疲惫娇娃是一档从荧幕聊到宇宙深处的泛文化播客,用女性的声波延展对世界的参与和想象。 在一个内陷的时代,疲惫娇娃站在中国和美国的交汇点上,用女性的元视角去观察、抵抗、塑造政治和社会对流行文化的影响。我们讨论流动的时代精神、艺术、自由、未来、友谊以及一切使我们获得力量的事物。
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Join Tenzin Wangyal Rinpoche, other CyberSangha® hosts, and invited guests for illuminating teachings, guided meditations, and science/spirituality dialogs.
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Cybernormer er en podcast om teknologi og samfund. Den er produceret at Cybernauterne, et netværk af eksperter i cybersikkerhed, internetkultur og digital forståelse. Læs mere om os på vores hjemmeside cybernauterne.dk
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Stand-Up Comic and host of ESPN's Sportscenter on Snapchat, Cy Amundson, brings comedy and sports together in hilarious hour-long podcast episodes.
…
continue reading
Cyberpunk Cinema is the definitive dive into the dark future of science fiction. I will be breaking-down one film per week that best represents the thematic signatures of cyberpunk. So, do me a favor - it's time to access your cranial jacks, boot up your Ono Sendai Cyberspace 7, and slap on your damn mirrorshades! Join me as I take you through the matrix that is Cyberpunk Cinema!
…
continue reading
We Cover the Cyberspace.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Your Favorite Existentialist-Anarchist Internet BadassCommentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Podcast francophone de vulgarisation des sujets de la cybersécurité, dans une ambiance décontractée. Animé par Michael VIRGONE, commercial et passionné de cyber depuis plusieurs années
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.
…
continue reading
Comedians and Friends Chad Daniels and Cy Amundson host a weekly podcast where they tell stories about their lives. For advertising opportunities please email [email protected] We wanna make the podcast even better, help us learn how we can: https://bit.ly/2EcYbu4 Privacy Policy: https://www.studio71.com/us/terms-and-conditions-use/#Privacy%20Policy
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Το Podcast τροφή για το μυαλό σου: συμβουλές για την ζωή στο εξωτερικό, εμπειρίες, συζητήσεις για εκπαίδευση, εργασία και επιχειρείν. Προσθέστε βιβλία και κόμικ.
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
Dark Future Dice is an actual play podcast in which Titus, Lindsay and Sloane delve into the dystopian worlds of Cyberpunk 2020 and Red, weaving narratives that deal with trauma, human connection, and marginalization within an unforgiving dark future. Available on: Spotify: https://spoti.fi/2SG0xtn Apple: https://apple.co/39Fij5M Patreon: https://www.patreon.com/rocketadrift
…
continue reading
A high action, serial audio drama adventure following the wild lives of those living in the cyberpunk-deco city of Neo-Atlantis, 2112.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
This week, Cy & Chad are joined by the very hilarious Bengt Washburn (@BengtWashburn) who shares stories from the road and the time he saw a true wonder of the world at the Grand Canyon! Head on over to Chad's YouTube page to watch this episode! AND go see Cy & Chad on the road! This episode is sponsored by BetterHelp! Give online therapy a try at …
…
continue reading
1
Sirianni, Kelce, Championship Results
52:49
52:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
52:49
In this episode of The Cy Amundson Show, the matchup is set for Super Bowl LIX, and it's going to be a familiar one as the Chiefs & Eagles will meet once again! Let's talk about it! SPORTS! ------------- The Cy Amundson Show (@cyamundsonshow) is one of the best sports comedy podcasts around with Cy Amundson (@cyamundson), Blake Wexler (@BlakeWexler…
…
continue reading
1
SANS ISC Stormcast Feb 4th 2025: Crypto Scam; Mediatek and D-Link Patches; Microsoft ends VPN Service
6:13
6:13
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:13
Crypto Wallet Scam YouTube spam messages leak private keys to crypto wallets. However, these keys can not be used to withdraw funds. Victims are scammed into depositing "gas fees" which are then collected by the scammer. https://isc.sans.edu/diary/Crypto%20Wallet%20Scam/31646 Mediatek Patches Mediatek patched numerous vulnerabilities in its WLAN pr…
…
continue reading
Recently a brand new generative AI model came out of nowhere and blew up overnight. There are a lot of controversies and concerns surrounding this model, providing more efficient AI but also bringing a lot of data sensitivity risks and topics of government censorship to the forefront. Sources: https://pastebin.com/WRGERYCE…
…
continue reading
1
Resilient Cyber w/ Sounil Yu - The Intersection of AI and Need-to-Know
26:41
26:41
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:41
In this episode, we sit down with Sounil Yu, Co-Founder and CTO at Knostic, a security company focusing on need-to-know-based access controls for LLM-based Enterprise AI. Sounil is a recognized industry security leader and the author of the widely popular Cyber Defense Matrix. Sounil and I dug into a lot of interesting topics, such as: The latest n…
…
continue reading
1
DeepSeek JailbreakYields System Prompt and Open AI Link: Cyber Security Today for Monday, February 3, 2025
26:20
26:20
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:20
Cybersecurity Threats: Fraud in Canada, DeepSeek AI Jailbreak & Toll Scams - Exclusive Interview with Ivan Novikov In this episode of Cybersecurity Today, host Jim Love discusses the alarming $638 million lost by Canadians to fraud in 2024, with investment fraud being the most significant contributor. The episode also covers the successful jailbrea…
…
continue reading
1
APTs using Gemini, India’s Tata cyberattack, new WhatsApp spyware
7:22
7:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:22
Google describes APTs using Gemini AI India’s Tata Technologies suffers ransomware attack Meta confirms new zero-click WhatsApp spyware Huge thanks to our episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatL…
…
continue reading
1
Why SaaS Companies Fail—And How Apoorva Fixes Them
37:09
37:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
37:09
In this episode… Nagesh Anupindi shares his journey from data warehousing to founding Apoorva, a company focused on helping SaaS businesses stabilize, optimize, and grow. He discusses how bad data can break a business, the risks of hiring the wrong development teams, and why many companies turn to Apoorva when their software is in trouble. One of t…
…
continue reading
1
SANS ISC Stormcast Feb 3rd 2025: Automating Cyber Ranges; Deepseek Scams; PyPi Archived State; Medical Backdoors
6:23
6:23
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:23
To Simulate or Replicate: Crafting Cyber Ranges Automating the creation of cyber ranges. This will be a multi part series and this part covers creating the DNS configuration in Windows https://isc.sans.edu/diary/To%20Simulate%20or%20Replicate%3A%20Crafting%20Cyber%20Ranges/31642 Scammers Exploiting Deepseek Hype Scammers are using the hype around D…
…
continue reading
1
Defensive Security Podcast Episode 295
1:15:57
1:15:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:15:57
In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including the alarming statistics surrounding ransomware attacks, the implications of paying ransoms, and the evolving nature of ransomware as a broader category of cyber threats. They also discuss the consolidation of security…
…
continue reading
1
Crowdsourcing Firewalls & Network Security. Magic of Crowdsourcing Approaches To Security.
48:10
48:10
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
48:10
Philippe Humeau joins us to discuss new crowdsourcing approaches to security. Phillippe is a former Hacker and Founder of CrowdSec, an crowd-sourced WAZE-Like Security platform. Learn more here: https://crowdsec.net Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-77…
…
continue reading
1
Deep Seek Disruptions, NVIDIA Vulnerabilities and More: Cyber Security Today Weekend Panel for February 1, 2024
48:22
48:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
48:22
Cybersecurity Today: DeepSeek AI Disruptions, Nvidia Breach, and TalkTalk Hack Revisited In this weekend edition of Cybersecurity Today, our panel reviews the most significant cybersecurity stories of the past month. This episode features Laura Payne from White Tuque, David Shipley from Beauceron Security, and Dana Proctor from IBM. Key topics incl…
…
continue reading
1
Week in Review: Google vishing response, DeepSeek peak week, ransomware victim costs
22:51
22:51
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
22:51
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Alexandra Landegger, Global Head of Cyber Strategy & Transformation, RTX Thanks to our show sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the follow up tasks you don’t have t…
…
continue reading
1
TCW Episode 53: One-on-One IT Audit Mentorship
1:05:06
1:05:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:05:06
Show Notes Join us this week as we examine the realm of IT audit through a unique one-on-one mentorship experience, led by a highly experienced IT audit professional. Follow Ingrid https://www.linkedin.com/in/ingrid-maclean-teco-cisa-771b07181 Follow Emily https://www.linkedin.com/in/emily-may-mara-09147147/ Like and Follow our LinkedIn page https:…
…
continue reading
1
DeepSeek Security Failure: Cyber Security Today, Friday, January 31, 2025
9:20
9:20
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
9:20
Cybersecurity Today: DeepSeek AI's Data Breach, New API Threats, & Operation Talent In this episode of 'Cybersecurity Today,' host Jim Love delves into the recent security lapse by DeepSeek AI, highlighting the exposure of sensitive data through an open ClickHouse database. Learn about the growing threat posed by APIs as the primary attack vector i…
…
continue reading
1
Blood Center cyberattack, DeepSeek data leak, CISA’s future unclear
7:56
7:56
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:56
New York Blood Center suffers ransomware attack DeepSeek’s exposed database leaks sensitive data CISA’s future unclear under new administration Huge thanks to our sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the follow up tasks you don’t have time for are close behind. What are you going …
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 95
15:26
15:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
15:26
Chris Steffen and Ken Buckler from EMA discuss the changes the new Presidential administration will bring, as well as the latest news about DeepSeek AI.بقلم Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
Episode 122: AI/ChatGPT Interviews a Web Pen Tester!!
15:02
15:02
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
15:02
In this episode, Chelsea (ChatGTP) interviews Brad about web application penetration testing. Listen in to learn how the process works from start to finish! Resources https://owasp.org/ https://nvd.nist.gov/vuln-metrics/cvss https://chatgpt.com/ Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://twitter.com…
…
continue reading
1
The Dark Side - New Ways AI is used in Social Engineering.
34:36
34:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:36
Today's Cyber Flash Point is about The Dark Side - New Ways AI is used in Social Engineering. We review AI risks in social engineering, How Deep Fake Videos Increase Security Risks, and new ways to reduce risk of deep fakes. Send us a text Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today …
…
continue reading
In this bonus episode, Ciaran and James ring in the new year with a look back at the standout guests and thought-provoking topics from series one. They also take a sneak peek at what 2025 holds for the ever-evolving world of tech security. And to top it off, there’s a special announcement to chase away those January blues. Highlights: Typhoon Varia…
…
continue reading
1
SANS ISC Stormcast Jan 31st 2025: Old Netgear Vuln in Depth; Lightning AI RCE; Canon Printer RCE; Deepseek Leak;
5:40
5:40
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:40
PCAPs or It Didn't Happen: Exposing an Old Netgear Vulnerability Still Active in 2025 [Guest Diary] https://isc.sans.edu/diary/PCAPs%20or%20It%20Didn%27t%20Happen%3A%20Exposing%20an%20Old%20Netgear%20Vulnerability%20Still%20Active%20in%202025%20%5BGuest%20Diary%5D/31638 RCE Vulnerablity in AI Development Platform Lightning AI Noma Security discover…
…
continue reading
1
The EU AI Act - what does it mean for your business?
9:32
9:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
9:32
The EU has passed the world’s first comprehensive law on Artificial Intelligence (AI): The AI Act. This groundbreaking legislation aims to ensure the safe, ethical, and transparent use of AI within the EU, impacting businesses in the UK and globally. Key Takeaways for Business Leaders: Understanding Risk Categories: The AI Act categorises AI system…
…
continue reading
1
Audit and Accountability | Guide To NIST 800-171
10:43
10:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
10:43
Welcome to episode Four of our NIST 800-171 series ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/alerts/ to subscribe. ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @secdefl…
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. intro new followers who are you wearing? sponsorship - Cybersecurity Growth Consulting nerd zone PowerSchool Breach hot topic - RTO Key Perspectives Hybrid vs. Office-Only Trends Executive Perspective Business and Operational Considerations Risk and Liability E…
…
continue reading
1
From Marine to Mandiant with Ryan Rath
1:12:37
1:12:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:12:37
Ryan Rath shares his journey from the military to a significant role in cybersecurity with Mandiant, discussing the challenges faced during the transition. Key topics include the importance of networking, the evolving skill sets required, and the ethical responsibilities of cybersecurity professionals, highlighting the need for mentorship and conti…
…
continue reading
1
6 Rules That Got Me Into Cyber Security (With No Experience) | EP 20
10:37
10:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
10:37
Unlock the secrets to cybersecurity success without relying on years of experience or expensive certifications. Learn how complete beginners can outperform seasoned pros by following six specific rules, from developing a hustle mentality to giving back to the community. Discover inspiring stories of individuals who landed dream jobs and led securit…
…
continue reading
1
Tenable acquires Vulcan Cyber, Chinese and Iranian hackers are using U.S. AI, US Navy bans use of DeepSeek
7:35
7:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:35
Tenable acquiring Israel’s Vulcan Cyber in $150 million deal Chinese and Iranian Hackers Are Using U.S. AI Products to Bolster Cyberattacks U.S. Navy bans use of DeepSeek due to ‘security and ethical concerns’ Huge thanks to our sponsor, Conveyor Ever wish you had a teammate that could handle the most annoying parts of customer security reviews? Yo…
…
continue reading
1
teissTalk: The future of SecOps - why should leaders be optimistic?
45:17
45:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
45:17
Automating SecOps processes and procedures - free your people, improve retention and increase productivity Where creativity and diversity is keeping your SecOps one step ahead of the attackers Matching your effectiveness to organisational objectives - aligning your internal SOC metrics with those required by the board This episode is hosted by Thom…
…
continue reading
1
SANS ISC Stormcast, Jan 30th 2025: Python vs. Powershell; Fortinet Exploits and Patch Policy; Voyager PHP Framework Vuln; Zyxel Targeted; VMWare AVI Patch
5:33
5:33
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:33
From PowerShell to a Python Obfuscation Race! This information stealer not only emulates a PDF document convincingly, but also includes its own Python environment for Windows https://isc.sans.edu/diary/From%20PowerShell%20to%20a%20Python%20Obfuscation%20Race!/31634 Alleged Active Exploit Sale of CVE-2024-55591 on Fortinet Devices An exploit for thi…
…
continue reading
1
How to Outsmart Ransomware: AI, Digital Forensics & Insider Secrets with Andria Delia
32:32
32:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:32
In this episode, we’re joined by Andria Delia, a Cyber Threat Intelligence Expert and a nominee for the Cellebrite Digital Justice Rising Star Award at the C2 Summit. Andria dives into her extensive experience in cybersecurity, sharing valuable insights on the psychology of cyber attackers and how she handles ransomware without paying ransoms. She …
…
continue reading
1
Integrating Intelligence: CTIIC’s Role in Defending Critical Infrastructure with Laura Galante and Lauren Goldman
46:19
46:19
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
46:19
In this episode of Cyber Focus, host Frank Cilluffo sits down with Laura Galante, Director of the Cyber Threat Intelligence Integration Center (CTIIC), and Lauren Goldman, head of Analysis and Analytic Integration at CTIIC. They discuss CTIIC’s evolving role in integrating intelligence across agencies and sectors, its initiatives to bolster critica…
…
continue reading
1
The Spirit of Generosity: To Give from the Heart, First Learn to Let Go
52:08
52:08
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
52:08
Episode 8, Series 1: "Embracing Life with Wisdom & Compassion" Featuring: Roshi Joan Halifax, Tenzin Wangyal Rinpoche, and Alejandro Chaoul-Reich To be truly generous of spirit, we must loosen our attachments — not only to what we are giving, but also to our expectations for an outcome. What is the true meaning of generosity? How can we know if it’…
…
continue reading
1
Cybersecurity Challenges in 2025 and DeepSeek Privacy Concerns - Ep 134
12:31
12:31
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
12:31
In this episode of 'Reimagining Cyber,' Rob Aragao explores major trends and focus areas for cybersecurity in 2025. The discussion includes regulatory impacts, particularly around the Digital Operational Resiliency Act (DORA) and the EU AI Act, the complexities of data privacy with eight new laws in the U.S., and the growing emphasis on compliance …
…
continue reading
1
DeepSeek - New AI Disruptor Gets Hit With Cyber Attack: Cyber Security Today for Wednesday, January 29, 2025
5:17
5:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:17
Navigating AI Cyber Threats and Critical Infrastructure Vulnerabilities In this episode of Cybersecurity Today, host Jim Love discusses the recent cyber attack on AI platform DeepSeek that exploited open source vulnerabilities. He highlights significant challenges in U.S. cybersecurity oversight following disruptions in key bodies like the Cyber Sa…
…
continue reading
1
Ransomware shutdowns, GRU sanctions, Lynx ransomware details
7:32
7:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:32
Most ransomware victims shut down operations shutdowns EU sanctions GRU members for Estonia cyberattacks Lynx ransomware runs a tight ship Huge thanks to our sponsor, Conveyor Tired of herding cats to complete customer security questionnaires? Your team probably spends hours daily juggling the back and forth of completing these security requests. T…
…
continue reading
The off season may have started a little earlier than we hoped, but it's sure to be a busy one for the Minnesota Vikings, so join us as we start to dive into what's next for this team. ------------- The Cy Amundson Show (@cyamundsonshow) is one of the best sports comedy podcasts around with Cy Amundson (@cyamundson), Blake Wexler (@BlakeWexler), To…
…
continue reading
Gabe Gambill, international technology expert with Quorum (https://get.quorum.com/) who leads executives to understand what happens when data back ups fail and how to plan accordingly. Summary In this conversation, Dino Mauro interviews Gabe Gimble, Vice President of Products and Technical Operations at Quorum, about his journey into technology and…
…
continue reading
1
SANS ISC Stormcast, Jan 29th 2025: Python Crypto Stealer; SimpleHelp Exploited; Apple Silicon Vuln; Teamviewer Vuln; Odd QR Code
6:07
6:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:07
Learn about fileless crypto stealers written in Python, the ongoing exploitation of recent SimpleHelp vulnerablities, new Apple Silicon Sidechannel attacks a Team Viewer Vulnerablity and an odd QR Code Fileless Python InfoStealer Targeting Exodus This Python script targets Exodus crypto wallet and password managers to steal crypto currencies. It do…
…
continue reading
1
The Secrets of Scaling: Vladyslav Podoliako’s Entrepreneurial Playbook
37:00
37:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
37:00
In this episode… Vlad Podoliako shares his journey from an entry-level IT position to founding Belkins, a top B2B acquisition agency. He explains how Belkins grew into a multi-company ecosystem, solving critical business challenges like email deliverability through its product, Folderly. Vlad’s approach to entrepreneurship is rooted in solving prob…
…
continue reading
1
Cyber Liability Insurance in 2025: Understanding New Requirements and Risks
14:38
14:38
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
14:38
Send us a text In this episode of CyberSound, hosts Jason Pufahl and Steven Maresca revisit the evolving world of cyber liability insurance. They discuss how security requirements have shifted from foundational tools like MFA and EDR to more rigorous expectations around operational practices, vulnerability scanning, and incident response. Learn how…
…
continue reading
Unge mænd og kvinder bliver mere og mere splittede i deres holdnigner til ligestilling. Studier fra både Danmark, USA og andre lande peger på at mens unge kvinder mener der er lang vej igen, mener flere og flere unge mænd at ligestillingen er gået for langt. En del bebrejder internettet og sociale medier for denne udvikling. Her finder unge manflue…
…
continue reading
1
THEOS Cybernova - Jonathan Crompton: Crisis Leadership When Cyber Attacks Strike
44:12
44:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
44:12
THEOS Cybernova Ep. 5 - Jonathan Crompton: Crisis Leadership When Cyber Attacks Strike What happens when a ransomware attack hits, and every decision counts? Jonathan Crompton, Partner at Reynolds Porter Chamberlain (RPC) and Head of Cyber Response for Asia, takes us behind the scenes of cyber crisis management. With extensive expertise in cross-bo…
…
continue reading
1
Sophisticated voice phishing, Opengrep consortium, DeepSeek suspends registrations
8:23
8:23
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:23
Google responds to “most sophisticated” voice phishing attack Security consortium creates Opengrep DeepSeek suspends new user registrations Huge thanks to our sponsor, Conveyor Tired of herding cats to complete customer security questionnaires? Your team probably spends hours daily juggling the back and forth of completing these security requests. …
…
continue reading
1
SANS ISC Stormcast, Jan 28th 2025: Z-Shy Phishing; Apple Patches 0-Day; Fortinet Exploit Details; Github and Apache Solr Patches
6:14
6:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:14
This episode shows how attackers are bypassing phishing filter by abusing the "shy" softhyphen HTML entitiy. We got an update from Apple fixing a 0-day vulnerability in addition to a number of other issues. watchTowr show how to exploit an interesting FortiOS vulnerability and we have patches for Github Desktop and Apache Solr An unusal shy z-wasp …
…
continue reading
1
Ransomware Gang TAKE DOWN: Secrets from the Dark Web.
51:55
51:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
51:55
Expert Security Researcher, Jon DiMaggio, former National Security Agency (NSA) analyst, takes us under cover on the Dark Web, providing us insight in plain terms on: ransomware explained for small business and ransomware risks for small business, how cyber attacks stay undetected, how intelligence gathering is critical to security, secrets of cybe…
…
continue reading
1
NCF-362 Entering the New Year, Turning to Governance
33:08
33:08
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:08
Welcome back to New Cyber Frontier! In this episode, our hosts—Dr. Shawn P. Murray, Tim Montgomery, and Dr. Gorog—tackle pivotal topics shaping our world today: political transitions, evolving social media policies, and the ongoing impact of artificial intelligence (AI). Political Transition: Cybersecurity Takes Center Stage With Donald J. Trump re…
…
continue reading
1
CompTIA Network+: Is it necessary for a cybersecurity career? | Guest Tommy Gober
10:45
10:45
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
10:45
Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Infosec Instructor Tommy Gober joins Cyber Work Hacks to discuss the CompTIA Network+ certification. Despite often being bypassed in favor of Security+, Gober explains why Net…
…
continue reading