show episodes
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Task Force 7 Radio is the Voice of Cyber Security around the globe. We feature up to date insights and analysis by preeminent cyber security professionals on the most important cyber security issues affecting your life today. Although the world of cyber security can be complex, our focus is to explain highly technical subject matter in non-technical terms. We cover topics that are of vital interest to the cyber security expert yet also will appeal to the novice interested in learning more ab ...
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over five million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
GDPR Now! is brought to you by Data Protection 4 Business and Thisisdpo! Our podcast focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of speciali ...
 
The Cyber Risk Management Podcast helps executives redefine cybersecurity from primarily a technology problem into a management opportunity. This podcast helps you learn how to manage cybersecurity in the same intelligent and thoughtful way you manage other areas of your business, including sales, order fulfillment, and accounts receivable. The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You will learn how to efficiently and effectively reduc ...
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Cybersecurity made simple. Come on a journey with our host Darnley G, to bring you through the rollercoaster of information security. We will discuss topics about any cybersecurity trending news, how to's, facts, who's been hacked, and even some tips to protect your business from cybercrime. Grab a cup of caffeine and enjoy!
 
Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.
 
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
 
Intrusion Diversity System (IDS) is a Cyber Security podcast hosted by O'Shea Bowens, Doug Bryant Jr and Sienna Delvasto. Doug, O'Shea and Sienna weigh in on their experiences as minorities within the Cyber Security space. By telling stories, sharing experiences, giving career advice and demonstrating security tips, tricks & tools O'Shea, Doug, and Sienna hope to inspire others to see how exciting and valuable a career in Cyber Security could be.
 
Loading …
show series
 
We’re using our project management process to migrate to new iPhones. It might seem like a simple process. It isn’t. Not when you have to migrate authentication apps for 2FA. If we’re not carful, we could lock our selves out of things. LINKS 1. Book: Project Management for the Unofficial Project Manager FIND US ON 1. Facebook 2. Twitter - DamienHul…
 
Update on Microsoft Exchange Vulnerability https://github.com/microsoft/CSS-Exchange/tree/main/Security https://github.com/nccgroup/Cyber-Defence/tree/master/Intelligence/Exchange https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-march-2-2021-kb5000871-9800a6bb-0a21-4ee7-b9…
 
Kim Grauer is the Head of Research at Chainalysis, where she examines trends in cryptocurrency economics and crime. Using Chainalysis data and software, she works with government agencies, exchanges, financial institutions, and insurance and cybersecurity companies to help solve some of the world’s most high-profile cyber criminal cases. Kim was tr…
 
Michael Fraser is the Co-founder, CEO, and Chief Architect at Refactr, a Seattle-based DevSecOps software startup. He is an Air Force Veteran, serial entrepreneur, and expert in cloud and cybersecurity. They discuss their concern and apprehension around low code, no code, and citizen developers. The episode is brought you by Security Phoenix Ltd wi…
 
Fake (right-wing) news does better than real news on Facebook Security firm Qualys says it was victimized in Accelion zero-day CISA issues emergency ‘fix Exchange zero-days NOW!’ directive Thanks to our episode sponsor, TrustMAPP The last audit firm that assessed your security compliance did the interviews, wrote a report, and then left. That’s jus…
 
If the cybercrime game has become a race to the bottom to find viable targets and small businesses are prime targets, then what are cybercriminals after? Even though your business may be small, that doesn't necessarily mean that it won't be a target for Cybercriminals. Here are 5 things that Cybercriminals want from your small business. Show Notes:…
 
Jennifer Brown is an award-winning entrepreneur, speaker, diversity and inclusion consultant, and author. As the successful founder, president, and CEO of Jennifer Brown Consulting, headquartered in New York City, Jennifer is responsible for designing workplace strategies that have been implemented by some of the biggest companies and nonprofits in…
 
Elie Bursztein joins us on today’s episode to talk all about his role as chief research lead for anti-abuse at Google! Along with Infosec Founder Jack Koziol and Cyber Work Podcast host Chris Sienko, they discuss the difference between the practices of security and anti-abuse, the difference between protecting Google the company and Gmail the produ…
 
Director of Security Operations for Online Business Systems Alain Espinosa rejoins co-host Andy Bonillo on Episode #172 of Task Force 7 Radio to provide his perspective on cyber resiliency during the pandemic and the recent weather events in Texas. Mr. Espinosa also discusses his perspective on the future of Security Operations and cybersecurity ta…
 
We’re continuing our new miniseries about privacy with cyber security researcher Hanna Linderstål. Hanna is the Founder and CEO of Earhart Business Protection Agency, a company providing research for governments and organisations on disinformation and online threats. Robby has invited Hanna to discuss modern cyber espionage and lawful intercept; th…
 
In this interview, Camille Stewart, Google’s Head of Security Policy for Google Play and Android explains how understanding how systemic racism influences cyber security is integral to protecting the American people and defending the country from cyber adversaries. The post Episode 205 – Google’s Camille Stewart: InfoSec’s Lack of Diversity is a Cy…
 
On this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O’Gorman discuss some of the biggest cyber security stories of the last few weeks. Among the stories up for discussion are the bugs in Accellion’s 20-year-old FTA product, which led to multiple companies worldwide reporting breaches related to it. We also talk about the reports sa…
 
Infosec conferences give cybersecurity professionals a chance to network, hear the latest research, exchange ideas, and demo hacks and new tools. But with so many conferences, how do you decide which ones to attend? How can you get the most out of your experience? Are they worth your time and money? What's it like to be a presenter, or even an orga…
 
Happy almost-mid-February! Today Gh0sthax cooked up some great news stories for us to chew on, including: Sudo bug gives root access to mass numbers of Linux systems! What the heck is hammering with GameStop stock? - this tweet does a great job of explaining it in plain English Solarwinds continues to be a gift that keeps on giving malware-laced gi…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login