Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Nis2 Podcasts

show episodes
 
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
  continue reading
 
Artwork

1
Security Tech Talk

Steve Kenny, Axis Communications

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
  continue reading
 
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
  continue reading
 
Step into the DevOps Sauna with Darren Richardson and Pinja Kujala as they explore Agile and DevOps methodologies. Hear from various industry experts and discover how Agile and DevOps principles can transform any part of your business. The DevOps Sauna ensures you have the latest practices and trends to maintain a competitive edge.
  continue reading
 
Artwork

1
Cyber Talks

Léa Mitteaux

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Are you ready to explore the future of cybersecurity? Join us on Cyber Talks by Devoteam the videocast where industry experts, thought leaders, and practitioners share their insights, experiences, and strategic perspectives. Hosted by Rui Shantilal, VP of Devoteam Cyber Trust, each episode delves into key cybersecurity topics—from Offensive Security and DORA Compliance to Third-Party Risk Management and IAM. Whether you're a seasoned security leader, a CISO navigating complex challenges, or ...
  continue reading
 
Welcome to Cyber Insights, the podcast that bridges the worlds of networking and cybersecurity. From cutting-edge innovations in enterprise connectivity to the latest in digital defense, we break down the buzzwords and bring you actionable insights to secure and scale your systems. Whether you're an IT professional, business leader, or tech enthusiast, join us as we explore the critical intersection of networks and security, featuring expert conversations, industry trends, and real world str ...
  continue reading
 
The Cyber Resilience Brief is your 15-minute pulse on how organizations can build stronger defenses and achieve true cyber resilience. Each episode dives into the practical realities of Breach and Attack Simulation (BAS), adversarial exposure validation, and the evolving strategies that keep modern enterprises secure. Hosted by Tova Dvorin and brought to you by SafeBreach — the leader in Adversarial Exposure Validation — this podcast features insights from cybersecurity leaders, integration ...
  continue reading
 
Artwork
 
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
  continue reading
 
Artwork

1
Safety Corner

Florian Wagner

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Der Podcast für die Safety Community. Expert:inn:en im Gespräch über Safety Engineering und Management im Kontext von großen, komplexen Systemen. About the host: Florian Wagner is a Functional Safety Consultant with msg Plaut Austria. He has worked in Automotive, Railway and Aerospace projects. Mehr erfahren: https://safetycorner.wagnerflorian.eu/index.php/de/der-host
  continue reading
 
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
  continue reading
 
Artwork

1
The Cyber Cookie

CommSec Communications and Security Limited

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
  continue reading
 
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
  continue reading
 
Introducing The Cyber Translator, a 10-minute podcast designed for busy business leaders who want to bridge the gap between cybersecurity, technology, and business strategy. Hosted by Sean Hanna, this podcast cuts through the complexity of cyber technology, risk, and governance, translating it into practical, actionable insights that drive real business value. Each episode helps business leaders understand "technology speak" and shows them how to turn cybersecurity and compliance into opport ...
  continue reading
 
Loading …
show series
 
Are you prepared for DORA and NIS2, the EU regulations fundamentally reshaping the cybersecurity landscape? For many organisations in the financial and critical infrastructure sectors, navigating these new frameworks presents a significant challenge, moving beyond a simple checklist to demand true operational resilience. In this episode of Cyber Ta…
  continue reading
 
The EU’s NIS2 Directive is reshaping the global cybersecurity landscape with sweeping requirements for essential and important entities, strict reporting obligations, and substantial penalties for non-compliance. In this episode of Cyber Resilience Brief, host Tova Dvorin is joined by Adrian Culley, Senior Sales Engineer at SafeBreach and EU/UK reg…
  continue reading
 
Key insights and practical tips from the first year of NIS2 to help improve your cybersecurity, compliance, and supply chain resilience.It’s been nearly a year since NIS2 came into force, marking a significant shift in how organizations approach cybersecurity and risk management. The first year has brought valuable lessons, revealed common pitfalls…
  continue reading
 
Send us a text In this episode, Pinja and Darren take a critical look at the state of DevSecOps through the lens of three recent industry reports from Snyk, Checkmarx, and Datadog. From “shift left” gone wrong, to the cultural gaps between development and security teams, to metrics that don’t always measure what matters—what’s really happening with…
  continue reading
 
70% of critical security debt stems from third-party code - what can be done upstream? How real-time threat intelligence and policy enforcement are closing the gap Why DORA and modern CI/CD pipelines demand pre-emptive visibility and automation Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability M…
  continue reading
 
Step inside the hidden world of the dark web with SafeBreach’s Cyber Resilience Brief. In this episode, Senior Sales Engineer Hudney Piquant shares eye-opening stories from his explorations into hacker forums and ransomware recruitment pipelines. Discover: How cybercrime groups like Conti operate more like corporations than chaos-driven collectives…
  continue reading
 
In this episode, Dejan Kosutic, CEO at Advisera, chats with Thom Langford, CTO of the EMEA region at Rapid7 and a director at (TL)2 Security. Thom shares invaluable insights from his 30-year career in cybersecurity, focusing on creating a business-aligned cybersecurity strategy and building a cybersecurity culture. Learn why understanding your busi…
  continue reading
 
Send us a text In this episode of DevOps Sauna, Pinja and Darren sit down with Eficode’s Lead AI Consultant, Henri Terho, to unpack the hype and realities around artificial intelligence in business. They explore why so many AI projects fail, what true success looks like, and how companies can actually see return on investment. From data quality cha…
  continue reading
 
In this urgent episode of The Cyber Resilience Brief, host Tova Dvorin and SafeBreach’s Adrian Culley analyze the brand-new CISA AR25-261A report detailing malicious listeners in Ivanti Endpoint Manager Mobile (EPMM). We break down how attackers are exploiting CVE-2025-4427 and CVE-2025-4428, using sophisticated base64-encoded payload delivery to e…
  continue reading
 
Dashboards don’t decide. Agents do. In this episode of Startuprad.io, we sit down with Jennifer Grün, Senior Specialist for Generative AI & ML at AWS, to explore how agentic AI is rewriting the rules of SaaS. Instead of static dashboards and brittle automations, SaaS is moving toward agents that reason, plan, and act—delivering outcomes like churn …
  continue reading
 
SIEM. XDR. SOAR. Three acronyms that dominate cybersecurity conversations but what do they really mean for your business in 2025? In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray, Rory Higgins, and Ian Finlayson are joined by Leigh Cockell, Principal Sales Engineer at ConnectWise, to cut through the nois…
  continue reading
 
Scattered Spider — also known as UNC3944, Oktapus, and Muddled Libra — has quickly become one of today’s most notorious cybercriminal groups. From high-profile breaches at MGM Resorts and Caesars Entertainment to attacks on retailers and airlines, their tactics show that the biggest threat isn’t always malware — it’s social engineering. In this epi…
  continue reading
 
Steve welcomes Leo Levit, chair of ONVIF (Open Network Video Interface Forum), to talk about the evolution of IP security standards. Leo and Steve discuss ONVIF's journey from its founding by Axis, Bosch, and Sony in 2008, overcoming initial skepticism, to becoming the standard for interoperability. Leo highlights ONVIF's growth, noting the increas…
  continue reading
 
Send us a text A major security incident shook the JavaScript world when malicious code was discovered in 20 widely used NPM packages, collectively downloaded over 2 billion times per week. In this episode, Pinja and Darren break down what happened, how a phishing email led to the breach, and why human error remains one of the biggest risks in cybe…
  continue reading
 
POC is dead. Proof of Value is the new standard for AI startups. In this episode, AWS’s Jennifer Grün reveals the AI monetization strategy that separates demos from businesses. What You’ll Learn in This Episode: – Why hybrid pricing models (subscriptions + credits) outperform per-seat SaaS in AI – How to replace Proof of Concept with Proof of Value…
  continue reading
 
In this episode of the Secure and Simple podcast, host Dejan Kosutic interviews George Kesteven, CEO of Frontex, who shares his experience in corporate governance. They discuss the critical importance of proper documentation and knowledge management in organizations for effective governance and compliance. The conversation covers the fundamentals o…
  continue reading
 
Send us a text In this episode of DevOps Sauna, Pinja and Darren dive into one of the most pressing topics of our time: the ethics of AI. From copyright infringement and data usage to environmental impact and corporate responsibility, they unravel the hidden costs behind today’s AI boom. They explore how big tech handles data, the consequences of A…
  continue reading
 
What if the next billion-dollar startup was brewing in Berlin, Munich, or Vienna right now? In this episode, we cover the game-changing deals, deep tech breakthroughs, and green innovation stories shaping the DACH startup scene in September 2025. Whether you’re a founder, VC, or ecosystem insider, this is your shortcut to staying ahead in Europe’s …
  continue reading
 
In this episode of the Cyber Resilience Brief, co-hosts Tova Dvorin and Adrian Culley dive into the FBI’s recent PSA 25820 alert on Dragonfly (a.k.a. Energetic Bear, Static Tundra) — one of the most persistent, state-sponsored Russian cyber espionage groups targeting critical infrastructure and industrial control systems (ICS). We break down Dragon…
  continue reading
 
Steve invites SecureLogiq’s Ben Yoxall to explore the transformative power of optimized storage solutions in video surveillance and security systems. Ben talks about how these innovations not only drive cost efficiency but also align with sustainability goals, offering a competitive edge in today's eco-conscious market. Delve into the evolving IT i…
  continue reading
 
What’s it really like to be a woman in cybersecurity in 2025? In this special International Women in Cyber Day episode, SafeBreach leaders and team members share candid stories of resilience, representation, and mentorship. Hear how they balance career and family, tackle technical challenges, and empower future generations to step into cyber with c…
  continue reading
 
Berlin’s AI just rocketed from $350M to $2.3B. At the same time, Switzerland locked in €825M hydrogen funding, and N26 faced its toughest governance test yet. This is not Silicon Valley news. This is the DACH region (Germany, Austria, Switzerland) reshaping startup dynamics — and it’s moving fast. In this Startuprad.io Summer Wrap-Up 2025, we unpac…
  continue reading
 
What does it really take to move from a GenAI prototype to a production-ready system? In this episode, AWS AI Engineering Specialist Dennis Traub breaks down the hard truths behind scaling, securing, and monitoring AI systems — and why the future belongs to startups who learn how to productionize AI fast. What You’ll Learn in This Episode: Why most…
  continue reading
 
Send us a text In this summer catch-up episode of DevOps Sauna, Darren and Pinja dive into the biggest tech and culture stories of the past months. From OpenAI’s failed Windsurf deal and Google’s licensing swoops, to Sam Altman calling AI a bubble and GitHub’s leadership shake-up, they explore how AI, security, and open-source are reshaping the ind…
  continue reading
 
In this special episode of The Cyber Resilience Brief, hosts Tova Dvorin and Adrian Culley unpack the newly released CISA Advisory AA25-239, a joint warning from CISA, NSA, FBI, and international partners on the persistent Chinese state-sponsored threat group known as Salt Typhoon. Salt Typhoon has been quietly infiltrating critical infrastructure …
  continue reading
 
Most security teams are laser-focused on patching CVEs, but does that guarantee protection? In this episode, SafeBreach Co-Founder & CTO Itzik Kotler and VP of Sales Engineering Michael De Groat unpack the real risks that slip through even the most rigorous vulnerability management programs. From misconfigurations and overly-permissioned identities…
  continue reading
 
In this episode, host Dejan Kosutic, CEO of Advisera, welcomes John Verry, Managing Director at CBIZ Pivot Point Security consulting company. With over 25 years of experience and managing more than a thousand clients, John shares his immense expertise in various cybersecurity frameworks, including ISO 27001, CMMC, HIPAA, and HITRUST. The discussion…
  continue reading
 
Send us a text As summer holidays roll in, Pinja and Darren take a step back from the usual deep dives into DevOps to reflect on the past six months of the DevOps Sauna. From endless AI debates and myth-busting episodes (“Is Jenkins dead?”) to accessibility, platform engineering at the edge, and even a full episode on sauna culture, they revisit th…
  continue reading
 
In this episode of The Cyber Resilience Brief, host Tova Dvorin and SafeBreach Senior Sales Engineer Adrian Culley dissect the stealthy tactics of Volt Typhoon, a Chinese state-sponsored cyber group targeting critical infrastructure worldwide. Learn how their “living off the land” techniques bypass traditional defenses, what indicators of compromis…
  continue reading
 
Send us a text In this episode, we celebrate winning Atlassian’s Partner of the Year – World-Class Software Development award and explore what it truly means. CTO of Managed Services Kalle Sirkesalo joins Darren and Pinja to discuss how Eficode transforms the way teams build software—focusing on culture, tools, processes, and people over code. From…
  continue reading
 
Startups love GenAI. But most founders are using it unsafely — and exposing their team, their customers, and their legal risk without even realizing it. In this episode of Startuprad.io, we sat down with Dennis Traub, AI Engineering Specialist at AWS, to unpack what safe adoption of Generative AI really means for founders, CTOs, and product leads. …
  continue reading
 
In this special Black Hat/DEFCON 2025 edition of The Cybersecurity Brief, host Tova Dvorin sits down with SafeBreach Labs researchers Or Yair and Ron Ben-Yizhak to unpack three groundbreaking discoveries shaking up the cybersecurity world. From abusing Windows RPC for devastating DoS and DDoS attacks, to exploiting Google Gemini through nothing mor…
  continue reading
 
In this episode of the Secure and Simple Podcast, host Dejan Kosutic interviews Carlos Cruz, founder of Metanoia Consulting in Portugal. They discuss essential best practices for creating and managing policies, procedures, plans, and other documents for compliance with ISO standards and cybersecurity regulations. Carlos shares insights on the disti…
  continue reading
 
Send us a text In the final episode of their mini-series on platform engineering at the edge, Darren and Pinja dive deep into the often-overlooked security risks of edge and IoT environments. From car key hacks and USB-based keyboard attacks to ransomware targeting medical devices and smart cities, they reveal how proximity and physical access chan…
  continue reading
 
What happens after a traditional penetration test? In this episode, host Tova Dvorin is joined by Adrian Culley, Senior Sales Engineer and EU lead at SafeBreach, to explore the critical evolution from legacy pentesting to continuous, automated red teaming (CART) and breach and attack simulation (BAS). We dive deep into the limitations of point-in-t…
  continue reading
 
Send us a text Darren and Pinja continue their series on platform engineering on the edge by diving into some of the most fascinating real-world use cases. From software updates on the Voyager space probes and Antarctic research stations to cars, planes, and even grocery delivery robots, they explore how platform engineering makes these edge deploy…
  continue reading
 
Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats Meeting API compliance and data protection challenges with emerging technologies Moving towards a mature posture for API security Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Satyam Rastogi, Director of Information Security & …
  continue reading
 
What if every second leadership hire in your startup fails — costing you up to €250,000? In this episode of Startuprad.io, we uncover why so many startup executive hires flop and how diagnostic hiring is rewriting the rules of leadership selection. What You'll Learn: Why more than 50% of startup VP and C-level hires fail within 18 months The real-w…
  continue reading
 
A new breed of ransomware is on the rise: Warlock. In this episode, host Tova Dvorin and SafeBreach senior sales engineer Adrian Culley dig into the chilling details of the Warlock ransomware campaign and its deployment by Chinese threat actor Storm-2603. Learn how this adversary is combining nation-state level tactics with financially motivated ra…
  continue reading
 
In this episode of the Secure and Simple Podcast, we sit down with Terry Ziemniak, an experienced fractional CISO with over a decade in the field. Terry shares his unique career journey from traditional cybersecurity roles to becoming a trusted fractional CISO. We discuss the key differences between full-time and fractional CISOs, how to balance mu…
  continue reading
 
In this episode of the SafeBreach Cyber Resilience Podcast, host Tova Dvorin sits down with Senior Sales Engineer Adrian Culley to dissect one of the most aggressive ransomware threats in circulation today: Interlock. Backed by a rapidly evolving, financially motivated threat group, Interlock ransomware isn’t just encrypting systems—it’s stealing s…
  continue reading
 
Send us a text Darren and Pinja break down the basics of platform engineering on the edge, from the “boring” to the truly remote and unreachable. They explore how GitOps, Kubernetes, and infrastructure as code enable reliable software updates in spotty or disconnected environments—whether in cars, factories, ships, or even Mars rovers—and why getti…
  continue reading
 
Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats Meeting API compliance and data protection challenges with emerging technologies Moving towards a mature posture for API security Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Tiago Rosado, Chief Information Security Officer, A…
  continue reading
 
Tom Fox takes a solo turn as Jonathan Armstrong is on assignment. Today, Tom visits with Inge Zwick, Executive Director, Head of Europe, and ESG Lead at Emapta Global, a global outsourcing company. They discuss the company’s operations, with a particular focus on managing GDPR compliance within the outsourcing framework. They also discuss common mi…
  continue reading
 
In this urgent Cyber Resilience Brief, host Tova Dvorin is joined by SafeBreach experts Adrian Culley and Tomer Bar to break down CVE-2025-53770, a critical zero-day vulnerability actively exploited in Microsoft SharePoint Server. Known as part of the ToolShell attack chain, this deserialization flaw allows unauthenticated remote code execution and…
  continue reading
 
What if finance wasn’t a bottleneck but your secret growth weapon? Moss CEO Ante Spittler joins Startuprad.io to reveal how his Berlin fintech is helping over 5,000 SMEs automate spend, ditch spreadsheets, and scale smarter. What You'll Learn: How Moss raised €180M and scaled to process €5B+ annually The biggest finance automation challenges for Eu…
  continue reading
 
Analysing how your teams cope with a cyber incident or a failure scenario Learning from crises - building resilience strategies to mitigate future incidents Building a cyber resilient mindset within your infosec team and in the wider organisation Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Raza Sadiq, Head of Enterprise…
  continue reading
 
AI vs. Cybersecurity: The New Frontline In this eye-opening episode, host Tova Dvorin sits down with Tomer Bar, VP of Security Research at SafeBreach, and Shelly Zucker, Product Manager at SafeBreach, to unravel the alarming ways AI is transforming the cyber threat landscape—and what it means for defenders. The conversation kicks off with jaw-dropp…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play