Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
In a community of likeminded individuals in the firearms, and self-protection industry, Evolution Security instructors Eric Davis, Brian Schilt and Aaron Davis believe in a renaissance approach and philosophy. Focusing on teaching, educating, and informing everyday people on the path of defense and health. You will hear case studies on the judicious use of force and statistics that are far too often ignored by the mainstream media. There will be a heavy emphasis on personal accountability, f ...
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
Brian Duff, host of the Mind 4 Survival prepping podcast, helps preparedness minded people be more safe, confident and prepared so they can better protect themselves, their families, and loved ones when it matters most.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
The Elara Edge: Expert Insights on Space Security is a thought leadership forum of military and space industry experts providing commentary and insight on the latest news developments in space security.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
The EdgeVerse Techcast goal is to increase awareness of resources available for customers developing with NXP Application Processors and Microcontrollers.
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
"Light 'Em Up" takes a deep dive on the criminal justice system, crime scene investigation and leadership. We take you under and behind the crime scene investigation tape to get at the truth, the whole truth and nothing but the truth, so help us God! Justice comes to those that fight ... not those that cry!
…
continue reading
Empowering people to be more safe, confident, and self-reliant so that they can better protect their families and loved ones when it matters most.
…
continue reading
Safety. Security. Survival. What I’ve taught multi-billion dollar companies to give them peace of mind. Mindset, awareness and preparing for unexpected danger. From www.safetyman.co
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
The NIDS View is meant to give listeners inside access to the thoughts and ideas of the member-practitioners of NIDS including our Fellows, Analysts, and Interns. For each episode we pick a current deterrence topic and have a cordial, exciting and sometimes funny discussion. Each episode is a stand-alone topical and is expected to increase awareness of deterrence thinking, expand the next generation of deterrence professionals, and prepare the workforce whose mission is to ensure peace, secu ...
…
continue reading
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
…
continue reading
A skilled individual can effortlessly blend into any environment without drawing attention, effectively hiding their true capabilities and intentions. They seamlessly mingle, remain unmemorable, and forge relationships to gather vital information for their objectives. Every move they make is calculated and intended to keep them inconspicuous. Originating from espionage, the term "gray man" refers to incorporating spy tradecraft into one's daily life. This involves honing skills essential for ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join one of our hosts, Alex Nehmy, Eric Johansen, and James McCarthy, each month as they speak with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought lea ...
…
continue reading
…
continue reading

1
The GOHSEP Get a Game Plan Podcast
Louisiana Governor's Office of Homeland Security and Emergency Preparedness
The GOHSEP Get a Game Plan Podcast highlights key issues in emergency management, we have timely interviews with subject matter experts at all levels of government along with practical information to help you become more resilient before the next disaster strikes.
…
continue reading
Welcome to One Degree to Victory, the podcast where we help navigate life's toughest challenges while building the emotional security and freedom to live their best year yet. Each episode provides practical tools, heartfelt stories, and expert insights to guide you through day-to-day experiences and chart a path toward new possibilities. Whether you're overcoming trauma, pursuing self-care, or redefining your future, this show will empower you to turn adversity into adventure for both yourse ...
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Farms. Food. Future. looks at the big issues facing farmers in the developing world and what needs to be done to wipe out global hunger while dealing with the climate crisis. It’s brought to you by the UN’s International Fund for Agricultural Development (IFAD) and presented by Brian Thomson. Through the podcast, IFAD raises awareness of the challenges smallholder farmers in developing countries are facing around food security. Farms. Food. Future. includes interviews with IFAD experts, part ...
…
continue reading
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
…
continue reading
Looking for a new TV show, movie, book or music artist? This is the show for you. Each episode we each recommend one thing we've watched, played or otherwise consumed and why we liked it so damn much.
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
It’s the show, that bridges the requirements of regulations, compliance, and privacy with those of security. Your trusted source for complying with various mandates, building effective programs, and current compliance news. It’s time for Security and Compliance Weekly.
…
continue reading
Most financial experts focus solely on numbers, but Rick Kahler, CFP®, CFT™, takes a deeper approach. With over 40 years of experience, Rick blends practical financial advice with powerful emotional insights to help you understand why you make the money decisions you do. Research shows that 90% of our financial choices are driven by emotions—not logic. Whether your habits seem irrational or confusing, Rick helps uncover the underlying beliefs and feelings influencing your behavior. It's abou ...
…
continue reading
Financial literacy is not emphasized enough for professionals during training, leaving many unprepared as they begin their careers. The topics covered in beyond MD apply to all professionals, including medical students/residents and practicing physicians. This podcast is led by radiologist Dr. Yatin Chadha and guided by expert analysis. Each episode, Yatin interviews accountants, lawyers, brokers, and advisors to heighten awareness on important topics, such as professional corporations, hold ...
…
continue reading
Podcast about enterprise technology by Indonesia's trusted I.T. company, ACS Group IG @acsgroup.co.id. We interview experts to spread awareness about the latest trends and opportunities in the enterprise tech space. Email us at: [email protected]
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
Security tips when your out and about instinctual behaviour to keep you and your safe
…
continue reading
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
…
continue reading
Welcome to "The Hopeful Perspective" a podcast discussing what it entails to transform from a personal position of suffering, pain, loss and HOPELESSNESS toward a renewed perspective of security, perseverance, love and HOPE. I am your host, Jason Hopkins, a long time victim and survivor who has personally been impacted by the Lord to be a victor and a thriver! In each podcast episode you can expect to find authentic dialog from a Biblical and experiential perspective—that is, BEYOND mere rel ...
…
continue reading
Whatever life after 50 looks like to you, thinking about money in retirement shouldn’t keep you up at night. We’re all dealing with the big questions about money and aging: How much you can really spend, how to invest your life savings without risking it all in the stock market, and should you sell your home and downsize? Then there’s the biggest unknown: how much health care you’ll need, and whether your savings and insurance is enough to cover the costs. This is personal. These topics may ...
…
continue reading
Want to know more about the human side of cybersecurity? This is the show for you. Each week, Tessian's Tim Sadler meets with security experts and business leaders to discuss everything from security cultures, hackers, social engineering and insider threats.
…
continue reading
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
Humans are the key to solving our cybersecurity challenges…but first we need them to be Well Aware. The Well Aware Security Show is hosted by George Finney, CISO for SMU and author of the award winning book, Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future. Security is in your DNA…so be Well Aware!
…
continue reading

1
PP061: Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read mo…
…
continue reading

1
Security Awareness Training Sucks! Focus on Situational Awareness.
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30In this eye-opening episode of Unspoken Security, host AJ Nash welcomes notorious hacker and security expert Jayson E. Street to discuss why traditional security awareness training falls short. Jayson explains that most corporate security training is merely policy-driven compliance, not actual security education. Instead of focusing on checkbox exe…
…
continue reading

1
TraCSS Delivers Space Situational Awareness to Spacecraft Operators
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42In 2009, an on-orbit collision between a defunct Russian satellite and an Iridium communications satellite created more than 1,800 pieces of debris and signaled an emerging need for a space traffic system. Since then, space has only become more congested with the rise of a commercial launch market that has enabled affordable access to space for com…
…
continue reading

1
19. What is good security awareness training? How you can make great courses for your company (With Tue Saltofte Lund - Digital Learning Specialist at CyberPilot)
18:49
18:49
Play later
Play later
Lists
Like
Liked
18:49We have a new podcast episode live after a winter break. This time, we got digital learning specialist Tue Saltofte Lund in the studio to discuss what makes good security awareness training is. This means you can listen to a lot of gold nuggets about: - Why your courses must be practical for your employee's everyday life - How we structure courses …
…
continue reading

1
PP061: Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read mo…
…
continue reading

1
Episode 069 - Does Open-Source AI Create a False Sense of Security? - Suryaprakash Nalluri
23:50
23:50
Play later
Play later
Lists
Like
Liked
23:50Does Open-Source AI Create a False Sense of Security? Listen to Suryaprakash Nalluri, an accomplished application security leader, discuss the shifting landscape of application security, challenges with open-source software, and the critical role of DevSecOps in modern development. + + + Find more episodes on YouTube or wherever you listen to podca…
…
continue reading
It’s all well and good to develop a technology strategy, articulate and document the strategy, and agree (supposedly) on that strategy. But what do you do when one or more of the tech teams act in apparent opposition to the strategy? John and Johna discuss why this happens and what questions you need to ask... Read more »…
…
continue reading

1
Hands Up & Mic On: The EdgeVerse Hosts Unplugged
14:45
14:45
Play later
Play later
Lists
Like
Liked
14:45Open Mic Special: SDK Updates, FRDM Boards & Getting Personal Welcome back to the Edge TechCast! Join co-hosts Kyle Dando and Bridgette Stone for a special open mic episode. Kyle and Bridgette share updates on the MCUXpresso SDK 25.06 preview, improvements in Visual Studio Code integration, and exciting developments in the Application Code Hub. Plu…
…
continue reading

1
#196 - Understanding The Origins of Your Money Scripts - A Guided Meditation
27:57
27:57
Play later
Play later
Lists
Like
Liked
27:57This 15-minute meditation guides you through a gentle, reflective process of exploring and understanding the inner parts of yourself that hold various money scripts. By inviting these parts to unblend and share their perspectives, you can connect with them from a place of curiosity and compassion. The meditation helps you uncover the origins, hopes…
…
continue reading
A new threat is on the rise - Gunra Ransomware. This sophisticated ransomware not only encrypts files but also exfiltrates sensitive data, threatening to leak the data unless the ransom is paid. Read the latest report from the CYFIRMA research team to learn more! Stay informed and safeguard your systems! Link to the Research Report: https://www.cyf…
…
continue reading

1
NB525: Cisco, IBM Recruit AI for Threat Response; HPE Air-Gaps Private Clouds
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46Take a Network Break! This week we catch up on the Airborne vulnerabilities affecting Apple’s AirPlay protocol and SDK, and get an update on active exploits against an SAP NetWeaver vulnerability–a patch is available, so get fixing if you haven’t already. Palo Alto Networks launches the AIRS platform to address AI threats in the enterprise,... Read…
…
continue reading

1
The Truth About Financial Advisors: Friends Talk Money Co-Hosts Interview Pam Krueger
46:25
46:25
Play later
Play later
Lists
Like
Liked
46:25Is your financial advisor truly working in your best interest — or theirs? In this eye-opening episode, the Friends Talk Money team turns the mic toward their own co-host, Pam Krueger, as she reveals the personal story behind Wealthramp, the platform she created to connect investors with trustworthy, vetted financial advisors. Pam shares the shocki…
…
continue reading

1
CYFIRMA Research- US MANUFACTURING RELOCATION AND THREATS
11:21
11:21
Play later
Play later
Lists
Like
Liked
11:21Donald Trump’s new tariff promises to revive American manufacturing, but evidence shows they are more likely to raise prices, reduce competitiveness, deter investment, and fuel geopolitical instability. The vision of millions of factory jobs ignores automation, labor shortages, and global supply chains. Instead of revitalizing the industry, tariffs…
…
continue reading

1
👁️ Look Here: Why Every Great Deception Starts with Stolen Attention
13:33
13:33
Play later
Play later
Lists
Like
Liked
13:33Welcome to issue #3 of Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it. In this week's episode: 🚨 Your attention is under attack! 🚨 From WWII rubber tanks to 2023’s phantom Paris bedbugs, the first strike of any scam is the same: steal your gaze, shape your reality. This issue of Deceptive M…
…
continue reading

1
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
51:25
51:25
Play later
Play later
Lists
Like
Liked
51:25Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro interviews Aaron and discusses id…
…
continue reading

1
HN779: Do We Really Need the Modern Networking Stack?
55:15
55:15
Play later
Play later
Lists
Like
Liked
55:15On today’s Heavy Networking, a roundtable panel considers whether a modern network needs to be built around underlays and overlays. This isn’t just Ethan yelling at clouds. This is a legitimate question pondering the real-world value of an overlay/underlay approach. Is overlay everywhere overkill, or is that the architecture we need to deliver a sa…
…
continue reading

1
TNO027: Seeing the Internet With Doug Madory
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02Doug Madory has been called “The Man Who Can See the Internet.” Doug has developed a reputation for identifying significant developments in the global layout of the internet. He joins us today to discuss his role in analyzing internet data to identify trends and insights. He shares his journey from a data QA position to... Read more »…
…
continue reading

1
IPB174: How Enterprise IPv6 Requirements Are Shaping Microsoft Windows
38:44
38:44
Play later
Play later
Lists
Like
Liked
38:44Today we talk with Tommy Jensen, a Senior Technical PM Strategist at Microsoft, about IPv6 support in Windows. Tommy shares what he hears from enterprises that are moving toward IPv6-mostly, strategies for dealing with older applications and devices that expect IPv4, and how the customer conversations he’s having about IPv6 now are more engaged and…
…
continue reading

1
N4N024: DNS Security, Record Types, and Reverse DNS
49:19
49:19
Play later
Play later
Lists
Like
Liked
49:19This week we continue with DNS. In our last episode we covered the basics; today we expand our scope to cover topics such as security for DNS, reverse DNS, and DNS record types. For dessert this week, a serving of Raspberry Pi and Happy Eyeballs. Episode Links: DNS: Turning Names into Numbers – N Is... Read more »…
…
continue reading

1
Ep #90 - Kids hold the secret to a happier & richer life - with Dr. Hasan Merali
47:05
47:05
Play later
Play later
Lists
Like
Liked
47:05Sometimes the answers are right in front of us. My guest today is Dr. Hasan Merali, MD MPH, author of Sleep Well, Take Risks, & Squish the Peas. We both believe kids hold the secret to a happier & richer life. Today, Hasan provides stories & evidence from the science of toddlers to back this up. He also discusses how we can incorporate certain prac…
…
continue reading

1
Surveillance Capitalism: You Are The Product
8:59
8:59
Play later
Play later
Lists
Like
Liked
8:59In this eye-opening kickoff to Season 6, Darnley dives into the hidden world of surveillance capitalism—where your clicks, swipes, and searches are turned into profit. You ARE the product. Discover how data profiling shapes your digital life, influences what you see, and quietly sells your behaviour to the highest bidder. Real-world examples, pract…
…
continue reading

1
How Hackers Think.🔥Chris Roberts🔥Latest AI Risks for Business
58:38
58:38
Play later
Play later
Lists
Like
Liked
58:38Rural Healthcare and small/midsized businesses are being tipped over the edge. Not by Tariffs or high interest rates, but by investments needed into protecting their people and systems from disruption. How can you protect yourself from something you don’t know? A risk you don’t understand. What if you could think like a hacker… and use that power t…
…
continue reading

1
D2DO271: Public Vs. Private Cloud In 2025
38:33
38:33
Play later
Play later
Lists
Like
Liked
38:33The shine has been coming off public cloud for awhile. Cloud costs remain high, complexity is growing, and public cloud interoperability is difficult. And while there’s talk about moving back to private cloud, that migration presents its own costs and complexities. To help us navigate the challenge that is cloud in 2025, we welcome Mark... Read mor…
…
continue reading

1
The Implications of China's New Non-Nuclear Hydrogen Bomb
38:20
38:20
Play later
Play later
Lists
Like
Liked
38:20Adam, Curtis, and Jim discuss China's development of a non-nuclear hydrogen bomb, exploring its scientific basis, implications for military strategy, and the broader context of China's advancements in military technology. They analyze the potential uses of such weapons, particularly in relation to Taiwan, and the messaging strategies employed by Ch…
…
continue reading

1
Ep. 179 - TacCon25 AAR - Master IDC - Goodbye For Now....
1:17:46
1:17:46
Play later
Play later
Lists
Like
Liked
1:17:46This show is a tough one... Eric and Aaron thank their biggest supporters and announce that they will be putting the show on hiatus indefinitely. AAR for Aaron's TacCon 2025 attendance. AAR for Eric's Rangemaster Master Instructor Development Class in FL. If you’re not signed up for the upcoming 3rd Annual Combatives Summit, what are you waiting fo…
…
continue reading

1
CYFIRMA Research- Hannibal Stealer: A Rebranded Threat Born from Sharp and TX Lineage
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Read CYFIRMA’s report on the Hannibal Stealer, a rebranded variant of SHARP and TX Stealers, which has re-emerged with expanded data exfiltration capabilities and an updated command-and-control infrastructure. Hannibal Stealer is built in C# on the .NET framework. It targets a wide range of data sources, including browsers, cryptocurrency wallets, …
…
continue reading

1
Embracing Change in Corporate Security: Strategies for Modernization with Ryan Schonfeld of HiveWatch
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52On this episode of the Ontic Connected Intelligence Podcast, Ryan Schonfeld explores his transition from law enforcement to founding Hivew\Watch, sharing insights into modernizing corporate security operations and integrating cutting-edge technology like AI. His conversation with host Manish Mehta uncovers the challenges of transitioning from publi…
…
continue reading

1
PP060: Subsea Cables and the Watery Risks to Critical Infrastructure
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
…
continue reading

1
PP060: Subsea Cables and the Watery Risks to Critical Infrastructure
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
…
continue reading
AI can impact an enterprise in several ways: making individuals more productive, making products and services more effective, and making it easier for customers and partners to do business. IT plays a critical role in enabling AI to have these impacts. On today’s sponsored Heavy Strategy, Cisco CIO Fletcher Previn explains how to locate AI use... R…
…
continue reading

1
HW051: How Wi-Fi Devices Handle Roaming On 2.4, 5, and 6 GHz Bands
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32Today on Heavy Wireless we welcome Jerry Olla to give us details from his talk “Roaming Wars: How Wi-Fi Devices Handle 2.4, 5, and 6 GHz”. Jerry tested the roaming behavior of popular Wi-Fi clients across 2.4, 5, and 6 GHz. He explains his testing protocol and results, and answers questions such as whether tri-band... Read more »…
…
continue reading

1
Accelerating Development with i.MX 9 Series Processors
16:24
16:24
Play later
Play later
Lists
Like
Liked
16:24Welcome back to the EdgeVerse TechCast! This episode dives deep into the world of NXP's i.MX Processors with guest Sanjana Kubde, Product Marketing Manager at NXP. Explore the exciting updates in the i.MX 9 series, including innovations in Artificial Intelligence, Security, and Connectivity. Discover how NXP's evaluation kits (EVK) and FRDM develop…
…
continue reading

1
CYFIRMA Research- Technical Malware Analysis Report: Python-based RAT Malware
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12A New Breed of Python-Based RATs is Abusing Discord for C2 The CYFIRMA research team has investigated an emerging class of Python malware that is turning popular platforms into weaponized control panels. One recent variant showcases just how accessible and disruptive these tools have become. This lightweight Remote Access Trojan (RAT) uses Discord …
…
continue reading

1
Artifacts of Deception (Deceptive Minds - issue #2)
12:09
12:09
Play later
Play later
Lists
Like
Liked
12:09Hey friends! Here's issue 2 of Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it. 🔥 Since starting this newsletter last week, we're already closing in on 3,000 subscribers to the print edition! 🔥 Huge thanks to everyone who's jumped in early! This week, I'm diving into what I call the “artifac…
…
continue reading

1
Deceptive Minds (the audio experience): Issue #1
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17 Hey listeners, Perry Carpenter here. Yeah, it's been a while since I've posted this feed, but I've got something exciting that I think you'll be interested in. It's the audio version of a newsletter that I recently started. The newsletter is called Deceptive Minds, and it's all about how we are fooled, how we fool ourselves, and what we can do abo…
…
continue reading

1
Situational Awareness Training: Are You Really Prepared?
27:48
27:48
Play later
Play later
Lists
Like
Liked
27:48Every day, the world around you is sending signals — some obvious, many subtle. The ability to pick up on those signals, to read the situation before it unfolds, can mean the difference between success and failure in overcoming the problems that may head your way. In today's world of uncertainty, sharpening your situational awareness… The post Situ…
…
continue reading
…
continue reading

1
NB524: Forward Networks Adds Endpoint Discovery; Intel Forecasts Q2 Layoffs
24:10
24:10
Play later
Play later
Lists
Like
Liked
24:10Take a Network Break! We start with a Red Alert for SAP NetWeaver’s Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »…
…
continue reading

1
Glitched: My Story of Overcoming a Traumatic Brain Injury Part 3
19:49
19:49
Play later
Play later
Lists
Like
Liked
19:49Press THIS LINK if you want to text The Hopeful Perspective to share your questions, comments, and/or blessings how the podcast is impacting you! When your brain betrays you, where do you turn? After surviving childhood abuse, 26 foster homes, and ultimately a brain tumor requiring multiple surgeries, I've discovered profound truths about dependenc…
…
continue reading

1
RCR 160: Physical Meets Digital: Security's Evolving Frontier - Vendor Focus (Haystack.com)
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14The boundary between physical and cybersecurity is rapidly disappearing, creating both challenges and opportunities for security professionals across domains. This eye-opening conversation with Casey Rash from Secure Passage explores how modern physical security devices have evolved into sophisticated IoT endpoints generating valuable security data…
…
continue reading

1
Food that packs a punch in Asia and the Pacific
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36Sometimes, to transform an entire food system we have to start small. Across Asia and the Pacific, slight changes in food and farming habits are bringing vital nutritional improvements to entire communities. On this episode, we head to Cambodia to learn more. Experts from across the region recently gathered here at an IFAD workshop on nutrition-sen…
…
continue reading

1
Are you at Risk? Personal Liability Cyber Breaches.
54:33
54:33
Play later
Play later
Lists
Like
Liked
54:33We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation …
…
continue reading

1
🚨New FBI Alert🚨Got a DM from the “FBI” on Telegram?
1:47
1:47
Play later
Play later
Lists
Like
Liked
1:47📲 Got a DM from the “FBI” on Telegram? 🚨 Did someone named “Jaimie Quin” claim they run IC3? ⚠️ It’s a scam. Full stop. The FBI just issued an alert warning the public: They are NOT direct messaging victims on Telegram or any other social media app. A scammer posing as “Jaimie Quin” is pretending to be the head of the FBI’s Internet Crime Complaint…
…
continue reading

1
Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure
1:36:41
1:36:41
Play later
Play later
Lists
Like
Liked
1:36:41Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure 03:11 Vulnerabilities and Weaknesses in Critical Infrastructure 10:0…
…
continue reading