{ "items": [ { "articles": [ { "id": 408160, "title": "Podcast: Cyber Resilience for State and Local Governments", "permalink": "https:\/\/securityintelligence.com\/media\/podcast-cyber-resilience-for-state-and-local-governments\/", "date-and-time": "Nov 12, 2019", "category": "Data Protection", "category_link": "https:\/\/securityintelligence.com\/category\/topics\/data-protection\/", "image": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/11\/internal_podcast-the-evolving-state-of-government-security-in-the-u.s.-630x330.jpg", "image_alt": "", "audio_url": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/11\/Cyber-Resilience-for-State-and-Local-Governments.mp3", "audio_length": "27 min", "read-time": "16 min read" }, { "id": 407117, "title": "Podcast: Ransomware and Operating Under Maximum Pressure", "permalink": "https:\/\/securityintelligence.com\/media\/podcast-ransomware-and-operating-under-maximum-pressure\/", "date-and-time": "Oct 15, 2019", "category": "Data Protection", "category_link": "https:\/\/securityintelligence.com\/category\/topics\/data-protection\/", "image": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/10\/podcast-ransomware-and-operating-under-maximum-pressure-630x330.jpg", "image_alt": "", "audio_url": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/10\/Ransomware-and-Operating-Under-Maximum-Pressure.mp3", "audio_length": "32 min", "read-time": "18 min read" }, { "id": 405780, "title": "Podcast: Cloud Security and the Road to Transformation", "permalink": "https:\/\/securityintelligence.com\/media\/podcast-cloud-security-and-the-road-to-transformation\/", "date-and-time": "Sep 10, 2019", "category": "Cloud Security", "category_link": "https:\/\/securityintelligence.com\/category\/topics\/cloud-protection\/", "image": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/09\/podcast-cloud-security-and-the-road-to-transformation-630x330.jpg", "image_alt": "", "audio_url": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/09\/Cloud-Security-and-the-Road-to-Transformation.mp3", "audio_length": "35 min", "read-time": "22 min read" }, { "id": 405273, "title": "Podcast: Are You Prepared to Respond to a Destructive Malware Attack?", "permalink": "https:\/\/securityintelligence.com\/media\/podcast-are-you-prepared-to-respond-to-a-destructive-malware-attack\/", "date-and-time": "Aug 6, 2019", "category": "Data Protection", "category_link": "https:\/\/securityintelligence.com\/category\/topics\/data-protection\/", "image": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/08\/podcast-are-you-prepared-to-respond-to-a-destructive-malware-attack-630x330.jpg", "image_alt": "", "audio_url": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/08\/Are-You-Prepared-to-Respond-to-a-Destructive-Malware-Attack_.mp3", "audio_length": "37 min", "read-time": "25 min read" }, { "id": 405071, "title": "Podcast: Adapting to Evolving Data Privacy Regulations", "permalink": "https:\/\/securityintelligence.com\/media\/podcast-adapting-to-evolving-data-privacy-regulations\/", "date-and-time": "Jul 30, 2019", "category": "Data Protection", "category_link": "https:\/\/securityintelligence.com\/category\/topics\/data-protection\/", "image": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/07\/podcast-as-data-privacy-regulations-evolve-companies-must-adapt-630x330.jpg", "image_alt": "", "audio_url": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/07\/Adapting-to-Evolving-Data-Privacy-Regulations.mp3", "audio_length": "25 min", "read-time": "17 min read" }, { "id": 404929, "title": "Podcast: What Factors Contribute to the Cost of a Data Breach?", "permalink": "https:\/\/securityintelligence.com\/media\/podcast-what-factors-contribute-to-the-cost-of-a-data-breach\/", "date-and-time": "Jul 23, 2019", "category": "Data Protection", "category_link": "https:\/\/securityintelligence.com\/category\/topics\/data-protection\/", "image": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/07\/podcast-key-takeaways-from-the-2019-cost-of-a-data-breach-report-630x330.jpg", "image_alt": "", "audio_url": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/07\/What-Factors-Contribute-to-the-Cost-of-a-Data-Breach_.mp3", "audio_length": "29 min", "read-time": "19 min read" }, { "id": 404807, "title": "Podcast: IT\u2019s Eyes and Ears \u2014 The Evolving Security Operations Center (SOC)", "permalink": "https:\/\/securityintelligence.com\/media\/podcast-its-eyes-and-ears-the-evolving-security-operations-center-soc\/", "date-and-time": "Jul 16, 2019", "category": "Incident Response", "category_link": "https:\/\/securityintelligence.com\/category\/topics\/incident-response\/", "image": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/07\/podcast-its-eyes-and-ears-a-the-evolving-security-operations-center-630x330.jpg", "image_alt": "", "audio_url": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/07\/The-Evolving-Security-Operations-Center.mp3", "audio_length": "36 min", "read-time": "24 min read" }, { "id": 404504, "title": "Podcast: Reducing Third-Party Risk", "permalink": "https:\/\/securityintelligence.com\/media\/podcast-reducing-third-party-risk\/", "date-and-time": "Jun 25, 2019", "category": "Risk Management", "category_link": "https:\/\/securityintelligence.com\/category\/topics\/risk-management\/", "image": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/06\/podcast-reduce-third-party-risk-by-inviting-the-right-guests-630x330.jpg", "image_alt": "", "audio_url": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/06\/Reducing-Third-Party-Risk.mp3", "audio_length": "34 min", "read-time": "20 min read" }, { "id": 404414, "title": "Podcast: Development Agility and Open-Source Vulnerability Prioritization", "permalink": "https:\/\/securityintelligence.com\/media\/podcast-development-agility-and-open-source-vulnerability-prioritization\/", "date-and-time": "Jun 18, 2019", "category": "Risk Management", "category_link": "https:\/\/securityintelligence.com\/category\/topics\/risk-management\/", "image": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/06\/podcast-development-agility-and-open-source-vulnerability-prioritization-630x330.jpg", "image_alt": "", "audio_url": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/06\/Development-Agility-and-Open-Source-Vulnerability-Prioritization.mp3", "audio_length": "29 min", "read-time": "15 min read" }, { "id": 404242, "title": "Podcast: Lateral Movement: Combating High-Risk, Low-Noise Threats", "permalink": "https:\/\/securityintelligence.com\/media\/podcast-lateral-movement-combating-high-risk-low-noise-threats\/", "date-and-time": "Jun 11, 2019", "category": "Network", "category_link": "https:\/\/securityintelligence.com\/category\/topics\/network\/", "image": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/06\/combat-the-high-risk-low-noise-threat-of-lateral-movement-attacks-630x330.jpg", "image_alt": "", "audio_url": "https:\/\/securityintelligence.com\/wp-content\/uploads\/2019\/06\/Lateral-Movement_-Combating-High-Risk-Low-Noise-Threats.mp3", "audio_length": "30 min", "read-time": "20 min read" } ] } ], "next": "https:\/\/securityintelligence.com\/wp-content\/themes\/sapphire\/app\/jsons\/podcast.php?&page=3" }