Social Media: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
(30 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
__NOTOC__ | |||
<div style="display: flex;"> | |||
<div style="flex: 0 0 150px; background-color: transparent;">[[File:Swarming monarch butterflies 2.png|frameless|190px|link=]]</div> | |||
<div style="flex: 1;"> | |||
<table style="border: none; background-color: transparent; text-align: center; width: 100%;"> | |||
{| style="border: none; text-align: center; width: 100%;" | |||
| | | style="background-color: #EBEBEB"| | ||
{| class="wikitable mw-collapsible mw-collapsed" style="border: none; background-color: transparent; text-align: center; width: 100%;" | |||
= | |+ <div style="font-weight:bold;">Cybersecurity Podcasts<br>[[File:Podcast-icon.svg|frameless|55px|link=]]</div> | ||
{| class="wikitable" | |||
|- | |- | ||
! Podcast Link | ! Podcast Link | ||
Line 30: | Line 25: | ||
| A podcast by VICE News, exploring the latest trends and issues in the world of cybersecurity. | | A podcast by VICE News, exploring the latest trends and issues in the world of cybersecurity. | ||
|- | |- | ||
| [https:// | | [https://thecyberwire.com/podcasts/daily-podcast CyberWire Daily] | ||
| Daily news briefings, interviews, and analysis of cybersecurity trends and events. | | Daily news briefings, interviews, and analysis of cybersecurity trends and events. | ||
|- | |- | ||
| [https://www.grc.com/securitynow.htm Security Now] | | [https://www.grc.com/securitynow.htm Security Now] | ||
Line 48: | Line 34: | ||
| Examines social engineering and how humans are targeted in cyberattacks. | | Examines social engineering and how humans are targeted in cyberattacks. | ||
|- | |- | ||
| [https:// | | [https://omny.fm/shows/unsupervised-learning Unsupervised Learning] | ||
| Hosted by Daniel Miessler, covers a variety of security and technology-related topics. | | Hosted by Daniel Miessler, covers a variety of security and technology-related topics. | ||
|- | |- | ||
| [https://podcasts.apple.com/ | | [https://podcasts.apple.com/ca/podcast/down-the-security-rabbithole-podcast-dtsr/id466659176 Down the Security Rabbithole Podcast (DtSR)] | ||
| Engages in conversations about information security and its role in business, leadership, and everyday life. | | Engages in conversations about information security and its role in business, leadership, and everyday life. | ||
|- | |- | ||
| [https://sharedsecurity.net/podcast/ Shared Security] | | [https://sharedsecurity.net/category/podcast-episodes/ Shared Security] | ||
| Focuses on information security, privacy, and the protection of personal data. | | Focuses on information security, privacy, and the protection of personal data. | ||
|- | |- | ||
Line 60: | Line 46: | ||
| Explores the history of cybersecurity and notable incidents, featuring interviews with experts. | | Explores the history of cybersecurity and notable incidents, featuring interviews with experts. | ||
|- | |- | ||
| [https:// | | [https://barcodesecurity.com/ BarCode] | ||
| Discusses the intersection of technology, society, and law, exploring ethical and legal implications. | | Discusses the intersection of technology, society, and law, exploring ethical and legal implications. | ||
|- | |- | ||
| [https://inteltechniques.com/podcast.html The Privacy, Security, & OSINT Show] | | [https://inteltechniques.com/podcast.html The Privacy, Security, & OSINT Show] | ||
| Focuses on online privacy, security, and open-source intelligence techniques. | | Focuses on online privacy, security, and open-source intelligence techniques. | ||
|- | |- | ||
| [https://www.metisstrategy.com/technovation-podcast/ Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)] | | [https://www.metisstrategy.com/technovation-podcast/ Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)] | ||
| Interviews with technology leaders about their career journeys and insights into the tech industry. | | Interviews with technology leaders about their career journeys and insights into the tech industry. | ||
|- | |- | ||
| [https://www.social-engineer.org/ | | [https://www.social-engineer.org/podcasts/ The Social-Engineer Podcast] | ||
| Explores the art and science of social engineering, featuring experts in the field. | | Explores the art and science of social engineering, featuring experts in the field. | ||
|- | |- | ||
| [https://humanfactorsecurity.co.uk/ Human Factor Security] | | [https://humanfactorsecurity.co.uk/podcast-2/ Human Factor Security] | ||
| Discusses the human element of cybersecurity, including psychology, behavior, and awareness. | | Discusses the human element of cybersecurity, including psychology, behavior, and awareness. | ||
|- | |- | ||
| [https://gettingintoinfosec.com/ Getting Into Infosec] | | [https://gettingintoinfosec.com/ Getting Into Infosec] | ||
| Features interviews with professionals who share their journeys into the field of information security. | | Features interviews with professionals who share their journeys into the field of information security. | ||
|- | |- | ||
| [https://cybersecurityventures.com/podcasts/ Cyber Security Headlines] | | [https://cybersecurityventures.com/podcasts/ Cyber Security Headlines] | ||
Line 159: | Line 136: | ||
| Weekly news roundup covering the latest cybersecurity stories, vulnerabilities, and trends. | | Weekly news roundup covering the latest cybersecurity stories, vulnerabilities, and trends. | ||
|- | |- | ||
| [https://www. | | [https://www.speakeasysecurity.com/ Speakeasy Security] | ||
| Covers various cybersecurity topics, including threat analysis, malware research, and industry news. | | Covers various cybersecurity topics, including threat analysis, malware research, and industry news. | ||
|- | |- | ||
Line 165: | Line 142: | ||
| Provides daily cybersecurity news and analysis from the SANS Internet Stormcenter. | | Provides daily cybersecurity news and analysis from the SANS Internet Stormcenter. | ||
|} | |} | ||
! | |||
= | {| class="wikitable mw-collapsible mw-collapsed" style="border: none; text-align: center; width: 100%; background-color: #EBEBEB;" | ||
|+ <div style="font-weight:bold;">Cybersecurity YouTube Channels<br>[[File:Youtube-icon.svg|frameless|55px|link=]]</div> | |||
|- | |- | ||
! YouTube Channel Name | ! YouTube Channel Name | ||
Line 427: | Line 403: | ||
| [https://www.youtube.com/c/HusseinNasser Hussein Nasser] | | [https://www.youtube.com/c/HusseinNasser Hussein Nasser] | ||
| Provides technology and programming tutorials. | | Provides technology and programming tutorials. | ||
|} | |||
|- | |||
! | |||
{| class="" style="border: none; background-color: transparent; text-align: center; width: 100%;" | |||
|+ <div style="position:relative; font-weight:bold;">Cybersecurity Linked-In Groups<br> | |||
[[File:linkedin-icon.svg|frameless|45px|center|link=]]<br>...Coming Soon...</div> | |||
|} | |||
| style="background-color: #EBEBEB"| | |||
{| class="" style="border: none; text-align: center; width: 100%;" | |||
|+ <div style="position:relative; font-weight:bold;">Cybersecurity Instagrams<br>[[File:Instagram-icon.svg|frameless|50px|link=]]<br>...Coming Soon...</div> | |||
|} | |||
|} | |} | ||
</table> | |||
</div> | |||
</div> |
Latest revision as of 20:01, 20 October 2023
|
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|