show episodes
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
 
We know it can be challenging to secure your business, especially when you have limited time. The Get Cyber Resilient Show, brought to you by Mimecast, is the perfect way to stay up-to-date with the latest cyber developments across Australia and New Zealand. From cyber security to cyber awareness, your hosts Daniel McDermott and Garrett O'Hara will bring you insights and real stories from IT and Security Leaders, just like you. Don’t get angry at downtime and data breaches, Get Cyber Resilient!
 
Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession.
 
Join Mat and Mike from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
 
Join Zach Fuller, Mike Rotondo, and Lauro Chavez, three longtime cyber security professionals as they rant, rave, and tell you the nitty-gritty of cyber security that nobody talks about on their fancy website and tradeshow giveaways, all to help you protect your company from cyber criminals. Based on the international best-seller book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Practices", available now on Amazon.
 
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
 
C
C Suite

1
C Suite

Claudette McGowan

Unsubscribe
Unsubscribe
Monthly
 
The C Suite podcast is elevating cyber literacy for everyday people. Join Claudette McGowan, TD Bank’s Global Executive Officer for Cyber Security, as she explores how cyber-attacks happen and what we can do to avoid them. From phishing schemes to robocalls and even huge corporate hacks, on this show, Claudette meets with C Suite leaders to discuss cyber challenges and ways to help people become more protected and resilient.
 
Task Force 7 Radio is the Voice of Cyber Security around the globe. We feature up to date insights and analysis by preeminent cyber security professionals on the most important cyber security issues affecting your life today. Although the world of cyber security can be complex, our focus is to explain highly technical subject matter in non-technical terms. We cover topics that are of vital interest to the cyber security expert yet also will appeal to the novice interested in learning more ab ...
 
This series of short stories is intended to communicate core themes and concepts in cybersecurity through a series of short stories in a way that is fun and approachable to a broader audience than conventional analytical publications. The central driver of this project is the belief that we can use fiction as a tool to build bridges for complex topics and communities. The Cyber Moonshot series is a project designed to build a cybersecurity community that is connected and inspired - ready for ...
 
The Voice of Cyber ® KBKast brings you interviews, discussions, and presentations from global leaders across information security and emerging technology. We spend time understanding what they do, and unpacking their thoughts on the constantly evolving technology and people elements in the security industry as they pertain to an executive audience.
 
Mick Williams has spent years in the electronics, electronic retail, telecommunications and call center industries. He is well respected in the industry and gives his advice via U.S. media and to countries worldwide via the Internet. He has the pulse on technology (and their stocks), Internet, Sci-Fi, mobile, space, cord cutting and many more. He is also your “Digital Advocate” helping you know who in Washington is trying to tax or take away your digital rights! While many technology shows h ...
 
This is a weekly round-up of the most compelling cyber security intelligence originating from The Record and Recorded Future's research team — Insikt Group. Recorded Future is the global leader in security intelligence and every Friday we'll be highlighting the latest intelligence from criminal activity and nation state sponsored cyber campaigns to geo-political developments. Whether you're responsible for improving operational cyber security or strategically reducing risk, this podcast is f ...
 
The Bid Picture podcast presents lessons we can learn from fascinating cybersecurity topics, news, events, and incidents, and how those lessons could influence our decisions, thoughts, opinions, and lifestyle choices, as well as how everything fits together to form the bigger picture of online security in this digital age. Make sure you subscribe, rate, and review The Bid Picture podcast on Apple Podcasts, Stitcher, Spotify, Amazon Music, Google Podcasts, Pandora, TuneIn Radio, or anywhere y ...
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Loading …
show series
 
Cyber’s intro music has clips from various movies. The first is from WarGames, a 1983 film where a hacker squares off against an artificial intelligence that’s in control of the nukes. Almost forty years later and AI is beating people at Starcraft 2, which is not quite the organization of a nuclear war but can still feel scary. But how smart are th…
 
This is the audio-only version of our twice weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/talk On this episode, we focus on the following news story; NCSC Annual Review 2021: The Threat https://www.ncsc.gov.uk/collection/ncsc-annual-review-2021/the-threat The panel discussion is titled “Threat…
 
Emotet now spreads via fake Adobe Windows App Installer packages Data from 400,000 Planned Parenthood patients compromised Double extortion ransomware victims soar 935% Thanks to our episode sponsor, Votiro Your users need to accept and open files to do their jobs. Keep them safe and productive with Votiro. With Votiro zero trust file sanitization …
 
TA551 (Shathak) Pushes IcedID (Bokbot) https://isc.sans.edu/forums/diary/TA551+Shathak+pushes+IcedID+Bokbot/28092/ pip-audit scanning Python packages for known vulnerabilities https://pypi.org/project/pip-audit/ Wifi Router Flaws https://www.iot-inspector.com/blog/router-security-check-2021/ SANS Holiday Hack Challenge https://www.sans.org/mlp/holi…
 
This week, Mat and Mike are joined by Scott Schober from Berkeley Varitronics Systems to discuss signals protection equipment, protecting your personal devices, and the infamous Atari game, E.T. The Extra-Terrestrial ------------------------- Connect with Scott https://www.linkedin.com/in/snschober/ Berkeley Varitronics Systems https://www.bvsystem…
 
This week, Allan is joined by Frederick Lee aka “Flee”, Chief Security Officer and Head of IT at Gusto, Jeff Man, host of Security & Compliance Weekly, and notorious infosec curmudgeon, and by Kat Valentine, Security and Compliance Weekly co-host. A few weeks ago Allan appeared on their show to discuss “GRC: ‘What?’ and ‘So What?’. In that episode,…
 
In this episode, host Bidemi Ologunde presented a strategic overview of how tech companies are now looking toward Africa as they build out their internet infrastructure and take advantage of the higher energy efficiencies that data centers located in Africa provide. A key question will be how all of these affect the social, economic, and political …
 
A reply-chain incident is reported at a major international furniture and housewares retailer. North Korean operators are phishing for South Korean marks using bogus Samsung recruiting emails as phishbait. Fancy Bear has been seen pawing at Gmail. A regional escalation to civilian targets in the cyber conflict between Iran and Israel. More organiza…
 
In this week’s news episode our resident cyber experts review the most recent cyberattacks, explore their impact, and discuss what can be learned from them. Over the past week we have seen 3 large-scale attacks including GoDaddy who announced an attack that exposed the email and customer number of 1.2 million active and inactive Managed WordPress c…
 
CISOs face a huge list of challenges on a daily basis, but what are the most common ones that we can ban together on and attack? Amol Kulkarni, Chief Product Officer at CrowdStrike dives into how complexity is killing effective security and how new, innovative solutions -- like extended detection and response (XDR) -- can help simplify and harden c…
 
Ian Carpenter Present: // CYBER MONDAYEvery Month in a Monday a fantastic DJ set with music selected for youby Ian Carpenter.CYM#65Ian Carpenter @ Cyber Monday #65Social Links:Instagram: www.instagram.com/iancarpenter_official/ Facebook: www.facebook.com/IanCarpenter.official/ Soundcloud: @iancarpenter_official Mixcloud: www.mixcloud.com/IanCarpent…
 
On today’s podcast, Kyle McNulty of Secure Ventures talks about interviewing the people behind the most up-and-coming cybersecurity startups. We discuss the best advice he’s received on the show, how to get your own podcast off the ground and his own security startup, ConsultPlace. – Join the monthly challenge: https://www.infosecinstitute.com/chal…
 
Chief Information Officer of Ciena Craig Williams joins co-host Andy Bonillo on Episode #190 of Task Force 7 radio to discuss how taking risks in his career has paid off and the importance of focusing on the gift in your interactions. Craig also discussed how he builds organizations around PHD's (Passion, Heart, Drive) and how he challenges his lea…
 
Given your wide range of experience with AWS and cloud security - what would you say are some of the most common types of attacks for cloud platforms? What would you say are the top three skills someone should work on if they're interested in a career on a Red Team or as a penetration tester? Are there some really good resources or open-source tool…
 
Happy Thanksgiving folks! Join Mike and Johnny for a classic CSP episode with a little bit of holiday flare. Enjoy!This episode is sponsored by Hempstreets!Use coupon code, HOOK, receive 15% of your ENTIRE purchase!hempstreets.comLeave us a voicemail at 219-552-1128For all other podcast info head to linktr.ee/cybershindigpodcast…
 
The topic of application security has never been more important. So how are companies approaching appsec? What should companies do to ensure appsec gets the attention it needs? Antti Tuomi, who works in Japan, and Antti Vaha-Sipila (known as AVS), from Finland, join the show to share their thoughts on changes in application security, shifting left,…
 
Is being compliant the same as being secure? If you're meeting all the requirements, are you adequately protected? This week, the guys discuss the differences, nuances and overlaps between cybersecurity and compliance, plus how you can simplify alignment to multiple compliance requirements. Pick up your copy of Cyber Rants on Amazon. Looking to tak…
 
Most Cyber Insurance companies belong to multiple Threat Intel services and Security rating companies for monitoring and analyzing their customers security posture and their cyber insurance rates. Threat Intel is very valuable for the Cyber insurers for monitoring their clients deep dark web and other areas of concerns as another data set in their …
 
Welcome to first episode of The Cyber Moonshot brought to you by the Atlantic Council's Cyber Statecraft Initiative within the Scowcroft Center for Strategy and Security. We invite you to join us a few hundred years from now in a quaint little food court on the surface of the moon, in a world where software supply chains are tangible...and neon. In…
 
Many people are threatened with losing their jobs or violating their conscience. This episode talks about how you are not alone. I talk about standing up for what you believe in. Swim upstream if that's for you. Do not "go along to get along" if that does not comport with your values. Stand up. Be strong. Leave your employer if they force you to vi…
 
Prologue In this episode, we host a lady who only needs one name, like a movie or rock star. But "Jax" deals with topics we normal people don't have the stomach for, like CMMC and government security. In this episode, she joins us to talk about the current Executive Order on Cybersecurity ( Executive Order 14028, May 12, 2021 - https://www.federalr…
 
Multifactor authentication (MFA) is fast becoming a requirement for a secure business network. Not only that, it's becoming a requirement for a business to qualify for the added protection of cyber insurance. WatchGuard Technologies Director of Authentication Alexandre Cagnoni takes us through why multi-factor authentication is so important in the …
 
Marvel's Eternals Movie Review | BreakdownSUBSCRIBE 👉🏽👉🏾👉🏿 bit.ly/306mKTjOfficial TCN Merch 👉🏽👉🏾👉🏿 www.multiversemerch.comThe Cyber Nerds @JiCanWin @Geek Sensei & @Mr Blitztek review, Marvel Studios’ Marvel's Eternals MovieEternals is a 2021 American superhero film based on the Marvel Comics race of the same name. Produced by Marvel Studios and dis…
 
On Monday 25 October, as part of Australian Cyber Week 2021, we hosted our first ‘AustCyber after dark’ session where we stepped through the facets of a hypothetical cyber-attack on a hospital – the impacts on and responses of the medical system, government, crucial parts of our society and how it could impact us all. Through the eyes of Australia’…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login