A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Cyberattacks Podcasts
Let's save the world by 2030. Our Platform for Survival aims to prevent war and weapons (especially nuclear); global warming; famine; pandemics, massive radiation exposure; and cyberattacks—and adopt "enabling measures" (global economic, security, and governance reforms).
…
continue reading
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
The Business of Tech, hosted by leading tech journalist Peter Griffin. Every week they take a deep dive into emerging technology and news from the sector to help guide the important decisions all Business leaders make. Issues such as cybersecurity, retaining trust after a cyberattack, business IT needs, purchasing SaaS tools and more. New Episodes out every Thursday. Follow or subscribe to get it delivered straight to your favourite podcatcher. @petergnz @businessdesk_nz Proudly sponsored by ...
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
Learn French with free daily podcasts, brought to you by French teachers from Paris. Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.
…
continue reading
Crazy assed 'preppers' face off serious science for a pop-culture smack down with host Wendy John - a new mum who, since having a kid, now fears everything from asteroids to zombies. Winner of Nova Entertainment's Podquest 2017.
…
continue reading
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Twisted Money Podcast is a podcast on Fraud, Scams, and Deceptions to help the listeners become better informed on fraud and cyber-attacks methods so that listeners don't become a victim of fraud and cyber-attacks.
…
continue reading
Tripwire's cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire's VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
In today's episode we have a tendency to state the most recent cyberattack on JBS and check out to quantify the impact they could wear giant businesses
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
1
The Global Demons Podcast: Pandemics, Cyberattacks, and Other Terrors in the New Age
Foreign Policy Research Instit
Hosted by best-selling author Robert D. Kaplan, this 13-episode bi-weekly podcast features interviews with preeminent foreign policy experts discussing the critical issues and challenges facing the U.S. and its allies in this new era of great power rivalry. Each episode will cover how pandemics, climate change, massive cyber-attacks, and other terrors of a global media age will affect potential conflicts between the United States and China, and the United States and Russia.
…
continue reading
The Artificial Intelligence Show (formerly The Marketing AI Show) is the podcast that helps your business grow smarter by making AI approachable and actionable. The AI Show podcast is brought to you by the creators of the Marketing AI Institute, AI Academy for Marketers, and the Marketing AI Conference (MAICON). Hosts Paul Roetzer, founder and CEO of Marketing AI Institute, and Mike Kaput, Chief Content Officer, break down all the AI news that matters and give you insights and perspectives t ...
…
continue reading
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
What risks lie at the intersection of healthcare and data? Are our food production capabilities at risk of cyberattack? How can we stay ahead of scammers, bad actors, and cybercriminals? Brought to you by the Cyber Innovation Hub and Business News Wales, and hosted by Carwyn Jones, the Cybersecurity Roundtables will bring together industry experts from across the cybersecurity landscape. These experts will discuss, on a sector-by-sector basis, the critical challenges facing the industry today.
…
continue reading
A top podcast for healthcare leaders, with over one million downloads, Radio Advisory is your weekly download on how to untangle the industry's most pressing challenges to help leaders like you make the best business decisions for your organization. From unpacking major trends in care delivery—like site-of-care shifts and the rise of high-cost drugs—to demystifying stakeholder dynamics, to shining a spotlight on priorities that may get overlooked, we're here to help. Our hosts and seasoned r ...
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Retail impacts everyone, everywhere, every day. Join the National Retail Federation for authentic, insightful conversations with the industry's most interesting people. Hear retail executives, industry experts, entrepreneurs and influencers discuss trends, their career stories and the future of retail. Learn more at retailgetsreal.com.
…
continue reading
Join CSIS’s Gregory C. Allen, senior adviser with the Wadhwani AI Centers, on a deep dive into the world of AI policy. Every two weeks, tune in for insightful discussions regarding AI policy regulation, innovation, national security, and geopolitics. The AI Policy Podcast is by the Wadhwani Center for AI and Advanced Technologies at CSIS, a bipartisan think-tank in Washington, D.C.
…
continue reading
Smart Supply Chain Podcast is a podcast produced by ALOM hosted by Sarah and Shireen Garrison featuring industry experts offering insight and perspective on a variety of trending supply chain topics.
…
continue reading
The Cybersecurity Podcast for Entrepreneurs, SMB Owners, and Decision-Makers Cyberattacks are no longer rare incidents — they’re a business risk. CybersecureGuard delivers exactly what modern leaders need: clear guidance, practical strategies, and easy-to-understand insights that can be implemented immediately, even without a technical background. From phishing and social engineering to password security, AI-driven threats, and securing remote teams — every episode focuses on actionable step ...
…
continue reading
I’m Karen Fatula, a journalist and podcaster focused on hyperlocal, nonpartisan news from Ohio Appalachia — the part of Ohio that too often gets left out of the conversation. Through Forgotten Ohio, I cover stories from outside the “Big C” metros — Columbus, Cleveland, and Cincinnati — highlighting the voices, challenges, and resilience of smaller towns and rural communities. My goal is simple: to provide fair, factual, and balanced reporting that reflects real life in the Ohio Valley and Ap ...
…
continue reading
Welcome to Marketing vs The World, the podcast dedicated to the dynamic and ever-evolving world of marketing. Every other Monday, our host Abbie Dando, dives deep into the latest trends, challenges, and triumphs in the marketing industry. In every episode, Abbie is joined by a top marketing professional or business leader who shares their insights, stories, and strategies for balancing work, life, and everything in between. Whether you're a seasoned marketing maverick or a business owner loo ...
…
continue reading
Weekly conversation that will give you an in-depth understanding of the law stories making news and the legal decisions that could have a bearing on everyone in the UK. Whether it's unpicking a landmark legal ruling, explaining how laws are made or seeking clarity for you on a legal issue, The Law Show will be your guide.
…
continue reading
The Cyber Resilience Brief is your 15-minute pulse on how organizations can build stronger defenses and achieve true cyber resilience. Each episode dives into the practical realities of Breach and Attack Simulation (BAS), adversarial exposure validation, and the evolving strategies that keep modern enterprises secure. Hosted by Tova Dvorin and brought to you by SafeBreach — the leader in Adversarial Exposure Validation — this podcast features insights from cybersecurity leaders, integration ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
A podcast dedicated to Preppers, Homesteaders, Survivalists, and overall emergency preparedness.
…
continue reading
Two lapsed Nature editors, Andy Marshall and Juan-Carlos Lopez, have a conversation and a cocktail with experts in translational research and biomedicine
…
continue reading
By providing objective, expert analysis, IBISWorld helps people and businesses make smarter decisions.
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Cargo Facts Connect addresses all things freighters and aircraft. Connect delves into what's new in freighter transactions, belly capacity trends, conversion activity and aircraft finance. Brought to you by Cargo Facts, long the industry's leading information resource on freighter aircraft, Cargo Facts Connect gets you inside the freighter business. Cargo Facts has been the newsletter of record of the air cargo and freighter aircraft industries for over 40 years. Cargo Facts, published by Ro ...
…
continue reading
Foot Anstey’s international committee are delighted to bring you a new podcast series focusing on different jurisdictions and industries, exploring the opportunities that exist in the global marketplace. We believe that business is made stronger through collaboration. Businesses can find new opportunities by thinking globally. Throughout our first season, we’ll hear from specialist guest speakers as well as our in-house experts as we tackle topics trending across the sector.
…
continue reading
At Tanium, we live, dream, and debate cybersecurity 24/7. Now, with TANIUM PODCAST, you’re in on the conversation. Go behind the scenes with our team leaders, partners, and customers in the U.S., UK, Europe, Asia, and elsewhere around the globe. We’ll discuss the latest products, perspectives, and success stories at Tanium, an innovator in security software and the first to make autonomous endpoint management (AEM) a reality.
…
continue reading
Quality for the Rest of Us investigates the mysterious world of healthcare in search of adventurous innovation and exciting solutions from professionals across the nation.
…
continue reading
food, abundance, warmth
…
continue reading
30-Day InfoSec, a monthly information security recap show for the latest news, stories, and happenings from around the cybersecurity community.
…
continue reading
Channel Chatter is your go-to, one-stop resource for everything Lenovo Channel—where we cover the latest tech trends, provide actionable insights, and equip you with powerful sales tips and tricks. This podcast is part of Lenovo’s Channel Chatter communications strategy to provide our Partners with actionable technology information in an easy-to-digest format.
…
continue reading
1
Iranian Hacker Claims It Hacked Phone of Israeli PM's Chief of Staff, Hacker Claims to Leak Wired Database with 2.3 Million Records, LastPass 2022 Breach Led to Consequences, Pro-Russian Claim Cyberattack ...
16:16
16:16
Play later
Play later
Lists
Like
Liked
16:16🎙️ Iran Hackers Claim Israeli PM Staff Phone Hack, Wired Database 2.3M Records Leaked, LastPass 2022 Breach 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1034: Today's episode will discuss the latest news: Pro-Russian Hackers Claim Cyberattack on French Postal Servi…
…
continue reading
1
Excel-lerating cyberattacks. [Research Saturday]
23:43
23:43
Play later
Play later
Lists
Like
Liked
23:43While our team is out on winter break, please enjoy this episode of Research Saturday. This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belaru…
…
continue reading
While our team is out on winter break, please enjoy this episode of Research Saturday. This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belaru…
…
continue reading
1
CodeRED Down in Belmont County, Ohio After Cyberattack
11:05
11:05
Play later
Play later
Lists
Like
Liked
11:05From November 13–20, 2025, Belmont County, Ohio, had no working CodeRED emergency alert system, leaving residents without notifications for water advisories, severe weather or public safety threats. The outage followed a nationwide cyberattack on the OnSolve CodeRED emergency notification platform which was accompanied by a data breach involving th…
…
continue reading
1
Episode 22- Ransom or Rebuild? Claudia Rast on the Hard Math of Hospital Cyberattacks
31:11
31:11
Play later
Play later
Lists
Like
Liked
31:11Alarms don’t always sound when hospitals are under attack. Sometimes the first signal is a locked EHR, diverted ambulances, and a clinical team scrambling to deliver care without the tools they trained on. We sit down with Butzel attorney Claudia Rast—leader of cybersecurity and AI practices and former co-chair of the ABA’s presidential cybersecuri…
…
continue reading
1
8 Real Cyberattack Stories from Germany That Almost Destroyed Businesses
4:57
4:57
Play later
Play later
Lists
Like
Liked
4:57In this episode, AI Jessica takes you inside eight real cyberattacks that struck Germany in recent years — from supermarket chains and engineering firms to municipal utilities, political parties, and even a natural history museum. These incidents are more than isolated events. They reveal a dangerous pattern: the same weaknesses that allowed attack…
…
continue reading
1
Ep. 34 - Inside the Jaguar Land Rover Cyberattack: Supply Chain Failure, Scattered Spider, and the New Threat Ecosystem
14:38
14:38
Play later
Play later
Lists
Like
Liked
14:38The Jaguar Land Rover cyberattack has already cost the UK billions — and exposed a critical weakness in modern cybersecurity: supply chain risk. In this episode of The Cyber Resilience Brief, SafeBreach hosts Tova Dvorin and Adrian Culley sit down with Steve Cobb, CISO of SecurityScorecard, to unpack what really happened, why groups like Scattered …
…
continue reading
1
Cyberattaque Majeure Déjouée (Major Cyberattack Thwarted)
3:53
3:53
Play later
Play later
Lists
Like
Liked
3:53Une cellule de crise interministérielle a annoncé avoir déjoué une cyberattaque sophistiquée visant des infrastructures nationales sensibles. Les experts attribuent l'opération à un État étranger hostile. Traduction: An interministerial crisis unit announced it thwarted a sophisticated cyberattack targeting sensitive national infrastructure. Expert…
…
continue reading
Un sourire sincère a le pouvoir de transformer une journée. Il transmet chaleur, espoir et connexion, créant des liens invisibles entre les cœurs. Sourire est un acte universel. Traduction: A genuine smile has the power to transform a day. It conveys warmth, hope, and connection, creating invisible bonds between hearts. Smiling is a universal act. …
…
continue reading
1
Lorrie Cranor: Why Security Fails Real People [Afternoon Cyber Tea]
23:45
23:45
Play later
Play later
Lists
Like
Liked
23:45While our team is out on winter break, please enjoy this episode of Afternoon Cyber Tea with Ann Johnson from our partners at Microsoft Security. Dr. Lorrie Cranor, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vice President, Microsoft, on this week's episode of Afternoon Cyber Tea …
…
continue reading
1
Condé Nast 40M Records Stolen, Trust Wallet $7M Crypto Theft Hits 2,596 Wallets, and Korean Air Falls to Oracle EBS Campaign
17:04
17:04
Play later
Play later
Lists
Like
Liked
17:04🎙️ Conde Nast 40M Records Stolen, Trust Wallet $7M Crypto Theft 2,596 Wallets, Korean Air Oracle Hack 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1035: Today's episode will discuss the latest news: Former Coinbase Support Agent Arrested for Helping Hackers Hacker …
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss key cybersecurity predictions for 2026, focusing on the rise of agentic AI, quantum computing threats, deepfakes, the expanding attack surface due to IoT, the evolution of cybercrime into corporate structures, and the necessity for cybersecurity to be viewed as a stra…
…
continue reading
1
Ep. 37 - Emennet Pasargad Exposed: How Iran’s IRGC Cyber Unit Targets Organizations — and How to Stop Them
13:07
13:07
Play later
Play later
Lists
Like
Liked
13:07Emennet Pasargad is one of the most active and aggressive Iranian cyber threat groups operating today — tied directly to the Islamic Revolutionary Guard Corps (IRGC) Cyber Electronic Command. In this episode of Cyber Resilience Brief, SafeBreach Senior Sales Engineer Adrian Culley breaks down who Emennet Pasargad really is, how they operate through…
…
continue reading
Le ciel nocturne, parsemé d'étoiles, nous rappelle notre place dans l'univers. Il inspire des rêves, des questions et une profonde admiration pour l'immensité cosmique. Traduction: The night sky, scattered with stars, reminds us of our place in the universe. It inspires dreams, questions, and profound awe for the cosmic vastness. Hébergé par Acast.…
…
continue reading
1
Midnight Blizzard | How Russian Intelligence Breached Microsoft - w/ Alyssa Robinson, CISO @ HubSpot
32:38
32:38
Play later
Play later
Lists
Like
Liked
32:38Midnight Blizzard | How Russian Intelligence Breached Microsoft With guest CISO Co-Host Alyssa Robinson, CISO at HubSpot In late 2023, a Russian state-sponsored threat actor known as Midnight Blizzard (also called NOBELIUM and widely associated with APT29) began probing Microsoft the old-fashioned way: password spraying. No zero-day. No smash-and-g…
…
continue reading
1
The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report [Microsoft Threat Intelligence Podcast]
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29While our team is out on winter break, please enjoy this episode of The Microsoft Threat Intelligence Podcast from our partners at Microsoft. In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a co…
…
continue reading
1
Season finale: Leading security in a brave new world. [CISOP]
43:59
43:59
Play later
Play later
Lists
Like
Liked
43:59In the season finale of CSO Perspectives, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons an…
…
continue reading
1
Rediffusion - Un avenir durable (Sustainable future)
3:30
3:30
Play later
Play later
Lists
Like
Liked
3:30L'eau est la source de toute vie. Préserver cette ressource précieuse est essentiel pour garantir un avenir durable pour les générations actuelles et futures. Chaque goutte compte. Traduction: Water is the source of all life. Preserving this precious resource is essential to ensure a sustainable future for current and future generations. Every drop…
…
continue reading
1
The Audit 2025: Deepfakes, Quantum & AI That Changed Everything
22:57
22:57
Play later
Play later
Lists
Like
Liked
22:57In this special year-end episode, Joshua Schmidt revisits the most mind-bending moments from The Audit's 2025 season. From Justin Marciano and Paul Vann demonstrating live deepfakes in real-time (yes, they actually did it on camera) to Bill Harris explaining how Google's quantum experiments suggest parallel universes, to Alex Bratton's urgent warni…
…
continue reading
1
The Hidden Risk in Your Stack [Data Security Decoded]
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik. In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and w…
…
continue reading
1
Previewing India's AI Impact Summit with MeitY Secretary S. Krishnan
54:32
54:32
Play later
Play later
Lists
Like
Liked
54:32Since 2023, a series of global AI summits has brought together world leaders to advance international dialogue and cooperation on artificial intelligence. Building on this momentum, Prime Minister Narendra Modi announced the India AI Impact Summit, which will take place in New Delhi in February 2026. As the first summit in the series to be hosted i…
…
continue reading
1
Episode 735 Persons Missing and on the Move
56:25
56:25
Play later
Play later
Lists
Like
Liked
56:25In this episode, Jose Pablo Baraybar and Apostolos Veizis discuss the plight of individuals who have fled their countries seeking safety but faced tragic outcomes. For the video and audio podcast, https://tosavetheworld.ca/episode-735-persons-missing-and-on-theBy Metta Spencer
…
continue reading
1
Stop Secrets Creep Across Developer Platforms
42:26
42:26
Play later
Play later
Lists
Like
Liked
42:26Developers are exposing their organizations' most sensitive information; our guests explain why it's happening and how to stop it.By InformaTechtarget
…
continue reading
If blue links are no longer the main event, how do we make sure our brands are still found? In this end-of-year episode, we take a step back to reflect on how SEO has shifted through 2025 and, more importantly, where it’s heading in 2026. As we’re already building strategies for clients, we wanted to share what we’re seeing, what’s changing, and wh…
…
continue reading
1
Rediffusion - Des mondes infinis (Infinite worlds)
3:07
3:07
Play later
Play later
Lists
Like
Liked
3:07La lecture ouvre des mondes infinis, permettant à l'esprit de voyager à travers le temps, les cultures et les idées. Un livre peut changer une vie en un instant. Traduction: Reading opens infinite worlds, allowing the mind to travel through time, cultures, and ideas. A book can change a life in an instant. Hébergé par Acast. Visitez acast.com/priva…
…
continue reading
1
Charity Wright: Pursue what you love. [Threat intelligence] [Career Notes]
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50While our team is out on winter break, please enjoy this episode of Career Notes. Threat intelligence analyst at Recorded Future, Charity Wright, shares her story from the army to her career today. Transitioning from the army to cybersecurity was an exciting change for her. During college she was recruited by the U.S. army where she started her jou…
…
continue reading
1
Beyond cyber: Securing the next horizon. [Special Edition]
1:00:13
1:00:13
Play later
Play later
Lists
Like
Liked
1:00:13While our team is out on winter break, please enjoy this Special Edition episode. Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The NightDragon Innovation Summit convened a group of industry leaders to discuss how public and private entities can work together to address emerging …
…
continue reading
1
UK Businesses Warned After Surge in Supply-Chain Cyber Attacks
4:37
4:37
Play later
Play later
Lists
Like
Liked
4:37- UK Business Warned After Surge in Supply-Chain Cyber Attacks - Cybersecurity Skills Gap Widens Despite Rising Threats - Data Privacy Fines Climb as Regulators Tighten Enforcement Support the show Remember... Even with top-tier security, human negligence and/or error can compromise systems. Invest in employee training—it’s the ultimate safeguard. …
…
continue reading
Les forêts abritent une biodiversité inestimable. Chaque arbre, chaque insecte, joue un rôle vital dans l'équilibre fragile de notre planète. Respectons et protégeons ces écosystèmes essentiels. Traduction: Forests host invaluable biodiversity. Every tree, every insect, plays a vital role in the fragile balance of our planet. Let us respect and pro…
…
continue reading