疲惫娇娃是一档从荧幕聊到宇宙深处的泛文化播客,用女性的声波延展对世界的参与和想象。 在一个内陷的时代,疲惫娇娃站在中国和美国的交汇点上,用女性的元视角去观察、抵抗、塑造政治和社会对流行文化的影响。我们讨论流动的时代精神、艺术、自由、未来、友谊以及一切使我们获得力量的事物。
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
A high action, serial audio drama adventure following the wild lives of those living in the cyberpunk-deco city of Neo-Atlantis, 2112.
…
continue reading
Cybernormer er en podcast om teknologi og samfund. Den er produceret at Cybernauterne, et netværk af eksperter i cybersikkerhed, internetkultur og digital forståelse. Læs mere om os på vores hjemmeside cybernauterne.dk
…
continue reading
Daily update on current cyber security threats
…
continue reading
北欧に居住していた古代民族にとって、サウナストーンと呼ばれる石の熱と、石に水をかけて立ち上る蒸気は、人間の生命力として考えられていました。サウナは今日でも、健康のためだけではなく、人々の意見交換の場としても使用されています WithSecureの日本語ポッドキャスト『Cyber SecurityサウナJapan』は、社内外のセキュリティエキスパートをホスト/ゲストとして、様々なことが起こっているセキュリティ業界でのホットなトレンドやテクノロジーに関する情報、そしてインサイトをお届けしていきます。
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
Comedians and Friends Chad Daniels and Cy Amundson host a weekly podcast where they tell stories about their lives. For advertising opportunities please email PodcastPartnerships@Studio71us.com We wanna make the podcast even better, help us learn how we can: https://bit.ly/2EcYbu4 Privacy Policy: https://www.studio71.com/us/terms-and-conditions-use/#Privacy%20Policy
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Stand-Up Comic and host of ESPN's Sportscenter on Snapchat, Cy Amundson, brings comedy and sports together in hilarious hour-long podcast episodes.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
Each week Toastie and Jennasis bring you the foundations of the past, the state of Night City today, and news of the future for all things Cyberpunk. We talk about the TTRGP, 2077, and every hidden gem we can find. Subscribe for more Cyberpunk lore, news, and more! Patreon - Get ad-free episodes early & support the show! Behind-the-scenes content and more https://www.patreon.com/cyberpunklorecast Discord: https://discord.gg/JXKfVhm Twitter: https://twitter.com/CyberpunkLore Email: cyberpunkl ...
…
continue reading
Een podcast voor, door en over vrouwen in cybersecurity.
…
continue reading
Dark Future Dice is an actual play podcast in which Titus, Lindsay and Sloane delve into the dystopian worlds of Cyberpunk 2020 and Red, weaving narratives that deal with trauma, human connection, and marginalization within an unforgiving dark future. Available on: Spotify: https://spoti.fi/2SG0xtn Apple: https://apple.co/39Fij5M Patreon: https://www.patreon.com/rocketadrift
…
continue reading
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
The Cyber Consulting Room Podcast and Meetup Network is your gateway to a world of knowledge and collaboration in the ever-evolving realm of cyber security and consulting. Our podcast, hosted by Gordon Draper, brings you in-depth interviews with industry leaders, experts, and trailblazers, offering invaluable insights, strategies, and experiences. From award-winning professionals to those paving the way for diversity in the field, we delve into the most pressing issues and emerging trends. B ...
…
continue reading
A podcast for anyone and everyone interested in leadership in the cybersecurity industry - we talk about the challenges impacting our industry & how leadership can address that and gain insights, advice and the occasional anecdote from experienced leaders who are happy to share their stories with us!
…
continue reading
High tech, low budget. Library technology, FOSS, and cyberpunk.
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
บอกเล่าเรื่องราวในโลกไอทีมาอยู่หน้าไมค์
…
continue reading
Podcast francophone de vulgarisation des sujets de la cybersécurité, dans une ambiance décontractée. Animé par Michael VIRGONE, commercial et passionné de cyber depuis plusieurs années
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
Cybersecurity and book review and how cybersecurity needs to be managed how to speak to a board and many more. If this is something in your ballpark. Join the club.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. brad@securit360.com
…
continue reading
Ride the cyber trails with one CISO (Allan Alford) and a diverse group of friends and experts who bring a human perspective to cybersecurity.
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
In this episode of The Cy Amundson Show, we're hittin' all the tastiest talking points after a huge slate of Week 11 NFL action... SPORTS! ------------- The Cy Amundson Show (@cyamundsonshow) is one of the best sports comedy podcasts around with Cy Amundson (@cyamundson), Blake Wexler (@BlakeWexler), Tom Schreier (@tschreier3), Ethan Heidorn (@etha…
…
continue reading
1
Mommas Don’t Let Your Babies Grow Up To Say Daddy
53:56
53:56
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
53:56
This week, Chad goes to Dublin and Cy reads about a medical marvel. We have a FREE new Patreon post up! Go check it out + get subscribed! :-) Head on over to Chad's YouTube page to watch this episode! --- Follow us on Instagram! Chad Daniels (@ThatChadDaniels) is a Dad, Comedian, and pancake lover. With over 750 million streams of his 5 albums to d…
…
continue reading
1
North Koreans Impersonate US IT Workers
16:35
16:35
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
16:35
Welcome To C.S. Cyber, Thanks For Clicking And Enjoy The Episode! ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/alerts/ to subscribe. ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on T…
…
continue reading
1
Inside Cyber: Chuck Brooks on His Book, AI, IoT & Cybersecurity's Future
19:23
19:23
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
19:23
In this episode, we are thrilled to welcome Chuck Brooks, a renowned cybersecurity expert and thought leader, to discuss his highly anticipated book, Inside Cyber. Chuck shares his journey from shaping a course on disruptive technologies to crafting a comprehensive resource on cybersecurity and emerging technologies. Buy Your Copy Here Key Topics C…
…
continue reading
1
All the Cyber Ladies met Maaike Hielkema
38:26
38:26
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
38:26
De Cyber Lady van deze week is incident responder MaaikeHielkema. Ze heeft een schat aan ervaring als het gaat om het managen van digitale incidenten en werkt momenteel voor de stichting Z-CERT. Het CERT voor de Nederlandse zorg. Ze is van oudsher forensisch onderzoeker, want spoorzoeken was haar passie. Incident respons ziet ze als een grote puzze…
…
continue reading
1
Episode 15: The Best Practices for Building a Transparent Cyber Security Consultancy with Matt Strahan
1:19:41
1:19:41
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:19:41
Can you believe there was a time when cybersecurity wasn’t a priority for most organizations? Just 20 years ago, simple passwords and basic firewalls were seen as enough protection. So, what changed? How did we go from minimal defenses to a world where cybersecurity is critical for survival? In this episode of the Cyber Consulting Room podcast, hos…
…
continue reading
1
Leading Cyber - in conversation with Melissa Gurney
59:51
59:51
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
59:51
In this episode, we chat with Melissa Gurney, CEO of Punk Security about her background in the RAF, her career and her thoughts and views on leadership; ranging from working with remote teams and compassion at work to experiencing bias and Melissa's rekindled love - trail running!De către Leading Cyber
…
continue reading
1
CCT 195: Navigating End-of-Life Systems: Balancing Cost, Compliance, and Security for CISSP Success (Domain 2.5)
15:03
15:03
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
15:03
Send us a text Ever wondered about the hidden dangers lurking in outdated systems? Join me, Sean Gerber, as we tackle the pressing issues surrounding end-of-life assets on the CISSP Cyber Training Podcast. This episode unpacks the critical risks of holding onto systems that no longer receive manufacturer support and the security implications that f…
…
continue reading
In this episode of the cyber riddler, we talked about the critical first stage of cyberattacks: Initial Access. Learn how hackers breach organizations using tactics like phishing, exploiting vulnerabilities, stolen credentials, and supply chain attacks. We’ll explore real-world examples, discuss why initial access is so crucial, and share practical…
…
continue reading
1
ISC StormCast for Thursday, November 21st, 2024
5:03
5:03
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
5:03
Apple Patches Two Exploited Vulnerabilities https://isc.sans.edu/diary/Apple%20Fixes%20Two%20Exploited%20Vulnerabilities/31452 Oracle Patch for Agile Product Lifecycle Management CVE-2024-21287 https://www.oracle.com/security-alerts/alert-cve-2024-21287.html OFBiz Patches CVE-2024-47208 CVE-2024-48962 https://nvd.nist.gov/vuln/detail/CVE-2024-47208…
…
continue reading
1
13 Cybersecurity Skills Paying $90K - $500K+ in 2025 📈 | EP14
12:06
12:06
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
12:06
Highest Paid Skills in Cyber Security In this episode of Cybersecurity Diaries, Nathan from Station X discusses the top cybersecurity skills that can significantly increase your salary. Starting from operational skills and moving up to high-demand areas such as AI and ML security, incident response, and risk management, Nathan details the salary ra…
…
continue reading
1
Scattered Spider arrest, telcos attacked, Apple exploit
8:04
8:04
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
8:04
US charges Scattered Spider members Chinese threat actors infiltrate more telcos Apple issues emergency security update Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, default-de…
…
continue reading
1
teissTalk: Reducing your security debt in a GenAI-driven world
43:21
43:21
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
43:21
Minimising the risks to your security posture from developers’ reliance on GenAI Using AI to speed up remediation and avoid security becoming the bottleneck Steps to ensure safe and secure implementation of GenAI in software development This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Lee Munson, Principal Research…
…
continue reading
1
Ep 50 - Cyber Risk Is Human: Why High-Tech Alone Won’t Manage the Threat - Ann Irvine
49:23
49:23
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
49:23
High-tech tools alone can’t manage today’s evolving cyber threats—human insight remains essential. In this episode, host Anthony Hess welcomes Ann Irvine, Chief Data and Analytics Officer at Resilience, who shares why cyber risk management requires more than just the latest tech. Ann explains how Resilience combines technology with hands-on experti…
…
continue reading
1
CONTESTED GROUND: Where does the misinformation bill leave free speech?
36:23
36:23
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
36:23
In this episode of the Contested Ground podcast, shadow minister for communications and federal member for Banks David Coleman joins host Liam Garman to discuss the recent misinformation bill that will leave free speech and political discourse in Australia. They begin the podcast with a recap of what’s in the bill, including how the government will…
…
continue reading
1
🚨 Apple Fixes MacOS Zerodays, Chinese Telecom Attackers Leverage Sigtran, Chinese Cybersecurity Threats
17:11
17:11
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
17:11
🚨 Apple Fixes MacOS Zerodays, Chinese Telecom Attackers Leverage Sigtran, Chinese Cybersecurity Threats 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Apple Fixes two zerodays for MacOS with Intel with more news below: • Cargill Kronos Lawsuit …
…
continue reading
1
Episode 115: How to understand and address risk w/ Robert McElroy
40:25
40:25
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
40:25
In this episode, we discuss the broad concept of risk, what it is, and how to manage it. This episode is a great way to begin understanding how to develop an overall risk management strategy at your organization or understand how a risk management program might work for you. You find out more about what Rob and his team can do here: https://www.sec…
…
continue reading
1
Hybrid Identity Protection - Amazing Interviews with Many Guests
31:42
31:42
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:42
This week Allan attended the HIP Global conference in New Orleans, which happens to be Allan's favorite city in America. The conference was outstanding - no sales pitches, no nonsense, just many experts speaking on the topic of securing identity. Entra ID, Okta, AD folks all were present, and it was amazing. Allan got to interview some AMAZING gues…
…
continue reading
1
Driving the Future: Cybersecurity Challenges for Connected Vehicles with Cheri Caddy
29:48
29:48
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
29:48
Overview: In this episode, host Frank Cilluffo sits down with Cheri Caddy, former Deputy Assistant National Cyber Director at the White House and senior technical advisor at the Department of Energy. They discuss the cybersecurity challenges surrounding connected vehicles, examining how modern cars are effectively "computers on wheels" and the broa…
…
continue reading
サウナのようにホットなセキュリティトレンド、テクノロジー、インサイトをお届けするポッドキャスト『Cyber SecurityサウナJapan』。第17回目は前回に引き続き、IT系記者さん2人を交えての「中小企業のセキュリティ対策」を取り上げたディスカッションの後半をお届けします。De către WithSecure
…
continue reading
1
Easterly to step down, Maxar discloses breach, Microsoft hacking event
7:57
7:57
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
7:57
CISA director Jen Easterly to step down Space tech giant Maxar discloses employee data breach Microsoft launches Zero Day Quest hacking event Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a…
…
continue reading
1
Microsoft Unveils New Cybersecurity Features at Ignite Conference: Cyber Security Today for November 20, 2024
9:01
9:01
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
9:01
Cybersecurity Today: Microsoft Updates, Gen AI Risks, and Liminal Panda Threat In this episode of Cybersecurity Today, host Jim Love discusses major cybersecurity updates from Microsoft's Ignite conference, including enhancements to Windows security and device recovery. A survey by LegitSecurity highlights the security risks associated with generat…
…
continue reading
1
ISC StormCast for Wednesday, November 20th, 2024
6:12
6:12
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
6:12
Detecting the Presence of a Debugger in Linux https://isc.sans.edu/diary/Detecting%20the%20Presence%20of%20a%20Debugger%20in%20Linux/31450 Palo Alto Patches https://security.paloaltonetworks.com/CVE-2024-0012 https://security.paloaltonetworks.com/CVE-2024-9474 VMware vCenter Server Attacks https://support.broadcom.com/web/ecx/support-content-notifi…
…
continue reading
1
Episode 420 - State of Cybersecurity 2024 report insights with ISACA
21:28
21:28
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
21:28
In response to new questions asked by the annual study, sponsored by Adobe—which showcases the feedback of more than 1,800 global cybersecurity professionals on topics related to the cybersecurity workforce and threat landscape—security teams in Oceania noted they are primarily using AI for: Automating threat detection/response (36 percent vs 28 pe…
…
continue reading
1
Vikings vs Titans - Week 11 Review
44:56
44:56
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
44:56
YOUR Minnesota Vikings are officially 8-2 after yet another victory on Sunday afternoon, this time over the Titans of Tennessee! How we feeling?? Let's talk about it! ------------- The Cy Amundson Show (@cyamundsonshow) is one of the best sports comedy podcasts around with Cy Amundson (@cyamundson), Blake Wexler (@BlakeWexler), Tom Schreier (@tschr…
…
continue reading
1
🚨 Cargill Cyberattack lawsuit dismissed, Palo Alto Patches Zeroday, Drinking Water exposed to Attacks
16:32
16:32
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
16:32
🚨 Cargill Cyberattack lawsuit dismissed, Palo Alto Patches Zeroday, Drinking Water exposed to Attacks 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Palo Alto Networks patches zeroday with more news below: • 300 Drinking Water systems exposed t…
…
continue reading
1
Cyberpunk Librarian – Episode 67 – Rise Above
35:12
35:12
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
35:12
Libraries are in danger and Dan is angry. There have been more books banned in the last two years than ever before. Censorship and attacks on...De către Daniel Messer
…
continue reading
In this episode, Darnley discusses a cyberattack against an electricity provider that left 50,000 German customers vulnerable. Learn ways to protect yourself and understand the damages these energy companies face in our digital world. 5 Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay …
…
continue reading
1
EPA warns of critical risks, Four million WordPress sites exposed, Sextortion scams bypass filters
8:21
8:21
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
8:21
EPA warns of critical risks in drinking water infrastructure Four million WordPress sites exposed Sextortion scams bypass Microsoft security filters Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you…
…
continue reading
1
ISC StormCast for Tuesday, November 19th, 2024
5:13
5:13
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
5:13
Exploit attempts for unpatched Citrix vulnerability CVE-2024-8068/CVE-2024-8069 https://isc.sans.edu/diary/Exploit+attempts+for+unpatched+Citrix+vulnerability/31446 https://support.citrix.com/s/article/CTX691941-citrix-session-recording-security-bulletin-for-cve20248068-and-cve20248069?language=en_US Microsoft Power Pages: Data Exposure Reviewed ht…
…
continue reading
1
Certifications 101: Why A+, Network+ and Security+ are game changers | Cyber Work Hacks
15:35
15:35
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
15:35
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast James Stanger from CompTIA joins today's Cyber Work Hacks episode to delve into the Tech Trifecta of certifications: A+, Network+ and Security+. These foundational certif…
…
continue reading
1
Sitting Duck Attack Allows Hackers to Hijack Websites
9:08
9:08
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
9:08
Simple misconfiguration can often lead to disaster, and sometimes that disaster is a threat actor sneakily taking over your trusted website and using it to host malware, send phishing emails, or control botnets. Here's a surprisingly easily exploited DNS oversight that has allowed threat actors to take over 70,000 websites. Sources: https://pastebi…
…
continue reading
1
Building a Cybersecure Foundation in Healthcare with Kevin Heineman of Lyric
32:38
32:38
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:38
In This Episode: Kevin Heineman shares his experience as the Chief Information Security Officer at Lyric, a company he describes as a "30-year-old startup." Kevin explains Lyric's transition from being part of Change Healthcare to becoming an independent entity focused on payment integrity for major health insurance carriers. He dives into the comp…
…
continue reading
1
🚨 T-Mobile Hacked in Chinese Telecom Breach, Palo Alto Networks Firewall Zeroday, Veeam Ransomware Exploit
16:50
16:50
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
16:50
🚨 T-Mobile Hacked in Chinese Telecom Breach, Palo Alto Networks Firewall Zeroday, Veeam Ransomware Exploit 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as T-Mobile Hacked in Chinese Telcom breach with more news below: • NSO Hacked WhatsApp after…
…
continue reading
1
18 November 2024 Cyber and Tech News
9:39
9:39
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
9:39
In today’s podcast we cover four crucial cyber and technology topics, including: 1. Criminals abuse brands in shopping-themed phishes 2. GeoVision devices abused to support botnet 3. T-Mobile compromise revealed; Chinese adversaries implicated 4. NSO Group abused WhatsApp even after legal complaint I'd love feedback, feel free to send your comments…
…
continue reading
1
Resilient Cyber w/ Jim Dempsey - Navigating the Cyber Regulatory Landscape
56:54
56:54
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
56:54
In this episode, we sit with the return guest, Jim Dempsey. Jim is the Managing Director of the Cybersecurity Law Center at IAPP, Senior Policy Advisory at Stanford, and Lecturer at UC Berkeley. We will discuss the complex cyber regulatory landscape, where it stands now, and implications for the future based on the recent U.S. Presidential election…
…
continue reading
1
CCT 194: Navigating Outdated Technology Risks for CISSP Success (Domain 2.5)
29:19
29:19
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
29:19
Send us a text Unlock the secrets to mastering cybersecurity management with insights from Sean Gerber. How can businesses effectively handle the risks of outdated technology and safeguard their assets? Join us as we explore Domain 2.5 of the CISSP exam and unravel the complexities behind end-of-life and end-of-support for assets, a critical area f…
…
continue reading
1
S1 E18 - The Impact of the Cloud First Strategy to Network Design and Security
25:30
25:30
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
25:30
What is a Cloud First Strategy? How does it impact how we design and secure networks? In this episode, Dr. Jeff shares what it means to have a cloud first strategy and the disruptive change it has had on how networks are designed and secured. The old design models are out and a new approach must be adopted if you want to be a successful engineer in…
…
continue reading
1
T-Mobile confirms breach, AnnieMac data stolen, NewGlove malware threat
8:25
8:25
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
8:25
T-Mobile confirms telecom breach hack Customer data stolen from AnnieMac New Glove infostealer malware bypasses Chrome’s cookie encryption Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a pr…
…
continue reading
1
214: Used to Have It All - Watson in Night City
59:08
59:08
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
59:08
Jenn and Toastie get back to Night City and discuss Watson. Subscribe for more Cyberpunk lore, news, and more! Patreon - Get ad-free episodes early & support the show! Behind-the-scenes content and more https://www.patreon.com/cyberpunklorecast Discord: https://discord.gg/JXKfVhm Twitter: https://twitter.com/CyberpunkLore Email: cyberpunklorecast@g…
…
continue reading
1
Unknown Attacker Tries To Frame Security Researcher: Cyber Security Today for Monday, November 18th, 2024
9:10
9:10
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
9:10
Cybersecurity Today: GitHub Attacks & Microsoft's November Patch Tuesday Updates In this episode of Cybersecurity Today, host Jim Love highlights critical cybersecurity updates. The episode covers malicious attacks on GitHub projects, including an orchestrated attempt to frame Texas-based security researcher Mike Bell, and the associated impact on …
…
continue reading
1
ISC StormCast for Monday, November 18th, 2024
6:14
6:14
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
6:14
Ancient TP-Link Backdoor Discovered by Attackers https://isc.sans.edu/diary/Ancient%20TP-Link%20Backdoor%20Discovered%20by%20Attackers/31442 GitHub Projects Targeted with Malicious Commits To Frame Researchers https://www.bleepingcomputer.com/news/security/github-projects-targeted-with-malicious-commits-to-frame-researcher/ PaloAlto and Fortinet Vu…
…
continue reading
1
LIVE: Guarding the Gate. Emerging Threats. Protecting Your Life Online.
1:16:03
1:16:03
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:16:03
Live session held for organization. Guarding the Gate. Emerging Threats. Protecting Your Life Online. Covering topics like Cyber crime by the numbers, best practices and more. Other topics: affordable ways to limit cyber liability, ai implications in cyber security today, best security practices for business, best security practices for individuals…
…
continue reading
1
AI in Action: Project Synapse With Marcel Gagne and John Pinard. Cyber Security Today Weekend Edition for November 16, 2024
50:43
50:43
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
50:43
Cybersecurity Today - Weekend Edition: Project Synapse, AI in Action (Episode 2) In this episode of Cybersecurity Today with host Jim Love, we dive into the intersection of Artificial Intelligence (AI) and cybersecurity, continuing our exploration in the series Project Synapse. Joined by Linux and open-source expert Marcel Gagné and cybersecurity p…
…
continue reading
1
Week in Review: Most common passwords, Secure-by-design, DNA firm vanishes
26:08
26:08
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
26:08
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Brett Conlon, CISO, American Century Investments Thanks to our show sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker …
…
continue reading