They steal billions: Cyber Hack investigates the alleged cyber gangs and the heists and hacks they’re accused of carrying out. No one is said to be safe. From Hollywood studios, to international banks, from crypto exchanges to small businesses and health care companies, law enforcement agencies say they cause chaos around the globe. Who will be next? And where is the money going? Latest season: Evil Corp. The Russian Evil Corp is accused of being a family crime gang, responsible for stealing ...
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Russia knows our weaknesses. But do you? A major five-part series from Sky News and Tortoise which imagines how a Russian attack on the UK could play out – and invites real-life former ministers, military chiefs and other experts to figure out how to defend the country. Written and presented by Sky News' security and defence editor, Deborah Haynes.This is Deborah's second podcast series for Sky News. In her first series, Into The Grey Zone, Deborah explores the murky evolution of warfare.Wha ...
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
We are going to teach you how to defend yourself against cybercrime, privacy abuse, vehicle hacking, bomb drones and cyber warfare, REGARDLESS of your proficiency with computers. Because you don't have to be technical to survive the Digital Age!
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
Cyber Insurance Leaders is dedicated to keeping cyber insurance and security professionals up to date on the latest developments, best practices, and thought leadership from leading voices in the industry. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
Breaking Cyber Barriers dives deep into the world of Cybersecurity, uncovering trends and exploring its limitless potential. Join host Liz Vagenas as she speaks with top leaders about the current challenges and opportunities within the industry, as well as strategies for success.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Your Favorite Existentialist-Anarchist Internet Badass Commentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Are you ready to explore the future of cybersecurity? Join us on Cyber Talks by Devoteam the videocast where industry experts, thought leaders, and practitioners share their insights, experiences, and strategic perspectives. Hosted by Rui Shantilal, VP of Devoteam Cyber Trust, each episode delves into key cybersecurity topics—from Offensive Security and DORA Compliance to Third-Party Risk Management and IAM. Whether you're a seasoned security leader, a CISO navigating complex challenges, or ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
Introducing the new podcast series from the National Cyber Security Centre (NCSC). Join us as we dive deep into the ever-evolving world of cyber security, bringing you discussions on topical issues, emerging trends, and expert insights from our in-house experts and external guests. Each episode offers a comprehensive exploration of a specific topic, providing listeners with valuable knowledge and actionable advice. Visit ncsc.gov.uk to find out more about the topics discussed, access additio ...
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
1
SANS Stormcast Thursday, December 4th, 2025: CDN Headers; React Vulnerabiity; PickleScan Patch
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React server components. Exploitation is likely imminent. https://react.dev/blog/2025/12/03/critical-se…
…
continue reading
Summary In this episode of Cyber Weekly, Junior Williams shares his extensive background in technology and cybersecurity, discussing the evolution of his career from programming to digital forensics and AI research. He emphasizes the importance of balancing innovation with security, the impact of AI on the job market, and offers valuable advice for…
…
continue reading
1
The Undetected. Espionage and Spies.(Part 1)
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52Question? Text our Studio direct. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Threat of Chinese Espionage to American National Security Inside Espionage: What Every American Should Know Season …
…
continue reading
1
El ataque digital a tu relación de pareja
17:09
17:09
Play later
Play later
Lists
Like
Liked
17:09Para los oyentes del CyberMidnight Club, la conclusión forense es clara: las redes sociales han desplegado un exploit "Zero-Day" contra la unidad fundamental de la sociedad: la relación romántica. Estamos ante un cambio criminológico donde el smartphone actúa como un atacante "Man-in-the-Middle", interceptando la intimidad y reemplazándola con vali…
…
continue reading
1
🔴 Dec 3’s Top Cyber News NOW! - Ep 1018
1:35:49
1:35:49
Play later
Play later
Lists
Like
Liked
1:35:49The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
…
continue reading
1
Episode 89 - Omar Romero - Founder and CEO of ROSE IT Services Limited
19:55
19:55
Play later
Play later
Lists
Like
Liked
19:55In this episode, host Evgeniy Kharam speaks with Omar Romero, CEO of Rose IT Services, a Trinidad-based MSP serving the Caribbean and North America. Omar shares his story of launching the company post-2008 crash, scaling without VC or franchising, building a team from scratch, and adapting to evolving tech, from cybersecurity to automation. He also…
…
continue reading
In today’s podcast we cover four crucial cyber and technology topics, including: 1. ChatGPT outage impacts tens of thousands 2. India to combat fraud via SIM binding 3. U.S. fights fraud in Myanmar scam center 4. UK to mull exemptions in law banning ransomware payments I'd love feedback, feel free to send your comments and feedback to | cyberandtec…
…
continue reading
1
The Future of AI, Communication, and Security in Manufacturing with CJ Covell
43:20
43:20
Play later
Play later
Lists
Like
Liked
43:20Guest Introduction: CJ Covell is the Chief Information Officer at Everlast Roofing, a family owned American manufacturer specializing in metal building components used in residential, commercial, industrial, and agricultural construction. Since its founding in 1996, Everlast Roofing has expanded across multiple states, producing metal roofing and s…
…
continue reading
This is today’s cyber news for December third, 2025. Attackers are turning hacked home cameras, developer tools, and mobile phones into powerful surveillance and access channels that traditional controls struggle to cover. Leaders who understand these overlaps can better prioritize resilience, privacy, and vendor risk. Listeners will hear about sma…
…
continue reading
1
When Your TV Turns Against You: The SmartTube Breach
9:03
9:03
Play later
Play later
Lists
Like
Liked
9:03A major breach hits SmartTube, the popular third-party YouTube app for smart TVs and suddenly millions of living rooms may have quietly become surveillance hubs. In this episode, we break down how the malicious update happened, what the hidden malware was doing behind the scenes, and why smart TVs are quickly becoming one of the biggest cybersecuri…
…
continue reading
1
Microsoft Defender outage disrupts threats, Apple resists India's app order, MuddyWater strikes Israel
7:59
7:59
Play later
Play later
Lists
Like
Liked
7:59Microsoft Defender outage disrupts threats Apple resists India's state-run app order MuddyWater strikes Israel with MuddyViper Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, …
…
continue reading
Enjoy this episode of Cyber things from Armis. Catch the next episode on your favorite podcast app on December 15th. Welcome to Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire that plunges into the hidden world beneath our connected reality. Inspired by Stranger Things, we explore the digital realm's own U…
…
continue reading
1
The Army's "No Fail" Cyber Mission with Brandon Pugh
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48Army Principal Cyber Advisor Brandon Pugh joins Frank Cilluffo to address a stark reality: if critical infrastructure fails, the Army cannot mobilize. To meet this "no fail" mission, Pugh explains how the service is aggressively merging cyber with electronic warfare and cutting red tape to field new technology in days rather than years. They also d…
…
continue reading
1
The Identity Crisis – IAM in the Age of Zero Trust
24:10
24:10
Play later
Play later
Lists
Like
Liked
24:10Identity is the new perimeter, are you prepared? Join Rui Shantilal, Group VP Cyber Trust and guest Aiert Azueta, Head of IAM Devoteam Cyber Trust as they uncover how Identity & Access Management (IAM) has become the front line of modern cybersecurity. In this episode, discover how Zero Trust, passwordless authentication, and AI are reshaping digit…
…
continue reading
1
Defensive Security Podcast Episode 331B
1:10:28
1:10:28
Play later
Play later
Lists
Like
Liked
1:10:28Reposting Episode 331 due to the wrong mp3 attached to the original. Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://cloud.google.com/blog/topics/threat-intelligence/unc6040-proactive-hardening-recommendations https://www.theregister.com/2025/11/13/chinese_spies_claude_attacks/…
…
continue reading
In the security world it is becoming more and more necessarily to invest in controls around AI and the web browser. This attack targets both and often leaves absolutely no trace on your end, as the attack never leaves the browser. Sources: https://pastebin.com/rz744p1bBy Chloe Thonus
…
continue reading
1
CYFIRMA Research: Rising Cybercrime During Black Friday & Cyber Monday- A 2025 Threat Intelligence Report
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05Black Friday & Cyber Monday Cyber Threats Are Already Here As festive shopping surges, so does cybercrime. CYFIRMA’s latest analysis reveals a spike in fake websites, phishing campaigns, malicious ZIP downloads, UPI-based payment scams, and dark-web-powered phishing kits—all engineered to exploit the 2025 holiday rush. Our researchers uncovered mul…
…
continue reading
1
Ep. 59 – Why Bedside Manner Defines Great Counsel in a Cyber Crisis – with Josh Mooney
45:31
45:31
Play later
Play later
Lists
Like
Liked
45:31During incident response, what separates good from great counsel is bedside manner. In this episode, host Anthony Hess sits down with Josh Mooney, Partner and US Head of Cyber and Data Privacy at Kennedys Law, for a candid look at effective cyber response leadership. Josh explains why empathy and communication are as critical as legal precision whe…
…
continue reading
Nikki Meza, a rising cybersecurity professional and senior at Hofstra University studying Information Systems, joins the show, bringing hands-on IT experience from SportsNet New York. Nikki shares her passion for the human side of cybersecurity, exploring how empathy and adaptability are reshaping digital ethics and security practices for the next …
…
continue reading
1
Cyber Defense Radio – Brad Taylor - CEO - Proficio – Hotseat Podcast – 2025
18:27
18:27
Play later
Play later
Lists
Like
Liked
18:27🚨 New Episode of Cyber Defense Radio is LIVE! 🎙️ Hosted by Annabelle Thomas — Cybersecurity Champion of @CyberDefenseMag In this compelling interview, Brad Taylor, CEO of Proficio, joins the Hotseat Podcast to share how Proficio @proficioinc transformed from a startup into a top-tier leader in the MDR (Managed Detection & Response) market. Discover…
…
continue reading
1
Episode 159: How to Break Into Cybersecurity in 2026
44:55
44:55
Play later
Play later
Lists
Like
Liked
44:55In this episode, we’re sharing practical, no-fluff advice for getting into cybersecurity, whether you're switching careers, just starting out, or leveling up your IT skills. We’ll cover what actually matters to employers, what to avoid, and the fastest paths into the industry. If you’re looking for a clear roadmap into cybersecurity, this episode i…
…
continue reading
1
The Hidden Conflicts Inside Every Cyber Team with Dr. Nikki Robinson
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46In this episode, Ciaran and James speak with Dr. Nikki Robinson – author, professor, and Senior Technical Staff Member and Senior Manager for Platform Development at IBM – about vulnerability management and human factors in cybersecurity. Nikki shares insights from her research into vulnerability chaining and how organisations can strengthen their …
…
continue reading
1
Holiday scams, pollies warned ahead of Chinese visit, and Russian hackers sanctioned
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16In this episode of the Cyber Uncut podcast, David Hollingworth and Bethany Alvaro talk about the week's cyber security and AI news! Hollingworth and Alvaro get things started with a warning about a rise in AI-driven holiday scams taking advantage of the silly season. The pair also talk about a recent call from CPA Australia for young Australians to…
…
continue reading
1
teissTalk: Shielding sensitive data from ransomware – staying ahead of evolving threats
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49How modern ransomware actors are deploying multidimensional tactics to outpace traditional defences Strategies to reduce data loss and sustain business operations after an attack AI and automation – enhancing visibility and accelerating response to ransomware threats Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Edward St…
…
continue reading
1
Episode 21- How Healthcare Cybersecurity Became A Patient Safety Issue. With Jen Ellis
53:35
53:35
Play later
Play later
Lists
Like
Liked
53:35The alarms aren’t just in the data center anymore. When ransomware shutters clinics and pushes oncology schedules into chaos, the question isn’t “What did they exfiltrate?” It’s “Who didn’t get care?” We sit down with Jen Ellis, founder of NextGen Security and co-chair of the Ransomware Task Force, to unpack how cybersecurity in healthcare became a…
…
continue reading
Cyber attacks don’t just knock systems offline—they can empty shelves, disrupt feeding schedules, endanger animals, and muddy price signals across the food supply. We sat down with Kristen (Demoranville) King, CEO of Anzen Sage and host of Bites and Bytes Podcast, to unpack how modern agriculture runs on a mesh of OT, data, and logistics that adver…
…
continue reading
Investigators hunting for Maksim Yakubets, allege he is working with the FSB – Russia’s security agency. They say the Evil Corp gang has stolen more than $100m from at least 300 victim organisations in 43 countries - but who is the powerful man in Moscow said to be protecting Maksim, their alleged leader? We follow his family’s journey from a humbl…
…
continue reading
1
Online Predators Are Targeting Kids (Audio)-Cyber Safety Begins At Home-Cybersecurity for Beginners
17:55
17:55
Play later
Play later
Lists
Like
Liked
17:55Send us a text Learn how online predators are targeting children. The new tactics being used by pervs to groom and lure kids online will be revealed. Also, the shocking trend of satanic online gangs abusing children on their own platforms will be exposed. Prometheus then makes a stunning revelation about his past and gives a BRUTAL warning to the c…
…
continue reading
1
J. Assaf Turner Founder & CEO @Maya Security on CxO & regulators' cyber dilemmas not limited to ICS
46:39
46:39
Play later
Play later
Lists
Like
Liked
46:39עֲקַבְיָא בֶּן מַהֲלַלְאֵל אוֹמֵר, הִסְתַּכֵּל בִּשְׁלֹשָׁה דְּבָרִים וְאֵין אַתָּה בָּא לִידֵי עֲבֵרָה. דַּע מֵאַיִן בָּאתָ וּלְאָן אַתָּה הוֹלֵךְ וְלִפְנֵי מִי אַתָּה עָתִיד לִתֵּן דִּין וְחֶשְׁבּוֹן.“ (משנה, מסכת אבות – פרק ג, משנה א) ללא הידיעה אין אפשרות לנהל סיכונים, עצם הידיעה נותנת את האפשרות לקבל החלטות מושכלות החל מהעובד הזוטר ועד ההנהלה …
…
continue reading
In this episode of Simply ICS Cyber, Don and Tom welcome Sam Blaney, retired Chief Warrant Officer (CW3) from the Georgia National Guard and current cybersecurity professor at the University of North Georgia. Sam shares insights from his career building and leading Cyber Protection Team 170, his transition into teaching, and his continued work help…
…
continue reading
1
Resilient Cyber w/ Jesus and John - Post-Quantum Cryptography for Engineers
22:39
22:39
Play later
Play later
Lists
Like
Liked
22:39In this episode of Resilient Cyber, I'm joined by Jesus Alejandro Cardenes Cabre, SVP of Product Architecture and John Xiaremba, Software Engineer, both from the VIA Knowledge Hub team to dig into all things post-quantum cryptography (PQC). This includes PQC standards, as well as practical steps developers must take today to mitigate future risks.…
…
continue reading
1
Episode XIII - The Human Factor in the AI World
1:15
1:15
Play later
Play later
Lists
Like
Liked
1:15Leadership Coach and Senior Organization Advisor Stephanie Henderson discusses how technology and human Insight can work together.
…
continue reading
1
Episode 472 - Secure and Simplify with Zero Trust Everywhere
8:46
8:46
Play later
Play later
Lists
Like
Liked
8:46We speak with Dhawal Sharma, Executive Vice President & Head of Product Strategy at Zscaler on the latest innovations in zero trust to enhance security, simplify access management, and significantly reduce legacy infrastructure costs. Dhawal Sharma is a visionary leader and expert in cloud security who currently serves as Executive Vice President a…
…
continue reading