show episodes
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
Thomas Hatch and Jimmy Chunga are The Hacks! Join them every week as they talk about nerd stuff. If you’re into cybersecurity, DevSecOps, SecOps, DevOps, all the Ops, infrastructure automation, network automation, configuration management, and open source then subscribe now. This will be your new favorite podcast! Because we know you’re thinking it...NO, they don’t live in their moms’ basements...this month.
 
C
Click Here

1
Click Here

The Record by Recorded Future

Unsubscribe
Unsubscribe
Weekly
 
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. Click Here. From The Record by Recorded ...
 
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. Connect with Renee Small on LinkedIn https://www.linkedin.com/in/reneebrownsmall/ Connect with Christophe Foulon on LinkedIn https://www.linkedin.com/in/christophefoulon/ Find out more about CPF-Coaching at https://cpf-coaching.com Develop Your Cybersecurity Career Path: How to Break into ...
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://anchor.fm/amplifiedandintensified/support
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
S
Smashing Security

1
Smashing Security

Graham Cluley, Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
America’s Leading Fractional Chief Information Security Officer. My team and I usually start with a scan of all devices on your network to determine what needs to be secured. Then we work with you to develop a complete plan to secure what needs to be secured on your networks. In certain cases, my team and I will help businesses source, monitor, and run their cybersecurity. I've been providing Cybersecurity to enterprises of all sizes, and Federal and State agencies since 1991.
 
CMMC4SMB takes the complexities of the CMMC program, Federal Acquisition Regulations (FARS) and Defense Federal Acquisition Regulations pertaining to cybersecurity, and makes them understandable and digestible for the small-to-midsize business person. Because when cybersecurity isn't your core competency, it can be overwhelming.
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
 
Cyber risk is a complex topic and part of a larger picture in your organization. Cyber risk is a strategic necessity for any organization to increase cyber resilience. In this podcast, we will have an open conversation on governance, risk, and compliance to move your organization from as-is to the next level. Here we will have discussions on program assessments, control assessments, risk identification, risk register, mitigation plans, and much more.
 
R
Reality 2.0

1
Reality 2.0

Katherine Druckman and Doc Searls

Unsubscribe
Unsubscribe
Monthly+
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
 
Bite-sized information about cybersecurity for not-for-profit boards and leaders. In each episode we help leaders of not-for-profits to understand the information security risks to their organisations and they leave with at least one actionable insight that they can put into practice. It also features interviews with not-for-profit leaders sharing their cybersecurity journey, insights and lessons learned.
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Loading …
show series
 
This episode reports on how a vulnerability in a VoIP system, nearly led to a ransomware attack, why files in open source registries should be handled with care, and a hacker is selling access to compromised Atlassian Confluence servers
 
Been to a Hospital Website Lately? Facebook May Have Your Personal Information! Hey, Facebook isn't the only company doing this, but there's an article from the markup. They did a study and caught Facebook. This is absolutely crazy -- receiving sensitive medical information. We're gonna talk about that right now. [Automated transcript follows] This…
 
📝Show notes: What help is available for small organisations to counter cyber threats? In this episode Michala Liavaag and Chris White explore several aspects of cybersecurity for small and medium organisations. Chris White is a detective inspector, working in the South East Regional Organised Crime Unit as a Police Cyber Security Advisor and Preven…
 
Peter Bordow is the senior vice president, principal architect and head of quantum systems and emerging technology for information and cybersecurity at Wells Fargo Bank. Before Wells Fargo. Anything that Bordow tells us today is his personal opinion and not the opinion or official position of Wells Fargo Bank. In this episode of Cybersecurity Unplu…
 
In Episode 143, host Bidemi Ologunde talked about the increasing demand for online health services and stimulants, which started trending upwards sometime in 2019, and how some startup companies have been spending millions of dollars on social media to advertise and make it easier to obtain prescription drugs that treat mental health issues such as…
 
Joining the podcast this week is John DiLullo, Chief Revenue Officer for Forcepoint and former CEO at LastLine Security, acquired by VMWare in 2020. He's spent decades in the security world. Speaking of world, as it has opened back up John has traveled the globe this year visiting every continent but Antarctica and shares insights from his many mee…
 
Picture this: You are a large organization with several, small subsidiaries that have different types of Cybersecurity protocols. How do you get them all under one roof? This week, the guys talk about inspecting different aspects of a large organization and assessing risk for one unit at a time to gain a larger image of the organization as a whole,…
 
Breaking into Cybersecurity: Tiffany L 6.17.22 https://www.linkedin.com/in/tiffanyl112358/ It’s really a conversation about what they did before, why did they pivot into cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way. About Breaking Into Cybersecurity: This series …
 
Chaim Mazal, SVP of Technology, VP of Security Information & CISO at Kandji, talks about the role of Chief Information Security Officer (CISO), the differences between company and product security, various cybersecurity threat vectors, and trends in mobile device management (MDM) solutions.www.kandji.iowww.securetalkpodcast.com…
 
Subscribe to the Control Loop Newsletter here with new editions published every month. UK Attorney General discusses hacking back in defense of critical infrastructure. Ethiopia says it stopped cyberattacks on its Nile dam. Recommended cybersecurity improvements for dams in the Southeastern US. Water system security. MITRE releases supply chain sec…
 
Gareth is the founder and CEO/CTO of a decentralized and encrypted email service called Telios. He's previously been a software engineer for over 13 years working in the automotive and banking industry, but in the last few years has shifted his focus towards building on the decentralized internet. This episode is available on YouTube: https://youtu…
 
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury (Treasury), and the Financial Crimes Enforcement Network (FinCEN) are releasing this joint Cybersecurity Advisory to provide information about the Karakurt data extortion group, also known as the Karakurt Team and K…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login