show episodes
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
  continue reading
 
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
  continue reading
 
Artwork
 
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
  continue reading
 
Artwork

1
Unsolicited Response

Dale Peterson: ICS Security Catalyst and S4 Conference Chair

Unsubscribe
Unsubscribe
Monthly+
 
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

Unsubscribe
Unsubscribe
Weekly+
 
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
A podcast for digital transformation leaders. Network security experts Pam Kubiatowski and Lisa Lorenzin discuss the latest cyber-attack issues, enterprise security strategies, and current security events so that you can successfully accelerate network and security transformation. You can subscribe to the podcast feed on Apple Podcasts and Spotify.
  continue reading
 
Artwork
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
#BalkansDebrief is an online interview series presented by the Atlantic Council’s Europe Center and hosted by journalist Ilva Tare. The program offers a fresh look at the Western Balkans and examines the region’s people, culture, challenges, and opportunities. Follow along on Twitter @ACEurope with #BalkansDebrief.
  continue reading
 
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
  continue reading
 
Artwork

1
Post Mortem

François Paupier

Unsubscribe
Unsubscribe
Monthly
 
In Post Mortem, engineers reflect on real-life incidents of IT systems they experienced. In each episode, we zoom on a specific event, ranging from a system outage, a cyber-attack, or a machine learning algorithm going wild with production data. We try to understand what happened and how the people behind those systems solved the situation. Along the way, you'll get hands-on advice shared by experienced practitioners that you can implement within your team to limit the risk of such incidents.
  continue reading
 
Artwork
 
The cyber security podcast from SE Labs. Understand cyber security and other security issues. Practical and insightful, our experts have experience in attacking and defending in the physical and digital worlds. Peek behind the curtain with Cyber Security DE:CODED.
  continue reading
 
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
  continue reading
 
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
  continue reading
 
Artwork

1
Cyber Security Grey Beard®

Cyber Security Grey Beard®

Unsubscribe
Unsubscribe
Monthly
 
Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession.
  continue reading
 
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
  continue reading
 
Artwork

1
No Law Firm Left Behind

Jim Gast, Law Firm Tech & Cyber Consultant

Unsubscribe
Unsubscribe
Monthly
 
Secret weapon podcast to the Law Firm Owner, Managing Partner, Legal Admin, Office Manager and IT Director on marketing, motivation, legal tech, security, work-life balance, business growth and much more.Expert advice from your colleagues who have already tackled the challenges you’ve going through right now. Their advice will help your law firm be competitive, keep your attorneys & staff productive and help you get and keep clients.Subscribe and stop going at it alone to keep your Law Firm ...
  continue reading
 
Artwork
 
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

Unsubscribe
Unsubscribe
Weekly
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Artwork

1
Renewable Rides

Gareth Evans & Dan Roberts

Unsubscribe
Unsubscribe
Weekly
 
Renewable Rides is the guide to the corporate energy transition. Featuring interviews with industry experts and business leaders, Renewable Rides aims to help companies tackle challenges and maximize opportunities in the pursuit of a resilient, profitable, and thriving energy future. Hosts Gareth Evans and Dan Roberts, founders of VECKTA, shed light on the energy transition and the benefits it presents for company brand, operations and resilience.
  continue reading
 
Artwork

1
Emerging Cyber Risk

Max Aulakh & Joel Yonts

Unsubscribe
Unsubscribe
Monthly
 
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
  continue reading
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Artwork
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
  continue reading
 
Want to grow your practice? The Physician Growth Accelerator is the premier weekly podcast for private practice physicians — delivering actionable, game-changing insights to help you balance the art of excellent patient care with the demands of running a successful practice. From optimizing your practice's operations to harnessing predictable revenue growth to crafting an exit strategy, we've got you covered. Developed and produced by TrackableMed — creators of the popular Medical Sales Acce ...
  continue reading
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
The latest research and opinion from ACCA’s Professional Insights. We explore the big issues impacting business, the accountancy profession and the evolving world of work. From technology to talent management, our subject matter experts and guests discuss good practice from across industries to help you stay ahead in business and your career.
  continue reading
 
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
  continue reading
 
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
  continue reading
 
Artwork
 
Thomas Hatch and Jimmy Chunga are The Hacks! Join them every week as they talk about nerd stuff. If you’re into cybersecurity, DevSecOps, SecOps, DevOps, all the Ops, infrastructure automation, network automation, configuration management, and open source then subscribe now. This will be your new favorite podcast! Because we know you’re thinking it...NO, they don’t live in their moms’ basements...this month.
  continue reading
 
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
  continue reading
 
Loading …
show series
 
An index measuring local enterprises' ability to respond to cybersecurity attacks has recorded the biggest jump to date, up by 5.8 points from last year to 52.8. 442 companies were measured under the "Hong Kong Enterprise Cyber Security Readiness Index" compiled by the Hong Kong Productivity Council (HKPC) and the Office of the Privacy Commissioner…
  continue reading
 
US charges Scattered Spider members Chinese threat actors infiltrate more telcos Apple issues emergency security update Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, default-de…
  continue reading
 
Simple misconfiguration can often lead to disaster, and sometimes that disaster is a threat actor sneakily taking over your trusted website and using it to host malware, send phishing emails, or control botnets. Here's a surprisingly easily exploited DNS oversight that has allowed threat actors to take over 70,000 websites. Sources: https://pastebi…
  continue reading
 
Cybersecurity Today: GitHub Attacks & Microsoft's November Patch Tuesday Updates In this episode of Cybersecurity Today, host Jim Love highlights critical cybersecurity updates. The episode covers malicious attacks on GitHub projects, including an orchestrated attempt to frame Texas-based security researcher Mike Bell, and the associated impact on …
  continue reading
 
In Episode 123 of Reimagining Cyber, Rob and the team dives into the complex world of cybersecurity for Industrial Control Systems (ICS) and Operational Technology (OT). Reflecting on insights from recent conversations with industry experts like Eric O'Neill and Tiffany Snyder, the show explores the evolving risks, vulnerabilities, and essential se…
  continue reading
 
In this episode of the Cyber Uncut podcast, Dawn Cappelli, head of OT-CERT at Dragos, joins host Liam Garman to unpack how governments and the industry are responding to current and emerging ICS/OT threats. The pair begin the podcast by examining how operational technology is becoming more interconnected with the digital world and what emerging vul…
  continue reading
 
Send us a text AI-powered Email Attacks? Learn How an Ad Tech Mindset Can Secure Your Business Facing complex email threats and AI-driven attacks? Discover how an Ad Tech approach using behavioural analytics can help you protect against evolving cyber threats. ⬇️ With businesses facing increasingly sophisticated email security challenges, attackers…
  continue reading
 
On this episode of the podcast, I cover a multiple issues caused by recent Windows Updates, thankfully some are caused by preview updates, I also get into some new features and upcoming features announced by Microsoft, a worrying vulnerability disclosed by Okta and much more!Reference Links:https://www.rorymon.com/blog/win10-esu-for-consumers-app-a…
  continue reading
 
In this episode, Zed talks with Aaron Painter, CEO of Nametag, about the rising threat of cyber attacks targeting healthcare practices. Learn why private medical practices are increasingly vulnerable and what steps you can take to protect your practice from identity-related threats, ransomware, and more. Discover how cybersecurity isn't just about …
  continue reading
 
What causes the largest global blackouts, and how can we prevent them in the future? In this episode, we explore some of the most significant power outages in history, such as India's 2012 blackout, which affected 620 million people, and Brazil's 1999 grid failure. We examine the underlying causes, from infrastructure challenges to unpredictable na…
  continue reading
 
In this episode of the Strategy with Jason Podcast, Jason sits down with Adam Furlough from Advent Resources to dive into the current state of sales processes and data in the automotive industry. They tackle how to streamlining your sales process, data entry efficiency, transparency, preparing for cyber attacks and more!For more info on Advent Reso…
  continue reading
 
In this episode of the Cyber Uncut podcast, Genetec’s Asia-Pacific sales engineering and services manager, Lee Shelford, joins host Liam Garman to discuss the world of physical security and how Genetec’s software-as-a-service (SaaS) solution is keeping public and private organisations safe. The podcast begins analysing the evolution of physical sec…
  continue reading
 
Cyberport CEO Rocky Cheng said on Thursday that the park was well-positioned for low-altitude flying trials with its ample space and a pier, adding that there were plans to set up a landing port for test flights. As a venue partner for sandbox pilot projects for developing low-altitude economy, Cyberport will provide suitable locations and supporti…
  continue reading
 
In this episode I do a comprehensive review of many of the announcements from Microsoft Ignite, I discuss a malvertising campaign targeting Bitwarden customers, a potential FTC investigation and much more!Reference Links:https://www.rorymon.com/blog/microsoft-ignite-announcements-app-v-deprecation-change-starlink-sold-out/…
  continue reading
 
An Australian teenager died on Thursday after drinking alcohol contaminated with methanol in Laos, Thai police and Australian Prime Minister Anthony Albanese said, the fourth foreign national now suspected to have died in the incident. Bianca Jones, 19, fell ill last week in Vang Vieng, a town in the Southeast Asian nation popular with foreign back…
  continue reading
 
A piece of conceptual art consisting of a simple banana, duct-taped to a wall, sold for US$6.2 million at an auction in New York on Wednesday, with the winning bid coming from a prominent cryptocurrency entrepreneur. "Comedian," by Italian artist Maurizio Cattelan, was a phenomenon when it debuted in 2019 at Art Basel Miami Beach, as festivalgoers …
  continue reading
 
Host Paul Roberts interviews Sophos CISO Ross McKerchar about the company's recent report, Pacific Rim, detailing its multi-year battle to beat back a sophisticated Chinese hacking campaign. The post Pacific Rim: Sophos’ 6 Year Battle To Beat Back China State Hackers appeared first on The Security Ledger with Paul F. Roberts.…
  continue reading
 
In this engaging episode of Life of a CISO, Dr. Eric Cole challenges listeners to rethink their relationship with cybersecurity. Whether you’re a seasoned Chief Information Security Officer (CISO), aspiring to the role, or simply working in cybersecurity, the question is: do you like it, love it, or can’t live without it? Dr. Cole emphasizes that t…
  continue reading
 
In this episode, we dive deep into the world of ransomware with two of 2024's most talked-about threats: Phobos and Helldown. Learn how the Phobos ransomware operation managed to dominate 11% of the market, generating $16 million in ransom payments, and the shocking details of its admin’s extradition to the U.S. We also explore the rise of Helldown…
  continue reading
 
Minimising the risks to your security posture from developers’ reliance on GenAI Using AI to speed up remediation and avoid security becoming the bottleneck Steps to ensure safe and secure implementation of GenAI in software development This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Lee Munson, Principal Research…
  continue reading
 
Highest Paid Skills in Cyber Security In this episode of Cybersecurity Diaries, Nathan from Station X discusses the top cybersecurity skills that can significantly increase your salary. Starting from operational skills and moving up to high-demand areas such as AI and ML security, incident response, and risk management, Nathan details the salary ra…
  continue reading
 
Two of the nation's navy battleships, a destroyer and an amphibious assault ship, arrived in Hong Kong on Thursday for a five-day visit. Members of the public can board the vessels for a look around. The Changsha and the Hainan were greeted by boats from the Fire Services Department, with the Hainan moored at China Merchants Wharf in Western. Soldi…
  continue reading
 
A senior Beijing official has stressed that Hong Kong is playing a larger part in the Belt and Road Initiative, saying the city's dispute resolution mechanism and an abundance of legal professionals provide services under the country's infrastructure development plan. Liu Guangyuan, a deputy director of Beijing's liaison office, on Thursday said th…
  continue reading
 
President Xi Jinping has called for "more voices" to end the Ukraine war and a ceasefire in Gaza, as he conducted a state visit to Brazil's capital. Xinhua news agency said Xi wanted to see "more voices committed to peace to pave the way for a political solution to the Ukraine crisis" and "a ceasefire and an end to the war at an early date" in Gaza…
  continue reading
 
From a small town in America to China's Wudang Mountains, Tai Chi master Jake Pinnick says he finds artificial intelligence increasingly useful for teaching kung fu and translating traditional Chinese texts. The martial arts practitioner from Illinois, who has lived in China since 2010, is the 16th-generation disciple of the Wudang San Feng lineage…
  continue reading
 
In this episode of the Contested Ground podcast, shadow minister for communications and federal member for Banks David Coleman joins host Liam Garman to discuss the recent misinformation bill that will leave free speech and political discourse in Australia. They begin the podcast with a recap of what’s in the bill, including how the government will…
  continue reading
 
Welcome to this episode of Learning Through Technology. Today, we’re doing something different. Alex was recently invited to feature a guest on the School Leaders Project podcast by its host, Cindy Blackburn, who is the Director at Toddle. Let’s join Alex and Cindy as they explore the intersection of education and technology, focusing on collaborat…
  continue reading
 
Treating your private practice like a patient may be holding back your growth. Many physician business owners fall into the “quick fix” mindset when facing practice challenges, but in this episode, Zed explains why sustainable success requires a different approach. By shifting from a “fix-it” mentality to a systems-thinking approach, physicians can…
  continue reading
 
The Sports Federation & Olympic Committee (SF&OC) of Hong Kong, China on Wednesday said member associations that fail to meet new standards in terms of governance and operation may face penalties such as subsidy cuts. The body launched a review of the governance and operation of 77 sports associations following a 2020 audit report. It said the revi…
  continue reading
 
The government on Wednesday unveiled the development outline for the Hong Kong section of the Hetao Shenzhen-Hong Kong Science and Technology Innovation Cooperation Zone, with the gross floor area in phase one doubling from what was initially planned. The tech zone stretches across the Shenzhen River, covering 302 hectares in Shenzhen and 87 hectar…
  continue reading
 
CISA director Jen Easterly to step down Space tech giant Maxar discloses employee data breach Microsoft launches Zero Day Quest hacking event Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a…
  continue reading
 
Cybersecurity Today: Microsoft Updates, Gen AI Risks, and Liminal Panda Threat In this episode of Cybersecurity Today, host Jim Love discusses major cybersecurity updates from Microsoft's Ignite conference, including enhancements to Windows security and device recovery. A survey by LegitSecurity highlights the security risks associated with generat…
  continue reading
 
How Microsoft lured the US Government into a far deeper and expensive dependency upon its cybersecurity solutions. Gmail to offer native throwaway email aliases like Apple and Mozilla. Russia to ban several additional hosting companies and give its big Internet disconnect switch another test. Russia uses a diabolical Windows flaw to attack Ukrainia…
  continue reading
 
The police on Wednesday were investigating a suspected criminal damage case outside Central Government Offices. At around 8.30am, a security patrol found red paint covering an area of three metres by two metres around a planter pot near Harcourt Road. The government strongly condemned the incident, saying the police will thoroughly investigate and …
  continue reading
 
The World Internet Conference officially got underway in Wuzhen of Zhejiang province on Wednesday, with President Xi Jinping calling for faster innovative and secure development of cyberspace to create a better digital future. This year's Wuzhen summit — the country's biggest internet forum — focuses on artificial intelligence and its impact on hum…
  continue reading
 
Artificial intelligence is playing a bigger role in peacekeeping with real-time AI translation making it easier for nations to communicate, says Unesco’s chair in AI and data science for society. Professor Lampros Stergioulas, who is attending the World Internet Conference in Wuzhen, says he hopes this year’s summit can address both the benefits an…
  continue reading
 
In this week’s episode of Reimagining Cyber, host Rob Aragao (live from Las Vegas!) dives into the convergence of identity security and data protection—a critical topic reshaping the cybersecurity landscape. Rob unpacks the key drivers behind this shift, including regulatory mandates like GDPR and CCPA. The conversation emphasizes the need for orga…
  continue reading
 
As protests against lithium mining intensify across Serbia, fears of environmental damage and distrust in government accountability are uniting citizens like never before. Could this rare unity spark broader democratic change? In this episode of #BalkansDebrief, Resident Senior Fellow Ilva Tare explores the roots of this resistance with Ivanka Popo…
  continue reading
 
With the grid getting cleaner, is onsite energy still worth considering? As businesses look for the most cost-efficient solutions, it's tempting to think the answer is no. But the reality is far more complex. In this episode, we dive deep into this question and share some surprising findings about the state of the grid and carbon intensity across t…
  continue reading
 
Loading …

Quick Reference Guide