This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Regulatory compliance and dataprivacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have been at the forefront of corporate concerns. GDPR-style dataprivacy laws came to the U.S. Location Matters.
(ISC)2 : This organization offers free self-paced training for a limited time but is more recognized for its high-end Certified Information Systems Security Professional (CISSP) designation, acknowledging your ability to design and monitor a secure system environment, qualifying holders for engineering and executive infosec positions.
They discuss the challenges within the cybersecurity industry, including the transition to cloud computing and the neglect […] The post Alyssa Miller: Charting the Course Through InfoSec and Aviation appeared first on Shared Security Podcast.
He highlights the hidden opt-out feature for AI data usage and questions the transparency of such policies, especially in regions without strict privacy laws like the United States. The post Understanding Privacy Changes: eBays AI Policy and The Future of DataPrivacy appeared first on Security Boulevard.
Obsidian Security is proud to be recognized as the Best SaaS/Cloud Security solution by Cyber Defense Magazine (CDM), the industry’s leading electronic informationsecurity magazine, during RSA Conference 2023. The post Obsidian Security Wins Top Honor At Global InfoSec Awards appeared first on Security Boulevard.
Bill Bowman, CISSP, CIPM, is the Chief InformationSecurity Officer & DataPrivacy Officer at financial software company Emburse. A : When I was with Bright Horizons, many top-tier clients demanded InfoSec competence. He has been a first-hired CISO at five different companies. I learned from them.
It was fitting that the opening keynote panel for SecureWorld Chicago on June 8th was titled " Making the Cybersecurity Music: Navigating Challenges and Opportunities in Today's InfoSec Landscape. Well, informationsecurity, cybersecurity happens to be a critical part of the business, being able to achieve strategic objectives. "You
CISA and the FBI also highlighted these buffer overflow vulnerabilities: CVE-2025-21333 CVE-2025-0282 CVE-2024-49138 CVE-2024-38812 CVE-2023-6549 CVE-2022-0185 For more information about buffer overflow attacks and vulnerabilities: Buffer Overflow (OWASP) What is Buffer Overflow?
She also spoke to the broader consequences of staff shortages and how this may affect the global cybersecurity workforce gap. And two vendor panels: There's a Bad Moon On the Rise – Are You Ready? The next opportunity to catch a SecureWorld event is SecureWorld Boston , taking place at the Hynes Convention Center on March 22-23.
Ultimately, he believes “this is good for businesses as, through the insurance process, they will gain better visibility into their cyber risks and measures they can deploy to keep digital operations secure and compliant to dataprivacy regulations.”. billion in premium. . But much will rely on regulation.
As I immersed myself in foreign concepts around the informationsecurity industry, marketing, and business practices at scale, I grew to appreciate not just the technology we were building at Duo, but the people who built it, the diverse audiences that we addressed, and the unique problems-to-solve around security at large.
A new bipartisan privacy bill, the American DataPrivacy and Protection Act, “could” be the first privacy legislation in the US not doomed to fail, a story about why you should delete your location and private data in your car’s navigation system before selling it, and details on Firefox’s new privacy feature called “Total Cookie […].
The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel. In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts.
Join us for an insightful episode of the Shared Security Podcast as Tanya Janca returns for her fifth appearance. Discover the latest on her new book about secure coding, exciting updates in Application Security, and the use of AI in security.
She discusses challenges such as distinguishing between genuine workforce shortages and [] The post Careers in Cybersecurity: Myths and Realities with Kathleen Smith appeared first on Shared Security Podcast. In this episode we welcome Kathleen Smith, CMO of ClearedJobs.net, to discuss the current state of the cybersecurity job market.
In this episode, we discuss the latest issues with data brokers, focusing on a breach at Gravy Analytics that leaked 30 million location data points online. We also explore a vulnerability in Subarus Starlink system that allows unrestricted access to vehicle controls and customer data using just a last name and license plate number.
In this episode, we discuss the UK governments demand for Apple to create a secret backdoor for accessing encrypted iCloud backups under the Investigatory Powers Act and its potential global implications on privacy.
He talks about the importance of understanding and reaching both technical and non-technical audiences, the necessity of continuous learning despite your role, and the power of empathy in contributing to […] The post The Three Keys to Success in Cybersecurity appeared first on Shared Security Podcast.
The post Hacking Ham Radio: Why It’s Still Relevant and How to Get Started appeared first on The Shared Security Show. This week we discuss hacking ham radio with special guests Caitlin Johanson, Rick Osgood, and Larry Pesce.
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation.
In this first-ever in-person recording of Shared Security, Tom and Kevin, along with special guest Matt Johansen from Reddit, discuss their experience at the RSA conference in San Francisco, including their walk-through of ‘enhanced security’ and the humorous misunderstanding that ensued.
These lessons have paved the way for my success, and I believe they … The Three Keys to Success in Cybersecurity Read More » The post The Three Keys to Success in Cybersecurity appeared first on Security Boulevard. One of the big questions that I often get is: How does someone become successful in a cybersecurity career?
The iPhone exploit, known as Operation Triangulation, has complex chains of events that lead to compromised iPhone security. Meanwhile, the lawsuit against Google claims […] The post Most Advanced iPhone Exploit Ever, Google’s $5 Billion Settlement, Apple’s Journal App appeared first on Shared Security Podcast.
Katie Teitler, Senior Cybersecurity Strategist at Axonius and co-host on the popular Enterprise Security Weekly podcast, joins us to discuss the role of cybersecurity in combating midterm election disinformation.
In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million Americans, including hosts Tom and Kevin.
The DuckDuckGo mobile browser allows Microsoft trackers due to an agreement in their syndicated search content contract, a database of contact details for hundreds of Verizon employees was compromised after an employee was social engineered to give the attacker remote access to their corporate computer, and details about new research that shows that (..)
The episode also covers a notable Okta vulnerability that allowed someone to login without […] The post Advanced Persistent Teenagers, Okta Bug Allowed Logins Without a Correct Password appeared first on Shared Security Podcast.
Twitter suffers a data breach of phone numbers and email addresses belonging to 5.4 The post Twitter Data Breach, 15 Minutes to Exploit Zero-Day Vulnerabilities, Resilient Deepfake Traits appeared first on The Shared Security Show.
In this episode, we explore the recent Okta breach where hackers obtained sensitive customer data via unauthorized access to the Okta support system. Next, we discuss the emerging threat of “quishing,” a combination of voice calls and phishing that preys on unsuspecting victims.
The post ChatGPT Goes Viral, More Trouble for LastPass, Apple’s New Data Protections appeared first on The Shared Security Show. A chatbot developed by OpenAI, called ChatGPT, has gone viral and is able to mimic human language and speech styles and can interact with users in a conversational way. Attackers broke into a […].
From his origins as a professional wrestler who once bravely faced off […] The post How to Break Into a Cybersecurity Career – Phillip Wylie appeared first on Shared Security Podcast. Join us as we discuss Phillip’s unique journey and uncover valuable insights on breaking into the cybersecurity field.
A recent data breach of 5.4 million Twitter users and Meta being fined $265 million dollars from a 2021 data leak, and people are fleeing Twitter because of Elon Musk. The post Is Social Media at a Tipping Point, The TikTok Invisible Challenge, San Francisco Police Can Use Killer Robots appeared first on The Shared Security Show.
The post The Business Value of the Social-Engineer Phishing Service appeared first on Security Boulevard. Phishing attacks continue to plague organizations across the globe with great success, but why? Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an.
The attacks on password managers and their users continue as Bitwarden and 1Password users have reported seeing paid ads for phishing sites in Google search results for the official login page of the password management vendors.
The post TikTok Denies Data Breach, Los Angeles School District Ransomware Attack, Fingerprint Scanners in School Bathrooms appeared first on The Shared Security Show.
And what are our cybersecurity and privacy predictions for 2023? The post The Year in Review and 2023 Predictions appeared first on The Shared Security Show. In our last episode of the year, we discuss the year that was 2022. What did we get right? What did we get wrong? Thank you to all of our listeners for a great year!
The Tim Hortons mobile app created a “a mass invasion of Canadians’ privacy” by conducting continuous location tracking without user consent even when the app was closed, what is a social engineering kill-chain and how can this help understand and prevent attacks, and new research shows 33 out of the top 100 hospitals in America […].
A Cisco employee was compromised by a ransomware gang using a technique called multi-factor authentication fatigue, an attack on the Signal messenger app’s SMS service Twilio potentially disclosed the phone numbers of 1,900 users, and details on how Facebook and Instagram track what you click on including your web browsing history by using their in-app (..)
Rafal Los, host of the popular Down the Security Rabbithole Podcast, joins us to discuss CISO liability risk and the ongoing discussion in the cybersecurity community about CISOs going to jail. Plus, details on the recent (ISC)2 bylaw vote (why you should vote no) and a discussion about the value of cybersecurity certifications. ** Links […].
In recent court testimony two Facebook engineers were asked what information, precisely, does Facebook store about us, and where is it? Surprisingly they said, they don’t know.
However, there’s a catch – the app collects extensive personal data, sparking concerns about privacy. Next, we dive into the world of airline reservation scams, exposing how […] The post Meta’s Threads and Your Privacy, Airline Reservation Scams, IDOR Srikes Back appeared first on Shared Security Podcast.
The post How to Break Into a Cybersecurity Career – Rob Fuller (Mubix) appeared first on The Shared Security Show. This week we continue our series on how to break into a cybersecurity career with long time industry veteran, Rob Fuller (Mubix). Rob also talks about how these experiences has […].
We cover how empathy relates to cybersecurity in the industry, the importance of being empathetic in our roles as […] The post Exploring the Role of Empathy in Cybersecurity with Andra Zaharia appeared first on The Shared Security Show.
Tanya Janca, founder of the We Hack Purple Academy, Director of Developer Relations and Community at Bright, and author of “Alice & Bob Learn Application Security” joins us to discuss the current state and future of Application Security. In this episode we discuss what Tanya’s been up to, what’s changed in AppSec over the last […].
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content