The purpose of the Skeptical Analyst podcast is to offer my opinions, remarks, and contemplations about issues at the intersection of the insurance industry, technology, society, and cyber risks.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
…
continue reading
Every Tuesday, NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading

1
The TWIML AI Podcast (formerly This Week in Machine Learning & Artificial Intelligence)
Sam Charrington
Machine learning and artificial intelligence are dramatically changing the way businesses operate and people live. The TWIML AI Podcast brings the top minds and ideas from the world of ML and AI to a broad and influential community of ML/AI researchers, data scientists, engineers and tech-savvy business and IT leaders. Hosted by Sam Charrington, a sought after industry analyst, speaker, commentator and thought leader. Technologies covered include machine learning, artificial intelligence, de ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
Hosted by two former federal agents who investigated computer crime, this is a technology Podcast covering Computer Security, Computer Crime and Computer Forensics Topics.
…
continue reading
Dipanshu Parashar is a Blogger || influencer || Author || digital marketer. He brings out the best tech stories and shares the difficult moments which made his journey a huge success. He is currently India's youngest Cybersecurity author and security analyst.
…
continue reading
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
Experiments in Risk Science
…
continue reading
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
Welcome to Sibylline Insight, the podcast where we delve into the intricate world of global intelligence and geopolitics. Join our hosts as they sit down with members of the Global Intelligence Team to provide in-depth analysis and context to the most pressing geopolitical developments of our time. Each episode features long-form interviews that unravel the complexities behind current events, offering listeners a unique perspective on international affairs. Whether you’re a seasoned analyst ...
…
continue reading
“When men have realized that time has upset many fighting faiths, they may come to believe even more than they believe the very foundations of their own conduct that the ultimate good desired is better reached by free trade in ideas — that the best test of truth is the power of the thought to get itself accepted in the competition of the market” - Supreme Court Justice Oliver Wendell Holmes Jr., Abrams v. United States (1919) Some of the most important issues that face society today are diff ...
…
continue reading
Follow Investigative Reporter Robert Riggs into the darkest corners of the criminal mind.
…
continue reading
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Shelly Kramer, managing director and principal analyst at #theCUBEResearch, is joined by Jo Peterson, VP of cloud and security services at #Clarify360 and a member of #theCUBECollective community of independent analysts. Check out theCUBE for the latest in enterprise tech https://siliconangle.com/category/cube-event-coverage/
…
continue reading
The H4unt3d Hacker podcast is an idea that came to be from a conversation over a glass of bourbon. We bring you REAL talk about cybersecurity. Want to know how hackers see the world and events? Then tune in and go on a trip with the H4unt3d Hackers in their hoppin H4unt3d house. Mike Jones "H4unt3d" Mike is a former hacktivist, red teamer, SIGINT operator and intelligence analyst. Mike left the world of illegal hacking to help businesses and individuals learn how and why they are attacked an ...
…
continue reading
A gripping financial technology spy thriller. Produced by a former CIA officer. *****YOU CAN NOW BINGE SEASON 1. SEASON 2 IS FORTHCOMING***** The story: Jabbari Lincoln is the CIA’s top financial analyst. He happens to be Muslim. And he’s at the top of his professional game when he is unfairly suspected of being disloyal to the United States and gets suspended by the Agency. Dejected and disgraced, he takes on a central bank consulting gig in Nigeria. But as he uncovers a sophisticated cyber ...
…
continue reading
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
…
continue reading
A Federal Security & Compliance career is a very rewarding career - we get the honor and privilege of protecting some of the most guarded assets of our great country. However, it doesn’t come without a cost. We often take the brunt of the beating when it comes to the regulations that are impeding innovation. Join federal security professional Max Aulakh as he distills the challenges facing our career field, pulling back the curtain on culture, emerging technical knowledge, ATOs, CMMC and var ...
…
continue reading
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
…
continue reading
The CIO Evolution, a CXO REvolutionaries podcast sponsored by Zscaler CIOs are a special breed of executive: the Swiss Army Knife of leaders. They lead the innovation agenda and use technology to power the capabilities that deliver business outcomes. This podcast covers the art and science of business transformation and the tools CIOs use: cloud, mobile, AI, zero trust. More importantly, it investigates the true essence of digital leadership.
…
continue reading
Offical Podcast feed for SiliconANGLE Media's podcast where our hosts and guests reflect upon the many events the CUBE provides coverage for. @theCUBE@dvellante@stu@furrier
…
continue reading

1
Will the Cyber Risk Space Mature or Stabilize?
9:26
9:26
Play later
Play later
Lists
Like
Liked
9:26Send us a text I discuss my reasons for why the cyber risk space maturing or stabilizing will never happen. My LinkedIn home page is: https://www.linkedin.com/in/barryrabkin/ ----------------------- The first book I wrote about the insurance industry and technology is titled: "From Stone Tablets to Satellites: The Continual Intimate but Awkward Rel…
…
continue reading

1
The Great Digital Crackdown of 2025: Inside the Global Fight Against Cybercrime
15:56
15:56
Play later
Play later
Lists
Like
Liked
15:562025 saw unprecedented international law enforcement efforts shatter major cybercrime networks like the LummaC2 infostealer, the Cracked and Nulled forums, the 8Base ransomware gang, and the Zservers bulletproof hosting service. These coordinated operations, involving over 20 nations and resulting in thousands of server seizures, disrupted criminal…
…
continue reading

1
Navigating the AI Compliance Maze: Building Trustworthy Systems in a Regulated World
18:20
18:20
Play later
Play later
Lists
Like
Liked
18:20Artificial intelligence is rapidly transforming industries, but its increasing power necessitates robust governance and compliance. This episode delves into the evolving global regulatory landscape, exploring key frameworks like the EU AI Act and the NIST AI Risk Management Framework that aim to ensure AI systems are safe, transparent, and accounta…
…
continue reading

1
AI & The SOC Analyst: From Alert Fatigue to Augmentation
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51Discover how Artificial Intelligence is reshaping the demanding world of the Security Operations Center, moving beyond the overwhelming volume of alerts and analyst burnout that plague traditional SOCs. We explore how AI automates routine tasks, enhances threat detection, and accelerates incident response, freeing up human analysts for higher-value…
…
continue reading

1
CR100: Intelligence age ethics (in 2025) with James Wilson and Philip Harker [AAA]
1:11:13
1:11:13
Play later
Play later
Lists
Like
Liked
1:11:13[AAA] In 'Access All Areas' shows we go behind the scenes with the crew and their friends as they dive into complex challenges that organisations face—sometimes getting a little messy along the way. This week, in what may or may not be our 100th episode, Dave, Esmee and Rob talk to James Wilson, AI Ethicist and Lead Gen AI Architect and Philip Hark…
…
continue reading

1
RAG Risks: Why Retrieval-Augmented LLMs are Not Safer with Sebastian Gehrmann - #732
57:09
57:09
Play later
Play later
Lists
Like
Liked
57:09Today, we're joined by Sebastian Gehrmann, head of responsible AI in the Office of the CTO at Bloomberg, to discuss AI safety in retrieval-augmented generation (RAG) systems and generative AI in high-stakes domains like financial services. We explore how RAG, contrary to some expectations, can inadvertently degrade model safety. We cover examples o…
…
continue reading

1
The Threat Evolution: SAP Exploits, SEO Poisoning, and SkitNet Malware
29:03
29:03
Play later
Play later
Lists
Like
Liked
29:03Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Joey along with intelligence analysts John and Hayden as they discuss: ReliaQuest's investigation into hijacked routers and SEO poisoning fueling payroll heists Nation-state actors leveraging the SAP NetWeaver vulnerability en masse A new "Defendnot" tool that tricks Windows Defender into …
…
continue reading

1
Cloud Threat Deep Dive: Learning Resilience from Real-World Breaches
14:34
14:34
Play later
Play later
Lists
Like
Liked
14:34Explore the latest cloud security landscape by analyzing recent real-world breach cases from the CSA Top Threats Deep Dive. We dive into the technical details, business impacts, and contributing factors like misconfigurations, inadequate identity management, and supply chain weaknesses. Gain crucial insights and actionable takeaways to enhance your…
…
continue reading
In this episode of Risk & Reels, Jeffrey Wheatman sits down with RJ Friedman, CEO of Dayone Cyber, to talk frameworks, risk, and leadership. RJ shares how his start in sales shaped his approach as a CISO, why CIS 18 remains his go-to, and how mapping frameworks to business goals makes all the difference. It's a sharp, honest look at what makes cybe…
…
continue reading

1
The Weakest Link: Navigating the Perilous Digital Supply Chain
16:53
16:53
Play later
Play later
Lists
Like
Liked
16:53In today's interconnected world, supply chains are increasingly vulnerable to sophisticated cyberattacks. This episode explores the primary threats impacting these vital networks, from exploiting trust relationships with third-party vendors to the dangers of malware and compromised software. We'll discuss the pervasive threat of ransomware attacks,…
…
continue reading

1
Ep. 173 CrowdStrike Layoffs, AI Missteps, and Industry Shakeups
1:15:19
1:15:19
Play later
Play later
Lists
Like
Liked
1:15:19Learn how you can work with me one on one to secure a $90K+ cybersecurity role: link: https://techtualconsulting.tech/video-training ------------------------------------------------------------------------------------ In this episode, HD and CyberShortiee break down CrowdStrike's recent layoffs, Change HealthCare's breach update, major cybersecurit…
…
continue reading

1
Bridging the Gap: Translating Cyber Risk for the Boardroom
13:37
13:37
Play later
Play later
Lists
Like
Liked
13:37Welcome to "Bridging the Gap: Translating Cyber Risk for the Boardroom." In today's complex digital landscape, Chief Information Security Officers (CISOs) face the crucial challenge of communicating intricate technical risks in a way that resonates with executive leaders and board members. This podcast explores how CISOs can effectively translate t…
…
continue reading

1
The Resilient CISO: Navigating Stress and Sustaining Security Leadership
12:47
12:47
Play later
Play later
Lists
Like
Liked
12:47The role of the Chief Information Security Officer (CISO) is more critical and demanding than ever, placing leaders in a persistent high-stress environment. This podcast delves into the unique pressures faced by CISOs and cybersecurity professionals, including the immense responsibility and potential for blame, resource constraints, excessive workl…
…
continue reading

1
Converging Worlds: Securing IoT, OT, and Critical Infrastructure
27:32
27:32
Play later
Play later
Lists
Like
Liked
27:32The digital transformation journey in critical infrastructure organizations and other sectors like healthcare is increasingly connecting operational technology (OT) and integrating Internet of Things (IoT) devices. While this convergence of OT and IT creates efficiencies, it also introduces new vulnerabilities and expands the attack surface for cyb…
…
continue reading

1
Zero Trust for Critical Infrastructure: Securing the OT/ICS Backbone
35:28
35:28
Play later
Play later
Lists
Like
Liked
35:28Delve into the essential and intricate application of Zero Trust (ZT) principles within Operational Technology (OT) and Industrial Control Systems (ICS) environments. This episode explores the unique challenges of securing critical infrastructure, where safety, reliability, and availability are primary objectives, and legacy systems, unique protoco…
…
continue reading

1
Cyber Resilience Through Bundling: The Regulatory Challenge
17:53
17:53
Play later
Play later
Lists
Like
Liked
17:53Explore the emerging practice of bundling cyber insurance with security products and services, a strategy aimed at enhancing cyber resilience by incentivizing policyholders to adopt proactive security measures from the outset. This episode delves into the potential benefits, such as encouraging better cyber hygiene, aligning the long-term goals of …
…
continue reading

1
CR099: UK Government sustainability & AI with Liam Walsh and Paul Mukherjee, Defra
40:22
40:22
Play later
Play later
Lists
Like
Liked
40:22Understanding the true environmental cost of digital innovation is crucial for governments aiming to embed sustainability into their digital delivery processes. Governments are embedding sustainability into the heart of digital delivery. Can governments ensure that their digital advancements contribute positively to the environment while maintainin…
…
continue reading

1
Beyond the URL: Decoding Domain Intelligence Threats in 2024
14:40
14:40
Play later
Play later
Lists
Like
Liked
14:40In the ever-evolving digital landscape, security teams face the immense challenge of evaluating over a hundred million newly observed domains registered each year. This episode dives into how analytical methods are providing crucial insights into domain intelligence threats. We explore techniques like domain attribute analysis to identify patterns …
…
continue reading
Ransomware groups continue to generate significant profits, frequently relying on recycled or leaked code—leading researchers to describe them as “lazy.” OSINT analysts follow cryptocurrency transactions to trace financial trails, while effective defense depends on early detection, system-level visibility, and staying alert to shifts in attacker te…
…
continue reading

1
Will US Politics Reshape Russian Cyber Threats?
27:59
27:59
Play later
Play later
Lists
Like
Liked
27:59Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Hayden as they discuss: ReliaQuest's Forecast for How US Policy will Impact Russia-linked Cyber Threats Infostealers Spread by Fake AI Video Generators Kickidler Abuse by Ransomware Groups FBI Takedown of Huge Botnet Kim Bromley: Senior Cyber T…
…
continue reading

1
EP09 Thomas Roccia - AI, Data Visualization, and the Future of Security Research
1:08:07
1:08:07
Play later
Play later
Lists
Like
Liked
1:08:07In this episode, we’re joined by Thomas Roccia, a security researcher at Microsoft. Thomas discusses the growth of the Unprotect Project, how AI is changing security research, and the impact of data visualizations for conveying technical information. Drawing on his experience, Thomas offers a unique perspective on the intersection of open-source co…
…
continue reading

1
From Prompts to Policies: How RL Builds Better AI Agents with Mahesh Sathiamoorthy - #731
1:01:25
1:01:25
Play later
Play later
Lists
Like
Liked
1:01:25Today, we're joined by Mahesh Sathiamoorthy, co-founder and CEO of Bespoke Labs, to discuss how reinforcement learning (RL) is reshaping the way we build custom agents on top of foundation models. Mahesh highlights the crucial role of data curation, evaluation, and error analysis in model performance, and explains why RL offers a more robust altern…
…
continue reading

1
US State Privacy Laws: Navigating the Expanding Consumer Rights Patchwork
45:55
45:55
Play later
Play later
Lists
Like
Liked
45:55Explore the complex and rapidly evolving landscape of US state data privacy laws, drawing on insights from recent legislative developments across states like California, Colorado, Connecticut, Delaware, Florida, Indiana, Iowa, Montana, Nebraska, New Hampshire, New Jersey, Oregon, Tennessee, and Texas, plus Washington's focused health data act. We b…
…
continue reading

1
The Rock: Alcatraz’s Chilling True Crime Legacy
47:49
47:49
Play later
Play later
Lists
Like
Liked
47:49Alcatraz shut its cell doors more than 60 years ago, but its grip on the American imagination hasn’t loosened. Each year, nearly a million and a half tourists ride the ferry across San Francisco Bay, through cold, choppy waters, to walk the crumbling corridors of the most infamous prison in U.S. history. Visitors today frequently cite the desire to…
…
continue reading

1
Season 1 - Episode 6 (Pedro Kertzman & Aaron Roberts)
1:11:44
1:11:44
Play later
Play later
Lists
Like
Liked
1:11:44What happens when you combine the precision of open-source intelligence with the strategic focus of cyber threat intelligence? Aaron Roberts, founder of Prospective Intelligence and author of "Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers," reveals the powerful intersection where these disciplines meet. Aaron's jo…
…
continue reading

1
Beyond Encryption: Ransomware's New Game & Top Exploits of 2024
18:22
18:22
Play later
Play later
Lists
Like
Liked
18:22Tune in to explore the rapidly evolving cyber threat landscape of 2024 from Huntress 2025 global Cyber Threat Report, where attackers standardized sophisticated techniques across businesses of all sizes. We dissect the significant shifts in ransomware strategies, including the fragmentation of major groups following takedowns like LockBit, Dharma, …
…
continue reading

1
The Accelerating Threat Landscape: Inside Modern Cybercrime
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39Delve into the complex and rapidly transforming world of cyber threats. This episode examines notorious ransomware groups like Black Basta, LockBit, BlackCat/ALPHV, Phobos/8Base, Medusa, and Clop, exploring their Ransomware-as-a-Service (RaaS) models and distinctive tactics, techniques, and procedures (TTPs). We also discuss state-sponsored cyber w…
…
continue reading

1
E7 - Where SSE Falls Short: A Deep Dive into Last-Mile Security Gaps
23:02
23:02
Play later
Play later
Lists
Like
Liked
23:02🔍 Are SSEs Really Securing the Last Mile? In this episode, we break down the hidden architectural gaps in Security Service Edge (SSE) platforms—specifically where they fall short in protecting the browser, where today’s real threats unfold. 📉 Despite vendor claims, SSEs are blind to: Copy/paste data leakage Malicious browser extensions Shadow SaaS …
…
continue reading

1
Cybersecurity Unpacked: Breaches, Billions, and AI's Double Edge
10:34
10:34
Play later
Play later
Lists
Like
Liked
10:34In this episode, we dive into the recent developments shaping the cybersecurity landscape as of May 2025. We discuss major incidents like the significant breach of the LockBit ransomware gang, which exposed sensitive data including negotiation messages and user credentials. We'll also explore the growing sophistication of financial cyberattacks, hi…
…
continue reading

1
The Accelerating Adversary: Inside the 2025 Threat Landscape
13:52
13:52
Play later
Play later
Lists
Like
Liked
13:52Join us for a deep dive into the Global Threat Landscape Report 2025 by FortiGuard Labs. This episode explores the dramatic escalation in cyberattacks, revealing how adversaries are moving faster than ever, leveraging automation, commoditized tools, and AI to gain advantage. We'll shed light on the surge in automated reconnaissance, the evolving da…
…
continue reading

1
2025 Cyber Attack Playbooks: Navigating the Future Threat Landscape
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13This podcast delves into the critical insights found within the 2025 Cybersecurity Attacks Playbooks, exploring the diverse and evolving threat landscape organizations face. We examine playbooks covering threats from AI-enhanced phishing and advanced ransomware to the complexities of supply chain compromises, zero-day exploits, and AI-powered malwa…
…
continue reading

1
Ep. 172 The Truth about Networking Careers: Network Engineering vs Networking Security
1:35:42
1:35:42
Play later
Play later
Lists
Like
Liked
1:35:42Check out our Sponsor SNHU to learn more about their cybersecurity degree program https://snhu.edu/techtual Welcome to another exciting episode of The TechTual Talk, where we dive deep into the world of tech careers and the extraordinary people who make it happen! In this episode, our host HD sits down with the phenomenal Lise, also known as Certif…
…
continue reading

1
Beyond the Scan: Unmasking Hidden Risks and Unfixed Flaws in the Age of AI
20:13
20:13
Play later
Play later
Lists
Like
Liked
20:13In this episode, we dive deep into the findings of the State of Pentesting Report 2025 to explore the real state of cybersecurity. Organizations may feel confident, but pentesting consistently reveals hidden, exploitable vulnerabilities that automated scanners miss. We'll uncover the most significant risks identified through human-led pentests, fro…
…
continue reading

1
CR098 Knowledge 2025 special, part 2: Key ServiceNow announcements with Amanda Joslin, ServiceNow
1:00:55
1:00:55
Play later
Play later
Lists
Like
Liked
1:00:55At Knowledge 2025, the spotlight is on big announcements and bold innovations—but we’re taking you behind the scene!. In this two-part special, we dive into the engine driving ServiceNow’s evolution, with exclusive conversations you won’t hear on the main stage. In Part 2, Dave, Esmee, and Rob speak with Amanda Joslin, Senior Director of Platform a…
…
continue reading

1
CR097 Knowledge 2025 special, part 1: How to drive successful innovation at scale with Karel van der Poel, ServiceNow
1:02:06
1:02:06
Play later
Play later
Lists
Like
Liked
1:02:06At Knowledge 2025, the spotlight is on big announcements and bold innovations—but we’re taking you behind the scene!. In this two-part special, we dive into the engine driving ServiceNow’s evolution, with exclusive conversations you won’t hear on the main stage. In Part 1, Dave, Esmee, and Rob sit down with Karel van der Poel, SVP of Products at Se…
…
continue reading

1
Scattered Spider Strikes Again, Hunt for North Korean Insiders Heats Up
28:08
28:08
Play later
Play later
Lists
Like
Liked
28:08Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analyst John and threat hunter Tristan as they discuss: Scattered Spider Attacks UK Retail Orgs Bring Your Own Installer SentinelOne Bypass Hunting for North Korean Insiders Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research …
…
continue reading

1
Building Cyber Warriors: The Evolving Cyber Professional
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42In the dynamic world of cybersecurity, professionals face constant challenges that demand adherence to strict ethical and legal guidelines. This episode delves into the key ethical and legal considerations, such as protecting individual privacy, ensuring robust data protection, maintaining confidentiality, and complying with relevant laws and regul…
…
continue reading
In this episode of Risk & Reels, Jeffrey Wheatman sits down with Craig Taylor, CEO of CyberHoot, to talk about how small businesses are navigating the evolving world of cybersecurity compliance—especially the demanding standards of CMMC. From Apollo 13-style ingenuity to the unintended consequences of regulation, Craig shares a 30-year perspective …
…
continue reading

51
How OpenAI Builds AI Agents That Think and Act with Josh Tobin - #730
1:07:27
1:07:27
Play later
Play later
Lists
Like
Liked
1:07:27Today, we're joined by Josh Tobin, member of technical staff at OpenAI, to discuss the company’s approach to building AI agents. We cover OpenAI's three agentic offerings—Deep Research for comprehensive web research, Operator for website navigation, and Codex CLI for local code execution. We explore OpenAI’s shift from simple LLM workflows to reaso…
…
continue reading

1
The Iceberg Impact: Unpacking the Hidden Costs of Cyber Attacks
16:24
16:24
Play later
Play later
Lists
Like
Liked
16:24Join us as we delve into the complex and pervasive world of cyber risk, exploring the threats, vulnerabilities, and far-reaching consequences for organizations today. Drawing on insights from experts, we'll discuss how cyber attacks can lead to outcomes ranging from regulatory fines and reputational loss to the complete failure of a business. Go be…
…
continue reading

1
The Click That Opens The Door To Cyber Hell
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46You Just Thought Your Home Was Safe By Robert Riggs You lock your doors at night. You check on your kids. But what if the real threat is already inside—hiding in your phone, your smart TV, or your child’s video game chat? In this episode of True Crime Reporter®, former federal probation officer Art Bowker takes us into the digital battlefield unfol…
…
continue reading

1
The MAESTRO Framework: Layering Up Against MAS Security Threats
44:05
44:05
Play later
Play later
Lists
Like
Liked
44:05Multi-Agent Systems (MAS), characterized by multiple autonomous agents coordinating to achieve shared goals, introduce additional complexity and expand the attack surface compared to single-agent systems. This episode delves into the unique security challenges presented by MAS, drawing on the OWASP Agentic Security Initiative's MAESTRO (Multi-Agent…
…
continue reading

1
E6 - Browser extensions are everywhere - but are they safe for enterprise use?
11:43
11:43
Play later
Play later
Lists
Like
Liked
11:43In this episode, we explore the hidden risks posed by one of the most overlooked elements of the modern enterprise tech stack: browser extensions. In this episode we will unpack key insights from the newly released Enterprise Browser Extension Security Report 2025 - a data-driven look into how widely-used browser extensions are impacting enterprise…
…
continue reading

1
Unmasking the Unseen: Building and Benefiting from Behavioral Threat Hunting
25:40
25:40
Play later
Play later
Lists
Like
Liked
25:40In today's complex threat landscape, adversaries are constantly evolving their tactics to evade traditional defenses. Behavioral threat hunting offers a proactive methodology to identify cyber threats that have infiltrated systems undetected and disrupt them before they cause significant damage, ultimately reducing attacker "dwell time". This episo…
…
continue reading

1
Beyond the Prompt: Navigating the Threats to AI Agents
22:57
22:57
Play later
Play later
Lists
Like
Liked
22:57AI agents, programs designed to autonomously collect data and take actions toward specific objectives using LLMs and external tools, are rapidly becoming widespread in applications from customer service to finance. While built on LLMs, they introduce new risks by integrating tools like APIs and databases, significantly expanding their attack surfac…
…
continue reading

1
Space Under Pressure: Geopolitical Threats and the Evolving Cosmos (2025)
27:41
27:41
Play later
Play later
Lists
Like
Liked
27:41Drawing on open-source information and eight years of collected data, the CSIS Aerospace Security Project's 2025 Space Threat Assessment explores the key developments in foreign counterspace weapons and the evolving security landscape in Earth orbit. This assessment highlights how space is becoming a more dangerous place and is increasingly woven i…
…
continue reading

1
Ep. 171 The Truth About Cyber Security Careers: Bootcamps, AI, and GRC
1:41:59
1:41:59
Play later
Play later
Lists
Like
Liked
1:41:59Check out our Sponsor SNHU to learn more about their cybersecurity degree program https://snhu.edu/techtual Welcome to episode 171 of The TechTual Talk! In this electrifying crossover, hosts HD and Cybershortieee link up with Daniel and Victoria from HackerProofHQ Podcast for an episode packed with deep insights and lively banter about breaking int…
…
continue reading

1
The Price of Protection: Budgeting for Essential Cyber Hygiene (CIS IG1)
14:26
14:26
Play later
Play later
Lists
Like
Liked
14:26This episode explores the costs associated with implementing essential cyber hygiene as outlined by the CIS Critical Security Controls Implementation Group 1 (IG1). We delve into the different approaches enterprises can take – utilizing on-premises tools, leveraging Cloud Service Providers (CSPs), or partnering with Managed Service Providers (MSPs)…
…
continue reading

1
CR096 TechnoVision 2025: Your gateway to cutting-edge innovation with Data-Powered Innovation Jam podcast
1:31:45
1:31:45
Play later
Play later
Lists
Like
Liked
1:31:45TechnoVision 2025 by Capgemini helps business leaders and technologists understand and prioritize emerging technologies. It provides a clear view of tech trends, guiding decision-makers to enhance organizational effectiveness. TechnoVision acts as a beacon in the evolving technology landscape. In this very special episode, Dave, Esmee, and Rob talk…
…
continue reading
Discover how AI is revolutionizing OSINT, from speeding up data collection to generating comprehensive reports, while also addressing the challenges and ethical considerations. Hosts AJ and Robert dive deep with Lance James, discussing real-world insights and the potential for misuse.By Authentic8
…
continue reading