
Sign up to save your podcasts
Or


Hackers use Windows Hyper-V to evade EDR detection
Critical Cisco UCCX flaw lets attackers run commands as root
The Louvre's video security password was reportedly Louvre
Huge thanks to our sponsor, ThreatLocker
Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker.
Find the stories behind the headlines at CISOseries.com.
By CISO Series4.7
133133 ratings
Hackers use Windows Hyper-V to evade EDR detection
Critical Cisco UCCX flaw lets attackers run commands as root
The Louvre's video security password was reportedly Louvre
Huge thanks to our sponsor, ThreatLocker
Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker.
Find the stories behind the headlines at CISOseries.com.

187 Listeners

2,011 Listeners

1,649 Listeners

372 Listeners

371 Listeners

651 Listeners

1,028 Listeners

317 Listeners

418 Listeners

8,077 Listeners

175 Listeners

315 Listeners

195 Listeners

73 Listeners

9 Listeners