PodcastyTechnologiaCybersecurity Headlines

Cybersecurity Headlines

CISO Series
Cybersecurity Headlines
Najnowszy odcinek

1744 odcink贸w

  • Cybersecurity Headlines

    The Department of Know: Google's CodeMender, CISA's big leak, Torvalds open-source warning

    22.05.2026 | 42 min.
    This week's Department of Know is hosted by聽Rich Stroffolino, with guests聽Kathleen Mullin, former CISO, MyCareGorithm, and聽Nick Espinosa, host,聽Deep Dive Radio Show.
    Missed the live show? Check it out聽on YouTube.
    The Department of Know聽is live every Friday at 4:00 p.m. ET. Join us each week by registering for the open discussion at聽CISOSeries.com.
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release
    of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on
    credentials alone, it requires the right user, the right device, and the right conditions.
    Because as we've seen in recent large-scale CRM breaches, stolen credentials and
    misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is
    exposed, and access is limited to exactly what's needed. Learn more and start your free
    trial today at聽ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    Cisco's 10.0 vulnerability, Microsoft email spammed, Chrome vulnerability surge

    22.05.2026 | 8 min.
    Cisco issues 10.0 Secure Workload admin flaw warning
    Spammers abuse internal Microsoftonline account
    Google's surge in Chrome vulnerability announcements
    Get the show notes here: https://cisoseries.com/cybersecurity-news-ciscos-10-0-vulnerability-microsoft-email-spammed-chrome-vulnerability-surge/
    Thanks to our episode sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    GitHub VS Code extension breach, Shai-Hulud npm package compromise, Huawei/Luxembourg telecom link

    21.05.2026 | 7 min.
    GitHub breach via VS Code extension
    Shai-Hulud wave compromises 600 npm packages
    Huawei attack behind Luxembourg telecom crash
    Get the show notes here: https://cisoseries.com/cybersecurity-news-github-vs-code-extension-breach-shai-hulud-npm-package-compromise-huawei-luxembourg-telecom-link/
    Thanks to our episode sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    Microsoft hits Fox Tempest, robotics OS flaw, CISA admins leaks keys

    20.05.2026 | 6 min.
    Microsoft disrupts malware-signing-as-a-service
    Critical flaw found in industrial robot OS
    CISA admin leaks keys
    Get the show notes here: https://cisoseries.com/cybersecurity-news-microsoft-hits-fox-tempest-robotics-os-flaw-cisa-admins-leaks-keys/聽
    Thanks to our episode sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    Linus Torvalds talks AI bug hunters, 7-Eleven ransom demand, MENA's new cybercrime op

    19.05.2026 | 8 min.
    Linus Torvalds not into AI bug hunters
    7-Eleven hit with ransom demand
    MENA runs new cybercrime op
    Get the show notes here: https://cisoseries.com/cybersecurity-news-linus-torvalds-talks-ai-bug-hunters-7-eleven-ransom-demand-menas-new-cybercrime-op/
    Thanks to our episode sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
Wi臋cej Technologia podcast贸w
O Cybersecurity Headlines
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Strona internetowa podcastu

S艂uchaj Cybersecurity Headlines, Technologicznie i wielu innych podcast贸w z ca艂ego 艣wiata dzi臋ki aplikacji radio.pl

Uzyskaj bezp艂atn膮 aplikacj臋 radio.pl

  • Stacje i podcasty do zak艂adek
  • Strumieniuj przez Wi-Fi lub Bluetooth
  • Obs艂uguje Carplay & Android Auto
  • Jeszcze wi臋cej funkcjonalno艣ci
Cybersecurity Headlines: Podcasty w grupie