Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Resilience Strategies Podcasts

show episodes
 
Artwork

1
Cyber Survivor

Dan Dodson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
The Cyber Resilience Brief is your 15-minute pulse on how organizations can build stronger defenses and achieve true cyber resilience. Each episode dives into the practical realities of Breach and Attack Simulation (BAS), adversarial exposure validation, and the evolving strategies that keep modern enterprises secure. Hosted by Tova Dvorin and brought to you by SafeBreach — the leader in Adversarial Exposure Validation — this podcast features insights from cybersecurity leaders, integration ...
  continue reading
 
Cyber resilience is fast emerging as the driving force behind critical business continuity in our digital era. Faced with brownouts, blackouts, and the ‘when not if’ nature of cyberattacks, how do businesses harness this resilience for stronger cybersecurity and networking? Listen in to The Resilience Factor as our hosts — renowned social engineer Jenny Radcliffe and Zscaler’s own Kate Baker — explore how organizations and employees can fail forward to adapt with confidence. Through trend-ba ...
  continue reading
 
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
  continue reading
 
Artwork

1
ThreatCast

Threatscape

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
  continue reading
 
Artwork

1
To The Point - Cybersecurity

Forcepoint | Global Cybersecurity Leader | Security. Simplified.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
  continue reading
 
Artwork

1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™

Startuprad.io – Europe’s Startup & VC Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
  continue reading
 
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
  continue reading
 
Pathways-2-Partnership (P2P) delivers expert insights, real-world success stories, and actionable strategies from MoveAmerica—the premier think tank for public-private collaboration. Each episode will explore innovations, partnerships, and policies that strengthen the defense industrial base, secure supply chains, and drive mission success. Created for entrepreneurs, industry executives, government leaders, and policy makers, P2P helps you navigate the acquisition processes, ethically influe ...
  continue reading
 
Artwork

1
Global Warming is Real

Thomas Schueneman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Global Warming is Real podcast seeks to raise awareness and inspire action. We advocate for climate action, environmental stewardship, and sustainable human development Through compelling storytelling and insightful interviews, we explore the realities of global warming and highlight innovative solutions from around the world. Our show combines first-person narratives, meditations, book reviews, and expert discussions with authors, activists, scientists, policymakers, and entrepreneurs. ...
  continue reading
 
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
  continue reading
 
In a world where technology moves faster than strategy, how do businesses keep their data and their future secure? Smarter, Strategic Thinking brings you conversations with leaders, innovators, and partners shaping the future of IT. From ransomware protection and storage innovation to smarter infrastructure decisions, each episode explores the strategies that matter most to today’s technology leaders. Hosted by Fortuna Data — trusted partners of IBM, Lenovo, Seagate, HYCU, QNAP, and Qualstar ...
  continue reading
 
Broadcasting from Dubai, The CTO Show with Mehmet explores the latest trends in technology, startups, and venture funding. Host Mehmet Gonullu leads insightful discussions with thought leaders, innovators, and entrepreneurs from diverse industries. From emerging technologies to startup investment strategies, the show provides a balanced view on navigating the evolving landscape of business and tech, helping listeners understand their profound impact on our world. [email protected]
  continue reading
 
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
  continue reading
 
The Defence & Security Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence and security industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynami ...
  continue reading
 
What sets *Build Your Empire Podcast* apart is the focus on practical wisdom. Every episode begins with a “Weekly Stoic Quote” to set the mindset for the journey ahead, and guests share actionable advice both in their field of expertise and for life in general. Whether you’re listening to a well known sports figure or another empire builder, we share strategies for overcoming challenges, discussions on the importance of mental and physical health, and the lessons learned here are meant to re ...
  continue reading
 
Artwork

1
The AI Security Edge

theaisecurityedge

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
  continue reading
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Russ Branzell, President & CEO of the College of Healthcare Information Management Executives (CHIME), interviews leaders in Digital Health from around the world. These thought leaders share their knowledge, challenges, best practices, and ideas for helping to transform health and care on a global level.
  continue reading
 
Artwork
 
Expert-driven insights and practical strategies for navigating the future of AI and emerging technologies in business. Led by an ensemble cast of expert interviewers offering in-depth analysis and practical advice to make informed decisions for your enterprise.
  continue reading
 
Artwork
 
"On Aon" offers conversations between Risk Capital and Human Capital experts and guests about the Risk and People issues impacting businesses around the world. Each episode provides unique insights to help industry experts make better decisions across Trade, Technology, Weather and Workforce.
  continue reading
 
Artwork

1
One CA Podcast

Civil Affairs Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
One CA Podcast is here to inspire anyone interested in traveling to work with a partner nation’s people and leadership to forward U.S. foreign policy. ​ We bring in current or former military, diplomats, development officers, and field agents to discuss their experiences and give recommendations for working the ”last three feet” of foreign relations. The show is sponsored by the Civil Affairs Association.
  continue reading
 
Artwork

1
The CyberDap Podcast

Daniel Agyemang Prempeh - TheCyberDap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
  continue reading
 
Artwork

1
Aprio Voice

Solid Gold Podcasts #BeHeard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Delivering considered, contextual strategic communications advice. The Aprio team is a group of skilled, experienced and highly-regarded communications specialists and our strategically-minded team of experts allows us to deliver and implement strategies in key business areas such as investor relations, crisis and issue communications, digital strategy and content creation, and training and development. Recorded and produced by Solid Gold Podcasts | #BeHeard
  continue reading
 
In just 25 minutes, I deliver concise and thought-provoking conversations with top minds in technology, cybersecurity, business, culture and enterpreneurship. Whether you’re a technologist, executive, culture-enthusiast or someone passionate about growth, each episode explores trends, strategies and ideas that shape success. For those with limited time but unlimited ambition, 25Minutes offers actionable insights and fresh perspectives where they matter most. Your time is valuable. Your 25 mi ...
  continue reading
 
Artwork

1
Energy Transition Talks

CGI in Energy & Utilities

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The energy industry is evolving—how will quantum computing, AI, and digital transformation shape the future? Join CGI’s experts as they discuss the latest trends in decarbonization, grid modernization, and disruptive technologies driving the energy transition. Topics include: The impact of AI, quantum computing, and digital transformation Decarbonization strategies and the rise of green energy How utilities are modernizing power grids and improving resilience Innovations in battery storage, ...
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Artwork
 
Bringing you the latest news, views and experiences in Technology, Talent and Transformational change hosted by CTO, Author and leading Tech For Good advocate Prof. Sally Eaves @sallyeaves. With weekly episodes and an inspiring diversity of guests from some of the most pioneering organisations, projects and people of our time, this is Your engaging space to learn from C-Suite to Student, CIO to Academic and Enterprise to SME. Our shows focus on the latest innovations in emergent technology i ...
  continue reading
 
Business Matters with Karl Fitzpatrick is a popular business podcast that has featured over 2,000 interviews with entrepreneurs from Ireland, UK, Australia and the United States. Karl Fitzpatrick is an EY Entrepreneur of the Year Finalist and CEO of Chevron College. Chevron employs 135 staff and delivers further and higher education programmes to over 15,000 students annually, through e-learning. Business Matters delves into all aspects of entrepreneurship and business development. Hosted by ...
  continue reading
 
Upgrade Your Future with actionable advice from the world’s most brilliant minds in technology and human science. Join multi-million dollar business founder, leadership coach, neuroscience junkie, and Navy Seal wannabe Javier Guerra. Each episode, we're sharing powerful advice from global thought leaders. Presented by: TechHuman.com
  continue reading
 
Founded in 1990 by Marc Lee, former Managing Director of FT Business Enterprises who established and ran the Financial Times global conference business, Cityforum has for many years been acknowledged as a major contributor to public policy debate. Cityforum comprises a small, trusted, fully independent group of experienced individuals, respected for their intellectual honesty, knowledge and extensive contacts across every level of the private, public and not-for-profit sectors, at home and a ...
  continue reading
 
Artwork

1
The Gem of all Mechanisms

BCS, the Chartered Institute for IT

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Gem of all Mechanisms podcast is an interview series, where we talk to people in the know from many different disciplines: academics, computer scientists, policy makers, philosophers and more about the complexities of 21st century tech and how it affects us all. It is produced by BCS, the Chartered Institute for IT. BCS is on a mission to ensure everyone’s experience with technology is positive. We support the people who work in the industry and aim to make IT good for society. Our membe ...
  continue reading
 
Loading …
show series
 
In this episode of the Defence Connect Spotlight podcast, host Steve Kuper speaks with former US naval attaché to Australia and Leidos Australia international science and technology director Kevin Quarderer and leading naval strategist Dr Jennifer Parker, an expert associate at the National Security College - The Australian National University. The…
  continue reading
 
Client service teams are at a breaking point. Margins are shrinking, the demand keeps rising, and much of the day is consumed by work that doesn’t move the needle. As a result, skilled people often spend hours reconciling spreadsheets, re-entering the same data across multiple systems, and chasing updates, time that should be spent on the work clie…
  continue reading
 
In this episode of the Cyber Uncut podcast, David Hollingworth and Bethany Alvaro talk about the week's cyber security and AI news! Hollingworth and Alvaro get things started by unpacking the Australian government's National AI Plan. Is it actually good governance, or more of a vibe ripe to be abused by the AI giants? The pair then talk about the e…
  continue reading
 
In Episode 33 of The Cyber Resilience Brief, hosts Tova Dvorin and Adrian Culley revisit the BRICKSTORM threat—this time through the lens of the new CISA, NSA, and Canadian Cyber Centre joint advisory. While Episode 24 explored BRICKSTORM’s origin, stealth techniques, and UNC5221’s long-term espionage campaign, this episode focuses on what’s change…
  continue reading
 
In this conversation, Colin opens the curtain on how Sheets & Giggles became a breakout DTC success by doing things differently: selling before building, leaning into humor, making bold brand decisions, and prioritizing community and impact over hype. This episode is packed with practical lessons for founders navigating uncertainty, fundraising, pr…
  continue reading
 
With the rapid evolution of Generative AI, customer experience (CX) is evolving rapidly, too. In a recent episode of the Tech Transformed podcast, Mike Gozzo, Chief Product and Technology Officer at Ada, sat down with host Christina Stathopoulos, Founder of Dare to Data. They talked about how generative AI is changing business-to-customer interacti…
  continue reading
 
What Keeps You Up at Night? – Tales from the Digital Frontier The Case for Audacity in AI and Capacity Management Strategy Russ Branzell welcomes Erik Barnett, Health Partner at Guidehouse and leader of the Health Technology Consulting Practice, for a candid discussion on the realities of AI adoption in healthcare. Drawing on his experience as both…
  continue reading
 
Mark Donnigan has spent decades helping deep tech and video technology startups translate complex products into commercial traction. In this conversation, we cover why early stage companies must stay lean, how to diagnose GTM confusion, and what AI first marketing looks like in practice. We also dig into the new buyer journey in B2B, why content is…
  continue reading
 
In this episode of the Defence Connect Podcast, host Robert Dougherty is joined by business development director for Boeing Attack Helicopter Programs, Terry "TJ" Jamison, as they discuss the changing strategy of attack helicopters in modern warfare and the development of "launched effects". Jamison, a 30-year veteran of the US Army, has previously…
  continue reading
 
Send us a text Relying on reactive backup alone is no longer enough. In this episode of Smarter Strategic Thinking, we sit down with Panzura’s CTO to explore how their hybrid cloud file and data services platform is built for cyber resiliency, data security, governance and compliance. We discuss how Panzura combines real-time anomaly detection base…
  continue reading
 
In this episode of The Cyber Resilience Brief, host Tova Dvorin and offensive security expert Adrian Culley expose The Com—the decentralized cybercrime collective behind threat groups like Lapsus$, Scattered Spider (UNC 3944 / Octo Tempest), and ShinyHunters. Together, they break down how this teenage-to-young-adult adversary ecosystem has weaponiz…
  continue reading
 
The era of 3G is ending. For many industrial businesses, smart infrastructure systems, remote device management, and IoT connectivity rely on networks that are now being phased out globally. The question isn’t if—but when your operations could be disrupted. In this episode of Tech Transformed, Trisha Pillay speaks with Jana Vidis, Business Developm…
  continue reading
 
Welcome back to Forcepoint's "To the Point Cybersecurity Podcast," where hosts Rachael Lyon, Jonathan Knepher, and Damien Fortune explore the fast-moving world of cybersecurity and its impact on our businesses, governments, and everyday lives. In this episode, we dive into legacy vulnerabilities, quantum-powered threats, and the ongoing tug-of-war …
  continue reading
 
On Aon — Episode 97 Risk and Resilience in the Age of Autonomous Vehicles Autonomous vehicles and self-driving technology are no longer futuristic — they’re transforming how we move today. As adoption accelerates worldwide, insurers face a new set of risks and opportunities. Jillian Slyfield, Aon’s global chief innovation officer and global technol…
  continue reading
 
In this conversation, Mehmet is joined by Gerald Beuchelt and Subu Rao, two cybersecurity leaders from Acronis, to unpack the evolving threat landscape, the rise of AI in both offense and defense, and why cyber resilience has become a board-level priority. They break down what CISOs need to know, how MSPs can create new value, and what frameworks a…
  continue reading
 
Investigative journalist Sam Cooper returns to the One CA Podcast to expose how Iran weaponizes criminality to advance foreign policy goals. From Hezbollah’s business affairs unit to fentanyl super-labs in Canada, Cooper traces the global footprint of Iranian-linked networks—intertwined with Chinese triads, Mexican cartels, and diaspora businessmen…
  continue reading
 
In this episode of the Defence Connect Spotlight podcast, host Steve Kuper is joined by Dee Lucero and Mohammad Siddique from DXC Technology, where they unpack the intricacies of the Defence Enterprise Resource Planning program and the role of digital systems in supporting the broader transformation. The trio also discuss a range of factors shaping…
  continue reading
 
Send us a text Zero-trust, device identity and cyber-physical resilience are now essential for securing modern energy grids. In this episode, CGI’s Andrea Grad speaks with PHYSEC CEO Prof. Dr. Christian Zenger about protecting OT, IoT, smart meters, substations and distributed energy resources (DERs) at scale. They also examine how regulations such…
  continue reading
 
In this episode of the Cyber Uncut podcast, David Hollingworth and Bethany Alvaro talk about the week's cyber security and AI news! Hollingworth and Alvaro get things started with a warning about a rise in AI-driven holiday scams taking advantage of the silly season. The pair also talk about a recent call from CPA Australia for young Australians to…
  continue reading
 
How I Felt Ridiculous When I Ordered Same-Day Delivery In this short bonus episode, I briefly examine the complexities of modern consumerism and the often-overlooked hidden costs of our convenience-driven shopping habits. As we rush into another holiday shopping season, I revisit a 2018 article that explored the darker side of online shopping conve…
  continue reading
 
In this episode, Mehmet sits down with Radhika Dutt, author of Radical Product Thinking, to explore why OKRs and traditional performance frameworks often collapse under the realities of modern work. Radhika introduces OLA, a new approach built on puzzle-solving, continuous learning, and adaptability — designed for today’s fast-moving product, engin…
  continue reading
 
In this powerful episode, host David Redekop sits down with Joshua Domagalski, Chief Information Security Officer and former offensive operator, to explore the real complexities of modern cyber defense. Joshua opens up about his journey from the military to cybersecurity leadership, the shift from attacking systems to protecting them, and why defen…
  continue reading
 
How do you go from growing up in Ukraine to winning Academic of the Year in Australia? Dr Oleksandra Molloy, senior lecturer in aviation at UNSW Canberra, shares her extraordinary journey. Tash Taylor dives into Oleksandra's courageous move to Australia and her experience pioneering research in emerging technologies, particularly her vital work on …
  continue reading
 
Digitale Dienstleistungen und Angebote sind aus dem Alltag nicht mehr wegzudenken. Von reiner Informationsvermittlung bis zur KI-Interaktion: Das Web ist unser ständiger Begleiter. Was aber tun all jene Menschen, die aufgrund von körperlichen oder geistigen Beeinträchtigungen nur bedingt oder im schlimmsten Fall gar nicht am Netz teilhaben können?D…
  continue reading
 
Send us a text In this episode, Ray speaks with Stefan Ferrari from Vawlt, the multi-cloud storage platform built for resilience, predictable costs and zero-knowledge security. You’ll learn how Vawlt: • Stores data across AWS, Azure, GCP, Wasabi & Backblaze simultaneously • Eliminates egress fees and API charges • Protects data even if a cloud prov…
  continue reading
 
In this episode of the Defence Connect Podcast, host Steve Kuper is joined by Minister for Defence Industry, Pat Conroy, as they unpack the major milestones for Defence and defence industry. The pair discuss a range of topics, including: The impact of the SEA 3000 decision and implications for industrial and defence cooperation between Australia an…
  continue reading
 
In this conversation, Jonathan breaks down the real state of AI adoption in GTM, why most revenue teams are still “stuck in the basics,” and how leaders can shift from dashboards to intelligence. He explains why CRM data hygiene is dead, how operational AI works behind the scenes, and what it truly means to run an AI native revenue team. From first…
  continue reading
 
The alarms aren’t just in the data center anymore. When ransomware shutters clinics and pushes oncology schedules into chaos, the question isn’t “What did they exfiltrate?” It’s “Who didn’t get care?” We sit down with Jen Ellis, founder of NextGen Security and co-chair of the Ransomware Task Force, to unpack how cybersecurity in healthcare became a…
  continue reading
 
Europe's startup narrative is changing fast — from apps and valuations to sovereignty, infrastructure and resilience. In this month's DACH Startup News, we unpack the moves that made European tech sovereignty the defining theme of 2025. What you’ll learn: – Why sovereign cloud is becoming foundational for startups and enterprise buyers – How AI, ro…
  continue reading
 
OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a c…
  continue reading
 
Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresse…
  continue reading
 
Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwa…
  continue reading
 
On this episode of the Connected Intelligence Podcast, Manish Mehta sits down with Chris Wingfield, SVP of Innovations at 360Privacy, to explore the evolving landscape of digital targeting and executive protection. Chris shares how his background in intelligence and signals analysis informs his approach to building proactive, AI-driven cyber threat…
  continue reading
 
As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice's adventures in Wonderland.Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to expla…
  continue reading
 
Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
  continue reading
 
Browser extensions are a powerful part of the Web ecosystem as they extend browser functionality and let users personalize their online experience. But with higher privileges than regular web apps, extensions bring unique security and privacy risks. Much like web applications, vulnerabilities often creep in, not just through poor implementation, bu…
  continue reading
 
We hacked 7 of the16 publicly-accessible YC X25 AI agents. This allowed us to leak user data, execute code remotely, and take over databases. All within 30 minutes each. In this session, we'll walk through the common mistakes these companies made and how you can mitigate these security concerns before your agents put your business at risk.Licensed …
  continue reading
 
Do you always read the documentation before using a function in your languages' standard library? This talk explores the attack surface of a special feature in PHP which is easy to misuse with unforseen consequences. The `extract` function allows to replace the value of local variables named after the keys in an array. Calling it with user-controll…
  continue reading
 
Model Context Protocol (MCP) is the latest hot topic in cybersecurity. Business wants it (AI is the new mantra), developers are excited (new toys, new code), and security teams are left to make it safe—often with already packed schedules. Let's treat it like just another Tuesday. Like many shiny new technologies (remember the early days of cloud?),…
  continue reading
 
Apple CarPlay is a widely known protocol that connects smartphones to car multimedia systems. Based on AirPlay, CarPlay is installed in millions of cars, as it is supported by hundreds of car models from dozens of different manufacturers across the globe. In our talk, we will share how we managed to exploit all devices running CarPlay using a singl…
  continue reading
 
Threat modeling stands at a critical juncture. While essential for creating secure systems, it remains mostly manual, handcrafted, and often too slow for today's development cycles. At the same time, automation and AI offer new levels of speed and scalability— but how much can we rely on them?This talk explores the tension between automation and hu…
  continue reading
 
In this final episode of our November Critical Infrastructure series, The Cyber Resilience Brief host Tova Dvorin and SafeBreach offensive engineer Adrian Culley explore what it truly means to measure resilience — not just talk about it. They break down how the CISA resilience framework (“Know, Assess, Plan, and Continuously Improve”) connects dire…
  continue reading
 
In this presentation, we will highlight how threat modeling, as a proactive measure, can increase security in DevOps projects.We will introduce OWASP Cumulus, a threat modeling card game designed for threat modeling the Ops part of DevOps processes. This game (in combination with similar games like Elevation of Privilege or OWASP Cornucopia) enable…
  continue reading
 
WebAuthn was supposed to replace swords on the web: uniform, secure, manageable authentication for everyone! One of its unique selling points was supposed to be the impossibility of phishing attacks. When passkeys were introduced, some of WebAuthn's security principles were watered down in order to achieve some usability improvements and thus reach…
  continue reading
 
The future of authentication is passwordless - Passkeys are the key technology. This talk supports developers in implementing Passkeys in their organizations and helps with the decision between in-house development, SDK, or Passkey-as-a-Service solutions. You will learn how to design recovery flows and fallback mechanisms in a user-friendly way, ho…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play