Business Uninterrupted

By VikingCloud

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by VikingCloud

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 0
Reviews: 0
Episodes: 96

Description

Business Uninterrupted is presented by VikingCloud. In this series we sit down with our very own Industry experts and discuss the latest topics dominating the cybersecurity and compliance landscape. 

If you have any topics you want discussed on Business Uninterrupted, email marketing@vikingcloud.com and our experts will be in touch - we may even make it the subject of a future episode!


Episode Date
Business Uninterrupted Episode 1: How AI is Changing Cyber Risk (Audio Only)
May 01, 2026
Myanmar's industrial-scale scam operation
Mar 17, 2026
The Hidden Risk of Public Wi-Fi
Mar 12, 2026
CyberIntel S7EP2: Indirect Prompt Injections
Jan 05, 2026
CyberIntel S7EP1: Harvest Now, Decrypt Later — The Quantum Time Bomb
Dec 09, 2025
Cyberattacks Damaging Confidence
Nov 03, 2025
Cybersecurity Isn't Immune to Pressures
Oct 06, 2025
FBI's Internet Crime Report - What You Need to Know
Aug 05, 2025
Having an AI Usage Policy
Jul 08, 2025
MITRE ATT&CK Framework
Jun 10, 2025
VikingCloud's 2025 Cyber Threat Landscape Report
May 06, 2025
Cybercrime Evasion Tactics
Mar 04, 2025
Risk Management with AI-Assisted Tools
Feb 04, 2025
North Korean and Chinese Threat Actors
Jan 07, 2025
IBM X-Force Threat Landscape Report
Dec 13, 2024
Notifiable Data Breaches Report
Nov 26, 2024
BadSpace
Nov 12, 2024
NIST Releases First 3 Finalized Post-Quantum Encryption Standards
Oct 22, 2024
Creating a Cohesive Compliance Program
Aug 27, 2024
Ethical Hacking and Transhumanism
Aug 13, 2024
Attacks With Geopolitical Motives Rise
Jul 30, 2024
The Surge in Regulatory Compliance Through Legislation
Jul 16, 2024
Scams as Old as Time
Jul 09, 2024
The Next Y2K Problem
Jun 18, 2024
The 2024 Cyber Threat Landscape Report
Jun 04, 2024
Labhost
May 21, 2024
What is Considered a Significant Change in PCI DSS v4.0
May 08, 2024
Cyberwarfare
Apr 25, 2024
Artificial Intelligence: Sanity Check
Apr 25, 2024
Geopolitical Tensions and Cybersecurity
Mar 26, 2024
Gartner Top Trends in Cybersecurity for 2024: Emerging Skills
Mar 12, 2024
PCI v4 and What We've Seen So Far
Feb 26, 2024
Internal Vulnerability Scanning
Feb 13, 2024
IBM Cost of a Data Breach Report 2023
Jan 30, 2024
Moon-Shot Cybersecurity Goals
Jan 16, 2024
What a Solid Vulnerability Program Should Look Like
Dec 21, 2023
Gartner Top Cybersecurity Trends for 2023 (Part 2)
Dec 19, 2023
Are Your Cybersecurity Walls Futureproof?
Dec 07, 2023
Gartner Top Cybersecurity Trends for 2023
Dec 05, 2023
Unsafe Consumption of APIs
Nov 21, 2023
APIs and Improper Inventory Management
Nov 07, 2023
Cyberinsurance and War Exclusions
Oct 24, 2023
Ownership in Cybersecurity and Compliance
Oct 24, 2023
FIDO and Quantum Computing
Oct 24, 2023
Cybersecurity Disclosures
Oct 24, 2023
PCI DSS v4.0 Items Noted for Improvement Process
Oct 24, 2023
Multifactor Authentication
Oct 24, 2023
PCI DSS and Certificates of Compliance
Oct 24, 2023
Business Continuity, Planning and Real Risk Scenarios
Oct 24, 2023
NIST SP 800.53 Revision 5
Oct 24, 2023
The Quality of Assessments
Oct 24, 2023
”Loose Lips Sink Ships”
Oct 24, 2023
Demonstrating Compliance
Oct 24, 2023
Threat Modeling
Oct 24, 2023
When Do You Raise Your Hand for Help?
Oct 24, 2023
PCI DSS Vulnerability Scanning
Oct 24, 2023
PCI DSS v3.2.1 and Compensating Controls
Oct 24, 2023
Strong Physical Security
Oct 24, 2023
Voice Over IP and Compliance
Oct 24, 2023
The NIST Phish Scale
Oct 24, 2023
The Risk of the Home Router to Your Business
Oct 24, 2023
Can you be PCI DSS v3.2.1 Compliant Without 4 Passing Vulnerability Scans?
Oct 24, 2023
How Much Data is on your Credit Card, and What Can Be Done with it?
Oct 24, 2023
TLS and PCI DSS Compliance
Oct 24, 2023
Don’t Rest on your Laurels
Oct 24, 2023
Is a Home Office a Sensitive Area for PCI DSS v3.2.1?
Oct 24, 2023
Data Breaches and the Health Sector
Oct 24, 2023
Asset Identification
Oct 24, 2023
The Pandemic Opening Up Gaps
Oct 24, 2023
PCI DSS and Telephone Environments
Oct 24, 2023
PCI DSS v4.0 Arrives
Oct 24, 2023
PCI DSS v4.0 - 2 Approaches for Validation
Oct 24, 2023
Assessment Findings
Oct 24, 2023
The Difference between ISO:27001 and ISO:27002
Oct 24, 2023
ISO:27002 2022 Released
Oct 24, 2023
PCI DSS V4.0 Self-Assessment Questionnaires
Oct 24, 2023
Finding Synergies Between your Compliance Standards
Oct 24, 2023
CIS Controls Version 8
Oct 24, 2023
NIST IR 8374 Ransomware Risk Management - A Cybersecurity Framework Profile
Oct 24, 2023
US Executive Order Number 14028
Oct 24, 2023
Gartner Predictions
Oct 24, 2023
PCI SSC’s Position of Storage of Post-Authorization SAD
Oct 24, 2023
World Economic Forum Global Cybersecurity Outlook 2022 Insight Report
Oct 24, 2023
PCI DSS Network Segmentation
Oct 24, 2023
PCI DSS Gap Analysis
Oct 24, 2023
PCI DSS v4.0 - In Place with Remediation Removed
Oct 24, 2023
PCI DSS v4.0 - Compensating Controls vs. Customized Approach
Oct 24, 2023
World Economic Forum 2023: Cybersecurity Outlook Report
Oct 24, 2023
World Economic Forum - 2023 Cybersecurity Report Findings
Oct 24, 2023
State Sponsored Attacks and Geopolitical Instability
Oct 24, 2023
The History and Future of Zero Trust Architecture
Oct 24, 2023
Small Vendors in the Supply Chain of Larger Firms
Oct 24, 2023
Artificial Intelligence in Cybersecurity
Oct 24, 2023
The AI Black Box Problem
Oct 24, 2023
Cloud Security
Oct 24, 2023
Sharing Credit Card Data Over the Phone
Oct 23, 2023