A regular conversation with those at the convergence of data privacy, data security, data regulation, records, and governance.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Data Hurdles is a podcast that brings the stories of data professionals to life, showcasing the challenges, triumphs, and insights from those shaping the future of data. Hosted by Michael Burke and Chris Detzel, this podcast dives into the real-world experiences of data experts as they navigate topics like data quality, security, AI, data literacy, and machine learning. Each episode features guest data professionals who share their journeys, lessons learned, and the impact of data on industr ...
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
…
continue reading
Welcome to a podcast that dives deep into the fascinating crossroads of data, AI, privacy, and cybersecurity. Hosted by data and AI expert Kate Carruthers, this series explores the cutting-edge frontiers of our digital world, where data is forging an entirely new economy. Tune in to stay ahead of the curve and uncover the opportunities, challenges, and innovations shaping our future.
…
continue reading
All things data.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading

1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
continue reading
HawkShield is a Singapore-based, data and network security provider. We offer AI-powered data security and privacy services to companies of different sizes and industries. Contact us today. https://www.hawkshield.ai/
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
The Rebel Tech podcast, hosted by Zach Whiting and David Dunmoyer, is a product of the Texas Public Policy Foundation that explores technology and innovation, and its implications on everything from culture, public policy discussions, business, to how we live our lives and interact with one another. The Rebel Tech podcast features prominent guests, ranging from lawmakers to entrepreneurs to thought leaders fighting on the side of humanity on the digital frontier.
…
continue reading
For those who are interested in the hottest field in a technology world. Whether you are a professional who wants to learn more about privacy, data protection, or cyber law or someone who just finds this fascinating, we have topics for you from data management to cybersecurity to social justice and data ethics and AI. In-depth information on serious privacy topics. This podcast, hosted by Dr. K Royal, Paul Breitbarth and Ralph O'Brien, features open, unscripted discussions with global privac ...
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Welcome to "The Interconnectedness of Things," the podcast where we explore the seamless integration of technology in our modern world. Hosted by Dr. Andrew Hutson and Emily Nava of QFlow Systems, each episode delves into the dynamic interplay of enterprise solutions, innovative software, and the transformative power of technology in various industries. With expert insights, real-world case studies, and thoughtful discussions, "The Interconnectedness of Things" offers a comprehensive look at ...
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
Covering everything from the future of organizational culture to accelerated cloud adoption, in this inaugural podcast series, Splunk thought leaders sit down with Principal Analyst Daniel Newman to discuss the unique intricacies organizations are navigating in an era of rapid digital transformation and how data remains the key solution to thriving in uncertain times.
…
continue reading
DM Radio is the world's longest-running show about data! Since 2008, we've interviewed the industry's brightest minds about AI, analytics, big data, cloud, data warehousing, digital transformation, Internet of Things (IoT), streaming and many other topics. Now broadcasting coast-to-coast, we're always looking for new voices. Send an email to [email protected]!
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Live from LinuxFest Norhtwest 2025 Day 1. Exclusive coverage, chats, interviews, and more.
…
continue reading
Frans Oudendorp will talk with guests about Security related items. Most of the topics will be related to Microsoft Security.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
computer help free. blogtvpccareman
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading

1
Revenue Cycle Optimized: How AI Can Improve Performance Leveraging RCM Benchmarks
24:20
24:20
Play later
Play later
Lists
Like
Liked
24:20How AI Can Improve Performance Leveraging RCM BenchmarksStuart Newsome, VP of RCM Insights, breaks down the fundamentals of benchmarking in revenue cycle management, including key metrics like net days in A/R and clean claim rates. Learn how AI and automation tools can help healthcare organizations go beyond analytics to drive performance, identify…
…
continue reading

1
Navigating the Future of Data Security with Mohit Tiwari
28:17
28:17
Play later
Play later
Lists
Like
Liked
28:17In this episode of Secure Insights, we're joined by Mohit Tiwari, Co-Founder and CEO of Symmetry Systems, a leading cybersecurity company specialising in Data Security Posture Management (DSPM). Mohit takes us on a deep dive into the origin and evolution of DSPM, its global adoption, and how organisations can navigate the landscape of platform vs b…
…
continue reading

1
Inside the Breach: What Recent Cyberattacks Reveal About Your Data Security
9:13
9:13
Play later
Play later
Lists
Like
Liked
9:13Cyberattacks are no longer rare shocks—they're a constant drumbeat in the background of our digital lives. In this episode, we take you on a deep dive into some of the most alarming recent data breaches, unpacking how they happened, what went wrong, and what you need to know to stay protected. We kick off with the Western Sydney University breach, …
…
continue reading

1
I SIEM, you SIEM, we all SIEM for a Data Security Strategy - Colby DeRodeff - ESW #402
35:43
35:43
Play later
Play later
Lists
Like
Liked
35:43We wanted security data? We got it! Now, what the heck do we DO with all of it? The core challenge of security operations, incident response, and even compliance is still a data management and analysis problem. Which is why we’re seeing companies like Abstract Security pop up to address some of these challenges. Abstract just released a comprehensi…
…
continue reading
Data security management is crucial in 2025 to combat evolving cyber threats. Key components include encryption, access control, regular audits, MFA, and incident response. Best practices involve Zero Trust security, AI-driven threat detection, employee training, cloud protection, and regulatory compliance with laws like Malaysia’s and Singapore’s …
…
continue reading

1
Microsoft Purview: New data security controls for the browser & network
9:57
9:57
Play later
Play later
Lists
Like
Liked
9:57Protect your organization’s data with Microsoft Purview. Gain complete visibility into potential data leaks, from AI applications to unmanaged cloud services, and take immediate action to prevent unwanted data sharing. Microsoft Purview unifies data security controls across Microsoft 365 apps, the Edge browser, Windows and macOS endpoints, and even…
…
continue reading

1
Inside the DSPM Revolution: Data, Identity & the Future of Security w/ Mohit Tiwari and Anand Singh
45:39
45:39
Play later
Play later
Lists
Like
Liked
45:39In this special Industry Series kickoff episode of The Professional CISO Show, host David Malicoat is joined by Mohit Tiwari (CEO & Co-Founder) and Anand Singh (Chief Security and Strategy Officer) of Symmetry Systems for a compelling conversation on the future of data security, the rise of DSPM (Data Security Posture Management), and the emerging …
…
continue reading

1
Quantum Computing, Data Management, and the Future of Secure Systems
53:17
53:17
Play later
Play later
Lists
Like
Liked
53:17Tune in to this episode of DMRadio with host Eric Kavanagh and Sean Michael Brehm of Spectral Capital discussing the evolution of data management and the transformative power of quantum computing. Learn insights on decentralized data, the need for modern data centers, and the role of qubits in advancing computing capabilities. Explore the future of…
…
continue reading
In this episode, the hosts discuss the recent bankruptcy of 23andMe, exploring the implications for data privacy and genetic testing. They reflect on personal experiences with genetic testing, the risks associated with genetic material, and the ethical considerations surrounding consent and privacy. The conversation highlights the importance of reg…
…
continue reading

1
Natali Tshuva: Impacting critical industries. [CEO] [Career Notes]
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Please enjoy this encore episode of Career Notes. CEO and co-founder of Sternum, Natali Tshuva shares how she took her interest in science and technology and made a career and company out of it. Beginning her computer science undergraduate degree at age 14 through a special program in Israel, Natali says it opened up a new world for her. Her requir…
…
continue reading

1
Microsoft for Startups: The benefits of the cyber startup ecosystem. [Special Edition]
1:15:15
1:15:15
Play later
Play later
Lists
Like
Liked
1:15:15Welcome to the Microsoft for Startups Spotlight, brought to you by N2K CyberWire and Microsoft. In this episode, we are shining a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. This episode is part of our exclusive RSAC series where we dive into the real world impact of the Microsoft fo…
…
continue reading

1
China’s new cyber arsenal revealed. [Research Saturday]
25:33
25:33
Play later
Play later
Lists
Like
Liked
25:33Today we are joined by Crystal Morin, Cybersecurity Strategist from Sysdig, as she is sharing their work on "UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell." UNC5174, a Chinese state-sponsored threat actor, has resurfaced with a stealthy cyber campaign using a new arsenal of customized and open-source tools, includin…
…
continue reading
A tech worker stumbles upon mass fraud and brings receipts, a flag football prank goes very right, a teenager uses Net Send and gets in trouble — but not as much as the person they're in trouble with, and a guy almost sends his pal on a "Taken" style revenge mission to Kosovo. Got a strange tale of technology, security, or hacking? Share it at Hotl…
…
continue reading

1
Understanding SaaS Security: Insights, Challenges, and Best Practices
38:05
38:05
Play later
Play later
Lists
Like
Liked
38:05In this episode of Cybersecurity Today, host Jim Love delves into the topic of SaaS (Software as a Service) security. Sharing his early experiences promoting SaaS, Jim elaborates on its inevitable rise due to cost-effectiveness and shared development resources. The episode highlights security concerns with SaaS, such as shadow IT and weak access co…
…
continue reading

1
Pentagon hits fast-forward on software certs.
32:44
32:44
Play later
Play later
Lists
Like
Liked
32:44The Defense Department is launching a new fast-track software approval process. A popular employee monitoring tool exposes over 21 million real-time screenshots. The U.S. opens a criminal antitrust investigation into router maker TP-Link. A pair of health data breaches affect over six million people. South Korea’s SK Telecom confirms a cyberattack.…
…
continue reading

1
Lazarus Strikes Again: Inside Operation SyncHole and the 1-Day Exploitation Crisis
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49In this episode, we break down the most urgent cybersecurity developments from late April 2025—including the Lazarus Group’s high-profile “Operation SyncHole” targeting South Korean industries. Discover how attackers are exploiting newly disclosed vulnerabilities faster than ever, with nearly 1 in 3 CVEs weaponized within 24 hours of publication. W…
…
continue reading

1
OAuth Phishing and Microsoft 365: The Hidden Threats SMBs Can't Ignore
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54In this episode, we dissect the real-world challenges of securing Microsoft 365 environments—especially for small and medium-sized businesses—amid rising threats and licensing limitations. From Reddit frustrations to official Microsoft documentation, we explore the harsh truth: many essential security features, like alerting on suspicious logins, r…
…
continue reading

1
Why Outlook Is Eating Your CPU — And What Microsoft Says About It
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17Microsoft has acknowledged a serious issue affecting users of classic Outlook for Windows: CPU usage spikes up to 50% just from typing emails. First appearing in builds released since November 2024, this bug is now hitting users across several update channels—including Current, Monthly Enterprise, and Insider—leading to power drain, sluggish perfor…
…
continue reading

1
Record-Breaking Cybercrime Losses and Data Breaches in 2024
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45In this episode of Cybersecurity Today, host David Shipley discusses the FBI's report on cybercrime losses in 2024, which reached a record $16.6 billion, marking a 33% increase from the previous year. The report highlights major types of cyber crimes such as phishing, spoofing, extortion, and investment fraud, with older adults being significantly …
…
continue reading

1
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues;
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
…
continue reading
Send us a text We are a little late this week, but with good reason: Paul Breitbarth and Dr. K Royal were attending the IAPP Global Privacy Summit in Washington D.C. and bring you their report from the Opening General Session of the conference. The speakers during this session were professor Lawrence Lessig, Hans Peter Brøndmo and Catie Cuan, each …
…
continue reading

1
Hacking Crosswalks and Attacking Boilers - PSW #871
2:04:15
2:04:15
Play later
Play later
Lists
Like
Liked
2:04:15The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
…
continue reading

1
How Microsoft 365 Backup works and how to set it up
0:50
0:50
Play later
Play later
Lists
Like
Liked
0:50Protect your Microsoft 365 data and stay in control with Microsoft 365 Backup —whether managing email, documents, or sites across Exchange, OneDrive, and SharePoint. Define exactly what you want to back up and restore precisely what you need to with speeds reaching 2TB per hour at scale. With flexible policies, dynamic rules, and recovery points up…
…
continue reading
Verizon and Mandiant call for layered defenses against evolving threats. Cisco Talos describes ToyMaker and Cactus threat actors. Researchers discover a major Linux security flaw which allows rootkits to bypass traditional detection methods. Ransomware groups are experimenting with new business models. Deputy Assistant Director Cynthia Kaiser from …
…
continue reading

1
Trojan Map App: Spyware Targets Russian Soldiers via Alpine Quest
9:14
9:14
Play later
Play later
Lists
Like
Liked
9:14A newly discovered Android spyware campaign is targeting Russian military personnel by weaponizing a popular mapping app. Disguised as a cracked version of Alpine Quest Pro, this trojanized app delivers Android.Spy.1292.origin—a powerful surveillance tool that steals data, tracks location in real-time, and downloads secondary payloads to extract co…
…
continue reading

1
DMA Fines Hit Meta & Apple | UK Law Firm Penalized | NOYB Slams GDPR Reform Proposal
12:04
12:04
Play later
Play later
Lists
Like
Liked
12:04Send us a text 📢 Privacy Corner Newsletter: April 24, 2025 🔹 EU Fines Meta & Apple Under DMA – The European Commission hits Meta with a €200M fine and Apple with €500M for violating the Digital Markets Act. This challenges the future of “consent-or-pay” models across Europe. 🔹 UK Law Firm Fined Over Ransomware Handling – ICO fines a UK law firm £60…
…
continue reading

1
Blue Shield Breach: 4.7 Million Health Records Leaked via Google Analytics
8:47
8:47
Play later
Play later
Lists
Like
Liked
8:47Blue Shield of California has confirmed a data breach affecting 4.7 million members—caused not by hackers, but by a misconfigured Google Analytics setup. Sensitive health information was inadvertently exposed to Google’s ad platforms between April 2021 and January 2024. In this episode, we break down what went wrong, what data was leaked, and what …
…
continue reading

1
$16.6 Billion Lost: The True Cost of Cybercrime in America
8:48
8:48
Play later
Play later
Lists
Like
Liked
8:48Cybercrime in the U.S. has reached new, record-breaking heights. In this episode, we dive deep into the FBI's 2024 Internet Crime Complaint Center (IC3) report — a comprehensive look at the economic and human toll of cybercrime in America. With $16.6 billion in reported losses, a 33% increase year-over-year, and 859,532 complaints filed, the data p…
…
continue reading

1
Don’t Chase Titles — Build These 3 Things Instead (CISO Advice) with Nathan Wright
40:37
40:37
Play later
Play later
Lists
Like
Liked
40:37🎙️ The Professional CISO Show – Episode 61 Guest: Nathan Wright, CISO at Textron Host: David Malicoat 🎧 Episode Summary: In this episode of The Professional CISO Show, host David Malicoat sits down with Nathan Wright, CISO at Textron, to explore one of the most unconventional — and inspiring — journeys to cybersecurity leadership. From Russian ling…
…
continue reading

1
Are we a trade or a profession? [CISO Perspectives]
47:03
47:03
Play later
Play later
Lists
Like
Liked
47:03We're sharing a episode from another N2K show we thought you might like. It's the first episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: Cybersecurity has an identity problem where the industry as a whole is struggling to determine whether it is a trade or a profession. In this episode of CISO Perspectives,…
…
continue reading

1
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
…
continue reading
The White House’s shift of cybersecurity responsibilities to the states is met with skepticism. Baltimore City Public Schools suffer a ransomware attack. Russian state-backed hackers target Dutch critical infrastructure. Microsoft resolves multiple Remote Desktop issues. A new malware campaign is targeting Docker environments for cryptojacking. A n…
…
continue reading

1
Cybersecurity Today: Virtual Employees, AI Security Agents, and CVE Program Updates
7:47
7:47
Play later
Play later
Lists
Like
Liked
7:47In this episode of 'Cybersecurity Today,' host Jim Love discusses various pressing topics in the realm of cybersecurity. Highlights include Anthropic's prediction on AI-powered virtual employees and their potential security risks, Microsoft’s introduction of AI security agents to mitigate workforce gaps and analyst burnout, and a pivotal court ruli…
…
continue reading

1
Making Healthcare Work Better: Strategic Integration, Automation & Mentorship with Michelle McClay
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27Share Your Thoughts With Us! In this episode of The Interconnectedness of Things, hosts Emily Nava and Dr. Andrew Hutson sit down with Michelle McClay, Chief Strategic Integration Officer at Ascension, to explore how healthcare systems can work smarter—without losing their human touch. Michelle brings over a decade of experience in strategic projec…
…
continue reading

1
ISO 42001 Certification, CIOs Struggle to Align Strategies, and CISOs Rethink Hiring - Martin Tschammer - BSW #392
1:03:55
1:03:55
Play later
Play later
Lists
Like
Liked
1:03:55AI Governance, the next frontier for AI Security. But what framework should you use? ISO/IEC 42001 is an international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS) within organizations. It is designed for entities providing or utilizin…
…
continue reading

1
Mastering Security in the Cloud Era: Insights from a Microsoft Security MVP
52:30
52:30
Play later
Play later
Lists
Like
Liked
52:30In the first episode of Season 2 of our MVP Security Insights series on the Talking Security podcast, we explore the ever-evolving landscape of cloud security and delve into practical strategies with our distinguished guest, Microsoft Security MVP Truls Dahlsveen. Truls brings deep expertise in security monitoring, SIEM, and Endpoint Detection and …
…
continue reading

1
SANS Stormcast Wednesday, April 23rd: More xorsearch Updates; DKIM Replay Attack; SSL.com Vulnerability Fixed
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
…
continue reading
What can agentic AI do for you? Richard talks to Tim Warner about his work utilizing next generation agentic AI technologies to help with sysadmin tasks. Tim talks about the early lead that Cursor AI took with AI agents capable of writing and executing scripts on your behalf - as opposed to just creating code you can cut-and-paste. Today, GitHub Co…
…
continue reading
The Russian Proton66 is tied to cybercriminal bulletproof hosting services. A new Rust-based botnet hijacks vulnerable routers. CISA budget cuts limit the use of popular analysis tools. A pair of healthcare providers confirm ransomware attacks. Researchers uncover the Scallywag ad fraud network. The UN warns of cyber-enabled fraud in Southeast Asia…
…
continue reading
Ok, so vulnerable MCP tools are a thing now? Ken demonstrates installing and running an intentionally vulnerable MCP server with a bunch of example issues. Following is a discussion of the recent article and research around hallucinations of 3rd party dependencies/libraries in AI-Generated Python and JavaScript. New attack targets all dependent on …
…
continue reading

1
The Second Scam: FBI Warns of IC3 Impersonators Targeting Fraud Victims
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26The FBI has issued a stark warning about a growing scam targeting individuals who’ve already been victimized. In this episode, we unpack how fraudsters are impersonating employees of the FBI's Internet Crime Complaint Center (IC3), promising to help victims recover lost funds — only to scam them again. We’ll break down: How the scam works and why i…
…
continue reading

1
E045 - Dialed In: Telemarketing, Compliance, and Consumer Protection
48:12
48:12
Play later
Play later
Lists
Like
Liked
48:12Telemarketing compliance isn’t exactly the hottest topic in tech circles… but maybe it should be. In this episode, Milou and Brian sit down with Kevin Mayfield, Manager of Marketing Compliance at CompliancePoint, to dig into the often-overlooked world of do-not-call laws, TCPA risks, and the real impact of telemarketing rules on tech companies (yes…
…
continue reading

1
Cybersecurity Fundamentals: Modern Day Best Practices
17:42
17:42
Play later
Play later
Lists
Like
Liked
17:42Send us a text In this episode of CyberSound, Jason Pufahl, Steve Maresca, and Michael Grande revisit foundational cybersecurity practices—what’s still essential, what’s evolved, and what’s next. From patching and multi-factor authentication (MFA) to security awareness training, backups, and endpoint detection and response (EDR), the trio discusses…
…
continue reading
One of the essential skill sets for a DFIR analyst is the ability to understand the impact of vulnerabilities quickly. In many IR scenarios, you may find a newly discovered vulnerability or receive a scan that flags multiple potential weaknesses. To stay efficient, you must...
…
continue reading
In today’s digital world, protecting sensitive data is more important than ever. Database security helps guard against cyber threats through layered measures—preventive, detective, and corrective—like encryption, access control, and real-time monitoring. For full protection, it needs to work hand-in-hand with data and network security. Tools like f…
…
continue reading
Use Microsoft Purview and Microsoft 365 Copilot together to build a secure, enterprise-ready foundation for generative AI. Apply existing data protection and compliance controls, gain visibility into AI usage, and reduce risk from oversharing or insider threats. Classify, restrict, and monitor sensitive data used in Copilot interactions. Investigat…
…
continue reading