疲惫娇娃是一档从荧幕聊到宇宙深处的泛文化播客,用女性的声波延展对世界的参与和想象。 在一个内陷的时代,疲惫娇娃站在中国和美国的交汇点上,用女性的元视角去观察、抵抗、塑造政治和社会对流行文化的影响。我们讨论流动的时代精神、艺术、自由、未来、友谊以及一切使我们获得力量的事物。
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Join Tenzin Wangyal Rinpoche, other CyberSangha® hosts, and invited guests for illuminating teachings, guided meditations, and science/spirituality dialogs.
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
Cyberpunk Cinema is the definitive dive into the dark future of science fiction. I will be breaking-down one film per week that best represents the thematic signatures of cyberpunk. So, do me a favor - it's time to access your cranial jacks, boot up your Ono Sendai Cyberspace 7, and slap on your damn mirrorshades! Join me as I take you through the matrix that is Cyberpunk Cinema!
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
1
DarkWeb.Today – Hackers and Cyber Security, Piercing the Veil, Empowering the Secure.
Alberto Daniel Hill
“DarkWeb.Today – Hackers & Cyber Security” is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that are central to our ...
…
continue reading
Cybersicherheit auf die Ohren - mit CYBERSNACS, dem Podcast der Allianz für Cyber-Sicherheit. Regelmäßig stellen unsere Hosts Themen rund um Digitalisierung und Cyber-Sicherheit in der Wirtschaft vor. Dazu sprechen wir mit Expertinnen und Experten aus der Wirtschaft und dem IT-Bereich und geben im CYBERSNACS-Radar einen Ausblick auf aktuelle Entwicklungen. Wir nehmen uns die Zeit, Themen aus verschiedenen Blickwinkeln zu beleuchten. Dabei klären wir nicht nur die technischen Grundlagen, sond ...
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.
…
continue reading
Το Podcast τροφή για το μυαλό σου: συμβουλές για την ζωή στο εξωτερικό, εμπειρίες, συζητήσεις για εκπαίδευση, εργασία και επιχειρείν. Προσθέστε βιβλία και κόμικ.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
Your Favorite Existentialist-Anarchist Internet BadassCommentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
We Cover the Cyberspace.
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Podcast francophone de vulgarisation des sujets de la cybersécurité, dans une ambiance décontractée. Animé par Michael VIRGONE, commercial et passionné de cyber depuis plusieurs années
…
continue reading
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
Dark Future Dice is an actual play podcast in which Titus, Lindsay and Sloane delve into the dystopian worlds of Cyberpunk 2020 and Red, weaving narratives that deal with trauma, human connection, and marginalization within an unforgiving dark future. Available on: Spotify: https://spoti.fi/2SG0xtn Apple: https://apple.co/39Fij5M Patreon: https://www.patreon.com/rocketadrift
…
continue reading
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
CTE (Career Technical Education) Interviews Cybersecurity Tutorials Cyber World News Computer Science & Tech Topics Career Hacks, Education Trends, and More! The preferred podcast show for CTE students, the high school community, magnet students, academic experts, and cyber educators.
…
continue reading
1
Week in Review: APTs using Gemini, ransomware payments decrease, abandoned AWS risk
26:32
26:32
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
26:32
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Caitlin Sarian, owner and CEO, Cybersecurity Girl LLC Thanks to our show sponsor, ThreatLocker ThreatLocker (R) is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day at…
…
continue reading
1
Episode 82 - Peter Cohan - Author of Great Demo!
26:41
26:41
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
26:41
In this compelling episode of Cyber Inspiration, host Evgeniy Kharam sits down with Peter Cohan—the acclaimed author of Great Demo —to explore what it takes to deliver a truly effective software demo. Peter shares his personal journey, beginning with his own experience as a prospect in search of a CRM system and his subsequent discovery of the pitf…
…
continue reading
1
Configuration Management | Guide To NIST 800-171
12:00
12:00
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
12:00
Welcome to episode five of our NIST 800-171 series ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/alerts/ to subscribe. ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @secdefl…
…
continue reading
1
How AI and Cybersecurity Are Shaping the Future of Financial IT
38:43
38:43
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
38:43
In This Episode... Matthew Connor sits down with Kevin Hall to discuss IT’s evolving role from a support function to a strategic driver of business growth. Kevin shares how Westconsin Credit Union has shifted IT beyond the traditional “fix-it” mindset, emphasizing business enablement, internal development, and cross-department collaboration. A key …
…
continue reading
1
Episode 123: Insecure Active Directory Protocols
39:47
39:47
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
39:47
In this episode, we discuss several insecure protocols that are found within Active Directory environments. When these protocols are enabled, they could be abused by an attacker to perform a number of attacks, including privilege escalation and lateral movement. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: ht…
…
continue reading
1
DeepSeek Security Concerns: Cyber Security Today for Friday, February 7, 2025
11:53
11:53
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
11:53
Cybersecurity Today: EDR Evasion, SSH Backdoor, WhatsApp Zero-Click Hack, and DeepSeek AI In today's episode of Cybersecurity Today, host Jim Love discusses several pressing cybersecurity issues. The show covers Canada's Digital Governance Council's launch of a cyber ready validation program designed to help small and medium-sized businesses improv…
…
continue reading
1
Safeguarding Your Privacy: How to Delete Your Data
59:23
59:23
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
59:23
David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ, about how data brokers work and how to delete your data by discussing the intersection of privacy and personal data. They discuss the role of data brokers, the lack of transparency in data collection, and the potential risks of AI and deepfake te…
…
continue reading
The Unbreakable Multi-Layer Anti-Debugging System Xavier found a nice Python script that included what it calls the "Unbreakable Multi-Layer Anti-Debugging System". Leave it up to Xavier to tear it appart for you. https://isc.sans.edu/diary/The%20Unbreakable%20Multi-Layer%20Anti-Debugging%20System/31658 Take my money: OCR crypto stealers in Google …
…
continue reading
1
PCI-DSS - What do you need to do?
19:11
19:11
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
19:11
If your business processes card payment transactions you need to be PCI-DSS compliant. This episode provides an introduction to PCI-DSS and along the way explains many key cyber security concepts that apply to all businesses. This podcast episode discusses PCI DSS, a global information security standard for organisations that handle branded credit …
…
continue reading
1
TCW Episode 54: Val in GRC
35:37
35:37
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
35:37
Show Notes Follow Val https://www.linkedin.com/in/dobrushkin Follow Emily https://www.linkedin.com/in/emily-may-mara-09147147/ Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberweekly Like and Follow our X page https://twitter.com/thecyberweekly Follow Deogratius Okello https://www.linkedin.com/in/deo-okello/ https://twitte…
…
continue reading
1
Informed Consent in Red Teaming with Gemma Moore and Geoff Jones
46:39
46:39
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
46:39
Welcome to Clearly Cyber, a podcast hosted by PRPR where we speak to a number of cyber security leaders and comms experts about how to communicate effectively in the cyber security industry. In our debut episode, we're joined by Gemma Moore and Geoff Jones, founding Directors of Cyberis, to explore the topic of Informed Consent in Red Teaming. They…
…
continue reading
1
teissTalk: Threat intelligence strategies to mitigate industrial-scale cyber-crime
43:53
43:53
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
43:53
How cyber-crime continues to evolve and what this means for enterprise threat intelligence strategies Evaluating sources and deciding which characteristics are most relevant How DNS-based threat intelligence versus a malware-centric approach disrupts industrialised cyber-crime This episode is hosted by Thom Langford: https://www.linkedin.com/in/tho…
…
continue reading
1
Cybersecurity, Espionage, and National Defense with Martin Matishak
37:52
37:52
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
37:52
In this week's episode Frank Cilluffo speaks with Martin Matishak, a seasoned cybersecurity journalist currently with The Record and formerly with Politico and National Journal. They discuss China’s cyber threats, particularly the Volt Typhoon and Soft Typhoon campaigns, and their implications for critical infrastructure security and espionage tact…
…
continue reading
1
Goodbye Password Stress, Hello Passkeys - Ep 135
17:41
17:41
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
17:41
In this episode, we dive into the world of passkeys and how they’re revolutionizing online security. Say goodbye to password fatigue and phishing scams—passkeys promise a more secure and seamless authentication experience. We discuss what passkeys are, how they work, and why major tech companies are adopting them. Topics Covered: What are passkeys …
…
continue reading
1
#30 Cyber Resilience what?
21:04
21:04
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
21:04
Mit Anna Schwendicke (Bundesamt für Sicherheit in der Informationstechnik) Smarte Toaster, PC-Spiele, Mikroprozessoren und Antivirusprogramme – auf all diese Produkttypen ist der Cyber Resilience Act (CRA) anzuwenden, welcher am 12. Dezember 2024 in Kraft trat. In dieser Folge werfen wir einen genauen Blick auf die neue EU-Verordnung, die Herstelle…
…
continue reading
1
Ep. 52 - Why Nobody’s Truly Good at Cyber Insurance Yet - with Daniel Kasper
1:02:50
1:02:50
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:02:50
In a market defined by uncertainty, is it possible to ever be ‘good’ at cyber insurance? Daniel Kasper thinks not—at least for now. In this episode, Daniel Kasper, CEO of QualRisk Cyber Insurance Center, joins host Anthony Hess to explore why the cyber insurance market is still in its infancy. Drawing from examples like the ransomware epidemic of 2…
…
continue reading
1
What's the Deal with Deepseek?
10:35
10:35
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
10:35
Recently a brand new generative AI model came out of nowhere and blew up overnight. There are a lot of controversies and concerns surrounding this model, providing more efficient AI but also bringing a lot of data sensitivity risks and topics of government censorship to the forefront. Sources: https://pastebin.com/WRGERYCE…
…
continue reading
1
Resilient Cyber w/ Sounil Yu - The Intersection of AI and Need-to-Know
26:41
26:41
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
26:41
In this episode, we sit down with Sounil Yu, Co-Founder and CTO at Knostic, a security company focusing on need-to-know-based access controls for LLM-based Enterprise AI. Sounil is a recognized industry security leader and the author of the widely popular Cyber Defense Matrix. Sounil and I dug into a lot of interesting topics, such as: The latest n…
…
continue reading
1
Defensive Security Podcast Episode 295
1:15:57
1:15:57
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:15:57
In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including the alarming statistics surrounding ransomware attacks, the implications of paying ransoms, and the evolving nature of ransomware as a broader category of cyber threats. They also discuss the consolidation of security…
…
continue reading
In this bonus episode, Ciaran and James ring in the new year with a look back at the standout guests and thought-provoking topics from series one. They also take a sneak peek at what 2025 holds for the ever-evolving world of tech security. And to top it off, there’s a special announcement to chase away those January blues. Highlights: Typhoon Varia…
…
continue reading
1
6 Rules That Got Me Into Cyber Security (With No Experience) | EP 20
10:37
10:37
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
10:37
Unlock the secrets to cybersecurity success without relying on years of experience or expensive certifications. Learn how complete beginners can outperform seasoned pros by following six specific rules, from developing a hustle mentality to giving back to the community. Discover inspiring stories of individuals who landed dream jobs and led securit…
…
continue reading
1
How to Outsmart Ransomware: AI, Digital Forensics & Insider Secrets with Andria Delia
32:32
32:32
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
32:32
In this episode, we’re joined by Andria Delia, a Cyber Threat Intelligence Expert and a nominee for the Cellebrite Digital Justice Rising Star Award at the C2 Summit. Andria dives into her extensive experience in cybersecurity, sharing valuable insights on the psychology of cyber attackers and how she handles ransomware without paying ransoms. She …
…
continue reading
1
Cyber Liability Insurance in 2025: Understanding New Requirements and Risks
14:38
14:38
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
14:38
Send us a text In this episode of CyberSound, hosts Jason Pufahl and Steven Maresca revisit the evolving world of cyber liability insurance. They discuss how security requirements have shifted from foundational tools like MFA and EDR to more rigorous expectations around operational practices, vulnerability scanning, and incident response. Learn how…
…
continue reading
1
NCF-362 Entering the New Year, Turning to Governance
33:08
33:08
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
33:08
Welcome back to New Cyber Frontier! In this episode, our hosts—Dr. Shawn P. Murray, Tim Montgomery, and Dr. Gorog—tackle pivotal topics shaping our world today: political transitions, evolving social media policies, and the ongoing impact of artificial intelligence (AI). Political Transition: Cybersecurity Takes Center Stage With Donald J. Trump re…
…
continue reading
1
CompTIA Network+: Is it necessary for a cybersecurity career? | Guest Tommy Gober
10:45
10:45
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
10:45
Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Infosec Instructor Tommy Gober joins Cyber Work Hacks to discuss the CompTIA Network+ certification. Despite often being bypassed in favor of Security+, Gober explains why Net…
…
continue reading
1
🎙️ Debut en español 2025 del C.E.L. Podcast: "Hablando Claro con las Estudiantes, Ashley Y Valentina"🎙️
46:19
46:19
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
46:19
🎙️ No te pierdas el episodio debut en español 2025 del C.E.L. Podcast: "Hablando Claro con las Estudiantes, Ashley Y Valentina." 🎙️ Prepárate para un episodio lleno de risas, inspiración y reflexiones sinceras con Mr. B, el maestro de maestros, junto a dos estudiantes que comparten sus primeras aventuras en la secundaria. Desde momentos vergonzosos…
…
continue reading
1
16. Catching the Criminal: A Deep Dive into the Medibank Cyber Attack
28:22
28:22
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
28:22
A cyber criminal has been caught two years after coordinating a cyber attack against Medibank, one of Australia’s largest private health care providers. The attack was ruthless, with the cyber criminal leaking stolen medical data, bit by bit into the public arena, including: HIV statuses, sexually transmitted diseases and abortion data. Who was the…
…
continue reading
1
Let’s catch a deep fake crypto con
1:24:49
1:24:49
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:24:49
Let’s catch a deep fake crypto con
…
continue reading
1
Part-3 IoT Meetup 050125: Nachshon Pincu SVP @NIAtech cyber security on -“Phygital” the future of IoT
36:36
36:36
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
36:36
נחשון פינקו מדבר על "פיגיטל", העתיד של מיזוג פיזי עם דיגיטל. אילו גורמים מובילים תעשיות וספקים בכיוון זה היכן ומתי היא תפגוש מומחי סייבר ותפעול רמה טכנית - 100 (קלה) Nachshon Pincu talks about The future of blending physical with digital. What factors lead industries and vendors in this direction? Where and when will it meet cyber and operational e…
…
continue reading
1
Episode 27 - What's in store for 2025
24:16
24:16
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
24:16
In the first episode of 2025, Danielle Phillips and Phil Jackman explore some to the exciting things that are happening in CyberNorth. Find out more at www.cybernorth.biz
…
continue reading
1
Rethinking Israel-Palestine: Federalism, Anarchism, and Real Solutions with Adar Weinreb
1:08:59
1:08:59
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:08:59
In this episode, we sit down with Adar Weinreb, founder of Sulha, to explore the roots of the Israeli-Palestinian conflict and discuss alternative governance models beyond the nation-state. From the failures of partition to federal and confederal solutions like the Federation Plan, we delve into how decentralized frameworks could address the challe…
…
continue reading
1
The uncertain future of cyber safety oversight.
35:46
35:46
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
35:46
The latest cyber moves from the Trump White House. Pompompurin faces resentencing. An attack on a government IT contractor impacts Medicaid, child support, and food assistance programs. Helldown ransomware targets unpatched Zyxel firewalls. Murdoc is a new Mirai botnet variant. Cloudflare maps the DDoS landscape. North Korea’s Lazarus group uses fa…
…
continue reading
1
Episode 440 - ZTW25 - Zero Trust World - Revolutionizing Incident Response
13:39
13:39
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
13:39
In the lead up to Zero Trust World 2025 we speak with Rob Allen, Chief Product Officer, ThreatLocker. ThreatLocker protects endpoints and data from zero-day malware, ransomware, and other malicious software, and provides solutions for easy onboarding, management, and eliminates the lengthy approval processes of traditional solutions. Visit https://…
…
continue reading
1
From Critical Alerts to Business Context: Why CTEM is the Future of Cybersecurity
41:00
41:00
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
41:00
In this episode of Cyber Talks, Tia Hopkins, Chief Cyber Resilience Officer & Field CTO at eSentire, and Roselle Safran, Founder & CEO at KeyCaliber, discuss the evolution of Continuous Threat Exposure Management (CTEM) and its role in modern cybersecurity. They explore the practical application of CTEM, its benefits for business context in securit…
…
continue reading
1
Cyber Defense Radio - Lalit Ahluwalia - DigitalXForce - Hotseat - Podcast - 2025
16:33
16:33
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
16:33
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Lalit Ahluwalia, CEO and Founder of DigitalXForce, https://digitalxforce.com/, who delivers the Digital Trust Platform integrating Security Privacy Posture Management and Risk Compliance. DigitalXForce enterprise security and risk posture management surpas…
…
continue reading
1
Behind the Scenes of Election Security: CISO of AZ Sec of State
1:04:08
1:04:08
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:04:08
Michael Moore is the Chief Information Security Officer (CISO) for the Arizona Secretary of State's Office which plays a major role in running elections. We sit down and talk about how elections are run, how votes are cast, authenticated, and counted, how they ensure security and integrity of ballot tabulators, cyber threats to elections, and respo…
…
continue reading