by Phriendly Phishing
Bytes with Bec and Benji is your go-to podcast for all things cyber security. Hosted by the enthusiastic duo, Bec and Benji, each 30-minuteish episode dives into the digital world to uncover the latest in cyber security news, tips, and tricks. Whether you're a tech enthusiast, a professional in the field, or just keen to stay informed about how to protect your digital footprint, this podcast offers engaging and insightful content tailored to all levels of security awareness.
Language
🇺🇲
Publishing Since
4/30/2024
Email Addresses
1 available
Phone Numbers
0 available
February 10, 2025
<p><span class="TextRun SCXW244290917 BCX0" lang="EN-AU" xml:lang= "EN-AU" data-contrast="auto"><span class= "NormalTextRun SCXW244290917 BCX0">In this episode, we speak with John Karabin, Chief Cyber Security Strategist at</span> <span class="NormalTextRun SpellingErrorV2Themed SCXW244290917 BCX0"> McGrathNicol</span><span class="NormalTextRun SCXW244290917 BCX0">. John</span> <span class="NormalTextRun SCXW244290917 BCX0">brings decades of experience in cyber risk management and governance</span> <span class= "NormalTextRun SCXW244290917 BCX0">and</span> <span class= "NormalTextRun SCXW244290917 BCX0">share</span><span class= "NormalTextRun SCXW244290917 BCX0">d</span> <span class= "NormalTextRun SCXW244290917 BCX0">his insights on combating cybersecurity hubris, addressing insider threats in hybrid work environments, and staying proactive against evolving cyber risks.</span> <span class= "NormalTextRun SCXW244290917 BCX0">Subscribe to the Bytes podcast for more conversations like this. </span></span><span class= "EOP SCXW244290917 BCX0" data-ccp-props="{}"> </span></p>
December 11, 2024
Cyber security expert Troy Hunt shares his insights on navigating the data breach epidemic, empowering individuals and organisations to protect their personal information and stay secure online.
November 20, 2024
Cybersecurity experts Nikki Peever & Claire Wilson discuss the importance of shared responsibility in protecting against cyber threats and fostering a strong cybersecurity culture in the digital age.
Pod Engine is not affiliated with, endorsed by, or officially connected with any of the podcasts displayed on this platform. We operate independently as a podcast discovery and analytics service.
All podcast artwork, thumbnails, and content displayed on this page are the property of their respective owners and are protected by applicable copyright laws. This includes, but is not limited to, podcast cover art, episode artwork, show descriptions, episode titles, transcripts, audio snippets, and any other content originating from the podcast creators or their licensors.
We display this content under fair use principles and/or implied license for the purpose of podcast discovery, information, and commentary. We make no claim of ownership over any podcast content, artwork, or related materials shown on this platform. All trademarks, service marks, and trade names are the property of their respective owners.
While we strive to ensure all content usage is properly authorized, if you are a rights holder and believe your content is being used inappropriately or without proper authorization, please contact us immediately at [email protected] for prompt review and appropriate action, which may include content removal or proper attribution.
By accessing and using this platform, you acknowledge and agree to respect all applicable copyright laws and intellectual property rights of content owners. Any unauthorized reproduction, distribution, or commercial use of the content displayed on this platform is strictly prohibited.