositories. Jeanne Somma, insights executive and counsel with ayfie and seasoned eDiscovery Practicioner and Johannes Stiehler, CEO of ayfie and a linguist at heart discuss how to recognize and solve some of the challenges of discovering and protecting textual information. If you are a legal practicioner, data security officier or just interested in ...
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
Tanis is a bi-weekly podcast from the Public Radio Alliance, and is hosted by Nic Silver. Tanis is a serialized docudrama about a fascinating and surprising mystery: the myth of Tanis. Tanis is an exploration of the nature of truth, conspiracy, and information. Tanis is what happens when the lines of science and fiction start to blur... Support TANIS to hear exclusive MINI and BONUS EPISODES and more! http://patreon.com/tanispodcast Please rate and review on iTunes if you enjoy TANIS! http:/ ...
 
Things are changing fast in the world of financial technology. The BIG Podcast explores the impact of financial technology innovations on the every day person. Top financial industry guests will give us exciting insights into technologies that will shape the way we manage and spend our money.
 
Practice Management Nuggets is a weekly interview series with practice managers, healthcare providers, or trusted vendors who support healthcare practices. Topics help managers implement, maintain, or improve business and practice administration so that health care providers can focus on providing quality health care services. Hosted by Jean Eaton, your Practice Management Mentor, of Information Managers Ltd.
 
Marcus Gill is a yielded vessel to the will of God for his life. He has not only understood the will of God, but it has become the call on his life, to repair the breach, restore the old waste places, and lead the way to prosperity. His approach to ministry focuses on bridging the gap of cultures, ages, and society by offering a sound that is relative to every listener.
 
From the team that brought you the satirical TV news show China Uncensored comes a...well...less scripted look at China. Chris Chappell and his team are off the teleprompter and on the mic to interview China experts, or discuss the issues of the day. And frankly, anything else they feel like discussing.
 
The Gathering: A Time for Reflection, Revival & Resistance is a highly spiritual/issue-based monthly program to equip our community with resources for faithful reflection and public action on moral issues. Produced in North Carolina by Repairers of the Breach, the Gathering is co-hosted by the Bishop William J. Barber II and Jonathan Wilson-Hartgrove. Answer the call to action at breachrepairers.org.
 
Loading …
show series
 
Why I'm a happy man is todays podcast, also why I wasn't a happy man. Talk about the happiness within and how we can get it back in our lives. I was overwhelmed with a bit of sadness today, at some of the memories, please be patient. Just being candid and real, I want to be as real as possible so I can touch the spirits of people, let them know, lo…
 
EI-ISAC reports a curious election-related phishing campaign, widespread, but indifferently coordinated and without an obvious motive. Nitro discloses a “low impact security incident.” A breach at a law firm affects current and former Googlers. Finnish psychological clinic Vastaamo dismisses its CEO for not disclosing a breach promptly. Ben Yelin l…
 
This week, Apple has the need for speed, AT&T has DirecTV might be set up for a fire sale and also announcing layoffs and Gmail has changed its logo Show Notes: Apple’s “Hi, Speed” Event Apple is starting to ship devices from its stores AT&T might offload DirecTV for a “fire sale” AT&T plans layoffs Gmail has a new logo Google Doodle honors pioneer…
 
The Chinese military has gained access to the personal data on millions of influential people around the world, including Americans, and yes, including their Tiktok data. This was the findings of China expert Christopher Balding who's responsible for the Zhenhua data leak. Zhenhua is a Chinese company that was gathering data on millions of people w…
 
2020 has been an eventful year particularly in the cybersecurity industry where we have seen some major brands be hit by ransomware and phishing attacks. In this episode we discuss the hows and whys of some of these major breaches and discuss what organisations can do to mitigate such attack as we move in to a second lockdown. For more information …
 
Ransomware becomes endemic in the healthcare sector. Cyber metaphors--we read a good one this morning. Does your cyber insurance indemnify you against state-sponsored attacks? More guilty pleas in the ex-eBayers’ cyberstalking case. US Cyber Command and others advise everyone not to see foreign election meddling where it isn’t. David Defour looks a…
 
In 2016, Donald Trump told rally attendees that he could shoot someone on Fifth Avenue without losing voters. Since then, disqualifying pieces of investigative journalism have glanced off without impact on him or his base.On this week’s Kicker, David Remnick, editor of the New Yorker, and Kyle Pope, editor and publisher of CJR, assess how the media…
 
Not long ago, the CIOs of many universities in Ontario, Canada realized that, even if they had security personnel within their team, they couldn't provide security thought leadership. To address this need, they jointly funded a pilot program within ORION to assess the institutions' current state. The program quickly turned to make sure that they ca…
 
Some familiar threat actors--both nation-states and criminal gangs--return to the news: Venomous Bear, Charming Kitten, Wizard Spider, and Maze. Mike Benjamin from Lumen looks at the Mozi malware family. Our guest is Neal Dennis from Cyware on why it's time for organizations to step up their data sharing. And Big Tech’s day on Capitol Hill involved…
 
Join Ben, Billy, Hannibal, & Monty as they take a look at recent news and other craziness from the internet. What will the confirmation of Justice Amy Coney Barrett mean for the future of our country? Less than one week away, the POTUS race is heating up. Who will emerge victorious? Visit Tonight's Sponsor for 20% off your order by using the code: …
 
Most organizations recognize the importance of keeping their executive staff healthy and safe to protect the business from exposure and risk. However, many limit their understanding of the physical world, providing healthcare and personal security as the company's two standard services. Those that have matured to a point where they also look at thi…
 
US authorities warn that North Korea’s Kimsuky APT is out and about and bent on espionage, with a little cryptojacking on the side. As the US elections enter their endgame, observers point out that the appearance of hacking can be just as effective for foreign influence operations as the reality. CISA continues to tweet rumor control and election r…
 
We discuss Dr. Benjamin Smiths new book!In Understanding Modern Political Ideas, Dr. Benjamin Smith defines and critically evaluates the major political ideologies of the modern period in the light of classical political thought. Drawing on the insights of Thomas Aquinas, Aristotle, Plato, and others, Smith highlights the failures and shortcomings …
 
London, New York, Singapore, Rome, Sydney, San Paolo — Brazil, here we go. All over the World, cybersecurity principles are the same, but the way they apply to businesses is a different story. This story, actually. As security leaders, we must always remember to do the basics; to take care of the core cyber hygiene that will protect the businesses.…
 
If you have an appointment schedule with a lot of openings, you might need a patient recall program. If you don't have many recall appointments in your schedule, you might need a patient recall program. If you want to add additional or your first dental hygienist, you might need a patient recall program. If you have patients that haven't seen you f…
 
On this week’s show Patrick and Adam discuss the week’s security news, including: “Proud Boys” email campaign attributed to Iran in record time Sanctions for everyone! US doxes more adversary TTPs Katie Nickels and Chris Krebs join the show This week’s show is brought to you by attack simulation platform company AttackIQ. Carl Wright from AttackIQ …
 
Join Ben, Billy, & Poisoning the Well as they take a look at recent news and other craziness from the internet. A plot against Biden? A New Law called the "Karen Act"? Yes, Please! Visit Tonight's Sponsor for 20% off your order by using the code: peasants at checkout! http://www.mackweldon.com/peasants Listen to the most recent POST-SHOW here: http…
 
This episode jumps on the pandemic band wagon, only once. I had inquiries about why I haven't mentioned it or given a little bit of my time to the subject. Well here we go, as candid as can be, as objective and responsible as can be. At first kept my wording safe and used silly words to describe a virus and pandemic. We are so inundated with the su…
 
In the pilot episode, Rafal & Chris decide that the easiest way to ease themselves into a new show is by going for the high-dive - so they tackle passwords, authentication, authorization and accidentally find themselves discussing the entire realm of technical debt, implementation nightmares, and interoperability challenges that prevent actual secu…
 
A conversation with an Internet of Things (IoT) security researcher, tester and expert about smart doorbell and smart lock security. Guest(s) Andrew Tierney, Security Consultant, Pen Test Partners (@cybergibbons on Twitter) Hosts Limor Kessem Diana Kelley Resources PC Mag Best Video Doorbells: https://www.pcmag.com/picks/the-best-video-doorbells An…
 
The US Treasury Department sanctions a Russian research institute for its role in the Triton/Trisis ICS malware attacks. Coordinated inauthenticity with a commercial as well as a political purpose. The Clean Network project gains ground in Central and Eastern Europe. Rob Lee from Dragos on insights on the recent DOJ indictments of Russians allegedl…
 
Are we doing enough to ensure that electoral campaigns and elections are cyber secure and perceived as such by the citizens? The short answer is, of course not — it is never enough. For the long answer, listen up. As we often remind everyone on ITSPmagazine, cybersecurity awareness and education must become second nature, an integral part of our cu…
 
I've opened up on how I feel about love, its maybe corny to some but pertinent to a healthy happy life with that special one. I discuss a bit about dynamics, obstacles, barriers and freedom's, the do's and don't of and how to truly be free in love. Owning up to your inside and speaking the truth is how we secure a positive future for self or with a…
 
China systematically targeted Hunter Biden with business deals involving the Chinese state, intelligence, and even China's military, the People's Liberation Army. This is not the Hunter Biden laptop story from the NY Post! This is from a report based on publicly available documents that media have refused to cover. How much did Joe Biden know about…
 
Associate Professor of Computer Information Systems at the University of Tulsa Sal Aurigemma shares how his interest in how things worked shaped his career path in nuclear power and computers, Being introduced to computers in high school and learning about the Chernobyl event led Sal to study nuclear engineering followed by time in the Navy as a su…
 
With all that humans know about the diversity that makes our world so unique, we still assume that everyone thinks, learns, and lives in the same way. Cybersecurity training is not different: perspectives matter a lot. Most of the time, we expect that technology and processes will solve the problems that poorly-implemented technology and processes …
 
Ben-Gurion University researchers have developed a new artificial intelligence technique that will protect medical devices from malicious operating instructions in a cyberattack as well as other human and system errors. Complex medical devices such as CT (computed tomography), MRI (magnetic resonance imaging) and ultrasound machines are controlled …
 
Eric Strom is the Unit Chief of the Mission Critical Engagement Unit, Cyber Division. In this role, Mr. Strom oversees the FBI Cyber Division’s private sector outreach efforts to the 16 critical infrastructure sectors, forging partnerships with companies in those sectors to develop and share threat intelligence related to activities by sophisticate…
 
Join Ben, Billy, Jeff Holiday & Asterios for our LIVE reaction to the final Presidential debate of the 2020 Election! SUPPORT US: ►https://patreon.com/DP ►https://bit.ly/BraveAppDP ►https://bit.ly/BenBillyMerch ►https://streamlabs.com/drunkenpeasants ►https://youtube.com/DrunkenPeasants/join ►https://subscribestar.com/DrunkenPeasants ►PODSURVEY: ht…
 
Energetic Bear is back, and maybe getting ready to go berserk in a network near you, Mr. and Mrs. United States. Someone’s selling publicly available voter and consumer information on the dark web. Sanctions against the GRU for the Bundestag hack. The US sanctions Qods Force and associated organizations for disinformation efforts. Johannes Ullrich …
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login