Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Cyber Resilient Podcasts
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
The Cyber Resilience Brief is your 15-minute pulse on how organizations can build stronger defenses and achieve true cyber resilience. Each episode dives into the practical realities of Breach and Attack Simulation (BAS), adversarial exposure validation, and the evolving strategies that keep modern enterprises secure. Hosted by Tova Dvorin and brought to you by SafeBreach — the leader in Adversarial Exposure Validation — this podcast features insights from cybersecurity leaders, integration ...
…
continue reading
The opportunity to delve into the 'mindsz' of industry leaders in technology and cyber security.
…
continue reading
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Cyber resilience is fast emerging as the driving force behind critical business continuity in our digital era. Faced with brownouts, blackouts, and the ‘when not if’ nature of cyberattacks, how do businesses harness this resilience for stronger cybersecurity and networking? Listen in to The Resilience Factor as our hosts — renowned social engineer Jenny Radcliffe and Zscaler’s own Kate Baker — explore how organizations and employees can fail forward to adapt with confidence. Through trend-ba ...
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
…
continue reading
The Building Cyber Resilience podcast shifts the focus on cyber safety from fear to action by sharing simple steps that benefit both your team and your customers. Hosts Dr. Ann Irvine and Richard Seiersen talk about the positive outcomes of developing risk management and utilizing data science across industries to create a smarter business. Listen in and learn how you can build a cyber resilient organization in today's technology-driven landscape.
…
continue reading
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
…
continue reading
We are a Police led not for profit company. We offer simple, free and easily understood cyber security guidance for small and medium sized businesses. Remember it doesnt have to be complicated or expensive to give your business the cyber protection and peace of mind that you need. All this from industry experts who partner with us in the cyber security arena.
…
continue reading
We know it can be challenging to secure your business, especially when you have limited time. The Get Cyber Resilient Show, brought to you by Mimecast, is the perfect way to stay up-to-date with the latest cyber developments across Australia and New Zealand. From cyber security to cyber awareness, your hosts Daniel McDermott, Garrett O'Hara and Vinh Nguyen will bring you insights and real stories from IT and Security Leaders, just like you. Don’t get angry at downtime and data breaches, Get ...
…
continue reading
The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.
…
continue reading
Your invitation to pull up a chair and join fellow public sector professionals for a frank, no-nonsense chat about cybersecurity. Proactive Security for the Public Sector starts here Enjoy the podcast? There’s more where that came from! Get the latest Public Sector cyber insights and resources to help you stay ahead of your cyber risk at https://bit.ly/43bPTxz
…
continue reading
Latest internet technology, trends, and solutions
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
The Open at Intel podcast is about all things open source, from software to security to artificial intelligence to Linux and beyond. Each episode brings you fresh perspectives with sophisticated, leading-edge, free-ranging conversations from some of the best minds in the open source community.
…
continue reading
Tech Observer Podcasts bring diverse perspectives from government technology leaders, CIOs, CISOs, CTOs and policy makers on the use of technology for governance, operational efficiency and improving public service delivery.
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
IBSi podcasts for insights and discussions from the world of FinTech and Banking. Listen in to what’s trending in the ever-evolving financial industry.
…
continue reading
The Virtually Speaking Podcast is a weekly technical podcast dedicated to discussing VMware topics related to private and hybrid cloud. Each week Pete Flecha and John Nicholson bring in various subject matter experts from VMware, recently acquired by Broadcom, and within the industry to discuss their respective areas of expertise.
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
Russ Branzell, President & CEO of the College of Healthcare Information Management Executives (CHIME), interviews leaders in Digital Health from around the world. These thought leaders share their knowledge, challenges, best practices, and ideas for helping to transform health and care on a global level.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
"Humanizing cybersecurity with candid tales from cyberspace and beyond!" Voices of the Vigilant builds and shares knowledge by engaging with diverse voices and perspectives within the cybersecurity industry.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
CyberCast offers a different and thoughtful perspective on the cybersecurity issues facing industry and government today. 213656
…
continue reading
The Tech Field Day Podcast is the only podcast that dares to be both on topic, or on premise, and sometimes on location, bringing together a group of independent IT luminaries and experts in their field from around the Enterprise to discuss a single idea revolving around their technological knowledge base and skillset. This podcast is hosted by Stephen Foskett, Organizer of the Tech Field Day event series, and Tom Hollingsworth, Tech Field Day Event Lead.
…
continue reading
The AIBP ASEAN B2B Growth Podcast is a series of fireside chats and interviews with business leaders in Southeast Asia focused on growing B2B businesses in the region. Each episode will feature a company which is rapidly growing their business in the region and will cover topics such as Business Strategy, Sales & Marketing, Enterprise Technology, Innovation and Financial metrics. Connect with us to learn more: https://www.linkedin.com/in/aibp/
…
continue reading
Independent holistic security consultancy
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Breaching the Boardroom is a high-level podcast designed to explore the intersection of leadership, growth, and technology. Each episode brings industry leaders, experts, and innovators together for candid conversations on how to navigate the evolving tech landscape while driving business success. We’re on a mission to simplify complex topics like AI, cyber threats, and IT strategy, making them accessible and actionable for executives in mid-market businesses.
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
A podcast series about finance and taxation brought to you by award winning chartered accountancy firm, Ballards LLP.
…
continue reading
How can influencing differently lead to new opportunities? Join Deloitte’s Lou DiLorenzo Jr. in conversation with the C-Suite leaders bringing business and technology together to transform organizations and drive strategic value.
…
continue reading

1
Alberto Daniel Hill: A Celebration of Resilience, Transparency, and Systemic Change on Twitter Spaces
28:16
28:16
Play later
Play later
Lists
Like
Liked
28:16Alberto Daniel Hill: A Celebration of Resilience, Transparency, and Systemic Change on Twitter Spaces. The provided sources offer a multifaceted look at Alberto Daniel Hill, a computer engineer and cybersecurity expert, focusing on his wrongful imprisonment in Uruguay—a pivotal event detailed in his book Log into Hell. They chronicle how this exper…
…
continue reading

1
Ep. 2: FBI Advisory, Iranian Threats & Resilience
7:40
7:40
Play later
Play later
Lists
Like
Liked
7:40In this episode, we break down the latest FBI advisory on Iranian cyber actors — and what it means for your OT, IoT, and critical systems. SafeBreach’s Adrian Culley shares practical steps to validate defenses and lock the stable door before the horse bolts.By SafeBreach
…
continue reading

1
Ep. 57 – Building a Resilient Cyber MGA Through Discipline and Consistency – with Greg Markell
1:00:42
1:00:42
Play later
Play later
Lists
Like
Liked
1:00:42When the market softened, Ridge didn’t follow the crowd. Here’s how discipline became their competitive edge. In this episode, host Anthony Hess sits down with Greg Markell, President & CEO at Ridge Canada Cyber Solutions Inc., for a candid conversation on what it takes to build a sustainable cyber MGA. Greg shares how Ridge has resisted the pull o…
…
continue reading

1
Resilient Cyber w/ AJ Yawn - Transforming Compliance Through GRC Engineering
35:53
35:53
Play later
Play later
Lists
Like
Liked
35:53In this episode, we sat down with AJ Yawn, Author of the upcoming book GRC Engineering for AWS and Director of GRC Engineering at Aquia, to discuss how GRC engineering can transform compliance. We discussed the current pain points and challenges in Governance, Risk, and Compliance (GRC), how GRC has failed to keep up with software development and t…
…
continue reading

1
S35 Ep4: Yolanda Williams - Cyber on the Ground: Building Resilience in a Fragmented Landscape
20:42
20:42
Play later
Play later
Lists
Like
Liked
20:42Today’s episode will focus on the challenges of the cyber landscape in the United States, as Steve sits down with Yolanda Williams, who is the Cybersecurity and Infrastructure Security Agency’s cyber security coordinator in the state of Florida. Steve and Yolanda dive deep into her work communicating cyber in a region where it for many isn’t top-of…
…
continue reading

1
EP887: Solving cybersecurity? The need for more robust cyber resilience strategies
12:22
12:22
Play later
Play later
Lists
Like
Liked
12:22Steve Brodie, Chief Revenue Officer, Goldilock Physical network isolation is becoming essential in today’s cybersecurity threat landscape. Software-only solutions are no longer enough. The case for hardware-based protection has been thrown into sharp relief in recent months with high profile cases of cyber attacks that have revealed victim organisa…
…
continue reading
Welcome to the fourth episode of the Virtually Speaking Podcast's VCF 9 series! In this installment, hosts Pete Flecha and John Nicholson explore "Building a Cyber Resilient Private Cloud" with Rakesh Radhakrishnan, Senior Director of Product Management for Cloud Storage & Data. Key Highlights: vSAN's evolution as the #1 storage platform for VMware…
…
continue reading

1
Episode 316 Deep Dive: Martin Creighan | The Critical Move Towards A Cyber Resilient Future
45:57
45:57
Play later
Play later
Lists
Like
Liked
45:57Martin Creighan (“Martin”) is Vice President, Asia Pacific at Commvault. He is responsible for organisational leadership, change management, business development and human resources for Commvault’s dynamic team in APAC. Martin is a highly experienced professional with a stellar record of achievement in senior leadership roles across the Australian …
…
continue reading
Cybersecurity and technology expert Sarah Fluchs joins the 100th episode of the Nexus Podcast to discuss the EU's Cyber Resilience Act and what it means for manufacturers of "products with digital elements" as they aim toward a 2027 compliance deadline. Sarah provides her insight on the regulation's essential requirements, its focus on secure-by-de…
…
continue reading

1
From Backup to Cyber Resilience: Rubrik’s Vision with Drew Russell
21:31
21:31
Play later
Play later
Lists
Like
Liked
21:31Sponsors: Rubrik (www.rubrik.com) Guidepoint Security (www.guidepointsecurity.com) Episode Summary: In this episode, David Malicoat sits down with Drew Russell, leader of Rubrik’s elite “Night Stalkers” team, for a high-speed, no-fluff conversation recorded live at GPSEC STL. Drew unpacks Rubrik’s evolution from a backup company to a full-spectrum …
…
continue reading

1
Security Series - Episode 1: Securing the Remote Workforce: Building Resilient Cyber Defenses Against Network Threats
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46The importance of securing remote workplaces in today's networking threat landscape.By Zyxel Networks
…
continue reading

1
In Conversation With Tia Hopkins, Chief Cyber Resilience Officer & Field CTO
58:30
58:30
Play later
Play later
Lists
Like
Liked
58:30In today's episode of the Cyber Culture Café series, Andy and John speak to Tia Hopkins, Chief Cyber Resilience Officer & Field CTO. As Chief Cyber Resilience Officer & Field CTO, Tia Hopkins is focused on engaging with the cybersecurity community, providing thought leadership, supporting strategic customer and partner engagements, and working clos…
…
continue reading

1
The Digital India Podcast: Sandeep Bhambure, VP & MD, Veeam India & SAARC | Data Protection, AI, Qunatum Computing & Cyber Resilience | Mohd Ujaley | Episode 09
13:19
13:19
Play later
Play later
Lists
Like
Liked
13:19In this episode of The Digital India Podcast, Mohd Ujaley explores cyber resilience, ransomware and AI-driven security with Sandeep Bhambure, Vice President and Managing Director, Veeam India & SAARC. Discover: 🔹 Why data exfiltration is now more dangerous than ransomware 🔹 How AI is changing cyber defense strategies 🔹 India’s critical infrastructu…
…
continue reading

1
L2L: Securing the Future: Leadership, Cyber Resilience, and Digital Trust in Healthcare
19:27
19:27
Play later
Play later
Lists
Like
Liked
19:27In the latest Leader2Leader episode, Russ Branzell, President & CEO of CHIME, sits down with John Chirillo, Principal Security Architect at Connection, for a timely conversation on cyber resilience, digital trust, and the future of healthcare security. Together, they explore the evolving cybersecurity landscape, the challenges healthcare organizati…
…
continue reading

1
Episode 320 Deep Dive: Kavitha Mariappan | The Future of Data Protection
39:16
39:16
Play later
Play later
Lists
Like
Liked
39:16In this episode, we sit down with Kavitha Mariappan, Chief Transformation Officer at Rubrik, as she unpacks data protection and the critical importance of cyber resilience. Kavitha challenges the industry’s tendency to hyper-focus on prevention and detection, advocating instead for a holistic approach that integrates resilience and recovery as boar…
…
continue reading

1
Qantas hacked, AI to power the Australian economy, and women’s health clinic hacked
39:57
39:57
Play later
Play later
Lists
Like
Liked
39:57In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft are joined by Australian Aviation’s Jake Nelson to talk about the Qantas data breach before our usual suspects talk up the latest AI news, followed by some alarming local hacks. AI is the topic for Hollingworth and Croft as the pair start with a chat about News Corp’s n…
…
continue reading

1
Uruguay's Digital Surveillance Landscape and Cybersecurity Regulations
43:51
43:51
Play later
Play later
Lists
Like
Liked
43:51Uruguay's Digital Surveillance Landscape and Cybersecurity Regulations These sources collectively examine the multifaceted landscape of digital surveillance and cybersecurity in Uruguay, highlighting both governmental initiatives and their human rights implications. One source details Decree 66/025, Uruguay's effort to enhance cybersecurity for pub…
…
continue reading
NSO: El Grupo de Spyware Pegasus La fuente principal es un resumen de un episodio de podcast de "Darknet Diaries" sobre el NSO Group y su spyware Pegasus, que permite el acceso a datos de teléfonos móviles y es vendido a agencias gubernamentales. El texto menciona la investigación de John Scott-Railton y Citizen Lab, además de listar patrocinadores…
…
continue reading

1
Ciberseguridad en Uruguay: Estado, Delitos y Defensa.
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57Ciberseguridad en Uruguay: Estado, Delitos y Defensa. Las fuentes proporcionadas ofrecen una visión integral de la ciberseguridad en Uruguay, destacando tanto los desafíos como las respuestas adoptadas. El informe de Datasec (2024-2025) revela una preocupante brecha entre la conciencia y la implementación de medidas de protección cibernética, mostr…
…
continue reading

1
Ciberincidentes en Uruguay: Justicia, Medios y Narrativas en Conflicto
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07Ciberincidentes en Uruguay: Justicia, Medios y Narrativas en Conflicto El texto examina una serie de incidentes cibernéticos en Uruguay, centrándose en las defacement de sitios web importantes como El País Uruguay y Buquebus Turismo, y la posterior detención de un joven hacker conocido como "Vlatty". La narrativa explora la perspectiva de un hacker…
…
continue reading

1
Reflections on Hacking, Justice, and Cybersecurity in Latin America
28:09
28:09
Play later
Play later
Lists
Like
Liked
28:09Reflections on Hacking, Justice, and Cybersecurity in Latin America. This extensive transcript from a discussion with Alberto Daniel Hill, a self-proclaimed hacker, alongside a co-host and a cybersecurity expert named Héctor. The primary focus revolves around the arrest and ongoing detention of Hill's associate, "Vladi," in Uruguay, stemming from a…
…
continue reading
The Injustice of Responsible Disclosure The compelling story of Alberto Daniel Hill, a Uruguayan cybersecurity expert and ethical hacker, who became the first individual in his country to be imprisoned for a computer-related crime he asserts he did not commit. The texts collectively explain how his responsible disclosure of vulnerabilities within a…
…
continue reading

1
Ep. 1: Building DORA-Ready Defenses -- Cyber Resilience Starts Now
16:57
16:57
Play later
Play later
Lists
Like
Liked
16:57In this premiere episode of The Cyber Resilience Brief, we dive into the EU’s Digital Operational Resilience Act (DORA) — and why its impact goes far beyond Europe. Host Tova Dvorin is joined by Adrian Culley and David Murray from SafeBreach to break down what DORA means for financial institutions, insurers, and ICT providers worldwide. We explore:…
…
continue reading
In this compelling episode of Breaching the Boardroom, David Mauro sits down with Dr. Sergio Sanchez—former surgeon, Apple Genius, Activision IT leader, and now Head of IT at Coleman Health Services. From building computers in a video game startup’s basement to navigating the complexities of healthcare IT, Dr. Sanchez shares the extraordinary twist…
…
continue reading

1
Decoding Digital Deception: Scams, Cybersecurity, and Safeguards
27:28
27:28
Play later
Play later
Lists
Like
Liked
27:28Decoding Digital Deception: Scams, Cybersecurity, and Safeguards
…
continue reading
Anna's new experience, trust, ricks.
…
continue reading

1
From JFrog EveryOps Day '25 Sydney – KB On The Go | Sunny Rao, Craig Wilson, and Tal Zarfati
1:20:48
1:20:48
Play later
Play later
Lists
Like
Liked
1:20:48In this bonus episode, KB sits down with Sunny Rao, SVP, Asia Pacific at JFrog, Craig Wilson, Principal Cloud Platform Engineer at Iress, and Tal Zarfati, Architect Lead at JFrog Security. Together they discuss how to strengthen software supply chain security, modernising infrastructure through cloud migration to overcome legacy constraints, and th…
…
continue reading

1
Revelaciones: Vulnerabilidades de Confianza en Dispositivos Móviles
6:55
6:55
Play later
Play later
Lists
Like
Liked
6:55Revelaciones: Vulnerabilidades de Confianza en Dispositivos Móviles. Esta discusión en YouTube presenta a Jonathan Scott, un ingeniero de seguridad móvil que afirma haber descubierto vulnerabilidades graves y persistentes en los sistemas operativos de Apple y Android, que permiten la extracción sigilosa de datos. Scott comparte su experiencia labor…
…
continue reading
El "Síndrome de La Habana," también conocido como Incidentes de Salud Anómalos (AHIs). Este fenómeno, caracterizado por síntomas neurológicos inexplicables que afectaron inicialmente a diplomáticos estadounidenses y canadienses en Cuba, se ha extendido globalmente, lo que ha llevado a un cambio en la terminología. La fuente analiza diversas teorías…
…
continue reading

1
México: Corrupción Digital, Ciberataques y Llama Violeta
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00México: Corrupción Digital, Ciberataques y Llama Violeta. Este material examina a México a principios de 2025, detallando los riesgos de una rápida digitalización que se enfrenta a una corrupción sistémica y arraigada. La combinación de infraestructura cibernética deficiente y una corrupción rampante creó un entorno propicio para ciberataques, con …
…
continue reading

1
Redes Celulares Clandestinas del Cartel: Innovación Criminal
9:08
9:08
Play later
Play later
Lists
Like
Liked
9:08Redes Celulares Clandestinas del Cartel: Innovación Criminal. Un análisis reciente sugiere que los cárteles mexicanos de la droga podrían estar desarrollando redes celulares privadas altamente sofisticadas, superando el uso de teléfonos desechables y aplicaciones cifradas comerciales. Esta supuesta evolución se remonta a la necesidad de evadir la v…
…
continue reading
Este texto examina la "Ley Espía" de México, una legislación aprobada el 26 de junio de 2025 que otorga al gobierno acceso amplio a datos personales para fines de seguridad. Se discuten las implicaciones para la privacidad y los derechos civiles, ya que los críticos temen vigilancia masiva y una posible autocensura ciudadana. La ley se enmarca en u…
…
continue reading
Crímenes Cibernéticos y Estafas de Romance. En una discusión sobre las estafas románticas y la ciberseguridad, el presentador y varios expertos, incluyendo a un ex-ciberdelincuente, una víctima convertida en defensora y un activista "black hat", comparten sus perspectivas. Se explora cómo los estafadores construyen confianza a través de la manipula…
…
continue reading
Passwords have served their use in the enterprise. We need to start moving away from simple passwords as an authentication mechanism. In this episode of the Tech Field Day podcast, Tom Hollingsworth is joined by Tony Efantis, Karen Lopez, and Fernando Montenegro as they discuss the premise that we are long past passwords, exploring the complexities…
…
continue reading

1
✈️ EP74: Inside GPSEC STL: AI, Red Team Ops & Human-Centered Security
15:02
15:02
Play later
Play later
Lists
Like
Liked
15:02Sponsors: Rubrik (www.rubrik.com) Guidepoint Security (www.guidepointsecurity.com) In this live GPSEC St. Louis episode of The Professional CISO Show, host David Malicoat dives deep into cybersecurity leadership with two powerhouse guests: Victor Wieczorek, SVP of Offensive Security at GuidePoint Security, and Wayne Fajerski, Deputy CISO of Edward …
…
continue reading

1
Machine-Scale Defense and the Future of Cybersecurity
29:50
29:50
Play later
Play later
Lists
Like
Liked
29:50Jeetu Patel, President and Chief Product Officer at Cisco, joins Ann on this week's episode of Afternoon Cyber Tea to explore how artificial intelligence is reshaping the cybersecurity landscape. Jeetu shares insights on the urgent need for machine-scale defenses, the potential for defenders to finally tip the scale against attackers, and the impor…
…
continue reading

1
S35 Ep5: Jimmie Lee - Leading with Vision and Empathy: The North Star Approach
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10Today, Steve speaks with Jimmie Lee, a leadership expert with decades of experience as a senior leader at companies like Boeing, Meta, and Microsoft. He explains that one of the most important things a business leader can do in times of crisis, is to keep focus on the big picture and the long term goals. Jimmie and Steve also discuss how to manage …
…
continue reading

1
Decoding Digital Deception: Scams, Cybersecurity, and Safeguards
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09Decoding Digital Deception: Scams, Cybersecurity, and Safeguards. Speaker Profiles and Value of Insights The Twitter Space featured an exceptionally diverse panel, each member contributing unique and valuable perspectives to the complex issue of online deception and romance scams: • Alberto (Host): Alberto initiated the space driven by his personal…
…
continue reading
romance scam
…
continue reading
In this episode of Virtually Speaking, hosts Pete Flecha and John Nicholson are joined by Harshad Colte and Feidhlim O’Leary to break down the latest vSphere enhancements in VMware Cloud Foundation 9. They explore how vSphere is evolving to support both traditional VM workloads and modern container-based applications—all while improving operational…
…
continue reading
A comprehensive overview of the global epidemic of romance scams, examining their evolving architecture and devastating impact. They highlight the critical work of Anna Rowe, a survivor-turned-advocate who champions victim support, legal reform, and destigmatization through her organizations, and Alberto Daniel Hill, a cybersecurity expert who anal…
…
continue reading

1
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413
1:52:05
1:52:05
Play later
Play later
Lists
Like
Liked
1:52:05Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
…
continue reading

1
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413
1:52:05
1:52:05
Play later
Play later
Lists
Like
Liked
1:52:05Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
…
continue reading

1
EP891: Female FinTech founders – lessons to be learned from Mia Drennan
8:47
8:47
Play later
Play later
Lists
Like
Liked
8:47Mia Drennan, Founder & CEO, GLAS Mia Drennan pioneered independent loan administration and trustee services – an area traditionally dominated by banks. Robin Amlôt of IBS Intelligence speaks to Mia Drennan, Founder and CEO of GLAS, about how she disrupted financial services and thrived in the male dominated financial services – building a global fi…
…
continue reading

1
EP890: Have you heard the one about the FinTech and the bank?
17:57
17:57
Play later
Play later
Lists
Like
Liked
17:57Tomer Guriel, Co-Founder & CEO, ezbob, & Shani Federman Terem, CEO, Greenlend Greenlend is a 70-30 joint venture between Israel Discount Bank and modular digital orchestration platform provider ezbob, leveraging the latterr’s tech to offer flexible and immediate solutions in the consumer credit sector as well as credit for small businesses. The suc…
…
continue reading

1
Ultimate version; Operacion Bitcoins by Alberto Daniel Hill. 100% facts checked.
33:17
33:17
Play later
Play later
Lists
Like
Liked
33:17Ultimate version; Operacion Bitcoins by Alberto Daniel Hill. 100% facts checked. This episode will immerse you in the compelling, heartbreaking, yet ultimately inspiring true story of Alberto Daniel Hill, an acclaimed cybersecurity professional from Uruguay. Alberto became famously known as the first person in his country to be unjustly imprisoned …
…
continue reading