Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2024, National Security Corporation. All Rights Reserved
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Email greg.schaffer@secondchancebook.org. A Second Chance Publishing, LLC podcast.
…
continue reading
Welcome to CISO Insights, the official podcast of CISO Marketplace, where we dive deep into the latest trends, challenges, and innovations in cybersecurity. Each episode features expert commentary, practical advice, and cutting-edge insights to help Chief Information Security Officers (CISOs) navigate today’s complex threat landscape. From risk management and compliance to advanced threat detection and emerging technologies, CISO Insights delivers the knowledge you need to stay ahead in an e ...
…
continue reading
Join Query CISO Neal Bridges and VP - Distinguished Engineer Jonathan Rau as they explore the world of SecDataOps. What is it? Who should care about it? Wait, wasn’t it a throwaway joke?
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
Aphinia (https://www.aphinia.com) - a community of 1,500+ CISOs - is brining regular interviews with top information security executives who share their personal stories, actionable insights, helpful tactics to keep your enterprise safe and predictions for the future cybersecurity landscape.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Johna Till Johnson & John Burke bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions a ...
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field of cybersecurity.
…
continue reading
A disgraced CISO (Greg Kinnear) gets a call from a Miami journalist (Erin Moriarty) who needs help investigating a series of scams targeting terminally ill patients. He begrudgingly accepts… But in a world of swindling and deceit, where nothing is what it seems – their findings are just the tip of the iceberg.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
Ride the cyber trails with one CISO (Allan Alford) and a diverse group of friends and experts who bring a human perspective to cybersecurity.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address talkingcybersec@gmail.com to make comments, pose questions or even ask to be on ...
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
The official EC-Council CISO Forum podcast.
…
continue reading
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
…
continue reading
Welcome to “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidenc ...
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Enterprise AI Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. EAD is hosted by Evan Reiser, the CEO & founder of Abnormal Security, and Mike Britton, the CISO of Abnormal Security.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
The Cloud Frontier podcast by simplyblock brings you topics around the founding of early-stage cloud infrastructure startups, entrepreneurship and taking visionary ideas to market. Explore their fundraising journeys, go-to-market strategies, and the challenges of finding product-market fit. Tune in to discussions on AI, machine learning, and the future of cloud technologies. Whether you're a tech enthusiast, aspiring entrepreneur, or industry professional (CTO, CIO, CISO, VP of Infrastructur ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
A podcast for digital transformation leaders. Network security experts Pam Kubiatowski and Lisa Lorenzin discuss the latest cyber-attack issues, enterprise security strategies, and current security events so that you can successfully accelerate network and security transformation. You can subscribe to the podcast feed on Apple Podcasts and Spotify.
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
…
continue reading
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
…
continue reading
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
…
continue reading
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
…
continue reading
1
A Profession on Trial: Joe Sullivan’s Exclusive Take on the CISO Role
48:07
48:07
Play later
Play later
Lists
Like
Liked
48:07
In this exclusive and unfiltered episode of The Professional CISO Show, David Malicoat hosts Joe Sullivan, current CEO of Joe Sullivan Security LLC and the former Chief Security Officer of Uber, for an in-depth conversation you won’t want to miss. Joe reflects on his groundbreaking career, his trial as the first corporate executive prosecuted for h…
…
continue reading
1
Ep 20: Protecting a Fortune 50 Giant: How FedEx Deploys AI at Scale with VP & CISO Gene Sun
24:50
24:50
Play later
Play later
Lists
Like
Liked
24:50
On the 20th episode of Enterprise AI Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal Security, talk with Gene Sun, Vice President and Chief Information Security Officer at FedEx. FedEx is a multinational courier delivery services company with over $90 billion in annual revenue and more than 500,000 employees globally. Wit…
…
continue reading
1
Identity Security: Navigating the New Normal with Dr. Sean Murphy - Sean Murphy - CSP #201
34:15
34:15
Play later
Play later
Lists
Like
Liked
34:15
In this episode of CSP, we sit down with Dr. Sean Murphy, the CISO of BECU, one of Seattle’s largest credit unions, to discuss the shifts in identity security brought on by the COVID-19 pandemic. Dr. Murphy highlights how Zero Trust architecture became crucial for verifying internal users, especially as remote work became the norm. He shares insigh…
…
continue reading
1
S5E55 - A Conversation with Stephan Timler
31:58
31:58
Play later
Play later
Lists
Like
Liked
31:58
Stephan Timler is an Inside Sales Rep - Strategic Accounts (Communications, Media, Technology and Manufacturing) for Splunk. As such, he is responsible for sourcing and advancing opportunities from strategic accounts using multi-channel prospecting, relationship building, analytical skills and discovery skills. We discussed the role and importance …
…
continue reading
1
Once You Show Me Your Diploma, I’ll Explain Why We Don’t Gatekeep
39:47
39:47
Play later
Play later
Lists
Like
Liked
39:47
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Jimmy Benoit, vp, cybersecurity, PBS. In this episode: Starting early on security awareness The limits of gamification Technically quali…
…
continue reading
Welcome to another enlightening episode of CISO Tradecraft! In this episode, host G. Mark Hardy dives deep into the critical topic of CISO burnout with special guest Raghav Singh, a PhD candidate from the University of Buffalo. This is an eye-opening session for anyone in the cybersecurity field, especially those in or aspiring to the CISO role. Ra…
…
continue reading
1
META Versus You: Data, Deepfakes & Dangerous Algorithms
23:09
23:09
Play later
Play later
Lists
Like
Liked
23:09
Ever get the feeling you're being watched online? Like every click, every like, every share is feeding some invisible monster? Well, you're not wrong. This podcast explores the dark side of Meta, the company formerly known as Facebook, and how its vast empire impacts your privacy, security, and even your mental health.We'll uncover Meta's data coll…
…
continue reading
In this new episode of Life of a CISO, Dr. Eric Cole dives into the critical importance of finding alignment in your career as a CISO—seeing it as not just a job but as a true mission. Through insightful reflections, he emphasizes the mental shifts needed to thrive in cybersecurity leadership by letting go of unnecessary thoughts and focusing on pu…
…
continue reading
1
Europe eyes digital sovereignty despite pessimistic cybersecurity outlook
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55
In a room of 50 CISOs, if only one said we're winning the war against cyber threats, what does it tell us? Tony Fergusson, CISO in Residence at Zscaler, and Casper Klynge, newly appointed Vice President and Head of EMEA Government Partnerships at Zscaler, unpack the quandary facing Europe and other regions where bold ambitions to adopt security and…
…
continue reading
1
Helping CISOs Communicate Their Way To Positive Outcomes
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10
In this episode, Jeffrey talks to Rock Lambros, founder and CEO of RockCyber. Along with coaching CISOs and serving as a vCISO, Rock is also a published thought leader, co-authoring the book, “The CISO Evolution: Business Knowledge for Cybersecurity Executives.” Rock and Jeffrey talk about “little fish in a big pond” movies, the evolving landscape …
…
continue reading
1
How to Tackle Tough Interviews and Career Transitions
41:31
41:31
Play later
Play later
Lists
Like
Liked
41:31
Episode summary: In this episode of The New CISO, host Steve Moore welcomes Ryan Shaw, Director of Information Security at Bond Brand Loyalty. Ryan shares his unique journey from working in kitchens and warehousing to becoming a leader in cybersecurity. He reflects on the importance of career change, battling imposter syndrome, and the challenges c…
…
continue reading
All links and images for this episode can be found on CISO Series. Check out these posts for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is Allan Cockriel, group CISO, Shell. In this episode: Striking a balance Will we…
…
continue reading
1
The GC+CISO Connection: A GC and IT Director Share Their Perspectives on Working Together to Protect the Organization Against Cyber Risk
31:53
31:53
Play later
Play later
Lists
Like
Liked
31:53
In this episode of the GC+CISO Connection Show, host Shawn Tuma visits with Erin Stewart, Pinnacle Group Inc.'s General Counsel and Chief of Staff, and Jonathan Merrill, Pinnacle's Sr. Director of Information Technology. Erin and Jonathan share their experience and perspectives on how they work together to address legal, cyber, and information tech…
…
continue reading
1
401 Access Denied Podcast Ep. 118 | CISO Stories: Leading Today, Shaping Tomorrow with Joshua Brown
40:38
40:38
Play later
Play later
Lists
Like
Liked
40:38
H&R Block’s transformational CISO, Joshua Brown, shares lessons for building a security strategy that provides guardrails so business can move faster. He and Joe discuss how to speak the language of the business in terms of motivations and metrics, and the importance of aligning on risk management for material incidents. With a distributed attack s…
…
continue reading
1
Are Security Awareness Training Platforms Effective?
26:50
26:50
Play later
Play later
Lists
Like
Liked
26:50
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Dan Walsh, CISO, Paxos. Joining us is Sharon Milz, CISO, Time. In this episode: A vicious cycle Not all traini…
…
continue reading
1
Scattered Spider arrest, telcos attacked, Apple exploit
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04
US charges Scattered Spider members Chinese threat actors infiltrate more telcos Apple issues emergency security update Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, default-de…
…
continue reading
1
🚨 Apple Fixes MacOS Zerodays, Chinese Telecom Attackers Leverage Sigtran, Chinese Cybersecurity Threats
17:11
17:11
Play later
Play later
Lists
Like
Liked
17:11
🚨 Apple Fixes MacOS Zerodays, Chinese Telecom Attackers Leverage Sigtran, Chinese Cybersecurity Threats 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Apple Fixes two zerodays for MacOS with Intel with more news below: • Cargill Kronos Lawsuit …
…
continue reading
1
Navigating Bias — Cybersecurity’s Crooked Mirror
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08
In this episode, Jeffrey talks to Dr. Dustin Sachs, Chief Technologist and Sr. Director of Programs at the CyberRisk Collaborative. They discuss movies in which a main character’s misunderstanding of a situation creates chaos, then dive into Dustin’s extensive scholarly research on bias and explore its impact on making sound cybersecurity decisions…
…
continue reading
1
265 - Developing for Microsoft 365 Copilot with custom apps with Waldek Mastykarz
34:28
34:28
Play later
Play later
Lists
Like
Liked
34:28
This week, we'll talk with Waldek Mastykarz from Microsoft about Microsoft 365 Copilot custom apps. What are they? How can you create your custom apps? What things to consider when publishing them? Also, Tobi asks Waldek an unexpected question. (00:00) - Intro and catching up. (04:08) - Show content starts. Show links - Extend Microsoft 365 Copilot…
…
continue reading
1
Pricing Transparency for Compute | Carmen Li
46:03
46:03
Play later
Play later
Lists
Like
Liked
46:03
In this episode of Cloud Frontier, we chat with Carmen Li, founder of Silicon Data. Carmen shares her journey from high-frequency trading to launching a platform that brings financial infrastructure and transparency to compute markets. She discusses Silicon Data's first products—SiliconNavigator for GPU price insights and SiliconCarbon for carbon f…
…
continue reading
1
Hybrid Identity Protection - Amazing Interviews with Many Guests
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42
This week Allan attended the HIP Global conference in New Orleans, which happens to be Allan's favorite city in America. The conference was outstanding - no sales pitches, no nonsense, just many experts speaking on the topic of securing identity. Entra ID, Okta, AD folks all were present, and it was amazing. Allan got to interview some AMAZING gues…
…
continue reading
Big questions get big answers. Stay up-to-date on future episodes at scamhunters.io – SCAM HUNTERS is presented by Thoropass. Does your infosec compliance process sometimes feel like a mystery? You need Thoropass—the all in one infosec compliance delivery platform with seamless audits, airtight security, and peace of mind. No more shady spreadsheet…
…
continue reading
Something doesn’t feel right. Stay up-to-date on future episodes at scamhunters.io – SCAM HUNTERS is presented by Thoropass. Does your infosec compliance process sometimes feel like a mystery? You need Thoropass—the all in one infosec compliance delivery platform with seamless audits, airtight security, and peace of mind. No more shady spreadsheets…
…
continue reading
1
Episode 110: How Security Culture and Corporate Culture Mesh
41:38
41:38
Play later
Play later
Lists
Like
Liked
41:38
In episode 110 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Lee Noriega, Executive Director of the Cybersecurity Services Organization and Acting General Manager of Sales and Business Services at the Center for Internet Security® (CIS®); and Jerry Gitchel, founder of Leverage Unlimited and listener to Cybersecurity Whe…
…
continue reading
1
Easterly to step down, Maxar discloses breach, Microsoft hacking event
7:57
7:57
Play later
Play later
Lists
Like
Liked
7:57
CISA director Jen Easterly to step down Space tech giant Maxar discloses employee data breach Microsoft launches Zero Day Quest hacking event Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a…
…
continue reading
1
Digital DNA: Convergence of Identity & Data - Ep 124
14:08
14:08
Play later
Play later
Lists
Like
Liked
14:08
In this week’s episode of Reimagining Cyber, host Rob Aragao (live from Las Vegas!) dives into the convergence of identity security and data protection—a critical topic reshaping the cybersecurity landscape. Rob unpacks the key drivers behind this shift, including regulatory mandates like GDPR and CCPA. The conversation emphasizes the need for orga…
…
continue reading
1
HS089: Return to the Office: What’s Next?
28:04
28:04
Play later
Play later
Lists
Like
Liked
28:04
Some high-profile companies like Amazon are mandating all employees return to the office, full time. Justifications, when given, mostly revolve around productivity and innovation. We say, whoa there! The data don’t back up the idea that hybrid and remote work hurt productivity (kind of the opposite) or innovation, and the real justifications like…
…
continue reading
1
Identity Security: Navigating the New Normal with Dr. Sean Murphy - Sean Murphy - CSP #201
34:16
34:16
Play later
Play later
Lists
Like
Liked
34:16
In this episode of CSP, we sit down with Dr. Sean Murphy, the CISO of BECU, one of Seattle’s largest credit unions, to discuss the shifts in identity security brought on by the COVID-19 pandemic. Dr. Murphy highlights how Zero Trust architecture became crucial for verifying internal users, especially as remote work became the norm. He shares insigh…
…
continue reading
1
🚨 Cargill Cyberattack lawsuit dismissed, Palo Alto Patches Zeroday, Drinking Water exposed to Attacks
16:32
16:32
Play later
Play later
Lists
Like
Liked
16:32
🚨 Cargill Cyberattack lawsuit dismissed, Palo Alto Patches Zeroday, Drinking Water exposed to Attacks 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Palo Alto Networks patches zeroday with more news below: • 300 Drinking Water systems exposed t…
…
continue reading
1
EPA warns of critical risks, Four million WordPress sites exposed, Sextortion scams bypass filters
8:21
8:21
Play later
Play later
Lists
Like
Liked
8:21
EPA warns of critical risks in drinking water infrastructure Four million WordPress sites exposed Sextortion scams bypass Microsoft security filters Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you…
…
continue reading
1
🚨 T-Mobile Hacked in Chinese Telecom Breach, Palo Alto Networks Firewall Zeroday, Veeam Ransomware Exploit
16:50
16:50
Play later
Play later
Lists
Like
Liked
16:50
🚨 T-Mobile Hacked in Chinese Telecom Breach, Palo Alto Networks Firewall Zeroday, Veeam Ransomware Exploit 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as T-Mobile Hacked in Chinese Telcom breach with more news below: • NSO Hacked WhatsApp after…
…
continue reading
1
T-Mobile confirms breach, AnnieMac data stolen, NewGlove malware threat
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25
T-Mobile confirms telecom breach hack Customer data stolen from AnnieMac New Glove infostealer malware bypasses Chrome’s cookie encryption Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a pr…
…
continue reading
1
Episode 85: Episode 85 - BSides Melbourne 2024
11:25
11:25
Play later
Play later
Lists
Like
Liked
11:25
Richard describes his experiences of Day 1 at Melbourne BSides 2024.
…
continue reading
1
Week in Review: Most common passwords, Secure-by-design, DNA firm vanishes
26:08
26:08
Play later
Play later
Lists
Like
Liked
26:08
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Brett Conlon, CISO, American Century Investments Thanks to our show sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker …
…
continue reading
1
What happens to CISA now? Is deterrence in cyber possible?
1:53:51
1:53:51
Play later
Play later
Lists
Like
Liked
1:53:51
Three Buddy Problem - Episode 21: We dig into an incredible government report on Iranian hacking group Emennet Pasargad and tradecraft during the Israel/Hamas war, why Predatory Sparrow could have been aimed at deterrence in cyber, and the FBI/CISA public confirmation of the mysterious Salt Typhoon hacks. Plus, discussion on hina’s cyber capabiliti…
…
continue reading
1
Mastering API Security and the Power of AI with Colin Domoney, CTO of Thinking of You
24:40
24:40
Play later
Play later
Lists
Like
Liked
24:40
Colin Domoney, CTO and co-founder of Thinking of You, shares his career journey in cybersecurity and his expertise in API security. He started as a kid building electronics and crypto systems, which led him to develop battle-hardened defense systems. He gravitated towards software and eventually got into AppSec, diving into the deep end and fixing …
…
continue reading
1
Live Insights from N TX ISSA CSC 12: From Identity Assurance to Borderless Security
19:35
19:35
Play later
Play later
Lists
Like
Liked
19:35
In this special episode recorded live from the North Texas ISSA CSC 12 Conference, host David Malicoat dives deep into the future of cybersecurity with industry trailblazers. Tune in to hear from Ryan Rowcliff of Hyper, Julio Casablanca of WWT, and Ryan Heinrich of ID.me as they share invaluable insights on identity assurance, decentralized securit…
…
continue reading
1
NordPass popular passwords, Healthcare extortion sentence, China breached telecoms
8:18
8:18
Play later
Play later
Lists
Like
Liked
8:18
China threat actors breached U.S. broadband providers to spy on U.S. government officials 123456 tops the list of most popular passwords again Hacker gets 10 years in prison for U.S. healthcare extortion scheme Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can …
…
continue reading
1
🚨 Chinese Hackers Compromised Private Communication, 122 Million Breach Victims, Windows 0day Exploited by Russia
19:07
19:07
Play later
Play later
Lists
Like
Liked
19:07
🚨 Chinese Hackers Compromised Private Communication, 122 Million Breach Victims, Windows 0day Exploited by Russia 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as CISA and FBI Confirm Telecom breach with more news below: • Windows Zeroday exploit…
…
continue reading
1
The Argument For More Cybersecurity Startups
32:07
32:07
Play later
Play later
Lists
Like
Liked
32:07
All links and images for this episode can be found on CISO Series. Check out these posts for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Ross Haleliuk, author, Venture in Security. Be sure to check out Ross's podcast, Inside the Network, and his…
…
continue reading
In this episode of Security Visionaries, we're joined by Kiersten Todt, President at Wondros and former Chief of Staff for the Cybersecurity and Infrastructure Security Agency (CISA) to discuss predictions for 2025 and beyond.Topics include the role of artificial intelligence in security, the potential for an AI bubble burst, and reclassifying the …
…
continue reading
1
Volt Typhoon's new botnet, China APT hits Tibet, DoD leaker sentenced
7:31
7:31
Play later
Play later
Lists
Like
Liked
7:31
Volt Typhoon rebuilding botnet Chinese group targets Tibetan media DoD leaker sentenced Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and…
…
continue reading
1
Zero-Day Exploits on the Rise: A Deep Dive into the NSA's Top Vulnerabilities of 2023
14:13
14:13
Play later
Play later
Lists
Like
Liked
14:13
Join us as we explore the latest cybersecurity advisory from the NSA and its international partners, revealing the most exploited vulnerabilities of 2023. We break down complex technical jargon into understandable concepts, highlighting real-world examples like the Microsoft Outlook vulnerability that allows attackers to take over your system just …
…
continue reading
1
🚨 Microsoft Confirms Zeroday, Patch Tuesday Recap, Delta & Amazon Confirm Breach, Volt Typhoon Botnet
14:36
14:36
Play later
Play later
Lists
Like
Liked
14:36
🚨 Microsoft Confirms Zeroday, Patch Tuesday Recap, Delta & Amazon Confirm Breach, Volt Typhoon Botnet 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Microsoft confirms zeroday after task scheduler exploit with more news below: • ICS Patch Tuesd…
…
continue reading
In this week's episode, we look at recent Microsoft Tech updates. By popular request, we're expanding the scope beyond just Azure to include Microsoft 365, Power Platform, and similar Microsoft platforms and capabilities. What's new? What's interesting? What's retiring? Also, Jussi asks Tobi an unexpected question. (00:00) - Intro and catching up. …
…
continue reading
Hiding in plain sight, Heidi confronts Manny. Stay up-to-date on future episodes at scamhunters.io – SCAM HUNTERS is presented by Thoropass. Does your infosec compliance process sometimes feel like a mystery? You need Thoropass—the all in one infosec compliance delivery platform with seamless audits, airtight security, and peace of mind. No more sh…
…
continue reading
1
401 Access Denied Podcast Ep. 119 | Segregation of Duties: A Key to Security with Chris Katz
38:30
38:30
Play later
Play later
Lists
Like
Liked
38:30
In this episode of 401 Access Denied, Joe Carson and guest Chris Katz dive into identity compliance essentials. They cover the critical steps for organizations to secure access, from defining roles and managing risks to enforcing governance and regular audits. Chris shares insights on using community resources and staying up-to-date through confere…
…
continue reading
1
Episode 109: The Scariest Malware of 2024
38:42
38:42
Play later
Play later
Lists
Like
Liked
38:42
In episode 109 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Randy Rose, VP of Security Operations & Intelligence at the Center for Internet Security® (CIS®); and Theodore "TJ" Sayers, Director of Intelligence & Incident Response at CIS. Together, they examine the scariest malware of 2024 and share some recommendations …
…
continue reading
1
Giant Food cyberattack, Snowflake suspects indicted, zero-day vulnerability surge
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45
Dutch cybersecurity incident affects Giant Food and Hannaford Indictment against Snowflake breach suspects is released Surge in zero-day vulnerability exploits is new normal, says Five Eyes Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security …
…
continue reading