Remote work is great for many reasons. But for hackers, it is another opportunity for attack. How to protect your remote users and secure remote desktops?
Is there a threat in the cloud?
Have you ever asked yourself why there are so many news articles describing identity theft, business email compromises, phishing campaigns, deepfakes, and so on? The reason behind this is the shift in the IT field and... more
Cybersecurity analysts have already identified malware that was specifically developed to attack Ukraine. HermeticWiper or Whisper Gate malware is known and being used in cyberwarfare.
Do these technologies also pose a threat to entities that have n... more
Jakob Premrn, CySA+, CCNP, Security+, RHCSA, is a cybersecurity analyst at NIL´s Security Operations Center (SOC). He mostly deals with security incidents. He is an expert for the SIEM, NDR, and EDR tools. He specializes in Microsoft technologies, bu... more
Choosing a Managed Detection and Response (MDR) service provider is very important, yet tricky task. Matevž Mesojednik, SOC Lead at NIL, explains some of the essential criteria for evaluating the quality and credibility of MDR providers.
Tackling cyber-attacks “ad-hoc” with no adequate knowledge of how to respond to an incident is never a good reaction. So what should you do when you are under a cyber attack?
Industrial environments are a special challenge for IT security. What we have noticed so far is that there are many misconfigurations and potentially risky communication paths that our clients are unaware of. Let me give you just an example, OT works... more
Jakob Premrn, cybersecurity expert at NIL, part of Conscia Group, explains what is Ransomware, why is it so profitable and how to defend against it.
How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.
Apple Podcasts | #57 |










Listeners, social reach, demographics and more for this podcast.
| Gender Skew | Location | Interests | |||
|---|---|---|---|---|---|
| Professions | Age Range | Household Income | |||
| Social Media Reach | |||||
Rephonic provides a wide range of podcast stats for CyberSec Bites. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to CyberSec Bites and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.
Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for CyberSec Bites, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.
Rephonic provides comprehensive predictive audience data for CyberSec Bites, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.
To see how many followers or subscribers CyberSec Bites has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.
CyberSec Bites launched 4 years ago and published 10 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.
Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.
Rephonic pulls ratings and reviews for CyberSec Bites from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.
View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.
Rephonic provides full transcripts for episodes of CyberSec Bites. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.