Episoder
-
Link to episode page
This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bethany De Lude, CISO, The Carlyle Group
Thanks to our show sponsor, ThreatLocker
Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker.
ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team.
To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com.All links and the video of this episode can be found on CISO Series.com
-
Android malware found on Amazon Appstore disguised as health app
BeyondTrust suffers cyberattack
Fortinet warns of critical flaw in Wireless LAN Manager
Thanks to today’s episode sponsor, ThreatLocker
Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker.
ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team.
To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com.
For the stories behind the headlines, head of CISOSeries.com.
-
Mangler du episoder?
-
Interpol kills off Pig Butchering
Supreme Court to hear TikTok ban challenge
US weighs TP-Link ban
Thanks to today’s episode sponsor, ThreatLocker
Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker.
ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team.
To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com.
For the stories behind the headlines, head of CISOSeries.com.
-
CISA delivers new directive for securing cloud environments
Texas Tech reports a data breach affecting 1.4 million people
Meta fined $263 million for alleged GDPR violations
Thanks to today’s episode sponsor, ThreatLocker
Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker.
ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team.
To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com.
For the stories behind the headlines, head of CISOSeries.com.
-
Serbian authorities accused of using Cellebrite to spy on journalists
Ransomware attack shuts down Rhode Island’s public assistance system
ConnectOnCall breach exposes close to a million patients
Thanks to today’s episode sponsor, ThreatLocker
Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker.
ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team.
To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com.
For the stories behind the headlines, head of CISOSeries.com.
-
UnitedHealth’s AI-driven insurance claims chatbot left exposed to the internet
South Carolina credit union suffers cyberattack
IOCONTROL cyberweapon targets infrastructure in the US and Israel
Thanks to today’s episode sponsor, ThreatLocker
Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker.
ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team.
To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com.
For the stories behind the headlines, head of CISOSeries.com.
-
Link to episode page
This week’s Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guest Jimmy Sanders, president, ISSA International. ISSA International April 2025- will be celebrating its 40th Anniversary in April 2025. Watch for notifications at ISSA.org
Thanks to today’s episode sponsor, ThreatLocker
Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team.
To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com.All links and the video of this episode can be found on CISO Series.com
-
Microsoft MFA bypassed in AuthQuake attack
Cybercrime marketplace Rydox taken down
U.S. charges Chinese national for hacking thousands of Sophos firewall devices
Thanks to today’s episode sponsor, ThreatLocker
Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker.
ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team.
To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com.
For the stories behind the headlines, head of CISOSeries.com.
-
Operation PowerOFF hits DDoS sites
FCC proposes new telco cybersecurity rules
ZLoader returns
Thanks to today’s episode sponsor, ThreatLocker
Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker.
ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team.
To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com.
For the stories behind the headlines, head of CISOSeries.com.
-
Senator announces new bill to secure telecom companies
Google unveils new quantum chip
U.S. sanctions Chinese cybersecurity firm for firewall hacks
Thanks to today’s episode sponsor, ThreatLocker
Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker.
ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team.
To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com.
For the stories behind the headlines, head of CISOSeries.com.
-
Romanian energy giant battles ongoing attack
Ransomware disrupts medical device maker
Deloitte responds to data theft claims
Thanks to today’s episode sponsor, ThreatLocker
Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker.
ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team.
To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com.
For the stories behind the headlines, head of CISOSeries.com.
-
Anna Jaques Hospital confirms details of Christmas Day ransomware breach
Microsoft expands Recall preview to Intel and AMD Copilot+ PCs
Blue Yonder announces restoration progress after November 21 attack
Thanks to today’s episode sponsor, ThreatLocker
Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker.
ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team.
To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com.
For the stories behind the headlines, head of CISOSeries.com.
-
Link to episode page
This week’s Cyber Security Headlines – Week in Review is hosted by Sean Kelly with guest Edward Frye, head of security, Luminary Cloud.
Thanks to our show sponsor, Vanta
As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire Automation, security & compliance teams can complete security reviews up to 5 times faster, giving you time back to focus on running your security & compliance programs. Over 8,000 global companies like ZoomInfo, SmartRecruiters and Noibu use Vanta to save time on security reviews. Visit vanta.com to learn more about Questionnaire Automation.
All links and the video of this episode can be found on CISO Series.com
-
Feds find cybercriminal tools used by sextortion group
Russian hackers hack hackers
Amazon’s post-quantum migration plan
Huge thanks to our sponsor, Vanta
As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews.
With Vanta Questionnaire Automation, security & compliance teams can complete security reviews up to 5 times faster, giving you time back to focus on running your security & compliance programs.
Over 8,000 global companies like ZoomInfo, SmartRecruiters and Noibu use Vanta to save time on security reviews.
Visit vanta.com to learn more about Questionnaire Automation.Get the stories behind the headlines at CISOSeries.com
-
FBI and CISA urge Americans to use encrypted apps rather than calling, iVerify scanner finds seven Pegasus spyware infections, Japan warns of IO-Data zero-day router flaws exploited in attacks
Huge thanks to our sponsor, Vanta
As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews.
With Vanta Questionnaire Automation, security & compliance teams can complete security reviews up to 5 times faster, giving you time back to focus on running your security & compliance programs.
Over 8,000 global companies like ZoomInfo, SmartRecruiters and Noibu use Vanta to save time on security reviews.
Visit vanta.com to learn more about Questionnaire Automation.Get the stories behind the headlines at CISOSeries.com
-
Stoli files for bankruptcy in U.S. after ransomware attack
Police seize largest German online criminal marketplace
FBI advises telecoms to boost security following Chinese hacking campaign
Huge thanks to our sponsor, Vanta
As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews.
With Vanta Questionnaire Automation, security & compliance teams can complete security reviews up to 5 times faster, giving you time back to focus on running your security & compliance programs.
Over 8,000 global companies like ZoomInfo, SmartRecruiters and Noibu use Vanta to save time on security reviews.
Visit vanta.com to learn more about Questionnaire Automation.Get the stories behind the headlines at CISOSeries.com
-
Hydra Market leader sentenced to life
Former Polish spy chief arrested in Pegasus spyware probe
SpyLoan malware targets millions
Huge thanks to our sponsor, Vanta
As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews.
With Vanta Questionnaire Automation, security & compliance teams can complete security reviews up to 5 times faster, giving you time back to focus on running your security & compliance programs.
Over 8,000 global companies like ZoomInfo, SmartRecruiters and Noibu use Vanta to save time on security reviews.
Visit vanta.com to learn more about Questionnaire Automation.Get the stories behind the headlines at CISOSeries.com
-
Ransomware affiliate Mikhail Matveev arrested
Another UK hospital system hacked
Cloudflare says it lost 55% of logs pushed to customers for 3.5 hours
Huge thanks to our sponsor, Vanta
As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews.
With Vanta Questionnaire Automation, security & compliance teams can complete security reviews up to 5 times faster, giving you time back to focus on running your security & compliance programs.
Over 8,000 global companies like ZoomInfo, SmartRecruiters and Noibu use Vanta to save time on security reviews.
Visit vanta.com to learn more about Questionnaire Automation.Get the stories behind the headlines at CISOSeries.com
-
Patch alert after flaws identified in Advantech industrial Wi-Fi access points
T-Mobile confirms Salt Typhoon attack was blocked
UK hospital network postpones procedures after cyberattack
Huge thanks to our sponsor, ThreatLocker
Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker.
ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team.
To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com.
Find the stories behind the headlines at CISOseries.com.
-
Interpol takes down over 1,000 cybercrime suspects in Africa
Starbucks and UK grocers impacted by supply chain attack
Hacker in Snowflake extortions may be a U.S. soldier
Huge thanks to our sponsor, ThreatLocker
Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker.
ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team.
To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com.
For the stories behind the headlines, visit CISOseries.com.
- Se mer