The protection of computer systems from theft or damage
POPULARITY
Categories
Wer auf einen Phishing-Test hereinfällt, darf nicht an den Pranger gestellt werden. "Sonst überlegt sich ein Beschäftigter zweimal, ob er seinen Fehler beim nächsten Mal aktiv meldet", sagt Lutz Seidenfaden, CIO bei MTU Aero Engines. Sein Ansatz: Vertrauensvoller, lösungsorientierter Umgang mit IT-Security - vom Shop Floor bis in die Vorstandsetage. Und darüber hinaus: Auch mit Zulieferern tauscht sich der IT-Chef des Triebwerksbauers über Sicherheitsthemen aus. Denn nicht selten hacken Kriminelle diese Geschäftspartner und nutzen etwa deren E-Mail-Adressen für CEO-Fraud-Angriffe und ähnliches auf MTU. Ein Interview über Awareness, das Zusammenspiel von Mensch und Technik und das richtige Maß bei Verboten.
Erweitere dein Wissen über digitale Sicherheit mit "Cybersecurity ist Chefsache".In dieser Episode begrüßt Nico Freitag Jennifer Bloom, operative IT-Security-Spezialistin bei citeq / Stadt Münster. Jennifer gewährt spannende Einblicke in ihren beruflichen Alltag im kommunalen Umfeld vom Patch-Management über die operative Schwachstellenanalyse bis zur strategischen Weiterentwicklung der digitalen Sicherheit in einer komplexen Verwaltungslandschaft.Gemeinsam sprechen sie darüber, wie IT-Security in Kommunen wirklich funktioniert, fernab von Schlagzeilen und Vorurteilen. Jennifer berichtet aus erster Hand, wie die Stadt Münster mit Sicherheitslücken umgeht, wie der Umgang mit veralteten Fachverfahren aussieht und welche Rolle Schulung, Awareness und Teamkultur spielen.
Erweitere dein Wissen über digitale Sicherheit mit "Cybersecurity ist Chefsache".In dieser Episode begrüßt Nico Freitag Jennifer Bloom, operative IT-Security-Spezialistin bei citeq / Stadt Münster. Jennifer gewährt spannende Einblicke in ihren beruflichen Alltag im kommunalen Umfeld vom Patch-Management über die operative Schwachstellenanalyse bis zur strategischen Weiterentwicklung der digitalen Sicherheit in einer komplexen Verwaltungslandschaft.Gemeinsam sprechen sie darüber, wie IT-Security in Kommunen wirklich funktioniert, fernab von Schlagzeilen und Vorurteilen. Jennifer berichtet aus erster Hand, wie die Stadt Münster mit Sicherheitslücken umgeht, wie der Umgang mit veralteten Fachverfahren aussieht und welche Rolle Schulung, Awareness und Teamkultur spielen.
Deze zomer werd laboratorium Clinical Diagnostics getroffen door een enorme ransomware-aanval. Zeer gevoelige gegevens van meer dan 850.000 Nederlanders werden op het dark web gepubliceerd. Wat zegt dit over de databeveiliging binnen ons zorgsysteem? En brengt dit ons vertrouwen in de zorg - en daarmee ook onze gezondheid - in gevaar?Techjournalist Daniël Verlaan zag een deel van de gelekte gegevens in en vertelt wat hij daar precies aantrof. Samen met techjurist Lisette Meij bespreken Harm en Dave welke juridische gevolgen Clinical Diagnostics en Bevolkingsonderzoek Nederland boven het hoofd hangen, en kijken ze naar de mogelijkheden voor slachtoffers: waar moet je waakzaam voor zijn als jouw gegevens zijn betrokken bij een lek?Ellen Mok belt namens de Digitale Dolle Mina's in over de politieke nasleep van de hack en legt uit hoe zij strijdt voor de belangen van de - veelal vrouwelijke - slachtoffers.Tips:Podcast ‘The Kill List'FraudehelpdeskZet de verbetering van generatieve AI uit op LinkedInPodcast ‘NOOD'Het Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
Warum hacken Hacker? Das zu verstehen ist wichtig. Denn würden Hacker nicht hacken, lebten wir in einer friedlicheren Welt. Doch vorneweg, das ist eher unrealistisch. Das Wissen warum Hacker hacken hilft uns als eher, um uns angemessen zu schützen.
Cybercriminals are exploiting X's Grok AI to bypass ad protections and spread malware to millions—while researchers discover your home Wi-Fi can now monitor your heart rate. This week's news breakdown covers the attack vectors you need to know about. Join co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem as they dive into the latest cybersecurity developments that could impact your organization tomorrow. From social media malvertising to biometric data harvesting through everyday devices, these aren't distant threats—they're happening now. Key Topics Covered: How cybercriminals are weaponizing Grok AI for malvertising campaigns Why 10-15% of employees access risky content at work (and what to do about it) Wi-Fi devices that can detect heart rates from 10 feet away—privacy implications Amazon's Project Kuiper vs. Starlink: What 1GB satellite internet means for security Practical defenses: YubiKeys, browser isolation, and network redundancy strategies Don't wait until your organization is the next headline. IT leaders need to stay ahead of evolving threats, and this episode delivers critical insights to help protect your business. Like, share, and subscribe for more in-depth security discussions! #cybersecurity #infosec #grok #malware #starlink #wifi #privacy #ITsecurity
In dieser Folge nehmen Tobias Schrödel und Rüdiger Trost euch wieder mit auf eine wilde Reise durch IT-Security und Tech-News:
Het kan je niet ontgaan zijn: de militaire parade waar China trots al haar nieuwe tanks, raketten en drones de revue liet passeren. Maar: hun belangrijkste wapens ontbraken daarin. China voert namelijk geen traditionele oorlog, maar zet digitale wapens in om ons dagelijks leven te ontwrichten.Van grootschalige cyberaanvallen op Westerse infrastructuur tot het saboteren van onze satellieten: wat is China's strategie en waar willen ze naartoe? En waarom kiezen ze ervoor om hun cyberpraktijken achter gesloten deuren te houden? Versterkt door oud-China-correspondent Anouk Eigenraam, duiken Dave en Harm in de eerste aflevering van dit nieuwe seizoen naar China's cyberstrategie en de geslotenheid van het land. Zo vertelt Anouk over haar interviewpoging op het hoofdkantoor van DeepSeek en hoe ze daarvoor de vingerafdruk van een schoonmaakster nodig had om een medewerker te kunnen spreken…Tips:The Telegraph - ‘Nato is defenceless against China's real West-killing weaponsRapport ‘Mobilizing Cyberpower'Substack NetAskari + Boek ‘Apple in China' - Patrick McGeeApp 112NL: iOS / AndroidApp BrandSnap: iOS / AndroidHet Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
Hallo da draußen an den Empfangsgeräten und herzlich willkommen zu einer neuen Podcast-Folge. In Folge #113 begrüßt Marcel heute Dirk Labudde, deutscher Bioinformatiker und Forensiker, der als Professor an der Hochschule Mittweida beschäftigt ist. Marcel und Dirk diskutieren, wie digitale Forensik funktioniert, warum sie für unsere Sicherheit unverzichtbar ist und welche Entwicklungen durch KI auf uns zukommen.
Kybernetická bezpečnost a obrana jsou témata, která v dnešním světě nabývají čím dál většího významu, a it-sa je jedním z nejrychleji se rozvíjejících b2b veletrhů v oblasti IT Security. Pro české firmy se jedná o výbornou platformu pro vstup na zahraniční trhy. Díky spolupráci s MPO budou mít české firmy na tomto veletrhu společnou expozici. it-sa se koná v Norimberku od 7. do 9. října 2025 a jste na něj srdečně zváni. Naďa Lichte je jednatelkou společnosti PROveletrhy, v České republice zastupuje dvě významné veletržní společnosti, a to Deutsche Messe a Nürnberg Messe. Spolu s ní přijal pozvání do studia Adam Janovec z Národního úřadu pro kybernetickou a informační bezpečnost.
In dieser Folge sprechen Tobi Schrödel und Rüdiger Trost über Sommerpausen, seltsame Amazon-Bücher im eigenen Namen, iPhone-Automationen gegen Diebstahl, KI im Suchmaschinen-Markt, Cloud-Strategien von Microsoft, Retro-Gaming, 3D-gedruckte Klobrillen, Spam über Google-Kalender und den legendären „Boss Key“. Dazu jede Menge Humor, absurde Fundstücke aus dem Netz und persönliche Erlebnisse.
Hacking ist auch in Filmen schon seit vielen Jahren beliebt. Doch sind die Szenen, in welchen eine Hacker innerhalb einer Minuten mit einer Pistole am Kopf ein Sicherheitssystem der Regierung knackt auch realistisch? Andreas und Sandro haben sich mal ein paar Szenen klassischer Filme angesehen und versuchen einzuordnen.
Moin aus Osnabrück und herzlich willkommen zur 37. Folge vom Update. Der Deutsche IT-Security Kongress steht vor der Tür. In diesem Jahr geht das Event bereits in die sechste Runde. Im Gespräch mit Ulf geben Anne-Marie Böwer und Jana Plogmann spannende Einblicke zum 6. Deutschen IT-Security Kongress. Um welche Top-Themen dreht sich der #DITSK in diesem Jahr? Welche Speaker sind an Bord? Was gibt es Neues?
Hallo da draußen an den Empfangsgeräten und herzlich willkommen zu einer neuen Podcast-Folge. In Folge #112 begrüßen Julius und Marcel heute Annika Wägenbauer, die Gründerin von Cybersecurity Redefined. Julius, Marcel und Annika sprechen darüber, warum Vielfalt in der IT-Security kein „Nice-to-have“ ist, sondern über Erfolg oder Stillstand entscheidet.
We're asking the hard question: is technology the problem… to technology? If cybercrime only exists because the internet does, maybe the real solution is to unplug it all, toss the Wi-Fi router into the river, and go back to quills, scrolls, and smoke signals. In this episode, Darnley takes a tongue-in-cheek look at the rise of tech in cybersecurity, why every “solution” creates new problems, and whether we should just burn it all down.Grab a coffee, sit back, and laugh(or cry) while we wrestle with the paradox of fighting technology with technology, and what you actually need to do to stay safe online.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
Thank You To Our Partners The Institute, AutoFlow, Shop Dog Marketing, In-Bound, ExpressWatch Full Video EpisodeIn our episode today- I welcome to the podcast my friend Helen Fradette, the newly elected Club President for Grand Rapids Toastmasters, club 404.As listeners know - one of my favorite things about my weekly participation in club 404 -is that the club is NOT composed of automotive professionals, just a great group of professionals from all walks of life.This means they have wide and varied perspectives and opinions that I regularly have an opportunity to listen to - and today you will get to listen to one of those voices!Helen is an IT Security expert, but today she will be sharing a story about a very challenging time in her life - when she was a single mom - couldn't afford a vehicle… and how things felt when the one that was graciously gifted to her wound up needing repairs.As I listened to Helen - it was clear to me that most people walking in our shops that need help - may never voice it - and creating the right kind of environment where people feel safe to communicate real needs might be better considered as a proactive approach vs a reactive one. There is an opportunity for our industry to improve the way we can serve - and communicate our desire to do so.Another Story Helen shared was more common - a circumstance where a shop didn't provide clear details on a repair that was needed - and resulted in inquiries not to the shop, but to trusted friends, which resulted in no authorized repair. These types of scenarios play out daily across the country. I too often- and you might hear this in my conversation with Helen - become very curious about the car in the story.You may also notice that Helen, in our conversation, was less focused about the details related to the car.This was an enjoyable and meaningful conversation - If I can encourage one thing from this chat - it would be to encourage shops to see themselves as partners in life circumstances, not just vehicle mechanics.The WOTD was fitting for this:- “Solicitude” (noun)Meaning: care or concern for someone's well-being.Thank You To Our Partners The Institute, AutoFlow, AutoLeap, Shop Dog Marketing, In-Bound, Express:The Institute at WeAreTheInstitute.com. "Stop stressing over your business, you deserve a good night's sleep. The Institute's coaching helps you achieve success and financial peace.AutoFlow at AutoFlow.com. Your partner in technology, Autoflow consolidates your client interactions - before, during and after the visit to a single thread. Learn more at Autoflow.comShop Dog Marketing at Shop Dog Marketing.com. "Want to see your auto repair shop thrive? Let Shop Dog Marketing be your guide. Our customer-first approach, combined with AI-driven creative content, ensures top rankings. In-Bound at CallInBound.com. Cover your communication needs and revolutionize your auto repair business with AI-driven call analytics from InBound. Express by Facepay myexpress.io. Keep your existing merchant processor and software at your service counter. Express is integrated into your workflow to make the experience better....
Die richtige Story zur richtigen Zeit – und es kann auch DICH treffen! Im diesem Podcast spricht Sandro Müller mit Carlo Canova, langjähriger Security Consultant bei goSecurity AG. Carlo erzählt von einem Phishing, das ihn persönlich erreicht hat – und das im schlimmsten Fall der ganzen Firma erheblichen Schaden hätte zufügen können. Zum Glück wurde der Incident sofort richtig behandelt. Eine spannende und lehrreiche Episode für alle, die verstehen wollen, wie schnell jeder zum Ziel werden kann – und warum es so wichtig ist, vorbereitet zu sein.
Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Lessons From 34 Years in OT Cybersecurity: Growth, Challenges, and Leading Change with Scott RosenbergerPub date: 2025-08-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Aaron Crow sits down with longtime friend and colleague Scott Rosenberger, the cybersecurity leader for Vistra Corporation's generation fleet. Together, they take a deep dive into Scott's fascinating journey from an engineering background in nuclear power to overseeing cybersecurity across a sprawling, nationwide utility portfolio. You'll hear insightful stories from the early days of OT cybersecurity - before most of today's tools even existed - and how foundational principles like alignment, engagement, and standardization have driven years of progress. Scott and Aaron reflect on the importance of building cross-disciplinary teams, developing strong communication strategies, and embracing the reality that real security is about continuous improvement, collaboration, and sometimes learning from mistakes. From tales of rolling out firewalls at power plants and negotiating with skeptical vendors, to lessons in leadership, trust-building, and the ever-evolving challenges of protecting critical infrastructure, this episode is packed with practical wisdom, industry anecdotes, and a look at what's coming over the cybersecurity horizon. Whether you're just entering the field or a seasoned pro, grab your headphones - you won't want to miss this candid, insightful conversation. Key Moments: 04:37 Bridging IT and Cybersecurity 08:40 Revolutionizing Program Development Together 10:08 Building Consensus Through Communication 12:33 "Business Insights and NERC SIP Evolution" 17:18 Utility's Major Implementation Challenge 20:08 Corporate Cybersecurity Challenges Uncovered 21:58 "Automated Inventory and Cybersecurity Insight" 27:21 Optimizing Cybersecurity and Metrics 30:56 Essential Infrastructure Basics Lacking 34:17 "Identifying and Resolving Hidden Issues" 37:21 Encouraging Change in Industrial Practices 42:11 "Finding the Right Team Mindset" 46:11 "Importance of Pre-Job Briefs" About the guest: Scott Rosenberger is currently the manager of Operational Technology for Luminant. He developed the Luminant program to address the reliability, security and ongoing maintenance of Operational Technology for Luminant's Fossil Generation Fleet. He has a Bachelor of Engineering from Stevens Institute of Technology and is a registered professional Engineer in Texas. In his 23+ years with Luminant he has worked in nuclear and fossil plants, many corporate roles and for 3 years as Director of IT Security and Compliance. Scott also spent 3 years as a member of the NERC CIP drafting team. Links to connect Scott: https://www.linkedin.com/in/scottrosenberger/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
As dental practitioners, you surely put your blood, sweat, tears and years into growing your practice. But do you invest enough capital into protecting your practice with robust IT and security systems? The latest episode of The Dental Economist Show uncovers the reality of dental security today and why 70% of dental practices are at risk of a security breach. Tune in to hear host Mike Huffaker and Tom Barberio, Chief Information Officer at Thinc Forward, chat about the evolving landscape of dental technology and IT security - from how practices can avoid common technology pitfalls and effectively plan for infrastructure updates to how they can leverage the shift to cloud-based solutions. This conversation highlights that dental technology is shifting from being a cost center to becoming a true business enabler.
Cosmic Building, a construction technology company, uses AI-driven end-to-end software to run mobile robotic microfactories. At the heart of its newest microfactory in Pacific Palisades are ABB's IRB 6710 robots and RobotStudio digital twin software. Both of which are integrated into Cosmic's Workstation Cell and AI-driven Building Information Model (BIM). #ai #california #wildfire #losangeles #robot #fire
In the compelling finale of this three-part insurance series, host Kirsten Howe and insurance expert Dean Myers tackle the coverage that keeps business owners up at night—cyber insurance. Dean shares fascinating real-world stories, from ransomware attackers offering customer service hotlines to disgruntled employees planting digital "time bombs" in company systems. You'll discover why this isn't just another insurance policy but essential business survival protection that covers everything from system failures to deepfake fraud. Dean reveals the surprising realities about whether companies should pay ransoms, how insurers use "white hat" attacks during applications, and why Silicon Valley startups are outpacing traditional insurance giants. If you think your business is too small to be targeted or that basic IT protection is enough, this episode will be a wake-up call you can't afford to ignore. Time-stamped Show Notes: 0:00 Introduction 1:12 What is cyber insurance, and why it's the broadest coverage for such esoteric risks? 1:48 The comprehensive scope: system failure, ransomware, business email compromise, business interruption, contingent business interruption, and forensics coverage. 2:15 Why cyber claims require hiring attorneys, CPAs, forensics experts, claims adjusters, and legal counsel, unlike traditional workers' comp claims. 2:45 The two key reasons carriers provide such broad coverage: rapid system restoration at the lowest cost and mandatory industry claim reporting. 3:48 How cyber insurance provides both first-party and third-party coverage, protecting you when you accidentally send infected emails to clients. 4:37 Real-world business email compromise: When hackers send fake invoices to your clients from compromised email accounts. 5:10 Why cyber attacks almost always originate overseas in countries with lax cybersecurity laws and accountability. 5:37 Will cyber insurance pay ransoms, and when is it appropriate? 6:42 Real claim story: How a tired CPA two days before tax season fell for a phishing email with a partner's name containing just one extra letter 8:25 Why paying ransoms creates a "bull's eye on your back" and marks you as a repeat target for extortionists. 11:06 Cyber insurance qualification requirements, why multi-factor authentication is now absolutely mandatory across all carriers. 12:15 "White hat" mock attacks: How insurers test your system vulnerabilities during the application process using the "open parking spot" analogy. 14:41 Insider sabotage case study: Bay Area law firm manager discovers her job posted on LinkedIn, teams up with IT brother-in-law for revenge. 15:53 The emerging deepfake threat, how voice cloning technology is creating new fraud risks for fund transfers. 16:25 Protection strategies: Using "trip questions" with personal knowledge to verify client identity during suspicious calls. 17:12 The AI counterbalance: How artificial intelligence may help prevent cyber claims in the future.
In this special live episode of Autonomous IT, Live! we walk through a high-stakes incident response drill that mimics a disturbingly realistic threat scenario: an attacker gains access to your internal tools — not by breaking in, but by logging in.Here's the setup: a user unknowingly reuses compromised credentials with the company's SSO provider. An attacker logs in, flies under the radar, and impersonates internal IT support using Slack, email, and calendar invites. Their goal? Convince employees to install a fake remote access tool—all while avoiding anyone likely to report suspicious behavior.Join Landon Miles, Tom Bowyer, and Ryan Braunstein as they:
Troubleshoot identity issues, investigate risky users and apps, and optimize Conditional Access policies using natural language—with built-in AI from Microsoft Security Copilot in Microsoft Entra. Instead of switching between logs, PowerShell, and spreadsheets, Security Copilot centralizes insights for faster, more focused action. Resolve compromised accounts, uncover ownerless or high-risk apps, and tighten policy coverage with clear insights, actionable recommendations, and auto-generated policies. Strengthen security posture and reclaim time with a smarter, more efficient approach powered by Security Copilot. Diana Vicezar, Microsoft Entra Product Manager, shares how to streamline investigations and policy management using AI-driven insights and automation. ► QUICK LINKS: 00:00 - Microsoft Entra with Security Copilot 01:26 - Conditional Access Optimization Agent 03:35 - Investigate risky users 05:49 - Investigate risky apps 07:34 - Personalized security posture recommendations 08:20 - Wrap up ► Link References Check out https://aka.ms/SecurityCopilotAgentsinMicrosoftEntra ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary