For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Security professionals talking about security stuff over wine? Oh and it's funny. It's also important to find the funny side of the serious things in life.
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Host Matt Leon and KYW Newsradio reporters recap the biggest news in Philadelphia each week. Catch up on what you missed and dig deeper into the top stories.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading
One minute of national security with Frank Gaffney
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy weekly episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Mission.org is a media studio producing content for world-cla ...
…
continue reading
Stay up to date with the Nextcloud community!
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
…
continue reading
The Cloudcast (@cloudcastpod) is the industry's #1 Cloud Computing podcast, and the place where Cloud meets AI. Co-hosts Aaron Delp (@aarondelp) & Brian Gracely (@bgracely) speak with technology and business leaders that are shaping the future of business. Topics will include Cloud Computing | AI | AGI | ChatGPT | Open Source | AWS | Azure | GCP | Platform Engineering | DevOps | Big Data | ML | Security | Kubernetes | AppDev | SaaS | PaaS .
…
continue reading
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Emagine the Future is a cybersecurity and technology podcast aimed to offer ambitious technology and national security professionals with actionable insights and unique stories from proven industry leaders. Each week, we release conversations with experts from the intelligence, defense, civilian, and private sectors where we discuss current events, career and skill development, technology and national security, and the future. Obtain the edge you need to stay current, to accelerate your deve ...
…
continue reading
This podcast distills the signal from the noise about enterprise IT digital transformation and operations in the era of Agile, DevOps and distributed applications. Interviews feature expert guests in conversation with IT journalism veteran Beth Pariseau, Senior News Writer at TechTarget.
…
continue reading
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
…
continue reading
This is the She Said Privacy / He Said Security podcast with Jodi and Justin Daniels. Like any good marriage, Jodi and Justin will debate, evaluate, and sometimes quarrel about how privacy and security impact business in the 21st century.
…
continue reading
A lifestyle podcast for over-50s who know how to squeeze every bit of juice out of life. Host Helen Mitternight hosts weekly interviews with experts on relationships, sex, health, finance and lifestyle and people who are doing it right -- "Juicys."
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman and Paul Robichaux, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
This Week in Health Tech podcast is a health technology podcast. Podcast features Vik Patel, a health technology veteran and CEO of Tido Inc. (A Trusted Tech Partner for Healthcare Organizations) and industry experts. Our shows provide commentary, news, and perspective on the latest trends in health tech and features seasoned experienced industry experts. All of our shows are free. TWIHT is supported by advertising. We limit the number of ads on each show, and we only accept advertising from ...
…
continue reading
The official podcast of the Georgetown Security Studies Review (GSSR), discussing all things national security, history, military, and foreign policy. GSSR is the official flagship publication of Georgetown University's Center for Security Studies, featuring both online commentary and a biannual academic journal. Find out more about GSSR here: https://georgetownsecuritystudiesreview.org/
…
continue reading
Den offisielle podkast siden til de gretne gamle gubbene i "BlåSkjerm Brødrene" (BluesScreen Brothers), sett på scener rundt omkring i verden på diverse IT- konferanser. Brødrene er Olav Tvedt (@OlavTwitt), Alexander Solaat Rødland [@AlexSolaat], Pål-Erik Winther (@PeWinther) og Marius Solbakken (@mariussmellum). Dukker også opp forskjellige gjester av varierende kvalitet ;-) Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
In a world full of negative news the goal of this podcast is to shed some light on the positive and to recognize and give attention to the people who are the true Heroes in society. I am Lisa Falzone your Security Heroes podcast host. Our aim, connects listeners to real-life heroes in the security world. We explore the challenges and successful strategies of these heroic figures to resolve issues which unravel under highly stressful conditions. Sponsored by Athena Security.
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
Donald Trump's election has created an opportunity for the desperately needed reboot in foreign policies as well as domestic ones in order to take appropriate corrective action. Of course, it is essential to have an accurate understanding of the magnitude of the problems Mr. Trump is now confronting, as well as the options for fixing those problems…
…
continue reading
1
How Secure is Your Health Data and Why Does it Matter?
22:19
22:19
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
22:19
Anna Hall is an educator, mother of two, and Co-founder of Embody, a privacy-forward menstrual health and wellness app. In this episode… As awareness grows around health data privacy, misconceptions about protecting menstrual health data remain widespread. That’s because menstrual health data is often commodified and can be shared or sold without e…
…
continue reading
1
The Security Vine Episode 10 'Space Security' (its out of this world) and a US Election Special: Trump V Harris
1:09:38
1:09:38
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:09:38
We’d love to hear from you!! What is Space Security 1. Geopolitical Rivalries and Militarization of Space 2. Space Situational Awareness (SSA) and Monitoring 3. Threat of Anti-Satellite (ASAT) Weapons 4. Cybersecurity and Electronic Warfare in Space 5. Space Traffic Management (STM) and Orbital Debris 6. International Law and Governance Measures to…
…
continue reading
1
Shadow IT and Security Debt - Dave Lewis - PSW #849
2:50:27
2:50:27
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:50:27
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
…
continue reading
1
It's Taplunk! Talos and Splunk threat researchers meet to put the security world to rights
50:38
50:38
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
50:38
What happens when two sets of threat researchers from Talos and Splunk's SURGe team meet? Aside from some highly controversial opinions and omissions about the best horror movie, the team discuss what security trends are FUD, and what's actually fearful/ most challenging at the moment. Also, what is the security industry not aware of enough, and al…
…
continue reading
1
Apple Offers 1 Million Dollar Bug Bounty For It's Apple Intelligence Services: Cyber Security Today for Monday, October 28, 2024
7:41
7:41
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:41
In today's episode of Cybersecurity Today, host Jim Love covers stories including, Cisco releases an emergency patch for a vulnerability exploited in brute force attacks, Delta Airlines sues CrowdStrike over a problematic software update leading to flight disruptions, UnitedHealth confirms the massive data breach at Change Healthcare affecting 100 …
…
continue reading
1
Security Tools Don’t Get a Free Pass When It Comes to Human-Centered Design with Jaron Mink
43:30
43:30
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
43:30
In this episode, we talk about: Security tools don’t get a free pass when it comes to involving end users as part of the design process. People studying and building ML-based security tools make a lot of assumptions. Instead of wasting time on assumptions, why not learn from security practitioners directly? Businesses (and academia) are investing a…
…
continue reading
1
EP. 29 - Unlocking the Future of Google SecOps: Automation, AI, and the Evolution of SIEM
35:20
35:20
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:20
In this episode, Brad Bussie is joined by Svetla Yankova, CEO of Citreno, to discuss the evolution of Google SecOps. They dive deep into how automation, AI, and cloud-native solutions are transforming security operations and the promise (and limitations) of SIEM solutions. Topics Covered: The evolution of Google SecOps and the role of Chronicle and…
…
continue reading
1
Mozilla's GenAI Bug Bounty And Education Program - Serious Exploits: Interview With Marco Figueroa, GenAI Bug Bounty Program Manager for Mozilla's ODIN Project. Cyber Security Today Weekend for Nov 9 ...
38:24
38:24
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
38:24
Jailbreaking AI: Behind the Guardrails with Mozilla's Marco Figueroa In this episode of 'Cyber Security Today,' host Jim Love talks with Marco Figueroa, the Gen AI Bug Bounty Program Manager for Mozilla's ODIN project. They explore the challenges and methods of bypassing guardrails in large language models like ChatGPT. Discussion points include ja…
…
continue reading
1
Pennsylvania flips red, election night implications for Philly, and an ugly Sixers season
38:20
38:20
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
38:20
Donald Trump’s victory in the presidential election was decisive, and Pennsylvania is a big reason why. Not only did Trump win the commonwealth himself, he funneled strong Republican turnout to key down-ballot races as well. Why did PA flip red, after voters elected a Democratic governor and U.S. Senator just two years ago? What could a second Trum…
…
continue reading
1
Robo-Turing, BlueNoroff, Palo Alto, German Law, Fabric, Cisco, Bans, Aaran Leyland... - SWN #429
32:39
32:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:39
Robo-Turing, BlueNoroff, Palo Alto, German Law, Fabric, Cisco, Banning Things, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-429
…
continue reading
1
Cybersecurity Budgets: the Journey from Reactive to Proactive - Todd Thiemann, Theresa Lanowitz - ESW #383
2:01:03
2:01:03
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:01:03
CISOs struggle more with reactive budgets than CIOs or CTOs. It's not that part of the CISO's budget shouldn't be reactive, it's certainly necessary to an extent. The problem is when proactive measures suffer as a result. In this interview, we'll discuss some of the causes behind this and some strategies for breaking out of this loop. This segment …
…
continue reading
The crushing victory by Donald Trump in the 2004 election is, as he himself noted, a miracle. It takes nothing away from the sustained and selfless work of the candidate, his team or his voters to say that this was, first and foremost, a product of the hand of God – and truly an answer to prayer. As a result, our beloved country has been given anot…
…
continue reading
On this election day, I want to pray for America. Dear God, Thank you for the privilege of being a citizen of this country at a time such as this and for granting us a say in who leads her and the policies that will determine how she fares in a perilous era. Indeed, America faces challenges, both foreign and domestic, so great, my God, that only wi…
…
continue reading
1
Canada Orders TikTok To Close Operations: Cyber Security Today for Friday, November 8th, 2024
6:25
6:25
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:25
FBI Warnings, TikTok's Canadian Shutdown, Major Data Breach Arrests & More | Cybersecurity Today In this episode of Cybersecurity Today, host Jim Love highlights the FBI's warning about growing phishing attacks exploiting government email credentials, leading to potential data theft and ransomware attacks. The Canadian government orders TikTok to s…
…
continue reading
1
Microsoft 365 Copilot Newsroom | October 2024
23:17
23:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
23:17
Want a quick download of the latest releases, updates, and tips for Microsoft 365 Copilot? With ongoing updates and new releases, it can be hard to keep up with all the great things you can do in M365 Copilot. Valorem Reply’s Modern Work experts are offering a Microsoft 365 Copilot Newsroom series where we compile the most important news and learni…
…
continue reading
1
We're Not Saying "I told you so" - PSW #850
2:01:51
2:01:51
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:01:51
In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard for no PoC, an LLM that discovers software vulnerabilities, absurd fines, long usernames and Okta, and paying a ransom with dough! Show Notes: https://securityweekly.com…
…
continue reading
1
Cybersecurity For Schools - Kayne McGladrey - PSW #850
2:47:43
2:47:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:47:43
We chatted with Kayne about education systems security, funding for cyber tools and services, and what the future of education might look like to fill more cyber roles. In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard …
…
continue reading
1
Cybersecurity For Schools - Kayne McGladrey - PSW #850
45:59
45:59
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
45:59
We chatted with Kayne about education systems security, funding for cyber tools and services, and what the future of education might look like to fill more cyber roles. Show Notes: https://securityweekly.com/psw-850
…
continue reading
1
Cybersecurity For Schools - Kayne McGladrey - PSW #850
2:47:43
2:47:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:47:43
We chatted with Kayne about education systems security, funding for cyber tools and services, and what the future of education might look like to fill more cyber roles. In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard …
…
continue reading
A good discussion today covering two different articles, the first covers CISA's list of product security "bad practices", questioning whether it provides real value or is just content marketing. Then the discussion moves onto an article about Shift Left. The group debates whether it is truly more expensive to fix design flaws versus implementation…
…
continue reading
1
Manufacturing Insights with Brian Bliss
2:52
2:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:52
In the second episode of our industry insights series, Brian Bliss discusses why data security and data governance are crucial in the manufacturing sector especially with AI making inroads into every industry. Learn more about the SAP Nitro Accelerator that Brian talks about in the video: https://go.valorem.com/Nitro_Accelerator.html?utm_source=pod…
…
continue reading
1
How Are New SEC Rules Impacting CISOs?
34:32
34:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:32
All links and images for this episode can be found on CISO Series. Check out these posts for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is Allan Cockriel, group CISO, Shell. In this episode: Striking a balance Will we…
…
continue reading
1
Airgaps over AI? Cyberdefense pro's tips and predictions
23:14
23:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
23:14
Robert Slaughter is CEO of Defense Unicorns, a defense tech startup specializing in Airgap software delivery in highly secure and sensitive environments in the military and federal government. Previously, he was director of the U.S. Department of Defense's Platform One DevSecOps project and co-founder at Space CAMP, a predecessor of Platform One fo…
…
continue reading
1
In conversation with Chief of Army, Lieutenant General Simon Stuart
52:37
52:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
52:37
What is the role of the Army in an era shaped by strategic competition? How is the Army adapting for wars of the future? Why is it important to build trust between the Army and Australian society? In this episode, Simon Stuart joins Rory Medcalf discuss the changing nature of warfare, and how the Australian Army is positioned to succeed in facing f…
…
continue reading
Q&A202: How can people better understand threat modeling? What are security concerns for custom Android ROMs? What are our favorite episodes of Darknet Diaries? Have we ever seen a website remove our 2FA without telling us? Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded or XMR Chat: https://xmrchat.com/surveil…
…
continue reading
1
Tariffs, Pygmy Goat, Schneider, SQLite, Deepfakes, Military AI, Josh Marpet... - SWN #428
32:53
32:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:53
Tariffs, Pygmy Goat, Schneider, SQLite and Dixie Flatline, Deepfakes, Military AI, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-428
…
continue reading
In this session, we uncover how AI and cloud technologies are reshaping what software can achieve. Experts from Valorem Reply and Microsoft discuss how you can unlock the true power of AI and develop a security and infrastructure strategy ready to support your innovation. Learn more: https://valoremreply.com/solutions/app-innovation Follow us on so…
…
continue reading
1
263 - Hey there, Windows Server 2025!
33:09
33:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:09
This week, we take a look at Windows Server 2025, which was released just recently. Who needs it? What are the new and exciting features? What's our experience running it so far? Also, Tobias asks Jussi an unexpected question. (00:00) - Intro and catching up. (03:28) - Show content starts. Show links Find us on Bluesky social: - Tobias Zimmergren —…
…
continue reading
1
Building Opportunities for Women and Minorities in Cybersecurity with Connie Matthews
41:49
41:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
41:49
How do you create waves of change in an industry? Connie Matthews, Founder and CEO of ReynCon, speaks with Ron about the power of resilience, mentorship, and taking that first bold step in cybersecurity. In this powerful episode, Connie shares her path as a pioneering woman in cybersecurity. Discussing diversity, mentorship, and her nonprofit EmpoW…
…
continue reading
1
AI Finds Zero Day Vulnerability For First Time: Cyber Security Today for Wednesday, November 6, 2024
8:05
8:05
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:05
AI Finds Zero Day Vulnerability, MFA Mandatory on Google Cloud, French Energy Firm Hacked In today's episode of Cyber Security Today, host Jim Love discusses Google's AI-driven system Big Sleep discovering the first ever AI-identified zero day vulnerability in the SQLite database engine. He also covers Google's new requirement for Google Cloud user…
…
continue reading
1
Cloud News of the Month - October 2024
44:58
44:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
44:58
Brian Gracely (@bgracely) and Brandon Whichard (@bwhichard) discuss the top stories in Cloud and AI from October 2024. SHOW: 870 SHOW TRANSCRIPT: The Cloudcast #870 Transcript SHOW VIDEO: https://youtube.com/@TheCloudcastNET CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotw NEW TO CLOUD? CHECK OUT OUR OTHER PODCAST - "CLOUDCAST BASICS" SHOW SP…
…
continue reading
1
2024 Cybersecurity Landscape Report: Threat Hunter Insights - Ep 122
19:29
19:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
19:29
In this episode of Reimagining Cyber, host Rob Aragao is joined by Tyler Moffitt, Senior Security Analyst at OpenText, to dive into key findings from the 2024 Threat Hunters Perspective report. Tyler, a veteran in malware analysis, shares insights on the latest adversary tactics, cybercrime trends, and the methodology behind their research. They di…
…
continue reading
1
NCUA PANEL: INFOSEC & CYBERSECURITY IN 2024
1:00:58
1:00:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:00:58
Ensure your credit union is compliant & secure in 2024. Hear from a panel of NCUA auditors about infosec & cybersecurity best practices for your credit union.بقلم Rivial Data Security
…
continue reading
1
Cybersecurity in 2024: Predictions from Security Leaders
1:00:01
1:00:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:00:01
Tailored for security leaders, our on-demand webinar covers key topics that include: Top Priorities In Maintaining Compliance: Addressing compliance challenges in the ever-evolving cybersecurity landscape Evolving With AI: How industry leaders are leveraging AI to enhance their security measures. Adapting To New Risk Factors: How to adapt cybersecu…
…
continue reading
1
NIST CSF 2.0 Insight for Financial Institutions
43:26
43:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
43:26
Join our insightful webinar as we dive into the latest updates of NIST CSF 2.0. Gain a comprehensive understanding of its governance frameworks and discover key takeaways crucial for financial institutions. Topics we’ll cover include: Cybersecurity Defense Matrix: Explore strategic cybersecurity defense approaches, encompassing both proactive measu…
…
continue reading
1
Bug bounties, vulnerability disclosure, PTaaS, fractional pentesting - Grant McCracken - ASW #306
1:05:35
1:05:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:05:35
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
…
continue reading
1
Bug bounties, vulnerability disclosure, PTaaS, fractional pentesting - Grant McCracken - ASW #306
1:05:35
1:05:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:05:35
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
…
continue reading
1
Planning A Merger Or Acquisition? Ask These Five Cyber Questions First - Craig Davies - BSW #371
1:05:15
1:05:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:05:15
Merger and acquisition (M&A) activity in finally starting to pick up. Although the allure of financial gains and market expansion drives these deals, the digital age demands a rigorous assessment of cybersecurity risks accompanying such mergers. Unanticipated cyber issues, like dormant malware or inconsistent access controls, can transform an ideal…
…
continue reading
On this election day, I want to pray for America. Dear God, Thank you for the privilege of being a citizen of this country at a time such as this and for granting us a say in who leads her and the policies that will determine how she fares in a perilous era. Indeed, America faces challenges, both foreign and domestic, so great, my God, that only wi…
…
continue reading
1
Is Your Workout Compromising Your Privacy?
16:51
16:51
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
16:51
Episode 202: More privacy & security issues in a popular exercise app, Apple Intelligence begins to roll out, Windows Recall delayed again, and more! Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest security & privacy news. 🔎 Easy Opt Outs is the easy, affordable, and effective way to automatic…
…
continue reading
1
DtSR Episode 626 - Patrick Dennis Investing in CyberSecurity is Hard
59:18
59:18
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
59:18
Send the hosts a message - try it now! TL;DR: Today, the podcast takes a meeting in the finance department with Patrick Dennis - current CEO of Avaya and friend of the podcast. Patrick has extensive experience in investments in both tech and beyond, and he's here to dispense some wisdom, caution, and insights. --> This podcast is packed with inform…
…
continue reading
There is continuing positive sentiment among technology buyers, a trend that’s continued for a fourth quarter. Sheryl Kingstone and Liam Eagle return to discuss the latest Tech Demand Indicator (TDI) study results with host Eric Hanselman. The numbers have shown strong correlation with aggregate revenue changes for companies in the S&P 500 Informat…
…
continue reading
1
Recall, Russia, Win 10, Phish n Ships, Midnight Blizzard, Rob Allen, and More... - Rob Allen - SWN #427
36:50
36:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
36:50
Recall III: the Re-Re-Recalling, Russia, Win 10, Phish n Ships, Midnight Blizzard, Emerald Whale, Rob Allen, and More, on this edition of the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/unitedhealth-says-data-of-100-million-stolen-in-change-healthcare-breach/ This segment is sponsored by ThreatLocker. Vis…
…
continue reading
1
What if securing buildings was as easy as your smartphone? - Damon McDougald, Blaine Frederick, Punit Minocha - ESW #382
2:06:19
2:06:19
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:06:19
The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alcatraz AI is doing exactly that with technology that works similarly to how smartphones unlock using your face. It works in the dark, if you shave off your beard, and so quickly you don't even need to …
…
continue reading
1
EP197 SIEM (Decoupled or Not), and Security Data Lakes: A Google SecOps Perspective
29:34
29:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:34
Guest: Travis Lanham, Uber Tech Lead (UTL) for Security Operations Engineering, Google Cloud Topics: There’s been a ton of discussion in the wake of the three SIEM week about the future of SIEM-like products. We saw a lot of takes on how this augurs the future of disassembled or decoupled SIEMs. Can you explain what these disassembled SIEMs are all…
…
continue reading