
Sign up to save your podcasts
Or


Hackers use Windows Hyper-V to evade EDR detection
Critical Cisco UCCX flaw lets attackers run commands as root
The Louvre's video security password was reportedly Louvre
Huge thanks to our sponsor, ThreatLocker
Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker.
Find the stories behind the headlines at CISOseries.com.
By CISO Series4.7
133133 ratings
Hackers use Windows Hyper-V to evade EDR detection
Critical Cisco UCCX flaw lets attackers run commands as root
The Louvre's video security password was reportedly Louvre
Huge thanks to our sponsor, ThreatLocker
Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker.
Find the stories behind the headlines at CISOseries.com.

187 Listeners

2,007 Listeners

1,645 Listeners

372 Listeners

371 Listeners

651 Listeners

1,021 Listeners

319 Listeners

416 Listeners

8,062 Listeners

179 Listeners

315 Listeners

188 Listeners

74 Listeners

5 Listeners