Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
Podcast francophone de vulgarisation des sujets de la cybersécurité, dans une ambiance décontractée. Animé par Michael VIRGONE, commercial et passionné de cyber depuis plusieurs années
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Your daily cybersecurity news for cyber professionals.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity Basement – der Podcast für echten Security-Content
suresecure GmbH, Michael Döhmen, Andreas Papadaniil
Herzlich Willkommen im Cybersecurity Basement. In unserem Podcast sprechen vor allem Andreas Papadaniil und Michael Döhmen alle 14 Tage über Themen aus dem Bereich Cybersecurity. Dabei legen wir großen Wert auf Objektivität gelegt. Kein suresecure-Feature-Fucking, sondern ein seriöser, authentischer und ehrlicher Austausch aus Theorie und Praxis. Der Podcast richtet sich an IT- und Security-Entscheider und alle, die es mal werden wollen. Hier gibts kein Blabla, sondern Security als Handwerk. ...
…
continue reading
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Welcome to “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidenc ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Cybersecurity
…
continue reading
1234, come la password che non dovreste mai scegliere. Come la password che la maggior parte degli utenti sceglie. Dalle truffe online agli intrighi internazionali, in ogni puntata approfondiamo la storia di cybersecurity del momento. A cura di Alberto Giuffrè
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
In this EM360 podcast, we investigate the cutting edge Cybersecurity issues that organisations are facing today. These discussions are led by the organisations at the forefront of defence as they walk us through the issues people are facing and how to effectively implement prevention strategies.
…
continue reading
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
A bi-weekly podcast where pressing cybersecurity and information technology issues are discussed.
…
continue reading
What risks lie at the intersection of healthcare and data? Are our food production capabilities at risk of cyberattack? How can we stay ahead of scammers, bad actors, and cybercriminals? Brought to you by the Cyber Innovation Hub and Business News Wales, and hosted by Carwyn Jones, the Cybersecurity Roundtables will bring together industry experts from across the cybersecurity landscape. These experts will discuss, on a sector-by-sector basis, the critical challenges facing the industry today.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
…
continue reading
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono di ogni tipo: le imprese (dalle grandi multinazionali alle Piccole e Medie Imprese); gli enti e le organizzazioni di ogni ordine e grado; i privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell’attacco, entità della struttura attaccata o danni provocati. Altri sono stati meno esposti alla luce dei media, ma hanno comunque creato grav ...
…
continue reading
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
…
continue reading
Welcome to Security Sutra, a sub-podcast of Startuprad.io™, dedicated to safeguarding your startup against cyber threats in today's digital landscape. As part of one of the top 20 entrepreneurship podcasts on Apple Podcasts worldwide, we bring you vital insights into cybersecurity, blending deep tech with entrepreneurship to empower your startup. Our podcast features a diverse range of guests, including industry-leading cybersecurity entrepreneurs, Emmy winners, New York Times best-selling a ...
…
continue reading
The podcast for sales and marketing teams that tackles the question: How can cybersecurity companies grow sales faster? We talk with cybersecurity CROs, CMOs, CEOs, as well as sales and marketing experts. Listen in, and you will get proven strategies to - help you get more leads - win more customers, and, - create your killer go-to-market growth engine. If you are a seller, marketer, leader, CEO, or founder at a cybersecurity company, you are in the right place.
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Today, software is the power that moves society. To stay in control over their intellectual property and remain competitive on the market software publishers and intelligent device manufacturers need to integrate top-notch protections against counterfeiting, reverse engineering, and tampering and implement an orchestration of license models that fully respond to the customer’s needs on a global scale. CodeMeter by Wibu-Systems is a comprehensive and award-winning suite of hardware-, software ...
…
continue reading
We are a discord community of cyber security enthusiasts. We host various "Ask Me Anythings" and put them here for people to enjoy any time they like. Discord: https://discord.gg/r4JxpJS
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
…
continue reading
Cybersicherheit kann man auch hören, in unserem Podcast. Abonnieren sie uns und hören sie, was Experten aus der Branche zu sagen haben, ohne dass sie selbst ein Experte sein müssen, um es zu verstehen.
…
continue reading
C:\bot_run is a K-12 Podcast produced by Technology Directors who are navigating the complicated and ever-changing realm of cybersecurity. Monthly episodes feature guests and topics designed around dialogue and resources focused on educating and networking with technology professionals.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
Cybersecurity Thought Leader Kevin Greene, explores the latest news and developments in cybersecurity and information assurance on his debut podcast, "Cybersecurity Insights & Perspectives”... Follow him at @iamkevtorious
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Host John Bambenek discusses complex cybersecurity issues
…
continue reading
L’heure de la cybersécurité est un podcast passionnant de sensibilisation et qui vous tient informés des dernières actualités sur la cybersécurité en Afrique et dans le monde.
…
continue reading
When a state-of-the-art chatbot unexpectedly exposes confidential corporate data, Maria is thrust into action, determined to uncover the underlying cause of this breach. This is the story from inside a hack: the twists and turns, the strategies that worked, and the lessons learned as Maria and her team strive to unraveling the layers of this mysterious incident and safeguard their client’s sensitive information.
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: info@4s-ag.de https://www.4s-ag.de
…
continue reading
SAE International explores critical topics in transportation cybersecurity with industry, government, and legal experts.
…
continue reading
Ingram Micro Cloud BeNeLux presents a monthly cybersecurity podcast. In this podcast you get the hottest and latest cybersecurity updates. Every month we take a deep dive in one specific cybersecurity subject with the best experts in the business.
…
continue reading
Pensez cybersécurité est un balado ayant pour objectif, de sensibiliser les Canadiennes et les Canadiens aux enjeux de cybercriminalité, et de les aider à travers une série de conseils à mieux protéger leurs données en ligne. Animation : Winy Bernard
…
continue reading
Welcome to The Rocheston Cybersecurity Podcast, your go-to podcast for demystifying cybersecurity concepts in a global context. Hosted by Haja Mo who has a passion for cybersecurity education, this podcast breaks down complex topics into easy-to-understand explanations, ensuring that listeners of all backgrounds can grasp essential cybersecurity principles. In each episode, we delve into various cybersecurity concepts, making it easy for everyone to understand. Whether you're a tech enthusia ...
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Can Your Java Cryptography Architecture Survive a Quantum Attack?
12:29
12:29
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
12:29
This story was originally published on HackerNoon at: https://hackernoon.com/can-your-java-cryptography-architecture-survive-a-quantum-attack. Learn how to optimize Java Cryptography Architecture (JCA) to withstand quantum computing threats, with best. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Infinidat Revolutionizes Enterprise Cyber Storage Protection, Combats Ransomware And Malware Threats
9:06
This story was originally published on HackerNoon at: https://hackernoon.com/infinidat-revolutionizes-enterprise-cyber-storage-protection-combats-ransomware-and-malware-threats. Sophisticated cyberattacks, including new sinister forms of AI-driven attacks, are increasingly targeting the data storage infrastructure of enterprises. Check more stories…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today, June 28, 2024 - Cyber authorities remind developers to switch to memory-safe coding languages
6:22
Are attacks cybercrime or hiding espionage? Researchers investigate in this episodeKirjoittanut Howard Solomon
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 73: Never Been Vished?
41:51
41:51
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
41:51
Alias CEO Donovan Farrow and Business Development Coordinator Trey Allen talk the tips and tricks of the vishing trade. They're gearing up for the DEFCON social engineering village. Listen or watch to hear their tales and experiences to learn how they're going to bring the heat to Las Vegas. Watch the full video at youtube.com/@aliascybersecurity. …
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/firetail-unveils-free-access-for-all-to-cutting-edge-api-security-platform. This initiative opens the door for developers and organizations of any size to access enterprise-level API security tools. Today, over 80% of all internet traff Check more stories related to cybers…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/the-role-of-data-destruction-in-cybersecurity. What happens to information when it's no longer necessary? If you're concerned with cybersecurity, you should destroy it. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also che…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Selling as a technical founder with Vincent Berk, Chief Strategy Officer, Quantum Xchange
41:59
41:59
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
41:59
Are you a technical founder struggling to navigate sales in your cybersecurity startup? Do you find it challenging to balance technology discussions with business outcomes? Are you curious when to bring in sales professionals for a consistent approach? In this conversation, we discuss: 👉 The journey of a technical founder learning sales through tri…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
This Month in German, Swiss, and Austrian (GSA) Startups - June 2024 | Startuprad.io
35:44
35:44
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
35:44
This Month in German, Swiss, and Austrian Startups - June 2024 | Startuprad.io Welcome to our June 2024 wrap-up, where we bring you the latest news from the startup and tech entrepreneurship scenes in Germany, Austria, and Switzerland, all in under 30 minutes! In this episode, recorded with Chris in New York City and Joe joining from Frankfurt, we …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Bereit für NIS2, die kleine Lokomotive?
34:10
34:10
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
34:10
Steigt ein in unsere kleine NIS2-Lok und erfahrt, wo es auf der Strecke noch Verspätungen gibt! An einigen Bahnhöfen sind die Bauarbeiten noch nicht abgeschlossen. Welche Streckenabschnitte werden tatsächlich in Betrieb genommen und wie sieht es mit der Haftung des Managements aus? Der Streckenplan muss von Anfang an tragfähig sein. Denn nach NIS2 …
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/cybersecurity-neglect-the-silent-killer-of-businesses. Cybersecurity neglect is a silent killer for businesses. Find out how to recognize the signs and take action to protect your business. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecur…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber-Safe Summer Travel Tips: On-the-Go Device Protection
20:22
20:22
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
20:22
Send us a Text Message. Have you ever wondered how to keep your data and devices secure while you're traveling for work or vacation? This episode of the Bee Cyber Fit podcast has you covered! We're talking all things secure summer travel: ▶️ hidden risks lurking on public Wi-Fi networks in hotels, airports, and other places ▶️ important tips to saf…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 89: How Threat Actors Are Using GenAI as an Enabler
31:17
31:17
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
31:17
In episode 89 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by the following guests: Rian Davis, Elections Cyber Threat Intelligence Intern at the Center for Internet Security® (CIS®) Timothy Davis, Sr. Elections Cyber Threat Intelligence Analyst at CIS Together, they discuss how cyber threat actors (CTAs) are using generative art…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today, June 26, 2024 - New vulnerability in MOVEit and a warning to WordPress administrators on poisoned plugins
8:44
This episode reports on an updated explanation of the hack of Los Angeles County's health department, an API coding error that led to a huge data breach in Australia, and moreKirjoittanut Howard Solomon
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Unpacking SBOMs: The Building Blocks of Software Security - Ep 103
33:11
33:11
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
33:11
In this episode, Stan Wisseman and Rob Aragao welcome Justin Young to explore the transformative role of Software Bill of Materials (SBOMs) in enhancing software supply chain security. Justin shares his extensive experience and insights into how SBOMs contribute to the maturation of the software industry, drawing parallels with the auto and food in…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SEC Cybersecurity Rulings: Are Public Companies Really Ready?
24:05
24:05
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
24:05
Craig Duckworth and Dino Busalachi discuss the pressing issue of cybersecurity compliance for publicly traded companies under new SEC regulations. They discuss the reasons behind the low number of reported breaches, including national security exemptions and potential corporate negligence. Craig and Dino address the challenges companies face in saf…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today, June 24, 2024 - Ransomware gang reportedly behind the hack of car dealership software provider
7:12
This episode reports on a warning to patch Serv-U applications, the workings of the Rafel trojan, and moreKirjoittanut Howard Solomon
…
continue reading
![Artwork](/static/images/128pixel.png)
1
#18 - 2024 Verizon DBIR
1:08:05
1:08:05
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
1:08:05
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Intro Agenda Who are you wearing? Nerd Zone Microsoft Patch Tuesday for June Rockstar Games Veeam vulnerability Microsoft researcher alerted the business of the SolarWinds hack, but was ignored Hot topic 2024 Verizon DBIR Introduction Key Findings Top Threat Ac…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Inside Job: The Subtle Ways Employees Bypass Security Measures
12:36
12:36
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
12:36
This story was originally published on HackerNoon at: https://hackernoon.com/inside-job-the-subtle-ways-employees-bypass-security-measures. Protect your business by understanding the subtle ways employees bypass security measures. Get insights and solutions to prevent data breaches. Check more stories related to cybersecurity at: https://hackernoon…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/cyber-hygiene-recognizing-scam-trends-and-protecting-against-data-breaches. The need for cybersecurity data loss prevention goes beyond a simple compliance checkbox in the constantly changing world of threats. Check more stories related to cybersecurity at: https://hackern…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today, Week in Review for week ending Friday, June 21, 2024
34:29
34:29
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
34:29
This episode features a discussion on an undiscovered three-year hack, the cause of Snowflake attacks and allegations of how an Australian health insurer was compromised Join Howard Solomon and David Shipley in the weekend review edition of Cybersecurity Today for insights into major cybersecurity incidents. Topics include a three-year undetected h…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/1inch-partners-with-blockaid-to-enhance-web3-security-through-the-1inch-shield. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #1inch, #cyberwire, #press-release, #1inch-ann…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/ine-security-optimizing-teams-for-ai-and-cybersecurity. With the near-universal integration of AI into global technology, the need for AI-ready cybersecurity teams is more critical than ever. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Defense 101: Phishing + Credential Attacks
17:44
17:44
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
17:44
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) for a follow-up on Verizon's 2024 Data Breach Investigations Report, discussing the two main attack vectors used in most breaches -- phishing and credential attacks -- and how your organization should go about defending itself. To vie…
…
continue reading
This episode reports on how gullible employees are falling for a scam and cutting and pasting malware into their organization's IT systems, and moreKirjoittanut Howard Solomon
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity Awesomeness Podcast - Episode 65
22:37
22:37
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
22:37
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the Cisco and Splunk conferences with special guest Shamus McGillicuddy, EMA VP of Research, Network Infrastructure and Operations.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Mener une reconstruction post cyberattaque (Partie 2/2) | #58
27:41
27:41
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
27:41
Seconde partie de mon échange avec Lucie POIRAUD, RSSI Opérationnelle chez le Groupe Atlantic. 👉 possible décalage de +/- 10 secondes des timestamps selon la plateforme d'écoute ✅ CONTENU✅ (00:52) - Début du podcast + certes, même si subir une cyberattaque est une expérience négative, peut-elle être mise en avant lors de sa candidature pour de futu…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Caos nei laboratori Synlab, i dati dei pazienti a rischio
11:24
11:24
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
11:24
SOTTO ATTACCO | Episodio 26: Caos nei laboratori Synlab, i dati dei pazienti a rischio In questo nuovo episodio della serie "Sotto Attacco", realizzata da Sophos con il supporto di Radio IT, ti raccontiamo l'attacco hacker subito da Synlab Italia. È una luminosa mattina di aprile Tre persone, in altrettante città italiane, si svegliano con un pensi…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/how-icps-walletless-solution-enhances-online-trust-and-privacy. Explore the benefits of Internet Computer Protocol's walletless solution which allows users to selectively disclose identity attributes, enhancing online trust. Check more stories related to cybersecurity at: …
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/why-you-shouldnt-unsubscribe-from-spam-emails. Spam emails are annoying, and the impulse is to unsubscribe — but that could just make things worse. Here's why. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclus…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 88: The Evolution of the Role of a CISO
30:02
30:02
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
30:02
In episode 88 of Cybersecurity Where You Are, co-host Sean Atkinson discusses the evolving role of a chief information security officer (CISO). Here are some highlights from our episode: 02:47. Why communication is a core competency for CISOs 08:35. How to take a balanced approach when evaluating an organization's implementation of artificial intel…
…
continue reading
This episode reports on how outdated software played a role in a lengthy hack, the latest VMware security update, and moreKirjoittanut Howard Solomon
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Cybersecurity Roundtables episode 2: Agritech
30:36
30:36
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
30:36
In this episode of the Cybersecurity roundtables by Business News Wales and the Cyber Innovation Hub, we focus on the relevance of cybersecurity to the feild of Agritech. Three guests—Pete Burnup, Tom Burke, and Rachel Maidley Davis—discuss various aspects of cybersecurity in the Agritech sector. Key topics include the types of data handled by farm…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity in Healthcare
38:23
38:23
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
38:23
In this Business News Wales discussion, Carwyn Jones hosts a panel featuring experts in both the cyber and health tech sectors: Pete Burnap, Gethin Roberts, Tony Trussell, Angharad Watson, and Jonathan Stock. The panel delves into the importance of cybersecurity in healthcare, identifying key vulnerabilities and best practices. Topics include the r…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Connected Car Chaos - Ep 102
31:12
31:12
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
31:12
In this podcast episode, hosts Rob Aragao and Stan Wisseman are joined by Arun DeSouza, a renowned expert in connected vehicle security and former CISO at leading automotive companies. Arun begins by highlighting the critical challenges facing connected vehicles, emphasizing the importance of security by design throughout the development lifecycle.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISO Resignations: Is the Industrial Sector Prepared for the Fallout?
25:20
25:20
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
25:20
Dino Busalachi and Craig Duckworth, CTO and CEO of Velta Technology, respectively, tackle the inherent risks of CISO resignations. They discuss the immense stress and challenges that put these crucial roles at risk. They talk about the unique struggles CISOs face in managing industrial cybersecurity, where outdated systems and a lack of authority c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Guardz: Empower MSPs to Secure & Insure Small Businesses
19:53
19:53
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
19:53
Today, small businesses face significant challenges. Limited resources, tight budgets, time constraints, and inadequate training often leave them vulnerable. Hackers quickly exploit these weaknesses, targeting small and medium-sized businesses (SMBs) with sophisticated threats. Managed Service Providers (MSPs) are tasked with the daunting responsib…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Feeding the Gators: Why SMBs Get Hacked & Big Guys Get Away
34:18
34:18
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
34:18
Sean Mahoney of Netswitch is joined by Wil Lassalle, of JLS, Tech to talk about a headline story and share some insights about preventing a similar event from occurring for your SMB. The guys explore why small businesses are more susceptible to cyberattacks than larger corporations. They talk about the perception among cybercriminals that small bus…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today, June 17, 2024 - Microsoft faces heat in Congress, alleged cybercrook arrested, and more
8:09
This episode reports on complaints about the proposed UN cybercrime treaty, servers used by Islamic State terrorists shut, and moreKirjoittanut Howard Solomon
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Trends and Threats: Rapid7's 2024 Cybersecurity Findings
13:49
13:49
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
13:49
The 2024 Attack Intelligence Report thoroughly analyses the latest trends, tactics, and techniques used by cyber adversaries. This year's report highlights a significant increase in sophisticated attacks, including advanced persistent threats (APTs) and highly targeted ransomware campaigns. By leveraging the MITRE ATT&CK framework, the report offer…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
E16: IRPs: Why They Are Critical
31:27
31:27
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
31:27
Podcast Episode Show Notes: Importance of Incident Response Plans (IRPs) Episode Highlights: Rising Cybersecurity Threats:Discussing the increasing threat levels and the growing importance of cybersecurity. Incident Response Plans (IRPs): Why IRPs are essential and how they serve as a playbook during cyber incidents. Key Topics Covered: Need for IR…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cryptographic Ransomware Encryption Detection: Survey: Author's Declaration
55:58
55:58
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
55:58
This story was originally published on HackerNoon at: https://hackernoon.com/cryptographic-ransomware-encryption-detection-survey-authors-declaration. In this paper, researchers propose a cyber kill chain that describes the modern crypto-ransomware attack. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cryptographic Ransomware Encryption Detection: Survey: Abstract and Introduction
15:46
15:46
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
15:46
This story was originally published on HackerNoon at: https://hackernoon.com/cryptographic-ransomware-encryption-detection-survey-abstract-and-introduction. In this paper, researchers propose a cyber kill chain that describes the modern crypto-ransomware attack. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/why-the-lessons-of-the-british-airways-data-breach-are-timelier-than-ever. Browser supply chain attacks exploiting third-party scripts pose a severe threat. Learn why malicious script injections are so dangerous. Check more stories related to cybersecurity at: https://hack…
…
continue reading