Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
The BUILDINGS Podcast presents the latest developments and practices in facility management from energy management, lowering operating costs, maintenance of commercial buildings, life and safety, sustainability, green issues, project management, security, building performance and much more. Find more facility management news at www.buildings.com Send any comments or questions to [email protected] Support this podcast: https://podcasters.spotify.com/pod/show/buildings-podcast/support
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Welcome to Church Security Talk – your go-to resource for church safety and security. Join host Simon Osamoh, an ex-UK detective, former head of counterterrorism at Mall of America, Minnesota and church security expert. As he shares tips and tool to help your church stay safe and secure! Stay protected and informed with our online training courses visit worshipsecurity.org.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Federal News Network Executive Editor Jason Miller talks to federal chief information officers about the latest technology trends and issues facing their agencies.
…
continue reading
Weekly market commentary by Hedge Fund Manager Erik Townsend and interviews with the brightest minds in the world of finance and macroeconomics. Made possible by funding from Fourth Turning Capital Management, LLC
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Thuis aan de keukentafel praat Roel Rens met Microsoft- en IT-experts over actuele IT-topics.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Jake Voll brings security industry professionals together to discuss best practices, challenges, and opportunities.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
News, views, and insights into the cybersecurity realm produced by Greg Johnson, CEO of Webcheck Security. www.webchecksecurity.com
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading

1
Your Time Management Revolution - productivity tips from The Inefficiency Assassin, Helene Segura
Helene Segura, MA Ed, CPO
Time management consultant Helene Segura brings you a variety of recommendations on the mindset, strategies and tactics successful people implement for effective time management and productivity. Some episodes are solo musings, only 2-5 minutes in length. Other episodes are interviews that can last 30 minutes to an hour. Note to podcast aficionados: This is not a templated show, so there’s no set format. These are recordings of thoughts, recommendations and interviews – all designed to help ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading

1
Cybersecurity, Privacy, Risk Management, Cryptocurrencies, Fintech, Information Technology
Shahid Sharif
Career guidance & consulting services in Information Technology, Cybersecurity, Privacy, Risk Management, Cryptocurrencies, & Fintech #self improvement # productivity #cybersecurity #security #privacy #risk #fintech #blockchain #cryptocurrencies
…
continue reading
Secure Money Advisors is a licensed fiduciary in Pittsburgh, PA that develops holistic approaches to retirement planning. From annuities to wealth management and basic retirement planning, we offer a broad array of financial products and services clients need to succeed.
…
continue reading
Do It Fuh Grantley is a life and finance podcast produced by Fortress Fund Managers, where we speak with women and men in Barbados about their Grantleys and other money matters.
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
Join County National Bank's Senior Wealth Management Officers Christopher Phillips and Holleigh Baker as they explore the true meaning behind the question "What is Wealth?" From discussions with various guests, they delve into how wealth is not just about financial abundance but also about security, flexibility, and values discovered through personal stories and insights. Join them as they uncover the diverse perspectives on what wealth truly means in today's world and how these insights sha ...
…
continue reading
Brian Duff, host of the Mind 4 Survival prepping podcast, helps preparedness minded people be more safe, confident and prepared so they can better protect themselves, their families, and loved ones when it matters most.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
The United States is in the midst of a dramatic political realignment with shifting views on national security, economics, technology, and the role of government in our lives. Saagar Enjeti and Marshall Kosloff explore this with thinkers, policymakers, and more.
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
The Enterprise Mobility Roundup takes a look at mobility in the enterprise, focusing on workforce devices, business applications and the technology behind them.
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
Helping people build practical emergency preparedness, situational awareness, and survival skills—so they can confidently protect their families and thrive in any crisis.
…
continue reading
For many of us, the workplace is more than a single building or facility. That’s what makes workforce IAM so powerful. By managing security through something we all take wherever we go — our identities — it gives users the flexibility they need to stay productive and enables administrators to quickly detect and address risks. HID’s robust, flexible workforce identity and access management solutions provide your workforce with seamless access to the resources they need — no matter where they are.
…
continue reading

1
Executive Protection Evolves in Challenging Times
33:06
33:06
Play later
Play later
Lists
Like
Liked
33:06Does your EP program account for cultural sensitivities, legal shortcomings, and evolving conditions? In this episode of the SM Highlights podcast, Jessica Ansley explains how cultural awareness can make all the difference in harmonious low-profile travel security and executive protection. Then, lawyer Timothy Sini outlines the limitations across U…
…
continue reading

1
Secure Your Future: Essential Legal Documents You Need NOW!
3:47
3:47
Play later
Play later
Lists
Like
Liked
3:47http://www.TimeManagementRevolution.com - Whether you're planning for the unexpected or simply getting your life organized, having the right legal documents in place is essential. In this video, Helene Segura, Time Management Fixer breaks down the must-have documents everyone should consider—no legal jargon, just clear explanations. Get your FREE P…
…
continue reading

1
Vibe Coding vs Low-Code/No-Code: Security Risks and CI/CD Pipeline Impacts for Citizen Developers
9:42
9:42
Play later
Play later
Lists
Like
Liked
9:42Explore the evolution from traditional coding to vibe coding and its relationship with low-code/no-code (LCNC) platforms. This comprehensive analysis examines how AI-assisted development and visual programming tools are creating a new generation of citizen developers, transforming enterprise software development. We dive deep into the security impl…
…
continue reading

1
The 5 Paradigm Shifts of Exposure Management
34:58
34:58
Play later
Play later
Lists
Like
Liked
34:58Exposure management is fundamentally changing the way we view cybersecurity. Ivanti's Chris Goettl and Robert Waters introduce five paradigm shifts brought on by this emerging technology and how your organization's security strategy might shift as a result. For more, check out our Exposure Management Strategy Guide: (https://ivanti.com/resources/ex…
…
continue reading

1
Is Vuln Management Dead? - HD Moore - PSW #880
2:16:08
2:16:08
Play later
Play later
Lists
Like
Liked
2:16:08This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
…
continue reading

1
Managing online security throughout the decades.
43:09
43:09
Play later
Play later
Lists
Like
Liked
43:09This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with some more chicken follow up, this week, delving into malware-relat…
…
continue reading

1
SANS Stormcast June, Tuesday, June 10th, 2025: Octosql; Mirai vs. Wazuh DNS4EU; Wordpress Fair Package Manager
6:09
6:09
Play later
Play later
Lists
Like
Liked
6:09OctoSQL & Vulnerability Data OctoSQL is a neat tool to query files in different formats using SQL. This can, for example, be used to query the JSON vulnerability files from CISA or NVD and create interesting joins between different files. https://isc.sans.edu/diary/OctoSQL+Vulnerability+Data/32026 Mirai vs. Wazuh The Mirai botnet has now been obser…
…
continue reading

1
Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet.. - SWN #490
31:11
31:11
Play later
Play later
Lists
Like
Liked
31:11Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-490
…
continue reading
The Feds shut down a covert North Korean IT operation. Google releases an emergency update to fix a new Chrome zero-day. A major U.S. trade show and event marketing firm suffers a data breach. NetScaler patches a pair of critical vulnerabilities. A sophisticated cyber attack targets The Hague. An Iran-linked hacking group threatens to release email…
…
continue reading

1
CIAM Deployment Guide; external authentication methods
26:54
26:54
Play later
Play later
Lists
Like
Liked
26:54Summary In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the intricacies of Entra External ID, a customer identity and access management solution. They discuss the importance of security considerations in application development, the risks associated with customer-facing technologies, and the need for effective authentic…
…
continue reading

1
Cybersecurity in Higher Ed: Columbia University on IT Decentralization and Governance
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03Send us a text Colleges and universities face unique cybersecurity challenges, especially when IT is decentralized. In this CyberSound episode, Eric Baumgart, Director of Cybersecurity at Columbia University, shares how his team manages risk across a complex academic environment. From handling shadow IT and enclave networks to building trust across…
…
continue reading

1
Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike. [Only Malware in the Building]
41:25
41:25
Play later
Play later
Lists
Like
Liked
41:25Please enjoy this encore of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a buil…
…
continue reading
Please enjoy this encore of Word Notes. A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. CyberWire Glossary link: https://thecyberwire.com/glossary/bsimm Audio reference link: “OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Dec…
…
continue reading

1
Exploring BTEX 2025: Insights and Innovations
58:21
58:21
Play later
Play later
Lists
Like
Liked
58:21In this episode, KJ discusses the insights and experiences shared by various presenters at CDW Canada's Business Technology Expo (BTEX) 2025, highlighting the significance of the event in showcasing technological advancements and strategies for businesses. Key themes include the transition to Windows 11, the importance of cybersecurity, the evoluti…
…
continue reading

1
U.S. braces for Iranian cyber intrusions.
40:16
40:16
Play later
Play later
Lists
Like
Liked
40:16CISA warns organizations of potential cyber threats from Iranian state-sponsored actors.Scattered Spider targets aviation and transportation. Workforce cuts at the State Department raise concerns about weakened cyber diplomacy. Canada bans Chinese security camera vendor Hikvision over national security concerns.Cisco Talos reports a rise in cybercr…
…
continue reading
Does your waste disposal and diversion program need to improve? Better practices around waste, recycling, and composting can help you operate your facility more sustainably.By Endeavor Business Media
…
continue reading

1
#08 - Hoe verbeter je de zorg met AI? - Met Marijn Kroes, Head of Strategic Partnerships bij Pacmed
53:52
53:52
Play later
Play later
Lists
Like
Liked
53:52Pacmed heeft als missie om ziekenhuizen te helpen betere zorg te leveren aan patiënten en tegelijkertijd de werkdruk voor zorgprofessionals te verminderen. Dat doen ze met slimme AI-oplossingen. Als Head of Strategic Partnerships focust Marijn Kroes zich bij Pacmed op het realiseren van strategische samenwerking met zorgpartijen om de toekomst van …
…
continue reading

1
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413
1:52:05
1:52:05
Play later
Play later
Lists
Like
Liked
1:52:05Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
…
continue reading

1
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413
1:52:05
1:52:05
Play later
Play later
Lists
Like
Liked
1:52:05Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
…
continue reading

1
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413
1:52:05
1:52:05
Play later
Play later
Lists
Like
Liked
1:52:05Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
…
continue reading

1
SANS Stormcast Monday June 30th, 2025: Scattered Spider; AMI BIOS Exploited; Secure Boot Certs Expiring; Microsoft Resliliency Initiative
7:29
7:29
Play later
Play later
Lists
Like
Liked
7:29Scattered Spider Update The threat actor known as Scattered Spider is in the news again, this time focusing on airlines. But the techniques used by Scattered Spider, social engineering, are still some of the most dangerous techniques used by various threat actors. https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-…
…
continue reading

1
Jamil Jaffer: You should run towards risk. [Strategy] [Career Notes]
8:01
8:01
Play later
Play later
Lists
Like
Liked
8:01Please enjoy this encore of Career Notes. Senior Vice President for Strategy, Partnerships, and Corporate Development at IronNet Cybersecurity, Jamil Jaffer, shares how his interest in technology brought him full circle. Always a tech guy, Jamil paid he way through college doing computer support. Jamil went to law school and worked in various jobs …
…
continue reading

1
A tale of two botnets. [Research Saturday]
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55This week we are joined by Kyle Lefton, Security Researcher from Akamai, who is diving into their work on "Two Botnets, One Flaw - Mirai Spreads Through Wazuh Vulnerability." Akamai researchers have observed active exploitation of CVE-2025-24016, a critical RCE vulnerability in Wazuh, by two Mirai-based botnets. The campaigns highlight how quickly …
…
continue reading

1
Broadcom, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and more... - SWN #489
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Broadcom is coming for you, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-489
…
continue reading

1
Broadcom, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and more... - SWN #489
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Broadcom is coming for you, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and More on this episode of the Security Weekly News. Show Notes: https://securityweekly.com/swn-489
…
continue reading
Hawaiian Airlines reports a cybersecurity incident. Microsoft updates its Windows Resiliency Initiative after the 2024 CrowdStrike crash. CitrixBleed 2 is under active exploitation in the wild. Researchers disclose a critical vulnerability in Open VSX. Malware uses prompt injection to evade AI analysis. A new report claims Cambodia turns a blind ey…
…
continue reading

1
Enterprise vs. Consumer Devices in Healthcare
19:30
19:30
Play later
Play later
Lists
Like
Liked
19:30Hospitals often choose sleek consumer hardware to impress stakeholders, but these devices break down under the demands of shared usage, role-based access, and InfoSec requirements. In this episode, we highlight how our device choices can either empower or inhibit clinical teams. When nurses and physicians are given tools built for retail or persona…
…
continue reading

1
ep.86 Top 8 Church Security FAQs Answered
30:22
30:22
Play later
Play later
Lists
Like
Liked
30:22In this rapid-fire Q&A, Simon tackles eight of the most pressing questions from church leaders and volunteers—from the status of the 2025 NSGP grant to selecting the right background‑check provider. Tune in for expert insights on everything from PA coverage and incident reporting to standoff measures and firearms qualifications. Some key things you…
…
continue reading

1
SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln;
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44 Bluetooth Vulnerability Could Allow Eavesdropping A vulnerability i…
…
continue reading

1
Is Vuln Management Dead? - HD Moore - PSW #880
2:16:08
2:16:08
Play later
Play later
Lists
Like
Liked
2:16:08This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
…
continue reading

1
Is Vuln Management Dead? - HD Moore - PSW #880
2:16:08
2:16:08
Play later
Play later
Lists
Like
Liked
2:16:08This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
…
continue reading

1
Is Vuln Management Dead? - HD Moore - PSW #880
2:16:08
2:16:08
Play later
Play later
Lists
Like
Liked
2:16:08This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
…
continue reading
Patches, patches and more patches.A patient death has been linked to the 2023 ransomware attack on an NHS IT provider. U.S. authorities indict the man known online as “IntelBroker”. A suspected cyberattack disrupts Columbia University’s computer systems. A major license plate reader company restricts cross-state data access after reports revealed m…
…
continue reading

1
RGC, Not GRC: Why Risk Comes First ft Ricky Waldron
1:19:19
1:19:19
Play later
Play later
Lists
Like
Liked
1:19:19What if compliance wasn't just about passing audits—but about building trust from the ground up? In this powerful episode of Security & GRC Decoded, Raj sits down with Ricky Waldron, Director of Security Audit & GRC at Navan, whose GRC experience spans tech giants like Microsoft, Disney, Oracle, and Smartsheet. Ricky shares how GRC is evolving into…
…
continue reading

1
IAHSS AC&E 2025 Debrief + Caring For Caregivers Discussion
21:03
21:03
Play later
Play later
Lists
Like
Liked
21:03Join us for another episode with Matthew Lewis, Director of Product Marketing, IAMS and guests Rachel Nolan Sales Director, Healthcare and Scott Galvin Pre‑Sales Senior Solutions Architect to unpack all the highlights from the recent IAHSS AC&E show. Rachel and Scott share their biggest takeaways from the conference, spotlight key trends impacting …
…
continue reading

1
MacroVoices #486 David Rosenberg: Navigating Choppy Waters
1:07:31
1:07:31
Play later
Play later
Lists
Like
Liked
1:07:31MacroVoices Erik Townsend & Patrick Ceresna welcome, David Rosenberg. They discuss the equity market outlook, inflation, precious metals, the U.S. Dollar, and much more. https://bit.ly/3TJ6MLO 🔻Download Big Picture Trading Chartbook 📈📉: https://bit.ly/3ZRPY90 ✅Sign up for a FREE 14-day trial at Big Picture Trading: https://bit.ly/4d1fcag 🔴 Subscrib…
…
continue reading

1
S17 E07 (VIDEO) You Think MFA is Enough? Think Again.
49:20
49:20
Play later
Play later
Lists
Like
Liked
49:20Bob Burke is the Chief Information Security Officer at Beyond Identity, where he plays a key role in building and securing the company’s identity-first access management platform. He has over 20 years of experience in cybersecurity and engineering leadership and brings deep expertise in identity, cloud infrastructure, compliance, and protecting mis…
…
continue reading

1
Don't Ask "Can" We Secure It, But "How" Can We Secure It
28:29
28:29
Play later
Play later
Lists
Like
Liked
28:29All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining is Hanan Szwarcbord, vp, CSO and head of infrastructure, Micron Technology. In this episode Embracing gro…
…
continue reading

1
S17 E07 You Think MFA Is Enough? Think Again.
49:20
49:20
Play later
Play later
Lists
Like
Liked
49:20Bob Burke is the Chief Information Security Officer at Beyond Identity, where he plays a key role in building and securing the company’s identity-first access management platform. He has over 20 years of experience in cybersecurity and engineering leadership and brings deep expertise in identity, cloud infrastructure, compliance, and protecting mis…
…
continue reading

1
Why Fraud Prevention Silos Are Holding Your Business Back
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53"The thing to challenge is the fact that fraud prevention is a vertical by itself," says Guido Ronchetti, CTO at XTN Cognitive Security. He stresses that recent fraudulent trends exhibit "no real separation between fraud, cybersecurity, and AML.” In this episode of The Security Strategist podcast, Jonathan Care discusses fraud prevention with Ronch…
…
continue reading
By Enterprise Management Associates + APMdigest
…
continue reading