
CISO Insights: Voices in Cybersecurity
465 episodes — Page 9 of 10

Ep 65Navigating Vietnam's Data Law: Key Compliance for Businesses
This podcast episode explores Vietnam's new Law on Data, effective July 1, 2025, and its implications for businesses. We'll break down the law's key aspects, including scope of application, digital data definitions, data ownership rights, regulations on cross-border data transfers (especially for "important" and "core" data), and the requirements for mandatory risk assessments. We also discuss data-related products and services, the establishment of the National General Database and National Data Centre, and practical steps businesses can take to ensure compliance and mitigate risks in Vietnam's evolving digital landscape. www.compliancehub.wiki/vietnams-law-on-data-key-provisions-and-implications

Ep 64PDPA Data Breaches: Navigating Malaysia's Compliance Landscape
Understand the critical data breach notification requirements under Malaysia's Personal Data Protection Act (PDPA) 2010. Learn how to identify "significant harm" and when you must notify the Personal Data Protection Commissioner and affected data subjects. Stay informed about potential penalties for non-compliance and strategies for robust data breach management. www.compliancehub.wiki/understanding-data-breach-notification-requirements-under-malaysias-pdpa

Ep 63AI Threat Disruption: Staying Ahead of Malicious Actors
This podcast explores how AI companies are uniquely positioned to disrupt malicious uses of AI models. We delve into real-world case studies, such as surveillance operations, deceptive employment schemes, and influence campaigns, to understand how these threats are identified and neutralized. Join us as we uncover the latest strategies and insights in the fight against AI abuse. www.myprivacy.blog/the-ai-threat-landscape-disrupting-malicious-uses-of-ai-models

Ep 62The Algorithmic Battlefield: AI, Ethics, and the New Arms Race
Venture into the murky world where Silicon Valley's ethical lines blur as AI giants like Google and OpenAI chase lucrative military contracts. Explore how once-sacred principles are being abandoned in favor of algorithms that now dictate life-and-death decisions on the battlefield. Uncover the implications of a future where unaccountable AI systems reshape global conflict, privacy erodes, and the public remains in the dark. www.myprivacy.blog/from-dont-be-evil-to-drone-deals-silicon-valleys-reckless-ai-arms-race

Ep 61Encrypted Frontlines: Cyber Espionage, Messaging App Vulnerabilities, and Global Security
This episode examines the rising threats to encrypted communications and the geopolitical implications of cyber espionage. We analyze how Russian threat actors exploit vulnerabilities in messaging apps like Signal and how platforms like Telegram have become hubs for cybercrime. Also examined is the impact of government pressures on encryption standards, and the delicate balance between privacy and national security. https://www.breached.company/encrypted-frontlines-unpacking-cyber-espionage-messaging-app-vulnerabilities-and-global-security

Ep 60Privacy Matters: Navigating the Social Media Maze in 2025
From understanding end-to-end encryption (E2EE) on WhatsApp to mastering privacy settings on Snapchat and managing ad preferences on X (Twitter), MyPrivacy.blog equips you with the knowledge to navigate the social media landscape with confidence. Learn about the nuances of private versus public accounts on TikTok. how to leverage features like Close Friends on Instagram and the importance of reviewing third-party app permissions on Facebook. https://www.myprivacy.blog/the-complete-guide-to-social-media-privacy-protecting-your-digital-life-in-2025/

Ep 59AI Unveiled: DeepSeek R1 Red Team & the Future of LLM Security
Explore the cybersecurity and privacy challenges posed by Large Language Models (LLMs) through the lens of DeepSeek R1 red teaming. Dive into the vulnerabilities uncovered in DeepSeek R1, from harmful content generation to insecure code and biased outputs. Learn about practical strategies and frameworks like NIST AI RMF for mitigating risks and ensuring responsible AI deployment. https://www.breached.company/deepseek-r1-red-team-navigating-the-intersections-of-llm-ai-cybersecurity-and-privacy

Ep 58Geopolitical Tech Storm: Navigating Cybersecurity, AI, and Global Power
The intersection of technology and geopolitics is creating unprecedented challenges in cybersecurity and AI governance. Global powers are competing in AI and semiconductor technologies, leading to rising tensions and potential risks. Experts at the Munich Security Conference 2025 emphasized the urgent need for international cooperation and robust frameworks to navigate this evolving landscape and foster trust through public-private partnerships https://www.breached.company/navigating-the-geopolitical-tech-storm-cybersecurity-ai-governance-and-global-power-shifts/

Ep 57Cybersecurity in Africa: Threats, Trends, and Tech
This podcast explores the diverse cybersecurity challenges facing the African continent, from state-sponsored attacks to cybercriminal networks. It examines the development and implementation of legal and regulatory frameworks, as well as regional cooperation efforts to combat cyber threats. The podcast also discusses emerging trends like data sovereignty, AI regulation, and critical infrastructure protection, providing insights into the future of cybersecurity in Africa. www.compliancehub.wiki/cybersecurity-in-africa-navigating-threats-trends-and-the-tech-landscape/

S1 Ep 56Decoding Cybercrime: Platforms, Psychology, and Precautions
Cybercrime is a growing threat affecting all sectors, fueling a shadow economy with projected costs reaching $10.5 trillion by 2025. This episode explores the cybercrime ecosystem, from dark web platforms and cybercriminal psychology to specific attack techniques like social engineering and ransomware. Listeners will gain insights into how cybercriminals operate, their motivations, and the geographical distribution of cybercrime. We also discuss practical precautions and strategies for individuals and organizations to protect themselves against these evolving threats. www.breached.company/decoding-cybercrime-platforms-psychology-and-precautions

S1 Ep 55Decoding Digital Spain 2025: Strategies for a Connected Future
Decoding Digital Spain 2025" explores Spain's ambitious plan for digital transformation, focusing on key initiatives in connectivity, 5G, cybersecurity, and AI. The podcast examines how Spain aims to bridge digital divides, enhance public services, and boost its economy through strategic investments and policy reforms. Listeners will gain insights into the challenges and opportunities as Spain strives to become a leading digital hub in Europe while ensuring citizen rights and ethical AI development. www.compliancehub.wiki/span-cybersecurity-and-data-prviacy-with-gdpr-and-lopdgdd-synergy/

S1 Ep 54China's Cyber Campaigns: Salt & Volt Typhoon and Beyond
Explore the cyber espionage campaigns of People's Republic of China (PRC)-affiliated threat actors, such as Volt Typhoon, targeting critical infrastructure. Understand their techniques, including living off the land (LOTL) tactics to maintain anonymity within IT infrastructures. Learn about recommended mitigations and best practices to strengthen network defenses against these sophisticated cyber threats. https://www.breached.company/chinas-cyber-campaigns-a-deep-dive-into-salt-volt-typhoon-and-other-threat-actors/

S1 Ep 53State-Sponsored Cybercrime: When Nations Turn to Hackers
Uncover the disturbing trend of nation-states utilizing cybercriminals to achieve their strategic objectives. This episode examines how countries like Russia, Iran, China, and North Korea leverage cybercriminals for espionage, disruption, and revenue generation. Explore the various ways states collaborate with cybercriminals, from purchasing malware and tools to directly hiring attackers for specific missions.

S1 Ep 52Navigating Singapore's PDPA: Protecting Personal Data in the Digital Age
The podcast explores the key principles and obligations outlined in Singapore's Personal Data Protection Act (PDPA). It offers insights for organizations on how to comply with the PDPA's requirements for collecting, using, and disclosing personal data. It also examines individuals' rights to access and correct their personal data, ensuring a balance between data protection and business needs. https://www.compliancehub.wiki/understanding-the-personal-data-protection-act-singapores-framework-for-data-privacy/

Ep 51Securing Canada's Digital Future: The National Cyber Security Strategy 2025
Dive into Canada's National Cyber Security Strategy for 2025 and explore how it aims to protect Canadians and businesses from evolving cyber threats. This podcast examines the strategy's key pillars, including forging partnerships, promoting innovation, and disrupting cyber threat actors. Discover how the government plans to engage with all levels of society, from Indigenous communities to the private sector, to build a more resilient and secure digital Canada, as well as how the Canadian Cyber Defence Collective (CCDC) and other initiatives play a crucial role in achieving these goals.