1,146 episodes

Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.

Cyber Security Headlines CISO Series

    • News

Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.

    Snowflake breach escalates, MITRE has a memo for the president, Velvet Ant persists

    Snowflake breach escalates, MITRE has a memo for the president, Velvet Ant persists

    Snowflake breach escalates with ransom demands and death threats
    MITRE has a memo for the president
    Velvet Ant maintains three-year cyber espionage campaign 
    Thanks to today's episode sponsor, Vanta

    When it comes to ensuring your company has top-notch security practices, things can get complicated, fast. Vanta automates compliance for SOC 2, ISO 27001, and more, saving you time and money. With Vanta, you can unify your security program management and proactively manage security reviews with AI-powered security questionnaires.Our listeners get $1,000 off at vanta.com/headlines.

    • 8 min
    CISA tabletop exercise, Keytronic confirms breach, Linux emoji malware

    CISA tabletop exercise, Keytronic confirms breach, Linux emoji malware

    CISA leads first tabletop exercise for AI cybersecurity
    Keytronic confirms data breach after ransomware gang leaks stolen files
    New Linux malware controlled through Discord emojis
    Thanks to today's episode sponsor, Vanta

    Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and more. With Vanta, you can streamline security reviews by automating questionnaires and demonstrating your security posture with a customer-facing Trust Center. Over 7,000 global companies like Atlassian, Flo Health, and Quora use Vanta to manage risk and prove security. Our listeners get $1,000 off at Vanta.com/headlines.
     
    For the stories behind the headlines, head to CISOseries.com.

    • 7 min
    Week in Review: New York Times theft, Club Penguin hack, NHS wants blood

    Week in Review: New York Times theft, Club Penguin hack, NHS wants blood

    Link to blog post
    This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Janet Heins, CISO, ChenMed and janetheins.com
    Thanks to our show sponsor, Vanta
    Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and more. With Vanta, you can streamline security reviews by automating questionnaires and demonstrating your security posture with a customer-facing Trust Center. Over 7,000 global companies like Atlassian, Flo Health, and Quora use Vanta to manage risk and prove security. Our listeners get $1,000 off at Vanta.com/headlines.
    All links and the video of this episode can be found on CISO Series.com

    • 28 min
    Cyberinsurance claims increase, NATO’s Russia vigilance, Remcos RAT phishing

    Cyberinsurance claims increase, NATO’s Russia vigilance, Remcos RAT phishing

    Record high for North American cyber insurance claims
    NATO members to increase vigilance over Russian sabotage attempts
    Remcos RAT discovered inside UUEncoding emails
    Thanks to today's episode sponsor, Vanta

    Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and more. With Vanta, you can streamline security reviews by automating questionnaires and demonstrating your security posture with a customer-facing Trust Center. Over 7,000 global companies like Atlassian, Flo Health, and Quora use Vanta to manage risk and prove security. Our listeners get $1,000 off at Vanta.com/headlines.
     
    For the stories behind the headlines, head to CISOseries.com.
     

    • 7 min
    Life360 faces extortion attempt, White House reports increase in federal attacks, Black Basta exploits zero-day flaw in windows

    Life360 faces extortion attempt, White House reports increase in federal attacks, Black Basta exploits zero-day flaw in windows

    Life360 faces extortion attempt after Tile data breach
    White House report highlights increase in federal attacks
    Russian hacker with ties to LockBit and Conti gangs arrested
    Thanks to today's episode sponsor, Vanta

    When it comes to ensuring your company has top-notch security practices, things can get complicated, fast. Vanta automates compliance for SOC 2, ISO 27001, and more, saving you time and money. With Vanta, you can unify your security program management and proactively manage security reviews with AI-powered security questionnaires.Our listeners get $1,000 off at vanta.com/headlines.
     

    • 8 min
    Snowflake hack update, BreachForums down again, Cylance data for sale

    Snowflake hack update, BreachForums down again, Cylance data for sale

    Pure Storage hacked via Snowflake workspace
    BreachForums down again and official Telegram channels deleted 
    BlackBerry Cylance data up for sale
    Thanks to today's episode sponsor, Vanta

    Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and more. With Vanta, you can streamline security reviews by automating questionnaires and demonstrating your security posture with a customer-facing Trust Center. Over 7,000 global companies like Atlassian, Flo Health, and Quora use Vanta to manage risk and prove security. Our listeners get $1,000 off at Vanta.com/headlines.
    For the stories behind the headlines, visit CISOseries.com.

    • 7 min

Top Podcasts In News

No Agenda
Adam Curry & John C. Dvorak
Erin Burnett OutFront
CNN
Today in Focus
The Guardian
The Global Story
BBC World Service
CNN Inside Politics
CNN
The Duran Podcast
The Duran

You Might Also Like

Cybersecurity Today
ITWC
CISO Series Podcast
David Spark, Mike Johnson, and Andy Ellis
CyberWire Daily
N2K Networks
Defense in Depth
David Spark
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Hacking Humans
N2K Networks