Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
Browsing Security

LayerX Security

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
  continue reading
 
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
  continue reading
 
Artwork

1
Security Architecture Podcast

Evgeniy Kharam & Dmitry Raidman

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
  continue reading
 
Artwork
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Artwork

4
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
The Call Kent Podcast

Kent C. Dodds

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The Call Kent podcast is a regular podcast where you call in with a question and Kent answers. Call in with your questions right from your web browser with any device at https://kentcdodds.com/call
  continue reading
 
Artwork
 
Beyond the Hype is a monthly podcast from the Scott Logic team where we cast a practical eye over what is new and exciting in software development – everything from Kafka to Kubernetes, AI to APIs, microservices to micro-frontends. We look beyond the promises, the buzz and excitement to guide you towards the genuine value. At Scott Logic, we have years of experience in tackling tough software problems for our clients, often at the bleeding edge of technology. Each month on this podcast, our ...
  continue reading
 
Artwork
 
Technology has become increasingly important to policy debates, but these debates won’t be productive without an understanding of how the technology in question works. AEI Visiting Fellow Shane Tews interviews tech industry experts to explain how the apps, services, and structures of today's information technology systems work, and how they shape our social and economic life.
  continue reading
 
Artwork

1
Cyber Coffee Hour

Dr. Joseph J. Burt-Miller Jr. and Alfredzo Nash

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
  continue reading
 
Artwork

1
JavaScript Jabber

Charles M Wood

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
Broadcasting from Dubai, The CTO Show with Mehmet explores the latest trends in technology, startups, and venture funding. Host Mehmet Gonullu leads insightful discussions with thought leaders, innovators, and entrepreneurs from diverse industries. From emerging technologies to startup investment strategies, the show provides a balanced view on navigating the evolving landscape of business and tech, helping listeners understand their profound impact on our world. [email protected]
  continue reading
 
SquareX is excited to launch The Be Fearless Podcast Series, where we bring together industry experts and professionals from the cybersecurity community. Hosted by SquareX Founder - and cybersecurity veteran - Vivek Ramachandran, look forward to insights about our guests’ journeys in security, the evolution of the field, the changing threatscape and how enterprises across industries are addressing them today.
  continue reading
 
Artwork

1
Humane Tech

Jeffrey S. Kaye, mozutech

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Too often we work at the pleasure of technology. This is backwards. Technology should serve our needs and support our humanity. Instead, we can use tools to translate our desires into the language that technology requires. You aren’t alone in this…I will be your guide. Together, we'll protect our personal privacy, security, and get better use of technology.
  continue reading
 
Artwork

1
Dashamaya

Wali Kukula FM

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Here we talk about many untalked subjects in Sri Lanka and in the world and also talked about subjects to give our take on it. Brought to you by Shiyon Perera. If you enjoy listening be sure to follow and let us know on social media: https://twitter.com/dashamaya_ https://www.facebook.com/DashamayaPodcast/
  continue reading
 
Artwork
 
Welcome to AI News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about machine learning, robotics, automation, natural language processing, AI ethics, and more. Whether you're a tech enthusiast, AI researcher, or simply curious about the future of technology, this podcast is your go-to source for AI news. T ...
  continue reading
 
Hands-On Windows, featuring Paul Thurrott, will help you adapt to the changes made in Windows 11. From visual tweaks to performance boosts Hands-On Windows will show you how to get the most out of your Windows 11 PC. You can join Club TWiT for $10 per month and get ad-free audio and video feeds for all our shows plus everything else the club offers...or get just this podcast ad-free for $5 per month. New episodes every Thursday.
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Loading …
show series
 
In this episode of The CTO Show with Mehmet, we’re joined by John Carse, Field CISO at SquareX, to explore a fast-emerging shift in cybersecurity: the browser as the new endpoint. John shares why traditional tools like EDR and CASB are no longer sufficient, how modern threats are bypassing enterprise defenses, and what CISOs need to prioritize in a…
  continue reading
 
CISA, Microsoft warn of Windows zero-day used in attack on ‘major’ Turkish defense org 40K IoT cameras worldwide stream secrets to anyone with a browser Marks & Spencer begins taking online orders again, out for seven weeks due to cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more effic…
  continue reading
 
In this episode of Threat Vector, Ofer Ben‑Noon steps in as guest host to interview cybersecurity strategist Kirsten Davies. They explore why browsers now handle 85 percent of work and how that shift makes them the prime attack surface. Learn how phishing and session hijacks exploit low‑friction paths, why Zero Trust and enterprise browsers must wo…
  continue reading
 
In this wholly sponsored Soap Box edition of the show, Patrick Gray chats with Adam Bateman and Luke Jennings from Push Security. Push has built an identity security platform that collects identity information and events from your users’ browsers. It can detect phish kits and shut down phishing attempts, protect SSO credentials, and find shadow/per…
  continue reading
 
Cybersecurity Co-Founder and ex-Venture Capitalist Zain Rizavi breaks down what really happens behind closed doors in cybersecurity investing. From his unconventional journey from political science to backing the next generation of security companies, Zain reveals why most founders get product-market fit completely wrong and what it really takes to…
  continue reading
 
In this episode, Mehmet Gonullu sits down with Nelson Nigel, the founder of Kidmoto, a ride-hailing service designed specifically for families traveling with young children. From driving a yellow cab in New York to building a tech-enabled transportation service operating in 64+ cities, Nelson shares how he bootstrapped his company past $1M in reven…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Christina Shannon, CIO, KIK Consumer Products Thanks to our show sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GR…
  continue reading
 
Without even requiring user interaction on a phone, Pegasus: - Infects a target device, sometimes without any clicks (zero-click exploits via apps like iMessage or WhatsApp). = Accesses sensitive data, including messages, emails, photos, contacts, and calendar entries. - Activates microphones and cameras, enabling real-time surveillance. - Tracks l…
  continue reading
 
(0:10): Apple Sets 2026 for Major Siri AI Upgrade Amidst Previous Delays (2:08): Oracle and Seekr Partner to Revolutionize AI with Powerful New GPU Cluster (4:41): Tesla Sues Ex-Engineer for Trade Secrets Theft in Humanoid Robot Rivalry (6:35): Meta AI's Discovery Feed Sparks Privacy Fears as Personal Chats Go Public (8:38): Adobe Reports Record Q2…
  continue reading
 
Hackers attacks target Microsoft Entra ID accounts using pentesting tool Google Cloud and Cloudflare outages reported House Homeland Chairman Mark Green announces his departure Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta.…
  continue reading
 
Luca Palmieri, author of Zero to Production in Rust and Principal Engineering Consultant at MainMatter, speaks with SE Radio host Gavin Henry about Rust in production. They discuss what production Rust means, how to get Rust code into production, specific Rust issues to think about when getting an application into production, what Rust profiles are…
  continue reading
 
Can traditional search engines keep up with the AI revolution? On this episode of Hands-On Windows, we're shaking up the norm with Microsoft's latest Co-Pilot Search feature. Explore how this cutting-edge tool promises to transform your search experience. Instead of just fetching facts, Co-Pilot Search offers contextual answers and deep insights th…
  continue reading
 
This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
  continue reading
 
Space-based satellite networks are transforming global connectivity, extending access to even the most remote corners of the planet. The rules that govern these networks have never been more critical. How does satellite spectrum actually function? Why is there an increasing need to revise the regulations that oversee it? And what are the key compon…
  continue reading
 
If you’re in the cybersecurity field, HD Moore, runZero founder and creator of Metasploit, needs no introduction — his work has fundamentally changed how the security industry thinks about vulnerabilities. In this candid conversation, HD shares the story behind building the world's most widely used penetration testing framework, war stories from th…
  continue reading
 
Alex Sharpe is a Security Confidential Alumni, board member, practitioner, speaker, and author. He started his career in the intelligence community, built two startups, recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets. 00:00 Intro02:20 Cybersecurity Imposters05:50 How do we prepare for the future?12:40…
  continue reading
 
(0:10): Databricks Unveils Agent Bricks: Revolutionizing AI with Custom Agents and No-Code Solutions (2:03): Google Appoints New AI Chief, Plans $75B Investment Amidst Fierce Competition (4:07): DeepL Unveils Europe's First DGX SuperPOD, Revolutionizing Language AI with 30x Faster Translations (6:20): The Browser Company Unveils Dia: A New AI-Power…
  continue reading
 
TanStack is an open-source collection of high-performance libraries for JavaScript and TypeScript applications, primarily focused on state management, data fetching, and table utilities. It includes popular libraries like TanStack Query, TanStack Table, and TanStack Router. These libraries emphasize declarative APIs, optimized performance, and deve…
  continue reading
 
Zero-click data leak flaw in Copilot Operation Secure targets infostealer operations FIN6 targets recruiters Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. easier—while also strengthening yo…
  continue reading
 
Are you aware of the hidden risks lurking in your organization’s browser extensions? Nearly every enterprise user has at least one extension installed—and over half of those extensions request powerful permissions that can expose cookies, passwords, and sensitive data. In this video, we introduce ExtensionPedia, LayerX’s free, publicly available Br…
  continue reading
 
In this episode of Threat Vector, David Moulton talks with Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance. Lisa shares insights from this year’s “Oh Behave!” report and dives into why cybersecurity habits remain unchanged—even when we know better. From password reuse to misunderstood AI risks, Lisa explains how emotion, …
  continue reading
 
Alex Sharpe is a Security Confidential Alumni, board member, practitioner, speaker, and author. He started his career in the intelligence community, built two startups, recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets. 00:00 Intro02:20 Cybersecurity Imposters05:50 How do we prepare for the future?12:40…
  continue reading
 
Sangram Dash has spent over two decades in cybersecurity, from witnessing the massive eBay breach response to leading security at companies like PayPal and Square. In this episode, he breaks down his practical "3 buckets" framework that every security team should follow, shares lessons from previous incidents and why the human element of incident r…
  continue reading
 
This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
  continue reading
 
(0:10): Global ChatGPT Outage: AI Industry Faces Reliability Test Amid Growing Dependence (2:01): OpenAI and Google Cloud Forge Unlikely Alliance to Boost AI Computing Power Amid Competition (4:15): Android 16 Launches on Pixel: Live Updates, AI Security, and Enhanced Camera Features Unveiled (6:10): Cisco Unveils Secure AI Network Architecture, Su…
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: New York Times gets a little stolen Russian FSB data as a treat iVerify spots possible evidence of iOS exploitation against the Harris-Walz campaign Researcher figures out a trick to get Google account holders’ full names and phone numbers Major US food distrib…
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: New York Times gets a little stolen Russian FSB data as a treat iVerify spots possible evidence of iOS exploitation against the Harris-Walz campaign Researcher figures out a trick to get Google account holders’ full names and phone numbers Major US food distrib…
  continue reading
 
In this episode, Mehmet sits down with Jan van Schuppen, a seasoned sales entrepreneur and founder of Ideas in Spades, who has led global B2B sales teams for over 30 years. They explore the biggest myths in go-to-market (GTM) strategy, the traps of founder-led content, how to balance automation with authenticity, and why selling before building is …
  continue reading
 
(0:10): UK FCA and Nvidia Unveil AI Sandbox to Boost Innovation and Competitiveness (2:22): Google CEO: AI to Boost Creativity, Not Replace Jobs; Plans to Hire More Engineers (4:43): Qualcomm to Acquire Alphawave for $2.4B, Strengthening AI Chip Arsenal (6:54): UK PM Unveils 'Extract': AI Tool to Revolutionize Housing Plans with Google Collaboratio…
  continue reading
 
Evaluations are critical for assessing the quality, performance, and effectiveness of software during development. Common evaluation methods include code reviews and automated testing, and can help identify bugs, ensure compliance with requirements, and measure software reliability. However, evaluating LLMs presents unique challenges due to their c…
  continue reading
 
CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
  continue reading
 
In this episode, Oliver Cronk dives into the world of Event-Driven Architecture (EDA) with Tom Fairbairn from Solace and Scott Logic’s Gordon Campbell. The discussion explores whether EDA has matured beyond the hype into a practical strategy for modern systems integration, or if it’s just another architectural buzzword. Together, they unpack the co…
  continue reading
 
Brute forcing phone numbers linked to Google accounts The Guardian launches Secure Messaging service United Natural Foods hit by cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. ea…
  continue reading
 
Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
  continue reading
 
Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
  continue reading
 
Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
  continue reading
 
(0:10): Warren Buffett to Retire in 2025; Berkshire Shifts Focus to AI, Amazon's AWS Boost (2:20): Kali GPT Revolutionizes Cybersecurity Education and Penetration Testing with AI-Powered Assistance (4:44): Klarna CEO Warns AI Could Trigger Recession by Displacing White-Collar Jobs (6:59): Alphabet's AI Innovations Make It a Top Pick for $3,000 Inve…
  continue reading
 
Presidential cyber executive order signed Neuberger warns of U.S. infrastructure’s cyberattack weakness Mirai botnet infects TBK DVR devices Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. ea…
  continue reading
 
In this episode of The CTO Show with Mehmet, we’re joined by Ali Hafizji, founder of the product development agency Wednesday, for a candid look into one of the most overlooked phases in startup growth: the dangerous gap between MVP and Product-Market Fit (PMF). We explore why many startups lose momentum after MVP, how to avoid premature scaling, t…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guest Rusty Waldron, chief business security officer, ADP Thanks to our show sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the follow up tasks you don’t have time for are close beh…
  continue reading
 
Stolen Kettering Health data published Reddit sues Anthropic for scraping North Face website customer accounts breached Huge thanks to our sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the follow up tasks you don’t have time for are close behind. What are you going to do? Here’s a better q…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play