Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Essentials Podcasts

show episodes
 
Artwork

1
NCSC Cyber Series

National Cyber Security Centre

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Introducing the new podcast series from the National Cyber Security Centre (NCSC). Join us as we dive deep into the ever-evolving world of cyber security, bringing you discussions on topical issues, emerging trends, and expert insights from our in-house experts and external guests. Each episode offers a comprehensive exploration of a specific topic, providing listeners with valuable knowledge and actionable advice. Visit ncsc.gov.uk to find out more about the topics discussed, access additio ...
  continue reading
 
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
  continue reading
 
Artwork

1
CMMC News by Jun Cyber

Wilson Bautista Jr.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
  continue reading
 
Artwork

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork

1
South West Cyber Beat

South West Cyber Resilience Centre

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We are a Police led not for profit company. We offer simple, free and easily understood cyber security guidance for small and medium sized businesses. Remember it doesnt have to be complicated or expensive to give your business the cyber protection and peace of mind that you need. All this from industry experts who partner with us in the cyber security arena.
  continue reading
 
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
  continue reading
 
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
  continue reading
 
Artwork

1
The Pink Room with Bryony

Bryony Roberts, owner of Pragmatic Consultancy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to The Pink Room Podcast. A space for values-led professionals and business owners who want to lead with heart, act with clarity, and make a meaningful impact without losing themselves along the way. Hosted by Bryony Roberts, founder of Pragmatic Consultancy, this podcast lifts the curtain on the real work behind purpose-driven growth. Part mentor, part truth-teller, part coach in your corner, Bryony shares stories, insights, and behind-the-scenes lessons from years spent helping peo ...
  continue reading
 
Join Host Mark L. Madrid as he shares his insights on business excellence, leadership, differentiation, and adaptive strategies that resonate deeply. His energetic, dynamic leadership and innovative approaches have helped countless businesses navigate challenges, experience breakthroughs, and seize opportunities.
  continue reading
 
I'm Andy Poulton and I've been marketing online since 1999. Listen to my podcasts to learn a little more about a wide range of digital marketing and online security security issues. I talk about Search Engine Optimisation - SEO Google Ads, Facebook Ads and other forms of Pay per Click - PPC Social Media Marketing Email Marketing Video Marketing Web Design and Web Usability Cyber Security Passwords and Password Security And quite a bit more
  continue reading
 
Artwork

1
Alongside

NorthStandard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
NorthStandard‘s podcast features thought-provoking discussions on news and topics in the maritime industry. We talk with experts from the club and special guests in the field from around the world
  continue reading
 
Join Rick Watson, 20+ year eCommerce veteran and CEO & Founder of RMW Commerce, to hear all the latest in the world of eCommerce — from established players like Amazon and Shopify to the new startups, fresh off their latest round of funding. From Marketplaces to Direct-to-Consumer to Supply Chain to Payments, it’s all here. New episodes every Monday, just in time for your morning commute! Find more great content from Rick on LinkedIn: https://www.linkedin.com/in/ecommercestrategyconsulting/ ...
  continue reading
 
Pathways-2-Partnership (P2P) delivers expert insights, real-world success stories, and actionable strategies from MoveAmerica—the premier think tank for public-private collaboration. Each episode will explore innovations, partnerships, and policies that strengthen the defense industrial base, secure supply chains, and drive mission success. Created for entrepreneurs, industry executives, government leaders, and policy makers, P2P helps you navigate the acquisition processes, ethically influe ...
  continue reading
 
Artwork
 
It’s easy to get lost in the space that is cybersecurity which encompasses dozens of specialty areas that can be further segmented into more than 50 career roles. Andrew Hoffritz, a cybersecurity enthusiast and professional, interviews a diverse selection of cybersecurity-minded professionals worldwide each month and pulls back the curtain on how to break into the cybersecurity field, discussing unique skills and why cybersecurity is a continuously growing field. Each episode contains powerf ...
  continue reading
 
SquareX is excited to launch The Be Fearless Podcast Series, where we bring together industry experts and professionals from the cybersecurity community. Hosted by SquareX Founder - and cybersecurity veteran - Vivek Ramachandran, look forward to insights about our guests’ journeys in security, the evolution of the field, the changing threatscape and how enterprises across industries are addressing them today.
  continue reading
 
Artwork
 
Formerly the Joy Joya Jewelry Marketing Podcast, Marketing With Laryssa is a podcast for purpose-driven, product-based brand owners who want to build real connections with their customers. Hosted by Laryssa Wirstiuk, founder of Joy Joya and marketing strategist since 2018, the show zooms out beyond tactics to explore the bigger picture of email, SMS, and digital storytelling. With a mix of practical tips, inspiring ideas, and behind-the-scenes insights, Laryssa shares how to grow your brand ...
  continue reading
 
Artwork
 
Pam Grice, counselor/crocheter turned crochet business coach, from Crochetpreneur® and Made with a Twist™ hosts the Crochet Business Chat podcast to help you turn yarn into money. Whether you're a maker, designer, or blogger, your handmade business will benefit from these bite-sized tidbits and actionable strategies for taking your business from passion to profits. Each week, Pam and other yarn industry experts will answer your questions about creating, selling, designing, marketing, time ma ...
  continue reading
 
Welcome to Future in Focus podcast from LRQA. Risk doesn’t sleep – and neither do we. In each episode, we explore how organisations can turn business risk into opportunity, using connected risk management solutions to gain a competitive edge. From certification and cyber to sustainability and supply chains, we connect the dots across today’s complex and evolving landscape. With data-driven insight, sector expertise and a partnership approach, we help you navigate risk with clarity, stay one ...
  continue reading
 
Artwork

1
The Tech Savvy Lawyer

Michael D.J. Eisenberg

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The TechSavvyLawyer.Page Podcasts are interviews with Judges, Lawyers, and other professionals discussing utilizing technology in the practice of law. Each guest will be asked three questions and provide their three best answers to each question asked. There is no right or wrong answer as each answer may not be the right one for you. But, it may springboard an idea and help you in your own pursuit of the business we call "practicing law". I'm your host, Michael D.J. Eisenberg, the Tech-Savvy ...
  continue reading
 
‘Tech Insurance Leaders’ – the podcast that positions you at the forefront of the digital insurance landscape. Our host Louisa Weix, Managing Partner at TittmannWeix, interviews Chief Claims Officers, Tech Officers, Claims Directors, and other insurance professionals about: - Cutting-edge insurance products - Complex issues surrounding AdTech and Media Claims - Artificial Intelligence - Data Security, and more. Here, you’ll gain the knowledge and guidance you need to thrive in the fast-paced ...
  continue reading
 
Welcome to The Coverage Forge, where complex commercial insurance gets hammered into simple, actionable insights. Hosted by Jessica Weaver, CIC | CEO & Founder of Iron Valley Insurance Group in Sheridan, Wyoming, this podcast cuts through industry jargon to deliver straight-talking advice for business owners, risk managers, and entrepreneurs. Each episode, we forge real solutions to real business challenges—from navigating workers' comp and liability coverage to understanding cyber insurance ...
  continue reading
 
PJO Insurance Brokerage is a full-service independent insurance agency that specializes in providing personalized insurance solutions for individuals and businesses. With our brokers having over 60 years of combined insurance experience, at PJO Insurance Brokerage, we take pride in the fact that we put our clients’ needs first and foremost.
  continue reading
 
Artwork
 
The Banking on Data podcast is for community bank and credit union leaders who understand that the future of financial services is powered by data. Hosted by Ed Vincent, CEO of Lumio Solutions, this podcast offers executive-level insights into how financial institutions can leverage business intelligence, data strategy, and advanced analytics to drive performance, manage risk, and unlock growth opportunities. Each episode features conversations with industry leaders, data experts, and financ ...
  continue reading
 
Artwork
 
In a world where businesses and individuals leave billions of dollars unclaimed, hidden in plain sight, The Claim Hunters takes you behind the scenes with the experts who recover what others overlook. From uncovering unclaimed property to investigating complex fraud schemes, we’ll dive into real stories of high-stakes financial recoveries, the tools used by industry-leading professionals, and the strategies that help businesses and individuals recover lost assets. Whether it’s insurance clai ...
  continue reading
 
Artwork

1
Fortinet Cybersecurity Podcast

Fortinet Cybersecurity Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
  continue reading
 
Welcome to **Mind the Breach**, the podcast series designed to protect your UK small business from the costly threat of payment fraud. I'm Sarah, and in this essential series, **The Phantom Invoice: Protecting Your UK Small Business from Payment Scams**, we're diving deep into the number one cyber threat facing businesses like yours across the UK. Are you a small business owner, director, or sole trader worried about cunning scams that could wipe out your hard-earned profits? Then this show ...
  continue reading
 
Loading …
show series
 
Today on our show: Black Friday Cyber Monday - You Devil You! Sam Altman Calls a Code Red to Stop Google Threat Amazon and Visa Partner on Agentic Payments Nike CEO Purges John Donahoe’s Lieutenants - and finally, The Investor Minute which contains 3 items this week from the world of venture capital, acquisitions, and IPOs. Today's episode is spons…
  continue reading
 
A comprehensive guide to understanding and developing applications using blockchain technology. The book covers fundamental blockchain concepts, including its history, core components, and various consensus mechanisms like Proof of Work and Proof of Stake. It further explores key platforms like Bitcoin and Ethereum, detailing their architecture, tr…
  continue reading
 
A guide for white-hat hackers participating in bug bounty programs. It covers fundamental concepts like bug bounty platforms, methodologies, and the process of reporting vulnerabilities effectively. The text explores various common web application vulnerabilities in detail, including Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), SQ…
  continue reading
 
Explores the transformative potential of Blockchain technology, particularly in e-governance and various enterprise applications. It begins by detailing the foundational concepts of Blockchain, including its cryptographic principles, consensus mechanisms, and different platform types like Ethereum and Hyperledger Fabric. The document then highlight…
  continue reading
 
A comprehensive guide for developing web, cloud, and microservices applications using Java MVC. It introduces the fundamental Model-View-Controller (MVC) design pattern, tracing its history and adaptation for web applications, especially within the Java EE/Jakarta EE ecosystem utilizing JSR-371. The text covers practical aspects of setting up a dev…
  continue reading
 
Focusing on practical applications of machine learning (ML) within the Amazon Web Services ecosystem. The content systematically covers the exam syllabus, starting with ML fundamentals like modeling pipelines, supervised and unsupervised learning, and data splitting strategies to prevent overfitting and underfitting. It then details various AWS ser…
  continue reading
 
In the this episode of Pathways-2-Partnership, MoveAmerica Program Manager Athena Powell pulls back the curtain on the critical question of “what’s next” once you’ve selected a mentor, signed your Mentor-Protégé Agreement (MPA), and received a contract award. With Athena's guidance, you’ll learn how to set your business up for success when it comes…
  continue reading
 
Offers an extensive guide to implementing VXLAN BGP EVPN fabrics, focusing heavily on the spine-and-leaf architecture in data center networking. It details the logical and physical components necessary for fabric creation, including the configuration of the underlay network using protocols like OSPF and IS-IS, and establishing the overlay network w…
  continue reading
 
Today on our show it’s no news, just thank yous. It’s been a roller coaster of a year for everyone, and despite everything, you have tuned in. Walking your dog, on the way to work, even in the shower you were there. Listening, laughing, cringing, and hopefully, even learning. I started this podcast back in 2021 and look forward to doing it for many…
  continue reading
 
A comprehensive guide for designing and developing enterprise Python code. It covers a vast array of topics, including best practices for code structure and quality (e.g., commenting, naming conventions, and PEP 8), effective use of Python data structures (lists, dictionaries, sets, and tuples), and object-oriented programming concepts (classes, in…
  continue reading
 
Detailing the configuration and use of Traefik as an API gateway in a microservices environment. The text explains the shift from monolithic to microservices architecture and the need for dynamic gateway solutions like Traefik, which offers features such as load balancing (Round Robin, Weighted Round Robin, Mirroring) for HTTP, TCP, and UDP traffic…
  continue reading
 
Welcome to TSL Labs Podcast Experiment. 🧪🎧 In this special "Deep Dive" bonus episode, we strip away the hype surrounding Generative AI to expose a critical operational risk hiding in plain sight: the dangerous confusion between "Open" and "Closed" AI systems. Featuring an engaging discussion between our Google Notebook AI hosts, this episode unpack…
  continue reading
 
An extensive overview of systems analysis and design, primarily focusing on the tenth edition of a textbook on the subject, likely by Kendall and Kendall. The content comprehensively covers the phases of the systems development life cycle (SDLC), including project management techniques such as feasibility analysis, PERT diagrams, and various conver…
  continue reading
 
Texas State standouts Brianna Miranda and Matthew Duran (HBSA execs, McCoy College of Business) share how family, faith, and familia turn campus leadership into real-world edge—networking at scale (350+ members!), first-gen courage, tech and finance ambitions, and why taking the leap beats playing small. It’s optimism you can feel—and a nudge to in…
  continue reading
 
Field CISO John Carse of SquareX sits down with Jeremy Ladner of The CISO Signal to discuss the critical art of storytelling in cybersecurity leadership. In this episode of Be Fearless podcasts, Jeremy reveals why facts alone fail in the boardroom and how AI is rewriting the rules of social engineering and fraud. The conversation covers why hackers…
  continue reading
 
A detailed overview of the various phases, concepts, and tools involved in the Systems Development Life Cycle (SDLC). The text covers organizational topics such as the role and required skills of a systems analyst, the structure of the IT department, and strategic planning, including cost-benefit analysis and feasibility studies. It extensively exp…
  continue reading
 
An extensive guide to computer hacking for beginners, detailing various types of hackers, including Black Hat, White Hat, and Grey Hat practitioners. It thoroughly explains the most popular hacking technique, social engineering, outlining different forms such as Phishing, Impersonation, Vishing, and Smishing, which exploit human vulnerabilities. Fu…
  continue reading
 
A comprehensive technical overview of synchronization and timing solutions within telecommunications, with a specific focus on 4G and 5G mobile networks. It explores the historical necessity of synchronization, progressing from frequency alignment for digital networks to the modern requirement for phase and time synchronization driven by mobile bas…
  continue reading
 
Today on our show: Shopify Winter Editions 2025 Special Podcast - and finally, The Investor Minute which contains 5 items this week from the world of venture capital, acquisitions, and IPOs. Today's episode is sponsored by Mirakl. https://www.rmwcommerce.com/ecommerce-podcast-watsonweekly This podcast uses the following third-party services for ana…
  continue reading
 
Host John Carse, Field CISO of SquareX sits down with James W., Valens Global Analyst and creator of the Smoke Signal Newsletter and Burn Signal Podcast. In this episode of The Be Fearless podcast, they discuss the concept of "digital exhaust" and how invisible data trails are weaponized into "weapons of mass disruption". James shares insights from…
  continue reading
 
An educational resource detailing statistical concepts foundational to machine learning, including descriptive statistics (mean, median, mode, and measures of dispersion), probability theory, and methods for parameter estimation and hypothesis testing. The book covers various analytical techniques such as ANOVA, regression models (linear, logistic,…
  continue reading
 
Episode #362 - The One December Email That Carries Your Brand Into the New Year Between December 26 and the first week of January, something subtle—but powerful—happens. The holiday chaos fades, the pace slows, and your customers start imagining a new version of themselves. And that moment? It's one of the most emotionally open windows of the entir…
  continue reading
 
A comprehensive guide for learning iOS app development, starting with the fundamentals of the Swift programming language, including variables, control flow, and collections. The book thoroughly explains the use of Apple's development tools, such as Xcode and Playgrounds, and covers key application architecture concepts like Model-View-Controller (M…
  continue reading
 
A book about building scalable data streaming solutions using various Amazon Web Services (AWS) tools, primarily focusing on the Amazon Kinesis family of services (Data Streams, Firehose, Data Analytics, and Video Streams). The content explains the core concepts of data streaming and distributed systems, detailing how to produce and consume data us…
  continue reading
 
In this TSL Labs bonus episode, we examine how the Department of Veterans Affairs is leading a historic transformation from traditional compliance frameworks to a dynamic, AI-driven approach called "cyber dominance." This conversation unpacks what this seismic shift means for legal professionals across all practice areas—from procurement and contra…
  continue reading
 
Host John Carse, Field CISO at SquareX, sits down with Andrew Crotty aka GingerHacker. In this episode of the Be Fearless podcast, Andrew provides insights into his role advising Army commanders, the evolving security landscape regarding AI agents and hallucinations, and the specific vulnerabilities found in web browsers. Andrew details the mission…
  continue reading
 
Explores several critical areas concerning the security and privacy of online platforms. The chapters discuss privacy-preserving analytics techniques for social network data, including methods like k-anonymity and differential privacy, to protect user information from breaches such as the Cambridge Analytica incident. Several sections are dedicated…
  continue reading
 
An extensive overview of security in telecommunications networks, particularly focusing on cellular systems and their convergence with the Internet. The text first establishes core security concepts and cryptographic principles before thoroughly examining vulnerabilities in both traditional voice networks and modern cellular data services like GSM …
  continue reading
 
In this episode of 'Taking on tomorrow, together,' some of NorthStandard's Leadership Group reflect on the key challenges and achievements of 2025. Despite a calmer year for claims, the club highlights the need for caution still amid global conflicts, rising costs, and political uncertainties. Discussions include the Pre Renewal Report, and the str…
  continue reading
 
Cast your vote for Cyber Sentries as Best Technology Podcast here! Bridging the AI Security Gap—Inside the Rise of Non‑Human Identities In this episode of Cyber Sentries from CyberProof, host John Richards sits down with Idan Gour, co-founder and president of Astrix Security, to unpack one of today’s fastest-emerging challenges: securing AI agents …
  continue reading
 
An extensive overview of enterprise security architecture, emphasizing a business-driven approach. It introduces the SABSA Model, a six-layer framework for developing security architectures, and explains how it guides the entire process from contextual business requirements to operational security. The text covers critical concepts like risk manage…
  continue reading
 
Host John Carse, Field CISO at SquareX, sits down with Patrick Gorman, Founder of InfosecPat. In this episode of The Be Fearless podcast, they discuss Patrick's incredible journey from a rough upbringing in Queens and working in construction to becoming a renowned cybersecurity educator with over 100,000 YouTube subscribers. Patrick gets real about…
  continue reading
 
Our next guest is Nick Tiger, Associate General Counsel at Pearl.com, Nick shares insights on integrating AI into legal practice. Pearl.com champions AI and human expertise for professional services. He outlines practical uses such as market research, content creation, intake automation, and improved billing efficiency, while stressing the need to …
  continue reading
 
An extensive overview of digital literacy and technology, covering a broad range of topics from basic computer and smartphone functionality to advanced internet applications. It introduces fundamental concepts of hardware and software, then expands into practical usage of online services like email, social media, digital maps, and e-commerce. The t…
  continue reading
 
A pocket guide offering a comprehensive overview of over 600 concepts, terminologies, and processes in the fields of machine learning and deep learning. Published in 2021, it aims to clarify the logic and mechanisms behind these concepts for data scientists, acting as a non-linear reference for both beginners and experienced practitioners. The guid…
  continue reading
 
Episode #361 - The December Email Strategy Every Ecommerce Brand Needs BFCM brings a huge influx of first-time customers—but they're not loyal yet. Many came for a deal, were curious about your brand, or were buying a gift. Now is the critical moment where you either let them go cold… or turn them into repeat buyers who stay with you into 2026. In …
  continue reading
 
A structured approach to managing third-party risk. The book covers fundamental concepts such as the CIA Triad (Confidentiality, Integrity, Availability), various cybercrime types (phishing, ransomware), and the five phases of a breach (research, intrusion, lateral movement, privilege escalation, exfiltration). It further explores the impact of the…
  continue reading
 
A comprehensive guide for technical interviews in the software industry, particularly focusing on algorithm, coding, and design questions. It offers detailed strategies for interview preparation, including how to approach problems, optimize solutions, and understand time and space complexity (Big O notation). The text provides interview-specific ad…
  continue reading
 
Listen in as Google's Notebook LLM provides an AI-powered conversation unpacks our December 1st, 2025 editorial examining how the holiday digital marketplace transforms into a lucrative hunting ground for device compromise and credential theft. We explore why attorneys and paralegals—trained to spot hidden clauses and anticipate risk—often abandon …
  continue reading
 
A comprehensive overview of computer networking principles and technologies. The text explores foundational concepts such as gateways, routers, and network layers, alongside detailed examples of various networks like the Internet (including ARPANET's history and evolution of traffic), mobile phone networks (1G-5G), and wireless LANs (IEEE 802.11). …
  continue reading
 
Frost & Sullivan’s Swetha Krishnamoorthi joins Audrey Adeline from SquareX Founder's Office to unpack emerging browser-based threats, including AI-driven phishing, encrypted last-mile exploits, malicious digital assets, and the rise of autonomous AI agents. She explains how Zero Trust browsers evolve beyond isolation, what organizations overlook to…
  continue reading
 
In this episode of Be Fearless, Aleksandra Melnikova from the SquareX founder’s office speaks with Jim Rutt, CIO and CISO of the Dana Foundation. Jim traces his 25-year journey from marketing to data analytics to leading technology strategy in a major nonprofit, sharing how cybersecurity has shifted from HIPAA compliance to tackling AI-driven threa…
  continue reading
 
A practical guide for investigating computer crimes, focusing on methodologies and tools for digital evidence acquisition and analysis. The text covers a broad range of topics, including the basics of hard drives and storage media, various data hiding techniques like encryption and steganography, and the identification and handling of hostile code …
  continue reading
 
Host Aleksandra Melnikova of Founder's Office at SquareX sits down with John Rojas, Vice President, IT, of Air Lease. In this episode of The Fearless Podcast, they discuss John's fascinating transition from Marine Corps communications to managing cybersecurity for one of the world's largest aircraft leasing companies. John shares insights on protec…
  continue reading
 
A comprehensive overview of penetration testing concepts and methodologies, covering various attack types and the tools used by security professionals. They detail social engineering techniques like phishing, vishing, smishing, and physical exploits such as dumpster diving and badge cloning. The sources also explore different penetration test scope…
  continue reading
 
In this episode of the Be Fearless podcast, SquareX Field CISO John Carse sits down with Girard Kavelines and discusses how starting out on the help desk gave him fresh perspectives and practical insights that later shaped his work as a Network/Security Engineer. Girard also elaborates on other topics, schaas how blogging and content creation at Te…
  continue reading
 
🙏 Special Thanks to Terrell Turner and the ABA for having me on the Law Practice Today Podcast, produced by the Law Practice Division of the American Bar Association. We have an important discussion on trust account management. We cover essential insights on managing trust accounts using online services. This episode has been edited for time, but n…
  continue reading
 
Offers an in-depth look at the Certified Information Systems Auditor (CISA) certification. It covers critical aspects of information systems auditing, including processes, risk management, business resilience, and security controls, with a focus on preparing candidates for the CISA exam through key concepts and self-assessment questions. The text a…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play