Latest Email security Podcast Episodes
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
6 Tips for Breaking Into Cybersecurity
Cyber Security Heroes - August 01, 2022 05:00 - 51 minutes ★★★★★ - 17 ratingsCybersecurity is a broad field with new opportunities appearing every year. But what do you need to do to stand out among the job seekers and break into the industry? There is no one path to landing a job in cyber, but there are a few best practices to attain the skills you need to get your fo...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
How To Succeed In Red Teaming Without Experience
Cyber Security Heroes - July 31, 2022 16:18 - 42 minutes ★★★★★ - 17 ratingsYou don’t need to be a technical wizard to succeed in red teaming. And people with no or low experience don’t have to go through months of training before you give them work. There are many components of red teaming that can be taught in a short amount of time from open source reconnaissance t...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
Why search and delete is the wrong approach to phishing incident response
Cyber Security Heroes - July 29, 2022 04:00 - 37 minutes ★★★★★ - 17 ratingsSearch and delete is a common response to phishing emails, but it’s not the best approach. It’s inefficient, ineffective, and with the sheer volume of phishing attacks, it’s not feasible as a standard practice. The only thing search and delete truly provides is a false sense of security. In...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
How to Prevent an Identity and Access Management System Breach
Cyber Security Heroes - July 25, 2022 23:30 - 48 minutes ★★★★★ - 17 ratingsWhen identity access management system Okta was breached earlier this year, 366 companies had their data compromised. For those companies, a single point of failure put their data, and business, at risk. Because of the nature of Okta and similar systems, it wasn’t clear what, if any, changes h...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
5 Things You Need to Know About Modern Disaster Recovery
Cyber Security Heroes - July 20, 2022 00:00 - 1 hour ★★★★★ - 17 ratingsThe biggest mistake companies make is not having a suitable disaster recovery plan in place. They think that a box of tapes serving as their backup is enough. That might have been true a couple of decades ago, but with ransomware attacks happening every few minutes, that won’t cut it anymore. ...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
How to Find Cybersecurity Talent in a Candidate-Driven Market
Cyber Security Heroes - July 12, 2022 00:00 - 46 minutes ★★★★★ - 17 ratingsCybersecurity companies need to be realistic when recruiting new talent. With so many companies hiring, there is stiff competition for candidates. Job descriptions that require a long list of certifications for entry level jobs won’t get filled easily. One with a salary below market or few day...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
Adrianus Warmenhoven, Defensive Strategist @Nord Security
Cyber Security Heroes - July 05, 2022 18:36 - 1 hour ★★★★★ - 17 ratingsAdrianus Warmenhoven was one of the first web-hosters in Europe, setting up ISPs in the very early 1990s and the first ISP in Tanzania. He has worked with National Forensics Institute on cybercrime, taught at Universities on subjects such as security, performance and scaling. And he was involve...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
Cybersecurity benefits of behavioral biometrics and adversarial machine learning
Cyber Security Heroes - June 28, 2022 00:30 - 37 minutes ★★★★★ - 17 ratingsJustin Macorin, CTO and Co-founder at Ponsero discussed with me some cybersecurity use cases for NLP and behavioral biometric technology, especially when it comes to phishing and spam!We also discussed AI and ML misconceptions, the importance of quality data sets to train the models and how all ...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
Navigating The Complex Ecosystem Of Subjects, Resources & Endless Certs
Cyber Security Heroes - June 21, 2022 00:30 - 41 minutes ★★★★★ - 17 ratingsChristian Scott is the COO and Chief Information Security Officer at GoVanguard, a boutique cybersecurity firm that performs red teaming services, like penetration testing and social engineering. They do a lot of work for multi-billion dollar hedge funds, international internet service provide...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
How to Create Cybersecurity Training Playbooks
Cyber Security Heroes - June 14, 2022 00:30 - 53 minutes ★★★★★ - 17 ratingsA good training program is not just beneficial to new hires. It’s beneficial to everyone. Clear playbooks that can be referred to time and again make everyone stronger and reduce turnover. But many companies are missing the mark when it comes to the onboarding process from a lack of documentat...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
How to Find the Right Cybersecurity Career Mentor
Cyber Security Heroes - June 07, 2022 00:30 - 45 minutes ★★★★★ - 17 ratingsYou’ve likely heard the phrase “it’s not what you know, but who you know.” In cybersecurity, it’s both. To get access to opportunities, you need connections. But to follow through on those opportunities, you need to have knowledge and skills. Mentorship can help you with both. In this episod...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
5 Things You Need to do When Creating a Privacy Program
Cyber Security Heroes - June 01, 2022 00:30 - 53 minutes ★★★★★ - 17 ratingsBusinesses starting to build a privacy program need to ask themselves this: How would customers feel if their data was used in a way that ends up in the New York Times? What would happen to your business? Good privacy policies benefit the business, don’t hurt engineering morale, and protect th...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
Navigating a Career in Cybersecurity
Cyber Security Heroes - May 24, 2022 00:30 - 57 minutes ★★★★★ - 17 ratingsDespite the cybersecurity talent shortage, it can be tough to navigate the cybersecurity world at first. If you want to get your foot in the door with cybersecurity, there are a lot of obstacles to overcome such as education, experience, and when and how to specialize. But when it comes to work...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
How to be an Effective CISO
Cyber Security Heroes - May 17, 2022 00:30 - 52 minutes ★★★★★ - 17 ratingsThe role of the CISO has evolved from a technical one to more of an advisory one. A CISO guides business leaders on how to implement security controls while meeting business goals. A CISO should be prepared to communicate the return of investment on reducing risk through cybersecurity and transl...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
How to Better Utilize the Technical Controls You Already Have in Place
Cyber Security Heroes - May 10, 2022 00:30 - 30 minutes ★★★★★ - 17 ratingsThere are many tech tools available to cite the capability to reduce phishing scams and cybersecurity threats. But it’s important to carefully evaluate what technology you’re bringing to the table and how you’re approaching the problem in a way that’s not wasting time and money unnecessarily. ...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
How Cybersecurity Leaders Can Attract And Recruit Top Talent
Cyber Security Heroes - May 03, 2022 00:30 - 40 minutes ★★★★★ - 17 ratingsCybersecurity leaders are in a unique position to drive their companies forward. This includes their ability to identify, hire, and nurture top talent. Joshua Scott is the Head of Security and IT at Postman, where he seeks to find great hires and help his employees thrive. In ep 10 of our mi...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
A Deep Dive With Allan Alford On Okta's Breach Response
Cyber Security Heroes - April 30, 2022 00:30 - 1 hour ★★★★★ - 17 ratingsIn this episode, we unpack and critique the handling of the Okta breach communications effort and why it matters, especially for all of us on the sidelines passing judgment without all the facts. Allan Alford is the CISO/CTO at TrustMAPP & Host of The Cyber Ranch Podcast Show Links Connect wi...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
2022 Best Practices for Cybersecurity Recruiters and Job Seekers
Cyber Security Heroes - April 25, 2022 21:00 - 1 hour ★★★★★ - 17 ratingsEpisode #9 of our mini-series #1SEAT is out. 👇 2022 Best Practices for Cybersecurity Recruiters and Job SeekersRecruiting in security has always been a challenge, and the Great Resignation has only made it more difficult to find the right job candidates. There’s a high demand for internet sec...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
Celebrating Our 1-year Anniversary: 2021 Montage Part 1
Cyber Security Heroes - April 19, 2022 01:00 - 33 minutes ★★★★★ - 17 ratingsIt's Cyber Security Heroes' birthday month! Thank you so much for tuning in and being part of the journey, it's really taken off and we are humbled by ALL the positive feedback. So to celebrate our 1 year anniversary, we did a montage of all the best of 2021 quotes. Enjoy and thank you to all...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
Pwn Your Career With Founder and CEO Deidre Diamond
Cyber Security Heroes - April 16, 2022 05:00 - 51 minutes ★★★★★ - 17 ratingsWelcome to episode #8 of our new mini-series #1SEAT: PWN Your Career Deidre Diamond is the Founder and CEO at Cyber Security Network (http://www.cybersn.com), a company transforming the way Cyber Security Professionals approach job searches. From online job matching to full-service recruitmen...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
How Companies and Job Seekers Can Solve the Cybersecurity Shortage
Cyber Security Heroes - April 12, 2022 01:00 - 43 minutes ★★★★★ - 17 ratingsCompanies are getting attacked daily by cyber criminals. Most of those attacks aren’t getting into their systems, but when you add up all of the phishing emails and attempts to get credentials, it can look like thousands of attacks in a month. At the same time, there are over three million open...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
Chip Harris – Who’s The Man Behind the Mask?
Cyber Security Heroes - April 08, 2022 15:45 - 1 hour ★★★★★ - 17 ratingsBryan Vorndran, an assistant director in the FBI's cyber division reported that Russian hackers have been scanning the systems of energy companies and other critical infrastructure in the United States during a hearing before a U.S. House of Representatives panel last Tuesday. In this episode I...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
How to Protect Yourself from Scammers
Cyber Security Heroes - April 05, 2022 01:00 - 49 minutes ★★★★★ - 17 ratingsEveryone has a right to privacy. Though social media has blurred the lines between what constitutes public versus private, your personal information still needs to be protected. Every time you give up private information, whether that’s a phone number, an email, or a birth date, you make yourse...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
Bohan Zang Shares How He Landed His First SOC Analyst Role
Cyber Security Heroes - April 03, 2022 06:30 - 26 minutes ★★★★★ - 17 ratingsIn this episode #6 of mini-series #1SEAT, Bohan Zang a Security Operations Center Analyst I from eSentire shares his journey on how he landed the role without having any prior security experience. We covered: Resume advice Interview preparation What certifications he recommends Security t...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
How Non-tech Professionals Can Solve the Cybersecurity Talent Problem
Cyber Security Heroes - March 28, 2022 22:00 - 48 minutes ★★★★★ - 17 ratingsCybercrime is on the rise and we don’t have enough defenders fighting against it. In the next few years, cybercrime is estimated to become a multi-trillion dollar industry and that money is going to fund more illegal things. The impact will be felt far beyond cybersecurity. That threat means w...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
How Businesses and Consumers Can Prepare For A Russian Cyber Attack
Cyber Security Heroes - March 26, 2022 07:00 - 22 minutes ★★★★★ - 17 ratingsAccording to an FBI warning to president Biden, there is evolving intelligence that Russia is exploring options for potential cyber attacks against the U.S. homeland and specifically critical infrastructure. In this episode, I spoke to Christian Scott, CEO and Chief Information Security Officer ...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
The Unraveling Of The Okta Breach And What You Can Do
Cyber Security Heroes - March 23, 2022 13:29 - 18 minutes ★★★★★ - 17 ratingsOkta, Inc. is a publicly traded identity and access management company based in San Francisco. It provides cloud software that helps companies manage and secure user authentication into applications, and for developers to build identity controls into applications, website web services and device...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
How to Jumpstart Your Pen Testing Career
Cyber Security Heroes - March 22, 2022 06:30 - 50 minutes ★★★★★ - 17 ratingsIt’s never too late to think about a career change. Penetration testing, also known as pen testing, is a subset of cybersecurity where an individual simulates a cyber attack to evaluate the effectiveness of a system’s security. If you’re considering moving into penetration testing, you have to...
![Cyber Security Heroes artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts114/v4/e3/ce/7e/e3ce7e94-cf7f-0cd7-a811-6bbe3a6a94b8/mza_8588603937021291287.jpg/100x100bb.jpg)
The New Cyber Era Post Ukraine Invasion
Cyber Security Heroes - March 19, 2022 13:00 - 1 hour ★★★★★ - 17 ratingsIn light of recent events such as the Russian invasion of Ukraine and the acquisition of Mandiant by Google. I was lucky enough to get time with Karim Hijazi former Founder and CEO of Unveillance (acquired by Mandiant (v1.0)), former Director of Intelligence for Mandiant, presently Founder and ...
![HIPAA Critical artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts113/v4/4b/5a/22/4b5a2297-4fa0-ff38-4784-9faca3f7479f/mza_12949005223540087014.jpg/100x100bb.jpg)
68. Aja Anderson: "Bad actors are offering your employees incentives to help them."
HIPAA Critical - March 16, 2022 17:00 - 22 minutes ★★★★★ - 12 ratingsEpisode 68 features Aja Anderson, Paubox Customer Success Manager.
Related Email security Topics