The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
VCISO Podcasts

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
Welcome to "The CvCISO Podcast" - an extension of SecurityStudio's vCISO training program. Designed to keep the conversation alive beyond the confines of traditional training, this podcast is your ongoing resource for all things related to Virtual Chief Information Security Officers (vCISOs). This podcast is a space where vCISOs can continue to explore, discuss, and evolve their understanding of the cybersecurity landscape. Join us as we delve into the experiences, perspectives, and challeng ...
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Welcome to Cybphered Reality – your trusted source for cybersecurity tips, tricks, and guidance. Powered by RITC Cybersecurity, this podcast is tailored for individuals and businesses looking to secure their digital assets in an increasingly connected world. We break down complex cybersecurity topics into simple, actionable insights to help you safeguard your data, identity, and online presence. Whether you’re a tech-savvy user or just getting started, Cybphered Reality helps you stay inform ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
SquareX is excited to launch The Be Fearless Podcast Series, where we bring together industry experts and professionals from the cybersecurity community. Hosted by SquareX Founder - and cybersecurity veteran - Vivek Ramachandran, look forward to insights about our guests’ journeys in security, the evolution of the field, the changing threatscape and how enterprises across industries are addressing them today.
…
continue reading
"Securing Our Place In The Industry" The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
…
continue reading
Welcome to Audience 1st. A podcast for tech marketers looking to break out of the echo chamber to better understand their audience and turn them into loyal customers. Every week, Dani Woolf is having brutally honest conversations with busy tech buyers about what really motivates them, the things they hate that vendors do, and what you can do about it. You’ll get access to practical information on how to build authentic relationships with your audience, listen to and talk with your buyers, an ...
…
continue reading

1
90% of Breaches Come Down to Just Two Simple Mistakes | Patrick Benoit, vCISO, Cyber Risk Insights
40:19
40:19
Play later
Play later
Lists
Like
Liked
40:19Patrick Benoit, President and Virtual CISO of Cyber Risk Insights, breaks down three decades of cybersecurity evolution and reveals why most organizations keep making the same fundamental mistakes. From protecting global enterprises like Brink's across 53 countries to small manufacturers, Patrick shares insights about the shift from perimeter think…
…
continue reading

1
vCISO Benefits as the CISO Becomes Strategic and the Board's Responsible for Security - Brian Haugli - BSW #410
59:29
59:29
Play later
Play later
Lists
Like
Liked
59:29Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
…
continue reading

1
U.S. vs International and European Cybersecurity Standards | Interview with John Verry
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34In this episode, host Dejan Kosutic, CEO of Advisera, welcomes John Verry, Managing Director at CBIZ Pivot Point Security consulting company. With over 25 years of experience and managing more than a thousand clients, John shares his immense expertise in various cybersecurity frameworks, including ISO 27001, CMMC, HIPAA, and HITRUST. The discussion…
…
continue reading
In this latest Episode of Ciphered Reality, We discuss all about hiring a vCISO and the associated benefits of hiring one. Stay with us till the end as we drop some serious insights on lates cybersecurity Industry news: Hypervolumetric DDoS Attacks reach record high MITRE launches security framework for Cryptocurrency Follow RITC CyberSecurity for …
…
continue reading

1
CvCISO Podcast Episode 60 Top 10 Mistakes vCISO's Make
50:00
50:00
Play later
Play later
Lists
Like
Liked
50:00Summary In this episode, the hosts discuss the top 10 mistakes made by Virtual Chief Security Officers (VCSOs) and how to avoid them. They emphasize the importance of understanding the role of a VCSO, effective communication with business leaders, and the need for a strategic approach to security rather than relying solely on tools. The conversatio…
…
continue reading

1
Incident Response Plans | Browsers as Cyber Battlegrounds & AI Security Risks – Ciphered Reality
52:55
52:55
Play later
Play later
Lists
Like
Liked
52:55Episode Overview: Your browser isn’t just for surfing the web anymore—it’s becoming the front line of cyber warfare. And when it comes to AI in security, remember: garbage in = garbage out. In this episode of the Ciphered Reality Podcast by RITC Cybersecurity, we break down: 🔹 The Browser Battleground – Why your browser is a prime target for attack…
…
continue reading

1
CCT 277: Practice CISSP Questions - Data Security Controls (Domain 2.6)
36:27
36:27
Play later
Play later
Lists
Like
Liked
36:27Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Dive into the multifaceted world of data security controls with Sean Gerb…
…
continue reading

1
MSP vs MSSP: Why Outsourced Security Often Falls Short
28:05
28:05
Play later
Play later
Lists
Like
Liked
28:05In this episode of Breakfast Bytes, Felicia explained the key differences between Managed Service Providers and Managed Security Service Providers, emphasizing that organizations should prefer MSPs acting as their full internal IT departments for security functions unless they are the IT department and lack necessary technical skills. She highlight…
…
continue reading

1
The Simplest Answer Is Usually Right in Cybersecurity | Travis Farral, VP & CISO, Archaea Energy
39:30
39:30
Play later
Play later
Lists
Like
Liked
39:30Travis Farral, Vice President and CISO at Archaea Energy, joins us to share hard-earned wisdom from securing everything from oil giants to renewable energy startups. In this episode, Travis shares how even non-nation-state actors are getting stronger, the need for browser-level protection and why hiring the wrong person hurts more than not hiring a…
…
continue reading

1
Security Money: The Index Dips and 20 Years of Cybersecurity Consolidation - Ross Haleliuk - BSW #411
1:04:12
1:04:12
Play later
Play later
Lists
Like
Liked
1:04:12The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
…
continue reading

1
Security Money: The Index Dips and 20 Years of Cybersecurity Consolidation - Ross Haleliuk - BSW #411
1:04:12
1:04:12
Play later
Play later
Lists
Like
Liked
1:04:12The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
…
continue reading

1
Security Money: The Index Dips and 20 Years of Cybersecurity Consolidation - Ross Haleliuk - BSW #411
1:04:12
1:04:12
Play later
Play later
Lists
Like
Liked
1:04:12The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
…
continue reading

1
Security Money: The Index Dips and 20 Years of Cybersecurity Consolidation - Ross Haleliuk - BSW #411
1:04:12
1:04:12
Play later
Play later
Lists
Like
Liked
1:04:12The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
…
continue reading

1
Rinoa Poison, Scambaiter Extraordinaire - Rinoa Poison - SWN #508
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29I talk to Rinoa Poison about scambaiting, identity, and all sorts of things. Check it out. Show Notes: https://securityweekly.com/swn-508
…
continue reading

1
Rinoa Poison, Scambaiter Extraordinaire - Rinoa Poison - SWN #508
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29I talk to Rinoa Poison about scambaiting, identity, and all sorts of things. Check it out. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-508
…
continue reading

1
Never Stop Learning, Ask the Right Questions | Tom Hollingsworth, Practice Lead, Tech Field Day
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24Tom Hollingsworth, the "Networking Nerd" and Tech Field Day's Event Lead, sits down with SquareX Field CISO John Carse to share his 20+ year journey in enterprise networking and how he helped build one of tech's most influential community events. From troubleshooting school networks to orchestrating conversations between vendors and independent tho…
…
continue reading

1
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Chris Boehm, Idan Plotnik, Josh Lemos, Michael Callahan - ASW #346
1:08:11
1:08:11
Play later
Play later
Lists
Like
Liked
1:08:11In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
…
continue reading

1
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Michael Callahan, Idan Plotnik, Josh Lemos, Chris Boehm - ASW #346
1:08:11
1:08:11
Play later
Play later
Lists
Like
Liked
1:08:11In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
…
continue reading

1
AI Literacy Is the New Survival Skill | Olivia Heslinga, Founder of AI for Good Denmark
52:23
52:23
Play later
Play later
Lists
Like
Liked
52:23Olivia Heslinga, founder of AI for Good Denmark and AI literacy consultant, joins SquareX Field CISO John Carse to discuss the (security) implications of AI's rapid evolution. They dive into how browser AI agents can compromise your entire digital life with just basic permissions, why third-party AI tools are essentially viruses infiltrating organi…
…
continue reading

1
CCT 276: Data Lifecycle and the CISSP (Domain 2.4)
46:40
46:40
Play later
Play later
Lists
Like
Liked
46:40Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv From insecure code causing breaches to proper data destruction, this epis…
…
continue reading

1
Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422
1:46:21
1:46:21
Play later
Play later
Lists
Like
Liked
1:46:21Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organiza…
…
continue reading

1
Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422
1:46:21
1:46:21
Play later
Play later
Lists
Like
Liked
1:46:21Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organiza…
…
continue reading

1
CvCISO Podcast Episode 62: The AI Myth or Fact Game
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10The podcast features a lively discussion among hosts and guests. Cybersecurity news is a critical topic in today's digital landscape. AI raises ethical questions regarding likeness and consent. Recent breaches highlight the need for accountability in cybersecurity. Community engagement is essential for raising awareness about cybersecurity issues. …
…
continue reading

1
CvCISO Podcast Episode 61 : St. Paul Ransomware Cyber Attack
57:42
57:42
Play later
Play later
Lists
Like
Liked
57:42In this episode, the hosts discuss the recent cybersecurity attack on St. Paul, Minnesota, exploring the nature of the attack, the implications for city services, and the importance of effective communication and incident response planning. They emphasize the need for transparency and accountability in handling such incidents, as well as the role o…
…
continue reading

1
Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland - SWN #507
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51Porn bombing the celestial zoom room and Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-507
…
continue reading

1
Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland - SWN #507
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51Porn bombing the celestial zoom room and Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-507
…
continue reading

1
AI Will Replace Tier 1 Security Analysts | Clea Ostendorf, CEO/Co-Founder, Wolfpack Security
43:42
43:42
Play later
Play later
Lists
Like
Liked
43:42Clea Ostendorf, co-founder of Wolfpack Security, breaks down why security programs fail to get developer buy-in and shares her journey from sales to building a security consultancy. She reveals the real problems behind vulnerability management chaos, explains why most pentesting findings are just "boring" basics like outdated versions and hardcoded…
…
continue reading

1
Hackers Steal Your Car and Vulnerabilities - Rob Allen - PSW #889
2:10:12
2:10:12
Play later
Play later
Lists
Like
Liked
2:10:12Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News: Flipper Zero, unlocking cars: The saga continues The one where they stole the vulnerabilities ESP32 Bus Pirates AI will weaponize everything, maybe What are in-the-wild exploits? Docker and security boundaries,…
…
continue reading

1
Hackers Steal Your Car and Vulnerabilities - Rob Allen - PSW #889
2:10:12
2:10:12
Play later
Play later
Lists
Like
Liked
2:10:12Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News: Flipper Zero, unlocking cars: The saga continues The one where they stole the vulnerabilities ESP32 Bus Pirates AI will weaponize everything, maybe What are in-the-wild exploits? Docker and security boundaries,…
…
continue reading

1
Netflix Phishing & Security for... Pizza? | Stephen Bennett, Global CISO, Domino's Pizza Enterprises
41:52
41:52
Play later
Play later
Lists
Like
Liked
41:52Stephen Bennett, Global CISO at Domino's Pizza, shares his unconventional journey from getting electrocuted while tinkering with TVs as a kid to protecting one of the world's largest pizza brands across 12 markets and millions of digital transactions. He discusses unique cybersecurity challenges like credential stuffing attacks, managing security a…
…
continue reading

1
CCT 275: CISSP Rapid Review (Domain 4) - Part 2
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The digital world has opened up unprecedented opportunities for scammers,…
…
continue reading

1
The CISO Championing Women in Cybersecurity | Eric Gray, BeLux CISO, Kyndryl
37:42
37:42
Play later
Play later
Lists
Like
Liked
37:42Eric Gray, BeLux CISO at Kyndryl, shares his unique journey from Royal Bank of Canada to becoming one of only two Canadians living in Luxembourg. In this episode, he also discusses the cybersecurity landscape across highly regulated European environments, the critical importance of supporting women in cybersecurity as a board member of Women Cyber …
…
continue reading

1
vCISO Benefits as the CISO Becomes Strategic and the Board's Responsible for Security - Brian Haugli - BSW #410
59:29
59:29
Play later
Play later
Lists
Like
Liked
59:29Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
…
continue reading

1
vCISO Benefits as the CISO Becomes Strategic and the Board's Responsible for Security - Brian Haugli - BSW #410
59:29
59:29
Play later
Play later
Lists
Like
Liked
59:29Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
…
continue reading

1
vCISO Benefits as the CISO Becomes Strategic and the Board's Responsible for Security - Brian Haugli - BSW #410
59:29
59:29
Play later
Play later
Lists
Like
Liked
59:29Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
…
continue reading

1
Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet... - SWN #506
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-506
…
continue reading

1
Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet... - SWN #506
33:44
33:44
Play later
Play later
Lists
Like
Liked
33:44Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-506
…
continue reading

1
Bridging Worlds: The Evolving Landscape of IoT Security and Regulation
32:32
32:32
Play later
Play later
Lists
Like
Liked
32:32Aseem Jakhar, Cybersecurity Entrepreneur, Technologist, and Founder of EXPLIoT, joins Phillip Wylie to address the current state and evolution of IoT and hardware security, examining why security has lagged in this sector compared to other technological advances. By exploring regulatory changes, practical security considerations for both researcher…
…
continue reading

1
Why The Nigerian Scam Still Works After 30 Years | John Dunne, Head of Security, Grant Thornton UK
40:40
40:40
Play later
Play later
Lists
Like
Liked
40:40John Dunne, Head of Security at Grant Thornton UK, shares his remarkable 30-year journey from training as a chef to becoming one of the UK's most experienced cybersecurity leaders. John reveals why recruiting people from hospitality backgrounds makes better security professionals than traditional tech graduates, and explains why the decades-old Nig…
…
continue reading
In this episode of The Virtual CISO Moment, Dylan Owen shares his journey from webmaster in the 1990s to leading cybersecurity teams at Raytheon and serving as CISO at Nightwing. He reflects on the challenges of transitioning into executive leadership, the realities of the vCISO role, and how SMBs can best approach detection and response. Dylan als…
…
continue reading

1
Translating Security Regulations into Secure Projects - Roman Zhukov, Emily Fox - ASW #345
1:13:31
1:13:31
Play later
Play later
Lists
Like
Liked
1:13:31The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
…
continue reading