Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
The podcast making sense of cyber and technology issues impacting business.
…
continue reading
Independent holistic security consultancy
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. brad@securit360.com
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Delve into the public sector risk management domain with PRIMA's Risk Management Podcast Series. This innovative, time-efficient, educational resource is designed to afford risk management professionals the opportunity to learn-on-the-go! Listen to PRIMA podcasts to remain cognizant of important issues affecting the public risk management community!
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the b ...
…
continue reading
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
…
continue reading
VerSprite is a leader in risk-based cybersecurity services and PASTA threat modeling, enabling businesses to improve the protection of critical assets, ensure compliance, and manage risk. Our mission is to help you understand and improve your organization’s cybersecurity posture. With cyberattacks increasing in number and sophistication daily, it is essential to protect your organization’s assets, protect your clients, and maintain the same, excellent reputation and trust you have worked har ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
This podcast series offers risk intelligence and analysis from RANE Network. RANE is a risk intelligence company that provides business professionals with access to critical insights, analysis, and support, enabling them to better anticipate, monitor, and respond to emerging risks and threats. In the RANE podcast series, risk management experts and thought leaders share best practices for managing business risk, geopolitical risk, physical and cyber security risks, compliance risk, and other ...
…
continue reading
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
continue reading
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber®
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Welcome to the Razorwire podcast where we share information, best practices and up to date news in cyber security and infosec. Our mission is to help you become a better cyber security professional and support our vision of creating an agile community of cyber professionals who are stronger than ever before. This show is first and foremost about sharing knowledge and benefiting from collaboration. We bring you the advice and wisdom of both your host, James Rees, and his guests to build on th ...
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
1
Election Security 2024: Hacking Risks and How to Stop Them | EP 11
11:45
11:45
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
11:45
Securing the Vote: Addressing Election Vulnerabilities in 2024 In this episode of Cybersecurity Diaries, Nathan from StationX delves into the critical vulnerabilities and security measures essential for protecting election integrity. With the U.S. presidential election approaching, concerns about voting system security are peaking. The episode cove…
…
continue reading
1
Insider Threats & Third Party Risk: How to Manage Security Threats
44:58
44:58
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
44:58
Every vendor you trust and every employee you hire could be your next security crisis—explore the realities of third party risk and insider threats on this episode of Razorwire! Join us for a discussion on the multifaceted challenges of third party risk and how they can destabilise your organisation. From the growing complexities of cloud providers…
…
continue reading
1
New Podcast | Bridging the Cyber Skills Gap: The Future of Outsourced Security Solutions
22:52
22:52
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
22:52
Listen in to the latest edition of the Risk & Business Podcast, which is available on all audio platforms and in video form on YouTube! In today’s fast-evolving threat landscape, organisations are struggling to fill critical cyber roles, making skilled talent harder to find. In this episode, we are joined by Advent IM Head of Outsourcing (Andrew Co…
…
continue reading
1
2024 NCSAM Week 5 - Cyber Security Hygiene And The Public Sector
11:38
11:38
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
11:38
2024 NCSAM Week 5 - Cyber Security Hygiene And The Public SectorPublic Risk Management Association (PRIMA)
…
continue reading
1
The Importance of Third-Party Risk Management (TP3M) in Cyber Security: David Beardshaw, CISO
45:15
45:15
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
45:15
On this episode, David Beardshaw, CISO of 3VRM, joins Yonatan Lipschitz. They discuss the importance of third-party risk management (TPRM) and its role in securing organizations. They explore the definition of TPRM and the risks associated with third-party relationships. They also discuss the challenges of questionnaire-based assessments and the ne…
…
continue reading
1
Mentorship and career growth in cybersecurity | Guest Anneka Gupta
51:58
51:58
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
51:58
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Today on Cyber Work, Anneka Gupta from Rubrik joins us to discuss STEM education, transitioning into cybersecurity and strategies for effective and diverse hiring. Gupta …
…
continue reading
Distracted Driving And Mitigation TechniquesPublic Risk Management Association (PRIMA)
…
continue reading
1
AI & Emerging Tech for a Better Future with Marsha Maxwell
59:10
59:10
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
59:10
In this episode, we dive into emerging tech with Marsha Maxwell, co-founder of If These Lands Could Talk and Head of Innovation at Atlanta International School. Marsha shares insights on empowering indigenous and underserved communities through AI and VR, the ethical challenges of integrating AI, and the importance of digital inclusion. We discuss …
…
continue reading
In this new episode of the mnemonic security podcast, Robby Peralta is joined by Leonid Rosenburg, a cybersecurity expert and dark web researcher at Hudson Rock, to discuss infostealers. Rosenburg provides a brief history of infostealers, which began with Zeus in 2007, a malware initially designed to steal only banking information. Today, infosteal…
…
continue reading
1
The Security Sandbox at the ICS Cybersecurity Conference
19:44
19:44
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
19:44
Hosts Vivek Ponnada and Sandeep Lota share their insights on and exploring topics such as: ✅ Emerging threats to ICS over the next 12-18 months ✅ Evolving strategies for integrating IT and OT cybersecurity ✅ The future role of AI in ICS cybersecurity ✅ Fostering collaboration between IT and OT teams Visit Our Website Follow Us on LinkedIn…
…
continue reading
1
Building Resilience Through Long-term MDR Partnerships with Rich Raether and Andrew DeBratto
33:38
33:38
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
33:38
In this episode of Cyber Talks, Rich Raether, CIO of Quarles & Brady, and Andrew DeBratto, CISO of Hunton Andrews Kurth LLP, discuss their decades-long journey in IT and cybersecurity. They recount shared projects, including navigating early security challenges, and reflect on how the industry has transformed, focusing on threat management and resi…
…
continue reading
1
Managing the Risk of GenAI Tools
29:01
29:01
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
29:01
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest Karthik Krishnan, founder and CEO, Concentric AI. In this ep…
…
continue reading
1
EP 097 Peter Warmka former CIA Intelligence Officer and Author of 'Confessions of a CIA SPY'
1:03:01
1:03:01
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:03:01
Send us a text Peter Warmka is a former Senior Intelligence Officer with the CIA having over 20 years of experience in breaching the security of target organizations overseas. He is an Adjunct Professor at Webster University's Masters in Cybersecurity Program, Founder of Orlando, Florida-based firm Counterintelligence Institute, LLC, and author of …
…
continue reading
1
What the Military’s “Elegant and Brutal” Model Can Teach Us About Cybersecurity
30:58
30:58
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
30:58
In this episode, Jeffrey talks to Cindy Seipert, an InfoSec GRC analyst at Health Catalyst. They discuss movies that challenge our identity, Cindy’s unique career path from the military to the tech industry and her experiences as a woman in cybersecurity.Jeffrey Wheatman
…
continue reading
1
Top 5 Tips for Cybersecurity Awareness
26:28
26:28
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
26:28
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) for a special episode for Cybersecurity Awareness Month, sourcing five tips from a range of Ivanti employees on how your organization and its users can stay secure. Join the conversation online on LinkedIn (linkedin.com/company/Ivanti…
…
continue reading
1
Securing the Surface: TSA's Role in Pipeline and Transportation Security with Sonya Proctor
33:12
33:12
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
33:12
In this episode of Cyber Focus, host Frank Cilluffo sits down with Sonya Proctor, Assistant Administrator for Surface Operations at TSA (Transportation Security Administration). Proctor discusses TSA's evolving role in securing pipelines and other surface transportation sectors, emphasizing the agency's expanded cybersecurity focus following the Co…
…
continue reading
1
Episode 112: Key Insights From The Microsoft Digital Defense Report 2024
38:45
38:45
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
38:45
In this episode, we dive deep into the newly released Microsoft Digital Defense Report 2024, which offers a comprehensive look at the latest trends in the global cybersecurity landscape. From evolving cyber threats and attack strategies to Microsoft's analysis of the most vulnerable sectors, we break down the key findings and what they mean for bus…
…
continue reading
1
Episode 281 Deep Dive: Yuri Miloslavsky | Risks of Digital Footprint in Information Sharing
40:17
40:17
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
40:17
In this episode, we sit down with Yuri Miloslavsky, CEO of Sharepass, as he discusses the risks associated with digital footprints in information sharing. Yuri delves into the importance of awareness about the vulnerabilities introduced by our online activities and the challenges of balancing security with user convenience. We explore the cybersecu…
…
continue reading
1
SN 998: The Endless Journey to IPv6 - AI-Driven Encryption, Session Messenger, IPv6
2:53:56
2:53:56
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
2:53:56
Apple proposes 45-day maximum certificate life. SEC fines four companies for downplaying their SolarWinds attack severity. Google adds 5 new features to Messenger including inappropriate content. Does AI-driven local device-side filtering resolve the encryption dilemma forever? The very nice looking "Session" messenger leaves Australia for Switzerl…
…
continue reading
Apple proposes 45-day maximum certificate life. SEC fines four companies for downplaying their SolarWinds attack severity. Google adds 5 new features to Messenger including inappropriate content. Does AI-driven local device-side filtering resolve the encryption dilemma forever? The very nice looking "Session" messenger leaves Australia for Switzerl…
…
continue reading
1
Rethinking Cybersecurity Hiring with Naomi Buckwalter
43:40
43:40
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
43:40
Is cybersecurity gatekeeping holding back the industry? Naomi Buckwalter, Senior Director of Product Security at Contrast Security and Founder of the Cybersecurity Gatebreakers Foundation, argues that fresh talent and open doors are crucial for industry growth. In this episode, Naomi challenges why industry hiring norms fall short, shares candid st…
…
continue reading
1
The CISO Mindset, Top Strategies, and Mandating Office Presence Without Purpose - David Bradbury, Erin Baudo Felter - BSW #370
1:03:37
1:03:37
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:03:37
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Identity continues to be one of the most used attack vectors by cybercrim…
…
continue reading
1
Understanding Cyber Threats in Elections and Infrastructure with Maggie Miller
52:21
52:21
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
52:21
From the notorious Ticketmaster hack during Taylor Swift's ticket sales to the geopolitical cyber issues involving heavyweights like China and Israel, Maggie provides a comprehensive overview of the current cyber landscape. We'll explore the bipartisan effort needed to safeguard US infrastructure, including the vulnerabilities of our satellite syst…
…
continue reading
1
Stay Ahead of Identity Threats & Addressing Cybersecurity Disparities - David Bradbury, Erin Baudo Felter - BSW #370
33:10
33:10
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
33:10
Identity continues to be one of the most used attack vectors by cybercriminals. From phishing to credential stuffing to password spraying – threat actors are finding new ways to infiltrate systems and cause costly problems to companies. David Bradbury, Chief Security Officer at Okta, joins Security Weekly's Mandy Logan to discuss today's threat lan…
…
continue reading
Our Q3 2024 APT Quarterly Highlights Report reveals intensified cyber activities from APT groups in Iran, Russia, China, and North Korea, indicating heightened espionage efforts. Iran’s MuddyWater and APT34 leveraged custom malware like BugSleep, while Russia’s APT29 and APT28 capitalized on zero-day vulnerabilities for sophisticated infiltration. …
…
continue reading
1
S30 Ep4: BONUS: Brian Lord - AI, Mis- and Disinformation in Election Fraud and Education
23:07
23:07
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
23:07
This is the second of a two-part conversation between Steve and Brian Lord, who is currently the Chief Executive Officer of Protection Group International. Prior to joining PGI, Brian served as the Deputy Director of a UK Government Agency governing the organization's Cyber and Intelligence Operations. Today, Steve and Brian discuss the proliferati…
…
continue reading
1
DtSR Episode 625 - Cyber Ghost Stories to Tell in the Dark
39:27
39:27
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
39:27
Send the hosts a message - try it now! TL;DR: On this week's episode, Jim, James, and I sit down to a Halloween "scary story" episode. You know the feeling... that sinking feeling of dread when you can't quite put your finger on what's wrong but something is definitely wrong. Something scary, and nefarious is happening... and usually it's coming fr…
…
continue reading
1
The CISO Mindset, Top Strategies, and Mandating Office Presence Without Purpose - BSW #370
30:36
30:36
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
30:36
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Show Notes: https://securityweekly.com/bsw-370…
…
continue reading
1
Grant Geyer on the Business Impact of Disruptions from Cyberattacks
25:03
25:03
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
25:03
Claroty Chief Strategy Officer Grant Geyer joins the Nexus Podcast to discuss the results of a survey of 1,100 cybersecurity leaders and practitioners on the business impact of disruptions from cyberattacks on cyber-physical systems. The financial losses are steep from these attacks impacting connected systems that are so central to our way of life…
…
continue reading
1
How secure is your food: Cybersecurity threats and careers | Guest Jonathan Braley
45:38
45:38
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
45:38
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=audio&utm_medium=podcast&utm_campaign=podcast Today on Cyber Work, Jonathan Braley from the Food and Agriculture Information Sharing and Analysis Center (Food and Ag ISAC) delves into the critical security challenges i…
…
continue reading
1
Is AppSec Dead? Exploring ASPM.
35:05
35:05
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
35:05
Welcome to another episode of The Dirty South Cybersecurity Podcast! 🎙️ In this episode, your hosts Tony and Q0PHI dive deep into the world of Application Security (AppSec). They tackle the burning question: Is AppSec dead? 🤔 Join the discussion as they explore the rise of Application Security Posture Management (ASPM) and debate whether ASPM is th…
…
continue reading
1
Black Hat 2024 - 5 Key Topics
31:21
31:21
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
31:21
Join Tony UV and Q0PHI80 at Black Hat 2024 as they discuss these 5 key topics: 1) Crowdstrike Incident - Security Issue, Incident or Neither? 2) QA Testing Today - For Better or for Worse? 3)Geopolitics in the Role of Cybercrime- Forgotten X-Factor or Integrated Background Influence? 4)Automated Pen Testing- Fact or Fiction for the Future? 5) Role …
…
continue reading
1
195 - Top Common Password Attacks and How to Defend Against Them
38:15
38:15
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
38:15
Enjoying the content? Let us know your feedback! Lets face it, the cyber crooks are always lurking aroud waiting for an opportunity to come in. They choose the path of least resistant and password is often their way in. Unfortunately password is still with us and for sometime to come too. In today episode, we’re digging deep into top common types o…
…
continue reading
1
United States of Addiction III
52:36
52:36
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
52:36
In this episode of RANE Insights, RANE Founder David Lawrence sits down with Dr. Mark Gold for the third episode in a multi-part discussion on the relationship between addiction and enterprise risk. Dr. Gold is an author, inventor, and mentor who has had over 1,000 peer-reviewed publications since beginning his academic career at the University of …
…
continue reading
1
CYFIRMA Research- CVE-2024-7593 Vulnerability in Ivanti Virtual Traffic Manager: Vulnerability Analysis and Exploitation
3:54
Ivanti Virtual Traffic Manager (vTM) users – A critical authentication bypass flaw (CVSS 9.8) is now being actively exploited! This vulnerability allows unauthenticated attackers to gain admin control over your systems. Patch now to prevent unauthorized access, data theft, or malware deployment. Public exploit code is already circulating. Stay secu…
…
continue reading
1
Defending Against What Criminals Know About You
31:35
31:35
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
31:35
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Damon Fleury, chief product officer, SpyCloud. In this epis…
…
continue reading
1
teissTalk: Why Zero Trust Network Access is not your silver bullet
45:07
45:07
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
45:07
Where does Zero Trust fall short, and why these failings encourage cyber-crime Expanding Zero Trust to protect the data itself Identifying, classifying, and securing sensitive data through automation This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Jean Carlos, VP Cyber Security, BOXT https://www.linkedin.com/in/je…
…
continue reading
1
Deviance Normalization & Risk Management with Marco Ayala
34:05
34:05
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
34:05
Technological change is inevitable and often one of the aspects that attracts people toward careers in information and operational technology. Although risk management is a part of navigating advancement in any area, the fundamental flaw in any management system is our human tendencies. This episode explores how organizations can make slow, steady …
…
continue reading