Information Security publik
[search 0]
Lebih

Unduh Aplikasinya!

show episodes
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Principal Security Consultant at FRSecure and a 20+ year veteran of the industry. Hosting things ...
 
Pwned is a weekly information and cyber security podcast addressing real-world security challenges. Occasionally funny, always informational, and driven by those who live and breathe security. Each episode we dive into the latest and greatest in technology, security frameworks, best practices, and how-tos. We’ll chat with industry leaders to learn how they got to where they are, what they see coming, and how they learned from their mistakes.
 
This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.
 
BASIC is the only peace and security non-governmental organization that is British-American in composition and focus. With programs that address diplomacy and decision-making around nuclear weapons, we work on both sides of the Atlantic to encourage sustainable transatlantic security policies and to develop the strategies that can achieve them. We have charitable status in the United Kingdom and in the United States. We operate with offices in London and Washington, a small but committed sta ...
 
Loading …
show series
 
In this episode of "Cybersecurity Unplugged," Tim Danks of Global Risk Perspectives discusses issues around trusting our global supply chain, including the role of Huawei, the steps needed to secure critical infrastructure, and the process for determining a comfortable level of risk management.Oleh HealthcareInfoSecurity.com
 
In this Breach of the Week episode, Justin and Jack share the story of how 600 million USDC was stolen from Axie Infinity, as well as some other crypto catastrophes with the purpose of deciding whether cryptocurrency has the stability and safety to move from its current second-class status to a legitimate, recognized, form of practical currency. If…
 
Episode 175 of the Unsecurity Podcast is now live! This week, Evan is once again joined by FRSecure CTO, Oscar Minks, to discuss the talent shortage in cybersecurity, and what can be done to help fill these key roles with qualified professionals. Give episode 175 a listen or watch and send any questions, comments, or feedback to unsecurity@protonma…
 
ORIGINALLY AIRED ON APRIL 18, 2022 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2022-04-18 02:05 – Current Activity | CISA | https://www.cisa.gov/uscert/ncas/current-activity 02:58 – CISA orders agencies to fix actively exploited VMware, Chrome bugs | https://www.bleepingcomputer.com/news/security/cisa-orders-agenc…
 
A new initiative aims to create a standards-based nationwide patient credential and matching ecosystem to ultimately improve matching patients with their electronic health information, says Scott Stuewe, CEO of DirectTrust, the nonprofit, vendor-neutral organization that is leading the effort.Oleh GovInfoSecurity.com
 
A new initiative aims to create a standards-based nationwide patient credential and matching ecosystem to ultimately improve matching patients with their electronic health information, says Scott Stuewe, CEO of DirectTrust, the nonprofit, vendor-neutral organization that is leading the effort.Oleh HealthcareInfoSecurity.com
 
Many experts advise organizations to pivot from a maturity-based approach to a risk-based approach to cybersecurity. Tia Hopkins, field CTO and chief cyber risk strategist at eSentire, discusses where the maturity-based approach falls short and how a risk-based approach can help organizations.Oleh GovInfoSecurity.com
 
Many experts advise organizations to pivot from a maturity-based approach to a risk-based approach to cybersecurity. Tia Hopkins, field CTO and chief cyber risk strategist at eSentire, discusses where the maturity-based approach falls short and how a risk-based approach can help organizations.Oleh CareersInfoSecurity.com
 
Many experts advise organizations to pivot from a maturity-based approach to a risk-based approach to cybersecurity. Tia Hopkins, field CTO and chief cyber risk strategist at eSentire, discusses where the maturity-based approach falls short and how a risk-based approach can help organizations.Oleh HealthcareInfoSecurity.com
 
Many experts advise organizations to pivot from a maturity-based approach to a risk-based approach to cybersecurity. Tia Hopkins, field CTO and chief cyber risk strategist at eSentire, discusses where the maturity-based approach falls short and how a risk-based approach can help organizations.Oleh BankInfoSecurity.com
 
Many experts advise organizations to pivot from a maturity-based approach to a risk-based approach to cybersecurity. Tia Hopkins, field CTO and chief cyber risk strategist at eSentire, discusses where the maturity-based approach falls short and how a risk-based approach can help organizations.Oleh CUInfoSecurity.com
 
New Health Sector Coordinating Council guidance aims to help medical device makers improve their communications regarding security vulnerabilities in their products, says Matt Russo, a security leader at Medtronic and a member of the task group that developed the document.Oleh GovInfoSecurity.com
 
New Health Sector Coordinating Council guidance aims to help medical device makers improve their communications regarding security vulnerabilities in their products, says Matt Russo, a security leader at Medtronic and a member of the task group that developed the document.Oleh CareersInfoSecurity.com
 
New Health Sector Coordinating Council guidance aims to help medical device makers improve their communications regarding security vulnerabilities in their products, says Matt Russo, a security leader at Medtronic and a member of the task group that developed the document.Oleh HealthcareInfoSecurity.com
 
The latest edition of the ISMG Security Report analyzes what lessons cybersecurity leaders can learn from the Russia-Ukraine war. It also examines the Okta data breach and Lapsus$ attack and describes how tech companies are supporting new developments in the FIDO protocol.Oleh HealthcareInfoSecurity.com
 
Episode 174 of the Unsecurity Podcast is now live! This week, Evan is joined by Oscar Minks, FRSecure's CTO to discuss the recent news on increasing concern around Russian cyber-threats in the United States. Give episode 174 a listen or watch and send any questions, comments, or feedback to unsecurity@protonmail.com. Don't forget to like and subscr…
 
Following the National Collegiate Cyber Defense Competition (NCCDC), Justin and Jack talk with their director, Dwayne Williams, about the competition, his own history, and some insights on the next generation of security leaders. We even get his well-honed view of the likely future of the cybersecurity space and threats within it. A special thank y…
 
Healthcare sector organizations should prepare to deal with potential hacktivist attacks tied to controversy surrounding the U.S. Supreme Court's leaked draft ruling and eventual final decision involving Roe vs. Wade, says attorney Erik Weinick of the law firm Otterbourg PC.Oleh CareersInfoSecurity.com
 
Healthcare sector organizations should prepare to deal with potential hacktivist attacks tied to controversy surrounding the U.S. Supreme Court's leaked draft ruling and eventual final decision involving Roe vs. Wade, says attorney Erik Weinick of the law firm Otterbourg PC.Oleh HealthcareInfoSecurity.com
 
Healthcare sector organizations should prepare to deal with potential hacktivist attacks tied to controversy surrounding the U.S. Supreme Court's leaked draft ruling and eventual final decision involving Roe vs. Wade, says attorney Erik Weinick of the law firm Otterbourg PC.Oleh GovInfoSecurity.com
 
Rockford Public Schools in Rockford, Illinois, was hit by Ryuk ransomware days after the school year started in September 2019. The attack encrypted more than 6 million files, wrecked applications and locked up servers. But the district kept classes running while mounting a mighty recovery effort.Oleh HealthcareInfoSecurity.com
 
Rockford Public Schools in Rockford, Illinois, was hit by Ryuk ransomware days after the school year started in September 2019. The attack encrypted more than 6 million files, wrecked applications and locked up servers. But the district kept classes running while mounting a mighty recovery effort.Oleh BankInfoSecurity.com
 
Rockford Public Schools in Rockford, Illinois, was hit by Ryuk ransomware days after the school year started in September 2019. The attack encrypted more than 6 million files, wrecked applications and locked up servers. But the district kept classes running while mounting a mighty recovery effort.Oleh CUInfoSecurity.com
 
Rockford Public Schools in Rockford, Illinois, was hit by Ryuk ransomware days after the school year started in September 2019. The attack encrypted more than 6 million files, wrecked applications and locked up servers. But the district kept classes running while mounting a mighty recovery effort.Oleh GovInfoSecurity.com
 
This ISMG Security Report analyzes the decline in the number of organizations hit by ransomware who choose to pay a ransom to the attackers. It also examines how to better protect digital identities in the healthcare sector and how security decision-makers can use metrics to achieve better outcomes.Oleh CareersInfoSecurity.com
 
This ISMG Security Report analyzes the decline in the number of organizations hit by ransomware who choose to pay a ransom to the attackers. It also examines how to better protect digital identities in the healthcare sector and how security decision-makers can use metrics to achieve better outcomes.Oleh HealthcareInfoSecurity.com
 
This ISMG Security Report analyzes the decline in the number of organizations hit by ransomware who choose to pay a ransom to the attackers. It also examines how to better protect digital identities in the healthcare sector and how security decision-makers can use metrics to achieve better outcomes.Oleh BankInfoSecurity.com
 
This ISMG Security Report analyzes the decline in the number of organizations hit by ransomware who choose to pay a ransom to the attackers. It also examines how to better protect digital identities in the healthcare sector and how security decision-makers can use metrics to achieve better outcomes.Oleh CUInfoSecurity.com
 
This ISMG Security Report analyzes the decline in the number of organizations hit by ransomware who choose to pay a ransom to the attackers. It also examines how to better protect digital identities in the healthcare sector and how security decision-makers can use metrics to achieve better outcomes.Oleh GovInfoSecurity.com
 
New industry guidance provides a detailed road map to help healthcare sector entities respond to and recover from cyberattacks involving extended IT outages, say Lisa Bisterfeldt and Kirsten Nunez, who are members of the Health Sector Coordinating Council task force that developed the resource.Oleh HealthcareInfoSecurity.com
 
New industry guidance provides a detailed road map to help healthcare sector entities respond to and recover from cyberattacks involving extended IT outages, say Lisa Bisterfeldt and Kirsten Nunez, who are members of the Health Sector Coordinating Council task force that developed the resource.Oleh GovInfoSecurity.com
 
New industry guidance provides a detailed road map to help healthcare sector entities respond to and recover from cyberattacks involving extended IT outages, say Lisa Bisterfeldt and Kirsten Nunez, who are members of the Health Sector Coordinating Council task force that developed the resource.Oleh CareersInfoSecurity.com
 
Justin and Jack are digging into the pressures and practical realities of cybersecurity investing, both from investor and company perspectives. From a need to spend to the evanescence of some valuations, the two J’s are taking party hats off of ponies and providing some advice for companies that are currently feeling the pinch of an emerging and mo…
 
Episode 173 of the Unsecurity Podcast is now live! This week, Brad and Evan are joined by Eric Hanson, FRSecure's Offensive Services Manager to discuss the differences between attack simulation services like penetration testing and red teaming, and who they're for.Oleh InfoSec Missionaries
 
In this episode of RightSwipes, Justin and Jack take a look at Security Week’s article of 40 cybersecurity company acquisitions that took place just in the month of March of 2022. If you have any questions or suggestions, send us an email at pwned@nuharborsecurity.com. If you like our content, please like, share, and subscribe! We’ll catch you next…
 
This ISMG Security Report analyzes the U.S. State Department's reward offer of up to $10 million for information about Russian military hackers implicated in NotPetya. It also examines how ransomware may evolve and the new cybersecurity draft guidance issued by the Food and Drug Administration.Oleh HealthcareInfoSecurity.com
 
This ISMG Security Report analyzes the U.S. State Department's reward offer of up to $10 million for information about Russian military hackers implicated in NotPetya. It also examines how ransomware may evolve and the new cybersecurity draft guidance issued by the Food and Drug Administration.Oleh BankInfoSecurity.com
 
Loading …

Panduan Referensi Cepat

Google login Twitter login Classic login