Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
  continue reading
 
Strictly Cyber is your go-to podcast for cutting through the jargon and making cybersecurity simple, practical, and relevant. Whether you’re a business owner, manager, or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cybersecurity concepts, real-world threats, and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly ...
  continue reading
 
Artwork

1
CMMC News by Jun Cyber

Wilson Bautista Jr.

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Artwork

1
South West Cyber Beat

South West Cyber Resilience Centre

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
We are a Police led not for profit company. We offer simple, free and easily understood cyber security guidance for small and medium sized businesses. Remember it doesnt have to be complicated or expensive to give your business the cyber protection and peace of mind that you need. All this from industry experts who partner with us in the cyber security arena.
  continue reading
 
Artwork

1
Cybertraps Podcast

Frederick Lane & Jethro Jones

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!
  continue reading
 
Artwork

1
IpX True North Podcast

IpX - Institute for Process Excellence

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The IpX True North Podcast is a global industry resource for all things people, processes, systems, and technology created to share conversations with our network of thought leaders, innovators, and founders changing the shape of the digital future. Here we share their stories, impact, vision and tools for success in the areas of process optimization, engineering, the model based enterprise, operational excellence, and digital transformation.
  continue reading
 
Artwork
 
The latest AI and cybersecurity conversations to help you achieve digital greatness to grow your organizations, empower your teams, and protect your data, all delivered from your host Sagar Pandya.
  continue reading
 
I'm Andy Poulton and I've been marketing online since 1999. Listen to my podcasts to learn a little more about a wide range of digital marketing and online security security issues. I talk about Search Engine Optimisation - SEO Google Ads, Facebook Ads and other forms of Pay per Click - PPC Social Media Marketing Email Marketing Video Marketing Web Design and Web Usability Cyber Security Passwords and Password Security And quite a bit more
  continue reading
 
Welcome to "Empower & Elevate Podcast," your destination for personal and professional growth. Join me, Marc Thomas, for inspiring conversations with business owners and leaders who share their triumphs. Dive into topics like reinvention, evolution, learning, and leadership. This podcast offers practical insights to fuel your journey. Our guests bring invaluable experiences, and I'll share my commitment to continuous improvement through personal monologues. Explore the depths of reinvention ...
  continue reading
 
PJO Insurance Brokerage is a full-service independent insurance agency that specializes in providing personalized insurance solutions for individuals and businesses. With our brokers having over 60 years of combined insurance experience, at PJO Insurance Brokerage, we take pride in the fact that we put our clients’ needs first and foremost. PJO Insurance Brokerage 4103 East Prickly Pear Trail Phoenix, Arizona 85050 480-680-9951 https://pjobrokerage.com/
  continue reading
 
Artwork

1
Forged In Security

Andrew Hoffritz

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
It’s easy to get lost in the space that is cybersecurity which encompasses dozens of specialty areas that can be further segmented into more than 50 career roles. Andrew Hoffritz, a cybersecurity enthusiast and professional, interviews a diverse selection of cybersecurity-minded professionals worldwide each month and pulls back the curtain on how to break into the cybersecurity field, discussing unique skills and why cybersecurity is a continuously growing field. Each episode contains powerf ...
  continue reading
 
The Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the ever-evolving realm of technology and digital innovation. Each episode is a treasure trove of knowledge, focusing on critical areas such as cybersecurity, the intricacies of SEO, and the latest advances in the digital world. Greg's expertise as a technical advisor shines through as he explores the nuances of digital marketing, offering listeners an in-depth understanding of the skills needed to stay ahead in t ...
  continue reading
 
Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI). Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers.
  continue reading
 
Artwork

101
Alongside

NorthStandard

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
NorthStandard‘s podcast features thought-provoking discussions on news and topics in the maritime industry. We talk with experts from the club and special guests in the field from around the world
  continue reading
 
‘Tech Insurance Leaders’ – the podcast that positions you at the forefront of the digital insurance landscape. Our host Louisa Weix, Managing Partner at TittmannWeix, interviews Chief Claims Officers, Tech Officers, Claims Directors, and other insurance professionals about: - Cutting-edge insurance products - Complex issues surrounding AdTech and Media Claims - Artificial Intelligence - Data Security, and more. Here, you’ll gain the knowledge and guidance you need to thrive in the fast-paced ...
  continue reading
 
Essential listening for the broadcast production, journalism and technology communities. Your guide to everything from editorial and craft skills to taking your next step in the industry. Practical advice on all aspects of TV, radio, journalism.
  continue reading
 
Chaos and Shadow is a weekly paranormal podcast hosted by Kyle Dempster and Brittany "Pagan" Adkins exploring high strangeness through interviews with today's leading minds in the paranormal and the occult. Visit https://www.revelatornetwork.com/ for more information. Based out of Butler, PA (near Pittsburgh), Chaos and Shadow pushes the envelope of investigative techniques with weekly seances on Twitch!
  continue reading
 
Artwork

1
Fortinet Cybersecurity Podcast

Fortinet Cybersecurity Podcast

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
  continue reading
 
Loading …
show series
 
Welcome to the very first episode of Strictly Cyber! In this episode, we're diving straight in with a clear and easy-to-understand breakdown of Cyber Essentials. Think of it as your business's Cyber MOT, making sure you have the fundamental security measures in place to protect yourself from some of the most common cyber threats. We'll cover what C…
  continue reading
 
Implementing the UK Cyber Governance Code of Practice with IASME Cyber Assurance In this episode, we discuss the crucial topic of cyber governance for business leaders. With 74% of large businesses and 70% of medium businesses in the UK experiencing a cyber breach in the past year, boards are now clearly expected to lead on cyber risk. In response,…
  continue reading
 
Send us a text Ever searched frantically for glasses perched on your head or keys clutched in your hand? These everyday moments reflect a deeper truth about human perception: scotomas—cognitive blind spots that hide crucial realities in plain sight. In this eye-opening conversation, we explore how these blind spots create resistance and limit our p…
  continue reading
 
Send us a text 🚨 Working with the Department of Defense or handling Controlled Unclassified Information (CUI)? Here’s what you need to know about the DOD’s new approach to NIST SP 800-171 Revision 3 ODP values. Just listened to the latest episode of CMMC News, where the hosts did a deep dive into the recent DOD memo standardizing “Organization Defi…
  continue reading
 
In this episode, we'll dive into the importance of securing the right insurance coverage for your establishment, whether it's a restaurant, bar, or night club, in Orange County, California. PJO Insurance Brokerage in California, as an independent agency, can find the right program for your establishment. In today’s restaurant, bar, or nightclub env…
  continue reading
 
When you cross a border, do your digital rights come with you? In this eye-opening episode of the Learn Online Security Podcast, host Tamara Michèle is joined by IT expert and founding member Chris Howells to unpack the reality of border security and personal privacy when travelling internationally—especially for Canadians heading to the U.S. 💡 Can…
  continue reading
 
Send us a text Kindness might be the most undervalued currency in our fast-paced world. This conversation explores how approaching situations with positivity can transform not just outcomes, but our entire experience. When travel plans go awry or technology fails, our first instinct might be frustration. Yet, as personal stories reveal, treating th…
  continue reading
 
Tune into this episode for a deep dive into the UK government's Cyber Governance Code of Practice. This Code is a crucial resource designed specifically for boards and directors. Understanding it can significantly benefit your organisation. By listening, you will gain insights into: • Why cyber governance is essential for modern businesses and orga…
  continue reading
 
Dr. Avishkar Misra shares his expertise on implementing AI effectively in businesses and explains how his company Berrijam is making AI accessible, explainable, and useful for organizations of all sizes. • AI is not just one solution but a set of tools, techniques, and frameworks that allows for intelligent decision-making at various scales • Berri…
  continue reading
 
What does airport security have to do with protecting your online identity? 🛫💻 Plenty, actually. In this episode, we chat with Dan Tinari from Yale’s Information Security Office, who breaks down identity and access management (IAM) in a way that actually makes sense—and might even make you smile. 😄 Whether you're logging in at Yale or keeping your …
  continue reading
 
Send us a text "Community is not about belonging. It’s about belonging to something that makes belonging matter." This powerful distinction lies at the heart of our conversation about what genuine community means in today’s business landscape. When businesses confuse having customers with having community, they miss the transformative power of auth…
  continue reading
 
This episode features a popular panel from the Inch360 event in Spokane, Washington. The panelists discuss what they've learned from various cybersecurity breaches. The panel includes experts from academic institutions and cybersecurity firms sharing insights on breach management, communication, and prevention tactics. We’re thrilled to be sponsore…
  continue reading
 
What happens when a good employee makes a bad click? 💻💥 With an emphasis on preventing cyberattacks and ensuring team members feel valued even after a mistake, LEADERSHIP EXPERTS, David and Valerie McInnes share insights on how businesses can safeguard themselves in the ever-changing world of technology. From phishing attacks to ransomware, they di…
  continue reading
 
Send us a text What happens when you sell the business you've built from the ground up? More importantly, who will take care of the clients who’ve trusted you for years? These questions lie at the heart of a powerful conversation about the human side of business exits. While most discussions around mergers and acquisitions focus on valuation multip…
  continue reading
 
In this episode, Steve Hobbs, the Washington Secretary of State discusses the importance of election security in Washington at the Inch360 event in Spokane. He outlines his background and experience in cybersecurity and military intelligence, before delving into the intricate processes and measures taken to ensure election security. This episode in…
  continue reading
 
Deploying new CPS devices and applications is an often-overlooked part of reducing corporate risk, as it sets the stage for making efficient ongoing vulnerability remediation and cyber hygiene. Join Vince and Angela as they discuss the most important steps you should take in setting things up properly for sustainable cyber hygiene. Sponsored by Via…
  continue reading
 
Send us a text What does it take to build a successful career in the technology channel? The answer might surprise you. It's not technical prowess—or even owning a computer. It's relationships. The journey from industry outsider to respected insider shows how a few key connections can completely transform your career. Entering the MSP ecosystem wit…
  continue reading
 
In this episode, Grant Erickson, CEO of Intellitech, leads a panel discussion on AI and cybersecurity at the Inch360 event in Spokane, Washington. The discussion features insights from industry experts Kevin Bostigan, John Shovick, and Garrett Oaken, exploring topics from AI's role in forensics and manufacturing to the challenges of generative AI a…
  continue reading
 
Are you aware of the trail of breadcrumbs you're leaving behind? From social media profiles to online search history, every click, like, and share contributes to your digital footprint. Print media can even be used to build a profile about you, your family or your company. These loose threads can unravel more about you than you’d like. In this epis…
  continue reading
 
Send us a text What happens when someone pushes the boundaries of their potential? Ashley's journey—from working in a hot dog factory to becoming a Vice President of Human Resources—is a testament to the power of self-belief and determination. Raised in a blue-collar family with no clear path to college, Ashley never envisioned an executive career.…
  continue reading
 
Is your organisation ready for the quantum revolution? This episode delves into the looming threat of quantum computing to current cybersecurity, explaining how powerful quantum computers could break widely used encryption like RSA and ECC, potentially by the early to mid-2030s. Understand the "harvest now, decrypt later" attacks that could expose …
  continue reading
 
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. On this episode, Jethro Jones interviews Peter Gregory, a keynote speaker from the conference. Peter discusses AI governance, highlighting the importanc…
  continue reading
 
This episode features Graham Moorhead, CEO of Pangean and adjunct professor at Gonzaga University, speaking live about the advancements and impact of AI, particularly in the context of cybersecurity. He explains the concepts of Type 1 and Type 2 AI, human modes of thought by Daniel Kahneman, and the challenges and potentials of AI in terms of safet…
  continue reading
 
Send us a text 🔍 Want to stay ahead in the world of government contracts and cybersecurity? Dive into our latest CMMC News episode where we explore the NIST SP 800-171 DoD Assessment Requirements. It's all about breaking through the wall of acronyms and jargon to ensure you know exactly what the Department of Defense expects when it comes to protec…
  continue reading
 
Send us a text We just dived deep into the Department of Defense's NIST SP 800-171 assessment requirements. This is crucial for any contractor involved with DoD contracts, especially when it comes to cybersecurity. Here are three key takeaways: Assessment Frequency: If you're implementing NIST SP 800-171, make sure you have a recent assessment cond…
  continue reading
 
Send us a text Hello LinkedIn community! 🌐 As we delve deeper into the cybersecurity requirements for Department of Defense (DOD) contracts, understanding DFARS Clause 252.204-7012 is crucial. It outlines safeguarding covered defense information (CDI) and protocols for cyber incident reporting. Here are three key takeaways for businesses and contra…
  continue reading
 
Send us a text The difference between business survival and failure often comes down to one thing: the people you hire. In this candid conversation, we dive into why grit beats impressive resumes every time. Our guest, who built and sold two companies before 40, shares how their hiring philosophy evolved through both wins and hard lessons. "I'd rat…
  continue reading
 
In this episode of the Future Thinking mini-series from NorthStandard, Helen Barden is joined by Kimberly Tam of the Alan Turing Institute and the University of Plymouth discuss the prevalence of cyber attacks in the maritime industry and the role of AI in defending against these threats. The conversation explores the types of cyber attacks common …
  continue reading
 
NorthStandard’s Helen Barden discusses the transformative role of AI in the shipping industry with Professor Adam Sobey from the Alan Turing Institute. Professor Sobey explains the basics of artificial intelligence, machine learning, and data science, emphasising their applications in ship design, manufacturing and operations. The conversation expl…
  continue reading
 
In this episode of Future Thinking, Thetius founder Nick Chubb talks to NorthStandard’s Helen Barden about the transformative impact of digitalisation and decarbonisation on the maritime industry. They explore the challenges and opportunities of integrating new technologies, the importance of data quality and standardisation and the role of regulat…
  continue reading
 
In this first episode of Future Thinking Season Three, Mike Salthouse explores the impact of new technologies on the maritime industry with futurist K.D. Adamson. The discussion addresses the misconception that technology alone will shape the future, emphasising that values and adaptability are critical. Topics covered include the vulnerabilities o…
  continue reading
 
Passwords are out, and passkeys are in! But what exactly are passkeys, and why should business leaders care? In this episode, we break down passkeys in plain English—no tech jargon, just clear and practical insights. You'll learn: ✅ What passkeys are and how they work ✅ Why they’re more secure (and easier) than passwords ✅ How passkeys can protect …
  continue reading
 
Sarah Howells shares EYE-OPENING TRUE STORIES that reveal how misplaced trust can lead to danger and why recognizing the warning signs of grooming is vital to protecting our loved ones. We discuss online safety tips and the value of staying aware even in our physical communities. In this episode of Learn Online Security Podcast we learn why it’s so…
  continue reading
 
🔹 Episode Overview: For decades, the construction industry has made physical safety a top priority. Over time, mental well-being has also been recognised as a critical part of workplace safety. But now, a new challenge is emerging—one that many construction businesses aren’t prepared for: Cyber Safety. In this episode, we discuss the findings of ou…
  continue reading
 
Send us a text Have you ever noticed how much time you spend lost in your own head, caught in cycles of negative thinking? Almost 55% of our waking hours are spent in rumination, often leading to self-criticism that erodes self-esteem and contributes to depression. The key to breaking free lies in understanding that we already have the tools to esc…
  continue reading
 
In this episode, we’ll help you understand the process of filing a workers’ compensation claim in Nevada. If you need further assistance or guidance, trust us to provide expert advice and tailored insurance solutions. Need help navigating your Nevada workers’ compensation claim? Contact us for expert guidance tailored to your situation. Call us at …
  continue reading
 
Send us a text 🌟 Just listened to another insightful episode of the CMMC News podcast, where the hosts take a deep dive into the complexities of CMMC, focusing on ESPs, SPAs, and VDIs. Here's what stood out to me: 🔍 Key Takeaways: Scoping ESPs in CMMC: The involvement of External Service Providers in the CMMC assessment depends largely on their int…
  continue reading
 
Send us a text 🚀 Exciting Insights from Our Latest Deep Dive on the CMMC News Podcast! 🎧 In our newest episode, we unpack the intricacies of the Cybersecurity Maturity Model Certification (CMMC) and its alignment with NIST standards, essential for those engaged with Department of Defense contracts. Dive into the details with us as we explore practi…
  continue reading
 
Send us a text 🚀 New Episode Alert: Navigating CMMC Compliance with ESPs and Inherited Controls 🚀 In our latest episode of CMMC News, we dive deep into the complexities of CMMC compliance and how to effectively manage the relationship with your External Service Providers (ESPs). This episode is packed with insights that are crucial for any DOD cont…
  continue reading
 
In this episode, host Jethro Jones is joined by Kenny Gluck. Kenny, a senior IT consultant at isOutsource, shares insights on IT consulting, common cybersecurity threats, and essential security practices for small and medium-sized businesses. The discussion also covers the importance of endpoint detection and response, email protection software, an…
  continue reading
 
Send us a text Step into Adobo Boy in Grand Rapids, and you're instantly welcomed with a question that defines Filipino hospitality: "Have you eaten?" More than just a restaurant, Adobo Boy is a celebration of tradition, family, and bold Filipino flavors. Founders Ray and Jackie started by cooking for friends, then grew through cultural festivals a…
  continue reading
 
Loading …
Listen to this show while you explore
Play