Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
News, views and stories from the cyber front line. Sponsored by Netswitch Technology Management - https://www.netswitch.net/
A weekly podcast on cybersecurity and privacy from the cyberlaw practice at Steptoe and Johnson. Featuring Stewart Baker and Michael Vatis.
Exploring the Horizons we never touch, because we are already there....with Michael Kokal Available on iTunes, Spotify Stitcher, Google play, or wherever you find your favorite podcasts.
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
Security Nation is a podcast dedicated to celebrating the champions in the cybersecurity community who are advancing security in their own ways. We also cover the biggest events in security that you should know about.
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Corporate treasury and finance executives discuss their biggest challenges and insights: blockchain, fintech, cybersecurity, payments, risk, FP&A, budgeting, forecasting, leadership, career development, and more.
Discussions, tips, and debates around improving the communications and services that security vendors provide to their customers, the security buyer.
Hack the planet!
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
Grassroots Security Podcast was set up for two things: Provide better awareness about security including tips that hopefully most people can understand. And talk about what's happening in the news related to security and what it could mean for you. I try to make it fun yet informational and educational. I hope you enjoy it as much as I enjoyed making it.
Cybersecurity is complex. Its user experience doesn’t have to be. Each week, Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. Renee Small https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at: https://www.magnetichiring.com/book Christophe Foulon https://www.linkedin.com/in/christophefoulon/ Career Coaching - https://cpfcoaching.wordpress.com Support this podcast: https://anchor.fm/brea ...
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
A podcast all about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
Podcast for fans of supercomputing and other tech topics. Since 2012. Stay "tuned"! https://podcasts.apple.com/us/podcast/radio-free-hpc-podcast/id557931368 http://RadioFreeHPC.com
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
Thomas Hatch and Jimmy Chunga are The Hacks! Join them every week as they talk about nerd stuff. If you’re into cybersecurity, DevSecOps, SecOps, DevOps, all the Ops, infrastructure automation, network automation, configuration management, and open source then subscribe now. This will be your new favorite podcast! Because we know you’re thinking it...NO, they don’t live in their moms’ basements...this month.
Lighthearted security advice and banter from 1Password and guests.
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
Sleep at night knowing what's going on with your cybersecurity - America’s Leading Security Coach - FBI InfraGard Webinar Moderator - Network Security Since 1991 CraigPeterson.com
GovCast, a production of GovernmentCIO Media & Research, tells the personal stories of the government and industry leaders transforming the public sector, and the bits and pieces typically not covered by federal IT publications. Put on by GovernmentCIO Media & Research, we share untold stories about how these influencers got to where they are, their passions in and outside of technology and the roadblocks they’ve conquered.
Know what hackers really does in cyberspace, how they managed to hack into your accounts, the way they collect your information, there modes of operandi and how you can protect yourself. This show is all about hacking stories that will inspire, educate and entertain you.
A podcast from the National Association of State Chief Information Officers (NASCIO). Amy Glasscock and Matt Pincus interview guests (state CIOs, NASCIO members, strategic partners and colleagues) to get their unique stories and perspectives on state information technology, leadership and lessons learned.
Do boards and business leaders understand the risks? Is security improving, barely keeping up with threats, or falling painfully behind? And more importantly, if what kept us secure has stopped working, what do we need to do to fix it? Join host Brian Contos and his guests as they explore these questions on The Cybersecurity Effectiveness Podcast.
Discover the unique, strange, and often hilarious stories behind what it takes to lead cybersecurity efforts in an organization. Developed by Cisco, Security Stories is an interview-based podcast full of insights from those who are carving a path in this weird and wonderful industry. Discover more at https://www.cisco.com/c/en/us/products/security/securitystories.html
C
Cybersecurity and Compliance with Craig Petronella - CMMC, NIST, DFARS, HIPAA, GDPR, ISO27001


Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, social engineering scams as well as hints and tips from leading professionals to help you prevent hackers from penetrating your network and dropping ransomware or malware payloads. If you are worried about uneducated emp ...
Wise Monkey Security Podcast provides cybersecurity ideas and expertise in simple instructions for anyone to incorporate into their daily lives or professional career. This podcast describes how to reduce data collection, address censorship, and strengthen your right to privacy. Wise Monkey Security addresses cybersecurity Architecture, Engineering, Governance, Incident Response, Digital Forensics, and Personal Security.
Cybersecurity on the Front Lines is a new podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Sentinel IPS’ COO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
The ConnectWise Podcast Network is the source for insight, analysis, tips and commentary on everything MSPs need to know, with shows and produced by ConnectWise, the Platform for What's Next. From the latest in cybersecurity to strategies on how to achieve greater success with managed services, listen now to discover how you can unlock unlimited potential for your MSP business.
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
Join Zach Fuller, Mike Rotondo, and Lauro Chavez, three longtime cyber security professionals as they rant, rave, and tell you the nitty-gritty of cyber security that nobody talks about on their fancy website and tradeshow giveaways, all to help you protect your company from cyber criminals. Based on the international best-seller book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Practices", available now on Amazon.
UMBC Mic'd Up Podcast welcomes faculty, students, alumni, and industry thought leaders to share their insights and UMBC experiences.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and subscribe! See acast.com/privacy for privacy and opt-out information.
Here’s an Idea is a podcast series from Tech Briefs that goes behind the scenes of today's most innovative technologies and industries. Host Billy Hurley gives engineers, scientists, and industry experts the platform to discuss their process and share their insights. See acast.com/privacy for privacy and opt-out information.
Join us as we explore all things Industrial Automation. Brandon Ellis, owner & president of elliTek, has seen the good, the bad, and the great when it comes to automation. We'll delve into the challenges that manufacturers' face, find out what it doesn't have to..., and have some fun!
Thriving With Technology is the podcast from techwellness.com. Our Mission is to bring awareness, balance and health to our relationship with tech. Our new reality makes that harder than ever, BUT, it's not impossible. We’ll help you find it without having to abandon the technology that makes life easy, convenient and connected. We cover online privacy, EMF’s and Rf, along with screen addiction and other health issues that are part of our modern world. Join the movement today at techwellness.com
Cybersecurity Innovation Podcast is the show that experts in their field share the lessons they've learned, the tactics they use, and all other things that are driving innovation in the field.
The latest on cybersecurity threats and news from FireEye.
Fed up with tech hype and buzzwords? Looking for a tech podcast where you can learn and be inspired by real-world examples of how technology is transforming businesses and reshaping industries? Keep informed of the latest business and tech trends by listening to stories of other people in your field and how they are overcoming challenges with emerging technologies. Learn from the guest's actionable tips, and lessons learned to obtain greater clarity and how you can leverage technology. In th ...
SAE International explores critical topics in transportation cybersecurity with industry, government, and legal experts.
B
Breaking Into Cybersecurity


1
Special Edition: Breaking Into Cybersecurity w/ Julie Broadway - 02.24.2021
55:53
55:53
Play later
Play later
Lists
Like
Liked
55:53
Federal Career Connection is back to discuss the federal application process! Julie Broadway is the Deputy Program Director for Federal Career Connection. Throughout her federal career, Julie has been a catalyst throughout the Human Resource enterprise in areas to include staffing and placement, compensation, performance, classification and positio…
C
Cybersecurity and Compliance with Craig Petronella - CMMC, NIST, DFARS, HIPAA, GDPR, ISO27001


1
Craig Petronella and Sanjeev Verma discuss Preveil - A highly secure, CMMC and ITAR compliant end to end encrypted email and file storage
57:09
57:09
Play later
Play later
Lists
Like
Liked
57:09
Craig Petronella of Petronella Technology Group, Inc. and ComplianceArmor.com and Sanjeev Verma discuss a highly secure, CMMC and ITAR compliant, end to end encrypted email and file storage solution called Preveil that helps vastly accelerate compliance mandates with regulations such as CMMC, DFARS, NIST, ITAR, HIPAA, GDPR, and more. Be sure to con…
H
Human-Centered Security


1
How Do You Get People to Care About Cybersecurity? with Laura Nespoli
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50
Laura Nespoli is founder of Meshin Movement, a brand strategy consultancy. Laura has spent her career serving as a strategic problem-solver and brand storyteller across the sales marketing spectrum in many facets--from agency to client-side, media to creative, marketresearch to integrated marketing planning. Her professional focus is in helping bra…
T
The Cyber Rants Podcast


1
Episode 17 - Starting a Cybersecurity Career plus Insight for Employers
26:13
26:13
Play later
Play later
Lists
Like
Liked
26:13
The guys talk with Haidon Storro, who brings a different point of view to the conversation. Haidon is an exceptionally motivated cybersecurity professional who recently graduated college and started her career. She shares her journey from finding a passion in technology, to getting educated and finding her first full time role in the industry. It's…
C
Cybersecurity Chronicles


1
Little Known SIEM Secrets with Guest Expert Chandra Pandey
30:43
30:43
Play later
Play later
Lists
Like
Liked
30:43
Stanley and Sean of Netswitch are joined by special guest and SIEM automation expert Chandra Pandey to discuss: -- Why is dynamic machine learning & AI automation so important to security? -- How to cope with the dynamic threat model. -- Why CyberRisk governance is driving the monitoring and reaction to security events. -- How effective security au…
G
Grassroots Security: Cybersecurity for Everyone


1
Protecting You Through Security Filtered Domain Lookups | Grassroots Security (S2:E6)
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26
Protect your computer using a security-filtered Domain Name System (DNS) server configuration. Also hear about the Center for Internet Security (CIS) offering to protect US hospitals against malware through a similar method of DNS protection. Reference: https://grassrootsecurity.com/2021/02/22/protecting-you-through-security-filtered-domain-lookups…
T
The CyberWire Daily


1
The WatchDog Monero cryptojacking operation. “A criminal syndicate with a flag.” US Senator asks FBI, EPA for a report on water system cybersecurity. Cybercrooks placed on notice.
23:53
23:53
Play later
Play later
Lists
Like
Liked
23:53
Watch out for the WatchDog Monero cryptojacking operation. The US Justice Department describes North Korea as “a criminal syndicate with a flag.” CISA outlines the DPRK malware that figures in the AppleJeus toolkit. The Chair of the US Senate Intelligence Committee asks the FBI and EPA for a report on the Oldsmar water system cybersabotage incident…
Cyber: Court docs show FBI can unlock iPhones, access Signal messages https://www.zdnet.com/article/following-oldsmar-attack-fbi-warns-about-using-teamviewer-and-windows-7/ https://arstechnica.com/tech-policy/2021/01/whatsapp-users-must-share-their-data-with-facebook-or-stop-using-the-app/ Hackers access customers database by scamming UScellular st…
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-how-to-make-cybersecurity-more-efficient/ You're a new CISO told to hold headcount even and find the resources to do 20% more work. We're already maxed out. So how do we do more? Coming up next we're getting smart and more efficient with securi…
S
Security Stories

1
23: What really works in cybersecurity? With Wade Baker and Wolfgang Goerlich
44:53
44:53
Play later
Play later
Lists
Like
Liked
44:53
We're joined today by Wade Baker, co-founder of Cyentia Institute (@wadebaker) and Wolfgang Goerlich (@jwgoerlich), Advisory CISO at Cisco, for a fun discussion on security outcomes. Wade and Wolf dissect the results from Cisco's 2021 Security Outcomes Study, which seeks to answer the ultimate question, "What actually works in cybersecurity?" using…
T
The Tech Talks Daily Podcast


1
1488: Cybersecurity - Sharing and Analysis Centers (ISACs)
20:17
20:17
Play later
Play later
Lists
Like
Liked
20:17
Banks, retailers, and healthcare institutions have been some of the biggest targets for hackers for years. With large networks, hackers can breach platforms and access financial institutions' data, retailers' customer payment information, and patient files. With this looming threat continually growing in complexity, cybersecurity organizations need…
C
Cybersecurity on the Front Lines


1
Cybersecurity in Healthcare, with Firelands Regional Medical Center
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44
We’re starting a new podcast series devoted to providing practical advice to pros trying to tackle their day-to-day cybersecurity challenges in the real world. To get there, we’re interviewing a few of our partners and customers, representing organizations of all shapes and sizes, and getting to know all the tools, policies, and procedures they rel…
T
The Cyberlaw Podcast


1
Cybersecurity: A British Perspective
1:24:31
1:24:31
Play later
Play later
Lists
Like
Liked
1:24:31
The U.S. has never really had a “cyberczar.” Arguably, though, the U.K. has. The head of the National Cyber Security Center (NCSC) combines the security roles of the National Security Agency and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency. To find out how cybersecurity issues look from that perspective, we…
T
The CyberWire Daily


1
Shining a light on China's cyber underground. [Research Saturday]
25:11
25:11
Play later
Play later
Lists
Like
Liked
25:11
Guest Maurits Lucas from Intel471 joins us to discuss his team's research into cybercrime in China. Data from Intel 471 show that the Chinese cybercrime underground proliferates through use of common methods or platforms, but behaves differently in large part due to the caution that actors take with regard to their identity. While the average citiz…
A
August Brice • Thriving With Technology @ Tech Wellness


1
Professor Olle Johansson: The OG EMF Researcher Is Worried About The Future
40:10
40:10
Play later
Play later
Lists
Like
Liked
40:10
A quadrillion is 1, followed by 15 zeroes. 1,000,000,000,000,000. Today's guest says that is how much more EMF radiation we are exposed to today than we were a generation ago. August talks to Swedish professor Olle Johansson who is a pioneer in the study of the effects of EMFs--which come from all of our digital devices. Beginning in the 1970's, he…
T
The Tech Talks Daily Podcast


1
1512: The Tech Revolutionizing Real-Estate Business Development
26:46
26:46
Play later
Play later
Lists
Like
Liked
26:46
SetSchedule is the technology innovator revolutionizing the real-estate business and data services. The company’s multi-patented agnostic leads marketplace and SAAS products suite leverage AI-powered predictive data, trend insights, and automated marketing software tools to deliver better business efficiency to agents, teams, brokers, and other ver…
T
The CyberWire Daily


1
Oxford lab studying the COVID-19 virus is hacked. Zoom impersonation campaign. Senators would’ve liked to have heard from Amazon about Solorigate. NSA likes zero trust. NIST IoT guidelines.
27:45
27:45
Play later
Play later
Lists
Like
Liked
27:45
Oxford biology lab hacked. A Zoom impersonation phishing campaign afflicts targets in the EU. Senators disappointed in Amazon’s decision not to appear at this week’s SolarWinds hearing. NSA advocates adopting zero trust principles. CISA issues alerts on industrial control systems. The US Department of Homeland Security describes increases to its cy…
C
Cyber Security Today


1
Cyber Security Today - Week in Review for Feb 26, 2021
20:16
20:16
Play later
Play later
Lists
Like
Liked
20:16
On today's podcast, guest analyst Terry Cutler and I discuss whether companies should be forced to report cybersecurity incidents to a government body, and how external scanning of IT networks reveals a lot of information for hackersBy ITWC
U
UMBC Mic'd Up


1
Health IT: Contributing in a Meaningful Way
33:04
33:04
Play later
Play later
Lists
Like
Liked
33:04
The Health IT field is extremely people-centered and produces a tangible outcome that impacts most everyone in society. The healthcare environment is rapidly changing, creating an ever-present need for qualified professionals to step up and contribute to important work that can make a true difference in the lives of others. Dr. Erin Van Dyke, gradu…
B
Breaking Into Cybersecurity


1
#CISOThursdays: Breaking Into Cybersecurity + James Azar + Naomi Buckwalter + Dr Dan 02.25.21
56:08
56:08
Play later
Play later
Lists
Like
Liked
56:08
It’s #CISOThursdays @ 1pm, our new time! The #221in2021 #infosechires challenge is still on and we have gotten 15 people hired so far! Join James Azar, CISO Talk podcast host, Naomi Buckwalter, CISO extraordinaire, Dan Schaefer, peak performance coach, & the crew for a lively discussion. About Breaking Into Cybersecurity: This series was created …
S
Security Nation


1
Datto’s Ryan Weeks Discusses a CISO’s Unique Role in Crafting a Pandemic Response
44:46
44:46
Play later
Play later
Lists
Like
Liked
44:46
In our latest episode of Security Nation, Ryan Weeks joined the podcast to discuss deploying thousands of assets into a hostile environment: the home offices of workers everywhere as they were forced remote amidst the pandemic. He’ll discuss how he balances privacy expectations with necessary regulations of workers’ computers and phones as they go …
T
The Threatpost Podcast


1
Sponsored Podcast: Ransomware Attacks Exploded in Q4 2020
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03
Ransomware attacks continue to be a top security issue plaguing companies, with researchers from Fortinet's Fortiguard Labs saying they saw an explosion in ransomware activity towards the end of the fourth quarter of 2020.By Mike Mimoso, Chris Brook
C
Cyber Security Today


1
Feb. 26, 2021 - Conflicting reports on vulnerabilities, and a warning to the defence sector
5:02
5:02
Play later
Play later
Lists
Like
Liked
5:02
This morning's podcast reports on two studies of cyber threat trends, and a warning about targeted attacks on the defence sectorBy ITWC
T
The Tech Talks Daily Podcast


1
1511: MuleSoft - Exploring Insurance-as-a-Platform Tech
31:38
31:38
Play later
Play later
Lists
Like
Liked
31:38
MuleSoft is a SalesForce company famous for its integration and API platform. It makes it easy to connect data from any system to create connected experiences faster. It also enables insurance companies to modernize legacy systems, bring new products to market faster, and extend distribution channels. I wanted to learn more about how MuleSoft drive…
T
The CyberWire Daily


1
PLA spyware keeps Tibetans under surveillance. Cyber conflict between Ukraine and Russia, some conventionally criminal, other state-directed. US Executive Order addresses supply chain resilience.
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38
FriarFox is a bad browser extension, and it’s interested in Tibet. Ukraine accuses Russia of a software supply chain compromise (maybe Moscow hired Gamaredon to do the work). Egregor hoods who escaped recent Franco-Ukrainian sweeps are thought responsible for DDoS against Kiev security agencies over the weekend. A look at Babuk, a new ransomware-as…
T
The Cybertraps Podcast


1
Keeping Kids Safe Online By Self-Regulating with Joan Irvine Cybertraps 019
49:57
49:57
Play later
Play later
Lists
Like
Liked
49:57
Joan Irvine has worked in technology, sales, and marketing for companies such as ADP (Automatic Data Processing), System Development Corporation, and Goal Systems. For the last 20 years, she has been a leader in online child protection technology. In this episode we talk about how the cannabis industry can keep kids from purchasing their products b…
By Benild Joseph
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-should-finance-or-legal-mentor-cyber Cybersecurity leaders are constantly looking for ways to improve how they think about risk, and how they communicate risk. But they're not the only ones. Others have been managing risk long before CISOs exis…
C
ConnectWise Podcast Network


1
ConnectWise Tech Talk: Getting Started With Integrations
39:28
39:28
Play later
Play later
Lists
Like
Liked
39:28
Join the ConnectWise Invent team as they share details on the opportunities and tools available for extending ConnectWise products. The team will review how to access our APIs, resources available, the ConnectWise Marketplace and support options.
For the 190th episode of the Kaspersky Transatlantic Cable Podcast, Dave and I focus on two main topics: Facebook vs. Australia (and EU) & Clubhouse. We kick things off in the spot the cool kids are raving about on the Internets: Clubhouse. The invite-only, audio-focused iOS App has taken Silicone Valley and the social network conversation by storm…
T
The Tech Talks Daily Podcast


1
1510: Dentons - Exploring Big Tech, Politics and Policy Changes
41:33
41:33
Play later
Play later
Lists
Like
Liked
41:33
With Twitter recently hitting the headlines for silencing President Trump, many have questioned if tech giants now possess more power than governments. With increased polarization in society, many also blame tech and social media for division rather than uniting the global community. How did we get here? And how do we stop a tech lash from building…
E
End of the Road


1
Episode 166: Dustin Robinson, Esq/Decriminalization of Entheogens(Psychedelics)/Capitalism and Venture Capital in Cannabis and Psychedelic Therapy/Psychedelics in the Mainstream
57:49
57:49
Play later
Play later
Lists
Like
Liked
57:49
Dustin Robinson is the Founding Partner of Mr. Cannabis Law--a full-service law firm exclusively focused on cannabis and psychedelic industries. Dustin is licensed in Florida as an Attorney, a Certified Public Accountant, and a Real Estate Agent. He focuses his practice on providing legal, accounting, financial, and business consultation to various…
Most people know the age-old adage, “Don’t judge a book by its cover.” I can still see my grandmother wagging her finger at me when I was younger as she said it. But what if it's not the book cover we’re judging, but the title? And what if it’s not a book we’re analyzing, but instead a security bug? The times have changed, and age-old adages don’t …
T
The CyberWire Daily


1
Accellion FTA compromise spreads. Ocean Lotus is back. LazyScripter seems to represent a new threat group. Notes from the SolarWinds hearings. New ICS threat actors.
25:59
25:59
Play later
Play later
Lists
Like
Liked
25:59
As more organizations are affected by the Accellion FTA compromise, authorities issue some recommendations for risk mitigation. Ocean Lotus is back, and active against Vietnamese domestic targets. LazyScripter is phishing with COVID and air travel lures. SolarWinds hearings include threat information, exculpation, and calls for more liability prote…
U
UMBC Mic'd Up


1
The Art of Failing Up in Engineering and in Life
31:04
31:04
Play later
Play later
Lists
Like
Liked
31:04
“Failing is a stepping stone to progress,” says UMBC graduate faculty instructor, Dr. John J. Johnson, IV. Behind every success story is a story of where someone learned a lesson and grew stronger from that. In this episode of UMBC’s Mic’D Up podcast, Dr. Johnson shares his insights on the field of engineering, how students can best succeed, and pr…
C
Craig Peterson - America's Leading Security Coach


1
AS HEARD ON: WGAN Mornings News with Matt Gagnon: Texas Energy - Asleep at the Switch and State Vaccine Scheduling Websites are a Nightmare
10:13
10:13
Play later
Play later
Lists
Like
Liked
10:13
Good morning everybody! I was on WGAN this morning with Matt Gagnon. We really got into the power distribution issues in TX and it appears that the Energy department was really "asleep at the switch." Then we talked about the nightmare that these bureaucratic states are having with their vaccine scheduling websites. We discussed why they are having…
C
Cyber Security Today


1
Feb. 24, 2021 -An alert for Google Alert users, NetGalley and Bombardier hacked and more
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17
Today's podcast reports on an alert for Google Alert users, NetGalley and Bombardier hacked, how far back does a vulnerability go and moreBy ITWC
N
NASCIO Voices


1
Hiring a More Diverse Workforce with Ohio CIO Ervan Rodgers
25:21
25:21
Play later
Play later
Lists
Like
Liked
25:21
Matt and Amy have Ohio CIO Ervan Rodgers back on the podcast to talk about concrete steps he's taken to hire more women and minorities, the importance he places on mentorship, and his approach to responding to challenges in his career.By NASCIO
T
The Tech Talks Daily Podcast


1
1509: How to Integrate, Unify and Protect Your Knowledge Platforms
18:44
18:44
Play later
Play later
Lists
Like
Liked
18:44
Employees can now work anywhere and everywhere thanks to a long list of remote working tools and productivity apps. But remembering which app you saved your document, message, presentation, report, video, project plan, or a task list can be frustrating. Onna is an eDiscovery startup that raised $27M during the lockdown. The latest funding round was…
A
AFP Conversations


1
221. Erica Dhawan: Fostering Human Engagement in a Digital World
30:58
30:58
Play later
Play later
Lists
Like
Liked
30:58
In this episode of AFP Conversations, Jim Kaitz, President and CEO of AFP, is joined by Erica Dhawan, globally recognized leadership expert and AFP FinNext 2021 Virtual Closing Keynote, to preview her keynote: “Leading Digitally: Foster Human Engagement at Work.” As the founder and CEO of Cotential and co-author of the bestselling book Get Big Thin…
T
The CyberWire Daily


1
DDoS in hybrid war. Accellion compromise attributed. Initial access brokers. Agile C2 for botnets. US Senate’s SolarWinds hearing. US DHS cyber strategy. Shiny new phishbait.
24:06
24:06
Play later
Play later
Lists
Like
Liked
24:06
Ukrainian security services complain of DDoS from Russia. The Accellion compromise is attributed to an extortion gang. Digital Shadow tracks the rise of initial access brokers, new middlemen in the criminal-to-criminal market. A botmaster uses an agile C2 infrastructure to avoid takedowns. IT executives to appear at US Senate hearings on Solorigate…
Not too long ago, there was a story that made all of the industry trade publications. Elasticsearch created a huge stir by moving the core of their stack from Apache 2 to a registered license. Every time a large company does something like this, people instantly begin asking the question "are open source databases dead?" When experts pose this ques…
C
Craig Peterson - America's Leading Security Coach


1
AS HEARD ON - The Jim Polito Show - WTAG 580 AM: Texas Energy Problems -- Could Mass be in for Something Similar? and Apple Goes All In on 6G
12:43
12:43
Play later
Play later
Lists
Like
Liked
12:43
Good morning, everybody. I was on this morning on WTAG with Jim Polito. We discussed the power situation in Texas and then brought it home to Mass and talked about whether we could be in for anything similar. We also discussed Green Energy and Nuclear Energy. Then we got into 6G -- yes that is not a typo, Apple is developing their own chips and dit…
R
Random but Memorable


1
Mac Malware Hacker Poison with Patrick Wardle
46:23
46:23
Play later
Play later
Lists
Like
Liked
46:23
Mac-fans rejoice, as Patrick Wardle stops by to talk all things nerdy and Apple on the show today. Fresh off the 1Password virtual cruise, come and join us for some mac malware myth-busting, and discover the benefits mac users can expect from Big Sur and the M1 chip. We also uncover some horror stories in Watchtower Weekly this episode. With a hack…
This episode features an interview with Jason Fagone, journalist and author of The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine Who Outwitted America's Enemies. I wax enthusiastic about Jason’s book, which features remarkable research, a plot like a historical novel, and deep insights into what I call the National …
C
CISO-Security Vendor Relationship Podcast


1
Would You Look at that Unrealistic Licensing Deal?
38:00
38:00
Play later
Play later
Lists
Like
Liked
38:00
All links and images for this episode can be found on CISO Series https://cisoseries.com/would-you-look-at-that-unrealistic-licensing-deal/ CISOs know that salespeople want to make the best licensing deal they can possibly get. But unpredictability in the world of cybersecurity makes one-year licensing deals tough, and three-year licensing deals im…
I
Industrial Automation – It Doesn’t Have To…


1
Industrial Automation - It Doesn't Have To... Lag
1:00:27
1:00:27
Play later
Play later
Lists
Like
Liked
1:00:27
This episode is dedicated to the Edge - Edge Computing that is. Listen to learn all about Edge Computing. What is the Edge? Where is the Edge? What's the big deal? Brandon gives a down-to-earth explanation of what the edge is outside of manufacturing that nearly everyone can relate to. Find out what lives on the Edge in the world of manufacturing. …
T
The Tech Talks Daily Podcast


1
1508: Getting Back to the Point of Healthcare With Technology
31:08
31:08
Play later
Play later
Lists
Like
Liked
31:08
Point Health is a digital healthcare startup on a mission to make healthcare easy to find, easy to understand, and easier to afford for members of insurance plans and healthcare sharing organizations. The company recently announced the intent to acquire The Karis Group, an Austin-based company with 25 years of experience in healthcare billing negot…
T
The Cybertraps Podcast


1
Fie on Goodness! Child Access to Adult Content and Products Cybertraps 018
48:01
48:01
Play later
Play later
Lists
Like
Liked
48:01
In this episode, Fred and Jethro discuss the issues around child access to adult content and products on the internet. Many links and examples at Cybertraps.com Legal But Age-Restricted (in theory) Gambling Pornography Cigarettes Alcohol Prescription Drugs Weapons and Explosives Illegal Obscenity / Child Pornography Controlled Substances as defined…
T
The CyberWire Daily


1
Facebook takes down Myanmar military page. Chinese cyberespionage and cloned Equation Group tools. Supply chain compromises. Threat trends.
23:49
23:49
Play later
Play later
Lists
Like
Liked
23:49
Facebook takes down Myanmar junta’s main page. APT31 clones Equation Group tools. Silver Sparrow’s up to...something or other. Bogus Flash Player update serves fake news and malware. Effects of supply chain compromises spread. Clubhouse’s privacy issues. VC firm breached. CrowdStrike releases its annual threat report. We welcome Josh Ray from Accen…