BR +55 11 3069 3925 | USA +1 469 620 7643

  • BLOG
  • Português
  • BR +55 11 3069 3925 | USA +1 469 620 7643
  • Português
logo senhasegura
  • SOLUTIONS
  • PRODUCTS
  • SERVICES AND SUPPORT
  • PARTNERS
  • COMPANY
  • CONTACT
  • DEMO

Compliance

and Audit

Audit

PCI DSS

SOX

ISO 27001

HIPAA

NIST

GDPR

ISA 62443 |

Industry 4.0

Security and

Risk Management

Privilege Abuse

Third Party Access

Privileged Access Recording

Insider Threat

Data Theft Prevention

Hardcoded Passwords

Password Reset

Solutions

By Industry

Energy and Utilities

Financial

Government

Health Care

Legal

Telecoms

Retail

senhasegura

Testimonials

See Testimonials

360º Privilege Platform

Account and

Session

PAM Core

Domum

Remote Access

MySafe

GO Endpoint

Manager

GO Endpoint

Manager Windows

GO Endpoint

Manager Linux

DevOps Secret

Manager

DevOps Secret

Manager

Multi

Cloud

Cloud IAM

CIEM

Certificate

Manager

Certificate

Manager

Privileged

Infrastructure

PAM Crypto Appliance

PAM Load Balancer

Delivery : On Cloud (SaaS) | On-premises | Hybrid

Services

and Support

Documentation

Solution Center

Suggestions

Training and Certification

Deployment and Consulting

PAMaturity

PAM 360º

Support Policy

senhasegura

Resources

Rich Materials

Customer Cases

Webinars Calendar

senhasegura Stickers

BLOG

CONTENT

Is your company really prepared for a cyber attack?

The Pillars of Information Security

7 signs that your company needs to improve the security of sensitive data

See more articles about cybersecurity

Technical

Information

How it works

Product Archicture

Integration

Security

High availability and contingency

Privileged Auditing (Configuration)

Privileged Change Audit

Features and

Functionalities

ITSM Integration

Behavior Analysis

Threat Analysis

Privileged Information Protection

Scan Discovery

Task Management

Session Management (PSM)

Application Identity (AAPM)

SSH Key Management

Affinity Partner

Program

About the Program

Become a Partner

MSSP Affinity Partner Program

Security Alliance Program

Academy | E-learning for Certification

Affinity

Portal

Portal dedicated only for Partners to find commercial, marketing supporting materials and certification program of senhasegura.

Access Partner Portal

Opportunity

Booking

For our Commercial Team to support your sale more effectively, request your opportunity booking here.

Opportunity Booking Request

Find a

Partner

We work together to offer a better solution for your company.

Check all senhasegura partners

About

Company

About us

Achievements

Why senhasegura

Press Release

Press Room

Events

Career

Presence in the World

Terms of Use

End User License Agreement (EULA)

Privacy and Cookie Policy

Information Security Policy

Certification at senhasegura

senhasegura

Testimonials

See Testimonials

Latest Reports

and Awards

Frost & Sullivan Customer Value Leadership Award 2022

Gartner PAM Magic Quadrant 2021 Report

KuppingerCole Leadership Compass: PAM 2021

GigaOm Radar Report 2021

Gartner PAM Magic Quadrant 2020

Gartner Critical Capabilities for PAM 2020

Information Services Group, Inc. (ISG)

KuppingerCole Leadership Compass: PAM 2020

Contact our team

Request a Demonstration

The 14 Best Cyber Podcasts in 2022

by senhasegura Blog Team | Sep 8, 2022 | BLOG

When it comes to cybersecurity, staying informed is one of the first steps to avoid risks such as data leaks and hacker invasion, which can generate a series of disruptions in an organization, even compromising business continuity.

The good news is that there is a lot of content available on the subject today, both in blogs, such as this one, from senhasegura, and in podcasts. 

With this in mind, we prepared an article in which we bring the definition of cybersecurity and why it is essential to understand the topic. In it, we also indicate the 14 best cyber podcasts for you to listen to and stay up to date. To facilitate your reading, we divided our text into topics. They are as follows: 

  • What Is Cybersecurity?
  • Why Is It Important to Learn About Cybersecurity?
  • 14 Best Cyber Podcasts
  • About senhasegura
  • Conclusion

Read our article to the end!

 

What Is Cybersecurity?

Also known as information technology security or electronic information security, cybersecurity refers to practices used to protect computers and servers, mobile devices, data networks, and electronic systems from cyber risks.

Having a cybersecurity strategy allows one to avoid the action of malicious attackers, who can enter, change, and delete systems or even have access to confidential data from an organization, causing damage and loss of credibility among customers. 

In the next topic, we present some recent data related to information security, which shows why it is important to keep up to date on the subject.

 

Why Is It Important to Learn About Cybersecurity?

With the evolution of technology, malicious attackers also hone their tactics, which points to the need to always be aware of threats and prevent them. Some data generated by the annual Verizon Data Breach Report reinforces this in its 2022 edition. Check it out:

 

  • The use of privileged credentials is related to most of the attacks surveyed

According to information extracted from the report, almost half of the attacks surveyed involved the use of privileged credentials. 

This reveals the importance of adopting security measures, such as the principle of least privilege and a PAM solution. 

 

  • Privilege abuse has generated more than 80% of attacks involving the misuse of privileges

Applying the least privilege policy is essential to avoid privilege abuse by employees and former employees, as this measure allows each user to have only the necessary permissions to perform their activities.

 

  • One of the main strategies used by cybercriminals is phishing

Phishing is a type of crime in which the hacker impersonates a legitimate entity so that victims feel secure in sharing sensitive data, such as banking information.

Because it is a very common tactic, it is highly recommended that organizations train their employees to identify and combat it. 

 

  • 20% of the attacks surveyed were related to social engineering

Attacks involving social engineering are another factor that deserves special attention, as hackers take advantage of uninformed users to compromise the security of companies.

Thus, it is essential to promote training to raise awareness and empower professionals, who must always be prepared to deal with this type of threat. 

 

  • The use of cloud computing increases the attack surface

Cloud computing has been much used especially after the covid-19 pandemic, which required companies to adapt to remote work, so it brings several business advantages, such as speed and scalability.

However, the adoption of cloud environments significantly increases the attack surface and risks in the face of malicious agents. 

 

  • 82% of attacks involved the human aspect

It is common for the security of a company to be compromised by human failures, such as the incorrect configuration of database assets. This is what the latest edition of the Verizon Data Breach Report indicates.

According to the document, 50% of the violations generated by human errors were caused by administrators and 30% by developers, with incorrect configurations representing 50% of errors, and incorrect deliveries, 30%. 

 

14 Best Cyber Podcasts

Now that we have covered what cybersecurity is and the importance of understanding it, let’s introduce the 14 best cyber podcasts. Check it out: 

 

  • Cyber Notes Cast 

In addition to sharing a lot of quality content here on the blog, we, from senhasegura, have launched the “Cyber Notes Cast” podcast, which you can listen to on Spotify or YouTube.

Through it, we bring the narration of articles in English published on our page, in weekly episodes of approximately 10 minutes. It is perfect for those who are driving, have no time, and want to feel sure about what they hear. 

 

  • Smashing Security

On the Smashing Security podcast, Graham Cluley and Carole Theriault discuss topics such as online privacy, hacker action, and cybercrime with their guests. 

With more than eight million downloads, Smashing Security is among the best cyber podcasts: it has hosted guests such as Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones, as well as being the winner of the “Best Security Podcast 2018” and “Best Security Podcast 2019”. 

You can follow the podcast on Twitter @SmashinSecurity and subscribe for free using a podcast app. 

 

  • Sophos Naked Security

Sophos Naked Security is also among the best cyber podcasts and is ideal for those who want to receive technical information and expert advice, which can be applied at home and in the corporate environment, in a relaxed tone.

This podcast can be found on Spotify, Apple Podcasts, and Soundcloud. It is also possible to listen to the latest episodes through the Naked Security website itself.

 

  • Darknet Diaries

Created by Jack Rhysider, the Darknet Diaries podcast broadcasts real stories involving hackers, cybercrime, invasions, and hacktivism, among other activities carried out in an obscure way on the Internet. 

 

  • Stormcast 

Stormcast is produced daily, with episodes of five to ten minutes, which update the audience on threats related to digital security. To subscribe, just click here and check out one of the best cyber podcasts. 

  • Security Now! 

Hosted every Tuesday by the creator of the first anti-spyware program, Steve Gibson, and tech expert, Leo Laporte, Security Now! is also one of the best cyber podcasts and explores complex themes in depth through a humorous and accessible conversation.

 Among the topics covered in the podcast, the following stand out: 

  • Malware;
  • Ransomware and hacks;
  • Encryption and decryption;
  • Software and security patches, plug-ins, and updates;
  • Digital service shutdowns;
  • Bug reward programs;
  • Passwords and authentication;
  • Hardware and IoT security;
  • Bluetooth and Wi-Fi exploitations;
  • Zero-day exploitations;
  • Digital identity, data privacy, and policies; and
  • Browser vulnerabilities. 

In addition, the hosts evaluate privacy issues when it comes to mobile devices and messaging apps, such as WhatsApp and Facebook Messenger.

Security Now! was launched in August 2005 and soon received several awards: in 2007, it received the People’s Choice Podcast Awards in the Technology/Science category. 

In 2006, it ranked fourth in the Top 40 podcasts listened to through PodNova, and in 2015, Security Now! was ranked fourth among the top 40 technology podcasts in the United States. 

 

  • Hacking Humans

 In this podcast, Dave Bittner and Joe Carrigan comment weekly on cybercrimes that affect organizations around the world, addressing topics such as social engineering and phishing.

 As well as hosting a security podcast, Dave Bittner is one of CyberWire’s founders. He has experience as a creator, cameraman, actor, producer, and entrepreneur, in addition to having worked in journalism and media production.

Joe Carrigan is a security engineer at the Johns Hopkins University Institute of Information Security, with over 20 years of experience and knowledge in authentication systems, embedded systems, data migration, and network communication.

 

  • Risky Business

 Founded in 2007 and hosted by journalist Patrick Gray, Risky Business includes detailed news and comments on digital security and is an indispensable summary for professionals in the field. 

 

  • Unsupervised Learning

Launched in 1999 by information security professional and writer Daniel Miessler (ME-slur), the Unsupervised Learning website is a platform that brings together the technical knowledge of its creator, where he organizes everything he has learned and intends to learn to share with his audience.

 

  • The CyberWire Daily Podcast

 CyberWire began in 2012, providing business-related information and technical intelligence to the CyberPoint International team and expanded its operations in the cybersecurity sector, reaching thousands of readers and listeners from various countries.

Its goal is to ensure that people can stay up-to-date on cybersecurity through news shared by analysts, experts, and writers based on technology.

Its creators understand it is necessary to inform and educate cyberspace users so that this becomes a more secure environment. Therefore, the company is committed to teaching students, executives, and other interested people on the subject, sharing good and bad news without sensationalism. 

Connected with experts from different regions of the world, its professionals have access to stories, interviews, and insights they share with their audience, producing one of the best cyber podcasts. 

 

  • THE 443 – Security Simplified

 Secplicity, creator of THE 443 – Security Simplified podcast, shares knowledge about information technology and cybersecurity in a simple and accessible way. It is no wonder the channel has a name that refers to the simplification of complex concepts and solutions.

Its video and editorial content cover the latest threats related to information security and how companies should address them.

 

  • The CISO Minute

This is a series of podcasts from Cybercrime Radio producers and is sponsored by KnowBe4. It is an initiative of Cybersecurity Ventures, one of the world’s leading research companies on the global cyber economy and a reliable source of cybersecurity facts, figures, and statistics. 

 Broadcasted on Mondays in the morning, the podcast provides guidance and insights for people interested in the topic. 

 The CISO Minute was on ClearanceJobs’ “Best Cybersecurity Podcasts in 2019” list, an important security jobs website. 

 To access the podcast, simply download the app from the Apple Store or Google Play Store. You can also listen to it on Cybersecurity Ventures’ own website.

 

  • Into the Breach

This podcast is aimed at people who are always connected, IT professionals, and companies that deal with many customers and services, being subject to security flaws.

It is also one of the best cyber podcasts and lets you know what experts have to say about it and how to prepare for incidents. 

 

  • Off the Hook

 By listening to the Off the Hook podcast, you understand the hackers’ perspective on technology and security vulnerabilities, as well as the news shared by this community. To learn more, just follow @HackerRadioShow on Twitter or @[email protected] on Mastodon.

 

Are you enjoying this post? Join our Newsletter!

Newsletter Blog EN

9 + 11 =

We will send newsletters and promotional emails. By entering my data, I agree to the Privacy Policy and the Terms of Use.

About senhasegura

We, from senhasegura, are part of the MT4 Tecnologia group and aim to provide cybersecurity and digital sovereignty to our customers.

Today, we work with institutions from 54 countries, acting against data theft and tracking actions on servers, databases, network administrators, and devices in general. 

With this, we can provide efficiency and productivity to organizations, as we avoid interruptions of their activities by expiration, in addition to ensuring compliance with audit criteria and standards such as PCI DSS, Sarbanes-Oxley, ISO 27001, and HIPAA.

 

Conclusion

In this article, you saw that:

  • Cybersecurity encompasses practices used to protect computers, servers, mobile devices, data networks, and electronic systems against cyber risks;
  • Understanding cybersecurity is important to prevent cyber threats by investing in strategies such as the principle of least privilege and solutions such as PAM;
  • The 2021 edition of the Verizon Data Breach Report brings alarming data on cybersecurity. One of them is that 61% of the attacks surveyed are related to the use of privileged credentials;
  • Social engineering is also an aspect that deserves attention according to the Verizon Data Breach Report, since malicious attackers take advantage of unsuspecting users to act;
  • Moreover, cloud computing, which brought several advantages for companies during the pandemic, is another aspect that generates risks, as it increases the attack surface, facilitating the action of hackers;
  • Another important evidence taken from this report is that 85% of invasions are caused by human failures, especially of administrators and developers;
  • In this article, we also recommended 14 podcasts for those who want to learn more about cybersecurity, including senhasegura’s Cyber Notes Cast.
  • Cyber Notes Cast is senhasegura’s article reading channel, which you can follow through Spotify or YouTube. It has weekly episodes lasting approximately 10 minutes.

Was our article helpful to you? Share it with others who would like recommendations to listen to the best cyber podcasts!

new RDStationForms('ebook-best-security-pratices-in-software-development-5cb46cf2247716f0524f', 'UA-31159921-3').createForm();
← How to Choose a PAM Solution? Gartner Identity & Access Management Summit Why should you consider attending →

What is An Incident Response Plan (IRP) and Why is It Important to Have One?

With the evolution of technology and the revolution in the information age, the concern with data security has become more and more constant for companies, governments, and users. Since data are fundamental assets for the growth of companies, investing in protection...
Read More

The Highlights of the IBM Cost of a Data Breach 2022 report

Companies of all sizes and industries should be concerned about the impacts of a data breach, since, according to the IBM Cost of a Data Breach 2022 report, its average cost is $4.35 million, and 83% of companies had more than one breach. With this in mind, we...
Read More

How to Manage Privileges in Endpoints?

If you are running an organization, you should be concerned with managing endpoint privileges to ensure devices such as laptops, smartphones, and tablets do not pose a threat to the cybersecurity of your company. In this sense, one can use a PAM solution to support...
Read More

Retrospective – Cybersecurity Forecasts for 2022

We are in the last quarter of 2022. Yes, it is the end of the year, and we are headed to prepare for 2023. This is also the time when markets in general, including cybersecurity, are preparing to present their forecasts for the following year. We, from senhasegura,...
Read More

Building an Incident Response Plan for Ransomware

Ransomware is considered one of the biggest threats to business in 2022. In this type of cyberattack, hackers block their victims' computers and charge a ransom to unlock them. You may be wondering: what are the basic steps of an Incident Response Plan for ransomware...
Read More

Share This!

Copyright 2022 senhasegura | All Rights Reserved | Powered by MT4 Group
By continuing to use this website, you consent to our use of cookies. For more information, please read our cookie policy.AcceptRead Our Privacy and Cookie Statement
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT