CISO Insights: Voices in Cybersecurity

De: CISO Marketplace
  • Resumen

  • CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communication to threat detection, compliance, and talent development. Whether you’re a CISO, aspiring security leader, or technology executive, we equip you with the tools to thrive in a complex digital environment. Connect with us: Shop: cisomarketplace.com News: threatwatch.news Podcast: cisoinsights.show Tools: microsec.tools AI Resources: cybersecuritygpt.store Follow us: TikTok @cisomarketplace - Quick insights and security tips YouTube @cisomarketplace - In-depth discussions and CISO interviews
    Copyright 2025 All rights reserved.
    Más Menos
Episodios
  • Beyond the Prompt: Navigating the Threats to AI Agents
    May 3 2025

    AI agents, programs designed to autonomously collect data and take actions toward specific objectives using LLMs and external tools, are rapidly becoming widespread in applications from customer service to finance. While built on LLMs, they introduce new risks by integrating tools like APIs and databases, significantly expanding their attack surface to include classic software vulnerabilities like SQL injection, remote code execution, and broken access control, in addition to inherent LLM risks like prompt injection. Our sources demonstrate that these vulnerabilities are largely framework-agnostic, stemming from insecure designs and misconfigurations rather than flaws in frameworks like CrewAI or AutoGen. Given the autonomous nature and expanded capabilities of agents, the potential impact of compromises escalates from data leakage to infrastructure takeover. This episode dives into the complex threats targeting AI agents and highlights why a layered, defense-in-depth strategy is essential, combining safeguards like Prompt Hardening, Content Filtering, Tool Input Sanitization, Tool Vulnerability Scanning, and Code Executor Sandboxing, because no single mitigation is sufficient to address the diverse attack vectors.

    www.securitycareers.help/securing-the-autonomous-frontier-layered-defenses-for-ai-agent-deployments/

    https://www.hackernoob.tips/exploring-the-attack-surface-our-guide-to-ai-agent-exploitation/

    https://vibehack.dev/

    https://devsecops.vibehack.dev

    Más Menos
    23 m
  • Space Under Pressure: Geopolitical Threats and the Evolving Cosmos (2025)
    May 2 2025
    Drawing on open-source information and eight years of collected data, the CSIS Aerospace Security Project's 2025 Space Threat Assessment explores the key developments in foreign counterspace weapons and the evolving security landscape in Earth orbit. This assessment highlights how space is becoming a more dangerous place and is increasingly woven into both peacetime and wartime activities. The report categorizes counterspace weapons into four main types: kinetic, non-kinetic, electronic, and cyber operations. While the past year saw few headline-grabbing kinetic tests, concerns persist, notably regarding Russia's pursuit of a nuclear anti-satellite capability designed to target satellites orbiting Earth, which the United States and international partners remain concerned about.

    www.myprivacy.blog/space-threats-and-the-unseen-impact-a-privacy-perspective-on-the-2025-assessment

    www.compliancehub.wiki/navigating-the-orbital-minefield-compliance-challenges-in-the-2025-space-threat-landscape/

    Más Menos
    28 m
  • The Price of Protection: Budgeting for Essential Cyber Hygiene (CIS IG1)
    May 1 2025

    This episode explores the costs associated with implementing essential cyber hygiene as outlined by the CIS Critical Security Controls Implementation Group 1 (IG1). We delve into the different approaches enterprises can take – utilizing on-premises tools, leveraging Cloud Service Providers (CSPs), or partnering with Managed Service Providers (MSPs). Drawing on the guide's research, we discuss the types of tools and policies needed for the 10 areas of cyber defense, explore budgeting considerations for different enterprise sizes, and highlight how IG1 Safeguards can provide significant protection against common threats for a relatively low cost. Learn how to make informed and prioritized decisions to secure your enterprise, whether through owned infrastructure, outsourced services, or a hybrid approach.

    www.securitycareers.help/the-price-of-protection-making-cis-ig1-cyber-hygiene-achievable-and-affordable

    https://baseline.compliancehub.wiki

    Más Menos
    14 m
adbl_web_global_use_to_activate_webcro805_stickypopup

Lo que los oyentes dicen sobre CISO Insights: Voices in Cybersecurity

Calificaciones medias de los clientes

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.