News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
This podcast series offers risk intelligence and analysis from RANE Network. RANE is a risk intelligence company that provides business professionals with access to critical insights, analysis, and support, enabling them to better anticipate, monitor, and respond to emerging risks and threats. In the RANE podcast series, risk management experts and thought leaders share best practices for managing business risk, geopolitical risk, physical and cyber security risks, compliance risk, and other ...
…
continue reading
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
…
continue reading
Bringing together leaders in the technology space to discuss the challenges they're facing and the solutions they're delivering.
…
continue reading
YASH cyber security solutions are helping global corporations address a plethora of cyber risks proactively and reactively. We help our customers to grow their business securely, we understand your world.
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven atta ...
…
continue reading
Welcome to the PRMA Risk Ready podcast, the show for Risk Management Professionals in the High Net Worth Space.
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Nuix creates innovative software that empowers organizations to simply and quickly find the truth from any data in a digital world. We are a passionate and talented team, delighting our customers with software that transforms data into actionable intelligence. Using Nuix software, customers can overcome the challenges of litigation, investigation, risk, compliance, and security by asking the right questions and getting complete, timely answers. Our collaborative data analytics algorithms and ...
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading

1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Send feedback and show ideas to [email protected]. Each discussion delves into the intersection of technology advancement, market dynamics, and the founder journey, offe ...
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
Beer is one of the oldest and most widely consumed alcoholic drinks in the world, and the third most popular drink overall after water and tea. Cybersecurity is required today for businesses to protect themselves from the persistent threat of malware and ransomware. Hosts Chris Jordan, CEO of Fluency Security, and Jeremy Murtishaw, CEO of Fortify 24x7 discuss cybersecurity, information technology, and hockey with their guests while enjoying some of their favorite beers. Grab your favorite be ...
…
continue reading
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
…
continue reading
We are obsessed with success and know that it’s a journey, not a destination. We are fascinated with successful individuals in all business sectors, who are working on their goals or bettering themselves on a day 2 day basis.
…
continue reading

1
Connected App, Connected Risk: The Salesforce–Drift Incident
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54A single weak app integration opened the door for attackers to raid data from some of the world’s largest companies. Salesforce environments were hit hardest—with victims like Cloudflare, Palo Alto Networks, and Zscaler—but the blast radius also reached other SaaS platforms, including Google Workspace. In this episode of Cyberside Chats, Sherri Dav…
…
continue reading

1
How a Detective Became the Ginger Hacker: SOC Life, Job Hunts & Blue Team Wisdom
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02From the streets to the SOC. 💻 In this episode of Simply Defensive, Josh Mason and Wade Wells talk with Andrew Crotty — aka Ginger Hacker. A former detective turned Tier 3 SOC analyst and Army reservist, Andrew shares his journey into cyber, the struggles of breaking in, and the lessons he’s learned (including the rookie mistake that accidentally d…
…
continue reading

1
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - Theresa Lanowitz, Yuval Wollman, Mickey Bresman, J.J. Guy, Jason Passwaters, HD Moore, Jawahar “Jawa” Sivasankaran - ESW ...
2:06:06
2:06:06
Play later
Play later
Lists
Like
Liked
2:06:06Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
…
continue reading

1
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - HD Moore, Jason Passwaters, J.J. Guy, Theresa Lanowitz, Mickey Bresman, Yuval Wollman, Jawahar “Jawa” Sivasankaran - ESW ...
2:06:06
2:06:06
Play later
Play later
Lists
Like
Liked
2:06:06Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
…
continue reading

1
Threat Modeling: Protecting Our Nation’s Complex Software-Intensive Systems
35:02
35:02
Play later
Play later
Lists
Like
Liked
35:02In response to Executive Order (EO) 14028, Improving the Nation’s Cybersecurity, the National Institute of Standards and Technology (NIST) recommended 11 practices for software verification. Threat modeling is at the top of the list. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Natasha Shevchenko and Ale…
…
continue reading

1
The AI Security Edge - Force Multipliers with Dennis Hurst | Ep 7
23:41
23:41
Play later
Play later
Lists
Like
Liked
23:41Caroline Wong welcomes Dennis Hurst, Founder and President of Saltworks Security, for an insightful conversation on how AI is transforming application security. With more than 30 years of experience, Dennis explains how AI acts as a force multiplier—amplifying both attacker capabilities and defender effectiveness. They explore the challenges of sec…
…
continue reading

1
The Next Chapter in Securing the World's Internet
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06OpenSSL has secured the internet for over 25 years, but how does a project with such deep legacy prepare for the quantum future? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Tomáš Mráz, Director of the OpenSSL Foundation, and Jon Ericson, the Foundation’s Community Manager. Together they explore the…
…
continue reading

1
Storytelling, Culture and Cyber Resilience - Ep 165
31:31
31:31
Play later
Play later
Lists
Like
Liked
31:31Cyber resilience goes beyond checkboxes. In this episode, cybersecurity veteran Jerod Brennen (virtual CISO, executive advisor, and indie filmmaker) joins Rob Aragao to explore how storytelling, culture, and business alignment turn security into a true business enabler. Real-world lessons and practical steps help you shift from traditional cybersec…
…
continue reading

1
From SEAL Teams to Corporate Security: Lessons from the Frontlines of Risk Management
35:48
35:48
Play later
Play later
Lists
Like
Liked
35:48In this episode of Ontic's Connected Intelligence Podcast, Jake Williams and Robin Miller share how their Navy backgrounds shaped the founding of Fortified Risk Group and their unique approach to integrating digital and physical security. They discuss the evolution of corporate security, from intelligence-driven threat assessments to proactive risk…
…
continue reading
In this episode of Essential Geopolitics, RANE's Europe Analyst Matteo Ilardo provides his insights into the causes and implications of rising regional tensions in the Baltic. Register here to receive a complimentary subscription to RiskBook, our curated email digest with the latest risk news and analysis, delivered every weekday morning. RANE is a…
…
continue reading

1
Automating the Blue Team | Kevin Mata (Swimlane) on SOAR & AI in Cybersecurity
32:43
32:43
Play later
Play later
Lists
Like
Liked
32:43Automation is changing the way defenders work. In this episode of Simply Defensive, we sit down with Kevin Mata, Director of Cloud Operations at Swimlane, to talk about his journey from flipping burgers at In-N-Out to flipping SOC alerts with automation, SOAR, and AI. Kevin shares how he got started in cybersecurity, how Swimlane helps Blue Teams s…
…
continue reading

1
Betrayal, Backdoors, and Payback: When Hackers Become the Hacked
28:51
28:51
Play later
Play later
Lists
Like
Liked
28:51Hackers aren’t untouchable—and sometimes, they become the victims. From North Korean operatives getting exposed at DEF CON, to ransomware gangs like Conti and LockBit crumbling under betrayal and rival leaks, the underground is full of double-crosses and takedowns. Now, Congress is even debating whether to bring back “letters of marque” to authoriz…
…
continue reading

1
Season 1 - Episode 14 (Pedro Kertzman & Sam Flockhart)
28:17
28:17
Play later
Play later
Lists
Like
Liked
28:17How does a military intelligence background translate to cyber threat intelligence? Sam Flockhart, a former UK military intelligence operator who now heads threat management at a global bank, reveals the fascinating journey and powerful parallels between these worlds. Sam opens up about his transition from conventional military intelligence to the …
…
continue reading

1
Al Meets Identity: A Conversation at the Cyber Frontier with Ed Amoroso
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58On this Month's episode of Smells Like Identity Hygiene, we chat with Founder and CEO of TAG Infosphere Ed AmorosoDon't miss out!#IdentityHygiene #TechTalk #CyberSecurityCurious about how much risk your organizations AD Environment is in? Request your free cyber risk assessment here (https://www.sphereco.com) or visit our website to learn how SPHER…
…
continue reading

1
Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422
1:46:21
1:46:21
Play later
Play later
Lists
Like
Liked
1:46:21Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organiza…
…
continue reading

1
Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422
1:46:21
1:46:21
Play later
Play later
Lists
Like
Liked
1:46:21Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organiza…
…
continue reading

1
Post-Quantum Prep Without the Panic: Don’t Delay Your Upgrade to TLS 1.3
29:45
29:45
Play later
Play later
Lists
Like
Liked
29:45As governments and regulators accelerate PQC adoption timelines, the urgency for organizations to act has never been greater. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Kevin Hilscher, Senior Director of Product Management at DigiCert, to explore the practical first steps of post-quantum cryptography ad…
…
continue reading

1
How a Cyber Attack Paralyzed a City - Ep 164
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20A ransomware attack shut down St. Paul, Minnesota—forcing a state of emergency and even the calling in of the National Guard. Cybersecurity expert Tyler Moffitt unpacks how it happened, who was behind it, and what cities and individuals can learn to avoid becoming the next target. Follow or subscribe to the show on your preferred podcast platform. …
…
continue reading

1
Printer Problems: Trump, Putin, and a Costly Mistake
15:51
15:51
Play later
Play later
Lists
Like
Liked
15:51On the eve of the Trump–Putin summit, sensitive U.S. State Department documents were left sitting in a hotel printer in Anchorage. Guests stumbled on pages detailing schedules, contacts, and even a gift list—sparking international headlines and White House mockery. But the real story isn’t just about geopolitics. It’s about how unmanaged printers—a…
…
continue reading

1
Inside Hack Defender Academy: Gamified Malware Training for Blue Teamers
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27Ready to level up your defensive cybersecurity skills? In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Dan Regalado and Belem — the founders of Hack Defender Academy — to explore how they’re using CTF-style challenges, real malware cases, and gamification to prepare the next generation of defenders. 💡 We cover: Why gami…
…
continue reading

1
Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
…
continue reading

1
Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
…
continue reading

1
Global Threats, Deepfakes & Quantum Risk | DailyCyber 273 with Evgueni Erchov
59:24
59:24
Play later
Play later
Lists
Like
Liked
59:24Global Threats, Deepfakes & Quantum Risk | DailyCyber 273 with Evgueni Erchov ~ Watch Now ~ In this episode of DailyCyber, I’m joined by Evgueni Erchov, Sr. Director of Research & Threat Intelligence at Cypfer. With more than 25 years of experience in IT security, forensics, blockchain, and cybercrime investigations, Evgueni shares his perspective …
…
continue reading
On this Month's episode of Smells Like Identity Hygiene, we chat with Justin Hansen, a Field CTO at CyberArk.Don't miss out!#IdentityHygiene #TechTalk #CyberSecurityCurious about how much risk your organizations AD Environment is in? Request your free cyber risk assessment here (https://www.sphereco.com) or visit our website to learn how SPHERE (ht…
…
continue reading

1
Designing for Breakage: What Cybersecurity Leaders Must Plan For
39:34
39:34
Play later
Play later
Lists
Like
Liked
39:34As quantum computing accelerates toward real-world impact, organizations must stop viewing post-quantum cryptography as a one-time technical upgrade. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen sits down with Yolanda Reid, former Associate Partner at IBM Consulting and U.S. Department of Defense leader, to exp…
…
continue reading

1
Evo Nordics #645 - Cyber Security And Engaging Senior Leadership
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07Host Chris Hackett explores how organizations can effectively engage senior leadership in cybersecurity. Staffan Fredriksson, CISO at Regent AB, Magnus Sjolander, Senior Manager for Information Security, IT Risk & Privacy at Accenture, Mikael Lagstrom, Head of Application Security for the SE/DK team at DNV Cyber, and Maria Eriksson, NDA share persp…
…
continue reading

1
Evo Nordics #644 - How To Keep Teams Aligned Without Killing Creativity
40:13
40:13
Play later
Play later
Lists
Like
Liked
40:13Host Georgia Benton leads a discussion on how leaders can align teams while preserving creativity. Adam Karlsson, Lead Designer at Vend, Rachele A Moresi, Engineering Manager at Spotify, and Kristian Larsen, Managing Director at Hybel AS share their experiences balancing structure with innovation. They explore leadership strategies, collaboration m…
…
continue reading

1
Evo Nordics #643 - What Does Risk & Compliance Actually Mean For Businesses
50:30
50:30
Play later
Play later
Lists
Like
Liked
50:30Host Chris Hackett explores the realities of risk and compliance with three industry experts. Joakim Sjunnesson, Group Information Security Risk Manager at ASSA ABLOY, Adrien LeClerqc, Internal Audit and Risk Manager at Spotify, and Somaia El-Gamal, Assistant Manager of Security Governance at Boubyan Digital Factory share insights into how business…
…
continue reading

1
Inside Authoritarian Power Struggles - Elite Politics, Military Influence, and Strategy in China and Russia
50:01
50:01
Play later
Play later
Lists
Like
Liked
50:01In this episode of RANE Insights, Founder of RANE David Lawrence sits down with author Joseph Torigian to discuss authoritarian geopolitical dynamics and strategy. Joseph studies the politics of authoritarian regimes with a specific focus on elite power struggles, civil-military relations, and grand strategy. He uses primary sources, rare books, an…
…
continue reading

1
From Cyber Pro to Policy Shaper: It Could Be You - Ep 163
15:36
15:36
Play later
Play later
Lists
Like
Liked
15:36In this episode of Reimagining Cyber, host Rob Aragao sits down with Betsy Cooper, Director of the Aspen Policy Academy. Betsy shares how the Academy is helping to train cybersecurity professionals to effectively engage with and influence public policy. They discuss the importance of civic engagement, the need for technical voices in policymaking, …
…
continue reading

1
From Fed to Fortune 100: The Security Mindset Shift That Changed Everything
31:24
31:24
Play later
Play later
Lists
Like
Liked
31:24In this episode, Fred sits down with Scott McHugh, a veteran of both federal service and Fortune 100 security leadership, to explore what the public and private sectors can learn from each other. They dive into how public-sector urgency, mission focus, and intelligence practices can strengthen corporate programs—and how the private sector’s agility…
…
continue reading

1
Mass Salesforce Hacks: How Criminals Are Targeting the Cloud Supply Chain
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25A wave of coordinated cyberattacks has hit Salesforce customers across industries and continents, compromising millions of records from some of the world’s most recognized brands — including Google, Allianz Life, Qantas, LVMH, and even government agencies. In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down how the attack…
…
continue reading

1
Season 1 - Episode 13 (Pedro Kertzman & Bianca Miclea)
41:25
41:25
Play later
Play later
Lists
Like
Liked
41:25What does it take to build an effective Cyber Threat Intelligence function from scratch? In this eye-opening conversation, Bianca Miclea shatters the myth that cybersecurity is only for those with traditional technical backgrounds. Bianca shares her remarkable journey from politics student to cybersecurity leader, revealing how her academic backgro…
…
continue reading

1
The AI Security Edge - RISE and CARE: The Antidotes to "AI All The Things" | Ep 6
21:52
21:52
Play later
Play later
Lists
Like
Liked
21:52It seems like each and every board on the planet is demanding that their executive teams "AI all the things," at least when it comes to high tech. In episode 6 of The AI Security Edge, Caroline Wong and Rock Lambros discuss the governance frameworks that Rock developed to combat the chaos of an approach with no real strategy. RISE: Research, Implem…
…
continue reading

1
Rob Allen (ThreatLocker) on Zero Trust, Proactive Security, and Ransomware Prevention
25:27
25:27
Play later
Play later
Lists
Like
Liked
25:27In Season 4, Episode 4 of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Rob Allen, Chief Product Officer at ThreatLocker, to dive deep into the world of Zero Trust security, proactive cybersecurity strategies, and ransomware prevention. Rob shares expert insights on: Proactive vs. Reactive cybersecurity — why a balanced security s…
…
continue reading

1
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
1:55:35
1:55:35
Play later
Play later
Lists
Like
Liked
1:55:35Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
…
continue reading

1
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
1:55:35
1:55:35
Play later
Play later
Lists
Like
Liked
1:55:35Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
…
continue reading

1
Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor
1:05:39
1:05:39
Play later
Play later
Lists
Like
Liked
1:05:39Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor ~ Watch Now ~ In this episode of DailyCyber, I’m joined by Craig M. Taylor, Co-Founder & CISO at CyberHoot, who has spent nearly three decades building and leading security programs for organizations of all sizes. Craig believes cybersecurity awareness should be short, engaging, …
…
continue reading
On this Month's episode of Smells Like Identity Hygiene, we chat with JetBlue Director IAM, Governance and Compliance, E. Angie WoodruffDon't miss out!#IdentityHygiene #TechTalk #CyberSecurityCurious about how much risk your organizations AD Environment is in? Request your free cyber risk assessment here (https://www.sphereco.com) or visit our webs…
…
continue reading

1
Evo Nordics #642 - Hiring For Culture Fit In Remote & Hybrid Technology Teams
56:46
56:46
Play later
Play later
Lists
Like
Liked
56:46Host Rachel Owen is joined by Pavel Melekhov, Head of Engineering at Pixellu, Alyona Gurshchenkova, Engineering Manager at Ecosia, Lauri Pitkanen, Engineering Manager at Digia Plc, and Martti Kontula, Head of OT & Data at Landis + Gyr, to explore how to hire for culture fit in remote and hybrid technology teams. They share strategies for building c…
…
continue reading

1
From NIST Standards to Action: A Year of PQC Migration
30:50
30:50
Play later
Play later
Lists
Like
Liked
30:50One year ago, NIST released its long‑awaited post‑quantum cryptography standards, marking the official start of the migration to quantum‑safe security. It was the moment everyone had been “waiting for” but did it really kickstart the shift? In this anniversary episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen brings back so…
…
continue reading