Security Operations Center δημόσια
[search 0]
Περισσότερα
Download the App!
show episodes
 
Artwork

1
CyberWire Daily

N2K Networks

Unsubscribe
Unsubscribe
Καθημερινά
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Data Center Therapy

IVOXY Consulting

Unsubscribe
Unsubscribe
Μηνιαία
 
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
Artwork

1
The Ontic Protective Intelligence Podcast

Ontic, The Ontic Center for Protective Intelligence

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
Want a behind-the-scenes look into some of history’s most famous security incidents? Are you a corporate security professional looking to grow your understanding of the industry? Want to learn what it takes to break the bias as a woman in this field? The Ontic Protective Intelligence Podcast brings some of the greatest minds in safety, security, and protection together to shape how we view the industry's future.
  continue reading
 
Artwork

1
Cloud Security Podcast by Google

Anton Chuvakin

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
  continue reading
 
Artwork

1
Dive

C-Store Center

Unsubscribe
Unsubscribe
Μηνιαία+
 
This is a podcast covering training topics and experiences related to new convenience store sales associates that others in your store don't have time to cover. So, dive right in and learn about your job and how things work in the industry.
  continue reading
 
"Expedient: The Podcast" is your gateway to the inner workings of technology and innovation, presented with unparalleled clarity and expertise. Each episode is an invitation to join the luminaries of Expedient along with special guests from the forefront of the tech industry. We delve into the latest advancements in cloud computing, the evolution of data centers, cybersecurity trends, and groundbreaking developments in AI and machine learning. This podcast strips away the complexity of the t ...
  continue reading
 
In a world transitioning towards cleaner and greener energy solutions, one element takes center stage: uranium. Uranium Spotlight is your weekly podcast dedicated to unraveling the enigmatic world of uranium and its pivotal role in the global energy landscape. As uranium supply tightens and nuclear demand soars, the stage is set for a monumental shift in uranium prices. But what factors will drive this change? Join us weekly as we embark on an informative journey, to explore the events and n ...
  continue reading
 
Artwork

1
CNAS Live

Center for a New American Security | CNAS

Unsubscribe
Unsubscribe
Μηνιαία
 
CNAS Live brings listeners recordings of public events from the Center for a New American Security. Visit cnas.org/events to learn more about upcoming discussions and ways to connect with CNAS.
  continue reading
 
Artwork

1
The Security Studies Podcast

Georgetown University Center for Security Studies

Unsubscribe
Unsubscribe
Μηνιαία
 
Discussing the most pressing and complex international security issues of today with scholars from Georgetown University's Security Studies Program (SSP) of the Walsh School of Foreign Service. As part of the oldest and most respected master’s degree program in international affairs, SSP is dedicated to fostering a new generation of analysts, policymakers, and scholars fully knowledgeable about the range of international and national security problems and foreign policy issues of the 21st Ce ...
  continue reading
 
Artwork
 
ITProToday.com is a leading online source of daily news, analysis and how-to’s about the information technology industry. We help IT professionals and technology stakeholders learn about, assess and manage the acquisition of next-gen technology that drives business innovation, including — but not limited to — analytics, artificial intelligence/machine learning, cloud computing, compute engines, containers, data center operations, edge computing, hyper-converged infrastructure, the mobile-fir ...
  continue reading
 
Artwork

1
AWS - Conversations with Leaders

Amazon Web Services

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
The Conversations with Leaders podcast, brought to you by AWS (Amazon Web Services), features peer-to-peer conversations between business executives on innovating for growth, building resiliency, and shaping the future of their organizations. Learn more at AWS Executive Insights and follow us on LinkedIn. For video versions of these and other conversations, subscribe to our YouTube playlist.
  continue reading
 
Artwork

1
StackChart Spotlight

Channel Program

Unsubscribe
Unsubscribe
Μηνιαία+
 
StackChart Spotlight is a weekly series that focuses on a different category of tools for MSPs each episode. Come learn about what tools are the most popular, rank the best with MSPs, and what considerations to keep in mind when selecting the right tool for your organization.
  continue reading
 
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episod ...
  continue reading
 
Loading …
show series
 
This week, N2K's very own Brandon Karpf sits down with Kevin Lentz, Team Leader of the Cyber Pacific Project at the Global Disinformation Lab, and they discuss the recent threatcasting report "Cyber Competition in the Indo-Pacific Gray Zone 2035." This report, developed using the Threatcasting Method, examines how the U.S. and Indo-Pacific allies c…
  continue reading
 
Cadet Blizzard is part of Russia’s elite GRU Unit. Apache releases a security update for its open-source ERP system. SonicWall has issued an urgent advisory for a critical vulnerability. Researchers uncover a novel technique exploiting Linux’s Pluggable Authentication Modules. Google’s kCTF team has discloses a critical security vulnerability affec…
  continue reading
 
Seamlessly share files with colleagues and clients anytime, anywhere. Keep your information protected with top-notch security features. Collaborate on projects with ease and efficiency. Access your important documents on the go. Save time by eliminating the need for paper-based sharing methods. Streamline communication within your team. Stay organi…
  continue reading
 
What The Wild Sea Can Be – The Future of the World’s Ocean, by Helen Scales, Atlantic Monthly Press, 2024. Sea Control 246 – Beyond Static Spatial Management with Dr. Guillermo Ortuño Crespo and Andrea Galassi Twitter: @helenscalesΑπό τον Helen Scales, Jared Samuelson
  continue reading
 
The DOJ disrupts Russia’s Doppelganger. NSA boasts over 1,000 public and private partners. The FBI warns of North Korean operatives launching “complex and elaborate” social engineering attacks. Iran pays the ransom to sure up their banking system. Cisco has disclosed two critical vulnerabilities in its Smart Licensing Utility. A Nigerian man gets f…
  continue reading
 
Researchers find Yubikeys vulnerable to cloning. Google warns of a serious zero-day Android vulnerability. Zyxel releases patches for multiple vulnerabilities. D-Link urges customers to retire unsupported vulnerable routers. Hackers linked to Russia and Belarus target Latvian websites. The Federal Trade Commission (FTC) reports a sharp rise in Bitc…
  continue reading
 
Host Luke McNamara is joined by Clement Lecigne, security researcher at Google's Threat Analysis Group (TAG) to discuss his work tracking commercial surveillance vendors (CSVs). Clement dives into the history and evolution of the CSV industry, how these entities carry out operations against platforms like mobile, and the nexus of this problem into …
  continue reading
 
In this episode, Fred Burton speaks with Dr. Lewis Sage-Passant, Global Head of Intelligence at Novo Nordisk, about his new book, Beyond States and Spies. Lewis shares insights from his career in military intelligence, private sector intelligence, and his extensive research into the history and ethics of intelligence operations. Tune in to discover…
  continue reading
 
Brazil blocks access to X/Twitter. Transport for London has been hit with a cyberattack. Threat actors have poisoned GlobalProtect VPN software to deliver WikiLoader. “Voldemort” is a significant international cyber-espionage campaign. Researchers uncover an SQL injection flaw with implications for airport security. Three men plead guilty to runnin…
  continue reading
 
Spot price doesn't react to Kazatomprom news SMRs: A new narrative for uranium, but will it move the needle? Switzerland looks to lift nuclear ban China doubles down on nuclear ATHA Energy provides summer update Powered by Purepoint Uranium Group Inc. (TSXV: PTU | OTCQB: PTUUF) https://purepoint.ca/Από τον Purepoint Uranium Group Inc.
  continue reading
 
By Jared Samuelson Dr. Harry Bennett joins Jared to discuss his book, The War for England’s Shores: S-Boats and the Fight Against British Coastal Convoys. Download Sea Control 546 – S-Boats and Coastal Convoys with Harry Bennett Links 1. The War for England’s Shores: S-Boats and the Fight Against British Coastal Convoys, by G.H. Bennett, … Continue…
  continue reading
 
Guest: Dor Fledel, Founder and CEO of Spera Security, now Sr Director of Product Management at Okta Topics: We say “identity is the new perimeter,” but I think there’s a lof of nuance to it. Why and how does it matter specifically in cloud and SaaS security? How do you do IAM right in the cloud? Help us with the acronym soup - ITDR, CIEM also ISPM …
  continue reading
 
You can learn more about AWS in Orbit at space.n2k.com/aws. Our guests today are Jason Aspiotis, Global Director, In-Space Data & Security at Axiom Space and Jay Naves, Sr. Solutions Architect at AWS Aerospace & Satellite Solutions. AWS in Orbit is a podcast collaboration between N2K Networks and AWS to offer listeners an in-depth look at the trans…
  continue reading
 
In today's episode, we're focusing on the skills you need to manage store operations regarding equipment. We'll cover the basics of maintaining and handling store equipment, troubleshooting common problems that might arise, and understanding how to report maintenance needs and potential safety hazards. By the end of this episode, you'll have a soli…
  continue reading
 
Enjoy this encore episode with Vice President of Security and Support Operations of Alert Logic Tom Gorup shares how his career path led him from tactics learned in Army infantry using machine guns and claymores to cybersecurity replacing the artillery with antivirus and firewalls. Tom built a security automation solution called the Grunt (in recol…
  continue reading
 
In this Special Edition podcast, N2K's Executive Editor Brandon Karpf speaks with Danielle Ruderman, Senior Manager for Wordwide Security Specialists at AWS, and Adam Mikeal, CISO at Texas A&M, about CISO Circles, security challenges faced in higher education, and fostering the culture of security. Learn more about your ad choices. Visit megaphone.…
  continue reading
 
Tim Peck, a Senior Threat Researcher at Securonix, is discussing their work on "Threat actors behind the DEV#POPPER campaign have retooled and are continuing to target software developers via social engineering." The DEV#POPPER campaign continues to evolve, now targeting developers with malware capable of operating on Linux, Windows, and macOS syst…
  continue reading
 
AI regulations move forward in California. DDoS attacks are on the rise. CISA releases a joint Cybersecurity Advisory on the RansomHub ransomware. A persistent malware campaign has been targeting Roblox developers. Two European men are indicted for orchestrating a widespread “swatting” campaign. Critical vulnerabilities in an enterprise network mon…
  continue reading
 
🎧 Tune in to the eshare.ai Podcast for a deep dive into the world of AES encryption 🛡️ From understanding the basics to unlocking its brilliance, this episode will have you feeling like a cybersecurity pro in no time 💻 Don't miss out on this opportunity to learn and grow - visit https://www.eshare.ai/login today! 🌟 #Cybersecurity #Encryption #Podca…
  continue reading
 
French authorities outline the allegations against Telegram’s CEO. Google finds familiar spyware in Mongolian government websites. The Mirai botnet leverages obsolete security cameras. Iran’s Peach Sandstorm targets the space industry. A federal appeals court says platforms may be liable to algorithmically recommended content. Scam cycles are getti…
  continue reading
 
By Jared Samuelson Lt. Col. Nathan Jennings, Ph D joins the program to discuss naval operations in the Mexican-American War. Jennings discusses Winfried Scott’s landing at Veracruz, the largest U.S. landing prior to World War Two, and also less well-known operations in the Gulf of Mexico. Nathan is an associate professor and Army strategist at the …
  continue reading
 
Explore the critical role of emotional intelligence in leadership with Rich Hua, AWS's Worldwide Head of EPIC Leadership, Innovation and Transformation Programs. Rich discusses how leaders can manage their own stress and mindset to effectively lead digital transformation and innovation initiatives in the age of rapid AI advancements. He also shares…
  continue reading
 
Threat actors use a malicious Pidgin plugin to deliver malware. The BlackByte ransomware group is exploiting a recently patched VMware ESXi vulnerability. The State Department offers a $2.5 million reward for a major malware distributor. A Swiss industrial manufacturer suffers a cyberattack. The U.S. Marshals Service (USMS) responds to claims of da…
  continue reading
 
Loading …

Οδηγός γρήγορης αναφοράς