The closed loop conundrum, default passwords, and Baby Reindeer... thanks to Paul Ducklin for being our special guest on this week's episode of the "Smashing Security" podcast! https://lnkd.in/d2vWJBU9 It's not your typical cybersecurity podcast. Huge thanks to Sonrai Security, Kolide by 1Password, and Vanta for their sponsorship of this week's episode. #podcast #cybersecurity #password #scam #identity theft
Graham Cluley’s Post
More Relevant Posts
-
On this Benchmark Report episode, Kayne discusses how AI technologies are both enabling more sophisticated cyber attacks and helping defend against them. Check it out and get the news you need to know in #cybersecurity in under 5 minutes: https://okt.to/DpSq86 Listen on podcast: Apple: https://okt.to/d7Aavs Spotify: https://okt.to/TCS6rD Google: https://okt.to/FkIvSM #Kaynes5under5 #CybersecurityNews #benchmarkreport #FedRAMP
To view or add a comment, sign in
-
Recently, I had the opportunity to sit down with CyberScoop's Editor-in-Chief Gregory L. Otto to record an episode for the Safe Mode Podcast. We talked about the proliferation of #AI technologies and how it is transforming the way companies approach cybersecurity. IT infrastructures across industries are being impacted, especially those that rely on apps and APIs for seamless digital experiences. As risk and complexity continue to increase and policies and regulations evolve, companies should focus on safeguarding their systems. Greg and I talked about what enterprises should be doing and how. Check it out: https://lnkd.in/gEJVHESF #Technology #Podcast #Cybersecurity
To view or add a comment, sign in
-
The Frontlines of a SOC In the world of cyber security, teams of specialized and highly trained individuals work together in what is called a #SecurityOperationsCenter or #SOC. These teams are often on the frontlines of a never ending battle with #threatactors and intrusion sets that are trying to pillage, exfiltrate, and destroy computer networks, systems, and data around the world. But this cat and mouse game or mack-a-mole game is hard to win or even gain some sort of an advantage. It seems like everyday we hear of another company or organization that has fallen victim to the onslaught. It seems like no one is safe. In today’s episode of Smarter Everything I will be talking with Vaughan Shanks, the founder and CEO of Cydarm Technologies. A company that is trying to help the Security Operations Center be more efficient and solve everyday problems in cyber relevant time. #cyberthreatintelligence #threathunting #cybersecurity #security #podcast #smartereverything Episode Link via Apple Podcasts: https://lnkd.in/e6wvMkqr Episode Link via Spotify: https://lnkd.in/esJqBpTx Podcast Show Information Website: https://lnkd.in/gvV5MHc6 Apple: https://lnkd.in/gWjW5N67 Spotify: https://lnkd.in/gcQZJHav
To view or add a comment, sign in
-
Episode Nineteen of the SECURE | CYBER CONNECT Community & Podcast is out now! Featuring Yossi Appleboum who is the CEO of Sepio. Yossi shares his experiences and knowledge & hidden cyber threats...listen to learn on YouTube, Spotify & Apple Podcasts! #CyberSecurity #CyberConnect #CyberAwareness #AI #CyberThreats Yossi Appleboum, Justin (Jay) Adamson, Warren Atkinson, Sophie Edwards, Anna Khan
📣 Episode Nineteen of the SECURE | CYBER CONNECT Community & Podcast featuring Yossi Appleboum CEO & Co-Founder of Sepio alongside our hosts Justin (Jay) Adamson & Warren Atkinson is out NOW 🎙️ We discussed the role of security across connected devices, cyber deep tech and how it affects digital safety risks, the root cause of cyber vulnerabilities, and proactive protection & prevention. We also talked about the hidden cyber threats of gaming, online safety & vulnerabilities, how hackers think and AI. Thank you Yossi Appleboum for joining us on our latest episode & sharing your experiences and knowledge. The stories you shared and your insights were truly enlightening. Search "secure cyber connect" on YouTube, Spotify and Apple podcasts to watch, listen and learn. Subscribe to our channel on YouTube, Spotify & Apple Podcasts to learn something new from an expert every week! Yossi Appleboum, Sepio, Justin (Jay) Adamson, Warren Atkinson, SECURE | CYBER CONNECT Community & Podcast, SECURE | CYBER CONNECT, Sophie Edwards, Anna Khan #CyberSecurity #CyberConnect #AI #DigitalSafety #Hackers
The Hidden Threats of Gaming
To view or add a comment, sign in
-
In this episode of Breaking Badness, Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce discuss two major stories shaking up the cybersecurity world. First, a researcher has discovered how attackers could exploit Whois data to grant themselves unprecedented superpowers in the digital space. Second, the Internet Archive suffers a breach possibly exposing 31 million accounts, raising questions about the security of trusted online platforms. Join the team as they break down these complex stories, share lessons learned, and explore how organizations can better protect themselves in similar situations. 💻 Watch on YouTube: https://bit.ly/4hfkWim 🎧 Apple Podcasts: https://apple.co/3YwduIh 🎧 Spotify: https://spoti.fi/3Ywdubf #CyberSecurity #CyberSecurityPodcasts #Whois #InternetArchive
To view or add a comment, sign in
-
We are quite hyped about this one. We hope you are too. 🔥 Because we got Sarah Aalborg on our podcast "Coffee and Cyber Security". If you don't know her. We can tell you that she's: - CISO at Tivoli - A Keynote speaker - A Soon-to-be author - An expert in Cyberpsychology and behavioral science in the context of cyber security She joins the podcast to discuss how Security Awareness might be the wrong name for the field. Besides that, she also presents 3 things you can do, to create a more secure behavior from your colleagues. Sarah has good insights; you don't want to miss them. You can find the podcast wherever you listen to podcasts ;)
To view or add a comment, sign in
-
"Most businesses think they're too small to get hacked." They're wrong. Your company's size doesn't matter to cybercriminals. They're counting on you thinking that way. But here's the good news: You don't need a massive budget or IT department to protect your business. In our Season 2 premiere of IT Unplugged, Joe La Chapell and I break down how ANY sized business can start their cybersecurity journey today. Quick preview of what we cover: • The 15-minute security solution that could save your business • Why hackers LOVE targeting companies with 20-400 employees • A forgotten strategy that costs nothing but prevents disaster YouTube Link: https://lnkd.in/gnF2WtZA Spotify Link: https://lnkd.in/gTcjcTpp Apple Podcasts Link: https://swiy.co/Ep28apple P.S. Running a business is hard enough. Your IT shouldn't be. Drop a comment if you want more straight-talk about protecting your company without the tech jargon. #ITUnplugged #Cybersecurity #SmallBusiness #BusinessProtection #TechTalk
To view or add a comment, sign in
-
Is security awareness dead, and why say it is? It kinda hurts us asking - but we invited Sarah Aalborg to answer it for us. And you find her answer on our podcast "Coffee and Cyber Security". If you don't know her. We can tell you that she's: - CISO at Tivoli - A Keynote speaker - A Soon-to-be author - An expert in Cyberpsychology and behavioral science in the context of cyber security She joins the podcast to discuss how Security Awareness might be the wrong name for the field. Besides that, she also presents 3 things you can do, to create a more secure behavior from your colleagues. Sarah has good insights; you don't want to miss them. You can find the podcast wherever you listen to podcasts ;)
To view or add a comment, sign in
-
In a world where cyber threats are increasingly evolving, resilient medical devices are more critical than ever. Join us in Episode 4 of the Med Device Cyber Podcast, as we explore how to safeguard hospitals and protect patient safety from vulnerabilities in healthcare technology. 💡 Hospitals are increasingly vulnerable to cyberattacks, and the ripple effect can compromise patient safety. We must build resilience into medical devices from the ground up.”– Christian Espinosa, Founder & CEO of Blue Goat Cyber 🛡️ Discover expert strategies and insights to secure the future of healthcare by listening to the podcast today. 📲 Listen now on Apple Podcasts, Spotify and YouTube. https://lnkd.in/gDvGK5Y5 #Cybersecurity #MedicalDevices #Resilience #BlueGoatCyber #PatientSafety #HealthcareInnovation
To view or add a comment, sign in
-
Security researchers find a way to unlock millions of hotel rooms, the UK introduces cyberflashing laws, and Google’s AI search pushes malware and scams. Listen to the latest "Smashing Security" episode - with me, Carole Theriault, and special guest Maria Varmazis - wherever you find podcasts, or at https://lnkd.in/e7YVgpum Thanks to Kiteworks, Vanta and Kolide by 1Password for their support for this episode. #podcast #cybersecurity #vulnerability #hacking #ai #google
Smashing Security podcast #365: Hacking hotels, Google’s AI goof, and cyberflashing
grahamcluley.com
To view or add a comment, sign in
Happily! P.S. Baby Reindeer scarred us!