Cybersec public
[search 0]
Mai Mult
Download the App!
show episodes
 
Artwork
 
Herzlich Willkommen im Cybersecurity Basement. In unserem Podcast sprechen vor allem Andreas Papadaniil und Michael Döhmen alle 14 Tage über Themen aus dem Bereich Cybersecurity. Dabei legen wir großen Wert auf Objektivität gelegt. Kein suresecure-Feature-Fucking, sondern ein seriöser, authentischer und ehrlicher Austausch aus Theorie und Praxis. Der Podcast richtet sich an IT- und Security-Entscheider und alle, die es mal werden wollen. Hier gibts kein Blabla, sondern Security als Handwerk. ...
  continue reading
 
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
Artwork

1
Cybersecurity Where You Are

Center for Internet Security

Unsubscribe
Unsubscribe
Lunar+
 
Welcome to “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidenc ...
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

Unsubscribe
Unsubscribe
Lunar
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
1234, come la password che non dovreste mai scegliere. Come la password che la maggior parte degli utenti sceglie. Dalle truffe online agli intrighi internazionali, in ogni puntata approfondiamo la storia di cybersecurity del momento. A cura di Alberto Giuffrè
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
In this EM360 podcast, we investigate the cutting edge Cybersecurity issues that organisations are facing today. These discussions are led by the organisations at the forefront of defence as they walk us through the issues people are facing and how to effectively implement prevention strategies.
  continue reading
 
What risks lie at the intersection of healthcare and data? Are our food production capabilities at risk of cyberattack? How can we stay ahead of scammers, bad actors, and cybercriminals? Brought to you by the Cyber Innovation Hub and Business News Wales, and hosted by Carwyn Jones, the Cybersecurity Roundtables will bring together industry experts from across the cybersecurity landscape. These experts will discuss, on a sector-by-sector basis, the critical challenges facing the industry today.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
  continue reading
 
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono di ogni tipo: le imprese (dalle grandi multinazionali alle Piccole e Medie Imprese); gli enti e le organizzazioni di ogni ordine e grado; i privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell’attacco, entità della struttura attaccata o danni provocati. Altri sono stati meno esposti alla luce dei media, ma hanno comunque creato grav ...
  continue reading
 
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
  continue reading
 
Welcome to Security Sutra, a sub-podcast of Startuprad.io™, dedicated to safeguarding your startup against cyber threats in today's digital landscape. As part of one of the top 20 entrepreneurship podcasts on Apple Podcasts worldwide, we bring you vital insights into cybersecurity, blending deep tech with entrepreneurship to empower your startup. Our podcast features a diverse range of guests, including industry-leading cybersecurity entrepreneurs, Emmy winners, New York Times best-selling a ...
  continue reading
 
The podcast for sales and marketing teams that tackles the question: How can cybersecurity companies grow sales faster? We talk with cybersecurity CROs, CMOs, CEOs, as well as sales and marketing experts. Listen in, and you will get proven strategies to - help you get more leads - win more customers, and, - create your killer go-to-market growth engine. If you are a seller, marketer, leader, CEO, or founder at a cybersecurity company, you are in the right place.
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Today, software is the power that moves society. To stay in control over their intellectual property and remain competitive on the market software publishers and intelligent device manufacturers need to integrate top-notch protections against counterfeiting, reverse engineering, and tampering and implement an orchestration of license models that fully respond to the customer’s needs on a global scale. CodeMeter by Wibu-Systems is a comprehensive and award-winning suite of hardware-, software ...
  continue reading
 
Artwork

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
Lunar
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
  continue reading
 
Artwork

1
Cybervize Cybersecurity

Alexander Busse | Cybervize

Unsubscribe
Unsubscribe
Lunar
 
Cybersicherheit kann man auch hören, in unserem Podcast. Abonnieren sie uns und hören sie, was Experten aus der Branche zu sagen haben, ohne dass sie selbst ein Experte sein müssen, um es zu verstehen.
  continue reading
 
Artwork

1
C bot run : A K12 Cybersecurity Podcast

Jennette Irish Glass, John Rizzo, and Sean Whelan

Unsubscribe
Unsubscribe
Lunar
 
C:\bot_run is a K-12 Podcast produced by Technology Directors who are navigating the complicated and ever-changing realm of cybersecurity. Monthly episodes feature guests and topics designed around dialogue and resources focused on educating and networking with technology professionals.
  continue reading
 
Artwork
 
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
  continue reading
 
Artwork

1
Fortinet Cybersecurity Podcast

Fortinet Cybersecurity Podcast

Unsubscribe
Unsubscribe
Lunar+
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
  continue reading
 
When a state-of-the-art chatbot unexpectedly exposes confidential corporate data, Maria is thrust into action, determined to uncover the underlying cause of this breach. This is the story from inside a hack: the twists and turns, the strategies that worked, and the lessons learned as Maria and her team strive to unraveling the layers of this mysterious incident and safeguard their client’s sensitive information.
  continue reading
 
Artwork
 
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
  continue reading
 
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: info@4s-ag.de https://www.4s-ag.de
  continue reading
 
Ingram Micro Cloud BeNeLux presents a monthly cybersecurity podcast. In this podcast you get the hottest and latest cybersecurity updates. Every month we take a deep dive in one specific cybersecurity subject with the best experts in the business.
  continue reading
 
Welcome to The Rocheston Cybersecurity Podcast, your go-to podcast for demystifying cybersecurity concepts in a global context. Hosted by Haja Mo who has a passion for cybersecurity education, this podcast breaks down complex topics into easy-to-understand explanations, ensuring that listeners of all backgrounds can grasp essential cybersecurity principles. In each episode, we delve into various cybersecurity concepts, making it easy for everyone to understand. Whether you're a tech enthusia ...
  continue reading
 
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
  continue reading
 
Loading …
show series
 
This story was originally published on HackerNoon at: https://hackernoon.com/can-your-java-cryptography-architecture-survive-a-quantum-attack. Learn how to optimize Java Cryptography Architecture (JCA) to withstand quantum computing threats, with best. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can a…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/infinidat-revolutionizes-enterprise-cyber-storage-protection-combats-ransomware-and-malware-threats. Sophisticated cyberattacks, including new sinister forms of AI-driven attacks, are increasingly targeting the data storage infrastructure of enterprises. Check more stories…
  continue reading
 
Alias CEO Donovan Farrow and Business Development Coordinator Trey Allen talk the tips and tricks of the vishing trade. They're gearing up for the DEFCON social engineering village. Listen or watch to hear their tales and experiences to learn how they're going to bring the heat to Las Vegas. Watch the full video at youtube.com/@aliascybersecurity. …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/firetail-unveils-free-access-for-all-to-cutting-edge-api-security-platform. This initiative opens the door for developers and organizations of any size to access enterprise-level API security tools. Today, over 80% of all internet traff Check more stories related to cybers…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-role-of-data-destruction-in-cybersecurity. What happens to information when it's no longer necessary? If you're concerned with cybersecurity, you should destroy it. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also che…
  continue reading
 
Are you a technical founder struggling to navigate sales in your cybersecurity startup? Do you find it challenging to balance technology discussions with business outcomes? Are you curious when to bring in sales professionals for a consistent approach? In this conversation, we discuss: 👉 The journey of a technical founder learning sales through tri…
  continue reading
 
This Month in German, Swiss, and Austrian Startups - June 2024 | Startuprad.io Welcome to our June 2024 wrap-up, where we bring you the latest news from the startup and tech entrepreneurship scenes in Germany, Austria, and Switzerland, all in under 30 minutes! In this episode, recorded with Chris in New York City and Joe joining from Frankfurt, we …
  continue reading
 
Steigt ein in unsere kleine NIS2-Lok und erfahrt, wo es auf der Strecke noch Verspätungen gibt! An einigen Bahnhöfen sind die Bauarbeiten noch nicht abgeschlossen. Welche Streckenabschnitte werden tatsächlich in Betrieb genommen und wie sieht es mit der Haftung des Managements aus? Der Streckenplan muss von Anfang an tragfähig sein. Denn nach NIS2 …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/cybersecurity-neglect-the-silent-killer-of-businesses. Cybersecurity neglect is a silent killer for businesses. Find out how to recognize the signs and take action to protect your business. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecur…
  continue reading
 
Send us a Text Message. Have you ever wondered how to keep your data and devices secure while you're traveling for work or vacation? This episode of the Bee Cyber Fit podcast has you covered! We're talking all things secure summer travel: ▶️ hidden risks lurking on public Wi-Fi networks in hotels, airports, and other places ▶️ important tips to saf…
  continue reading
 
In episode 89 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by the following guests: Rian Davis, Elections Cyber Threat Intelligence Intern at the Center for Internet Security® (CIS®) Timothy Davis, Sr. Elections Cyber Threat Intelligence Analyst at CIS Together, they discuss how cyber threat actors (CTAs) are using generative art…
  continue reading
 
In this episode, Stan Wisseman and Rob Aragao welcome Justin Young to explore the transformative role of Software Bill of Materials (SBOMs) in enhancing software supply chain security. Justin shares his extensive experience and insights into how SBOMs contribute to the maturation of the software industry, drawing parallels with the auto and food in…
  continue reading
 
Craig Duckworth and Dino Busalachi discuss the pressing issue of cybersecurity compliance for publicly traded companies under new SEC regulations. They discuss the reasons behind the low number of reported breaches, including national security exemptions and potential corporate negligence. Craig and Dino address the challenges companies face in saf…
  continue reading
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Intro Agenda Who are you wearing? Nerd Zone Microsoft Patch Tuesday for June Rockstar Games Veeam vulnerability Microsoft researcher alerted the business of the SolarWinds hack, but was ignored Hot topic 2024 Verizon DBIR Introduction Key Findings Top Threat Ac…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/inside-job-the-subtle-ways-employees-bypass-security-measures. Protect your business by understanding the subtle ways employees bypass security measures. Get insights and solutions to prevent data breaches. Check more stories related to cybersecurity at: https://hackernoon…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/cyber-hygiene-recognizing-scam-trends-and-protecting-against-data-breaches. The need for cybersecurity data loss prevention goes beyond a simple compliance checkbox in the constantly changing world of threats. Check more stories related to cybersecurity at: https://hackern…
  continue reading
 
This episode features a discussion on an undiscovered three-year hack, the cause of Snowflake attacks and allegations of how an Australian health insurer was compromised Join Howard Solomon and David Shipley in the weekend review edition of Cybersecurity Today for insights into major cybersecurity incidents. Topics include a three-year undetected h…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/1inch-partners-with-blockaid-to-enhance-web3-security-through-the-1inch-shield. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #1inch, #cyberwire, #press-release, #1inch-ann…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/ine-security-optimizing-teams-for-ai-and-cybersecurity. With the near-universal integration of AI into global technology, the need for AI-ready cybersecurity teams is more critical than ever. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
  continue reading
 
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) for a follow-up on Verizon's 2024 Data Breach Investigations Report, discussing the two main attack vectors used in most breaches -- phishing and credential attacks -- and how your organization should go about defending itself. To vie…
  continue reading
 
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the Cisco and Splunk conferences with special guest Shamus McGillicuddy, EMA VP of Research, Network Infrastructure and Operations.…
  continue reading
 
Seconde partie de mon échange avec Lucie POIRAUD, RSSI Opérationnelle chez le Groupe Atlantic. 👉 possible décalage de +/- 10 secondes des timestamps selon la plateforme d'écoute ✅ CONTENU✅ (00:52) - Début du podcast + certes, même si subir une cyberattaque est une expérience négative, peut-elle être mise en avant lors de sa candidature pour de futu…
  continue reading
 
SOTTO ATTACCO | Episodio 26: Caos nei laboratori Synlab, i dati dei pazienti a rischio In questo nuovo episodio della serie "Sotto Attacco", realizzata da Sophos con il supporto di Radio IT, ti raccontiamo l'attacco hacker subito da Synlab Italia. È una luminosa mattina di aprile Tre persone, in altrettante città italiane, si svegliano con un pensi…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-icps-walletless-solution-enhances-online-trust-and-privacy. Explore the benefits of Internet Computer Protocol's walletless solution which allows users to selectively disclose identity attributes, enhancing online trust. Check more stories related to cybersecurity at: …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/why-you-shouldnt-unsubscribe-from-spam-emails. Spam emails are annoying, and the impulse is to unsubscribe — but that could just make things worse. Here's why. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclus…
  continue reading
 
In episode 88 of Cybersecurity Where You Are, co-host Sean Atkinson discusses the evolving role of a chief information security officer (CISO). Here are some highlights from our episode: 02:47. Why communication is a core competency for CISOs 08:35. How to take a balanced approach when evaluating an organization's implementation of artificial intel…
  continue reading
 
In this episode of the Cybersecurity roundtables by Business News Wales and the Cyber Innovation Hub, we focus on the relevance of cybersecurity to the feild of Agritech. Three guests—Pete Burnup, Tom Burke, and Rachel Maidley Davis—discuss various aspects of cybersecurity in the Agritech sector. Key topics include the types of data handled by farm…
  continue reading
 
In this Business News Wales discussion, Carwyn Jones hosts a panel featuring experts in both the cyber and health tech sectors: Pete Burnap, Gethin Roberts, Tony Trussell, Angharad Watson, and Jonathan Stock. The panel delves into the importance of cybersecurity in healthcare, identifying key vulnerabilities and best practices. Topics include the r…
  continue reading
 
In this podcast episode, hosts Rob Aragao and Stan Wisseman are joined by Arun DeSouza, a renowned expert in connected vehicle security and former CISO at leading automotive companies. Arun begins by highlighting the critical challenges facing connected vehicles, emphasizing the importance of security by design throughout the development lifecycle.…
  continue reading
 
Dino Busalachi and Craig Duckworth, CTO and CEO of Velta Technology, respectively, tackle the inherent risks of CISO resignations. They discuss the immense stress and challenges that put these crucial roles at risk. They talk about the unique struggles CISOs face in managing industrial cybersecurity, where outdated systems and a lack of authority c…
  continue reading
 
Today, small businesses face significant challenges. Limited resources, tight budgets, time constraints, and inadequate training often leave them vulnerable. Hackers quickly exploit these weaknesses, targeting small and medium-sized businesses (SMBs) with sophisticated threats. Managed Service Providers (MSPs) are tasked with the daunting responsib…
  continue reading
 
Sean Mahoney of Netswitch is joined by Wil Lassalle, of JLS, Tech to talk about a headline story and share some insights about preventing a similar event from occurring for your SMB. The guys explore why small businesses are more susceptible to cyberattacks than larger corporations. They talk about the perception among cybercriminals that small bus…
  continue reading
 
The 2024 Attack Intelligence Report thoroughly analyses the latest trends, tactics, and techniques used by cyber adversaries. This year's report highlights a significant increase in sophisticated attacks, including advanced persistent threats (APTs) and highly targeted ransomware campaigns. By leveraging the MITRE ATT&CK framework, the report offer…
  continue reading
 
Podcast Episode Show Notes: Importance of Incident Response Plans (IRPs) Episode Highlights: Rising Cybersecurity Threats:Discussing the increasing threat levels and the growing importance of cybersecurity. Incident Response Plans (IRPs): Why IRPs are essential and how they serve as a playbook during cyber incidents. Key Topics Covered: Need for IR…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/cryptographic-ransomware-encryption-detection-survey-authors-declaration. In this paper, researchers propose a cyber kill chain that describes the modern crypto-ransomware attack. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You c…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/cryptographic-ransomware-encryption-detection-survey-abstract-and-introduction. In this paper, researchers propose a cyber kill chain that describes the modern crypto-ransomware attack. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/why-the-lessons-of-the-british-airways-data-breach-are-timelier-than-ever. Browser supply chain attacks exploiting third-party scripts pose a severe threat. Learn why malicious script injections are so dangerous. Check more stories related to cybersecurity at: https://hack…
  continue reading
 
Loading …

Ghid rapid de referință