Cyber Security offentlig
[search 0]
Mer

Download the App!

show episodes
 
Do boards and business leaders understand the risks? Is security improving, barely keeping up with threats, or falling painfully behind? And more importantly, if what kept us secure has stopped working, what do we need to do to fix it? Join host Brian Contos and his guests as they explore these questions on The Cybersecurity Effectiveness Podcast.
 
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
 
Task Force 7 Radio is the Voice of Cyber Security around the globe. We feature up to date insights and analysis by preeminent cyber security professionals on the most important cyber security issues affecting your life today. Although the world of cyber security can be complex, our focus is to explain highly technical subject matter in non-technical terms. We cover topics that are of vital interest to the cyber security expert yet also will appeal to the novice interested in learning more ab ...
 
Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy to understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
 
There is often a lot happening in the world of cyber security: new threats, new exploits and new products. Don’t get us wrong, there is a lot of cool technology, and we appreciate that. But, at least on the surface, a lot of the defensive advances look to be very bottom up and technology focused. It is easy to lose sight of the context, what matters to us that we want to protect, and yes even enable. Join us as we get together for unscripted conversations about a broad range of topics and re ...
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
(CS)²AI is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 20,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education and directly support cyber security professional development in every way. Founder, Derek Harp interviews the Cybersecurity leaders and brings relevant insights to help any company ...
 
Listen to weekly round up of interesting cyber security stories from across the globe. Each podcast delves deeper into a particular story revealing insights and the often unheard story to listeners. The show is hosted by Mansi Kapur, business journalist with Fortune and Jose Varghese, cyber security entrepreneur and geek with Paladion.
 
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
 
National Cyber Security, the only "Daily" Cyber Security news show in the world. The show is has been designed for the laymen person who may not be technical, but also informative enough for all of the computer geeks of the world. Think of it like the CNN Headline News of Cyber Security Our daily news includes the latest news in hacking, id theft, IT Jobs, Government Security, Risk Management and 60+ other categories. Execute Produced by one of the worlds most known and respected Ex-hacker G ...
 
We know it can be challenging to secure your business, especially when you have limited time. The Get Cyber Resilient Show, brought to you by Mimecast, is the perfect way to stay up-to-date with the latest cyber developments across Australia and New Zealand. From cyber security to cyber awareness, your hosts Daniel McDermott and Garrett O'Hara will bring you insights and real stories from IT and Security Leaders, just like you. Don’t get angry at downtime and data breaches, Get Cyber Resilient!
 
Cyber Security can be a difficult field to not only understand but to also navigate. Derrick and Joe are here to help with over 20 years of combined experience. With this podcast we hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
 
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
 
Local business personalities on their successes, strengths, and perseverance in the marketplace to empower, inform and encourage the 80% of American micro to small businesses that tend to be family owned of 9 employees or less. Shows cover topics on business coaching, networking, health and fitness, criminal justice, cyber security, money, and veteran spotlights.
 
Welcome to the Cyber Coalface a fortnightly Purple Team Cyber Podcast covering the whole cyber threat, hosted by myself David Tyler and JayJay Davey two UK Military Veterans who ended up in Cyber Security.Join us today as we cover aspects affecting Cyber Security from the perspective of a Red Teamer and Blue Teamer. This podcast is ideal for anyone in the Cyber or Infosec field, come and listen to those on the Cyber front lines!
 
Application Security Weekly decrypts development for the Security Professional - exploring how to inject security into their organization’s Software Development Lifecycle (SDLC) in a fluid and transparent way; Learn the tools, techniques, and processes necessary to move at the speed of DevOps (even if you aren’t a DevOps shop yet). The target audience for Application Security Weekly spans the gamut of Security Engineers and Practitioners that need to level-up their skills in the Application ...
 
Drew Green (pentester and IT manager) and Sam Blevins (IT manager and security enthusiast) meet weekly to discuss the latest in security news, penetration testing, defensive security, best practices, hacking, and more. A podcast devoted to all aspects of information security, in a way that non-security pros can understand. Security TL;DR is sponsored by G-Factor Security, a security services firm headquartered in Raleigh, NC.
 
Application Security Weekly decrypts development for the Security Professional - exploring how to inject security into their organization’s Software Development Lifecycle (SDLC) in a fluid and transparent way; Learn the tools, techniques, and processes necessary to move at the speed of DevOps (even if you aren’t a DevOps shop yet). The target audience for Application Security Weekly spans the gamut of Security Engineers and Practitioners that need to level-up their skills in the Application ...
 
Loading …
show series
 
Colonial Pipeline makes ransom payment of nearly $5 million Biden signs executive order to bolster federal cyber defenses Apple failed to disclose security incident affecting millions of users Thanks to our episode sponsor, Altitude Networks Wouldn’t it be great if you could INSTANTLY KNOW if a file containing sensitive information was shared in th…
 
Cross Browser Tracking with Schemeflood https://fingerprintjs.com/blog/external-protocol-flooding/ Cisco AnyConnect Secure Mobility Client Patch https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK MSBuild Abused By Attackers https://www.anomali.com/blog/threat-actors-use-msbuild-to-deliver-rats-fil…
 
Interview by Jane Lo, Singapore Correspondent with Dr. Herbert Lin, Senior research scholar, Cyber Policy and Security, Center for International Security and Cooperation; Hank J. Holland Fellow, Cyber Policy and Security, Hoover Institution; and Elected Fellow, American Association for the Advancement of Science. In addition to his positions at Sta…
 
One of the most respected Cyber Security Professionals in the world and Former CISO of Mass Mutual, Aetna, KPMG, DTCC, and American Express, Mr. James Routh appears on Episode #179 of Task Force 7 Radio to break down what companies should be doing to defend themselves against supply chain attacks and how CISO's should be thinking about their DevOps…
 
On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien discuss some research we have recently been working on at Symantec. First, we discuss a blog we published this week, which looks at multi-factor authentication and how it has become a headache for malicious actors, leading them to adopt new attack techniques in an attempt…
 
In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. The post Seeds of Destruction: Cyber Risk Is Growing in A…
 
The role of a chief information security officer demands technical knowledge, but it also requires soft skills of leading and influencing - especially over the past year as cybersecurity has grown in visibility for companies. So how can CISOs get their security message across to boards, the business, employees and the security team? Joining Janne a…
 
Sam Stephanyan is an independent applications security consultant and Chapter Leader of OWASP London. Sam explains the history and purpose of OWASP (The Open Web Application Security Project), a non-profit that outlines the Top 10 security concerns. Francesco and Sam also discuss Nettacker, virtual hackathons and meetups, and the various ways to ex…
 
My client is looking for an experienced Cloud Sales Exec, based in anywhere in Germany. Ideal would be if you know Cyber Security market, but not a must. Targeting top customers in DACH for Cloud solutions, defining a target list and generating a pipeline directly with those customers. Developing territory sales and marketing plans to drive revenue…
 
Podcast Information Hosted by Dominique, Security in Color is a platform aimed at making cybersecurity accessible to everyone. You can look forward to episodes discussing cybersecurity news, topics, and career resources. Episode Information This week on Security in Color: We're discussing the recent #ransomware attack on Colonial Pipelines and the …
 
Cross Browser Tracking; Cisco AnyConnect Patch; MSBuild Abuse Cross Browser Tracking with Schemeflood https://fingerprintjs.com/blog/external-protocol-flooding/ Cisco AnyConnect Secure Mobility Client Patch https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK MSBuild Abused By Attackers https://www.…
 
Relationship Master Paul Russo talks with Power of a Positive Playlist Podcast Host and Music Therapist John Chester about our relationship with music. Enjoy this great conversation that reveals the deeper attachment we have with music through the experiences of our lives. Long time friends Paul and John make this podcast fun and informative for pe…
 
FBI warns of phishing sites using search ads Researcher finds WiFi vulnerable to “frag attacks” Data transfer demonstrated on Apple’s Find My network Thanks to our episode sponsor, Altitude Networks Imagine an employee just left and went to a competitor: did they take proprietary documents or critical roadmaps with them? Did they add a backdoor acc…
 
News of business impacts from the realisation of cyber risks is all around us. Many of the largest breaches in recent years have involved one or more suppliers in some way. Few will be unaware of Sunburst/Solorigate, and many will have been directly impacted or know people that have been. But it is not just your direct suppliers, or your technology…
 
Number of industrial control systems on the internet is lower then in 2020...but still far from zero https://isc.sans.edu/forums/diary/Number+of+industrial+control+systems+on+the+internet+is+lower+then+in+2020but+still+far+from+zero/27412/ Webcast: Ransoming Critical Infrastructure https://www.sans.org/webcasts/119775 Links to FragAttacks Vendor Bu…
 
When death and grief grip a family due to loss, the strain on the family and local business can result in significant emotional damage, and children have special considerations. When we provide an environment for healing that meets them where they are, the outcome can be completely different. In this episode of Big Ideas, Small Business TV with Dor…
 
Exposed ICS Trending Lower; FragAttack Vendor Bulletins; Adobe Acrobat 0Day Number of industrial control systems on the internet is lower then in 2020...but still far from zero https://isc.sans.edu/forums/diary/Number+of+industrial+control+systems+on+the+internet+is+lower+then+in+2020but+still+far+from+zero/27412/ Webcast: Ransoming Critical Infras…
 
Coach Rick Kolster talks with The Health Engineer's Clint Fuqua about firearms training, and makes the case for bodily defense through health FIRST. What good is any strategic or safety training if our bodies are unable to rise to the task? For 18 years, Rick has led the Peer Performance Group (http://www.mypotentialplus.com/), focused on leading l…
 
It's a question we get all the time - "what can I do to be more secure?" It's also a question that there's not a great concise answer to. That being said, we did our best to boil down the hottest tips that we have for keeping your personal things and data secure. From password managers to multi-factor authentication, from browser plugins to downloa…
 
U.S. declares emergency in 17 states over fuel pipeline cyber attack Japanese manufacturer Yamabiko targeted by Babuk ransomware Microsoft May 2021 Patch Tuesday fixes 55 flaws, 3 zero-days Thanks to our episode sponsor, Altitude Networks Imagine an employee just left and went to a competitor: did they take proprietary documents or critical roadmap…
 
MSFT Patch Tuesday (http.sys!!); WiFi Fragmentation/Aggregation Attacks Microsoft Patch Tuesday https://isc.sans.edu/forums/diary/Microsoft+May+2021+Patch+Tuesday/27408 WiFi Fragmentation Attacks https://www.fragattacks.com keywords: wifi; aggregated frames; fragmentation; microsoft; patch tuesday; http.sys…
 
This Week in the AppSec News, Mike and John talk: "Find My threat model" with AirTags, Qualcomm modem vuln hits lots of Android, an Exim update patches lots of vulns, measuring hardened binaries, a maturity model for k8s, & more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw150…
 
While the vision for app security is relatively clear, executing on that vision is still somewhat of a work in progress. Fast-moving, interdependent pieces—custom code and open source packages, infrastructure and network configurations, user entitlements—make for complex systems. In this episode, we discuss the challenge in addressing each piece in…
 
Darkside behind the Colonial Pipeline attack Insurance provider ends ransomware reimbursement Tor exit nodes plagued by malware Thanks to our episode sponsor, Altitude Networks Uh oh, Johnny left the company 6 months ago, but still has access to numerous files in Google Drive via his personal account! Do you know how many other former employees and…
 
Validating IP Addresses: Why Encoding Matters https://isc.sans.edu/forums/diary/Correctly+Validating+IP+Addresses+Why+encoding+matters+for+input+validation/27404/ Jail Breaking AirTags https://twitter.com/ghidraninja/status/1391148503196438529 Malicious Tor Exit Relay Activities https://nusenu.medium.com/tracking-one-year-of-malicious-tor-exit-rela…
 
Validating IP Addresses; Jailbreaking AirTags; Malicious Tor Exit Nodes Validating IP Addresses: Why Encoding Matters https://isc.sans.edu/forums/diary/Correctly+Validating+IP+Addresses+Why+encoding+matters+for+input+validation/27404/ Jail Breaking AirTags https://twitter.com/ghidraninja/status/1391148503196438529 Malicious Tor Exit Relay Activitie…
 
While the vision for app security is relatively clear, executing on that vision is still somewhat of a work in progress. Fast-moving, interdependent pieces—custom code and open source packages, infrastructure and network configurations, user entitlements—make for complex systems. In this episode, we discuss the challenge in addressing each piece in…
 
On today's show, host Shawn Murray talks with EJ Hilbert, former FBI agent, to discuss the development of the cybersecurity world from its beginnings. EJ Hilbert's career in the FBI started before the cyber division was created in 2002 and left the FBI in 2007. Listen in as we discuss Hilbert's carrier in the scope of the ever-changing cyber world …
 
In our latest cyber news update we take a closer look at the hack that resulted in what hackers claimed was access to ‘tens of thousands’ of SIM cards that included ‘financial information, contracts and banking information’. We also discuss the proposed Australian cyber curriculum for kids aged 5 years and up, how cybercriminals are using Google se…
 
Loading …

Hurtigreferanseguide

Copyright 2021 | Sitemap | Personvern | Vilkår for bruk
Google login Twitter login Classic login