PodcastsNoticiasCybersecurity Headlines

Cybersecurity Headlines

CISO Series
Cybersecurity Headlines
Último episodio

1744 episodios

  • Cybersecurity Headlines

    The Department of Know: Google's CodeMender, CISA's big leak, Torvalds open-source warning

    22/05/2026 | 42 min
    This week's Department of Know is hosted by Rich Stroffolino, with guests Kathleen Mullin, former CISO, MyCareGorithm, and Nick Espinosa, host, Deep Dive Radio Show.
    Missed the live show? Check it out on YouTube.
    The Department of Know is live every Friday at 4:00 p.m. ET. Join us each week by registering for the open discussion at CISOSeries.com.
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release
    of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on
    credentials alone, it requires the right user, the right device, and the right conditions.
    Because as we've seen in recent large-scale CRM breaches, stolen credentials and
    misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is
    exposed, and access is limited to exactly what's needed. Learn more and start your free
    trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    Cisco's 10.0 vulnerability, Microsoft email spammed, Chrome vulnerability surge

    22/05/2026 | 8 min
    Cisco issues 10.0 Secure Workload admin flaw warning
    Spammers abuse internal Microsoftonline account
    Google's surge in Chrome vulnerability announcements
    Get the show notes here: https://cisoseries.com/cybersecurity-news-ciscos-10-0-vulnerability-microsoft-email-spammed-chrome-vulnerability-surge/
    Thanks to our episode sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    GitHub VS Code extension breach, Shai-Hulud npm package compromise, Huawei/Luxembourg telecom link

    21/05/2026 | 7 min
    GitHub breach via VS Code extension
    Shai-Hulud wave compromises 600 npm packages
    Huawei attack behind Luxembourg telecom crash
    Get the show notes here: https://cisoseries.com/cybersecurity-news-github-vs-code-extension-breach-shai-hulud-npm-package-compromise-huawei-luxembourg-telecom-link/
    Thanks to our episode sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    Microsoft hits Fox Tempest, robotics OS flaw, CISA admins leaks keys

    20/05/2026 | 6 min
    Microsoft disrupts malware-signing-as-a-service
    Critical flaw found in industrial robot OS
    CISA admin leaks keys
    Get the show notes here: https://cisoseries.com/cybersecurity-news-microsoft-hits-fox-tempest-robotics-os-flaw-cisa-admins-leaks-keys/ 
    Thanks to our episode sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    Linus Torvalds talks AI bug hunters, 7-Eleven ransom demand, MENA's new cybercrime op

    19/05/2026 | 8 min
    Linus Torvalds not into AI bug hunters
    7-Eleven hit with ransom demand
    MENA runs new cybercrime op
    Get the show notes here: https://cisoseries.com/cybersecurity-news-linus-torvalds-talks-ai-bug-hunters-7-eleven-ransom-demand-menas-new-cybercrime-op/
    Thanks to our episode sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
Más podcasts de Noticias
Acerca de Cybersecurity Headlines
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Sitio web del podcast

Escucha Cybersecurity Headlines, Huevos Revueltos con Política y muchos más podcasts de todo el mundo con la aplicación de radio.net

Descarga la app gratuita: radio.net

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app
Cybersecurity Headlines: Podcasts del grupo