Cyber julkinen
[search 0]
Lisää

Download the App!

show episodes
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
 
Cyberpunk 2020 is a pen and paper/ table top role playing game, set in a dark future, as imagined in the 1980's media (Bladerunner, Akira, Ghost In The Shell). Cyberpunk 2020 is also the inspiration for the upcoming video game Cyberpunk 2077. Titus referees two pen and paper RPG noobs Pat and Lindsay for their first ever campaign.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Lore and News about Cyberpunk worlds including Cyberpunk 2077 (and Red, 2020), Blade Runner, Altered Carbon plus other dystopian future games, movies, shows, books & comics. Get awesome rewards & support the show: patreon.com/cyberpunklorecast Watch live on Sundays @ 9pm ET: youtube.com/c/robotsradio Advertise with us & business inquiries: robotsnetwork@gmail.com
 
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
 
​Cyber​ ​Context​ ​exposes​ ​the​ ​story​ ​behind​ ​the​ ​story​ ​with​ ​information​ ​security​ ​that​ ​increasingly​ ​defines​ ​our​ ​economy.​ ​The​ ​podcast​ ​features​ ​Jonathan​ ​Moore,​ ​chief​ ​technology​ ​officer​ ​of​ ​SpiderOak,​ ​a​ ​leading​ ​voice​ ​in​ ​cyber,​ ​software​ ​design,​ ​and​ ​business.​ ​Co-host​ ​Christian​ ​Whiton​ ​is​ ​a​ ​PR​ ​guy​ ​and​ ​former​ ​diplomat​ ​and​ ​banker.​ ​
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
 
C
Cyber Shots

1
Cyber Shots

(( CYBER SHOTS ))

Unsubscribe
Unsubscribe
Viikoittain+
 
A place for everyday life, take a shot with me and vibe out. Adult Zone and content. Not for everyone... feel free to check out happs tv. for the live stream and much more. Instagram digiital vibes Support this podcast: https://anchor.fm/richard-campbell/support
 
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
 
Welcome to Darnley's Cyber Cafe - cheers to a new smooth, bold podcast set on sailing you on this long journey of cybersecurity. Our host Darnley (Previously on Darn IT Podcast) will discuss topics about cybersecurity, business, IT, and everything in between. Sit back with your java (not script) and enjoy.
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. Connect with Renee Small on LinkedIn https://www.linkedin.com/in/reneebrownsmall/ Connect with Christophe Foulon on LinkedIn https://www.linkedin.com/in/christophefoulon/ Find out more about CPF-Coaching at https://cpf-coaching.com Develop Your Cybersecurity Career Path: How to Break into ...
 
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
 
C
CYBERSNACS

1
CYBERSNACS

Allianz für Cyber-Sicherheit

Unsubscribe
Unsubscribe
Kuukausittain
 
Die Allianz für Cyber-Sicherheit (ACS) gibt es jetzt auch „to go“ auf die Ohren. Jeden Monat sprechen wir mit Expert*innen aus der Wirtschaft und dem IT-Bereich zu Themen rund um Digitalisierung und Cyber-Sicherheit. In 30 Minuten nehmen wir uns die Zeit, verschiedene Blickwinkeln kennenzulernen. Dabei ist es unser Ziel sowohl technische Fragen zu klären, als auch Themen der Cyber-Sicherheit gesellschaftlich einzuordnen.
 
“In 2014, Alberto Daniel Hill, an expert in cybersecurity, found a security issue in a medical provider’s website. In reporting the issue, it led him to become the first person imprisoned in Uruguay for a computer-related crime—a crime he didn’t commit, and one that probably never even happened." I am Alberto and this podcast is about my story, cybersecurity and hackers. https://podcast.darkweb.today/ https://twitter.com/ADanielHill https://twitter.com/Darkwebtoday https://darkweb.today http ...
 
T
The Cyber Tap

1
The Cyber Tap

Purdue cyberTAP

Unsubscribe
Unsubscribe
Kuukausittain
 
Join Mat and Mike from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
 
Loading …
show series
 
Time for another round of security training. This time it’s John Strands Cyber Deception class. We’re also talking about job hunting Jason Blanchard style. LINKS 1. Active Defense & Cyber Deception w/ John Strand - Starts 1-24-22 2. Jason Blanchard: Twitter Account 3. Jason Blanchard: Twitch Account FIND US ON 1. Twitter - DamienHull 2. YouTube…
 
Use of Alternate Data Streams in Research Scans https://isc.sans.edu/forums/diary/Use+of+Alternate+Data+Streams+in+Research+Scans+for+indexjsp/28240/ Microsoft Resumes Windows Server 2019 Cumulative Updates https://www.bleepingcomputer.com/news/microsoft/microsoft-resumes-rollout-of-january-windows-server-updates/ Safari Index DB Leak https://finge…
 
CSCP is back with this brand new season 3 Paddy Viswanathan is the CEO and founder of C3M. C3M Cloud Control is a cloud security platform that helps cloud and security teams continuously monitor and manage their cloud security posture. Frank and Paddy discuss risk assessment in the cloud, how to prevent breaches associated with a third party, and t…
 
In this episode of Cyber Smart, host Zack Hack is joined by Dana Mantilia, Cybersecurity Training Expert, to discuss romance and relationship scams, staying safe in today's world of online dating, and more. • Resources on romance scams mentioned in this episode: https://www.beenverified.com/ ; https://socialcatfish.com/ ; https://romancescamsnow.co…
 
In today's podcast we cover four crucial cyber and technology topics, including: 1. Criminals create adobe accounts to steal Microsoft accounts 2. School district in New Mexico cancels school amidst cyber attack 3. North Korean actors use browser extension to spy on users; steal crypto currency 4. FCC proposes rule change to Telecom carriers increa…
 
New undetected backdoor runs across three OS platforms Microsoft RDP bug enables data theft, smart-card hijacking Ukrainian police arrests ransomware gang that hit over 50 firms Thanks to our episode sponsor, BlackBerry CISO’s…Listen Up. Is your team challenged with distinguishing threat signal from noise, reducing cyber costs and finding security …
 
Joseph Weiss (www.controlglobal.com/unfettered) is an industry expert on control systems and electronic security of control systems, with more than 40 years of experience in the energy industry. Mr. Weiss spent more than 14 years at the Electric Power Research Institute (EPRI), the first 5 years managing the Nuclear Instrumentation and Diagnostics …
 
Signal, the app, is synonymous with security. The end-to-end encrypted messaging platform is a go-to for discerning people who want to keep their communications private. Just remember to turn on the vanishing messages feature. But it’s CEO is stepping down. Moxie Marlinspike is out and Whatsapp’s Brian Acton is in. Motherboard staff writer Joseph C…
 
The Book of Boba Fett Episode 2 Review | BreakdownSUBSCRIBE 👉🏽👉🏾👉🏿 https://bit.ly/306mKTjOfficial TCN Merch 👉🏽👉🏾👉🏿 https://www.multiversemerch.comThe Cyber Nerds @JiCanWin @Geek Sensei &@Mr Blitztekspoiler review of and break down of @Star Wars The Book of Boba Fett Season 1 Chapter 2: The Tribes Of Tatooine --- Boba Fett faces new challenges on Ta…
 
Welcome to the first Cyber Security Brief of 2022! In this week’s podcast, Dick O’Brien and Brigid O Gorman chat about some of the biggest news stories of the last couple of weeks. The topics up for discussion in this episode include: FIN7 BadUSB attacks return, an interesting new multi-platform backdoor, and the latest way attackers are attempting…
 
Welcome to the first episode of the year 2022! Mike rang in the new year by being a little Covid slut. Johnny makes some big purchases and watches some hot new TV shows. A classic show.Enjoy!This episode is sponsored by Hempstreets!Use coupon code, HOOK, receive 15% of your ENTIRE purchase!hempstreets.comLeave us a voicemail at 219-552-1128For all …
 
Security managers develop security strategies that align with the organization's goals and objectives. In addition, they direct and monitor security policies, regulations and rules that the technical team implements. Knowledge in areas like information security governance, program development and management, incident response and risk management ar…
 
What is vulnerability chaining for those unfamiliar with it? Is it becoming more prevalent among malicious actors? Why do you think we traditionally look at vulnerabilities in isolation? How do we get organizations to shift their mindset of how they look at vulnerabilities? How can organizations get context to understand what vulnerabilities can be…
 
Join Allan as he discusses investing in cybersecurity startups with the perfect guest for the subject: Kathy Wang, CISO @ Very Good Security, investor at Silicon Valley CISO Investments, investor at Firebolt Ventures, and former founder as well! Allan and Kathy talk about investment goals, the process from start to finish, how to get started, the b…
 
Première partie de mon échange avec Rémi LAVEDRINE, Head of Application Security chez Chanel et co-fondateur de Wild & Secure. ✅ CONTENU✅ 02:22 - À propos du channel YouTube de Rémi 04:40 - Partage de document : cacher les infos non nécessaires, ne partager que le strict minimum + exemples des agents immobiliers, des watermarks et “barres noires” s…
 
The space race 2.0 is happening right now, how long until we hear about a satellite being hacked in space? Would this be a page out of SkyNet's handbook? We have entered a new era of space exploration, corporations are leading the race to make us multi-planetary along with the technology required to make that happen. In 2022, will we now hear about…
 
Today’s show is about the secure development of software, known as DevSecOpps, as our guest calls it. We look at how to secure software from the perspective of someone trying to break it. Our Guest Ted Harrington has a background as a “Hacker” but has now turned from the dark side of the force to use his skills to help develop secure software. Ted …
 
Breaking into Cybersecurity w Greg Hanniman (Ordinance Disposal to Cyber) 01/07/2022 https://www.linkedin.com/in/greg-hanniman/ https://www.withyouwithme.com About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry…
 
The cyber industry is notorious for merger and acquisition activity. Some go well, some come with collateral damage -- loss of employees, poor technology integration and leadership friction. Sue Graham Johnston, VP & GM of AI-Driven SD-WAN at Juniper Networks, talks with us about coming over from an acquisition and how she and the Juniper team have…
 
2021 is drawing to a close, and it’s time to look back on the events of the past year. At the same time we look ahead to the brand new year to come. Welcome to part one of a special two-part episode of Cyber Security Sauna. In this episode we’re joined by F-Secure’s Chief Research Officer Mikko Hypponen, Security Consultant Adriana Verhagen, and AI…
 
Loading …

Pikakäyttöopas

Tekijänoikeudet 2022 | Sivukartta | Tietosuojakäytäntö | Käyttöehdot
Google login Twitter login Classic login