Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

CyberSecurity Summary Podcasts

show episodes
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork
 
The InfoSec.Watch Podcast delivers the week’s most important cybersecurity news in a fast, clear, and actionable format. Each episode breaks down major incidents, vulnerabilities, threat-actor activity, and security trends affecting modern organizations — without the noise or hype. The show translates complex cyber topics into practical insights you can use immediately in your job, whether you work in security engineering, cloud security, threat detection, governance, or IT. If you want to s ...
  continue reading
 
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
  continue reading
 
The Financial Management (FM) magazine podcast series features conversations with executives and thought leaders in management accounting. We discuss topics including governance, risk management, performance management, technology, corporate strategy, and leadership. Interviews are conducted by FM editors and contributors.
  continue reading
 
Artwork

4
Best Book Breakdown

Best Book Breakdown

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Best Book Breakdown, the podcast that breaks down the bestseller books you need to read! If you love the idea of reading all the latest bestsellers but simply don't have the time, then this podcast is perfect for you. Each episode, we'll provide you with a comprehensive summary of a popular book that has made it onto the bestseller lists. We'll cover everything from plot and character development to key themes and takeaways, giving you all the information you need to know in a con ...
  continue reading
 
In a world where technology and cybersecurity are constantly evolving, staying ahead of the curve is no longer just an option—it's a necessity. Prime Cyber Insights plunges you into the fast-paced universe of tech and cybersecurity, where the stakes are high, and the pace is relentless. Hosted by Niko Pulse and Kyra Pixel, this daily podcast is your essential guide to navigating the ever-changing landscape of technology and cybersecurity. From AI breakthroughs to the latest in cyber threats, ...
  continue reading
 
Loading …
show series
 
A comprehensive overview of penetration testing concepts and methodologies, covering various attack types and the tools used by security professionals. They detail social engineering techniques like phishing, vishing, smishing, and physical exploits such as dumpster diving and badge cloning. The sources also explore different penetration test scope…
  continue reading
 
Offers an in-depth look at the Certified Information Systems Auditor (CISA) certification. It covers critical aspects of information systems auditing, including processes, risk management, business resilience, and security controls, with a focus on preparing candidates for the CISA exam through key concepts and self-assessment questions. The text a…
  continue reading
 
In this week’s InfoSec.Watch episode, hosts Grant Lawson and Sloane Parker analyze the top cybersecurity stories: an actively exploited Oracle IdM zero-day added to CISA’s Known Exploited Vulnerabilities catalog, OpenAI cutting off Mixpanel after a data breach, and ransomware disrupting the CodeRED emergency alert system. Additional coverage includ…
  continue reading
 
A preparation guide for Certified Ethical Hacker (CEH) certification, focusing on a wide array of cybersecurity topics. It covers fundamental concepts such as ethical hacking, vulnerabilities, and types of attacks, moving into practical methodologies like footprinting, network scanning, and enumeration. The guide also details various malicious soft…
  continue reading
 
Focusing on cybersecurity defense through the lens of offensive security. The material covers the evolution of cybersecurity practices, critiques the traditional passive and reactive defense posture, and advocates for an "Active Defender" mindset, which involves understanding and leveraging attacker methodologies, tools, and the hacker mentality. K…
  continue reading
 
Outlines a seven-step methodology for building an effective InfoSec program by focusing on the "art," or people side, of security. The author, Todd, draws on over two decades of experience to argue that success hinges on cultivating strong relationships and ensuring alignment with the company's risk tolerance, as most organizations are indifferent …
  continue reading
 
Focusing heavily on the complexities of cloud governance, compliance, and auditing. A significant portion of the text is dedicated to the Cloud Controls Matrix (CCM), an industry-specific framework developed by the Cloud Security Alliance (CSA), which is used to assess security and compliance across various cloud service models like IaaS, PaaS, and…
  continue reading
 
Explains the nature of cybercrime and the three primary levels of the internet: the Surface Web, Deep Web, and Dark Web. A significant portion of the material details the major criminal activities found on the Dark Web, including drug trafficking, child pornography, human trafficking, and cyberterrorism. Finally, the excerpts examine the various to…
  continue reading
 
Serves as an in-depth textbook resource, outlining the foundational concepts of cybersecurity, beginning with definitions of data, information, and networking. It extensively covers the history and evolution of cybercrime, categorizing various malicious activities like phishing, spoofing, and different types of DDoS attacks. Furthermore, the text e…
  continue reading
 
In this episode of the InfoSec.Watch Podcast, we unpack one of the most consequential weeks of cybersecurity developments in 2025. This episode covers a rare convergence of AI-augmented state-backed espionage, logistics and retail supply-chain ransomware, and Europe’s accelerating drive toward digital sovereignty—and this episode takes you step-by-…
  continue reading
 
Focusing on Ad Hoc Networks and utilizing the ns-3 simulator. The material covers both the theoretical and practical aspects of simulation, including the formal definition and characteristics of Mobile Ad Hoc Networks (MANETs), various wireless communication technologies (like IoT and Mobile Clouds), and the methodology for designing and analyzing …
  continue reading
 
A technical resource aimed at IT engineers looking to utilize Zabbix 5 for monitoring their environments. Authored by Nathan Liefting and Brian van Baekel, the book is structured as a recipe-style guide covering a vast array of Zabbix functionalities. Key topics include initial setup and user management, configuring various monitoring types (such a…
  continue reading
 
A deep foundation in blockchain technology, starting with a historical context of money and the centralized systems it relies upon, before introducing the decentralized, trustless model of blockchain. Significant portions detail the operational mechanics of the two leading public blockchains: Bitcoin and Ethereum, covering key concepts such as cryp…
  continue reading
 
Focusing on the application of user experience (UX) principles to Extended Reality (XR), which includes Virtual Reality (VR) and Augmented Reality (AR). The content explores the history of XR, the rise of UX design, and how these methodologies are crucial for driving the adoption of immersive technologies in areas like EdTech, MedTech, enterprise, …
  continue reading
 
An extensive table of contents and introductory material for a guide on using the popular code editor for Python development. The source details fundamental setup procedures such as installing Visual Studio Code, configuring a Python interpreter and extensions, and managing core editor features like settings, keybindings, and the Command Palette. F…
  continue reading
 
Argues that cybersecurity is primarily a behavioral challenge rather than a technological one, emphasizing that people are the cause of nearly all security incidents. The book introduces and elaborates on nine key cybersecurity habits—such as vigilance, skepticism, diligence, and deception—which are presented as actionable behaviors for both indivi…
  continue reading
 
Change consultant and executive coach Nicola Hopes shares several tips and tricks for crafting intentional business projects that can facilitate meaningful changes for organisations. Hopes explains the fundamental questions that help ensure projects achieve intended outcomes, the importance of knowing what good looks like throughout the process, an…
  continue reading
 
These excerpts from the book "Hands-on Data Virtualization with Polybase" provide an extensive look at how to implement data virtualization using PolyBase within SQL Server, including its use in Big Data Clusters and Azure Synapse Analytics. The text thoroughly explains the technical details, prerequisites, and setup procedures for connecting SQL S…
  continue reading
 
A practical guide for building and deploying DevOps pipelines using various open-source tools. The content focuses heavily on Linux fundamentals, including managing files, directories, users, and permissions, while also introducing modern DevOps practices. Specific technologies covered are VirtualBox and Vagrant for creating environments, core web …
  continue reading
 
Here’s what we cover in Episode 112: Actively Exploited Windows Kernel 0-Day: A privilege-escalation flaw in the Windows kernel is now being abused in real attacks. We cover what’s known, how attackers are chaining it, and the immediate mitigations security teams should prioritize. FortiWeb Critical Vulnerability Added to CISA’s KEV Catalog: A newl…
  continue reading
 
A comprehensive guide for security professionals and testers, detailing methodologies for identifying and exploiting numerous web application vulnerabilities. It extensively covers topics like authentication flaws, session management issues, access controls, injection attacks (such as SQL and XML injection), and Cross-Site Scripting (XSS), using to…
  continue reading
 
Provides comprehensive instruction on IBM Watson Solutions for Machine Learning, covering various aspects of Artificial Intelligence (AI) and cognitive tools. The text is structured as a book, detailing concepts from foundational machine learning (ML) and deep learning algorithms, such as linear regression and neural networks, to practical implemen…
  continue reading
 
An extensive overview of the Google Analytics platform, explaining its utility for measuring website traffic and user behavior to inform business decisions. The text details the platform's six major report categories—Realtime, Audience, Acquisition, Behavior, and Conversion—and outlines how to interpret core data components like dimensions and metr…
  continue reading
 
Focuses on building, designing, and deploying cloud-native applications and microservices. The book covers foundational concepts like cloud computing basics, major cloud providers (AWS, Azure, Google Cloud), and cloud-native design principles, including the shift from monolithic to microservices architecture. Significant attention is paid to Jakart…
  continue reading
 
A comprehensive overview of cloud computing concepts, including its history, characteristics, advantages, and disadvantages. The book extensively details the cloud service models (SaaS, PaaS, IaaS) and deployment models (public, private, hybrid, and community), along with a comparative study of the latter. Furthermore, the source material explores …
  continue reading
 
This technical resource is intended for experienced users like embedded engineers and kernel hackers and requires prior knowledge of C programming and Linux commands. The content offers comprehensive instruction on developing Linux drivers for kernel version v5.10 and embedded Linux systems, covering essential topics such as setting up the developm…
  continue reading
 
A comprehensive guide for architects and engineers on implementing and scaling modern DevOps practices within large enterprises, focusing heavily on automation, quality assurance, and security. Key topics covered include defining DevOps architecture, managing IT delivery in sourcing models, leveraging AIOps (Artificial Intelligence for IT Operation…
  continue reading
 
A comprehensive guide for migrating and optimizing Linux environments in cloud architectures, with a specific focus on Microsoft Azure but also referencing AWS and other cloud vendors. The content is structured around five core principles, addressing critical topics such as cloud readiness assessment, high availability, performance monitoring, secu…
  continue reading
 
A practical implementation guide for information technology administrators seeking to plan, design, and deploy Always On VPN using current best practices and various Microsoft technologies. Key technical topics covered include infrastructure prerequisites such as certificate management with PKI and Intune, network configuration with Routing and Rem…
  continue reading
 
A comprehensive guide for individuals aiming to become Security Operations Center (SOC) analysts, covering the essential knowledge, prerequisite technical skills like networking and endpoint security, and the tools critical to the role, such as SIEM and SOAR platforms. The chapters discuss the high demand and career trajectory within the cybersecur…
  continue reading
 
A fundamental shift in cybersecurity strategy toward a Zero Trust architecture. The author, an experienced former CIO, identifies five critical battlefields where defenders are currently disadvantaged: Education, Technology, Information, Economics, and Leadership. Testimonials and content previews affirm that the book details the history of this di…
  continue reading
 
An extensive overview of the Go programming language. It introduces fundamental concepts such as variables, functions, packages, program flow control, and data types like arrays and slices. Advanced topics covered include Go concurrency with goroutines and channels, systems programming, file I/O, networking (TCP/IP, HTTP, WebSockets, RESTful APIs),…
  continue reading
 
In celebration of CGMA Week, the FM podcast welcomed two CGMA designation holders who recently spoke at UK & Ireland ENGAGE to discuss the lessons they've learned throughout their careers, how their mindset has shifted over the years, and the advice they would give to finance professionals navigating opportunities in a challenging era defined by po…
  continue reading
 
A comprehensive overview of Microsoft 365 and related cloud concepts. The text thoroughly explains cloud computing fundamentals, including the benefits, economic models, and types like IaaS, PaaS, and SaaS. A significant portion details the diverse Microsoft 365 services covering productivity, collaboration (Teams, Viva, SharePoint), endpoint manag…
  continue reading
 
A comprehensive career guide for individuals in or entering the cybersecurity field. The book structures its advice around common career stages, addressing topics such as finding one's "why" for pursuing a security role, developing necessary technical and soft skills like emotional intelligence and effective communication, and strategies for managi…
  continue reading
 
A comprehensive guide for Red Hat Enterprise Linux 8 (RHEL8) administration, detailing various system management topics. The sources cover initial RHEL8 installation on both physical and virtual machines, including advanced options like cloud deployments and automated installation techniques. A significant portion focuses on core administration ski…
  continue reading
 
A comprehensive overview of the role and responsibilities of a Solutions Architect, focusing heavily on cloud computing environments. The text explores various architectural principles, including the importance of scalability and elasticity, security and compliance, and operational excellence in solution design. It details several architectural pat…
  continue reading
 
Focused on mastering the Secure Shell (SSH) protocol, primarily using OpenSSH and the Windows client PuTTY. The book is designed to guide both system administrators and general users beyond basic command-line usage, covering advanced topics such as encryption fundamentals, server and client configuration (including specific files like sshd_config a…
  continue reading
 
Aims to teach the Go programming language through an engaging, "brain-friendly" approach. It covers fundamental Go concepts such as variables, data types (including arrays, slices, maps, and structs), functions, packages, and control flow (conditionals and loops). The text also introduces advanced topics like pointers, methods, interfaces, error ha…
  continue reading
 
A comprehensive overview of healthcare information security and privacy for practitioners, focusing on the HCISPP certification. It covers critical areas such as medical coding systems (DRG, ICD, SNOMED CT), revenue cycle management, and workflow management in clinical and business settings. A significant portion addresses the regulatory environmen…
  continue reading
 
A beginner's guide to implementing CI/CD pipelines using Jenkins and YAML for various applications, including mobile, hybrid, and web. The author, a DevOps engineer, emphasizes DevOps as a cultural transformation driven by people, processes, and tools. The text introduces Jenkins, its evolution, and different pipeline types like Scripted, Declarati…
  continue reading
 
A structured approach to developing applications using Spring Boot. It covers foundational concepts like building web apps, data access, and developer tools, while also exploring advanced topics such as testing, production operations (including Docker and GraalVM), and building robust APIs. The book further examines messaging solutions and securing…
  continue reading
 
A comprehensive overview of fundamental networking concepts. It introduces various network components like RAM, NICs, hubs, switches, and routers, explaining their functions and interactions within a network. The material also details network topologies, including bus, ring, and star, alongside logical and physical implementations. A significant po…
  continue reading
 
A comprehensive exploration of mobile network technologies, detailing the evolution from GSM and UMTS to LTE and 5G New Radio. It outlines the intricate architecture, protocols, and operational procedures that underpin these wireless communication systems, including channel structures, mobility management, and call establishment. Furthermore, the t…
  continue reading
 
Provides an extensive overview of modern cybersecurity strategies, emphasizing the evolving role of the Chief Information Security Officer (CISO) from a technical expert to a strategic business leader. It covers critical aspects such as building a culture of security, managing diverse threat actors (nation-states, cybercriminals, hacktivists, and i…
  continue reading
 
Serves as an in-depth guide to Secure Access Service Edge (SASE). It explores the evolution of network security from traditional WANs to modern, cloud-centric architectures, emphasizing the need for SASE in today's distributed and dynamic enterprise environments. The source details SASE's foundational components, including SD-WAN, various security …
  continue reading
 
A field guide for designing, building, and assessing machine learning and AI systems. The book addresses the risks of AI failures, such as algorithmic discrimination and data privacy violations, which have become more common with wider adoption of ML technologies. It outlines a holistic approach to risk mitigation, combining technical practices, bu…
  continue reading
 
Executive coach and author Nick Robinson illuminates the challenging traits of work colleagues and shares strategies from his book — The 9 Types of Difficult People: How to Spot Them and Quickly Improve Working Relationships — that professionals can employ to improve relationships on the job. Robinson, a speaker at UK & Ireland ENGAGE earlier this …
  continue reading
 
Explores the integration of ITIL (Information Technology Infrastructure Library) principles with DevOps methodologies, offering innovative techniques for their combined application. It provides an in-depth look at ITIL's foundational concepts, including service lifecycle phases like strategy, design, transition, and operation, alongside essential p…
  continue reading
 
Trish and Tom take a deep dive into the NCSC Annual Review for 2025 and unpack practical tips for business leaders. We're tearing open the most critical report of the year: the NCSC Annual Review 2025. The message from GCHQ is crystal clear: Cyber risk is no longer just an IT issue—it’s a boardroom priority. Forget those old assumptions—the threats…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play