PodcastsNotíciasCybersecurity Headlines

Cybersecurity Headlines

CISO Series
Cybersecurity Headlines
Último episódio

1720 episódios

  • Cybersecurity Headlines

    The Department of Know: Vercel breach, a "Contagious Interview," and ghost breaches

    24/04/2026 | 40min
    Link to episode
    This week's Department of Know is hosted by Rich Stroffolino, with guests Brett Conlon, CISO, American Century Investments, and Michael Bickford, former CISO, New York State Gaming Commission. 
    Missed the live show? Check it out on YouTube.
    The Department of Know is live every Friday at 4:00 p.m. ET. Join us each week by registering for the open discussion at CISOSeries.com.


    Huge thanks to our sponsor, ThreatLocker


    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release
    of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on
    credentials alone, it requires the right user, the right device, and the right conditions.
    Because as we've seen in recent large-scale CRM breaches, stolen credentials and
    misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is
    exposed, and access is limited to exactly what's needed. Learn more and start your free
    trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    Rituals cosmetics breach, FBI iOS flaw fixed, Teams Helpdesk impersonation

    24/04/2026 | 8min
    Cosmetics giant Rituals discloses data breach
    Apple fixes iOS flaw exploited by the FBI
    Microsoft Teams Helpdesk impersonation
    Get the show notes here: https://cisoseries.com/cybersecurity-news-rituals-cosmetics-breach-fbi-ios-flaw-fixed-teams-helpdesk-malware-impersonation/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    New OpenAI cyber product, unauthorized Mythos access, insurers to cap LLMjacking payouts

    23/04/2026 | 7min
    OpenAI shares cyber product with government orgs
    Unauthorized Mythos access, Firebox bugs fixed by Mythos
    Insurers move to cap LLMjacking cyber payouts
    Get the show notes here: https://cisoseries.com/cybersecurity-news-new-openai-cyber-product-unauthorized-mythos-access-insurers-to-cap-llmjacking-payouts/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    CISA lacks Mythos, Lovable's leak by design, YouTube's deepfake detection

    22/04/2026 | 7min
    CISA lacks Mythos access
    Lovable denies data leak
    YouTube opens up deepfake detection tool
    Get the show notes here: https://cisoseries.com/cybersecurity-news-cisa-lacks-mythos-lovables-leak-by-design-youtubes-deepfake-detection/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    Vercel breach, ZionSiphon targets water infrastructure, Bluesky DDoS

    21/04/2026 | 7min
    Vercel confirms breach, stolen data for sale
    ZionSiphon targets water infrastructure
    Bluesky blames outage on DDoS
    Get the show notes here: https://cisoseries.com/cybersecurity-news-vercel-breach-zionsiphon-targets-water-infrastructure-bluesky-ddos/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.

Mais podcasts de Notícias

Sobre Cybersecurity Headlines

Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Site de podcast

Ouça Cybersecurity Headlines, Medo e Delírio em Brasília e muitos outros podcasts de todo o mundo com o aplicativo o radio.net

Obtenha o aplicativo gratuito radio.net

  • Guardar rádios e podcasts favoritos
  • Transmissão via Wi-Fi ou Bluetooth
  • Carplay & Android Audo compatìvel
  • E ainda mais funções

Cybersecurity Headlines: Podcast do grupo

Informação legal
Aplicações
Social
v8.8.12| © 2007-2026 radio.de GmbH
Generated: 4/25/2026 - 2:33:50 PM