Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Digital Security Insights Podcasts

show episodes
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Artwork

4
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Artwork
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Artwork

1
Unspoken Security

Unspoken Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
  continue reading
 
Artwork

1
Next in Tech

S&P Global Market Intelligence

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
  continue reading
 
Artwork

1
Razorwire Cyber Security

Razorthorn Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
  continue reading
 
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
  continue reading
 
Artwork

1
Asia Insight

National Bureau of Asian Research

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Podcasts from The National Bureau of Asian Research (NBR) covering the critical issues that leaders need to understand – because the decisions they make matter and the stakes are high.
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
  continue reading
 
Welcome to Cyber Insights, the podcast that bridges the worlds of networking and cybersecurity. From cutting-edge innovations in enterprise connectivity to the latest in digital defense, we break down the buzzwords and bring you actionable insights to secure and scale your systems. Whether you're an IT professional, business leader, or tech enthusiast, join us as we explore the critical intersection of networks and security, featuring expert conversations, industry trends, and real world str ...
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Artwork

1
Supply Shock

Blockworks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Supply Shock, hosted by Pete Rizzo, The Bitcoin Historian, explores the latest Bitcoin news with a deep historical perspective. Featuring in-depth interviews with industry experts, each episode connects current events to key moments in Bitcoin history, revealing patterns, lessons, and insights shaping the future of digital assets.
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Artwork
 
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
  continue reading
 
Artwork

1
SpyCast

SpyCast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
SpyCast, the official podcast of the International Spy Museum, is a journey into the shadows of international espionage. Each week, host Sasha Ingber brings you the latest insights and intriguing tales from spies, secret agents, and covert communicators, with a focus on how this secret world reaches us all in our everyday lives. Tune in to discover the critical role intelligence has played throughout history and today. Brought to you from Airwave, Goat Rodeo, and the International Spy Museum ...
  continue reading
 
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
  continue reading
 
Welcome to Smarter Online Safety: Protect, Empower, Transform—your go-to channel for digital security, AI productivity, and digital transformation. As cyber fraud, identity theft, and AI-driven risks grow, Jocelyn King, “The Queen of Online Safety,” is here to help you stay secure and thrive. A Top 10 Woman in Cybersecurity, speaker, and educator, she has been featured on Dr. Phil, prime-time news, international radio, and top podcasts. 💡 What You’ll Learn: ✔️ Protect yourself & your family ...
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
  continue reading
 
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
  continue reading
 
Artwork

51
The Union

Krista Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Union is about the intersection between people, technology, and artificial intelligence. Get ready to be inspired and challenged as we ask questions, uncover insights, and share inspiring stories about digital ecosystems and automation.
  continue reading
 
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
  continue reading
 
Artwork

1
The Privacy Corner

Robert Bateman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
  continue reading
 
Artwork

1
Bizionic Technology Pvt Ltd

Bizionic Technology

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
👋 Welcome to Bizionic Technology Pvt Ltd! We specialize in providing top-notch Hire Talent, Marketing, Technologies, Cloud Consulting Services, and Security Solutions. Don't forget to check out our podcast for valuable insights. Visit our website at https://www.bizionictech.com for more information. Let's innovate together! 💡 #BizionicTech #InnovateWithUs
  continue reading
 
Artwork

1
Tech Talks Daily

Neil C. Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Artwork

1
Silent Mode Cafe

Silent Mode Cafe

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to Silent Mode Cafe, the podcast where we translate the digital realm into plain English. From data privacy and basic internet security to smart home gadgets and the latest AI developments, we serve up tech insights with a side of caffeine.
  continue reading
 
Artwork

1
Red Dot Mindset

Mickey Middaugh – Grey Matter Ops

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Red Dot Mindset is the official podcast of Grey Matter Ops, your tactical guide to surviving — and thriving — in a world where hesitation can cost you everything. Hosted using advanced AI narration and written by a decorated U.S. Air Force Security Forces veteran, each episode blends military-grade strategy with real-world self-defense, situational awareness, and survival psychology. Whether you're facing a street-level threat, a digital stalker, or just the daily grind of modern life, we’ll ...
  continue reading
 
The Ciena Network Insights Podcast brings together thought leaders, subject matter experts, and tech influencers to discuss the innovations and trends shaping our digital world. Join us every month for engaging conversations on telecom networks, digital transformation, sustainability, and more.
  continue reading
 
Artwork

1
AWS Executive Insights

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Executive Insights podcast, brought to you by AWS (Amazon Web Services), features peer-to-peer conversations between business executives on innovating for growth, building resiliency, and shaping the future of their organizations. Learn more at AWS Executive Insights and follow us on LinkedIn. For video versions of these and other conversations, subscribe to our YouTube playlist.
  continue reading
 
Artwork

4
Cloud and Clear

SADA, An Insight Company

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Cloud and Clear podcast explores the journey of SADA at the tip of the spear in helping organizations transform the way their people work, and the way their industry goes to market in the context of Google Cloud. It features experts from SADA, partners, and our customers discussing and debating what digital transformation means in the real world.
  continue reading
 
Loading …
show series
 
In this empowering episode of Red Dot Mindset, we tackle the Top 10 Situational Awareness Questions Civilians Are Asking in 2025 — everything from how to detect if you're being followed, to the best legal self-defense tools, to training your brain for high-stress moments. Drawing from the expertise of Mickey Middaugh, a 24-year U.S. Air Force Secur…
  continue reading
 
As cybersecurity regulations tighten across the automotive industry, OEMs and suppliers are under growing pressure to not only build secure vehicles but also prove compliance across their entire software and hardware stack. In this episode of Cars, Hackers, and Cyber Security, we explore the key strategies for mastering compliance with global autom…
  continue reading
 
There’s lots of juicy stories in our monthly security news roundup. The Scattered Spider hacking group makes effective use of social engineering to target MSPs, Microsoft pushes for better Windows resiliency by rethinking kernel access policies for third-party endpoint security software, and the US Justice Department files indictments against alleg…
  continue reading
 
In this episode of the Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray, Rory Higgins, and Ian Finlayson shine a light on one of the unsung heroes of modern IT - Network Managed Services. It’s not flashy. It’s not trending. But it is the foundation that keeps your business running. The team reflects on why more organisations -…
  continue reading
 
Is generative AI just another tool in the belt, or is it a fundamental transformation of the developer profession? We kick off a two-part special to get to the bottom of how AI is impacting the enterprise. SADA's Associate CTO of AI & ML, Simon Margolis, sits down with Ameer Abbas, Senior Product Manager at Google Cloud, for an insider's look at th…
  continue reading
 
This podcast dives into the Cyber Security Readiness Goals Cross-Sector Toolkit, providing essential insights for Canadian critical infrastructure owners and operators. We explore how organizations can prioritize investments and elevate their cyber security posture by understanding the 36 readiness goals. Each episode unpacks recommended actions, a…
  continue reading
 
Lea Kissner, CISO of LinkedIn, describes the dangers of perverse metrics, the importance of phishing-resistant technologies, and the ongoing challenge of recruiting and retaining top talent in the field. Lea also explains how she deals with complex privacy issues at scale every day. Lea and Blake also touch on LinkedIn's efforts to balance security…
  continue reading
 
In this episode, we catch up with Mai-Lan Tomsen Bukovec, VP of Technology at AWS, as she reveals three transformative approaches to enterprise data management: aggregate, curate, and extend. Drawing from her extensive experience leading AWS data services, Mai-Lan shares how organizations can build flexible, scalable data foundations that enable bo…
  continue reading
 
This week we spoke with the International Spy Museum's Executive Director, Colonel Chris Costa. His decades-long career in the intelligence community spanned multiple continents, running sensitive operations in Panama, Bosnia, Iraq, and Afghanistan, where he earned two Bronze stars for his human intelligence contributions. Later, Costa advised Navy…
  continue reading
 
The annual Kagan Media and Telecom Summit in New York is in the books and it not only covered a lot of market activity, but it was also surrounded by a number of media and sports rights headlines. Justin Nielson, Eric Keith, Scott Robson and Seth Shafer joined host Eric Hanselman to look at what was covered in the expansive event and the time aroun…
  continue reading
 
What are some appsec basics? There's no monolithic appsec role. Broadly speaking, appsec tends to branch into engineering or compliance paths, each with different areas of focus despite having shared vocabularies and the (hopefully!) shared goal of protecting software, data, and users. The better question is, "What do you want to secure?" We discus…
  continue reading
 
Neil Bhandar, Chief Data Analytics Officer for Generac. Generac is a U.S.-based industrial manufacturer that designs and produces a wide range of power solutions—including portable, residential standby, commercial, and industrial generators, along with automatic transfer switches and related accessories. Neil joins Emerj Editorial Director Matthew …
  continue reading
 
In this episode, Founder & CEO of Surus.io Patrick Murck joins the show to reflect on Bitcoin’s rise to a fresh all-time high, its original mission of financial autonomy, and the tension between price appreciation and real-world use. He discusses stablecoins as dollar-compatible tools, why market structure reforms are stalled, and how his new compa…
  continue reading
 
Today’s guest is Josh Haddock, Director of Contact Center Technology at Herbalife. Herbalife is a global health and wellness company that develops and sells nutritional products, personal care items, and weight management solutions through a network of independent distributors. With operations in over 90 countries, Herbalife combines direct selling…
  continue reading
 
Today’s guest is Phil Christianson, Chief Product Officer at Xurrent. Xurrent is an IT service management platform that helps large organizations coordinate incident response and improve system reliability. They serve clients across healthcare, government, and financial services and are known for their focus on post-incident accountability and auto…
  continue reading
 
The provided text offers a comprehensive analysis of Argentina's evolving cybersecurity landscape, tracing its origins from the resourceful "life hacker" culture born out of the 2001 economic crisis to the present day. It highlights a significant shift from ideologically driven hacktivism to financially motivated cybercrime, exemplified by major da…
  continue reading
 
Latin American Cyber Threats Groups, Individuals, and Trends. The provided sources collectively offer a comprehensive overview of the escalating cyber threat landscape in Latin America, highlighting its emergence as a critical region for malicious cyber activity. They explain that this surge in cyber incidents is driven by a combination of rapid di…
  continue reading
 
When we talk about cybersecurity, it’s often easy to think in terms of firewalls, passwords, and high-profile breaches. But what happens when the vulnerability isn’t within your own systems but somewhere deep in your third or fourth-tier supply chain? In this episode, I spoke with Ben Edwards from Bitsight about the unseen infrastructure propping u…
  continue reading
 
Send us a text 📢 In Privacy News This Week: 🔹 Healthline fined $1.55M under CCPA – for failing to honor opt-outs, misconfigured cookie banners, and sharing sensitive health data without proper contracts or purpose limitation. 🔹 NY cracks down on teen tracking – AG guidance confirms NY Child Data Protection Act bans behavioral ads unless strictly ne…
  continue reading
 
This podcast provides an insightful look into the Security Information Service (BIS) of the Czech Republic, detailing its crucial efforts in safeguarding the nation's security during 2024. We explore the persistent threats posed by Russia through "Telegram agents," cyberattacks, and influence operations, and the challenges from China concerning esp…
  continue reading
 
Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' p…
  continue reading
 
Today’s guest is Brad Kennedy, Senior Director of Business Solutions Strategy at Orlando Health — a not-for-profit healthcare organization headquartered in Florida. With years of experience leading innovation and patient experience programs in hospital systems, Brad joins Emerj Managing Editor Matthew DeMello on the show today to explore how health…
  continue reading
 
The provided text examines the hacking group LulzSec, detailing their brief but impactful existence in 2011. It highlights their shift from Anonymous due to differing ideologies and their self-proclaimed "gray hat" status, aiming to expose security vulnerabilities and prompt public questioning of data reliance. The source chronicles a series of hig…
  continue reading
 
This source recounts the history of cyberattacks attributed to Russian intelligence agencies, metaphorically referred to as "Putin's bears," detailing their methods and targets. It begins by describing the 2015 Bundestag hack by "Fancy Bear," which stole a significant amount of data from the German Parliament, including Angela Merkel's office. The …
  continue reading
 
In this episode of 'Cybersecurity Today,' hosted by David Shipley from the Exchange Security 2025 conference, urgent updates are provided on critical cybersecurity vulnerabilities and threats. CISA mandates a 24-hour patch for Citrix NetScaler due to a severe vulnerability actively being exploited, dubbed 'Citrix Bleed.' Fortinet’s FortiWeb also fa…
  continue reading
 
podscan_qozfrBrgLDE4DVEV6kyvlO5grsYmJahr In the sprawling digital landscape, where authenticity is the most coveted currency, few stories are as compelling or as instructive as that of Alberto Daniel Hill. A cybersecurity expert from Uruguay, Hill’s trajectory from a respected professional to an imprisoned hacker, and his subsequent rebirth as a me…
  continue reading
 
Send us a text Aksa Taylor shares her journey from electrical engineering to cybersecurity, highlighting how curiosity and focused passion can open unexpected career doors in the security industry. • Finding specific interests within cybersecurity rather than trying to "get into security" broadly • Building a personal brand through knowledge sharin…
  continue reading
 
In this episode, we discuss the often overlooked security issues within Google Workspace. Rajan Kapoor, Field CISO at Material Security, joins us to talk about how Material Security is redefining the protection of documents, email accounts, and data in Google Workspace. We explore the unique challenges Workspace presents compared to traditional too…
  continue reading
 
In this episode, we discuss the often overlooked security issues within Google Workspace. Rajan Kapoor, Field CISO at Material Security, joins us to talk about how Material Security is redefining the protection of documents, email accounts, and data in Google Workspace. We explore the unique challenges Workspace presents compared to traditional too…
  continue reading
 
This conversation revolves around cybersecurity and the vulnerability of various systems, including medical devices and large corporate networks. The speakers discuss the challenges faced by cybersecurity researchers when reporting vulnerabilities to companies, often encountering dismissive responses and a lack of accountability. They highlight the…
  continue reading
 
CYBERSECURITY - gatekeepers? Speakers Summary I'll proceed based on assuming that all statements without a clear speaker are being acknowledged by the moderator. - - Key contributions: Speaker 1: - The importance of taking calculated risks to achieve success. - Encouraging people to step out of their comfort zones and try new things. - Sharing expe…
  continue reading
 
This extensive audio transcript captures a lively and often chaotic Twitter Space discussion, revealing a dynamic conversation among several participants, notably Alberto, Charles, K, and Brittany. The core of their discussion revolves around personal anecdotes and challenges, ranging from technological issues like Wi-Fi problems and two-factor aut…
  continue reading
 
El "CYBERMIDNIGHT CLUB" de YouTube presenta un análisis profundo de una conversación de audio social llamada "king burrito.mpp3". Este análisis examina las complejidades de la interacción digital, incluyendo cómo las fallas técnicas afectan la experiencia del usuario y cómo las fallas de comunicación a menudo generan humor. La conversación también …
  continue reading
 
The source provides an interview transcript with Alissa Knight, a cybersecurity expert and entrepreneur, where she discusses her various ventures, primarily the upcoming launch of Knight TV Plus. This new streaming service, launching January 1st, will focus on cybersecurity content, including original series, documentaries, movies, and live broadca…
  continue reading
 
The YouTube channel "CYBERMIDNIGHT CLUB" features an excerpt from the transcript of a police press release describing "Operation Bitcoins" in Uruguay. The operation was initiated after improper entry into a government system, where sensitive information was extracted. The investigation identified a systems engineer linked to one of the IPs, who was…
  continue reading
 
IT support is changing fast, and the old service desk model is starting to feel like a relic from another era. In this episode, I spoke with Samuele Gantner, Chief Product Officer at Nexthink, about what comes next and what companies need to do now to prepare for it. With Nexthink sitting at the forefront of Digital Employee Experience (DEX) techno…
  continue reading
 
El texto ofrece una guía exhaustiva sobre el ecosistema de podcasts de ciberseguridad y hacking, describiendo su evolución desde transmisiones técnicas a narrativas sofisticadas. Organiza el contenido en cinco categorías principales: inmersiones narrativas, noticias y análisis semanales, programas técnicos, el elemento humano del engaño y briefings…
  continue reading
 
El papel de un CISO se ha vuelto excepcionalmente complejo en los últimos diez años, especialmente con el auge del trabajo remoto y la creciente migración de datos a la nube, haciendo que los primeros 90 a 101 días en un nuevo puesto sean cruciales para establecer una base de seguridad sólida. Los nuevos CISOs enfrentan desafíos significativos como…
  continue reading
 
We are speaking about YOUR privacy and YOUR #HumanRightsViolated tonight. I will disclose the tools that @Apple has, and show you the truth about what has been going on for a long time. VPN logs, Contacts, Emails, SMS logs, and much more. @jonathandata1 @adanielhill
  continue reading
 
The paper presents an analysis of the performance of a podcast titled "Cybermidnight Club" on Spotify, using Python code and the pandas library to process and clean data from a CSV file. Initially, the characteristics of the data are examined, including the type and number of non-null values in columns such as "Time (UTC)", "Plays", "Streams", "Hou…
  continue reading
 
Based on the 2024 UN Global Risk Report, this episode explores how global stakeholders perceive critical risks and the international community's readiness to address them. It reveals that humanity remains "dangerously unprepared" for the most important global vulnerabilities, particularly mis- and disinformation, and clusters of environmental, soci…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play