show episodes
 
Grassroots Security Podcast was set up for two things: Provide better awareness about security including tips that hopefully most people can understand. And talk about what's happening in the news related to security and what it could mean for you. I try to make it fun yet informational and educational. I hope you enjoy it as much as I enjoyed making it.
 
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. Renee Small https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at: https://www.magnetichiring.com/book Christophe Foulon https://www.linkedin.com/in/christophefoulon/ Career Coaching - https://cpfcoaching.wordpress.com Support this podcast: https://anchor.fm/brea ...
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
Thomas Hatch and Jimmy Chunga are The Hacks! Join them every week as they talk about nerd stuff. If you’re into cybersecurity, DevSecOps, SecOps, DevOps, all the Ops, infrastructure automation, network automation, configuration management, and open source then subscribe now. This will be your new favorite podcast! Because we know you’re thinking it...NO, they don’t live in their moms’ basements...this month.
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
GovCast, a production of GovernmentCIO Media & Research, tells the personal stories of the government and industry leaders transforming the public sector, and the bits and pieces typically not covered by federal IT publications. Put on by GovernmentCIO Media & Research, we share untold stories about how these influencers got to where they are, their passions in and outside of technology and the roadblocks they’ve conquered.
 
A podcast from the National Association of State Chief Information Officers (NASCIO). Amy Glasscock and Matt Pincus interview guests (state CIOs, NASCIO members, strategic partners and colleagues) to get their unique stories and perspectives on state information technology, leadership and lessons learned.
 
Discover the unique, strange, and often hilarious stories behind what it takes to lead cybersecurity efforts in an organization. Developed by Cisco, Security Stories is an interview-based podcast full of insights from those who are carving a path in this weird and wonderful industry. Discover more at https://www.cisco.com/c/en/us/products/security/securitystories.html
 
Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, social engineering scams as well as hints and tips from leading professionals to help you prevent hackers from penetrating your network and dropping ransomware or malware payloads. If you are worried about uneducated emp ...
 
Wise Monkey Security Podcast provides cybersecurity ideas and expertise in simple instructions for anyone to incorporate into their daily lives or professional career. This podcast describes how to reduce data collection, address censorship, and strengthen your right to privacy. Wise Monkey Security addresses cybersecurity Architecture, Engineering, Governance, Incident Response, Digital Forensics, and Personal Security.
 
Cybersecurity on the Front Lines is a new podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Sentinel IPS’ COO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
 
The ConnectWise Podcast Network is the source for insight, analysis, tips and commentary on everything MSPs need to know, with shows and produced by ConnectWise, the Platform for What's Next. From the latest in cybersecurity to strategies on how to achieve greater success with managed services, listen now to discover how you can unlock unlimited potential for your MSP business.
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
Join Zach Fuller, Mike Rotondo, and Lauro Chavez, three longtime cyber security professionals as they rant, rave, and tell you the nitty-gritty of cyber security that nobody talks about on their fancy website and tradeshow giveaways, all to help you protect your company from cyber criminals. Based on the international best-seller book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Practices", available now on Amazon.
 
Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and subscribe! See acast.com/privacy for privacy and opt-out information.
 
Here’s an Idea is a podcast series from Tech Briefs that goes behind the scenes of today's most innovative technologies and industries. Host Billy Hurley gives engineers, scientists, and industry experts the platform to discuss their process and share their insights. See acast.com/privacy for privacy and opt-out information.
 
Thriving With Technology is the podcast from techwellness.com. Our Mission is to bring awareness, balance and health to our relationship with tech. Our new reality makes that harder than ever, BUT, it's not impossible. We’ll help you find it without having to abandon the technology that makes life easy, convenient and connected. We cover online privacy, EMF’s and Rf, along with screen addiction and other health issues that are part of our modern world. Join the movement today at techwellness.com
 
Fed up with tech hype and buzzwords? Looking for a tech podcast where you can learn and be inspired by real-world examples of how technology is transforming businesses and reshaping industries? Keep informed of the latest business and tech trends by listening to stories of other people in your field and how they are overcoming challenges with emerging technologies. Learn from the guest's actionable tips, and lessons learned to obtain greater clarity and how you can leverage technology. In th ...
 
Loading …
show series
 
Federal Career Connection is back to discuss the federal application process! Julie Broadway is the Deputy Program Director for Federal Career Connection. Throughout her federal career, Julie has been a catalyst throughout the Human Resource enterprise in areas to include staffing and placement, compensation, performance, classification and positio…
 
Craig Petronella of Petronella Technology Group, Inc. and ComplianceArmor.com and Sanjeev Verma discuss a highly secure, CMMC and ITAR compliant, end to end encrypted email and file storage solution called Preveil that helps vastly accelerate compliance mandates with regulations such as CMMC, DFARS, NIST, ITAR, HIPAA, GDPR, and more. Be sure to con…
 
Laura Nespoli is founder of Meshin Movement, a brand strategy consultancy. Laura has spent her career serving as a strategic problem-solver and brand storyteller across the sales marketing spectrum in many facets--from agency to client-side, media to creative, marketresearch to integrated marketing planning. Her professional focus is in helping bra…
 
The guys talk with Haidon Storro, who brings a different point of view to the conversation. Haidon is an exceptionally motivated cybersecurity professional who recently graduated college and started her career. She shares her journey from finding a passion in technology, to getting educated and finding her first full time role in the industry. It's…
 
Stanley and Sean of Netswitch are joined by special guest and SIEM automation expert Chandra Pandey to discuss: -- Why is dynamic machine learning & AI automation so important to security? -- How to cope with the dynamic threat model. -- Why CyberRisk governance is driving the monitoring and reaction to security events. -- How effective security au…
 
Protect your computer using a security-filtered Domain Name System (DNS) server configuration. Also hear about the Center for Internet Security (CIS) offering to protect US hospitals against malware through a similar method of DNS protection. Reference: https://grassrootsecurity.com/2021/02/22/protecting-you-through-security-filtered-domain-lookups…
 
Watch out for the WatchDog Monero cryptojacking operation. The US Justice Department describes North Korea as “a criminal syndicate with a flag.” CISA outlines the DPRK malware that figures in the AppleJeus toolkit. The Chair of the US Senate Intelligence Committee asks the FBI and EPA for a report on the Oldsmar water system cybersabotage incident…
 
Cyber: Court docs show FBI can unlock iPhones, access Signal messages https://www.zdnet.com/article/following-oldsmar-attack-fbi-warns-about-using-teamviewer-and-windows-7/ https://arstechnica.com/tech-policy/2021/01/whatsapp-users-must-share-their-data-with-facebook-or-stop-using-the-app/ Hackers access customers database by scamming UScellular st…
 
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-how-to-make-cybersecurity-more-efficient/ You're a new CISO told to hold headcount even and find the resources to do 20% more work. We're already maxed out. So how do we do more? Coming up next we're getting smart and more efficient with securi…
 
We're joined today by Wade Baker, co-founder of Cyentia Institute (@wadebaker) and Wolfgang Goerlich (@jwgoerlich), Advisory CISO at Cisco, for a fun discussion on security outcomes. Wade and Wolf dissect the results from Cisco's 2021 Security Outcomes Study, which seeks to answer the ultimate question, "What actually works in cybersecurity?" using…
 
Banks, retailers, and healthcare institutions have been some of the biggest targets for hackers for years. With large networks, hackers can breach platforms and access financial institutions' data, retailers' customer payment information, and patient files. With this looming threat continually growing in complexity, cybersecurity organizations need…
 
We’re starting a new podcast series devoted to providing practical advice to pros trying to tackle their day-to-day cybersecurity challenges in the real world. To get there, we’re interviewing a few of our partners and customers, representing organizations of all shapes and sizes, and getting to know all the tools, policies, and procedures they rel…
 
The U.S. has never really had a “cyberczar.” Arguably, though, the U.K. has. The head of the National Cyber Security Center (NCSC) combines the security roles of the National Security Agency and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency. To find out how cybersecurity issues look from that perspective, we…
 
Guest Maurits Lucas from Intel471 joins us to discuss his team's research into cybercrime in China. Data from Intel 471 show that the Chinese cybercrime underground proliferates through use of common methods or platforms, but behaves differently in large part due to the caution that actors take with regard to their identity. While the average citiz…
 
A quadrillion is 1, followed by 15 zeroes. 1,000,000,000,000,000. Today's guest says that is how much more EMF radiation we are exposed to today than we were a generation ago. August talks to Swedish professor Olle Johansson who is a pioneer in the study of the effects of EMFs--which come from all of our digital devices. Beginning in the 1970's, he…
 
SetSchedule is the technology innovator revolutionizing the real-estate business and data services. The company’s multi-patented agnostic leads marketplace and SAAS products suite leverage AI-powered predictive data, trend insights, and automated marketing software tools to deliver better business efficiency to agents, teams, brokers, and other ver…
 
Oxford biology lab hacked. A Zoom impersonation phishing campaign afflicts targets in the EU. Senators disappointed in Amazon’s decision not to appear at this week’s SolarWinds hearing. NSA advocates adopting zero trust principles. CISA issues alerts on industrial control systems. The US Department of Homeland Security describes increases to its cy…
 
The Health IT field is extremely people-centered and produces a tangible outcome that impacts most everyone in society. The healthcare environment is rapidly changing, creating an ever-present need for qualified professionals to step up and contribute to important work that can make a true difference in the lives of others. Dr. Erin Van Dyke, gradu…
 
It’s #CISOThursdays​ @ 1pm, our new time! The #221in2021 #infosechires​ challenge is still on and we have gotten 15 people hired so far! Join James Azar, CISO Talk podcast host, Naomi Buckwalter, CISO extraordinaire, Dan Schaefer, peak performance coach, & the crew for a lively discussion. About Breaking Into Cybersecurity: This series was created …
 
In our latest episode of Security Nation, Ryan Weeks joined the podcast to discuss deploying thousands of assets into a hostile environment: the home offices of workers everywhere as they were forced remote amidst the pandemic. He’ll discuss how he balances privacy expectations with necessary regulations of workers’ computers and phones as they go …
 
MuleSoft is a SalesForce company famous for its integration and API platform. It makes it easy to connect data from any system to create connected experiences faster. It also enables insurance companies to modernize legacy systems, bring new products to market faster, and extend distribution channels. I wanted to learn more about how MuleSoft drive…
 
FriarFox is a bad browser extension, and it’s interested in Tibet. Ukraine accuses Russia of a software supply chain compromise (maybe Moscow hired Gamaredon to do the work). Egregor hoods who escaped recent Franco-Ukrainian sweeps are thought responsible for DDoS against Kiev security agencies over the weekend. A look at Babuk, a new ransomware-as…
 
Joan Irvine has worked in technology, sales, and marketing for companies such as ADP (Automatic Data Processing), System Development Corporation, and Goal Systems. For the last 20 years, she has been a leader in online child protection technology. In this episode we talk about how the cannabis industry can keep kids from purchasing their products b…
 
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-should-finance-or-legal-mentor-cyber Cybersecurity leaders are constantly looking for ways to improve how they think about risk, and how they communicate risk. But they're not the only ones. Others have been managing risk long before CISOs exis…
 
For the 190th episode of the Kaspersky Transatlantic Cable Podcast, Dave and I focus on two main topics: Facebook vs. Australia (and EU) & Clubhouse. We kick things off in the spot the cool kids are raving about on the Internets: Clubhouse. The invite-only, audio-focused iOS App has taken Silicone Valley and the social network conversation by storm…
 
With Twitter recently hitting the headlines for silencing President Trump, many have questioned if tech giants now possess more power than governments. With increased polarization in society, many also blame tech and social media for division rather than uniting the global community. How did we get here? And how do we stop a tech lash from building…
 
Dustin Robinson is the Founding Partner of Mr. Cannabis Law--a full-service law firm exclusively focused on cannabis and psychedelic industries. Dustin is licensed in Florida as an Attorney, a Certified Public Accountant, and a Real Estate Agent. He focuses his practice on providing legal, accounting, financial, and business consultation to various…
 
Most people know the age-old adage, “Don’t judge a book by its cover.” I can still see my grandmother wagging her finger at me when I was younger as she said it. But what if it's not the book cover we’re judging, but the title? And what if it’s not a book we’re analyzing, but instead a security bug? The times have changed, and age-old adages don’t …
 
As more organizations are affected by the Accellion FTA compromise, authorities issue some recommendations for risk mitigation. Ocean Lotus is back, and active against Vietnamese domestic targets. LazyScripter is phishing with COVID and air travel lures. SolarWinds hearings include threat information, exculpation, and calls for more liability prote…
 
“Failing is a stepping stone to progress,” says UMBC graduate faculty instructor, Dr. John J. Johnson, IV. Behind every success story is a story of where someone learned a lesson and grew stronger from that. In this episode of UMBC’s Mic’D Up podcast, Dr. Johnson shares his insights on the field of engineering, how students can best succeed, and pr…
 
Good morning everybody! I was on WGAN this morning with Matt Gagnon. We really got into the power distribution issues in TX and it appears that the Energy department was really "asleep at the switch." Then we talked about the nightmare that these bureaucratic states are having with their vaccine scheduling websites. We discussed why they are having…
 
Employees can now work anywhere and everywhere thanks to a long list of remote working tools and productivity apps. But remembering which app you saved your document, message, presentation, report, video, project plan, or a task list can be frustrating. Onna is an eDiscovery startup that raised $27M during the lockdown. The latest funding round was…
 
In this episode of AFP Conversations, Jim Kaitz, President and CEO of AFP, is joined by Erica Dhawan, globally recognized leadership expert and AFP FinNext 2021 Virtual Closing Keynote, to preview her keynote: “Leading Digitally: Foster Human Engagement at Work.” As the founder and CEO of Cotential and co-author of the bestselling book Get Big Thin…
 
Ukrainian security services complain of DDoS from Russia. The Accellion compromise is attributed to an extortion gang. Digital Shadow tracks the rise of initial access brokers, new middlemen in the criminal-to-criminal market. A botmaster uses an agile C2 infrastructure to avoid takedowns. IT executives to appear at US Senate hearings on Solorigate…
 
Not too long ago, there was a story that made all of the industry trade publications. Elasticsearch created a huge stir by moving the core of their stack from Apache 2 to a registered license. Every time a large company does something like this, people instantly begin asking the question "are open source databases dead?" When experts pose this ques…
 
Good morning, everybody. I was on this morning on WTAG with Jim Polito. We discussed the power situation in Texas and then brought it home to Mass and talked about whether we could be in for anything similar. We also discussed Green Energy and Nuclear Energy. Then we got into 6G -- yes that is not a typo, Apple is developing their own chips and dit…
 
Mac-fans rejoice, as Patrick Wardle stops by to talk all things nerdy and Apple on the show today. Fresh off the 1Password virtual cruise, come and join us for some mac malware myth-busting, and discover the benefits mac users can expect from Big Sur and the M1 chip. We also uncover some horror stories in Watchtower Weekly this episode. With a hack…
 
This episode features an interview with Jason Fagone, journalist and author of The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine Who Outwitted America's Enemies. I wax enthusiastic about Jason’s book, which features remarkable research, a plot like a historical novel, and deep insights into what I call the National …
 
All links and images for this episode can be found on CISO Series https://cisoseries.com/would-you-look-at-that-unrealistic-licensing-deal/ CISOs know that salespeople want to make the best licensing deal they can possibly get. But unpredictability in the world of cybersecurity makes one-year licensing deals tough, and three-year licensing deals im…
 
This episode is dedicated to the Edge - Edge Computing that is. Listen to learn all about Edge Computing. What is the Edge? Where is the Edge? What's the big deal? Brandon gives a down-to-earth explanation of what the edge is outside of manufacturing that nearly everyone can relate to. Find out what lives on the Edge in the world of manufacturing. …
 
Point Health is a digital healthcare startup on a mission to make healthcare easy to find, easy to understand, and easier to afford for members of insurance plans and healthcare sharing organizations. The company recently announced the intent to acquire The Karis Group, an Austin-based company with 25 years of experience in healthcare billing negot…
 
In this episode, Fred and Jethro discuss the issues around child access to adult content and products on the internet. Many links and examples at Cybertraps.com Legal But Age-Restricted (in theory) Gambling Pornography Cigarettes Alcohol Prescription Drugs Weapons and Explosives Illegal Obscenity / Child Pornography Controlled Substances as defined…
 
Facebook takes down Myanmar junta’s main page. APT31 clones Equation Group tools. Silver Sparrow’s up to...something or other. Bogus Flash Player update serves fake news and malware. Effects of supply chain compromises spread. Clubhouse’s privacy issues. VC firm breached. CrowdStrike releases its annual threat report. We welcome Josh Ray from Accen…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login