UBER Crime Story 2. How Security Leaders Can be Liable.

UBER Crime Story 2. How Security Leaders Can be Liable.

This episode delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, discussing how Security Leaders can be liable. This conversation discusses the Uber breach and the ongoing trial of Joseph Sullivan, the former chief security officer of Uber The conversation explores how the hacker gained access and the potential ways the breach could have been prevented. The trial of Joseph Sullivan is also discussed, with differing op...

Episoder(311)

New Alert. 🚨 Don't Fall For The New Google Subpoena🚨

New Alert. 🚨 Don't Fall For The New Google Subpoena🚨

📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real? 🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly...

25 Apr 20251min

Zero Trust, SMB & National Security. INTEL CTO Exclusive.

Zero Trust, SMB & National Security. INTEL CTO Exclusive.

Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recogniz...

25 Apr 20251h 1min

Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.

Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.

David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online ex...

24 Apr 202557min

How start a career in cybersecurity today. Josh Mason

How start a career in cybersecurity today. Josh Mason

Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter c...

21 Apr 202555min

Zero Trust. Social Engineering. Ron Woerner.

Zero Trust. Social Engineering. Ron Woerner.

Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engin...

20 Apr 202543min

 Oracle Breach 2025 🎯 How Hackers Attack

Oracle Breach 2025 🎯 How Hackers Attack

In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner serve...

19 Apr 202535min

Hunting Down Hackers. John Hammond Exclusive.

Hunting Down Hackers. John Hammond Exclusive.

Hunting Down Hackers. True Crime Stories with Huntress/YouTube Leader John Hammond. Video episode here: https://youtu.be/CMOu0o9FvFQ Examples with advice from top security content creator JOHN HAMM...

17 Apr 20251h

🔥 How Hackers Can Protect Your Business | AI Risks & DEF CON Secrets🔥

🔥 How Hackers Can Protect Your Business | AI Risks & DEF CON Secrets🔥

What if the hackers are actually the heroes? In this mind-blowing episode, host David Mauro sits down with Matt Toussain, elite military cyber warrior, DEF CON speaker, and Founder of Open Security, t...

16 Apr 202558min

Populært innen Business og økonomi

stopp-verden
dine-penger-pengeradet
lydartikler-fra-aftenposten
e24-podden
rss-penger-polser-og-politikk
rss-borsmorgen-okonominyhetene
pengepodden-2
finansredaksjonen
utbytte
pengesnakk
livet-pa-veien-med-jan-erik-larssen
morgenkaffen-med-finansavisen
tid-er-penger-en-podcast-med-peter-warren
rss-sunn-okonomi
okonomiamatorene
lederpodden
liberal-halvtime
rss-markedspuls-2
rss-investering-gjort-enkelt
rss-andelige-tanker-med-camillo