In this episode of Breaking Badness, Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce discuss two major stories shaking up the cybersecurity world. First, a researcher has discovered how attackers could exploit Whois data to grant themselves unprecedented superpowers in the digital space. Second, the Internet Archive suffers a breach possibly exposing 31 million accounts, raising questions about the security of trusted online platforms. Join the team as they break down these complex stories, share lessons learned, and explore how organizations can better protect themselves in similar situations. 💻 Watch on YouTube: https://bit.ly/4hfkWim 🎧 Apple Podcasts: https://apple.co/3YwduIh 🎧 Spotify: https://spoti.fi/3Ywdubf #CyberSecurity #CyberSecurityPodcasts #Whois #InternetArchive
DomainTools’ Post
More Relevant Posts
-
🎙️ Join CyberScoop’s Elias Groll and Tim Starks in the latest #SafeMode podcast episode as they navigate the intricate cybersecurity landscape under the Biden administration. 🌐🔔 🔊 Delve into key topics like the shift of cybersecurity responsibilities to the private sector, the "Secure by Design" initiative, and the nuances of software liability reform. Discover how these strategies are intended to bolster national cyber defenses and reduce consumer vulnerabilities. 👉 Listen to the full conversation: https://lnkd.in/eutbYeD4 Don't forget to subscribe: 🍏 Apple Podcasts: https://lnkd.in/e5gcNAxh 🟢 Spotify: https://lnkd.in/e-ddUmTE #TechPodcast #Cybersecurity #NationalSecurity #TimWalz #CyberDefense #DigitalSecurity #TechNews #GovernmentPolicy #SafeMode #GovTech
To view or add a comment, sign in
-
Smashing Security podcast #378: Julian Assange, inside a DDoS attack, and deepfake traumas: Wikileaks's Julian Assange is a free man, deepfakes cause trouble in the playground, and we hear hot takes about ransomware and tales from inside a devastating denial-of-service attack. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Eleanor Dallaway.
To view or add a comment, sign in
-
Dr. Amit Elazari, OpenPolicy ’s CEO and Co-Founder, joined the Armis Bad Actors podcast to discuss 'Navigating the Complex Nature of Cybersecurity Policy and Regulations.' Tune in to discover insights on the shifting dynamics of incident reporting, the urgent need for AI compliance, and much more! Listen to the full episode here: https://lnkd.in/evghfk3E #Cybersecurity #Podcast #TechPolicy #AICompliance #Regulations
To view or add a comment, sign in
-
Dive into Cybersecurity Policy and Regulations with OpenPolicy's CEO and Co-Founder Amit Elazari, Dr. J.S.D on the Armis Bad Actors podcast. In this episode we discuss the current state of cybersecurity policies, how incident reporting & regulation are going through major shifts, Al's need for expedited compliance requirements, and more! Tune in now to stay ahead of the evolving landscape of cybersecurity policies in this new age of AI: https://lnkd.in/etHNBnFY #Cybersecurity #Podcast #TechPolicy #AICompliance #Regulations
Armis Bad Actors Podcast, Dr. Amit Elazari
To view or add a comment, sign in
-
Why did the computer go to the Dr? Because it had a virus 💥 . And why did we go to Dr Zero Trust (aka Dr. Chase Cunningham)? Because we wanted to record an awesome podcast episode all about zero trust and national security, of course! (...and why did I pick an image of Dr Who? Well, by now I know what makes you all stop scrolling!) This is a hot recommendation to tune in. Maxwell Havey, Chase and I discussed what zero trust looks like on a national scale, whether a Geneva Convention for cyber is a workable idea... and which security agency has the coolest SOC. Dive in! You can listen on the web: https://lnkd.in/eRdGgtK6 Or on Spotify: https://lnkd.in/eeQzAU6W Or on Apple Podcasts: https://lnkd.in/eiyxgn8p #cybersecurity #zerotrust #podcast #securitypodcast #nationalsecurity #cyber #security #dataprotection #recommendation
To view or add a comment, sign in
-
https://lnkd.in/e3A4RfPW] Welcome back to our Cybersecurity weekly Series! Enjoy this week's podcast addressing 4 #cybersecurity questions boards can’t afford to ignore. LIKE IT! POST a comment or question & SHARE! #tabletopexercises #incidentresponse
To view or add a comment, sign in
-
If you're at CISO XC Conference on April 25th: Join Allan Alford and yours truly from 11am - 2pm Central for 'Behind Closed Doors: CISO Chronicles, Unfiltered'. A podcast🎙session to RANT, RAVE, and VENT about the intricacies of being a CISO. Share the good, the bad, and everything in between - and don't worry: you'll remain anonymous during the recorded episode! When you join us, you get to: 💡 Use your experiences and insights to educate the community and advocate for honesty and transparency in cybersecurity. 📣 Voice the truths you've held back for too long, offering genuine, unfiltered guidance to those navigating the cybersecurity landscape. 🤝 Help shape the future of security by speaking directly to the next generation, providing them with warning signals and wisdom they need to succeed. See you there, yeah? Book your podcast session, linked in the comments below ⬇ #cybersecurity #cisoxc #podcast
To view or add a comment, sign in
-
🔮 Exciting prediction and commentary on the latest news ⚡ 🌐 The recent attack on archive.org causing podcasts to go offline is a stark reminder of the vulnerability of online platforms in the digital age. 🚨 The cybersecurity threat landscape is evolving rapidly, posing risks to various online services, including podcasts, and highlighting the importance of robust security measures. 🤔 As we witness such incidents, it's evident that cybersecurity will be a top priority for podcasters and online content creators in the coming years. 📈 Moving forward, I predict a surge in investment and innovation in cybersecurity solutions tailored for the podcasting industry to safeguard content and ensure uninterrupted delivery. #Cybersecurity #PodcastIndustry #DigitalEvolution Command Your Brand
To view or add a comment, sign in
-
Sometimes the only thing separating public datasets from full compromises is the simple step the former being formatted in a way that can be used maliciously be threat actors. Flare's Nick Ascoli breaks down the hidden proliferation of breach data by cybercriminals and the dangers of compiled public databases in this short clip! Interested in more? Check out the full episode of Leaky Weekly for your weekly fix of cybersecurity news and intelligence through the links below! Spotify: https://lnkd.in/ehmev92s Apple Podcasts: https://lnkd.in/eiZKjxCJ YouTube: https://lnkd.in/eTZzDWpg #Cybersecurity #Podcast #ThreatIntel
To view or add a comment, sign in
-
The best part about the first Tuesday of the month? It's PODCAST DAY! I couldn't be more excited to release this month's episode of ILLUMINATOR. I had an amazing chat with Dr. Chase Cunningham about data breaches: why they're becoming more frequent, the evolving tactics of cyber attackers, and the limitations of our current cybersecurity measures. Chase was kind enough to share his wisdom about the importance of adopting a Zero Trust strategy, the pitfalls of relying on compliance over security, and practical steps CISOs can take to protect their organizations. This episode has a little something for everyone. For anyone who has been impacted by a data breach in recent years (that includes you, yes YOU!) you're going to walk away with actionable advice and more knowledge about what's at stake and how you can protect yourself, your loved ones, and your business online. Listen on Spotify: https://shorturl.at/4TT3c Listen on Apple Podcasts: https://shorturl.at/sX7Zi Click the video below to hear a short preview. Massive thanks again to Chase and the fine folks at G2 for making this episode possible! #cybersecurity #data #ITsecurity #zerotrust
To view or add a comment, sign in
21,129 followers