Focused on Microsoft AI, Security and ERP/CRM.
…
continue reading
Ai Security Podcasts
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Security Unlocked presents The BlueHat Podcast From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions. Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and crea ...
…
continue reading
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
…
continue reading
Building AI: Securing the Future of Artificial Intelligence is the podcast for leaders navigating the security challenges of modern AI infrastructure. Host David Yacov speaks with CISOs, security engineers, and enterprise leaders building secure AI systems, from privacy-preserving synthetic data and MLOps security to AI governance, regulatory compliance, and infrastructure risk management. If you're securing AI infrastructure, managing AI compliance, or building trustworthy AI systems, this ...
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Focuses on using tech and AI in pediatric anesthesia in dentistry to improve care, increase efficiency and revenue
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
Welcome to Ragnar365 Nuggets, Ragnar Heil's short news and personal insights about Microsoft 365 Intelligent Workplace. Focus Areas: Microsoft Teams, SharePoint, Outlook, OneDrive, Copilot, Microsoft Viva, Employee Experience, Governance, Compliance, Power Platform etc)
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
AI is the biggest technological leap since we first harnessed fire—and it’s changing everything. Inventing Fire With AI is a podcast for leaders, innovators, and forward-thinkers who want to understand and harness the power of artificial intelligence. Hosted by Richard Crane—Founder/CTO of MILL5 and Microsoft MVP—each episode breaks down how AI is transforming industries, solving complex problems, and reshaping the future. You’ll hear real-world applications, bold insights, and practical gui ...
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Welcome to The Cyber Security AI Agents Show — your daily dose of everything shaping the future of cyber defense, automation, and intelligent security operations. Every day, we break down how Security AI Agents are transforming Cyber Defense.
…
continue reading
The AI & Security Podcast introduces listeners to the most cutting edge technology and artificial intelligence (AI) that is impacting the security industry today. Listen to interviews, hosted by Dennis Crowley, with the leaders in the robotics, video detection, situational intelligence and users of the latest technology today.
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
We interview researchers and developers who are creating new and innovative ideas in AI and Machine Learning. This bi-weekly podcast is looking for practical insights from the research world that tell us where AI and Machine learning are headed.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading

1
Kemba Walden and Devin Lynch on securing the AI Stack
1:06:31
1:06:31
Play later
Play later
Lists
Like
Liked
1:06:31Greg is joined in studio with Kemba Walden and Devin Lynch from the Paladin Global Institute about securing the future of AI. They break down the multilayered AI technology stack and highlight where systems are most at risk—from data poisoning to adversarial model extraction. We discuss the adequacy of today’s security standards, the evolving respo…
…
continue reading

1
The AI Security Edge - ABC with Laz | Ep 5
27:49
27:49
Play later
Play later
Lists
Like
Liked
27:49In this episode of The AI Security Edge, host Caroline Wong welcomes Laz for a lively conversation on the evolving role of AI in cybersecurity. From his early research to defending against AI-powered attacks, Laz shares insights, industry experiences, and even a charming tale about his fictitious Aunt Shirley. Together, they explore how AI is resha…
…
continue reading

1
Google's AI tool finds bugs, Europol disrupts hacktivist group, SquidLoader targets Hong Kong
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29Google says ‘Big Sleep’ AI tool found bug hackers planned to use Google fixes actively exploited sandbox escape zero day in Chrome China’s cyber sector amplifies Beijing’s hacking of U.S. targets Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect busi…
…
continue reading

1
Exein Raises €70M: Defending the IoT-AI Frontier with Embedded Security
17:35
17:35
Play later
Play later
Lists
Like
Liked
17:35Exein, the Italian cybersecurity company specializing in embedded IoT defense, has raised €70 million in Series C funding, marking a significant milestone in the race to secure AI-connected infrastructure. Backed by Balderton and a roster of prominent investors, this round pushes Exein’s total funding past $106 million and fuels its global expansio…
…
continue reading

1
AI meltdowns, Gigabyte, NCSC, Rowhammer, Gravity Form, Grok, AsyncRat, Josh Marpet... - SWN #494
30:02
30:02
Play later
Play later
Lists
Like
Liked
30:02AI meltdowns, Gigabyte, NCSC, Rowhammer, Gravity Form, Grok, AsyncRat, Josh Marpet and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-494
…
continue reading

1
Australia’s AI future—trust, opportunity, and human rights with Prof Ed Santow
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30In this episode of the Technology & Security podcast, Dr. Miah Hammond-Errey is joined by Professor Edward Santow, former Australian Human Rights Commissioner and co-director of the Human Technology Institute at UTS. The conversation is a candid exploration of Australia’s evolving AI landscape, diving into why Australians remain sceptical of AI des…
…
continue reading

1
MITRE ATLAS Framework - Securing AI Systems
17:27
17:27
Play later
Play later
Lists
Like
Liked
17:27Welcome to a crucial episode where we delve into the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework, an exhaustive knowledge base designed to secure our increasingly AI-dependent world. As AI and machine learning become foundational across healthcare, finance, and cybersecurity, protecting these systems fro…
…
continue reading

1
AI Threats, Enterprise Security, and Google's Confusing Gemini Release: Cybersecurity Today
12:57
12:57
Play later
Play later
Lists
Like
Liked
12:57In this episode of 'Cybersecurity Today,' host Jim Love discusses the recent deep fake attack on high-ranking US government officials using AI voice cloning technology. The conversation highlights the growing ease and risks of AI-generated impersonations. The episode also covers the advancements in AI systems connecting with enterprise data and the…
…
continue reading

1
The Role of AI in Revolutionizing Corporate Security: A Conversation with Brian Tuskan
29:28
29:28
Play later
Play later
Lists
Like
Liked
29:28In this episode of Ontic's Connected Intelligence Podcast, host Manish Mehta interviews Brian Tuskan, Chief Security Officer of ServiceNow, to explore his journey from law enforcement to corporate security leadership. They discuss the transformative role of technology, including AI, in modern security operations and workforce development, while hig…
…
continue reading
Zero Trust meets generative AI. Can enterprises keep pace as internal models leak context and shift risk? We speak with CISOs and architects rethinking access, segmentation, and model governance in the AI age.By David Yacov Habib
…
continue reading

1
Episode 158: Reality 2025: Bridging AI, Security, and Open Source Challenges
34:08
34:08
Play later
Play later
Lists
Like
Liked
34:08In this episode of Reality 2.0, Doc and Katherine return after a long hiatus to discuss a range of topics including AI and security concerns, the evolution of cloud-native technologies, and the growing complexity of AI-related projects within various Linux Foundation groups. The conversation also touches on approaches to AI and privacy, the potenti…
…
continue reading

1
AI vs Humans – Secure Your Future | Keynote at Edge Leadership Summit 2025
14:50
14:50
Play later
Play later
Lists
Like
Liked
14:50In this episode of the Inventing Fire podcast, taken from my keynote at the EDGE Leadership Summit 2025, I introduce myself and share the story behind Mill5—an AI-first company founded a decade ago, long before most people were even talking about artificial intelligence. I explain how, through early AI applications like NLP, we were able to detect …
…
continue reading

1
Trust Me Maybe: Building Trust in Human-AI Partnerships in Security
43:58
43:58
Play later
Play later
Lists
Like
Liked
43:58In this episode, I speak with three guests from diverse backgrounds who share a common goal: Building trust in human-AI partnerships in security. We originally came together for a panel at the Institute of Electrical and Electronics Engineers (IEEE) Conference on AI in May 2025, and this episode recaps that discussion. Key takeaways: Security pract…
…
continue reading

1
Anisha Patel: Right along with them. [Program management] [Career Notes]
8:45
8:45
Play later
Play later
Lists
Like
Liked
8:45Please enjoy this encore of Career Notes: Associate Director at Raytheon Intelligence and Space in the Cyber Protection Services Division Anisha Patel always loved math and it defined her career journey. As a first-generation American from an Asian household, Anisha said she was destined for a STEM-focused career and chose electrical engineering. S…
…
continue reading

1
Exploring the Dark Side of AI: Risks, Consciousness, and Responsibility
1:05:50
1:05:50
Play later
Play later
Lists
Like
Liked
1:05:50The Cybersecurity Today episode revisits a discussion on the risks and implications of AI hosted by Jim Love, with guests Marcel Gagné and John Pinard. They discuss the 'dark side of AI,' covering topics like AI misbehavior, the misuse of AI as a tool, and the importance of data protection in production environments. The conversation delves into wh…
…
continue reading

1
Creeping like a spider. [Research Saturday]
20:33
20:33
Play later
Play later
Lists
Like
Liked
20:33This week, we are pleased to be joined by George Glass, Associate Managing Director of Kroll's Cyber Risk business, as he is discussing their research on Scattered Spider and their targeting of insurance companies. While Scattered Spider has recently turned its attention to the airline industry, George focuses on the broader trend of the group’…
…
continue reading

1
Week in Review: Pentagon’s Chinese Engineers, Gemini’s email phish, 20-year-old railroad flaw persists
32:12
32:12
Play later
Play later
Lists
Like
Liked
32:12Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Cyrus Tibbs, CISO, PennyMac Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatL…
…
continue reading

1
Existential Dread, MCP, Cloudflare, ESXI, QR Codes, Salt Typhoon, Aaran Leyland... - SWN #495
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42Existential Dread and Seawater, MCP, Cloudflare, ESxi, QR Codes, Salt Typhoon, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-495
…
continue reading
The UK sanctions Russian military intelligence officers tied to GRU cyber units. An AI-powered malware called LameHug targets Windows systems. Google files a lawsuit against the operators of the Badbox 2.0 botnet. A pair of healthcare data breaches impact over 3 million individuals. Researchers report a phishing attack that bypasses FIDO authentica…
…
continue reading

1
030 - Info Stealers, GrapheneOS Drama, and Why Video Games and Anti-Virus Are Spyware
52:42
52:42
Play later
Play later
Lists
Like
Liked
52:42In this episode, I address listener feedback and corrections regarding use of public Wi-Fi, MAC addresses, and aliases. I dive deep into the nuances of MAC address randomization on GrapheneOS versus Apple’s private Wi-Fi addresses, explaining why GrapheneOS offers superior privacy protection. I discuss the real threats of public Wi-Fi in 2025 (hint…
…
continue reading

1
Taiwan semiconductor sector hacked, Salt Typhoon breaches National Guard, Congress ponders Stuxnet
9:03
9:03
Play later
Play later
Lists
Like
Liked
9:03Chinese hackers use Cobalt Strike on Taiwan’s semiconductor sector Salt Typhoon breaches National Guard and steals network configurations Congress considers Stuxnet to manage OT threats Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses fro…
…
continue reading

1
Cybersecurity Today: DNS Malware, SonicWall Backdoor, Military Breach, and BigONE Crypto Hack
9:31
9:31
Play later
Play later
Lists
Like
Liked
9:31In today's episode, host Jim Love covers recent cybersecurity threats, including malware hidden in DNS records, a custom backdoor targeting SonicWall SMA devices, the US military assuming a network compromise after Chinese hackers targeted VPNs and email servers, and a $27 million theft from the BigONE crypto exchange. The show highlights how attac…
…
continue reading

1
The UNFI Cyberattack: How Hackers Disrupted the U.S. Food Supply Chain
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30In June 2025, United Natural Foods, Inc. (UNFI)—the primary distributor for Whole Foods and tens of thousands of retailers across North America—suffered a major cyberattack that halted deliveries, emptied shelves, and forced core operations offline. The financial damage? Between $350 and $400 million in net sales lost, and up to $60 million in redu…
…
continue reading
In the security news: The train is leaving the station, or is it? The hypervisor will protect you, maybe The best thing about Flippers are the clones Also, the Flipper Zero as an interrogation tool Threats are commercial and open-source Who is still down with FTP? AI bug hunters Firmware for Russian drones Merging Android and ChromOS Protecting you…
…
continue reading
Pro-Russian Hackers, scam lords, and ransomware gangs face global justice. Louis Vuitton ties customer data breaches to a single cyber incident. The White House is developing a “Zero Trust 2.0” cybersecurity strategy. OVERSTEP malware targets outdated SonicWall Secure Mobile Access (SMA) devices. An Australian political party suffers a massive rans…
…
continue reading

1
Zuckerberg on Trial: The $8 Billion Data Privacy Reckoning
21:28
21:28
Play later
Play later
Lists
Like
Liked
21:28More than five years after the Cambridge Analytica scandal, the legal and financial consequences are still playing out—this time in Delaware’s Chancery Court, where Mark Zuckerberg and Meta executives are being sued by investors seeking over $8 billion in damages. This landmark class-action lawsuit argues that Meta’s leadership knowingly violated a…
…
continue reading

1
Operation Eastwood: Inside the Takedown of NoName057(16)
21:17
21:17
Play later
Play later
Lists
Like
Liked
21:17A major Europol-led crackdown—Operation Eastwood—has disrupted one of the most active pro-Russian hacktivist collectives in Europe: NoName057(16). Known for a relentless barrage of DDoS attacks targeting NATO allies and Ukraine-supporting nations, this ideologically driven group ran a global network powered by gamified recruitment, cryptocurrency i…
…
continue reading

1
Phished and Exposed: What the Co-op Hack Reveals About Retail Cybersecurity
21:37
21:37
Play later
Play later
Lists
Like
Liked
21:37In April 2025, The Co-op—one of the UK’s largest retailers—confirmed a data breach that exposed the personal information of 6.5 million members. No financial data was taken, but the attack hit at the core of trust, with CEO Shirine Khoury-Haq calling it a “personal attack on our members and colleagues.” This wasn’t just a technical failure—it was a…
…
continue reading

1
What Makes a Great CISO? A Playbook from Gary Hayslip
37:19
37:19
Play later
Play later
Lists
Like
Liked
37:19What separates a great CISO from a great one? In this powerhouse conversation, Ron invites friend and cybersecurity leader Gary Hayslip, CISO at SoftBank Investment Advisers, back on the mic to discuss what it takes to lead in today’s high-stakes digital world. Gary shares battle-tested insights on accountability, the evolving expectations of the C…
…
continue reading

1
teissTalk: Building resilient infosec teams
45:05
45:05
Play later
Play later
Lists
Like
Liked
45:05Analysing how your teams cope with a cyber incident or a failure scenario Learning from crises - building resilience strategies to mitigate future incidents Building a cyber resilient mindset within your infosec team and in the wider organisation Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Raza Sadiq, Head of Enterprise…
…
continue reading

1
A decade at the helm: in conversation with Rory Medcalf
47:16
47:16
Play later
Play later
Lists
Like
Liked
47:16How has Australia’s security landscape changed over the last decade? How was the Indo-Pacific concept born, and how has it evolved? What are the biggest threats facing Australia right now? In this episode, Rory Medcalf joins David Andrews to look back on the past decade in which he has served as Head of the ANU National Security College (NSC). They…
…
continue reading
This week, we are joined by Gary Barlet, former Federal CIO and Air Force Cyber Operations Officer and current Public Sector CTO at Illumio, to discuss how this approach to cybersecurity leaves some states much more at risk than others. Ben has the story of a Virginia case relating to reverse key word searches. Dave's got a highly unusual move by t…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts share some follow-up, includi…
…
continue reading
Topics: Focused on Microsoft AI, Security and ERP/CRM. For Business Leaders: Four Proven Starting Points: For Tech Architects/developers: Microsoft has built a suite of 10 powerful MCP servers This Newsletter available @ Linkedin - https://www.linkedin.com/pulse/ai-security-erpcrm-55-sai-turlapati-8dzac/…
…
continue reading

1
FileFix Attacks Are Here: How Interlock’s Ransomware is Skipping Your Defenses
21:52
21:52
Play later
Play later
Lists
Like
Liked
21:52In this episode, we break down how Interlock, a fast-moving ransomware group launched in late 2024, has evolved from using web injectors and clipboard tricks (like ClickFix) to an even more covert social engineering technique that abuses Windows File Explorer’s address bar to execute malicious code without triggering security prompts or downloads. …
…
continue reading
Google and Microsoft issue critical updates. CISA warns of active exploitation of a critical flaw in Wing FTP Server. Cloudflare restores their DNS Resolver service following a brief outage. A critical vulnerability in a PHP documentation tool allows attackers to execute code on affected servers. NSA and FBI officials say they’ve disrupted Chinese …
…
continue reading

1
Breaking and Securing Real-World LLM Apps
53:31
53:31
Play later
Play later
Lists
Like
Liked
53:31Send us a text Fresh off their OWASP AppSec EU talk, Rico Komenda and Javan Rasokat join Charlie McCarthy to share real-world insights on breaking and securing LLM-integrated systems. Full transcript, video, and links to episode resources available at https://mlsecops.com/podcast/breaking-and-securing-real-world-llm-apps Ask ChatGPT Thanks for chec…
…
continue reading

1
Ontinue Uncovers SVG-Based Phishing: Why Your Browser Could Be the Weak Link
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58Ontinue has uncovered a stealthy new phishing campaign that’s flipping conventional defenses on their head—weaponizing SVG image files to silently redirect victims to malicious websites, without requiring file downloads, macros, or even user clicks. In this episode, we break down how attackers are exploiting the JavaScript-capable structure of Scal…
…
continue reading

1
Keeping Drupal Running With Static Code Analysis & Lessons From Drupalgeddon - Matt Glaman
20:00
20:00
Play later
Play later
Lists
Like
Liked
20:00In this episode of the Security Repo Podcast, we sit down with Matt Glaman, a veteran developer in the Drupal community, to explore the role of static code analysis in maintaining secure, performant, and upgrade-ready PHP applications. We dive into tools like PHPStan and DrupalCheck, and how they help identify deprecations and prevent security risk…
…
continue reading

1
The AI Security Edge - Humans, Good Bots, and Bad Bots with Gilles Walbrou | Ep 4
25:28
25:28
Play later
Play later
Lists
Like
Liked
25:28Gilles Walbrou joins Caroline Wong for an insightful discussion on the game changing nature of AI enabled malicious bots and the end of rule-based detection as we know it. They discuss the clever use AI for coding in the experimentation phase, personal experiences getting frustrated trying to pass CAPTCHAs (as real humans!), and the complex multi-s…
…
continue reading

1
The AI Security Edge - Great Expectations with Izar Tarandach | Ep 3
33:55
33:55
Play later
Play later
Lists
Like
Liked
33:55Izar Tarandach joins Caroline Wong for an optimistic discussion about defense in depth and the role of secure design in business processes that leverage AI. They explore the impact of prompt injection, which is the first item on the OWASP Top 10 for LLMs. Izar promotes the use of AI by cybersecurity professionals in enhancing and improving communic…
…
continue reading

1
299 - Lessons learned self-hosting small Docker-based services and utilities
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02In this week's episode, it's time to share insights and lessons learned from self-hosting stuff at home! We'll talk about the why and the what, and also some stuff that didn't work at all. You'll also hear about how to best service workloads from home, and what sort of equipment is needed. (00:00) - Intro and catching up. (04:04) - Show content sta…
…
continue reading

1
Salt Typhoon Strikes Again: National Guard, Telecoms, and a Crisis in U.S. Cyber Defense
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58Salt Typhoon, a sophisticated Chinese state-sponsored cyber threat actor, is conducting one of the most aggressive and sustained espionage campaigns ever uncovered against U.S. critical infrastructure. This episode explores how the group—linked to China's Ministry of State Security—compromised a U.S. state’s Army National Guard, infiltrated telecom…
…
continue reading

1
Minimize SAP Migration Challenges, Cybersecurity Maturity, and Radical Transparency - Christopher Carter - BSW #404
58:31
58:31
Play later
Play later
Lists
Like
Liked
58:31Are you running SAP? The clock is ticking... Standard maintenance end-of-life is set for the end of 2027. Migration to S/4HANA must be completed by then (or 2030 if you buy into SAP’s special three-year reprieve). While that may appear to be enough time, companies currently working toward an S/4HANA transition are finding the journey challenging, a…
…
continue reading

1
We Regret to Inform You: Your Phishing Training Did Nothing with Ariana Mirian
46:52
46:52
Play later
Play later
Lists
Like
Liked
46:52You click on a link in an email—as one does. Suddenly you see a message from your organization, “You’ve been phished! Now you need some training!” What do you do next? If you’re like most busy humans, you skip it and move on. Researcher Ariana Mirian (and co-authors Grant Ho, Elisa Luo, Khang Tong, Euyhyun Lee, Lin Liu, Christopher A. Longhurst, Ch…
…
continue reading

1
Chinese engineers at Pentagon, HazyBeacon malware, MITRE framework: AADAPT
8:06
8:06
Play later
Play later
Lists
Like
Liked
8:06Pentagon welcomes Chinese engineers into its environment HazyBeacon: It’s not a beer, but it leaves a bitter aftertaste What the world needs now is another framework Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks a…
…
continue reading

1
Cybersecurity Today: GPU Vulnerabilities, Microsoft's Security Overhaul, and Major Flaws in Automotive Bluetooth
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08In this episode hosted by Jim Love, 'Cybersecurity Today' celebrates its recognition as number 10 on the Feed Spot list of Canadian News Podcasts and approaches a milestone of 10 million downloads. Key topics include new research identifying Nvidia GPUs as vulnerable to Rowhammer style attacks, Microsoft's significant security improvements in Micro…
…
continue reading

1
SN 1034: Introduction to Zero-Knowledge Proofs - Taking Down Quantum Factorization
2:55:37
2:55:37
Play later
Play later
Lists
Like
Liked
2:55:37A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction t…
…
continue reading

1
DragonForce Ransomware Hits Belk: 150GB Data Leak and Operational Chaos
1:20:33
1:20:33
Play later
Play later
Lists
Like
Liked
1:20:33In this episode, we dive into the May 2025 ransomware attack on Belk, the iconic U.S. department store chain, orchestrated by the DragonForce ransomware group—a fast-rising player in the ransomware-as-a-service (RaaS) ecosystem. The cyberattack brought down Belk’s online and in-store operations for days, exfiltrated over 156GB of sensitive data, an…
…
continue reading
A DOGE employee leaks private API keys to GitHub. North Korea’s “Contagious Interview” campaign has a new malware loader. A New Jersey diagnostic lab suffers a ransomware attack. A top-grossing dark web marketplace goes dark in what experts believe is an exit scam. MITRE launches a cybersecurity framework to address threats in cryptocurrency and di…
…
continue reading