Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Podcast francophone de vulgarisation des sujets de la cybersécurité, dans une ambiance décontractée. Animé par Michael VIRGONE, commercial et passionné de cyber depuis plusieurs années
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Cybersecurity
…
continue reading
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
…
continue reading
Welcome to “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all whether we are surfing the web at home, managing a company, supporting clients, or running a state or local government. Join Sean Atkinson and Tony Sager of CIS every other Wednesday as they discuss trends and threats, identify ways to implement controls and infrastructure, explore best practices, and interview experts in the industry. Together, we’ll clarify these ...
…
continue reading
1234, come la password che non dovreste mai scegliere. Come la password che la maggior parte degli utenti sceglie. Dalle truffe online agli intrighi internazionali, in ogni puntata approfondiamo la storia di cybersecurity del momento. A cura di Alberto Giuffrè
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
In this EM360 podcast, we investigate the cutting edge Cybersecurity issues that organisations are facing today. These discussions are led by the organisations at the forefront of defence as they walk us through the issues people are facing and how to effectively implement prevention strategies.
…
continue reading
A bi-weekly podcast where pressing cybersecurity and information technology issues are discussed.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
…
continue reading
1
Cybersecurity Basement – der Podcast für echten Security-Content
suresecure GmbH, Michael Döhmen, Andreas Papadaniil
Herzlich Willkommen im Cybersecurity Basement. In unserem Podcast sprechen vor allem Andreas Papadaniil und Michael Döhmen alle 14 Tage über Themen aus dem Bereich Cybersecurity. Dabei legen wir großen Wert auf Objektivität gelegt. Kein suresecure-Feature-Fucking, sondern ein seriöser, authentischer und ehrlicher Austausch aus Theorie und Praxis. Der Podcast richtet sich an IT- und Security-Entscheider und alle, die es mal werden wollen. Hier gibts kein Blabla, sondern Security als Handwerk. ...
…
continue reading
Welcome to The Rocheston Cybersecurity Podcast, your go-to podcast for demystifying cybersecurity concepts in a global context. Hosted by Haja Mo who has a passion for cybersecurity education, this podcast breaks down complex topics into easy-to-understand explanations, ensuring that listeners of all backgrounds can grasp essential cybersecurity principles. In each episode, we delve into various cybersecurity concepts, making it easy for everyone to understand. Whether you're a tech enthusia ...
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
Forcepoint’s To The Point Cybersecurity Podcast covers the latest cyber news, threats, and trends impacting the federal government and world at large.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
The podcast for sales and marketing teams that tackles the question: How can cybersecurity companies grow sales faster? We talk with cybersecurity CROs, CMOs, CEOs, as well as sales and marketing experts. Listen in, and you will get proven strategies to - help you get more leads - win more customers, and, - create your killer go-to-market growth engine. If you are a seller, marketer, leader, CEO, or founder at a cybersecurity company, you are in the right place.
…
continue reading
Safeguarding your startup against cyber threats is non-negotiable in today's digital landscape. That's why our Startuprad.io presents the Security and Cybersecurity track, a dedicated space where deep tech meets entrepreneurship, empowering startups with vital insights into cybersecurity. In this podcast, we go beyond the headlines, providing comprehensive training and up-to-the-minute cybersecurity news tailored for entrepreneurs. Our interviews feature industry-leading entrepreneurs active ...
…
continue reading
“It’s 5:05!'' is a daily audio news cast highlighting security and open source stories from around the world. We filter for the real cybersecurity and open source stories in the news, so you won't have to. Each day, a global team of journalists contribute stories they found interesting in their daily research from the previous 24 hours. We present them to you in an easy to listen to format, making the resources available at the end of each episode so you can do a deep dive on stories you fin ...
…
continue reading
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: info@4s-ag.de https://www.4s-ag.de
…
continue reading
Cybersicherheit kann man auch hören, in unserem Podcast. Abonnieren sie uns und hören sie, was Experten aus der Branche zu sagen haben, ohne dass sie selbst ein Experte sein müssen, um es zu verstehen.
…
continue reading
We are a discord community of cyber security enthusiasts. We host various "Ask Me Anythings" and put them here for people to enjoy any time they like. Discord: https://discord.gg/r4JxpJS
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
L’heure de la cybersécurité est un podcast passionnant de sensibilisation et qui vous tient informés des dernières actualités sur la cybersécurité en Afrique et dans le monde.
…
continue reading
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
…
continue reading
Cybersecurity Thought Leader Kevin Greene, explores the latest news and developments in cybersecurity and information assurance on his debut podcast, "Cybersecurity Insights & Perspectives”... Follow him at @iamkevtorious
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Host John Bambenek discusses complex cybersecurity issues
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
Pensez cybersécurité est un balado ayant pour objectif, de sensibiliser les Canadiennes et les Canadiens aux enjeux de cybercriminalité, et de les aider à travers une série de conseils à mieux protéger leurs données en ligne. Animation : Winy Bernard
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
Welcome to "Cybersecurity for Your Mom," the podcast where Joey breaks down the complex world of cybersecurity for everyone to understand. Join host Joey Wagner as he takes you on a journey through the ever-evolving landscape of cyber security. In each installment, Joey will demystify the intricacies of cybersecurity, offering insights into current events, in-depth discussions on cutting-edge cybersecurity topics, and the latest trends in the technology industry.
…
continue reading
Byte-sized tutorials to prepare for Comptia Network+ exam, and for beginners who want to enter into cybersecurity.
…
continue reading
SAE International explores critical topics in transportation cybersecurity with industry, government, and legal experts.
…
continue reading
Ingram Micro Cloud BeNeLux presents a monthly cybersecurity podcast. In this podcast you get the hottest and latest cybersecurity updates. Every month we take a deep dive in one specific cybersecurity subject with the best experts in the business.
…
continue reading
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
…
continue reading
Find out what it takes to get your dream cybersecurity job (from the hiring managers' perspective).
…
continue reading
Kill Chain features experts and guests in the platform and vehicle cybersecurity space. Each week we'll discuss the latest in cybersecurity news as well as topics surrounding platform and vehicle cybersecurity.
…
continue reading
Cybersecurity in Yoruba - #CyberPodYoruba
…
continue reading
Wibu-Systems hat es sich zur Aufgabe gemacht, vielseitige und sichere Technologien zu entwickeln, die Herstellern von Software und intelligenten Geräten die Möglichkeit liefert ihre Produkte vor Piraterie, Reverse Engineering, Manipulation, Sabotage und Spionage zu schützen. Mit CodeMeter, einer umfassenden und preisgekrönte Suite von hardware- und softwarebasierten Lösungen, ist dies möglich.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
1
How Can You Integrate Cybersecurity Into Your Content Automation Process?
6:44
6:44
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
6:44
This story was originally published on HackerNoon at: https://hackernoon.com/how-can-you-integrate-cybersecurity-into-your-content-automation-process. You need to ensure you’re using AI safely if you hope to experience its benefits to the fullest. You can do so by following these five content tips. Check more stories related to cybersecurity at: ht…
…
continue reading
1
Game of Threats: Winning Strategies for Proactive Cyber Defense
16:22
16:22
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
16:22
This story was originally published on HackerNoon at: https://hackernoon.com/game-of-threats-winning-strategies-for-proactive-cyber-defense. Discover the ultimate guide to threat hunting with this comprehensive blog post. Uncover the 7 more popular strategies for threat hunting. Check more stories related to cybersecurity at: https://hackernoon.com…
…
continue reading
1
There’s No Excuse to Ignore Supply Chain Cyber Risk
31:55
31:55
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
31:55
In this episode, Jeffrey talks to JC Dodson, former CSO for BAE Systems and the founder of global risk, resilience, and response advisory firm JCarl Group. Jeffrey and JC discuss movies where characters are confronted with new and challenging situations, the evolution of supply chain security and the critical nature of presenting cyber risks as a b…
…
continue reading
1
Episode 82: How CIS Leadership Values Team Building Events
22:54
22:54
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
22:54
In episode 82 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by John Gilligan, President and CEO at the Center for Internet Security® (CIS®); and Gina Chapman, Chief Operating Officer at CIS. Together, they discuss the importance of in-person team building events. They use the pandemic as a frame to understand how …
…
continue reading
1
Cyber Security Today, April 24, 2024 - Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more
8:16
8:16
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
8:16
This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and password adviceOleh Howard Solomon
…
continue reading
1
The Enemy Within: Understanding Insider Threats to Cybersecurity - Ep. 94
26:31
26:31
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
26:31
What are the motivations behind insider threats? How do you mitigate their impact? From malicious insiders driven by profit or spite to negligent insiders prone to carelessness, and compromised insiders unwittingly manipulated by external forces, Rob Aragao and Stan Wisseman try to unravel the layers of this critical cybersecurity concern. Drawing …
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/6-github-repos-for-devsecops-in-2024. These are the essential building blocks and tidbits that can help you arrange for a DevSec Ops experiment or build out your own program. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can al…
…
continue reading
1
Unleashing revenue growth when scaling – Roland Siebelink, CEO at Mid Stage Institute
38:49
38:49
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
38:49
Are you struggling to align your cybersecurity product with the market's demands? Do day-to-day disagreements in your team hinder overall progress? Are you pondering how to grow sales without diluting your company's focus or overspending? These common issues can be pivotal in either propelling a cybersecurity startup to success or leading it to an …
…
continue reading
1
Overcoming Obstacles in Diverse Technological Landscapes with CEO and Co-Founder of Garland Technology, Chris Bihary
29:33
29:33
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
29:33
Join your host, CEO and President of Velta Technology, Craig Duckworth and special guest Chris Bihary, CEO and co-founder of Garland Technology, as they discuss the complexities of operational technology (OT) security within critical infrastructures. Chris shares his fascinating journey from spontaneous problem-solving to developing essential secur…
…
continue reading
1
Cyber Security Today, April 22, 2024 - Vulnerability found in CrushFTP file transfer software, security updates for Cisco's controller management application, and more
6:10
6:10
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
6:10
This episode reports on a new campaign to steal credentials from LastPass users, a warning to admits of Ivanti Avalanche mobile device management software, and moreOleh Howard Solomon
…
continue reading
1
Cyber Security Today, Week in Review for week ending Friday April 19, 2024
41:57
41:57
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
41:57
On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT departmentsOleh Howard Solomon
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 57
13:00
13:00
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
13:00
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss IoT vulnerabilities for consumers.Oleh Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
Cyber Security Today, April 19, 2024 - Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more
4:46
4:46
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
4:46
This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international, and moreOleh Howard Solomon
…
continue reading
Seriously, do you know where your data is? It’s an often overlooked question in cybersecurity. In the case of an incident, without knowing where your data is, how do you know what’s been accessed? Where else that data might be? What’s needed to remediate? And what’s less crucial to restore? But even before an incident, how do you know what to prote…
…
continue reading
1
Never touch a running system? Zeit für einen Realitätscheck in der OT-Security!
33:38
33:38
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
33:38
In unserer neuesten Podcast-Episode steht ein äußerst relevantes Thema im Fokus: OT Security. Michael und Andreas erörtern die Herausforderungen und Lösungsansätze im Bereich der Operational Technology (OT) Security. Von Legacy-Systemen über Fachkräftemangel bis hin zu unmanaged Systemen und der Angst vor Veränderung beleuchten wir die Schwierigkei…
…
continue reading
Chinese-manufactured devices in US networks see a 41% YoY increase. Ukraine-linked hackers deploy ICS malware against Russian infrastructure company. A look at cyberattacks that had physical consequences in 2023. Lessons from NERC’s GridEx exercise. Extension requested for comment period on CISA’s incident reporting rule. Guest Kate Ledesma, Senior…
…
continue reading
1
Cyber Security Today, April 17, 2024 - More suspicious attempts to take over open source projects, a data theft at a Cisco Duo partner, and more
8:25
8:25
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
8:25
This episode reports on security updates from Delinea and PuTTY, and reports on bad bots and threat actors going after Zoom meetingsOleh Howard Solomon
…
continue reading
1
Secure the Vote: Inside Election Defenses Ep. 93
38:14
38:14
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
38:14
"For nation states today their biggest bang for the buck is going to be to attack the perception of voting system security much more than the reality of voting system security." Stan Wisseman and Rob Aragao delve into the critical realm of election security with Dr. Ben Adida, the co-founder and executive director of VotingWorks, renowned for his e…
…
continue reading
1
Empowering IT and OT Teams to Improve Industrial Cybersecurity
34:32
34:32
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
34:32
Join Velta Technology’s CTO, Dino Busalachi and COO, Jim Cook, as they delve into the intricate world of IT and OT integration. Explore the challenges and transformative strategies involved in merging these critical technologies within industrial environments. Dino and Jim share their expert knowledge and decades of experience, discussing the poten…
…
continue reading
1
Cyber Security Today, April 15, 2024 - Act fast to a plug hole in Palo Alto Networks firewall, Canadian comedy festival loses over $800K in email scam, and more
8:04
8:04
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
8:04
This episode reports on a new anti-ransomware strategy, and moreOleh Howard Solomon
…
continue reading
1
Episode 12 - Remote Access Solutions: Are they a requirement or do they bring a new risk to your environment.
18:40
18:40
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
18:40
In Episode 12 of our podcast series, we delve into the world of cybersecurity, focusing on the benefits and drawbacks of implementing vendor access solutions. We kick off by exploring the pros of enhancing cybersecurity measures. From fortified security protocols to streamlined centralized management and strict compliance adherence, we uncover how …
…
continue reading
1
Cyber Security Today, Week in Review for week ending Friday, April 12, 2024
27:10
27:10
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
27:10
This episode features a discussion on Microsoft's cybersecurity troubles, worries about open source, a warning about abusing IT help desks to launch attacks and moreOleh Howard Solomon
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 56
13:28
13:28
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
13:28
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss tax fraud and how to be aware of it.Oleh Enterprise Management Associates + DEVOPSdigest
…
continue reading
1
Cyber Security Today, April 12, 2024 - A warning to Sisense customers, a new tactic for spreading the Raspberry Robin worm, and more
5:43
5:43
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
5:43
This episode reports on a new way threat actors are planting malware on GitHub, why you should watch for the running of unexpected automated scripts on your network, and moreOleh Howard Solomon
…
continue reading
1
Build trust without hyperbole: 3 vendors that get it right with Scott Taschler - Cybersecurity Product Marketer
35:52
35:52
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
35:52
Have you ever felt that hyperbolic language in your cybersecurity messaging might be doing more harm than good? Are you looking for ways to improve your marketing approach to resonate with today's savvy buyers? How can your company's messaging inspire trust rather than skepticism in a crowded cybersecurity marketplace? In this conversation, we disc…
…
continue reading
1
The Intersection of OT and ICS Security
38:18
38:18
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
38:18
In this episode, Jeffrey talks to Mike Holcomb, Fellow of Cybersecurity and the ICS/OT Cybersecurity Global Lead for Fluor — one of the world's largest construction and engineering firms. Jeffrey and Mike discuss movies highlighting the clash of two worlds and the convergence of operational technology (OT) security and industrial control systems (I…
…
continue reading
1
Episode 81: Exploring IAM for Identity Management Day 2024
31:03
31:03
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
31:03
In episode 81 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Daniel McIntyre, Identity and Access Management (IAM) Manager at the Center for Internet Security® (CIS®). Together, they acknowledge Identity Management Day 2024 with a discussion of IAM. They begin by looking at how IAM as a concept has changed over the years. They t…
…
continue reading
1
APIs at Risk: Strategies for a Safer Digital Future - Ep. 92
17:39
17:39
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
17:39
In this episode Stan Wisseman and Rob Aragao delve into the critical yet often overlooked realm of API security. APIs, the linchpin of today's digital landscape, facilitate seamless communication between diverse software components, but they also present enticing targets for cyber threats. Through real-world examples and insightful analysis, Stan a…
…
continue reading
1
Cyber Security Today, April 10, 2024 - RansomHub gang trying to extort Change Healthcare, large number of Microsoft security updates are released, and more
7:45
7:45
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
7:45
This episode reports on a warning to application developers using the Rust language, the need to unplug end of life D-Link NAS devices, and more
…
continue reading
1
Positioning Your Cybersecurity Brand to Stand Out - Shlomi Ashkenazy, Positioning Expert at Cybellum
45:58
45:58
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
45:58
Are you struggling to set your cybersecurity company apart in a crowded market? Do you find it challenging to communicate your product's unique value to the right audience? Are you curious how storytelling and personality can revolutionize your brand's image? In this conversation, we discuss: 👉 Crafting a competitive edge and message in saturated c…
…
continue reading
1
The Future of Cybersecurity Insurance with Observatory Holding’s CEO, Gerry Kennedy
40:01
40:01
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
40:01
Gerry Kennedy, CEO of Observatory Strategic Management, alongside Dino Busalachi, co-founder and CTO of Velta Technology, talk about the complex and evolving world of cybersecurity insurance. They unpack the nuances of IT and OT risk management, revealing how past incidents and technological advancements have shaped current practices. Their discuss…
…
continue reading
1
Cyber Forensics - Episode 8: The Future Landscape of Digital Forensics
4:24
4:24
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
4:24
Oleh Haja Mo
…
continue reading
1
Cyber Forensics - Episode 7: The Fascinating Convergence of Cyber Security and Digital Forensics
4:48
4:48
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
4:48
Oleh Haja Mo
…
continue reading
1
Cyber Forensics - Episode 6: The Balancing Act: Privacy Concerns in Digital Investigations
4:27
4:27
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
4:27
Oleh Haja Mo
…
continue reading
1
Cyber Forensics - Episode 5: Digital Breakthroughs
4:21
4:21
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
4:21
Oleh Haja Mo
…
continue reading
1
Cyber Forensics - Episode 4: Digital Forensics on the Dark Web
4:49
4:49
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
4:49
Oleh Haja Mo
…
continue reading
1
Cyber Forensics - Episode 3: In the Forensics Toolkit: Tools and Technology Uncovered
4:28
4:28
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
4:28
Oleh Haja Mo
…
continue reading
1
Cyber Forensics - Episode 2: Beyond the Physical: Navigating the Cybercrime Scene
4:28
4:28
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
4:28
Oleh Haja Mo
…
continue reading
1
Cyber Security Today, April 8, 2024 - Crooks are hijacking Facebook pages to spread phoney AI applications
7:34
7:34
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
7:34
This episode reports on AI and Magento scams, and moreOleh ITWCD
…
continue reading
1
Weekly Cybersecurity and Open-source News Updates
7:30
7:30
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
7:30
It's April 5th, 2024, and time for your weekly cybersecurity and open-source news updates. We have news updates from Trac Bannon in Camp Hill, Pennsylvania, Julie Chatman in Washington, DC, Katy Craig in San Diego, California, Edwin Kwan in Sydney, Australia, and Olimpiu Pop in Transylvania, Romania. We'll start with Julie Chatman Resources and 300…
…
continue reading