The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
…
continue reading
CISA Podcasts
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
This is THE PODCAST for learning about how to dominate your professional accounting or finance career and how to become certified in your field as a CPA, CMA, EA, CIA or CISA. Bryan Kesler walks you through the steps he took to pass the CPA exam while working full time and hosts interviews with people very similar to yourself to learn how they are successful in their careers. Bryan launched his blog theCPAguide.com and CMAguide.com in July of 2012 and has helped thousands of people sign up a ...
…
continue reading
A delicious mix of Insurance and TV
…
continue reading
Just Security is an online forum for the rigorous analysis of national security, foreign policy, and rights. We aim to promote principled solutions to problems confronting decision-makers in the United States and abroad. Our expert authors are individuals with significant government experience, academics, civil society practitioners, individuals directly affected by national security policies, and other leading voices.
…
continue reading
In 10 minutes daily, The Business of Tech delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering 'Why Do We Care?', channel veteran Dave Sobel brings you up to speed and provides resources to go deeper. With insights and analysis, this focused podcast focuses on the knowledge you need to be effective, profitable, and relevant.
…
continue reading
Technology has become increasingly important to policy debates, but these debates won’t be productive without an understanding of how the technology in question works. AEI Visiting Fellow Shane Tews interviews tech industry experts to explain how the apps, services, and structures of today's information technology systems work, and how they shape our social and economic life.
…
continue reading
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
…
continue reading
…
continue reading
A FEMA podcast highlighting innovation in the field of emergency management and sharing stories of communities and individuals recovering after disasters.
…
continue reading
IT authors and entrepreneurs Ryan Morris, Karl Palachuk, and Dave Sobel provide commentary on the changing world of technology opportunities and emerging tech. We want to expand the discussion from the SMB IT channel to all things tech - with one eye on the future and the other on profits. Join us!
…
continue reading
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
…
continue reading
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
…
continue reading
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
…
continue reading
Emagine the Future is a cybersecurity and technology podcast aimed to offer ambitious technology and national security professionals with actionable insights and unique stories from proven industry leaders. Each week, we release conversations with experts from the intelligence, defense, civilian, and private sectors where we discuss current events, career and skill development, technology and national security, and the future. Obtain the edge you need to stay current, to accelerate your deve ...
…
continue reading
“It’s 5:05!'' is a daily audio news cast highlighting security and open source stories from around the world. We filter for the real cybersecurity and open source stories in the news, so you won't have to. Each day, a global team of journalists contribute stories they found interesting in their daily research from the previous 24 hours. We present them to you in an easy to listen to format, making the resources available at the end of each episode so you can do a deep dive on stories you fin ...
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
1
HPE Open View Vulnerability Hits CISA Known Exploited List
10:58
10:58
Play later
Play later
Lists
Like
Liked
10:58Cybersecurity Today: Credit Card Skimming, Valley Rat Malware, WhatsApp Exploit & AI Defenses In this episode of Cybersecurity Today, hosted by Jim Love, we explore several critical cybersecurity threats and advancements. We cover a massive credit card skimming campaign active since early 2022, a severe bug in HPE OneView, the stealthy Valley Rat m…
…
continue reading
1
AI-Orchestrated Cyber Espionage and the Future of Cyber Defense with CISA's Nick Andersen
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37AI is speeding up cyber operations and shrinking the window for defenders to respond. Nick Andersen, who leads CISA's Cybersecurity Division, explains why Anthropic's recent report caught attention: it described what Anthropic called the first publicly reported AI-orchestrated cyber espionage campaign, in which threat actors misused its Claude mode…
…
continue reading
1
Microsoft Bug Bounty, CISA hiring surge, US goes offensive in cyber ops, OWASP Top 10
42:22
42:22
Play later
Play later
Lists
Like
Liked
42:22Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in cybersecurity, including Microsoft's overhaul of its bug bounty program, CISA's hiring strategy amidst workforce challenges, the US's shift towards a more aggressive cyber strategy, and insights from the updated OWASP Top 10 vulnerabilities. The…
…
continue reading
1
AI for MSPs: Skills Obsolescence, Rising Cloud Power Costs, and Vendor Consolidation
17:48
17:48
Play later
Play later
Lists
Like
Liked
17:48This episode examines why growing concern over AI-driven skills obsolescence is less about workforce displacement and more about authority, accountability, and liability for MSPs. As AI systems increasingly triage tickets, remediate issues, and shape outcomes, MSPs are absorbing responsibility for decisions made by tools they did not design and can…
…
continue reading
1
AI Governance for MSPs as Copilot Control and Platform Automation Expand
17:26
17:26
Play later
Play later
Lists
Like
Liked
17:26Rising workplace use of artificial intelligence is outpacing organizational governance, according to data from Microsoft and Gallup. Microsoft reports global AI adoption reached 16.3% in 2025, while Gallup finds nearly half of U.S. workers use AI tools at work at least annually. Despite that usage, only a minority of employees report clear employer…
…
continue reading
1
The Hammer and the Anvil: Offensive Cyber Strategy with Chris Inglis
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05Chris Inglis joins Frank Cilluffo to break down what offensive cyber strategy should look like in an era of strategic competition. Drawing from the McCrary Institute's new report on U.S. cyber policy, Inglis argues that resilience and consequences are not competing theories—they have to work together. He explains why "defend forward" and persistent…
…
continue reading
1
LinkedIn job scams and Zero-Click Gemini Vulnerability
28:42
28:42
Play later
Play later
Lists
Like
Liked
28:42Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the challenges faced in the job market, particularly the rise of scams on platforms like LinkedIn. They emphasize the importance of verifying recruiters and job postings to avoid falling victim to scams. The conversation then shifts to the vulnerabilities associated w…
…
continue reading
1
Episode 234: The Ralph Naders of Cybercrime?
52:19
52:19
Play later
Play later
Lists
Like
Liked
52:19Bob Lord (Yahoo, DNC, CISA) and Lauren Zarik (Harvard’s Belfer Center, CISA) don't think cybersecuirty (or lack of it) should be the customer’s problem. Drawing parallels to Ralph Nader’s fight against unsafe cars, they explain how to fix the root of the problem. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
1
MSP AI Automation Shifts Risk, Pricing, and Operational Responsibility
20:26
20:26
Play later
Play later
Lists
Like
Liked
20:26Slowing U.S. job growth alongside rising labor productivity highlights how organizations are replacing hiring with automation and AI-driven systems. Government labor data shows job growth in 2025 fell to roughly 584,000 positions, while productivity rose nearly five percent in the third quarter, allowing output to increase without additional staff.…
…
continue reading
Happy New Year, On Point Nation! Let’s start with a fresh look on improving your sales techniques. Let’s face it: We are all in sales in some way, right? And our guest Amy Reczek is a terrific sales coach. On this recording Amy unveils some techniques she discovered herself along the way as a trainer and speaker. Your posture, what you’re doing wit…
…
continue reading
1
FBI Warns of QR Code Phishing & Europol's Major Cybercrime Crackdown CST Monday Jan 12 2026
11:40
11:40
Play later
Play later
Lists
Like
Liked
11:40In this episode of Cybersecurity Today, host David Shipley covers the FBI's warning about North Korean state-sponsored QR code phishing campaigns targeting U.S. organizations. Additionally, he discusses Europol's arrest of 34 individuals in Spain tied to the infamous Black Acts crime syndicate and the uncertainty surrounding CISA's pre-ransomware n…
…
continue reading
1
AI for MSPs: Transforming Procurement Processes with Autonomous Sourcing Solutions
23:08
23:08
Play later
Play later
Lists
Like
Liked
23:08Procurement is experiencing a significant shift as organizations increasingly adopt automation and artificial intelligence (AI) to enhance sourcing, purchasing, and spend management processes. Kevin Frechette, CEO and co-founder of Fairmarkit, discusses how their platform enables enterprises to transition from manual procurement methods to AI-drive…
…
continue reading
1
AI for MSPs: How Automation is Reshaping IT Service Provider Roles and Client Expectations
27:56
27:56
Play later
Play later
Lists
Like
Liked
27:56The recent acquisition of Small Biz Thoughts and IT Service Provider University by MSP Radio marks a significant shift in the landscape of resources available to Managed Service Providers (MSPs). This acquisition aims to ensure the continued stewardship of valuable intellectual property, including books and community resources, while allowing found…
…
continue reading
1
Cybersecurity Today: The Month in Review - Key Stories and Insights
50:29
50:29
Play later
Play later
Lists
Like
Liked
50:29In this episode of Cybersecurity Today, brought to you by Meter, we review key events and stories from the past few weeks. Join host Jim along with experts Tammy Harper from Flair, Laura Payne from White Tuque, and David Shipley from Beauceron Security as they discuss major cybersecurity events that unfolded over the holidays, including the MongoDB…
…
continue reading
1
AI for MSPs: Navigating Automation, Accountability, and Governance Challenges
15:04
15:04
Play later
Play later
Lists
Like
Liked
15:04Intel has launched its Core Ultra Series 3 central processing units, utilizing its new 18A process technology, which aims to enhance performance and efficiency across various applications, including gaming and professional workloads. This development is part of Intel's strategy to regain competitiveness in the CPU market, which has faced increasing…
…
continue reading
Cybersecurity Today: Sideloaded App Issues, Fake Blue Screen Attacks, and Rising Ransomware Threats In this episode of Cybersecurity Today, host Jim Love discusses HSBC blocking sideloaded apps with its banking app, new social engineering attacks using fake Windows blue screens to install malware, and the discovery of long-standing compromised Chro…
…
continue reading
1
AI for MSPs: Google and OpenAI's New Tools Raise Trust and Liability Concerns
17:03
17:03
Play later
Play later
Lists
Like
Liked
17:03Google has introduced an AI-powered inbox view for Gmail, designed to enhance user experience by transforming the traditional email interface into a personalized platform that includes to-do items and topic summaries. This feature, currently available to trusted testers in the U.S. for consumer Gmail accounts, aims to help users manage their emails…
…
continue reading
1
Can the U.S. Seize Russian Flagged Oil Tankers?
42:09
42:09
Play later
Play later
Lists
Like
Liked
42:09Prior to the U.S. attacks that dislodged president Nicolas Maduro of Venezuela, American forces have for weeks been blockading U.S.-sanctioned ships carrying Venezuelan oil. In mid-December, the United States began boarding, and seizing, tankers in the so‑called “shadow fleet” that move sanctioned oil across the globe, starting with stateless vesse…
…
continue reading
1
MSP Cybersecurity: Microsoft Teams Enhances Security Features for Managed Service Providers
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29Microsoft has announced significant changes to its Teams platform, set to take effect on January 12, 2026. The platform will automatically enhance messaging security by blocking risky files and scanning shared links for potential phishing threats. This proactive measure aims to protect organizations, particularly smaller ones without dedicated secu…
…
continue reading
1
Kimwolf Bot Strikes - "Routers Will Not Protect You"
13:05
13:05
Play later
Play later
Lists
Like
Liked
13:05In this episode of Cybersecurity Today, host Jim Love discusses the latest in cybersecurity threats including the rapidly growing Kim Wolf botnet affecting millions of devices, the rising threats to file-sharing environments, and the intersection of cybercrime with physical supply chains. He also covers an audacious hacktivist takedown of white sup…
…
continue reading
1
MSP AI Risk Management as Shadow AI Adoption Reshapes Trust and Automation
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25Artificial intelligence adoption is accelerating without formal ownership as employees, customers, and patients integrate AI tools into daily decisions. Surveys from Gallup show 45% of U.S. employees use AI at work at least occasionally, while research cited by OpenAI indicates roughly 60% of American adults recently used AI for health-related ques…
…
continue reading
1
Are We Ready for 2026? Top Cyber Predictions on Policy, Tech, and Threats
17:58
17:58
Play later
Play later
Lists
Like
Liked
17:58Cyber Focus kicks off 2026 (and its 100th new episode) with rapid-fire predictions from McCrary Institute senior fellows. They flag big policy inflection points—especially whether Congress can reauthorize "CISA 2015," sustain information-sharing protections, and keep state and local cybersecurity funding on track. Tech-wise, the group focuses on AI…
…
continue reading
1
RC4 Deprecated, Are passkeys still an issue?
45:43
45:43
Play later
Play later
Lists
Like
Liked
45:43Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in Microsoft's security protocols, particularly regarding Kerbroasting and the transition from RC4 to AES encryption. They delve into the challenges surrounding the adoption of passkeys, emphasizing the need for user education and the importance of…
…
continue reading
1
Episode 233: How Brett Johnson Made $160,000 a Week
51:59
51:59
Play later
Play later
Lists
Like
Liked
51:59Former cybercrime kingpin Brett Johnson didn’t just break the law; he built the tools still used by criminals today. He's back for another episode to check in and unpack why cybercrime works, how defenses fail, and the way life itself is often the ultimate "in" for an attacker. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
1
MSP Hiring Challenges: Navigating Labor Shortages and AI Impact on Workforce Strategy
18:29
18:29
Play later
Play later
Lists
Like
Liked
18:29The U.S. economy demonstrated robust growth in the third quarter of 2025, with a gross domestic product (GDP) increase of 4.3%, according to the Commerce Department. This growth occurred despite consumer concerns and uncertainties related to tariffs, with military spending and corporate profits contributing significantly. However, the technology se…
…
continue reading
1
Infrastructure Under Attack: Cybersecurity Today for Monday January 5, 2026
11:57
11:57
Play later
Play later
Lists
Like
Liked
11:57In this episode of 'Cybersecurity Today', host David Shipley discusses significant cyber events and their implications. The podcast explores hints by President Donald Trump regarding the use of cyber tactics in a U.S. operation that resulted in a power outage in Venezuela. The episode also delves into the April 2025 data breach at Nova Scotia Power…
…
continue reading
1
Final Encore Episode - Research, Cybersecurity Awareness and Training
1:23:55
1:23:55
Play later
Play later
Lists
Like
Liked
1:23:55In this episode, host Jim Love discusses the importance of cybersecurity awareness and training, featuring insights from Michael Joyce of the Human-Centric Cybersecurity Partnership at the University of Montreal and David Shipley of Beauceron Security. They explore the impact of cybersecurity awareness programs, the decay of sustained vigilance pos…
…
continue reading
1
AI for MSPs: Transforming Business Processes and Driving Measurable Outcomes
21:54
21:54
Play later
Play later
Lists
Like
Liked
21:54Managed Service Providers (MSPs) are encouraged to shift their focus from traditional infrastructure management to becoming Managed Intelligence Providers (MIPs), emphasizing the integration of artificial intelligence (AI) into their service offerings. Chance Weaver, VP of AI Adoption at PAX 8, highlights the necessity for MSPs to engage in deeper …
…
continue reading
1
Inside the Dark Web: Exploring Cybercrime with Expert David Décary-Hétu
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02In this episode, the host shares a pre-recorded favorite interview with David Decary-Hetu, a criminologist at the University of Montreal. They discuss the dark web, its technology, and its role in cybercrime. Decary-Hetu explains how the dark web operates, its users, and the dynamics between researchers and law enforcement in tackling cyber threats…
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss key cybersecurity predictions for 2026, focusing on the rise of agentic AI, quantum computing threats, deepfakes, the expanding attack surface due to IoT, the evolution of cybercrime into corporate structures, and the necessity for cybersecurity to be viewed as a stra…
…
continue reading
1
AI for MSPs: Enhancing Service Desk Automation with Human-in-the-Loop Strategies
20:22
20:22
Play later
Play later
Lists
Like
Liked
20:22The conversation centers on the evolving role of automation in Managed Service Providers (MSPs), particularly the implementation of human-in-the-loop AI systems. Mathieu Tougas, CEO of Mizo Technologies, emphasizes that while automation can significantly enhance efficiency—reporting a 26% increase in technician capacity and a 30% reduction in escal…
…
continue reading
1
Episode 232: The Very Private Digital New Year Episode
35:47
35:47
Play later
Play later
Lists
Like
Liked
35:47Learn more about your ad choices. Visit megaphone.fm/adchoicesBy DeleteMe
…
continue reading
1
MongoDB - MongoBleed Vulnerability Exploit Reported On Christmas Day
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01Cybersecurity Today: MongoDB Vulnerability 'Mongo Bleed' Exploited, Rainbow Six Siege Hacked, Trust Wallet Compromise, and GrubHub Crypto Scams In this episode of Cybersecurity Today, David Shipley covers significant cybersecurity incidents that occurred over the holiday period. The major topics include the 'Mongo Bleed' vulnerability in MongoDB th…
…
continue reading
1
Stop Secrets Creep Across Developer Platforms
42:26
42:26
Play later
Play later
Lists
Like
Liked
42:26Developers are exposing their organizations' most sensitive information; our guests explain why it's happening and how to stop it.By InformaTechtarget
…
continue reading
This is an interview with former hacker Brian Black. Brian is now on the right side of the battle and bringing his skills to to the fight against hackers. He finds the weaknesses in corporate security so that it can be patched. This was one of my favourite interviews this year. Listening to what Brian has learned and understanding how we can use th…
…
continue reading
1
Wildfires, Lawsuits, AI, and M&A: A Look Back at Insurance in 2025 | The Insurance Wrap-Up
20:31
20:31
Play later
Play later
Lists
Like
Liked
20:31Insurance Journal recaps the biggest stories of 2025, from record-breaking wildfires and climate losses to broker mega-deals, litigation reform, cyber threats, AI-driven layoffs, and signs of recovery in key insurance markets heading into 2026. Watch this end-of-year exclusive with Carrier Management’s Elizabeth Blosfield, Insurance Journal’s Ezra …
…
continue reading
1
MSP Cybersecurity: Exploring Digital Identity and Misinformation in Tech Thrillers with Robbie Bach
19:58
19:58
Play later
Play later
Lists
Like
Liked
19:58Robbie Bach, former president of Microsoft's Entertainment and Devices Division, discusses his transition from technology executive to author of political techno-thrillers, focusing on his latest book, The Blockchain Syndicate. The narrative explores themes of digital identity, misinformation, and the vulnerabilities of modern institutions, emphasi…
…
continue reading
1
The Ransomware Ecosystem: An Encore Holiday Episode
1:15:54
1:15:54
Play later
Play later
Lists
Like
Liked
1:15:54Jim takes a break for some R&R during the holidays and shares his favorite podcast episodes from the year. He acknowledges that some listeners might have heard these episodes already, while others may find them new. The podcast's production is supported by Meter, a company providing integrated networking solutions. Additionally, support from listen…
…
continue reading
1
How AI Is Shifting the Telecom Landscape (with Roger Entner)
32:41
32:41
Play later
Play later
Lists
Like
Liked
32:41As the increased use of artificial intelligence necessitates connectivity, it will continue to become inextricably linked to the digital network landscape. When people talk about artificial intelligence, they usually focus on algorithms, chips, or data centers. But there’s a less visible piece that determines whether any of it works in the real wor…
…
continue reading