Cy openbaar
[search 0]
Meer
Download the App!
show episodes
 
疲惫娇娃是一档从荧幕聊到宇宙深处的泛文化播客,用女性的声波延展对世界的参与和想象。 在一个内陷的时代,疲惫娇娃站在中国和美国的交汇点上,用女性的元视角去观察、抵抗、塑造政治和社会对流行文化的影响。我们讨论流动的时代精神、艺术、自由、未来、友谊以及一切使我们获得力量的事物。
  continue reading
 
Artwork

1
Girls Talk Cyber

girlstalkcyber

Unsubscribe
Unsubscribe
Maandelijks
 
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
  continue reading
 
Artwork

1
Cybernormer

Cybernauterne

Unsubscribe
Unsubscribe
Maandelijks
 
Cybernormer er en podcast om teknologi og samfund. Den er produceret at Cybernauterne, et netværk af eksperter i cybersikkerhed, internetkultur og digital forståelse. Læs mere om os på vores hjemmeside cybernauterne.dk
  continue reading
 
Artwork

1
Cyber Dandy

Cyber Dandy

Unsubscribe
Unsubscribe
Maandelijks
 
Your Favorite Existentialist-Anarchist Internet BadassCommentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Comedians and Friends Chad Daniels and Cy Amundson host a weekly podcast where they tell stories about their lives. For advertising opportunities please email PodcastPartnerships@Studio71us.com We wanna make the podcast even better, help us learn how we can: https://bit.ly/2EcYbu4 Privacy Policy: https://www.studio71.com/us/terms-and-conditions-use/#Privacy%20Policy
  continue reading
 
Artwork

1
CyberSpectrum (Feta Report)

Dimitrios Mistriotis

Unsubscribe
Unsubscribe
Maandelijks
 
Το Podcast τροφή για το μυαλό σου: συμβουλές για την ζωή στο εξωτερικό, εμπειρίες, συζητήσεις για εκπαίδευση, εργασία και επιχειρείν. Προσθέστε βιβλία και κόμικ.
  continue reading
 
Artwork

1
Cyber Inspiration

Evgeniy Kharam and Security Architecture

Unsubscribe
Unsubscribe
Maandelijks+
 
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
  continue reading
 
Artwork

1
Cybersecurity Basement – der Podcast für echten Security-Content

suresecure GmbH, Michael Döhmen, Andreas Papadaniil

Unsubscribe
Unsubscribe
Maandelijks
 
Herzlich Willkommen im Cybersecurity Basement. In unserem Podcast sprechen vor allem Andreas Papadaniil und Michael Döhmen alle 14 Tage über Themen aus dem Bereich Cybersecurity. Dabei legen wir großen Wert auf Objektivität gelegt. Kein suresecure-Feature-Fucking, sondern ein seriöser, authentischer und ehrlicher Austausch aus Theorie und Praxis. Der Podcast richtet sich an IT- und Security-Entscheider und alle, die es mal werden wollen. Hier gibts kein Blabla, sondern Security als Handwerk. ...
  continue reading
 
Artwork

1
The Cyber Riddler

Ahmad Almorabea

Unsubscribe
Unsubscribe
Maandelijks
 
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
  continue reading
 
Artwork

1
Cyber Defense Radio

Cyber Defense Magazine

Unsubscribe
Unsubscribe
Wekelijks
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

Unsubscribe
Unsubscribe
Maandelijks+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Each week Toastie and Jennasis bring you the foundations of the past, the state of Night City today, and news of the future for all things Cyberpunk. We talk about the TTRGP, 2077, and every hidden gem we can find. Subscribe for more Cyberpunk lore, news, and more! Patreon - Get ad-free episodes early & support the show! https://www.patreon.com/cyberpunklorecast Discord: https://discord.gg/JXKfVhM Twitter: https://twitter.com/CyberpunkLore Email: cyberpunklorecast@gmail.com https://fanrolldi ...
  continue reading
 
Artwork

1
C.S. Cyber

Shawn Waldman

Unsubscribe
Unsubscribe
Dagelijks+
 
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
  continue reading
 
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
  continue reading
 
Artwork

1
Resilient Cyber

Chris Hughes

Unsubscribe
Unsubscribe
Maandelijks+
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Artwork
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Artwork

1
Queer in Cyber

Nearshore Cyber

Unsubscribe
Unsubscribe
Dagelijks+
 
Queer in Cyber is a community service of Nearshore Cyber. Its purpose is to illuminate the intersection of queerness and the cybersecurity profession. It is produced by and for LGBTQI+ and non-gender-conforming people who work in the industry.
  continue reading
 
By order of the Shadow Proclamation :: Clause 374 :: MaasNeotek.com is legally bound to post this notice somewhere easily found :: "No machine shall exist in all places at all times." - Cyberpunk-Apokalypse -
  continue reading
 
Artwork

1
Le monde de la cyber

Leslie Fornero

Unsubscribe
Unsubscribe
Maandelijks+
 
Bienvenue dans le monde de la cyber ! Je m'appelle Leslie Fornero et je travaille dans la cybersécurité. Avec ce podcast, je vous emmène à la découverte de ce monde à la fois merveilleux et terrifiant. Chaque mois, je rencontre un nouvel acteur de la cyber : un hacker éthique, un acteur politique, une association, une entreprise qui propose une solution innovante, et bien d'autres encore... On parle de cyberattaques, de gangs de hackers, d’entreprises et d’hôpitaux qui se font attaquer, de r ...
  continue reading
 
Artwork

1
Cyber Focus

The McCrary Institute

Unsubscribe
Unsubscribe
Wekelijks
 
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
Simply Cyber

Gerald Auger, PhD

Unsubscribe
Unsubscribe
Dagelijks
 
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 31,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

Unsubscribe
Unsubscribe
Wekelijks+
 
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork
 
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
  continue reading
 
Artwork

1
Blak Cyber

George McPherson

Unsubscribe
Unsubscribe
Maandelijks
 
"Securing Our Place In The Industry"​ The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry. Support this podcast: https://podcasters.spotify.com/pod/show/blakcyber/support
  continue reading
 
Loading …
show series
 
In this episode of The Cy Amundson Show, our hometown Wolves have been eliminated from the NBA Playoffs but Minnesota sports fans have some other very exciting news to focus on today so let's talk about that, as well as a little NBA Finals preview + other NFL stuff! SPORTS! ------------- The Cy Amundson Show (@cyamundsonshow) is one of the best spo…
  continue reading
 
This week, Cy plots his next career move and Chad goes golfing with Olivia. This episode is sponsored by/brought to you by BetterHelp. Give online therapy a try at betterhelp.com/SOMEWHERE and get on your way to being your best self.” --- Follow us on Instagram! Chad Daniels (@ThatChadDaniels) is a Dad, Comedian, and pancake lover. With over 750 mi…
  continue reading
 
Link to blog post This week’s Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guest Andrew Wilder, CISO, Community Veterinary Partners, also cybersecurityintheboardroom.com. Thanks to our show sponsor, Conveyor Why did the AI cross the road? To complete your security questionnaires for you. Conveyor, the company using m…
  continue reading
 
This is the first episode of the C.S. Cyber video podcast series. In this episode we talk about first had experience auditing US water and wastewater systems for cyber security compliance. 🚰 Rockwell Bulletin: https://www.rockwellautomation.com/en... ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? ww…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/why-is-implementing-mimo-antennas-essential-for-cybersecurity. MIMO is used in various modern technologies, including Wi-Fi networks, 4G and 5G cellular systems, and smart home devices to boost cybersecurity profiles. Check more stories related to cybersecurity at: https:/…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-a-malicious-xz-utils-update-nearly-caused-a-catastrophic-cyberattack-on-linux-systems-worldwide. A "frightfully close" call with hackers trying to pierce through xz Utils could have led to the next Solar Winds incident. Check more stories related to cybersecurity at: h…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
  continue reading
 
FCC moves forward with BGP security measures LockBit ransomware gang victims get lifeline from FBI Gitloker attacks target GitHub repositories Thanks to today's episode sponsor, Conveyor Why did the AI cross the road? To complete your security questionnaires for you. Conveyor, the company using market-leading AI to automate the entire security revi…
  continue reading
 
Malicious Python Script with a "Best Before" Date https://isc.sans.edu/diary/Malicious%20Python%20Script%20with%20a%20%22Best%20Before%22%20Date/30988 FBI Obtained 7,000 LockBit Ransomware Keys https://www.fbi.gov/news/speeches/fbi-cyber-assistant-director-bryan-vorndran-s-remarks-at-the-2024-boston-conference-on-cyber-security Apple Guarantees 5 Y…
  continue reading
 
In this episode, Will Lassalle, co-founder of Simplix, a platform designed to assist businesses in complying with cyber regulations in Latin America, discusses the challenges and opportunities surrounding cyber compliance in the region. We then delve into the evolving cyber regulatory landscape in Latin America, highlighting the region's efforts to…
  continue reading
 
Infosec and the Cyber Work Hacks podcast are here to help you pass the Certified Ethical Hacker (CEH) exam! So for today’s hack, we’re talking about bootcamps. The CEH exam, no matter how you slice it, is an exam that is the definition of the phrase, “It’s a marathon, not a sprint.” With 125 questions and four hours to answer them, there’s as much …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/what-is-fraudgpt. Hackers have their own version of ChatGPT: a chatbot that can help with malware and phishing called FraudGPT. Here's everything you need to know. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check ex…
  continue reading
 
【聊了什么The What】 英国导演Alex Garland的新作《美国内战》(Civil War)以一场虚构的美国内战为背景,引发了广泛关注和争议。作为A24迄今为止最大制作,电影集全明星阵容和炫目视效于一身,更因触及当下美国社会分裂、政治极化的议题而备受瞩目。然而,电影却避开了最敏感的政治问题,转而以四名战地记者为主角展开叙事,聚焦新闻伦理和人性挣扎,也因此被批评为避重就轻。在本期节目中,疲惫娇娃的两个女的与美轮美换的主播Lokin和小华一起,探讨以下问题:在战争中,镜头背后是新闻理想主义的湮灭,还是人性的回归?在信息过载的时代,我们是否还有余力正视战争和苦难的真相?摄影和报道究竟能否改变世界,抑或终将被时代洪流所淹没?影片刻意模糊了内战的起因和立场,这是否在鼓吹一种危险的相对主义,还…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
  continue reading
 
US Senators Urge Pentagon to Diversify Cybersecurity Amid Microsoft Concerns Two US senators have raised concerns about the Pentagon's decision to continue using Microsoft services despite recent cybersecurity incidents, including a breach by a Chinese threat actor. The Senators highlighted the Pentagon's increasing dependence on Microsoft and call…
  continue reading
 
US researches using psychology against threat actors AI leveling up unsophisticated threat actors London Hospital attacks linked to Qilin Thanks to today's episode sponsor, Conveyor Conveyor is the market leading AI-powered platform that automates the entire customer security review process — from easily sharing your security posture and SOC 2 to l…
  continue reading
 
WatchGuard VPN Brutefording https://isc.sans.edu/diary/Brute%20Force%20Attacks%20Against%20Watchguard%20VPN%20Endpoints/30984 TotalRecall Tool To Extract Data from Microsoft Recall https://github.com/xaitax/TotalRecall WebEx Flaw https://www.helpnetsecurity.com/2024/06/05/cisco-webex-cloud-vulnerability/ https://netzbegruenung.de/blog/netzbegruenun…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/from-hack-to-sale-the-journey-of-stolen-data. Have you ever wondered what happens to stolen data when it goes to the Dark web? or how does someone purchase stolen data? Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also che…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
  continue reading
 
In this show, Allan interviews nine guests and asks them questions from a list of 21: Dr. Deanna Caputo “How do you measure and articulate risk to the business?” “People, process or technology?” Carlos Guerrero “How do we foster community in cybersecurity?” Elliott Franklin “Governance, Risk Management, and Compliance – Which of the three is most i…
  continue reading
 
Send us a Text Message. In this episode, Alex Boyd joins Spencer and Brad. Alex is a shareholder in Polsinelli's national Technology Transactions and Data Privacy practice, shares crucial insights for CTOs, IT Directors, CISOs, Security Managers when responding to security incidents. Discover common misconceptions about breaches and the mistakes or…
  continue reading
 
Today Frank Cilluffo sits down with Christopher Porter, former National Intelligence Officer for cyber matters and current executive at Google. They delve into the complexities of cybersecurity during government transitions, the critical role of intelligence briefings, and the impact of emerging technologies on national security. Drawing from his e…
  continue reading
 
Ransomware attack forces London hospitals to cancel operations Christie’s stolen data sold to highest bidder RansomHub claims responsibility for Frontier breach Thanks to today's episode sponsor, Conveyor Conveyor is the AI security review automation platform helping infosec teams automate everything from securely sharing a SOC 2 to one-click auto …
  continue reading
 
NEW! Text Us Direct Here! Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro intervi…
  continue reading
 
Today on Cyber Work, my guest is Raj Ananthanpillai, CEO of Trua, a company that is steeped in the current issues around digital credentials and data privacy. As you’ve no doubt heard, AT&T reported a data breach that compromised the personal information of approximately 7.6 million users! Ananthanpillai discusses Trua’s mission to leave data thiev…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
  continue reading
 
- For those don't know your background or Nucleus Security, can you start by telling us a bit about both? - You have experience and a background in the Federal environment, and Nucleus recently achieved their FedRAMP authorization, can you tell us a bit about that process? - When you look at the Federal/Defense/IC VulnMgt landscape, what are some o…
  continue reading
 
- For those unfamiliar, please tell us a bit about your background, as well as about RAD Security. What do you all focus on and specialize in? - Your team recently was part of the RSAC Innovation Sandbox. Can you tell us a bit about that experience, and being able to highlight the innovative capabilities of RAD to such a key audience? - You recentl…
  continue reading
 
In this episode of The Cyber Riddler podcast, we venture into the shadowy world of zero-day exploits, one of the most well known threats in the cybersecurity world . Zero-day exploits represent vulnerabilities that can be targeted before they are even known to exist, making them a significant concern for both organizations and individuals. We explo…
  continue reading
 
In this episode, I'm joined by Sarah Aalborg - CISO at Tivoli, Keynote speaker, and soon-to-be author. She's a cyber security expert and a behavioral science expert. Which makes her the perfect guest for this podcast. In the podcast, we talk about: Why Security Awareness might be dead as a term Why you need to think about behavior when you think ab…
  continue reading
 
Today, we are thrilled to welcome Roya Gordon as our guest. Roya is an executive industry consultant specializing in operational technology, cybersecurity, and Hexagon. She is a military veteran, an accomplished technologist, and a prolific speaker in our industry. Her creativity knows no bounds, encompassing her passion for the arts and her love o…
  continue reading
 
Authorities unmask criminals behind malware loaders 3 billion records stolen from background check firm Creds for 361 million accounts added to HIBP Thanks to today's episode sponsor, Conveyor What are infosec teams measuring these days? More often than not, their impact on the business through revenue. A director of GRC told us the most direct val…
  continue reading
 
A Wireshark Lua Dissector for Fixed Field Length Protocols https://isc.sans.edu/diary/A%20Wireshark%20Lua%20Dissector%20for%20Fixed%20Field%20Length%20Protocols/30976 COX Cable Modem Admin API Weakness https://samcurry.net/hacking-millions-of-modems Malicous Stack Overflow Answers https://www.bleepingcomputer.com/news/security/cybercriminals-pose-a…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
  continue reading
 
In this episode of Cyber Talks, Erin McLean, Chief Marketing Officer at eSentire, sits down with Bob Layton, Chief Channel Officer, and Tommy Wald, CEO of RIATA Technologies, to discuss the evolution of MSSP services, the importance of building strong client relationships, and the necessity of robust vendor partnerships. Tommy and Bob also share th…
  continue reading
 
Round two of 20 Questions with Jenn, Toastie, Turbo, and Ninja. With the intention of being much more difficult choices, follow along and see how many questions it takes you to guess our hard mode choices. Subscribe for more Cyberpunk lore, news, and more! Patreon - Get ad-free episodes early & support the show! Behind-the-scenes content and more h…
  continue reading
 
Ticketmaster hack affects 560 million customers, third-party denied liability Australia’s Ticketek sees customer details exposed in cyber security breach HHS changes tack, allows Change Healthcare to file breach notifications for others Thanks to today's episode sponsor, Conveyor Conveyor, the market-leading AI software for answering security quest…
  continue reading
 
K1w1 Infostealer Uses gofile.io for Exfiltration https://isc.sans.edu/diary/%22K1w1%22%20InfoStealer%20Uses%20gofile.io%20for%20Exfiltration/30972 Kaspersky Linux Malware Scanner https://www.kaspersky.com/blog/kvrt-for-linux/51375/ Snowflake Incident https://www.helpnetsecurity.com/2024/06/01/snowflake-breach-data-theft/ HuggingFace Space Secrets L…
  continue reading
 
Heleen van de Groep gedragsveranderaar bij Brooklyn Partners, een consultancy bedrijf dat zich focust op het human risk element van cyber security. Heleen houdt zich bezig met het serieus leuk maken van cyber awareness en ze brengt bedrijven van weerstand naar weerbaar. Hoe doe je dat? En waar zit volgens Heleen de meeste weerstand als het gaat om …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-rising-issue-of-zombie-apis-and-your-increased-attack-surface. Zombie APIs expand your attack surface. Learn how to identify and manage these hidden threats to secure your infrastructure and protect sensitive data. Check more stories related to cybersecurity at: https:…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-persistent-human-element-in-the-future-of-cybersecurity. How do new technology trends impact cybersecurity? Is the future of cyber security more human than we think? Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also ch…
  continue reading
 
Risking It All: Episode three of four in our special series on risk. Matt and Tom continue their journey through cyber risk management, and talk about how we might go about accepting certain levels of risk. Exercising, threat modelling, and a good comms plan all feature.If you want any cyber security support please get in contact with the team by e…
  continue reading
 
Loading …

Korte handleiding