Cyber public
[search 0]
Mai Mult
Download the App!
show episodes
 
C
CYBER
Series avatar that links to series pageSeries avatar that links to series page

1
CYBER

VICE

Unsubscribe
Unsubscribe
Săptămânal
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
CyberSound is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
  continue reading
 
北欧に居住していた古代民族にとって、サウナストーンと呼ばれる石の熱と、石に水をかけて立ち上る蒸気は、人間の生命力として考えられていました。サウナは今日でも、健康のためだけではなく、人々の意見交換の場としても使用されています WithSecureの日本語ポッドキャスト『Cyber SecurityサウナJapan』は、社内外のセキュリティエキスパートをホスト/ゲストとして、様々なことが起こっているセキュリティ業界でのホットなトレンドやテクノロジーに関する情報、そしてインサイトをお届けしていきます。
  continue reading
 
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
  continue reading
 
C
CYBERSNACS
Series avatar that links to series pageSeries avatar that links to series page

1
CYBERSNACS

Allianz für Cyber-Sicherheit

Unsubscribe
Unsubscribe
Lunar
 
Cybersicherheit auf die Ohren - mit CYBERSNACS, dem Podcast der Allianz für Cyber-Sicherheit. Regelmäßig stellen unsere Hosts Themen rund um Digitalisierung und Cyber-Sicherheit in der Wirtschaft vor. Dazu sprechen wir mit Expertinnen und Experten aus der Wirtschaft und dem IT-Bereich und geben im CYBERSNACS-Radar einen Ausblick auf aktuelle Entwicklungen. Wir nehmen uns die Zeit, Themen aus verschiedenen Blickwinkeln zu beleuchten. Dabei klären wir nicht nur die technischen Grundlagen, sond ...
  continue reading
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
  continue reading
 
C
Cyber Inspiration
Series avatar that links to series pageSeries avatar that links to series page

1
Cyber Inspiration

Evgeniy Kharam and Security Architecture

Unsubscribe
Unsubscribe
Lunar+
 
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
  continue reading
 
Are you a cybersecurity professional who wants to be updated with the latest industry news, emerging threats and challenges but you've got no time to wade through white papers or the tech press? Are you a passionate person about cybersecurity who just wants to learn more on how to protect information? We've got you covered. The Cyberstar Talk's Podcast allows you to stay up to date as you’re going on with your daily grind. This channel will provide you with a bunch of exclusive and best inte ...
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
S
Simply Cyber
Series avatar that links to series pageSeries avatar that links to series page

1
Simply Cyber

Gerald Auger, PhD

Unsubscribe
Unsubscribe
Săptămânal+
 
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
  continue reading
 
We Interview experts in cyber security, technology and other interesting domains. We discuss cybersecurity, national security, crypto, IoT, and other technology. RealTime Cyber Implements Cybersecurity Controls, Cybersecurity Frameworks, and application security practices. Find out more at RealTimeCyber.net
  continue reading
 
C
Cyber Defense Radio
Series avatar that links to series pageSeries avatar that links to series page

1
Cyber Defense Radio

Cyber Defense Magazine

Unsubscribe
Unsubscribe
Săptămânal+
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/
  continue reading
 
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
  continue reading
 
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: info@4s-ag.de https://www.4s-ag.de
  continue reading
 
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
  continue reading
 
Loading …
show series
 
Whose packet is is anyway: a new RFC for attribution of internet probes https://isc.sans.edu/forums/diary/Whose%20packet%20is%20it%20anyway%3A%20a%20new%20RFC%20for%20attribution%20of%20internet%20probes/30456/ MLFlow Vulnerability https://www.contrastsecurity.com/security-influencers/discovering-mlflow-framework-zero-day-vulnerability-machine-lang…
  continue reading
 
After months of comparing Proudhon's "System of Economic Contradictions" with Marx's "The Poverty of Philosophy", Cyber Dandy and Ben Burgis join Douglas Lain to compare notes and debate the merits of the two works. Ben Burgis' Give Them an Argument: https://www.youtube.com/ @BenBurgisGTAA Douglas Lain's Sublation Media: https://www.youtube.com/ @s…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
Met de Cyber Lady van deze week duiken we in de wereld van wetten en regels, om specifieker te zijn: ICTrecht. Deze juridische eindbaas is techjurist en richt zich met name op de juridische grenzen bij het gebruik van data en datagedreven werken. Ze is directeur, eigenaar van Lime Legal, een vast gezicht van de podcast Angry Nerds en regelmatig te …
  continue reading
 
In this episode Brad and Darrius discuss future trends in penetration testing. We plan for this to be a multi-part series and in this part listen to Brad and Darrius delve into why keeping pace with current and future trends is important, evolving threats, the cloud and much more! Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberth…
  continue reading
 
Spyware trial implicating former Mexican president kicks off Federal agency breached through Adobe ColdFusion vulnerability Malicious loan app downloaded 12 million times from Google Play Huge thanks to our sponsor, Barricade Cyber Solutions Don't let ransomware ruin your holiday. Remember to visit recoverfromransomware.com! Barricade Cyber Solutio…
  continue reading
 
Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is act…
  continue reading
 
In today’s podcast we cover four crucial cyber and technology topics, including: 1. Google fixes abused bug in Android 2. Bluetooth flaw leading to impersonation disclosed 3. Microsoft detects shift in malware used by ransomware gang 4. Florida water districts latest utility to be impacted by cyber attack I'd love feedback, feel free to send your c…
  continue reading
 
Dr. Yuriy Bulygin is the CEO and founder of Eclypsium, the digital supply chain security company that helps organizations protect their critical hardware, firmware, and software. Prior to Eclypsium, Yuriy was Chief Threat Researcher and led the Microprocessor Security Analysis team at Intel Corporation, as well as the Advanced Threat Research team …
  continue reading
 
Confidence Staveley of the CyberSafe Foundation and the CyberGirls program is today's guest. CyberGirls is a year-long cohort program in which women in Africa ages 18 to 28 can learn cybersecurity basics and create career tracks to fast-track these students into cybersecurity careers! Staveley tells us about the workings of the program, how she use…
  continue reading
 
サウナのようにホットなセキュリティトレンド、テクノロジー、インサイトをお届けするポッドキャスト『Cyber SecurityサウナJapan』。第12回目は、IT系の記者さん/編集者さん4人にご参加いただいた覆面座談会の後編として「最近の日本企業のサイバーセキュリティ対する意識の変化」についてお話しいただいています。De către WithSecure
  continue reading
 
Witaj w “Cyber, Cyber… Raport” – specjalnej edycji naszego podcastu, poświęconej fascynującemu światowi cyberprzestrzeni. Co tydzień przenosimy Cię w świat najnowszych wydarzeń z dziedziny cyberbezpieczeństwa, analizując najważniejsze zagrożenia, trendy i wydarzenia. Nasz zespół ekspercki śledzi, interpretuje i dzieli się najbardziej aktualnymi inf…
  continue reading
 
Your posts matter more than you think. Social media has changed the way wars are fought and the internet has become a new battlefield. Twitter may be dying, but it still matters an awful lot to policy makers. TikTok is ascendent, but often because its content can be repurposed on other platforms. Telegram can give you the news on the ground, but on…
  continue reading
 
Dive into the world of manufacturing cybersecurity with an insightful podcast episode featuring Ashley McGlone, a seasoned technology strategist from Tanium. Join your host, Luigi Tiano, as he engages in a riveting conversation with Ashley, unraveling the complexities of Industry 4.0, IoT, and the critical role of cybersecurity in the manufacturing…
  continue reading
 
What is important?In this episode Toby and Tom discuss why understanding the business impact is key to context for any cyber security programme, and a process for working it out.If you want any cyber security support please get in contact with the team via the website: https://clearcutcyber.comMusic is Green Lights by Jahzzar from the Free Music Ar…
  continue reading
 
GRU's Sandworm implicated in campaign against Danish electrical power providers. Paris wastewater agency hit by cyberattack. LockBit hits Boeing. Bletchley Declaration represents a consensus starting point for AI governance. The US Executive Order on artificial intelligence is out. Guest Austin Reid of ABS Group discusses Ship and Shore challenges …
  continue reading
 
Welcome to Cyber Inspiration Podcast, you may be familiar with me as Co-host of the Security Architecture Podcast, which I started with Dmitry Raidman CTO of Cybeats in 2020. From the Episode: When you look at the social engineering attacks that target our people, they are targeting what are called these cognitive biases. When you get funding, just…
  continue reading
 
This week we are joined by Kenneth Bible, the Chief Information Security Officer (CISO) for the DHS Office of the Chief Information Officer (OCIO). He breaks down the National Cybersecurity Strategy Implementation Plan (NCSIP) introduced in July and provides great insights on how the plan was developed, the five key pillars of the plan, actioning e…
  continue reading
 
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Michael Morris of Endace. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ #cloud #alwayson #network #packet #capture #cyberdefense #c…
  continue reading
 
Mark Reed is a former U.S Air Force officer who worked on Satellites before transitioning to private sector Satellite & Space Technology Startups. We talk about the nature of space technologies, technical limitations, satellite traffic control, electronic warfare in space, GPS signals, and some concerning trends around GPS signals jamming and inter…
  continue reading
 
On this episode of the Emerging Cyber Risk podcast, we Joel's latest book, "Secure Intelligent Machines". The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. This podcast epis…
  continue reading
 
Spencer Pollock is a Data Privacy and Cybersecurity Attorney at McDonald Hopkins with a wealth of knowledge on the interplay between law, insurance, and cyber. Tune in to this episode for insights into talent shortages, insurance pricing dynamics, and the escalating risks in supply chains. Spencer also casts his thoughts over topics like inconsiste…
  continue reading
 
This week: As many of you may currently be finalising your income generation strategies for 2024, here’s the Top 3 from the world of cyber crime: A new entry at #3: Using the regulators. Back at #2: Using cyber attacks. But still at #1, for the 1197th week in a row: Using your staff! Links to this week's articles are accessible from https://codeinm…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Embracing AI tools across your organisation - ensuring you remain secure The opportunities and risks widespread adoption of AI poses to your organisation How infosec thin…
  continue reading
 
The NIST Cyber Security Framework has helped secure organizations for nearly a decade and while it’s proven to be an invaluable tool, it’s gotten a bit long in the tooth for a cyber security landscape that never stays static. Enter V.2 which goes a long way in identifying the increasing cyber risk in organizations and implementing more governance, …
  continue reading
 
Cyber security leaders need to be empowered addressing below GenAI impacts What if my security team want to leverage GenAI use-cases? What if my business team want to evaluate, experiment, perform POCs around GenAI apps? What if my business team continue to consume the GenAI products? What if my organizations targeted by AI attacker? --- Send in a …
  continue reading
 
Dive into the shadowy world of lateral movement in cybersecurity. In this episode of The Cyber Riddler. Explore how attackers stealthily navigate networks post-breach, using techniques from credential exploitation to abusing legitimate tools. Featuring real-world scenarios, this episode unveils the strategies behind advanced persistent threats and …
  continue reading
 
Loading …

Ghid rapid de referință