Cy público
[search 0]
Más
Download the App!
show episodes
 
疲惫娇娃是一档从荧幕聊到宇宙深处的泛文化播客,用女性的声波延展对世界的参与和想象。 在一个内陷的时代,疲惫娇娃站在中国和美国的交汇点上,用女性的元视角去观察、抵抗、塑造政治和社会对流行文化的影响。我们讨论流动的时代精神、艺术、自由、未来、友谊以及一切使我们获得力量的事物。
  continue reading
 
Artwork

1
Cyber Leaders

SANS Institute

Unsubscribe
Unsubscribe
Semanalmente
 
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
  continue reading
 
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
  continue reading
 
Artwork
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork

1
CyberSound™

CyberSound Podcast by Vancord

Unsubscribe
Unsubscribe
Mensual+
 
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
  continue reading
 
Artwork
 
Your Favorite Existentialist-Anarchist Internet BadassCommentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
  continue reading
 
Το Podcast τροφή για το μυαλό σου: συμβουλές για την ζωή στο εξωτερικό, εμπειρίες, συζητήσεις για εκπαίδευση, εργασία και επιχειρείν. Προσθέστε βιβλία και κόμικ.
  continue reading
 
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. brad@securit360.com
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

Unsubscribe
Unsubscribe
Semanalmente+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with CyberRes, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.
  continue reading
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Comedians and Friends Chad Daniels and Cy Amundson host a weekly podcast where they tell stories about their lives. For advertising opportunities please email PodcastPartnerships@Studio71us.com We wanna make the podcast even better, help us learn how we can: https://bit.ly/2EcYbu4 Privacy Policy: https://www.studio71.com/us/terms-and-conditions-use/#Privacy%20Policy
  continue reading
 
Artwork

1
C.S. Cyber

Shawn Waldman and Chad Robinson

Unsubscribe
Unsubscribe
Mensual+
 
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
  continue reading
 
Artwork
 
Cyberpunk Cinema is the definitive dive into the dark future of science fiction. I will be breaking-down one film per week that best represents the thematic signatures of cyberpunk. So, do me a favor - it's time to access your cranial jacks, boot up your Ono Sendai Cyberspace 7, and slap on your damn mirrorshades! Join me as I take you through the matrix that is Cyberpunk Cinema!
  continue reading
 
Artwork

1
Cyber Inspiration

Evgeniy Kharam and Security Architecture

Unsubscribe
Unsubscribe
Mensual+
 
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
THEOS Cybernova

Theos CyberNova

Unsubscribe
Unsubscribe
Semanalmente+
 
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
  continue reading
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Artwork

1
Cyber Defense Radio

Cyber Defense Magazine

Unsubscribe
Unsubscribe
Mensual+
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
Dark Future Dice is an actual play podcast in which Titus, Lindsay and Sloane delve into the dystopian worlds of Cyberpunk 2020 and Red, weaving narratives that deal with trauma, human connection, and marginalization within an unforgiving dark future. Available on: Spotify: https://spoti.fi/2SG0xtn Apple: https://apple.co/39Fij5M Patreon: https://www.patreon.com/rocketadrift
  continue reading
 
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email spollock@mcdonaldhopkins.com
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

Unsubscribe
Unsubscribe
Mensual
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: info@4s-ag.de https://www.4s-ag.de
  continue reading
 
Artwork

1
Cyber Focus

The McCrary Institute

Unsubscribe
Unsubscribe
Semanalmente
 
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

Unsubscribe
Unsubscribe
Mensual
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
  continue reading
 
Loading …
show series
 
In this episode of The Cy Amundson Show, it's been a frantic week of NFL action as the playoff field is officially down to four teams and head coaching jobs are being filled at a rapid pace... let's dig into all of it! SPORTS! ------------- The Cy Amundson Show (@cyamundsonshow) is one of the best sports comedy podcasts around with Cy Amundson (@cy…
  continue reading
 
This week, Chad plays detective and Cy's toddler finds his sex toys. Head on over to Chad's YouTube page to watch this episode! AND go see Cy & Chad on the road! This episode is brought to you by BirdDogs! Get a completely free hat @birddogs with code SOMEWHERE at https://www.birddogs.com/SOMEWHERE! This episode is also brought to you by Hims! --- …
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Shaun Marion, vp, CSO, Xcel Energy Thanks to our show sponsor, Vanta Do you know the status of your compliance controls right now? Like…right now? We know that real-time visibility is critical for security, but when it comes to our GR…
  continue reading
 
נחשון פינקו מדבר על "פיגיטל", העתיד של מיזוג פיזי עם דיגיטל. אילו גורמים מובילים תעשיות וספקים בכיוון זה היכן ומתי היא תפגוש מומחי סייבר ותפעול רמה טכנית - 100 (קלה) Nachshon Pincu talks about The future of blending physical with digital. What factors lead industries and vendors in this direction? Where and when will it meet cyber and operational e…
  continue reading
 
Chen Gruber, software developer Embedded Security @CheckPoint about Firmware Security What can hackers learn by extracting data from the file system of the loT Device? Binary scan and static analysis on firmware can give valuable insights into your device and expose the hidden vulnerabilities and weaknesses before hackers find them. In this session…
  continue reading
 
In this episode, Spencer and Brad discuss the ever popular and highly debated topic of evasion. In this podcast we talk about evasion from the context of evading defense controls, not necessarily EDR specific evasion techniques. Our hope with this episode is to shed light on this topic and help defenders understand various methods of evasion and th…
  continue reading
 
Cybersecurity Today: Stolen Credentials, Firewall Leaks, and Energy Sector Risks In this episode of Cybersecurity Today, host Jim Love discusses the alarming sale of thousands of credentials from leading cybersecurity vendors on the dark web, a massive leak of FortiGate firewall configuration files impacting nearly 5,000 organizations, and a major …
  continue reading
 
TSA cyber chief David Pekoske ousted by new administration CISOs gain boardroom traction Influence but still lack soft skills, says Splunk Cisco Fixes vulnerability in Meeting Management Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for…
  continue reading
 
The world of cybersecurity has been rocked by a data breach so colossal that it's being called the Biggest Data Breach in Modern History. The National Public Data breach and hacker USDoD are discussed in a true cyber crime story. The biggest data breach in modern history, involving National Public Data and its sister site Records Check. The breach …
  continue reading
 
In today's episode, learn how an attacker attempted to exploit webmail XSS vulnerablities against us. Sonicwall released a critical patch fixing an already exploited vulnerability in its SMA 1000 appliance. Cisco fixed vulnerabilities in ClamAV and its Meeting Manager REST API. Learn from SANS.edu student Anthony Russo how to take advantage of AI f…
  continue reading
 
This episode explains Cyber Essentials, a UK government-backed scheme that helps charities protect themselves against common cyber attacks. Trustees and leaders are responsible for ensuring their charity's IT systems and data are secure. This is essential for maintaining public trust, protecting beneficiaries, and securing funding. Cyber Essentials…
  continue reading
 
Welcome to episode three of our NIST 800-171 series ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/alerts/ to subscribe. ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @secdef…
  continue reading
 
In this episode, we sit down with Adar Weinreb, founder of Sulha, to explore the roots of the Israeli-Palestinian conflict and discuss alternative governance models beyond the nation-state. From the failures of partition to federal and confederal solutions like the Federation Plan, we delve into how decentralized frameworks could address the challe…
  continue reading
 
Max Harley's journey into cybersecurity began unexpectedly with a childhood passion for video games, which sparked a deeper interest in programming and security. His competitive spirit emerged through capture-the-flag competitions, leading him to impactful roles at SpecterOps and Prelude, emphasizing mentorship, networking, and continuous learning …
  continue reading
 
Trump administration fires members of cybersecurity review board in ‘horribly shortsighted’ decision Major Cybersecurity Vendors' Credentials Found on Dark Web PowerSchool hacker claims they stole data of 62 million students Thanks to today’s episode sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We k…
  continue reading
 
Have you ever wondered why cyber attacks are not all equal? Why some of the most significant data breaches in history didn't lead to your personal information being sold on the dark web? When Data Breaches Are Really Espionage? Why did the stolen data from breaches like Anthem, Starwood/Marriott, OPM, and Equifax vanish into the ether, while other …
  continue reading
 
In today's episode, we start by talking about the PFSYNC protocol used to synchronize firewall states to support failover. Oracle released it's quarterly critical patch update. ESET is reporting about a critical VPN supply chain attack and CISA released guidance for victims of recent Ivanti related attacks. Catching CARP: Fishing for Firewall State…
  continue reading
 
In This Episode Matt Huff shares his remarkable journey from factory work to becoming the CIO of Tanner LLC, one of the premier accounting firms in Utah. Matt discusses how Tanner has embraced cybersecurity as a core offering, providing services such as SOC 2 compliance, ISO 27001 audits, and penetration testing. He explains how his pragmatic appro…
  continue reading
 
In this episode, Reimagining Cyber's Rob Aragao dives into the World Economic Forum's recently released Cybersecurity Outlook for 2025. Key areas highlighted include the impact of geopolitical tensions on cyber espionage, the persistent threat of ransomware, the dual role of AI in bolstering cybersecurity and amplifying cyber attacks, and the ongoi…
  continue reading
 
Episode 7, Series 1: "Embracing Life with Wisdom & Compassion" Featuring: Tenzin Wangyal Rinpoche Join Tenzin Wangyal Rinpoche for a live online teaching as we begin Month 4 of his yearlong program, “Embracing Life with Wisdom & Compassion.” Free and open to all! Our focus this month is on meeting any sense of attachment we may experience in our bo…
  continue reading
 
Overview: In this episode of Cyber Focus, host Frank Cilluffo interviews Errol Weiss, Chief Security Officer at the Health Information Sharing and Analysis Center (Health ISAC). They discuss the evolving cybersecurity challenges in the healthcare sector, including ransomware, supply chain vulnerabilities, and the critical need for better security m…
  continue reading
 
Critical Cybersecurity Updates: Avery Data Breach, Hamilton Ransomware Attack, and Microsoft Outlook Patch In this episode of Cybersecurity Today, host Jim Love covers significant cybersecurity incidents and updates. Avery experiences a massive data breach affecting 61,000 customers due to a credit card skimmer. The city of Hamilton commits $52 mil…
  continue reading
 
7-Zip flaw bypasses Windows security warnings Attackers impersonate Ukraine’s CERT-UA AI Executive Order revoked Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time …
  continue reading
 
In the lead up to Zero Trust World 2025 we speak with Rob Allen, Chief Product Officer, ThreatLocker. ThreatLocker protects endpoints and data from zero-day malware, ransomware, and other malicious software, and provides solutions for easy onboarding, management, and eliminates the lengthy approval processes of traditional solutions. Visit https://…
  continue reading
 
THEOS Cybernova Ep.4 - Nigel Phair: The View from Down Under What makes Australia's cybersecurity landscape unique? In this thought-provoking episode of THEOS Cybernova, host Paul Jackson sits down with Nigel Phair, a former law enforcement professional turned academic, industry advisor, and bestselling author of five books. Paul and Nigel explore …
  continue reading
 
This episodes covers how Starlink users can be geolocated and how Cloudflare may help deanonymize users. The increased use of AI helpers leads to leaking data via careless prompts. Geolocation and Starlink https://isc.sans.edu/diary/Geolocation%20and%20Starlink/31612 Discover the potential geolocation risks associated with Starlink and how they mig…
  continue reading
 
In this episode of Cyber Talks, Tia Hopkins, Chief Cyber Resilience Officer & Field CTO at eSentire, and Roselle Safran, Founder & CEO at KeyCaliber, discuss the evolution of Continuous Threat Exposure Management (CTEM) and its role in modern cybersecurity. They explore the practical application of CTEM, its benefits for business context in securit…
  continue reading
 
In this episode, we sit down with Rajan Kapoor, Field CISO of Material Security, to discuss the security risks and shortcomings of native cloud workspace security offerings and the role of modern platforms for email security, data governance, and posture management. Email and Cloud Collaboration Workspace Security continues to be one of the most pe…
  continue reading
 
While cybercriminals can (and do) infiltrate organizations by exploiting software vulnerabilities and launching brute force attacks, the most direct—and often the most effective—route is via the inbox. As the front door of an enterprise and the gateway upon which employees rely to do their jobs, the inbox represents an ideal access point for attack…
  continue reading
 
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Lalit Ahluwalia, CEO and Founder of DigitalXForce, https://digitalxforce.com/, who delivers the Digital Trust Platform integrating Security Privacy Posture Management and Risk Compliance. DigitalXForce enterprise security and risk posture management surpas…
  continue reading
 
In this episode of Cyberside Chats, we explore the FBI’s daring takedown of PlugX malware. By commandeering the malware’s command-and-control infrastructure, the FBI forced PlugX to uninstall itself from over 4,200 devices globally. This bold move echoes similar actions from 2021, such as the removal of malicious web shells from Exchange servers. W…
  continue reading
 
HPE investigates breach claims Former CIA analyst pleads guilty to sharing Top Secret files Data of nearly half million hotel guests exposed Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC progra…
  continue reading
 
In this episode, we talk about downloading and analyzing partial ZIP files, how legitimate remote access tools are used in recent compromises and how a research found an SSRF vulnerability in Azure DevOps Partial ZIP File Downloads A closer look at how attackers are leveraging partial ZIP file downloads to bypass file verification systems and plant…
  continue reading
 
“Another day, another data breach.” In this episode of the Defensive Security Podcast, Jerry Bell and Andrew Kalat discuss a significant data breach affecting hotel reservation data, regulatory actions taken against GoDaddy for poor security practices, and the evolving landscape of cyber attacks. They emphasize the importance of proactive defense s…
  continue reading
 
Cybersecurity Today: Sneaky 2FA Phishing Attack & AI-Powered Scams In this episode of Cybersecurity Today, host Jim Love explores the emergence of Sneaky 2FA, a new phishing-as-a-service attack that compromises two-factor authentication for Microsoft 365 users. The episode also covers a legal case where a scam led a Western Australian company to lo…
  continue reading
 
Tik Tok is back, with strings attached Noem promises to curtail CISA Label company Avery announces data breach Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time ch…
  continue reading
 
Group-IB has released a fascinating case investigation on deep fake fraud. Group-IB’s Fraud Protection team published a report on how threat actors use deepfake technology to bypass biometric security in financial institutions, including facial recognition and liveness detection. It also details how they recently assisted a major Indonesian financi…
  continue reading
 
In this episode, we cover how to use honeypot data to keep your offensive infrastructure alive longer, three critical vulnerabilities in SimpleHelp that must be patched now, and an interesting vulnerability affecting many systems allowing UEFI Secure Boot bypass. Leveraging Honeypot Data for Offensive Security Operations [Guest Diary] A recent gues…
  continue reading
 
The US has signed into new law the Ban of Tik Tok which took effect today and now is on hold pending a sale in the next 90-days. What does this mean? Covering: latest news on tik tok ban, latest on tik tok ban, latest tik tok ban, latest tik tok ban news in us, TikTok ban in US latest news, TikTok ban in USA latest news, TikTok banned in us, TikTok…
  continue reading
 
Ron Sharon, a well-known cybersecurity & IT leader having served at such great companies as CANNON, LA Clippers, Universal Music, Mercedes, and more. Ron is a mentor to IT and cyber professionals across the globe and a friend of this show. Chapters 00:00 The Journey into Cybersecurity 04:58 Cyber Crime vs Small Business 09:56 Insider View of Cyber …
  continue reading
 
【聊了什么 The What】 重大发现:一月是星期一。大家多喝水。 Main takeaways: January is Monday. Stay hydrated. 【听众专属福利】 一起订阅《三联生活周刊》数字刊会员年卡吧! 🎉 疲惫娇娃专属渠道粉丝下单享受六折优惠🎉 【疲惫红书 CyberRed】 除了播客以外,疲惫娇娃的几个女的在小红书上开了官方账号,我们会不定期发布【疲惫在读】、【疲惫在看】、【疲惫旅行】、【疲惫Vlog】等等更加轻盈、好玩、实验性质的内容。如果你想知道除了播客以外我们在关注什么,快来小红书评论区和我们互动。 Apart from the podcast, we have set up an official account on Xiaohongshu. We …
  continue reading
 
Addressing Social Media Fraud: Insights from Netcraft's Robert Duncan In this weekend edition of Cybersecurity Today, host Jim Love discusses the growing issue of fraud in the cybersecurity landscape. Jim interviews Robert Duncan, VP of Product Strategy at Netcraft, who sheds light on their research into fraudulent activities on social media platfo…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Phil Beyer, head of security, Flex Thanks to our show sponsor, Dropzone.ai What if your SOC could handle 10x the alerts without burning out your team? Dropzone AI automates Tier 1 investigations and frees your analysts to tackle bigge…
  continue reading
 
Loading …

Guia de referencia rapida

Escucha este programa mientras exploras
Reproducir