It Security عمومي
[search 0]
أكثر
تنزيل التطبيق!
show episodes
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
أسبوعيا
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

Unsubscribe
Unsubscribe
أسبوعيا
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
  continue reading
 
Artwork
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

Unsubscribe
Unsubscribe
أسبوعيا+
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Artwork
 
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Surveillance Report

Techlore & The New Oil

Unsubscribe
Unsubscribe
أسبوعيا+
 
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
The Security Table

Izar Tarandach, Matt Coles, and Chris Romeo

Unsubscribe
Unsubscribe
شهريا+
 
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
  continue reading
 
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
  continue reading
 
Artwork

1
Ctrl+Alt+Azure

Tobias Zimmergren, Jussi Roine

Unsubscribe
Unsubscribe
أسبوعيا
 
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
  continue reading
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

Unsubscribe
Unsubscribe
أسبوعيا
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy weekly episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Mission.org is a media studio producing content for world-cla ...
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
  continue reading
 
Artwork

1
The Cloudcast

Massive Studios

Unsubscribe
Unsubscribe
أسبوعيا+
 
The Cloudcast (@cloudcastpod) is the industry's #1 Cloud Computing podcast, and the place where Cloud meets AI. Co-hosts Aaron Delp (@aarondelp) & Brian Gracely (@bgracely) speak with technology and business leaders that are shaping the future of business. Topics will include Cloud Computing | AI | AGI | ChatGPT | Open Source | AWS | Azure | GCP | Platform Engineering | DevOps | Big Data | ML | Security | Kubernetes | AppDev | SaaS | PaaS .
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

Unsubscribe
Unsubscribe
شهريا+
 
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Artwork

1
Breaches & Brews

Rivial Data Security

Unsubscribe
Unsubscribe
شهريا
 
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
  continue reading
 
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
  continue reading
 
Emagine the Future is a cybersecurity and technology podcast aimed to offer ambitious technology and national security professionals with actionable insights and unique stories from proven industry leaders. Each week, we release conversations with experts from the intelligence, defense, civilian, and private sectors where we discuss current events, career and skill development, technology and national security, and the future. Obtain the edge you need to stay current, to accelerate your deve ...
  continue reading
 
Artwork

1
IT Ops Query

TechTarget Editorial

Unsubscribe
Unsubscribe
شهريا+
 
This podcast distills the signal from the noise about enterprise IT digital transformation and operations in the era of Agile, DevOps and distributed applications. Interviews feature expert guests in conversation with IT journalism veteran Beth Pariseau, Senior News Writer at TechTarget.
  continue reading
 
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
  continue reading
 
Artwork
 
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
  continue reading
 
Artwork

1
She Said Privacy/He Said Security

Jodi and Justin Daniels

Unsubscribe
Unsubscribe
أسبوعيا
 
This is the She Said Privacy / He Said Security podcast with Jodi and Justin Daniels. Like any good marriage, Jodi and Justin will debate, evaluate, and sometimes quarrel about how privacy and security impact business in the 21st century.
  continue reading
 
Artwork

1
Keep It Juicy

Helen Mitternight

Unsubscribe
Unsubscribe
شهريا
 
A lifestyle podcast for over-50s who know how to squeeze every bit of juice out of life. Host Helen Mitternight hosts weekly interviews with experts on relationships, sex, health, finance and lifestyle and people who are doing it right -- "Juicys."
  continue reading
 
Artwork

1
Unsupervised Learning

Daniel Miessler

Unsubscribe
Unsubscribe
أسبوعيا+
 
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
  continue reading
 
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman and Paul Robichaux, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Artwork

1
This Week in Health Tech

Vik Patel and Guests

Unsubscribe
Unsubscribe
شهريا
 
This Week in Health Tech podcast is a health technology podcast. Podcast features Vik Patel, a health technology veteran and CEO of Tido Inc. (A Trusted Tech Partner for Healthcare Organizations) and industry experts. Our shows provide commentary, news, and perspective on the latest trends in health tech and features seasoned experienced industry experts. All of our shows are free. TWIHT is supported by advertising. We limit the number of ads on each show, and we only accept advertising from ...
  continue reading
 
Artwork

1
The Precision-Guided Podcast

Georgetown Security Studies Review

Unsubscribe
Unsubscribe
شهريا+
 
The official podcast of the Georgetown Security Studies Review (GSSR), discussing all things national security, history, military, and foreign policy. GSSR is the official flagship publication of Georgetown University's Center for Security Studies, featuring both online commentary and a biannual academic journal. Find out more about GSSR here: https://georgetownsecuritystudiesreview.org/
  continue reading
 
Artwork

1
BlåSkjerm Brødrene

BlåSkjerm Brødrene

Unsubscribe
Unsubscribe
شهريا
 
Den offisielle podkast siden til de gretne gamle gubbene i "BlåSkjerm Brødrene" (BluesScreen Brothers), sett på scener rundt omkring i verden på diverse IT- konferanser. Brødrene er Olav Tvedt (@OlavTwitt), Alexander Solaat Rødland [@AlexSolaat], Pål-Erik Winther (@PeWinther) og Marius Solbakken (@mariussmellum). Dukker også opp forskjellige gjester av varierende kvalitet ;-) Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Security Heroes

Athena Security

Unsubscribe
Unsubscribe
شهريا
 
In a world full of negative news the goal of this podcast is to shed some light on the positive and to recognize and give attention to the people who are the true Heroes in society. I am Lisa Falzone your Security Heroes podcast host. Our aim, connects listeners to real-life heroes in the security world. We explore the challenges and successful strategies of these heroic figures to resolve issues which unravel under highly stressful conditions. Sponsored by Athena Security.
  continue reading
 
Artwork

1
Next in Tech

S&P Global Market Intelligence

Unsubscribe
Unsubscribe
أسبوعيا
 
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
  continue reading
 
Loading …
show series
 
Donald Trump's election has created an opportunity for the desperately needed reboot in foreign policies as well as domestic ones in order to take appropriate corrective action. Of course, it is essential to have an accurate understanding of the magnitude of the problems Mr. Trump is now confronting, as well as the options for fixing those problems…
  continue reading
 
Anna Hall is an educator, mother of two, and Co-founder of Embody, a privacy-forward menstrual health and wellness app. In this episode… As awareness grows around health data privacy, misconceptions about protecting menstrual health data remain widespread. That’s because menstrual health data is often commodified and can be shared or sold without e…
  continue reading
 
We’d love to hear from you!! What is Space Security 1. Geopolitical Rivalries and Militarization of Space 2. Space Situational Awareness (SSA) and Monitoring 3. Threat of Anti-Satellite (ASAT) Weapons 4. Cybersecurity and Electronic Warfare in Space 5. Space Traffic Management (STM) and Orbital Debris 6. International Law and Governance Measures to…
  continue reading
 
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
  continue reading
 
What happens when two sets of threat researchers from Talos and Splunk's SURGe team meet? Aside from some highly controversial opinions and omissions about the best horror movie, the team discuss what security trends are FUD, and what's actually fearful/ most challenging at the moment. Also, what is the security industry not aware of enough, and al…
  continue reading
 
In today's episode of Cybersecurity Today, host Jim Love covers stories including, Cisco releases an emergency patch for a vulnerability exploited in brute force attacks, Delta Airlines sues CrowdStrike over a problematic software update leading to flight disruptions, UnitedHealth confirms the massive data breach at Change Healthcare affecting 100 …
  continue reading
 
In this episode, we talk about: Security tools don’t get a free pass when it comes to involving end users as part of the design process. People studying and building ML-based security tools make a lot of assumptions. Instead of wasting time on assumptions, why not learn from security practitioners directly? Businesses (and academia) are investing a…
  continue reading
 
In this episode, Brad Bussie is joined by Svetla Yankova, CEO of Citreno, to discuss the evolution of Google SecOps. They dive deep into how automation, AI, and cloud-native solutions are transforming security operations and the promise (and limitations) of SIEM solutions. Topics Covered: The evolution of Google SecOps and the role of Chronicle and…
  continue reading
 
Jailbreaking AI: Behind the Guardrails with Mozilla's Marco Figueroa In this episode of 'Cyber Security Today,' host Jim Love talks with Marco Figueroa, the Gen AI Bug Bounty Program Manager for Mozilla's ODIN project. They explore the challenges and methods of bypassing guardrails in large language models like ChatGPT. Discussion points include ja…
  continue reading
 
Donald Trump’s victory in the presidential election was decisive, and Pennsylvania is a big reason why. Not only did Trump win the commonwealth himself, he funneled strong Republican turnout to key down-ballot races as well. Why did PA flip red, after voters elected a Democratic governor and U.S. Senator just two years ago? What could a second Trum…
  continue reading
 
Robo-Turing, BlueNoroff, Palo Alto, German Law, Fabric, Cisco, Banning Things, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-429
  continue reading
 
CISOs struggle more with reactive budgets than CIOs or CTOs. It's not that part of the CISO's budget shouldn't be reactive, it's certainly necessary to an extent. The problem is when proactive measures suffer as a result. In this interview, we'll discuss some of the causes behind this and some strategies for breaking out of this loop. This segment …
  continue reading
 
The crushing victory by Donald Trump in the 2004 election is, as he himself noted, a miracle. It takes nothing away from the sustained and selfless work of the candidate, his team or his voters to say that this was, first and foremost, a product of the hand of God – and truly an answer to prayer. As a result, our beloved country has been given anot…
  continue reading
 
On this election day, I want to pray for America. Dear God, Thank you for the privilege of being a citizen of this country at a time such as this and for granting us a say in who leads her and the policies that will determine how she fares in a perilous era. Indeed, America faces challenges, both foreign and domestic, so great, my God, that only wi…
  continue reading
 
FBI Warnings, TikTok's Canadian Shutdown, Major Data Breach Arrests & More | Cybersecurity Today In this episode of Cybersecurity Today, host Jim Love highlights the FBI's warning about growing phishing attacks exploiting government email credentials, leading to potential data theft and ransomware attacks. The Canadian government orders TikTok to s…
  continue reading
 
Want a quick download of the latest releases, updates, and tips for Microsoft 365 Copilot? With ongoing updates and new releases, it can be hard to keep up with all the great things you can do in M365 Copilot. Valorem Reply’s Modern Work experts are offering a Microsoft 365 Copilot Newsroom series where we compile the most important news and learni…
  continue reading
 
In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard for no PoC, an LLM that discovers software vulnerabilities, absurd fines, long usernames and Okta, and paying a ransom with dough! Show Notes: https://securityweekly.com…
  continue reading
 
We chatted with Kayne about education systems security, funding for cyber tools and services, and what the future of education might look like to fill more cyber roles. In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard …
  continue reading
 
We chatted with Kayne about education systems security, funding for cyber tools and services, and what the future of education might look like to fill more cyber roles. In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard …
  continue reading
 
A good discussion today covering two different articles, the first covers CISA's list of product security "bad practices", questioning whether it provides real value or is just content marketing. Then the discussion moves onto an article about Shift Left. The group debates whether it is truly more expensive to fix design flaws versus implementation…
  continue reading
 
In the second episode of our industry insights series, Brian Bliss discusses why data security and data governance are crucial in the manufacturing sector especially with AI making inroads into every industry. Learn more about the SAP Nitro Accelerator that Brian talks about in the video: https://go.valorem.com/Nitro_Accelerator.html?utm_source=pod…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out these posts for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is Allan Cockriel, group CISO, Shell. In this episode: Striking a balance Will we…
  continue reading
 
Robert Slaughter is CEO of Defense Unicorns, a defense tech startup specializing in Airgap software delivery in highly secure and sensitive environments in the military and federal government. Previously, he was director of the U.S. Department of Defense's Platform One DevSecOps project and co-founder at Space CAMP, a predecessor of Platform One fo…
  continue reading
 
What is the role of the Army in an era shaped by strategic competition? How is the Army adapting for wars of the future? Why is it important to build trust between the Army and Australian society? In this episode, Simon Stuart joins Rory Medcalf discuss the changing nature of warfare, and how the Australian Army is positioned to succeed in facing f…
  continue reading
 
Q&A202: How can people better understand threat modeling? What are security concerns for custom Android ROMs? What are our favorite episodes of Darknet Diaries? Have we ever seen a website remove our 2FA without telling us? Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded or XMR Chat: https://xmrchat.com/surveil…
  continue reading
 
Tariffs, Pygmy Goat, Schneider, SQLite and Dixie Flatline, Deepfakes, Military AI, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-428
  continue reading
 
In this session, we uncover how AI and cloud technologies are reshaping what software can achieve. Experts from Valorem Reply and Microsoft discuss how you can unlock the true power of AI and develop a security and infrastructure strategy ready to support your innovation. Learn more: https://valoremreply.com/solutions/app-innovation Follow us on so…
  continue reading
 
This week, we take a look at Windows Server 2025, which was released just recently. Who needs it? What are the new and exciting features? What's our experience running it so far? Also, Tobias asks Jussi an unexpected question. (00:00) - Intro and catching up. (03:28) - Show content starts. Show links Find us on Bluesky social: - Tobias Zimmergren —…
  continue reading
 
How do you create waves of change in an industry? Connie Matthews, Founder and CEO of ReynCon, speaks with Ron about the power of resilience, mentorship, and taking that first bold step in cybersecurity. In this powerful episode, Connie shares her path as a pioneering woman in cybersecurity. Discussing diversity, mentorship, and her nonprofit EmpoW…
  continue reading
 
AI Finds Zero Day Vulnerability, MFA Mandatory on Google Cloud, French Energy Firm Hacked In today's episode of Cyber Security Today, host Jim Love discusses Google's AI-driven system Big Sleep discovering the first ever AI-identified zero day vulnerability in the SQLite database engine. He also covers Google's new requirement for Google Cloud user…
  continue reading
 
Brian Gracely (@bgracely) and Brandon Whichard (@bwhichard) discuss the top stories in Cloud and AI from October 2024. SHOW: 870 SHOW TRANSCRIPT: The Cloudcast #870 Transcript SHOW VIDEO: https://youtube.com/@TheCloudcastNET CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotw NEW TO CLOUD? CHECK OUT OUR OTHER PODCAST - "CLOUDCAST BASICS" SHOW SP…
  continue reading
 
In this episode of Reimagining Cyber, host Rob Aragao is joined by Tyler Moffitt, Senior Security Analyst at OpenText, to dive into key findings from the 2024 Threat Hunters Perspective report. Tyler, a veteran in malware analysis, shares insights on the latest adversary tactics, cybercrime trends, and the methodology behind their research. They di…
  continue reading
 
Tailored for security leaders, our on-demand webinar covers key topics that include: Top Priorities In Maintaining Compliance: Addressing compliance challenges in the ever-evolving cybersecurity landscape Evolving With AI: How industry leaders are leveraging AI to enhance their security measures. Adapting To New Risk Factors: How to adapt cybersecu…
  continue reading
 
Join our insightful webinar as we dive into the latest updates of NIST CSF 2.0. Gain a comprehensive understanding of its governance frameworks and discover key takeaways crucial for financial institutions. Topics we’ll cover include: Cybersecurity Defense Matrix: Explore strategic cybersecurity defense approaches, encompassing both proactive measu…
  continue reading
 
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
  continue reading
 
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
  continue reading
 
Merger and acquisition (M&A) activity in finally starting to pick up. Although the allure of financial gains and market expansion drives these deals, the digital age demands a rigorous assessment of cybersecurity risks accompanying such mergers. Unanticipated cyber issues, like dormant malware or inconsistent access controls, can transform an ideal…
  continue reading
 
On this election day, I want to pray for America. Dear God, Thank you for the privilege of being a citizen of this country at a time such as this and for granting us a say in who leads her and the policies that will determine how she fares in a perilous era. Indeed, America faces challenges, both foreign and domestic, so great, my God, that only wi…
  continue reading
 
Episode 202: More privacy & security issues in a popular exercise app, Apple Intelligence begins to roll out, Windows Recall delayed again, and more! Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest security & privacy news. 🔎 Easy Opt Outs is the easy, affordable, and effective way to automatic…
  continue reading
 
Send the hosts a message - try it now! TL;DR: Today, the podcast takes a meeting in the finance department with Patrick Dennis - current CEO of Avaya and friend of the podcast. Patrick has extensive experience in investments in both tech and beyond, and he's here to dispense some wisdom, caution, and insights. --> This podcast is packed with inform…
  continue reading
 
There is continuing positive sentiment among technology buyers, a trend that’s continued for a fourth quarter. Sheryl Kingstone and Liam Eagle return to discuss the latest Tech Demand Indicator (TDI) study results with host Eric Hanselman. The numbers have shown strong correlation with aggregate revenue changes for companies in the S&P 500 Informat…
  continue reading
 
Recall III: the Re-Re-Recalling, Russia, Win 10, Phish n Ships, Midnight Blizzard, Emerald Whale, Rob Allen, and More, on this edition of the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/unitedhealth-says-data-of-100-million-stolen-in-change-healthcare-breach/ This segment is sponsored by ThreatLocker. Vis…
  continue reading
 
The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alcatraz AI is doing exactly that with technology that works similarly to how smartphones unlock using your face. It works in the dark, if you shave off your beard, and so quickly you don't even need to …
  continue reading
 
Guest: Travis Lanham, Uber Tech Lead (UTL) for Security Operations Engineering, Google Cloud Topics: There’s been a ton of discussion in the wake of the three SIEM week about the future of SIEM-like products. We saw a lot of takes on how this augurs the future of disassembled or decoupled SIEMs. Can you explain what these disassembled SIEMs are all…
  continue reading
 
Loading …

دليل مرجعي سريع