Podcasts about security podcast

  • 119PODCASTS
  • 957EPISODES
  • 40mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 27, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about security podcast

Show all podcasts related to security podcast

Latest podcast episodes about security podcast

The Fearless Mindset
Inside the Minds of Violent Offenders: Lessons from the Front Lines

The Fearless Mindset

Play Episode Listen Later May 27, 2025 22:43


In this episode, Mark Ledlow, Bruno Dias, and Matt Talbot discuss the importance of comprehensive threat and risk assessments in corporate and educational environments. They explore the integration of physical security with behavioral threat assessments, emphasizing the crucial role every employee plays in maintaining safety. Additionally, they touch on the psychological aspects of individuals who commit acts of violence, drawing on their own extensive field experiences. Matt shares a powerful story from his time working in a high-risk prison environment, highlighting the importance of building trust and respect with inmates. The episode wraps up with information about their ongoing projects and how listeners can reach out to them for their expert services.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSAdversity Handling: The importance of dealing with adversity and leveraging experiences to stay fearless is emphasized. Comprehensive Security Approach: Incorporating physical security into behavioral threat assessment provides a unique value. Inclusiveness in Safety: Every employee, regardless of their role, should be viewed as part of the safety and security team. Warning Signs: Identifying and acting on warning behaviors and signs is crucial in preventing violent incidents. Human Side of Inmates: Building respectful relationships with inmates can foster mutual respect and potentially prevent violent outcomes. Impactful Storytelling: Personal stories, such as working with high-risk individuals, can convey powerful lessons in security management. Legacy and Education: The importance of leaving a positive legacy and educating the next generation of security professionals.QUOTES"We really need to think about everybody who is positioned to be able to possibly help." "Humans communicate kind of like dogs shed hair, right? It's just a necessity." "Everybody plays a role... there's something good in everybody and my job was to figure that out." "Sometimes it's about just getting to the human side of somebody." "Treating people with validation and making them feel significant can prevent them from committing violent acts." "Our goal is to leave something original, something impacting on this larger community."Get to know more about Dr. Bruno Dias through the link below.https://www.linkedin.com/in/brunodiaspci/Get to know more about Dr. Matt Talbot through the link below.https://www.linkedin.com/in/matt-talbot-phd-lcsw-ccfc-cfmhe-ctm%C2%AE-5a655044To hear more episodes of The Fearless Mindset podcast, you can go to  https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.

The Industrial Security Podcast
Lessons Learned From Incident Response [The Industrial Security Podcast]

The Industrial Security Podcast

Play Episode Listen Later May 20, 2025 50:41


How did they get in? How did we find them when they got in? What can we do in future to clean up the mess faster? Chris Sistrunk reflects on a decades' industrial cyber incident response experience at Mandiant (Google).

@BEERISAC: CPS/ICS Security Podcast Playlist
Experience & Challenges Using Asset Inventory Tools [The Industrial Security Podcast]

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Apr 23, 2025 36:27


Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: Experience & Challenges Using Asset Inventory Tools [The Industrial Security Podcast]Pub date: 2025-04-21Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAsset inventory tools have become almost ubiquitous as main offerings or add-ons to OT security solutions. In this episode, Brian Derrico of Trident Cyber Partners walks us through what it's like to use these tools - different kinds of tools in different environments.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Social-Engineer Podcast
Ep. 301 - Security Awareness Series - Leadership Relationships and Becoming a CISO with Travis Farral

The Social-Engineer Podcast

Play Episode Listen Later Apr 21, 2025 30:16


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Travis Farral. Travis has been working in information security since the 90s at places such as Nokia, ExxonMobil, and XTO Energy. He is currently VP & CISO at Archaea Energy, a bp owned, renewable natural gas company based in Houston, Texas. He has spoken at events around world on topics such as Cyber Threat Intelligence, MITRE ATT&CK, and Incident Response. Notable activities during his career include everything from programming logic controllers, building and leading SOCs, driving forklifts, standing up cybersecurity teams, developing threat intelligence programs, and handling responses to incidents, among many other things over the last few decades. [April 21, 2025]   00:00 - Intro 00:18 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                02:08 - Travis Farral Intro 02:58 - A Different Path than Today 05:25 - Healthy Hacking 08:08 - Anything Can Be Weaponized 10:54 - Questionable Behavior 14:31 - Smash That Report Button!!! 18:58 - Improving Our Odds 21:00 - You Have to Keep It Simple 22:25 - Letters to a Young CISO 24:20 - Find Travis Farral online -          LinkedIn: linkedin.com/in/travisfarral 25:01 - Mentors -          Shawn Edwards -          Jay Leek 27:02 - Book Recommendations -          R. E. Lee: A Biography  - Douglas Southall Freeman 29:34 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

The Industrial Security Podcast
Experience & Challenges Using Asset Inventory Tools [The Industrial Security Podcast]

The Industrial Security Podcast

Play Episode Listen Later Apr 21, 2025 36:27


Asset inventory tools have become almost ubiquitous as main offerings or add-ons to OT security solutions. In this episode, Brian Derrico of Trident Cyber Partners walks us through what it's like to use these tools - different kinds of tools in different environments.

כל תכני עושים היסטוריה
Experience & Challenges Using Asset Inventory Tools [The Industrial Security Podcast]

כל תכני עושים היסטוריה

Play Episode Listen Later Apr 21, 2025 36:27


Asset inventory tools have become almost ubiquitous as main offerings or add-ons to OT security solutions. In this episode, Brian Derrico of Trident Cyber Partners walks us through what it's like to use these tools - different kinds of tools in different environments.

Random but Memorable
Security Agents Protecting Adolescence with Chris McCarty from Quit Clicking Kids

Random but Memorable

Play Episode Listen Later Apr 8, 2025 57:48


This episode we meet Chris McCarty, the inspirational student and founder of Quit Clicking Kids, an organization advocating for children's rights in the digital age. Learn about the rise of “sharenting” and how Chris is fighting for legislative changes to safeguard minors from exploitation on social media platforms. We cover everything from the permanence of online content to getting Gen Z proactive about their privacy.In Watchtower Weekly, we unpack Adolescence (the Netflix show everyone can't stop talking about) and how AI agents are being used to help overwhelmed cybersecurity professionals.

The Just Security Podcast
The Just Security Podcast: Regulating Social Media — Is it Lawful, Feasible, and Desirable? (NYU Law Forum)

The Just Security Podcast

Play Episode Listen Later Mar 26, 2025 72:24 Transcription Available


2025 will be a pivotal year for technology regulation in the United States and around the world. The European Union has begun regulating social media platforms with its Digital Services Act. In the United States, regulatory proposals at the federal level will likely include renewed efforts to repeal or reform Section 230 of the Communications Decency Act. Meanwhile, States such as Florida and Texas have tried to restrict content moderation by major platforms, but have been met with challenges to the laws' constitutionality.  On March 19, NYU Law hosted a Forum on whether it is lawful, feasible, and desirable for government actors to regulate social media platforms to reduce harmful effects on U.S. democracy and society with expert guests Daphne Keller, Director of the Program on Platform Regulation at Stanford Law School's Cyber Policy Center, and Michael Posner, Director of the Center for Business and Human Rights at NYU Stern School of Business. Tess Bridgeman and Ryan Goodman, co-editors-in-chief of Just Security, moderated the event, which was co-hosted by Just Security, the NYU Stern Center for Business and Human Rights and Tech Policy Press. Show Notes: Tess Bridgeman Ryan GoodmanDaphne Keller Michael PosnerJust Security's coverage on Social Media PlatformsJust Security's coverage on Section 230Music: “Broken” by David Bullard from Uppbeat: https://uppbeat.io/t/david-bullard/broken (License code: OSC7K3LCPSGXISVI)

@BEERISAC: CPS/ICS Security Podcast Playlist
Needles in Haystacks - Recruiting OT Incident Responders [The Industrial Security Podcast]

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Mar 19, 2025 56:06


Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: Needles in Haystacks - Recruiting OT Incident Responders [The Industrial Security Podcast]Pub date: 2025-03-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIndustrial incidents can be cyber attacks, or equipment failures, or physical equipment leaking product because of metal fatigue or incorrect welds. OT incident responders need to know a lot. Doug Leece of Enbridge explores what is OT incident response and what you look for recruiting people into that role.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Industrial Security Podcast
Needles in Haystacks - Recruiting OT Incident Responders [The Industrial Security Podcast]

The Industrial Security Podcast

Play Episode Listen Later Mar 17, 2025 56:06


Industrial incidents can be cyber attacks, or equipment failures, or physical equipment leaking product because of metal fatigue or incorrect welds. OT incident responders need to know a lot. Doug Leece of Enbridge explores what is OT incident response and what you look for recruiting people into that role.

כל תכני עושים היסטוריה
Needles in Haystacks - Recruiting OT Incident Responders [The Industrial Security Podcast]

כל תכני עושים היסטוריה

Play Episode Listen Later Mar 17, 2025 56:06


Industrial incidents can be cyber attacks, or equipment failures, or physical equipment leaking product because of metal fatigue or incorrect welds. OT incident responders need to know a lot. Doug Leece of Enbridge explores what is OT incident response and what you look for recruiting people into that role.

PSI Security News Podcast
PSi Security Podcast - Doing fire safety the right way

PSI Security News Podcast

Play Episode Listen Later Mar 17, 2025 13:55


Hochiki has recently celebrated the first anniversary of its Training Academy. With that in mind we caught up with Kara Martin of Hochiki at the Gillingham office to find out more about the Academy and the importance of correctly installing life safety technology. It's too important to get it wrong, so how can you be sure you get it right?

Random but Memorable
Security Audit App Ideas with Jacob DePriest

Random but Memorable

Play Episode Listen Later Mar 11, 2025 56:03


What's it like to work as a CISO at a security company? This week, 1Password's VP of Security and CISO, Jacob DePriest, reveals all. Jacob also shares his advice for building strong security teams with diverse perspectives, backgrounds, and skillsets.

@BEERISAC: CPS/ICS Security Podcast Playlist
Would You Rather Use a Control System That's Proven Correct? [The Industrial Security Podcast]

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 27, 2025 52:56


Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: Would You Rather Use a Control System That's Proven Correct? [The Industrial Security Podcast]Pub date: 2025-02-24Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFor safety-critical operations or for critical national infrastructures, would you rather base your system on a code that people have tested as best they can, or would you rather base your system on a platform that has been proven correct? Daly Brown and Nick Foubert of Metropolitan Technologies look at a new approach to designing OT systems.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Industrial Security Podcast
Would You Rather Use a Control System That's Proven Correct? [The Industrial Security Podcast]

The Industrial Security Podcast

Play Episode Listen Later Feb 24, 2025 52:56


For safety-critical operations or for critical national infrastructures, would you rather base your system on a code that people have tested as best they can, or would you rather base your system on a platform that has been proven correct? Daly Brown and Nick Foubert of Metropolitan Technologies look at a new approach to designing OT systems.

כל תכני עושים היסטוריה
Would You Rather Use a Control System That's Proven Correct? [The Industrial Security Podcast]

כל תכני עושים היסטוריה

Play Episode Listen Later Feb 24, 2025 52:56


For safety-critical operations or for critical national infrastructures, would you rather base your system on a code that people have tested as best they can, or would you rather base your system on a platform that has been proven correct? Daly Brown and Nick Foubert of Metropolitan Technologies look at a new approach to designing OT systems.

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

In this episode of the Defense of Security Podcast, Jerry Bell and Andrew Kalat discuss the evolving landscape of cybersecurity threats, focusing on ransomware tactics that exploit insider threats, the hijacking of LLM resources, and the effectiveness of phishing simulations. They explore how adversaries are increasingly targeting employees to gain access to sensitive data and … Continue reading Defensive Security Podcast Episode 296 →

defense llm security podcast jerry bell defensive security podcast
@BEERISAC: CPS/ICS Security Podcast Playlist
How to Embed 30 Years of Security Funding into Capital Budgets [The Industrial Security Podcast]

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 2, 2025 56:00


Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: How to Embed 30 Years of Security Funding into Capital Budgets [The Industrial Security Podcast]Pub date: 2025-01-27Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMost of us struggle to get funding for industrial cybersecurity. Ian Fleming of Deloitte explains how - because cybersecurity is essential to sustaining the value of industrial assets - how we can embed up to 20 or 30 years of cybersecurity budget into capital plans, rather than fight for budget every year.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Industrial Security Podcast
How to Embed 30 Years of Security Funding into Capital Budgets [The Industrial Security Podcast]

The Industrial Security Podcast

Play Episode Listen Later Jan 27, 2025 56:00


Most of us struggle to get funding for industrial cybersecurity. Ian Fleming of Deloitte explains how - because cybersecurity is essential to sustaining the value of industrial assets - how we can embed up to 20 or 30 years of cybersecurity budget into capital plans, rather than fight for budget every year.

כל תכני עושים היסטוריה
How to Embed 30 Years of Security Funding into Capital Budgets [The Industrial Security Podcast]

כל תכני עושים היסטוריה

Play Episode Listen Later Jan 27, 2025 56:00


Most of us struggle to get funding for industrial cybersecurity. Ian Fleming of Deloitte explains how - because cybersecurity is essential to sustaining the value of industrial assets - how we can embed up to 20 or 30 years of cybersecurity budget into capital plans, rather than fight for budget every year.

The Lockdown - Practical Privacy & Security
020 - The State of Privacy in 2025

The Lockdown - Practical Privacy & Security

Play Episode Listen Later Jan 6, 2025 57:50


This week on The Lockdown, The Practical Privacy & Security Podcast, we're kicking off the new year with reflections, updates, and a deep dive into key privacy issues that are shaping 2025. From privacy settings on iOS and GrapheneOS, to AI assistants and their potential privacy pitfalls, this episode covers practical advice, insights, and solutions for everyday users. Additionally, I explore new state-level privacy laws across the U.S. and what they mean for both businesses and individuals.In this week's episode:Reflecting on personal privacy practices and professional projects.A look at U.S. state privacy regulations taking effect in 2025.Privacy and security implications of voice assistants like Siri, Alexa, and Google Assistant.Detailed privacy settings for iOS and why GrapheneOS is the better alternative.AI assistants like ChatGPT and Claude, and their risks.Privacy concerns with vehicles, focusing on data leaks and constant surveillance.The intersection of cybersecurity and OSINT in modern attacks.Show Links:Apple offers $95 million in Siri privacy violation settlementAmazon to pay $31 million in privacy violation penalties for Alexa voice assistant and Ring cameraNulide / FindMyDevice · GitLabBritish journalist could face years in prison for refusing to hand over his passwords to the police - Il Fatto QuotidianoVolkswagen EV data leak exposes personal information of 3.3 million peopleTesla data helped police after Las Vegas truck explosion, but experts have wider privacy concernsSupport this show: https://www.patreon.com/c/TheLockdownOfficial website: https://psysecure.com/podcast/"If you want to keep a secret, you must also hide it from yourself."-George OrwellPodcast music: The R3cluse 

@BEERISAC: CPS/ICS Security Podcast Playlist
Insights into Nation State Threats [The Industrial Security Podcast]

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 13, 2024 67:27


Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: Insights into Nation State Threats [The Industrial Security Podcast]Pub date: 2024-12-09Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationNation state threats are often portrayed as the "irresistible forces" of cyber threats, with little qualification. Joseph Price of Deloitte joins us to dig deeper - what are nation states capable of, what are they up to, and how should we interpret the information that is available to the public?The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

כל תכני עושים היסטוריה
Insights into Nation State Threats [The Industrial Security Podcast]

כל תכני עושים היסטוריה

Play Episode Listen Later Dec 10, 2024 63:25


Nation state threats are often portrayed as the "irresistible forces" of cyber threats, with little qualification. Joseph Price of Deloitte joins us to dig deeper - what are nation states capable of, what are they up to, and how should we interpret the information that is available to the public?

The Industrial Security Podcast
Insights into Nation State Threats [The Industrial Security Podcast]

The Industrial Security Podcast

Play Episode Listen Later Dec 9, 2024 67:27


Nation state threats are often portrayed as the "irresistible forces" of cyber threats, with little qualification. Joseph Price of Deloitte joins us to dig deeper - what are nation states capable of, what are they up to, and how should we interpret the information that is available to the public?

The Security Podcast of Silicon Valley
Neil Serebryany, Founder & CEO of CalypsoAI: Securing AI's Future and Tackling Tomorrow's Risks

The Security Podcast of Silicon Valley

Play Episode Listen Later Dec 4, 2024 41:33


In this episode of the Security Podcast of Silicon Valley, Jon and Sasha of YSecurity sit down with Neil Serebryany, the visionary Founder and CEO of CalypsoAI. Neil shares his fascinating journey from the National Geospatial-Intelligence Agency to leading a cutting-edge AI security company. We dive into the evolving landscape of AI risks, data protection, and regulatory challenges while exploring the future of AI as it transforms industries and society. Learn how CalypsoAI is paving the way for secure AI adoption and what it means for the future of business and innovation.  #AI #CyberSecurity #TechInnovation #CalypsoAI #AIRegulation #DataSecurity #AIAdoption #AICompliance #SecureAI

@BEERISAC: CPS/ICS Security Podcast Playlist
OT Security Data Science - A better vulnerability database [The Industrial Security Podcast]

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 23, 2024 34:46


Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: OT Security Data Science - A better vulnerability database [The Industrial Security Podcast]Pub date: 2024-11-20Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationSecurity automation needs a machine-readable vulnerability database. Carmit Yadin of Device Total joins us to look at limitations of the widely-used National Vulnerability Database (NVD), and explore a new "data science" alternative.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Industrial Security Podcast
OT Security Data Science - A better vulnerability database [The Industrial Security Podcast]

The Industrial Security Podcast

Play Episode Listen Later Nov 20, 2024 34:46


Security automation needs a machine-readable vulnerability database. Carmit Yadin of Device Total joins us to look at limitations of the widely-used National Vulnerability Database (NVD), and explore a new "data science" alternative.

כל תכני עושים היסטוריה
OT Security Data Science - A better vulnerability database [The Industrial Security Podcast]

כל תכני עושים היסטוריה

Play Episode Listen Later Nov 20, 2024 34:46


Security automation needs a machine-readable vulnerability database. Carmit Yadin of Device Total joins us to look at limitations of the widely-used National Vulnerability Database (NVD), and explore a new "data science" alternative.

The Security Podcast of Silicon Valley
Jacob Berry, Field CISO at Clumio, On Balancing Security with Business Growth in the Cloud

The Security Podcast of Silicon Valley

Play Episode Listen Later Nov 17, 2024 46:05


In this episode of the Security Podcast of Silicon Valley, a YSecurity Production, Jon and Sasha sit down with Jacob Berry, Field CISO at Clumio, to explore the intricate balance between security and business growth. Jacob shares his journey from a "punk hacker" to leading security for a cutting-edge cloud data protection company. We delve into the evolving role of the CISO, the complexities of managing security for cloud-based services, and the importance of balancing confidentiality, integrity, and availability. Jacob also discusses the human side of security, from customer conversations to the challenges and opportunities in the fast-paced world of startups. Tune in to learn how Jacob navigates the intersection of technology, privacy, and business strategy.

The Security Podcast of Silicon Valley
Vijay Balasubramaniyan, Co-Founder and CEO of Pindrop Security: The Voice Behind Cutting-Edge Security

The Security Podcast of Silicon Valley

Play Episode Listen Later Oct 30, 2024 46:14


In this episode of the Security Podcast of Silicon Valley, a YSecurity.io production, Hosts Jon McLahlan and Sasha Sinkevich sit down with Vijay Balasubramaniyan, the visionary Co-Founder and CEO of Pindrop Security. From his roots in voice technology at giants like Google and IBM to pioneering security innovations at Pindrop, Vijay shares his unique journey of merging voice and security. Discover how Pindrop is leading the charge against deepfake fraud, revolutionizing voice authentication, and even protecting democracy. Tune in for a deep dive into the future of voice and security, with insights from one of the industry's leading minds. 

The Industrial Security Podcast
Driving Change - Cloud Systems and Japanese CCE [The Industrial Security Podcast]

The Industrial Security Podcast

Play Episode Listen Later Oct 21, 2024 42:16


Tomomi Ayoyama translated the book Countering Cyber Sabotage - Consequence-Driven, Cyber-Informed Engineering - to Japanese. Tomomi recalls the effort of translating CCE to Japanese and looks forward to applying CCE and OT security principles to industrial cloud systems at Cognite.

כל תכני עושים היסטוריה
Driving Change - Cloud Systems and Japanese CCE [The Industrial Security Podcast]

כל תכני עושים היסטוריה

Play Episode Listen Later Oct 21, 2024 42:16


Tomomi Ayoyama translated the book Countering Cyber Sabotage - Consequence-Driven, Cyber-Informed Engineering - to Japanese. Tomomi recalls the effort of translating CCE to Japanese and looks forward to applying CCE and OT security principles to industrial cloud systems at Cognite.

The Industrial Security Podcast
Hitting Tens of Thousands of Vehicles At Once [The Industrial Security Podcast]

The Industrial Security Podcast

Play Episode Listen Later Sep 23, 2024 35:38


Compromise a cloud service and tens thousands of vehicles can be affected at once. Matt MacKinnon of Upstream Security walks us through the world of cloud security for connected vehicles, transport trucks, tractors, and other "stuff that moves."

כל תכני עושים היסטוריה
Hitting Tens of Thousands of Vehicles At Once [The Industrial Security Podcast]

כל תכני עושים היסטוריה

Play Episode Listen Later Sep 23, 2024 35:38


Compromise a cloud service and tens thousands of vehicles can be affected at once. Matt MacKinnon of Upstream Security walks us through the world of cloud security for connected vehicles, transport trucks, tractors, and other "stuff that moves."

Random but Memorable
Human Factor Authentication Pitch with Dr. Erik Huffman

Random but Memorable

Play Episode Listen Later Sep 17, 2024 56:03


Are there personality traits that make some people more vulnerable to cyberattacks? We lift the lid on this and more in a one-of-a-kind interview with cyberpsychologist, Dr Erik Huffman. Tune in, as Erik unpacks the human-element of security, how AI is transforming social engineering, and how we can turn humans from the weakest security link into our greatest superpower. ⛓️‍

Random but Memorable
Social Media Bad Habits with Tracy Chou from Block Party

Random but Memorable

Play Episode Listen Later Aug 20, 2024 59:57


How can we reimagine social media to make it safer for everyone? Tracy Chou is on a mission to do just that. Join Block Party founder, Tracy Chou, as she sits down with Roo to share her thoughts on privacy in an always online world and what led her to create Privacy Party: A tool that's reshaping the way we use social media and giving power back to the user.

The Durenda Wilson Podcast
Motherhood - Where is Our Safety and Security (Podcast 544)

The Durenda Wilson Podcast

Play Episode Listen Later Aug 5, 2024 32:38


In a culture fraught with fear about safety and security, where do we stand as wise women of God?  Is it wrong to love safety and security?  Why can it often feel elusive?  What does God have to say about safety and security?  Resources mentioned in this episode: The Unhurried Homeschooler Mentoring Course Link to podcast episode search bar Raising Boys to Men Book Raising Boys to Men Audiobook The Unhurried Homeschooler The Unhurried Homeschooler Audiobook Unhurried Grace for a Mom's Heart The Four-Hour School Day CTC Math Voetberg Music Academy (Use discount code WILSON20 for 20% off ) Subscribe to my monthly email and receive access to Unhurried Grace for a Mom's Heart: 31 Days in God's Word