Powered by RND
PodcastsTechnologieCyber Threat Intel
Luister naar Cyber Threat Intel in de app
Luister naar Cyber Threat Intel in de app
(2.067)(250 021)
Favorieten opslaan
Wekker
Slaaptimer

Cyber Threat Intel

Podcast Cyber Threat Intel
Jon Good
Welcome to Cyber Threat Intel, your go-to source for the latest updates, news, and insights on cyber threats. Join us as we dive deep into the world of cyber...

Beschikbare afleveringen

5 van 71
  • What is the Damage Caused by Cyberattacks? - Ep 70
    Start your career today! ➡️ https://www.StartCyberCareer.com/What is the actual damage caused by a cyberattack?Cyberattacks are a serious concern in any organization, not just because of the immediate impact. Consider the average cost of a cyberattack and how much that can affect the bottom line, especially as a small to medium-sized company. Many people have lost jobs in companies due to cyberattacks and are not necessarily people on the cybersecurity team.Join me as we discuss an article on cyberattacks and things that can help you build knowledge of cyber resiliency, business continuity, and incident response. Use this knowledge to become a more educated cybersecurity professional!IBM Study: https://www.ibm.com/reports/data-breachArticle: https://www.darkreading.com/cyberattacks-data-breaches/how-cyberattacks-affect-your-staffNIST SP 800-34: https://www.nist.gov/privacy-framework/nist-sp-800-34ISO 27031: https://www.iso.org/standard/44374.html=============================Popular Cybersecurity Resources=============================Coaching, Resume Reviews, Mock Interviews ➡️ http://www.CyberCareerServices.com/Training Courses ➡️ https://www.CyberTrainingPro.com/Stay Current on the Latest Threats➡️ https://www.CyberThreatIntel.com/My Studio Gear ➡️ http://jongood.com/affiliates/amazon/=============================Today’s Video Sponsor=============================Cyber Training Pro ➡️ https://www.CyberTrainingPro.com/----------------------------------------------Are you interested in sponsoring content? ➡️ https://jongood.com/sponsor=============================Connect with me!=============================LinkedIn: ➡︎ https://www.linkedin.com/in/jongoodcyber/Twitter: ➡︎ https://www.twitter.com/JonGoodCyberInstagram: ➡︎ https://www.instagram.com/jongoodcyber/=============================#cybersecurity #informationsecurity #infosecDISCLAIMER: I am an ambassador or affiliate for many brands referenced on the channel.  As an Amazon Associate, I earn a commission from qualifying purchases.DISCLAIMER (MUSIC): I only use royalty-free music and sound effects.
    --------  
    18:23
  • Snowflake's Shocking Move to MFA What You Need to Know - Ep 69
    Snowflake's Shocking Move to MFA What You Need to Know - Ep 69Visit the Cyber Threat Intel website ➡️ https://www.CyberThreatIntel.com/Snowflake is stepping up its security game! 🚀 In this video, we discuss Snowflake's new policy requiring multi-factor authentication (MFA) for all user accounts by November 2025. This move aligns with their commitment to the CISA Secure by Design pledge and aims to mitigate the risks of credential theft, ensuring a safer environment for users.We break down the phased rollout of these changes, starting with default MFA enforcement in April 2025, moving to mandatory MFA for all accounts by August 2025, and finally, the complete elimination of single-factor password sign-ins by November 2025. Plus, learn how Snowflake is supporting customers through tools like the Threat Intelligence scanner and partnerships to make the transition smoother.If you’re a Snowflake user, IT professional, security professional, or CISO, you don’t want to miss this critical update. Find out what this means for your account security and how you can prepare!🔐 Key Topics Covered:- Snowflake’s phased approach to mandatory MFA- Impact on human and service users- Tools and resources for migration- Innovations like passkeys, TOTP, and more💡 Don’t forget to like, subscribe, and share your thoughts in the comments!Article: https://www.snowflake.com/en/blog/blocking-single-factor-password-authentification/=============================Today’s Video Sponsor=============================Cyber Training Pro ➡️ https://www.CyberTrainingPro.com/----------------------------------------------Are you interested in sponsoring content? ➡️ https://jongood.com/sponsor=============================Popular Cybersecurity Resources=============================Getting Started Resources & Free eBook ➡️ https://www.jongood.com/getstarted/Cybersecurity Q&A ➡️ https://www.youtube.com/playlist?list=PLErQ2qAXz3roS8ubIclSRWwUHUy-jpj2rCybersecurity Projects ➡️ https://www.youtube.com/playlist?list=PLErQ2qAXz3rom8gtJNzm8iu_AAKNcXkFqCybersecurity Training & Career Services ➡️ https://www.CyberTrainingPro.com/=============================Cyber Threat Intel=============================Cyber Threat Intel ➡️ https://www.CyberThreatIntel.com/=============================Cool Tech that I Use in My Studio=============================Gear List ➡️ http://jongood.com/affiliates/amazon/=============================Connect with me!=============================LinkedIn: ➡︎ https://www.linkedin.com/in/jongoodcyber/Twitter: ➡︎ https://www.twitter.com/JonGoodCyberInstagram: ➡︎ https://www.instagram.com/jongoodcyber/=============================#Snowflake #CyberSecurity #MFADISCLAIMER: I am an ambassador or affiliate for many brands referenced on the channel.  As an Amazon Associate, I earn a commission from qualifying purchases.DISCLAIMER (MUSIC): I only use royalty-free music and sound effects.
    --------  
    24:06
  • LinkedIn is Using YOUR DATA to Train Their AI Model For Profit - Ep 68
    YOUR DATA is being used to train LinkedIn’s AI model!LinkedIn has come under scrutiny for allegedly using user data to train its artificial intelligence (AI) models without adequately informing its users. This controversial move sparked a wave of criticism, leading LinkedIn to update its privacy policy to reflect its data practices.In this video, we break down the key points of the issue:- LinkedIn’s updated privacy policy now acknowledges that user data is being used for AI training, and offers an opt-out setting for users.- Users opting out will prevent their data from being used in future AI training, but data collected prior to the opt-out will remain in use.- Concerns have been raised by privacy advocates and industry experts, including Shiva Nathan, founder and CEO of Onymos, who emphasizes the importance of consent and transparency when it comes to using personal data for AI.- While the US lacks federal laws governing AI data collection, LinkedIn has suspended data collection for generative AI in the European Economic Area, Switzerland, and the UK due to stricter privacy regulations.We also discuss how LinkedIn's actions are part of a larger debate on data privacy and AI, with other companies like Zoom and Peloton facing similar issues. Join us as we explore the implications of this case and what it means for user privacy in the age of AI.🔔 Don’t forget to like, comment, and subscribe for more updates on cybersecurity and tech news!https://www.darkreading.com/cyber-risk/linkedin-user-data-collection-ai-training=============================Today’s Video Sponsor=============================Cyber Training Pro ➡️ https://www.CyberTrainingPro.com/----------------------------------------------Are you interested in sponsoring content? ➡️ https://jongood.com/sponsor=============================Popular Cybersecurity Resources=============================Getting Started Resources & Free eBook ➡️ https://www.jongood.com/getstarted/Cybersecurity Q&A ➡️ https://www.youtube.com/playlist?list=PLErQ2qAXz3roS8ubIclSRWwUHUy-jpj2rCybersecurity Projects ➡️ https://www.youtube.com/playlist?list=PLErQ2qAXz3rom8gtJNzm8iu_AAKNcXkFqCybersecurity Training & Career Services ➡️ https://www.CyberTrainingPro.com/=============================Cyber Threat Intel=============================Cyber Threat Intel ➡️ https://www.CyberThreatIntel.com/=============================Cool Tech that I Use in My Studio=============================Gear List ➡️ http://jongood.com/affiliates/amazon/=============================Connect with me!=============================LinkedIn: ➡︎ https://www.linkedin.com/in/jongoodcyber/Twitter: ➡︎ https://www.twitter.com/JonGoodCyberInstagram: ➡︎ https://www.instagram.com/jongoodcyber/⏰ Timecodes ⏰0:00 LinkedIn is Using YOUR DATA to Train Their AI Model For Profit=============================#cybersecurity #informationsecurity #infosecDISCLAIMER: I am an ambassador or affiliate for many brands referenced on the channel.  As an Amazon Associate, I earn a commission from qualifying purchases.DISCLAIMER (MUSIC): I only use royalty-free music and sound effects.
    --------  
    18:40
  • Blue Screen of Death Brought to you by CrowdStrike - Ep 67
    Blue Screen of Death Brought to you by CrowdStrike - Ep 67Visit the Cyber Threat Intel website ➡️ https://www.CyberThreatIntel.com/Join us as we dive deep into the world of cybersecurity, uncovering the cyber threats of today that affect us all.From ransomware attacks crippling businesses to phishing scams targeting the unwary, no threat is too big or too small for our expert analysis.Cyber Threat Intel arms you with the knowledge to protect yourself in the digital age. Whether you're a cybersecurity professional or just curious about the threats lurking in the digital shadows, this podcast is for you.Subscribe now on YouTube or your favorite podcast listening platform, and join us on the front lines of cybersecurity. Because in the world of cyber threats, knowledge is power.=============================Today’s Video Sponsor=============================Cyber Training Pro ➡️ https://www.CyberTrainingPro.com/----------------------------------------------Are you interested in sponsoring content? ➡️ https://jongood.com/sponsor=============================Popular Cybersecurity Resources=============================Getting Started Resources & Free eBook ➡️ https://www.jongood.com/getstarted/Cybersecurity Q&A ➡️ https://www.youtube.com/playlist?list=PLErQ2qAXz3roS8ubIclSRWwUHUy-jpj2rCybersecurity Projects ➡️ https://www.youtube.com/playlist?list=PLErQ2qAXz3rom8gtJNzm8iu_AAKNcXkFqCybersecurity Training & Career Services ➡️ https://www.CyberTrainingPro.com/=============================Cyber Threat Intel=============================Cyber Threat Intel ➡️ https://www.CyberThreatIntel.com/=============================Cool Tech that I Use in My Studio=============================Gear List ➡️ http://jongood.com/affiliates/amazon/=============================Connect with me!=============================LinkedIn: ➡︎ https://www.linkedin.com/in/jongoodcyber/Twitter: ➡︎ https://www.twitter.com/JonGoodCyberInstagram: ➡︎ https://www.instagram.com/jongoodcyber/⏰ Timecodes ⏰0:00 Cyber Threat Intel=============================#cybersecurity #informationsecurity #infosecDISCLAIMER: I am an ambassador or affiliate for many brands referenced on the channel.  As an Amazon Associate, I earn a commission from qualifying purchases.DISCLAIMER (MUSIC): I only use royalty-free music and sound effects.
    --------  
    22:01
  • Cyber Threat Intel - July 15, 2024 - Ep 66
    Cyber Threat Intel - July 15, 2024 - Ep 66Visit the Cyber Threat Intel website ➡️ https://www.CyberThreatIntel.com/Join us as we dive deep into the world of cybersecurity, uncovering the cyber threats of today that affect us all.From ransomware attacks crippling businesses to phishing scams targeting the unwary, no threat is too big or too small for our expert analysis.Cyber Threat Intel arms you with the knowledge to protect yourself in the digital age. Whether you're a cybersecurity professional or just curious about the threats lurking in the digital shadows, this podcast is for you.Subscribe now on YouTube or your favorite podcast listening platform, and join us on the front lines of cybersecurity. Because in the world of cyber threats, knowledge is power.=============================Today’s Video Sponsor=============================Cyber Training Pro ➡️ https://www.CyberTrainingPro.com/----------------------------------------------Are you interested in sponsoring content? ➡️ https://jongood.com/sponsor=============================Popular Cybersecurity Resources=============================Getting Started Resources & Free eBook ➡️ https://www.jongood.com/getstarted/Cybersecurity Q&A ➡️ https://www.youtube.com/playlist?list=PLErQ2qAXz3roS8ubIclSRWwUHUy-jpj2rCybersecurity Projects ➡️ https://www.youtube.com/playlist?list=PLErQ2qAXz3rom8gtJNzm8iu_AAKNcXkFqCybersecurity Training & Career Services ➡️ https://www.CyberTrainingPro.com/=============================Cyber Threat Intel=============================Cyber Threat Intel ➡️ https://www.CyberThreatIntel.com/=============================Cool Tech that I Use in My Studio=============================Gear List ➡️ http://jongood.com/affiliates/amazon/=============================Connect with me!=============================LinkedIn: ➡︎ https://www.linkedin.com/in/jongoodcyber/Twitter: ➡︎ https://www.twitter.com/JonGoodCyberInstagram: ➡︎ https://www.instagram.com/jongoodcyber/⏰ Timecodes ⏰0:00 Cyber Threat Intel=============================#cybersecurity #informationsecurity #infosecDISCLAIMER: I am an ambassador or affiliate for many brands referenced on the channel.  As an Amazon Associate, I earn a commission from qualifying purchases.DISCLAIMER (MUSIC): I only use royalty-free music and sound effects.
    --------  
    26:14

Meer Technologie podcasts

Over Cyber Threat Intel

Welcome to Cyber Threat Intel, your go-to source for the latest updates, news, and insights on cyber threats. Join us as we dive deep into the world of cybersecurity, uncovering the threats that affect us all. From ransomware attacks crippling businesses to phishing scams targeting the unwary, no threat is too big or too small for our expert analysis. Cyber Threat Intel arms you with the knowledge to protect yourself in the digital age. Whether you're a cybersecurity professional or just curious about the threats lurking in the digital shadows, this podcast is for you. Subscribe now on YouTube or your favorite podcast listening platform, and join us on the front lines of cybersecurity. Because in the world of cyber threats, knowledge is power.
Podcast website

Luister naar Cyber Threat Intel, Embracing Digital Transformation en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies

Cyber Threat Intel: Podcasts in familie

Social
v7.12.1 | © 2007-2025 radio.de GmbH
Generated: 3/27/2025 - 10:09:15 AM