Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Artwork
 
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Artwork

1
Resilient Cyber

Chris Hughes

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork

1
Stop the World

Australian Strategic Policy Institute (ASPI)

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Everything seems to be accelerating: geopolitics, technology, security threats, the dispersal of information. At times, it feels like a blur. But beneath the dizzying proliferation of events, discoveries, there are deeper trends that can be grasped and understood through conversation and debate. That’s the idea behind Stop the World, the Australian Strategic Policy Institute’s podcast on international affairs and security. Each week, we cast a freeze-frame around the blur of events and bring ...
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Artwork

1
Technology Now

Hewlett Packard Enterprise

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
HPE news. Tech insights. World-class innovations. We take you straight to the source — interviewing tech's foremost thought leaders and change-makers that are propelling businesses and industries forward.
  continue reading
 
Artwork

1
KBKAST

KBI.Media

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber®
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Artwork

1
TechSurge: Deep Tech VC Podcast

Celesta Capital | Deep Tech Venture Capital Firm

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Email feedback and show ideas to [email protected]. Join us as we examine the next major tech cycle, uncover emerging global tech hubs, and analyze where VC investment d ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
  continue reading
 
The Cyber-Savvy Boardroom, a Google Cloud Office of the CISO podcast, offers monthly 15-20 minute episodes featuring security leaders, board members, and thought leaders. Hosted by David Homovich and rotating Office of the CISO members, experts share insights for strategic clarity and improved organizational security. Guests include board members, Google Cloud/Google executives, Office of the CISO Board Insights team members, board advisors, and industry thought leaders.
  continue reading
 
Artwork

1
Ahead of the Threat

Federal Bureau of Investigation

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
  continue reading
 
Artwork

1
Cyber Savvy

DTC, Inc.

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Loading …
show series
 
Nation-states don’t steal data, they wage war. In this episode of Code and Country, former US Intelligence Community CIO, CISO at Bank of America, and Chief Security Officer at Bridgewater Associates, Patrick Gorman exposes how cyber warfare threatens North America’s federal systems, higher education, BFSI, healthcare, and manufacturing sectors. Go…
  continue reading
 
➡ Get full visibility, risk insights, red teaming, and governance for your AI models, AI agents, RAGs, and more—so you can securely deploy AI powered applications with ul.live/mend In this episode, I speak with Bar-El Tayouri, Head of AI Security at Mend.io, about the rapidly evolving landscape of application and AI security—especially as multi-age…
  continue reading
 
In today's episode, Steve speaks with Christopher Sestito (also known as Tito), chairman of the board, CEO, and co-founder of Hidden Layer, a cybersecurity startup dedicated to preventing adversarial machine learning attacks. Tito shares his perspective on where the business world is currently when it comes to AI and cybersecurity. He also gives hi…
  continue reading
 
In this podcast, Dave Erickson and his knowledgeable co-host Botond Seres; are going to look for Cyber-Fraud and see how to deal with it, with Jason Costain the Director at Javloc Ltd. With over 25 years of leadership experience in safeguarding corporate assets, he has worked with some of the UK’s largest banks - to streamline operational fraud ris…
  continue reading
 
Join The Audit for a news-packed episode as cybersecurity expert Matt Starland recounts a chilling near-miss with an E-Z Pass phishing scam—received just minutes after renting a car in Florida. His close call highlights how scammers exploit timing and context to deceive even seasoned professionals. In this episode, we discuss: How a security pro ne…
  continue reading
 
Cybersecurity Today: Disney Data Theft, Signal Gate, and Major Apple Vulnerability In this episode of Cybersecurity Today, host David Shipley discusses several key security incidents. Hacker 'Null Bulge,' real name Ryan Kramer, pleads guilty to stealing over 1.1 TB of data from Disney's Slack via malware disguised as an AI image generation tool. Ad…
  continue reading
 
Join us as we explore the transformative changes in software development and cybersecurity due to AI. We discuss new terminology like ‘vibe coding’ — a novel, behavior-focused development approach, and ‘MCP’ (Model Context Protocol) — an open standard for AI interfaces. We also address the concept of ‘slopsquatting,’ a new type of threat involving …
  continue reading
 
Join us as we explore the transformative changes in software development and cybersecurity due to AI. We discuss new terminology like 'vibe coding' — a novel, behavior-focused development approach, and 'MCP' (Model Context Protocol) — an open standard for AI interfaces. We also address the concept of 'slopsquatting,' a new type of threat involving …
  continue reading
 
Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro interviews Aaron and discusses id…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love is joined by roving correspondent David Shipley to discuss his experiences at the BSides and RSAC conferences. They dive into the significant takeaways from BSides, including highlights from notable presentations such as Truffle Hog's AI Apocalypse and Eva Galperin's talk on the 'World's Dumbest…
  continue reading
 
In this episode Spencer and Brad review the M-Trends 2025 Report. M-Trends 2025 is Mandiant's annual report that shares frontline learnings from its global incident-response engagements—over 450 000 hours of investigations in 2024—providing sanitized, data-driven analysis of evolving attacker tactics, dwell times, industry and regional trends, and …
  continue reading
 
In this episode, host Jim Love discusses various cybersecurity topics including a book deal from CRC Press for those interested in cybersecurity, auditing, and leadership. Major cyber incidents involving two UK retailers, Co-op and Marks & Spencer's, are detailed, highlighting the challenges they face. Apple's notifications to users in 100 countrie…
  continue reading
 
In this episode of the Cyber Uncut podcast, host Liam Garman is joined by Lumify lead cyber security instructor Louis Cremen and cyber security lead Jeremy Daly. Together, they unpack the essential cyber security skill sets different organisations need – and how businesses can ensure their teams stay ahead of evolving threats. The discussion kicks …
  continue reading
 
In this eye-opening kickoff to Season 6, Darnley dives into the hidden world of surveillance capitalism—where your clicks, swipes, and searches are turned into profit. You ARE the product. Discover how data profiling shapes your digital life, influences what you see, and quietly sells your behaviour to the highest bidder. Real-world examples, pract…
  continue reading
 
What’s the current state of the cybersecurity world? This week, Technology Now explores the biggest threats we currently face, the way companies and businesses are securing themselves, and the future of cybersecurity. Our reporter, Jaye Tillson, is at the RSA Conference in San Francisco where he is joined by Jon Green, Chief Technology Officer and …
  continue reading
 
TechnoVision 2025 by Capgemini helps business leaders and technologists understand and prioritize emerging technologies. It provides a clear view of tech trends, guiding decision-makers to enhance organizational effectiveness. TechnoVision acts as a beacon in the evolving technology landscape. In this very special episode, Dave, Esmee, and Rob talk…
  continue reading
 
As Australians head to the polls, David Wroe interviews two of the best minds on the intersection of Australian politics and global affairs - the ABC 7.30 program's political editor Laura Tingle and The Age's political and international editor, Peter Hartcher. As well as their reflections on the substance of the election campaign, the conversation …
  continue reading
 
Rural Healthcare and small/midsized businesses are being tipped over the edge. Not by Tariffs or high interest rates, but by investments needed into protecting their people and systems from disruption. How can you protect yourself from something you don’t know? A risk you don’t understand. What if you could think like a hacker… and use that power t…
  continue reading
 
Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem Die zweite EU-Richtlinie zur Netzwerk- und Informationssicherheit (NIS 2) ist nun in Kraft und von der Richtlinie betroffene Großunternehmen arbeiten intensiv daran, deren strenge Auflagen zu erfüllen. Was sind jedoch die Konse…
  continue reading
 
Register for upcoming webcasts & summits - https://poweredbybhis.com 00:00 - PreShow Banter™ — Talking Bout Red Green 02:24 - InfoSec CEO Charged with Installing Malware! – BHIS - Talkin’ Bout [infosec] News 2025-04-28 03:01 - Story # 1: CEO of cybersecurity firm charged with installing malware on hospital systems 11:22 - Story # 2: 2025 Data Breac…
  continue reading
 
Are you an expert in communications? Do you need communications help? Are you ready for how to communicate to employees, the government, or your customers if a crisis happens? Many agencies believe they have it covered, but when a crisis does happen, the reality comes into focus that communications is a more nuanced and involved part of a response.…
  continue reading
 
Is your identity at risk? And what would you do if someone was using it to take out credit cards, steal your tax refund, or even raid your bank account? Enjoy this replay of interviews with Tiffany, Pete, and Astrid, three victims of identity theft. Even though this episode originally aired in 2022, the same lessons remain. Listen to hear about how…
  continue reading
 
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Marco Ivaldi, co-founder and technical director of HN Security, a boutique company specializing in offensive security services, shares his journey from hacking as a teenager in the '80s to becoming a key figure in the security research community. With nearly …
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love discusses several major cybersecurity events. Two members of Elon Musk's 'Department of Government Efficiency' reportedly gained access to classified US nuclear networks, though accounts were never activated. Nova Scotia Power faces a cyber attack affecting customer services but not critical inf…
  continue reading
 
In this episode, we sit down with Chris Peake, Chief Information Security Officer (CISO) and Senior Vice President of Security at Smartsheet, as he explores what lies ahead for cybersecurity in Australia and its impact on businesses in 2025. Chris discusses the evolving role of AI—both as a tool for cyber adversaries and as an advantage for defende…
  continue reading
 
In this eye-opening episode of Reimagining Cyber, host Tyler Moffitt is joined by Tom Tovar, co-creator of cybersecurity company Apto, to unpack one of the fastest-growing threats in mobile security—deepfakes and biometric bypass attacks. Tom explains why facial recognition, once considered a reliable security measure, was never designed to withsta…
  continue reading
 
Why did a mysterious empty "inetpub" directory appear after April's Patch Tuesday? And what new Windows Update crashing hack did this also create? North Korea is now creating fake US companies to lure would-be employees. The "Inception" attack subverts all GPT conversational AIs. New information about data loss in unpowered SSD mass storage. Lots o…
  continue reading
 
Today, Steve talks about ISF's flagship foresight report "Threat Horizon 2027: Grasping for Control." In a world defined by disruption and acceleration, this report offers not just a forecast of cyber threats, but a blueprint for resilience, and Steve walks listeners through the key themes. Key Takeaways: 1 Flexibility will be key in an increasingl…
  continue reading
 
Podcast: Cyber Mindsz Host: Mark Williams Guest: Suthagar Seevaratnam Episode Title: Leadership, Trust & the Future of Cybersecurity in a Changing World with Suthagar Seevaratnam 🔗 Links Mentioned Throughout the Podcast 🌐 Quigly Website - https://www.quigly.com.au/ 👤 Mark Williams – Host LinkedIn - https://www.linkedin.com/in/markwilliamsmelbourne/…
  continue reading
 
Podcast: Cyber Mindsz Host: Mark Williams Guest: Maryam Shoraka Episode Title: Bridging Cultures and Cybersecurity – A Conversation with Maryam Shoraka 🔗 Links Mentioned Throughout the Podcast 🌐 Quigly Website - https://www.quigly.com.au/ 📖 Rebel Ideas by Matthew Syed - https://www.matthewsyed.co.uk/book/rebel-ideas-the-power-of-diverse-thinking/ 👩…
  continue reading
 
The boundary between physical and cybersecurity is rapidly disappearing, creating both challenges and opportunities for security professionals across domains. This eye-opening conversation with Casey Rash from Secure Passage explores how modern physical security devices have evolved into sophisticated IoT endpoints generating valuable security data…
  continue reading
 
In this episode of 'Cybersecurity Today', host David Shipley covers multiple key stories: Veritaco CEO Jeffrey Bowie is charged with attempting to infect a hospital with malware. Global Chief Information Security Officers (CISOs) call on world governments to harmonize cybersecurity regulations. Issues arise with Microsoft's recent 'Mystery Folder' …
  continue reading
 
What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in the cybersecurity industry, and the recent launch of the CVE Foundation. We also discuss the Trump Administration’s executive order that revoked the security clearan…
  continue reading
 
We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation …
  continue reading
 
Loading …
Listen to this show while you explore
Play