Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler-Santullo, Darwin Salazar, and Sean Metcalf. If you’re looking for advice and information on enterprise cybersecurity solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are for ...
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler-Santullo, Darwin Salazar, and Sean Metcalf. If you’re looking for advice and information on enterprise cybersecurity solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are for ...
…
continue reading
The Cyber Consulting Room Podcast and Meetup Network is your gateway to a world of knowledge and collaboration in the ever-evolving realm of cyber security and consulting. Our podcast, hosted by Gordon Draper, brings you in-depth interviews with industry leaders, experts, and trailblazers, offering invaluable insights, strategies, and experiences. From award-winning professionals to those paving the way for diversity in the field, we delve into the most pressing issues and emerging trends. B ...
…
continue reading
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
1
The Cyber Go-To-Market podcast for cybersecurity sales and marketing teams. Save Cybr Donut!
Andrew Monaghan
The podcast for sales and marketing teams that tackles the question: How can Cybr Donut grow ARR to $10m by the end of 2025? We talk with cybersecurity CROs, CMOs, CEOs, as well as sales and marketing experts in our movement to Save Cybr Donut. Listen in, and you will get proven strategies to - help you get more leads - win more customers, and, - create your killer go-to-market growth engine. If you are a seller, marketer, leader, CEO, or founder at a cybersecurity company, you are in the ri ...
…
continue reading
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
…
continue reading
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
…
continue reading
What are today’s most pressing criminal trends and how are compliance experts adapting to counter those threats? As financial crimes become increasingly sophisticated, compliance can no longer be just a checkbox. It’s emerged as a transformative force in every industry, reshaping practices in ethics, risk management, money laundering and cyber security. Introducing BCG on Compliance, a biweekly podcast from Boston Consulting Group where we dive deep into the minds driving that change. Hosted ...
…
continue reading
The CYBER5 is hosted by Landon Winkelvoss, Co-Founder at Nisos, and features cybersecurity and investigations industry leaders' thoughts and answers to five questions on one topic on actionable intelligence to enterprise revolving around third-party risk management, adversary research and attribution, digital executive protection, merger and acquisition diligence, brand protection, disinformation, and cyber threat intelligence.
…
continue reading
The We talk IoT podcast keeps you up to date with major developments in the world of the internet of things, IIoT, artificial intelligence, and cognitive computing. Our guests are leading industry experts, business professionals, and experienced journalists as they discuss some of today’s hottest tech topics and how they can help boost your bottom line. You can follow We talk IoT – the Internet of Things Business podcast anywhere you get your podcasts. About the host: Stefanie Ruth Heyduck i ...
…
continue reading
Looking for a career in cybersecurity, Information Technology, web design, programming? We interview the leaders in the field to give you the best information to make the decision. As an instructor of cybersecurity, I discuss the challenges and the benefits with practitioners in their fields of expertise to assist students in getting into the field they desire. As someone that has faced the same challenges, I want to make sure that you do not have the same issues.
…
continue reading
Deloitte global podcast feed
…
continue reading
A series of interviews with our staff speaking on some of the hot topics embedded within the heart of Mobius Group.
…
continue reading
It’s easy to get lost in the space that is cybersecurity which encompasses dozens of specialty areas that can be further segmented into more than 50 career roles. Andrew Hoffritz, a cybersecurity enthusiast and professional, interviews a diverse selection of cybersecurity-minded professionals worldwide each month and pulls back the curtain on how to break into the cybersecurity field, discussing unique skills and why cybersecurity is a continuously growing field. Each episode contains powerf ...
…
continue reading
Secret weapon podcast to the Law Firm Owner, Managing Partner, Legal Admin, Office Manager and IT Director on marketing, motivation, legal tech, security, work-life balance, business growth and much more.Expert advice from your colleagues who have already tackled the challenges you’ve going through right now. Their advice will help your law firm be competitive, keep your attorneys & staff productive and help you get and keep clients.Subscribe and stop going at it alone to keep your Law Firm ...
…
continue reading
A deep dive into topical Information and Communication Technology (ICT) issues from a Caribbean perspective, through interviews and group discussions with specialists, experts and people trying to make a difference in the tech space. New episodes are released every Wednesday. Show notes are available at www.ict-pulse.com
…
continue reading
Welcome to "Defending Digital Frontiers," a podcast dedicated to the fascinating, ever-evolving world of cybersecurity. Your guides on this digital journey are Andrei Lyskov, a seasoned data scientist with a passion for all things tech, and Eli Farhood, a veteran in digital risk management and finance. Andrei Lyskov, currently CEO of gnos.ai, an AI first cybersecurity consulting company and Eli Farhood worked at financial institutions like HSBC, Refco and Wells Fargo before falling victim to ...
…
continue reading
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
…
continue reading
Interviews & insights with experienced developer's across all aspects of App Development. Whether you're a veteran developer or just getting started - listen weekly as I go in depth with professionals on topics ranging from Flutter, Cyber Security, Freelancing, Android, iOS & much much more!
…
continue reading
Sit back and relax, enjoy the humor, learn something valuable and discover the creativity of many really amazing supply chain leaders. The goal of the show is to share the secret sauce to business success, which is a successful supply chain. Real Life Supply Chain Challenges & Solutions - New Tech Solutions - Great Supply Chain Connections - Life Lessons WWW.SupplyChainSecretSauce.COM• Subscription Based Supply Chain Consulting
…
continue reading
Dive deep into the dynamic marketing realm in the digital age with The Backstory on Marketing and AI, hosted by Guy Powell, the visionary President of ProRelevant Marketing Solutions. This enlightening podcast is your gateway to understanding the intricate interplay between data-driven marketing strategies and cutting-edge AI technologies. Each episode brings to the table candid and insightful conversations with some of the industry's most influential leaders and analytics experts. They shar ...
…
continue reading
Bringing you the latest news, views and experiences in Technology, Talent and Transformational change hosted by CTO, Author and leading Tech For Good advocate Prof. Sally Eaves @sallyeaves. With weekly episodes and an inspiring diversity of guests from some of the most pioneering organisations, projects and people of our time, this is Your engaging space to learn from C-Suite to Student, CIO to Academic and Enterprise to SME. Our shows focus on the latest innovations in emergent technology i ...
…
continue reading
Industry experts break down the latest news & trends in employee benefits, healthcare reform, regulations and compliance, designed to empower executive decisions.
…
continue reading
Brief conversations with entrepreneurs, innovators, and company founders
…
continue reading
1
Episode 12: How Secure Is Your Digital Life? The Alarming Reality of Tech Trust Issues
45:46
45:46
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
45:46
Can we ever truly trust the technology that runs our lives? Think about it: every time we use a phone, share a photo, or shop online, we’re putting a lot of trust in these digital systems. But how safe are they? In this episode of the Cyber Consulting Room podcast, host Gordon Draper continues his conversation with Helen Patton, a distinguished cyb…
…
continue reading
1
The $300k GRC Cyber Security Consultant | How to Pivot into GRC
1:25:11
1:25:11
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:25:11
Check out our Sponsor LevelUpInTech and start your cloud career today Click here to get started: https://levelupintech.com/tech Hi there, welcome to The Techtual Talk! I'm your host Henri and today we have a very special guest joining us - Aria, also known as "AD" on Twitter where she shares invaluable insights about being a Cybersecurity Consultan…
…
continue reading
1
How to Make the World Quantum Safe - Vadim Lyubashevsky - ESW Vault
46:10
46:10
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
46:10
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break s…
…
continue reading
1
How to Make the World Quantum Safe - Vadim Lyubashevsky - ESW Vault
46:10
46:10
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
46:10
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break s…
…
continue reading
1
CCT 173: Practice CISSP Questions - Media Protection, Encryption, and Mobile Security for the CISSP (Domain 7.5)
18:52
18:52
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
18:52
Send us a text Unlock the secrets to safeguarding your organization's most sensitive data and enhance your cybersecurity acumen. Join us on the CISSP Cyber Training Podcast as I, Sean Gerber, break down the critical importance of managing secrets within popular collaboration tools like Slack, Jira, and Confluence. Discover practical methods such as…
…
continue reading
1
We talk IoT: Securing the Future: Understanding the Cyber Resilience Act - Episode 55
38:31
38:31
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
38:31
We have an exciting and crucial topic: the Cyber Resilience Act. With us are two guests who are experts in their fields: Guillaume Crinon, Director of IoT Business Strategy at Keyfactor, and Romain Tesniere, Business Development Manager at Avnet Silica. Guillaume and Romain bring a wealth of knowledge and experience in IoT security and business str…
…
continue reading
1
TAG's Work Tracking Commercial Surveillance Vendors
23:58
23:58
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
23:58
Host Luke McNamara is joined by Clement Lecigne, security researcher at Google's Threat Analysis Group (TAG) to discuss his work tracking commercial surveillance vendors (CSVs). Clement dives into the history and evolution of the CSV industry, how these entities carry out operations against platforms like mobile, and the nexus of this problem into …
…
continue reading
1
CrowdStrike Incident Analyzed: Lessons for IT Leaders | IT Unplugged Ep. 20
15:03
15:03
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
15:03
Dive into a comprehensive analysis of the recent CrowdStrike incident that caused widespread disruptions and billions in damages. In this episode of IT Unplugged, hosts Brandon and Mike break down the technical aspects of what went wrong, explore why remote fixes were impossible, and discuss the broader implications for cybersecurity and software d…
…
continue reading
1
ICTP 318: Stepping out of your comfort zone and living as a digital nomad
1:04:27
1:04:27
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:04:27
Do you have what it takes to be a digital nomad? We revisit a 2022 conversation we had with the following intrepid travellers: Juleen Gentles, who is from Jamaica, but spoke with us from Ghana; Marsiya Issah who is from Ghana, but had been living in Barbados; and Andres Phillips, who is from Barbados, but had recently ended a 10-month stint in Colo…
…
continue reading
1
You need Helpdesk to get into Cybersecurity?
1:51:58
1:51:58
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:51:58
In this episode of The TechTual Talk , You need HelpDesk to get into CyberSecurity? Are there really entry level jobs in cyber security or do you need to work your way up first? Henri & Destini discuss a Microsoft study from 2022 highlighting productivity issues linked to excessive meetings and the potential of AI tools for transcribing and managin…
…
continue reading
1
Unsecurity Episode 224: Key Takeaways from Blackhat, Bitsloth Exploits, Windows TCP IP Flaw
33:58
33:58
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
33:58
In this episode of the Unsecurity Podcast, Brad and Megan recap Blackhat. They also discuss a zero-click exploit involving a Windows TCP IP flaw and backdoor Bitsloth exploits. Don't forget: The show is available in audio-only form wherever you listen to podcasts! Please send any questions, comments, or feedback to unsecurity@protonmail.com. About …
…
continue reading
1
CCT 172: Exploring Media Protection, Encryption, and Mobile Security for the CISSP (Domain 7.5)
30:31
30:31
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
30:31
Send us a text What if AI could be your company's best asset—and its biggest risk? Join me, Sean Gerber, on this enlightening episode of the CISSP Cyber Training Podcast, where we journey through the essentials of cybersecurity with a particular focus on media protection techniques from Domain 7.5 of the CISSP ISC² training manual. We’ll also navig…
…
continue reading
1
SaaS Security Beyond Just Misconfiguration & Expert Insights on Cybersecurity Ethics - Ed Skoudis, Maor Bin - ESW #374
32:57
32:57
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
32:57
In this interview, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the evolving landscape of SaaS Security. He highlights the challenges posed by the security gap resulting from the rapid adoption of SaaS applications and why SaaS security is beyond just misconfiguration management. Segment Resources: https://www.adaptive-shield.com/land…
…
continue reading
1
Interview with ThreatLocker: Is Application Allowlisting Making a Comeback? - Danny Jenkins - ESW #374
33:59
33:59
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
33:59
I often say that it isn't the concepts or ideas in cybersecurity that are bad, but the implementations of them. Sometimes the market timing is just wrong and the industry isn't ready for a particular technology (e.g. enterprise browsers). Other times, the technology just isn't ready yet (e.g. SIEMs needed better database technology and faster stora…
…
continue reading
1
What asset management (ITAM) looks like outside cybersecurity - Danny Jenkins, Ed Skoudis, Jeremy Boerger, Maor Bin - ESW #374
1:44:09
1:44:09
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:44:09
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
…
continue reading
1
What asset management (ITAM) looks like outside cybersecurity - Jeremy Boerger - ESW #374
37:29
37:29
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
37:29
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
…
continue reading
1
CCT 171: Practice CISSP Questions - Assessment, Compliance, for the CISSP (Domain 6.5)
16:59
16:59
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
16:59
Send us a text Unlock the secrets to mastering the CISSP exam and bolster your cybersecurity prowess with Sean Gerber in this action-packed episode of the CISSP Cyber Training Podcast! Ever wondered which assessment type is crucial for ensuring ISO 27001 compliance? Discover why internal audits are the gold standard. We'll also cover the key consid…
…
continue reading
1
Ep. 19 Nonprofit Tech Revolution: Maximizing Impact on a Shoestring Budget
20:45
20:45
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
20:45
Today on IT Unplugged, we're sharing game-changing insights for anyone navigating the complex world of nonprofit technology. I had the privilege of speaking with Abby, Executive Director of Jackie Nitschke Center, about how forward-thinking nonprofits are using IT to amplify their impact. Here's what you'll learn: · Innovative approaches to IT on a…
…
continue reading
1
ICTP 317: Education, technology in education, and readying Caribbean students for the future, with Dr Gale Rigobert
1:15:52
1:15:52
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:15:52
In our rapidly changing world, the classroom is critical in preparing upcoming generations for the life and work environment they will face in the future. Academic, former Minister for Education and international Consultant, Dr Gale Rigobert, shares her thoughts on, among other things: * the education system in the English-speaking Caribbean and ho…
…
continue reading
1
CCT 170: Assessment, Compliance, and Improvement Strategies for the CISSP Exam (Domain 6.5)
40:55
40:55
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
40:55
Send us a text Ever wondered how to ensure your organization's cybersecurity measures meet international standards? Join us for an action-packed episode as we unpack Domain 6.5 of the CISSP exam, exploring crucial assessments, tests, and audit strategies every cybersecurity professional should master. Learn the importance of choosing a consistent f…
…
continue reading
1
The MYTH about the CYBER SECURITY INDUSTRY
1:56:00
1:56:00
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:56:00
Check out our Sponsor LevelUpInTech and start your cloud career today Click here to get started: https://levelupintech.com/tech Welcome back to another captivating episode of The TechTual Talk*! Today, we're thrilled to have a special guest, Gregory Richardson, Blackberry's Vice President Global Advisory CISO , who brings a wealth of knowledge and …
…
continue reading
1
Let’s Get Real About Where AI can Help SecOps & AI, Automation & Low-Code - Mike Lyborg, Brandon Potter - ESW #373
32:22
32:22
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
32:22
Swimlane and GenAI Join Swimlane CISO, Mike Lyborg and Security Weekly’s Mandy Logan as they cut through the AI peanut butter! While Generative AI is the not-so-new hot topic, it's also not the first time the cybersecurity industry has embraced emerging technology that can mimic human actions. Security automation and its ability to take action on b…
…
continue reading
1
The end of the road for some cyber startups & making detection actually work! - Vivek Bhandari, Vivek Ramachandran, Mike Lyborg, Brandon Potter - ESW #373
2:26:35
2:26:35
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
2:26:35
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
…
continue reading
1
The end of the road for some cyber startups & making detection actually work! - ESW #373
1:17:58
1:17:58
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:17:58
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
…
continue reading
1
CCT 169: Practice CISSP Questions - Understanding Role, Rule, Mandatory, and Attribute Based Controls (Domain 5.4)
19:08
19:08
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
19:08
Send us a text Can quantum computing break your encryption overnight? Discover the profound impact of this emerging technology on cybersecurity as we decode the recently introduced FIPS 203, 204, and 205 standards. Join me, Sean Gerber, on this week's electrifying episode of the CISSP Cyber Training Podcast to understand how the US government is pr…
…
continue reading
1
Secure Web Gateways Have Failed Us & Using AI to Prevent the Next CrowdStrike Outage - Vivek Ramachandran, Vivek Bhandari - ESW #373
36:38
36:38
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
36:38
SquareX With employees spending most of their working hours on the browser, web attacks are one of the biggest attack vectors today. Yet, both enterprises and security vendors today aren’t focused on securing the browser – a huge risk given that attackers can easily bypass Secure Web Gateways, SASE and SSE solutions. This segment will demonstrate t…
…
continue reading
1
Ep. 18 - From Capri Suns to Cybersecurity: Meet M2 Technology's Newest IT Consultant
21:47
21:47
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
21:47
Join us for an insightful episode of IT Unplugged as we sit down with Stephen, M2 Technology's newest IT consultant. With a passion for technology that started at age eight, Stephen shares his journey from fixing computers for snacks to becoming a seasoned IT professional. In this episode, we explore: Stephen's unique path into IT, starting with a …
…
continue reading
1
ICTP 316: Community internet networks, ECAST and online shopping protection
55:49
55:49
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
55:49
In our August 2024 Community Chat, and with members of the Caribbean tech community, Nima Anvar, Hotelier and Chief Executive Officer of conversational AI platform GuestChat in Grenada, and Max Larson Henry, Network Engineer and Founder of the tech company, Transversal, which is based in the United States and Haiti, the panel discusses: * Community…
…
continue reading
1
Dell & Intel Layoffs Impact Thousands | Tech CEOs back track on RTO Mandate
1:04:00
1:04:00
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:04:00
Check out our Sponsor LevelUpInTech and start your cloud career today Click here to get started: https://levelupintech.com/tech Welcome to another episode of The TechTual Talk! I'm your host, HD, joined by my co-host Destini. Today, we delve into the tech world's pressing issues and intriguing developments. First up, we'll discuss the massive layof…
…
continue reading
1
CCT 168: Access Controls - Understanding Role, Rule, Mandatory, and Attribute Based Controls for the CISSP (Domain 5.4)
41:04
41:04
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
41:04
Send us a text What would you do if your social security number was compromised in a massive data breach affecting billions? In our latest episode of the CISSP Cyber Training Podcast, we unpack the alarming reality of a recent breach that exposed the personal records of 3 billion people. We provide critical advice on how to protect yourself using t…
…
continue reading
1
Operational Resilience in Healthcare & Zscaler Uncovers Record-Breaking Ransom - Marty Momdjian, Brett Stone-Gross - ESW #372
32:10
32:10
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
32:10
Many cybersecurity experts are calling recent attacks on healthcare more sophisticated than ever. One attack disrupted prescription drug orders for over a third of the U.S. and has cost $1.5 billion in incident response and recovery services. Separately, an operator of over 140 hospitals and senior care facilities in the U.S. was also victimized. T…
…
continue reading
1
Devo Launches New Capabilities & Revolutionizing Cyber Resilience - Rakesh Nair, Rekha Shenoy - ESW #372
31:43
31:43
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
31:43
Devo, the security analytics company, recently launched data orchestration, a data analytics cloud, and security operations center (SOC) workflow enhancements. Enterprise security teams are struggling with growing data volumes—and they’re also up against headcount and budget constraints. These solutions offer security teams data control, cost optim…
…
continue reading
1
Highlights from BlackHat/DefCon, Vulnerabilities, and Cyber Marketing Challenges - ESW #372
1:05:47
1:05:47
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:05:47
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
…
continue reading
1
Highlights from BlackHat/DefCon, Vulnerabilities, and Cyber Marketing Challenges - Brett Stone-Gross, Rakesh Nair, Rekha Shenoy, Marty Momdjian - ESW #372
2:08:47
2:08:47
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
2:08:47
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
…
continue reading
1
CCT 167: Practice CISSP Questions - Compliance and Vulnerability Management (Domain 4.5)
24:03
24:03
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
24:03
Send us a text How would a massive data breach at a major corporation like Boeing affect the global cybersecurity landscape? Join us on this episode of the CISSP Cyber Training Podcast, where we dissect this alarming 50GB ransomware attack and its profound implications on the industry. Additionally, we unpack the serious data compromise in Maine du…
…
continue reading