Cybersecurity focus with an emphasis on industry vendor products that help solve cybersecurity challenges.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cyberbacker: To empower growth-minded, emerging business owners with world-class, economical leverage to fulfill their greatest purpose! To know more about us visit www.cyberbacker.com
…
continue reading
Unzipped...presented by Cybersocket.com is your ultimate resource to gay erotica featuring porn star interviews, hot topics, adult industry behind the scenes, and more. For and by the community for over 25 years. Plug In. Get Off.
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A high action, serial audio drama adventure following the wild lives of those living in the cyberpunk-deco city of Neo-Atlantis, 2112.
…
continue reading
CyberCast offers a different and thoughtful perspective on the cybersecurity issues facing industry and government today. 213656
…
continue reading
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Daily update on current cyber security threats
…
continue reading
CyberSound is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
北欧に居住していた古代民族にとって、サウナストーンと呼ばれる石の熱と、石に水をかけて立ち上る蒸気は、人間の生命力として考えられていました。サウナは今日でも、健康のためだけではなく、人々の意見交換の場としても使用されています WithSecureの日本語ポッドキャスト『Cyber SecurityサウナJapan』は、社内外のセキュリティエキスパートをホスト/ゲストとして、様々なことが起こっているセキュリティ業界でのホットなトレンドやテクノロジーに関する情報、そしてインサイトをお届けしていきます。
…
continue reading
Cybernormer er produceret at Cybernauterne, et netværk af eksperter i cybersikkerhed og digital dannelse.
…
continue reading
Zaproszeni goście komentują ostatnie wydarzenia ze świata bezpieczeństwa teleinformatycznego.
…
continue reading
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
Your Favorite Existentialist-Anarchist Internet BadassCommentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Cybersicherheit auf die Ohren - mit CYBERSNACS, dem Podcast der Allianz für Cyber-Sicherheit. Regelmäßig stellen unsere Hosts Themen rund um Digitalisierung und Cyber-Sicherheit in der Wirtschaft vor. Dazu sprechen wir mit Expertinnen und Experten aus der Wirtschaft und dem IT-Bereich und geben im CYBERSNACS-Radar einen Ausblick auf aktuelle Entwicklungen. Wir nehmen uns die Zeit, Themen aus verschiedenen Blickwinkeln zu beleuchten. Dabei klären wir nicht nur die technischen Grundlagen, sond ...
…
continue reading
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
…
continue reading
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
…
continue reading
Een podcast voor, door en over vrouwen in cybersecurity.
…
continue reading
Are you a cybersecurity professional who wants to be updated with the latest industry news, emerging threats and challenges but you've got no time to wade through white papers or the tech press? Are you a passionate person about cybersecurity who just wants to learn more on how to protect information? We've got you covered. The Cyberstar Talk's Podcast allows you to stay up to date as you’re going on with your daily grind. This channel will provide you with a bunch of exclusive and best inte ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
…
continue reading
C
Cybersecurity Awesomeness Podcast


1
Cybersecurity Awesomeness Podcast
Enterprise Management Associates + DEVOPSdigest
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
We Interview experts in cyber security, technology and other interesting domains. We discuss cybersecurity, national security, crypto, IoT, and other technology. RealTime Cyber Implements Cybersecurity Controls, Cybersecurity Frameworks, and application security practices. Find out more at RealTimeCyber.net
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/
…
continue reading
Restrike brings you a daily feed of the latest news in CyberSecurity
…
continue reading
Mon nom est Michael VIRGONE, ma passion pour la cybersécurité ayant grandi au cours de mon parcours de commercial dans la cyber, pour vulgariser la cyber et faire de la sensibilisation j'ai décidé d'agir en créant ce podcast. Le tout dans une ambiance décontractée.
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
C
Control Loop: The OT Cybersecurity Podcast


1
Control Loop: The OT Cybersecurity Podcast
N2K Networks
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
How to manage Cybersecurity Risks and Regulations without losing your sanity . Discussing that magical intersection between cybersecurity and financial services regulations. No jargon, no scare stories. Just Plain English news and advice.
…
continue reading
Join us for State of Cybercrime, where experts discuss the latest trends and developments in the world of cybercrime and provide insights into how organizations can protect themselves from potential threats. Sponsored by Varonis
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
M
Mahlzeit! Mundgerechte Cybersecurity am Mittag


1
Mahlzeit! Mundgerechte Cybersecurity am Mittag
4S IT-Solutions AG
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: info@4s-ag.de https://www.4s-ag.de
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
T
To The Point - Cybersecurity


1
To The Point - Cybersecurity
Forcepoint | Global Cybersecurity Leader | Security. Simplified.
Forcepoint’s To The Point Cybersecurity Podcast covers the latest cyber news, threats, and trends impacting the federal government and world at large.
…
continue reading
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
…
continue reading
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
ISC StormCast for Thursday, December 7th, 2023
5:50
5:50
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
5:50
Whose packet is is anyway: a new RFC for attribution of internet probes https://isc.sans.edu/forums/diary/Whose%20packet%20is%20it%20anyway%3A%20a%20new%20RFC%20for%20attribution%20of%20internet%20probes/30456/ MLFlow Vulnerability https://www.contrastsecurity.com/security-influencers/discovering-mlflow-framework-zero-day-vulnerability-machine-lang…
…
continue reading
C
Cyber Dandy


1
Proudhon vs Marx with Douglas Lain and Ben Burgis
1:25:18
1:25:18
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:25:18
After months of comparing Proudhon's "System of Economic Contradictions" with Marx's "The Poverty of Philosophy", Cyber Dandy and Ben Burgis join Douglas Lain to compare notes and debate the merits of the two works. Ben Burgis' Give Them an Argument: https://www.youtube.com/ @BenBurgisGTAA Douglas Lain's Sublation Media: https://www.youtube.com/ @s…
…
continue reading
S
Simply Cyber


1
🔴 December 6's Top Cyber News NOW! - Ep 509
1:09:08
1:09:08
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:09:08
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading
C
Cybercrime Magazine Podcast


1
Cybercrime Wire For Dec. 6, 2023. Florida Water Agency Confirms Cyber Incident. WCYB Digital Radio.
1:23
1:23
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:23
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
A
All the Cyber Ladies


1
All the Cyber Ladies met Lisette Meij
32:07
32:07
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:07
Met de Cyber Lady van deze week duiken we in de wereld van wetten en regels, om specifieker te zijn: ICTrecht. Deze juridische eindbaas is techjurist en richt zich met name op de juridische grenzen bij het gebruik van data en datagedreven werken. Ze is directeur, eigenaar van Lime Legal, een vast gezicht van de podcast Angry Nerds en regelmatig te …
…
continue reading
C
Cybersecurity Today


1
Cyber Security Today, Dec. 6, 2023 - Warnings about Russian-based cyber attacks, and more
5:50
5:50
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
5:50
This episode reports on abuse of Go language repositories, unpatched Outlook servers targeted by Russian group, and moreDe către ITWC
…
continue reading
T
The Cyber Threat Perspective


1
Episode 69: Future Trends in Penetration Testing Part 1
24:32
24:32
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
24:32
In this episode Brad and Darrius discuss future trends in penetration testing. We plan for this to be a multi-part series and in this part listen to Brad and Darrius delve into why keeping pace with current and future trends is important, evolving threats, the cloud and much more! Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberth…
…
continue reading
C
Cyber Security Headlines


1
Mexican spyware trial, Breach of ColdFusion vuln, Malicious loan app downloaded 12MM
8:17
8:17
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
8:17
Spyware trial implicating former Mexican president kicks off Federal agency breached through Adobe ColdFusion vulnerability Malicious loan app downloaded 12 million times from Google Play Huge thanks to our sponsor, Barricade Cyber Solutions Don't let ransomware ruin your holiday. Remember to visit recoverfromransomware.com! Barricade Cyber Solutio…
…
continue reading
N
New Cyber Frontier


1
NCF-336 Confidential Computing Explained
31:58
31:58
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:58
Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is act…
…
continue reading
C
Cyber and Technology with Mike


1
05 December 2023 Cyber and Tech News
9:59
9:59
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
9:59
In today’s podcast we cover four crucial cyber and technology topics, including: 1. Google fixes abused bug in Android 2. Bluetooth flaw leading to impersonation disclosed 3. Microsoft detects shift in malware used by ransomware gang 4. Florida water districts latest utility to be impacted by cyber attack I'd love feedback, feel free to send your c…
…
continue reading
C
Cyber Security Weekly Podcast


Dr. Yuriy Bulygin is the CEO and founder of Eclypsium, the digital supply chain security company that helps organizations protect their critical hardware, firmware, and software. Prior to Eclypsium, Yuriy was Chief Threat Researcher and led the Microprocessor Security Analysis team at Intel Corporation, as well as the Advanced Threat Research team …
…
continue reading
C
Cyber Work


1
Empowering African Women through Cybersecurity | Cyber Work Podcast
1:09:32
1:09:32
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:09:32
Confidence Staveley of the CyberSafe Foundation and the CyberGirls program is today's guest. CyberGirls is a year-long cohort program in which women in Africa ages 18 to 28 can learn cybersecurity basics and create career tracks to fast-track these students into cybersecurity careers! Staveley tells us about the workings of the program, how she use…
…
continue reading
C
Cyber Security Sauna Japan


1
エピソード #12: IT系記者さん/編集者さん 覆面座談会 (後編)
19:23
19:23
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
19:23
サウナのようにホットなセキュリティトレンド、テクノロジー、インサイトをお届けするポッドキャスト『Cyber SecurityサウナJapan』。第12回目は、IT系の記者さん/編集者さん4人にご参加いただいた覆面座談会の後編として「最近の日本企業のサイバーセキュリティ対する意識の変化」についてお話しいただいています。De către WithSecure
…
continue reading
C
Cyber, cyber...


1
Cyber, Cyber… – 364 – Raport – Wyciek z laboratoriów Alab i 10 prezentów dla cyberekspertów
31:10
31:10
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:10
Witaj w “Cyber, Cyber… Raport” – specjalnej edycji naszego podcastu, poświęconej fascynującemu światowi cyberprzestrzeni. Co tydzień przenosimy Cię w świat najnowszych wydarzeń z dziedziny cyberbezpieczeństwa, analizując najważniejsze zagrożenia, trendy i wydarzenia. Nasz zespół ekspercki śledzi, interpretuje i dzieli się najbardziej aktualnymi inf…
…
continue reading
C
CYBER


1
How Online Fights Affect Real World Battlefields
51:02
51:02
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
51:02
Your posts matter more than you think. Social media has changed the way wars are fought and the internet has become a new battlefield. Twitter may be dying, but it still matters an awful lot to policy makers. TikTok is ascendent, but often because its content can be repurposed on other platforms. Telegram can give you the news on the ground, but on…
…
continue reading
1
10 Questions to Cyber Resilience


1
Unlocking the Secrets of Manufacturing Cybersecurity, with Tanium's Ashley McGlone
27:15
27:15
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
27:15
Dive into the world of manufacturing cybersecurity with an insightful podcast episode featuring Ashley McGlone, a seasoned technology strategist from Tanium. Join your host, Luigi Tiano, as he engages in a riveting conversation with Ashley, unraveling the complexities of Industry 4.0, IoT, and the critical role of cybersecurity in the manufacturing…
…
continue reading
What is important?In this episode Toby and Tom discuss why understanding the business impact is key to context for any cyber security programme, and a process for working it out.If you want any cyber security support please get in contact with the team via the website: https://clearcutcyber.comMusic is Green Lights by Jahzzar from the Free Music Ar…
…
continue reading
C
Control Loop: The OT Cybersecurity Podcast


1
Building automation systems and maritime cyber regulations.
36:48
36:48
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
36:48
GRU's Sandworm implicated in campaign against Danish electrical power providers. Paris wastewater agency hit by cyberattack. LockBit hits Boeing. Bletchley Declaration represents a consensus starting point for AI governance. The US Executive Order on artificial intelligence is out. Guest Austin Reid of ABS Group discusses Ship and Shore challenges …
…
continue reading
C
Cyber Inspiration


1
Episode 59 - Joshua Crumbaugh - CEO of PhishFirewall
23:14
23:14
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
23:14
Welcome to Cyber Inspiration Podcast, you may be familiar with me as Co-host of the Security Architecture Podcast, which I started with Dmitry Raidman CTO of Cybeats in 2020. From the Episode: When you look at the social engineering attacks that target our people, they are targeting what are called these cognitive biases. When you get funding, just…
…
continue reading
T
To The Point - Cybersecurity


1
Cyber Is A Business Imperative with Ken Bible
32:12
32:12
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:12
This week we are joined by Kenneth Bible, the Chief Information Security Officer (CISO) for the DHS Office of the Chief Information Officer (OCIO). He breaks down the National Cybersecurity Strategy Implementation Plan (NCSIP) introduced in July and provides great insights on how the plan was developed, the five key pillars of the plan, actioning e…
…
continue reading
C
Cyber Defense Radio


1
Cyber Defense Radio - Endace - Update - Hotseat - Podcast - 2023
9:50
9:50
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
9:50
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Michael Morris of Endace. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ #cloud #alwayson #network #packet #capture #cyberdefense #c…
…
continue reading
R
RealTime Cyber


1
The Space Domain & Electronic Battlefield; from Military to Startups
48:04
48:04
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
48:04
Mark Reed is a former U.S Air Force officer who worked on Satellites before transitioning to private sector Satellite & Space Technology Startups. We talk about the nature of space technologies, technical limitations, satellite traffic control, electronic warfare in space, GPS signals, and some concerning trends around GPS signals jamming and inter…
…
continue reading
E
Emerging Cyber Risk


1
Joel's Book Review (Secure Intelligent Machines)
35:04
35:04
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
35:04
On this episode of the Emerging Cyber Risk podcast, we Joel's latest book, "Secure Intelligent Machines". The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. This podcast epis…
…
continue reading
C
Cyber Insurance Leaders


1
Ep 35 - The Legal Perspective: Talent Shortages, Insurance Pricing, and Supply Chain Risk in the Eyes of an Attorney - with Spencer Pollock
1:03:17
1:03:17
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:03:17
Spencer Pollock is a Data Privacy and Cybersecurity Attorney at McDonald Hopkins with a wealth of knowledge on the interplay between law, insurance, and cyber. Tune in to this episode for insights into talent shortages, insurance pricing dynamics, and the escalating risks in supply chains. Spencer also casts his thoughts over topics like inconsiste…
…
continue reading
C
Cybersecurity Without Insanity


1
Income generation strategies from the cyber world.
6:27
6:27
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
6:27
This week: As many of you may currently be finalising your income generation strategies for 2024, here’s the Top 3 from the world of cyber crime: A new entry at #3: Using the regulators. Back at #2: Using cyber attacks. But still at #1, for the 1197th week in a row: Using your staff! Links to this week's articles are accessible from https://codeinm…
…
continue reading
t
teissPodcast - Cracking Cyber Security


1
teissTalk: Embracing AI tools across your organisation - ensuring you remain secure
46:41
46:41
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
46:41
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Embracing AI tools across your organisation - ensuring you remain secure The opportunities and risks widespread adoption of AI poses to your organisation How infosec thin…
…
continue reading
C
Cyber Security Sauna


1
085| NIST Cyber Security Framework V.2 – Help or Hindrance?
44:04
44:04
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
44:04
The NIST Cyber Security Framework has helped secure organizations for nearly a decade and while it’s proven to be an invaluable tool, it’s gotten a bit long in the tooth for a cyber security landscape that never stays static. Enter V.2 which goes a long way in identifying the increasing cyber risk in organizations and implementing more governance, …
…
continue reading
F
Future of Cyber Security

1
Episode 39 - GenAI and guidance to cyber security practitioners
7:33
7:33
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
7:33
Cyber security leaders need to be empowered addressing below GenAI impacts What if my security team want to leverage GenAI use-cases? What if my business team want to evaluate, experiment, perform POCs around GenAI apps? What if my business team continue to consume the GenAI products? What if my organizations targeted by AI attacker? --- Send in a …
…
continue reading
Dive into the shadowy world of lateral movement in cybersecurity. In this episode of The Cyber Riddler. Explore how attackers stealthily navigate networks post-breach, using techniques from credential exploitation to abusing legitimate tools. Featuring real-world scenarios, this episode unveils the strategies behind advanced persistent threats and …
…
continue reading