Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

CISA Podcasts

show episodes
 
The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
  continue reading
 
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
  continue reading
 
Artwork

1
SecurityMetrics Podcast

SecurityMetrics

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Artwork

1
Cyber Focus

McCrary Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
  continue reading
 
This is THE PODCAST for learning about how to dominate your professional accounting or finance career and how to become certified in your field as a CPA, CMA, EA, CIA or CISA. Bryan Kesler walks you through the steps he took to pass the CPA exam while working full time and hosts interviews with people very similar to yourself to learn how they are successful in their careers. Bryan launched his blog theCPAguide.com and CMAguide.com in July of 2012 and has helped thousands of people sign up a ...
  continue reading
 
Just Security is an online forum for the rigorous analysis of national security, foreign policy, and rights. We aim to promote principled solutions to problems confronting decision-makers in the United States and abroad. Our expert authors are individuals with significant government experience, academics, civil society practitioners, individuals directly affected by national security policies, and other leading voices.
  continue reading
 
In 10 minutes daily, The Business of Tech delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering 'Why Do We Care?', channel veteran Dave Sobel brings you up to speed and provides resources to go deeper. With insights and analysis, this focused podcast focuses on the knowledge you need to be effective, profitable, and relevant.
  continue reading
 
Artwork

1
Explain to Shane

AEI Podcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology has become increasingly important to policy debates, but these debates won’t be productive without an understanding of how the technology in question works. AEI Visiting Fellow Shane Tews interviews tech industry experts to explain how the apps, services, and structures of today's information technology systems work, and how they shape our social and economic life.
  continue reading
 
Artwork
 
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
  continue reading
 
Artwork
 
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
  continue reading
 
Artwork
 
IT authors and entrepreneurs Ryan Morris, Karl Palachuk, and Dave Sobel provide commentary on the changing world of technology opportunities and emerging tech. We want to expand the discussion from the SMB IT channel to all things tech - with one eye on the future and the other on profits. Join us!
  continue reading
 
Artwork

1
Risk & Repeat

TechTarget Editorial

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
  continue reading
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
  continue reading
 
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
  continue reading
 
Artwork
 
Emagine the Future is a cybersecurity and technology podcast aimed to offer ambitious technology and national security professionals with actionable insights and unique stories from proven industry leaders. Each week, we release conversations with experts from the intelligence, defense, civilian, and private sectors where we discuss current events, career and skill development, technology and national security, and the future. Obtain the edge you need to stay current, to accelerate your deve ...
  continue reading
 
“It’s 5:05!'' is a daily audio news cast highlighting security and open source stories from around the world. We filter for the real cybersecurity and open source stories in the news, so you won't have to. Each day, a global team of journalists contribute stories they found interesting in their daily research from the previous 24 hours. We present them to you in an easy to listen to format, making the resources available at the end of each episode so you can do a deep dive on stories you fin ...
  continue reading
 
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
  continue reading
 
Loading …
show series
 
Cybersecurity Today: Credit Card Skimming, Valley Rat Malware, WhatsApp Exploit & AI Defenses In this episode of Cybersecurity Today, hosted by Jim Love, we explore several critical cybersecurity threats and advancements. We cover a massive credit card skimming campaign active since early 2022, a severe bug in HPE OneView, the stealthy Valley Rat m…
  continue reading
 
AI is speeding up cyber operations and shrinking the window for defenders to respond. Nick Andersen, who leads CISA's Cybersecurity Division, explains why Anthropic's recent report caught attention: it described what Anthropic called the first publicly reported AI-orchestrated cyber espionage campaign, in which threat actors misused its Claude mode…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in cybersecurity, including Microsoft's overhaul of its bug bounty program, CISA's hiring strategy amidst workforce challenges, the US's shift towards a more aggressive cyber strategy, and insights from the updated OWASP Top 10 vulnerabilities. The…
  continue reading
 
This episode examines why growing concern over AI-driven skills obsolescence is less about workforce displacement and more about authority, accountability, and liability for MSPs. As AI systems increasingly triage tickets, remediate issues, and shape outcomes, MSPs are absorbing responsibility for decisions made by tools they did not design and can…
  continue reading
 
Rising workplace use of artificial intelligence is outpacing organizational governance, according to data from Microsoft and Gallup. Microsoft reports global AI adoption reached 16.3% in 2025, while Gallup finds nearly half of U.S. workers use AI tools at work at least annually. Despite that usage, only a minority of employees report clear employer…
  continue reading
 
Chris Inglis joins Frank Cilluffo to break down what offensive cyber strategy should look like in an era of strategic competition. Drawing from the McCrary Institute's new report on U.S. cyber policy, Inglis argues that resilience and consequences are not competing theories—they have to work together. He explains why "defend forward" and persistent…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the challenges faced in the job market, particularly the rise of scams on platforms like LinkedIn. They emphasize the importance of verifying recruiters and job postings to avoid falling victim to scams. The conversation then shifts to the vulnerabilities associated w…
  continue reading
 
Bob Lord (Yahoo, DNC, CISA) and Lauren Zarik (Harvard’s Belfer Center, CISA) don't think cybersecuirty (or lack of it) should be the customer’s problem. Drawing parallels to Ralph Nader’s fight against unsafe cars, they explain how to fix the root of the problem. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
Slowing U.S. job growth alongside rising labor productivity highlights how organizations are replacing hiring with automation and AI-driven systems. Government labor data shows job growth in 2025 fell to roughly 584,000 positions, while productivity rose nearly five percent in the third quarter, allowing output to increase without additional staff.…
  continue reading
 
Happy New Year, On Point Nation! Let’s start with a fresh look on improving your sales techniques. Let’s face it: We are all in sales in some way, right? And our guest Amy Reczek is a terrific sales coach. On this recording Amy unveils some techniques she discovered herself along the way as a trainer and speaker. Your posture, what you’re doing wit…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley covers the FBI's warning about North Korean state-sponsored QR code phishing campaigns targeting U.S. organizations. Additionally, he discusses Europol's arrest of 34 individuals in Spain tied to the infamous Black Acts crime syndicate and the uncertainty surrounding CISA's pre-ransomware n…
  continue reading
 
Procurement is experiencing a significant shift as organizations increasingly adopt automation and artificial intelligence (AI) to enhance sourcing, purchasing, and spend management processes. Kevin Frechette, CEO and co-founder of Fairmarkit, discusses how their platform enables enterprises to transition from manual procurement methods to AI-drive…
  continue reading
 
The recent acquisition of Small Biz Thoughts and IT Service Provider University by MSP Radio marks a significant shift in the landscape of resources available to Managed Service Providers (MSPs). This acquisition aims to ensure the continued stewardship of valuable intellectual property, including books and community resources, while allowing found…
  continue reading
 
In this episode of Cybersecurity Today, brought to you by Meter, we review key events and stories from the past few weeks. Join host Jim along with experts Tammy Harper from Flair, Laura Payne from White Tuque, and David Shipley from Beauceron Security as they discuss major cybersecurity events that unfolded over the holidays, including the MongoDB…
  continue reading
 
Intel has launched its Core Ultra Series 3 central processing units, utilizing its new 18A process technology, which aims to enhance performance and efficiency across various applications, including gaming and professional workloads. This development is part of Intel's strategy to regain competitiveness in the CPU market, which has faced increasing…
  continue reading
 
Cybersecurity Today: Sideloaded App Issues, Fake Blue Screen Attacks, and Rising Ransomware Threats In this episode of Cybersecurity Today, host Jim Love discusses HSBC blocking sideloaded apps with its banking app, new social engineering attacks using fake Windows blue screens to install malware, and the discovery of long-standing compromised Chro…
  continue reading
 
Google has introduced an AI-powered inbox view for Gmail, designed to enhance user experience by transforming the traditional email interface into a personalized platform that includes to-do items and topic summaries. This feature, currently available to trusted testers in the U.S. for consumer Gmail accounts, aims to help users manage their emails…
  continue reading
 
Prior to the U.S. attacks that dislodged president Nicolas Maduro of Venezuela, American forces have for weeks been blockading U.S.-sanctioned ships carrying Venezuelan oil. In mid-December, the United States began boarding, and seizing, tankers in the so‑called “shadow fleet” that move sanctioned oil across the globe, starting with stateless vesse…
  continue reading
 
Microsoft has announced significant changes to its Teams platform, set to take effect on January 12, 2026. The platform will automatically enhance messaging security by blocking risky files and scanning shared links for potential phishing threats. This proactive measure aims to protect organizations, particularly smaller ones without dedicated secu…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love discusses the latest in cybersecurity threats including the rapidly growing Kim Wolf botnet affecting millions of devices, the rising threats to file-sharing environments, and the intersection of cybercrime with physical supply chains. He also covers an audacious hacktivist takedown of white sup…
  continue reading
 
Artificial intelligence adoption is accelerating without formal ownership as employees, customers, and patients integrate AI tools into daily decisions. Surveys from Gallup show 45% of U.S. employees use AI at work at least occasionally, while research cited by OpenAI indicates roughly 60% of American adults recently used AI for health-related ques…
  continue reading
 
Cyber Focus kicks off 2026 (and its 100th new episode) with rapid-fire predictions from McCrary Institute senior fellows. They flag big policy inflection points—especially whether Congress can reauthorize "CISA 2015," sustain information-sharing protections, and keep state and local cybersecurity funding on track. Tech-wise, the group focuses on AI…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in Microsoft's security protocols, particularly regarding Kerbroasting and the transition from RC4 to AES encryption. They delve into the challenges surrounding the adoption of passkeys, emphasizing the need for user education and the importance of…
  continue reading
 
Former cybercrime kingpin Brett Johnson didn’t just break the law; he built the tools still used by criminals today. He's back for another episode to check in and unpack why cybercrime works, how defenses fail, and the way life itself is often the ultimate "in" for an attacker. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
The U.S. economy demonstrated robust growth in the third quarter of 2025, with a gross domestic product (GDP) increase of 4.3%, according to the Commerce Department. This growth occurred despite consumer concerns and uncertainties related to tariffs, with military spending and corporate profits contributing significantly. However, the technology se…
  continue reading
 
In this episode of 'Cybersecurity Today', host David Shipley discusses significant cyber events and their implications. The podcast explores hints by President Donald Trump regarding the use of cyber tactics in a U.S. operation that resulted in a power outage in Venezuela. The episode also delves into the April 2025 data breach at Nova Scotia Power…
  continue reading
 
In this episode, host Jim Love discusses the importance of cybersecurity awareness and training, featuring insights from Michael Joyce of the Human-Centric Cybersecurity Partnership at the University of Montreal and David Shipley of Beauceron Security. They explore the impact of cybersecurity awareness programs, the decay of sustained vigilance pos…
  continue reading
 
Managed Service Providers (MSPs) are encouraged to shift their focus from traditional infrastructure management to becoming Managed Intelligence Providers (MIPs), emphasizing the integration of artificial intelligence (AI) into their service offerings. Chance Weaver, VP of AI Adoption at PAX 8, highlights the necessity for MSPs to engage in deeper …
  continue reading
 
In this episode, the host shares a pre-recorded favorite interview with David Decary-Hetu, a criminologist at the University of Montreal. They discuss the dark web, its technology, and its role in cybercrime. Decary-Hetu explains how the dark web operates, its users, and the dynamics between researchers and law enforcement in tackling cyber threats…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss key cybersecurity predictions for 2026, focusing on the rise of agentic AI, quantum computing threats, deepfakes, the expanding attack surface due to IoT, the evolution of cybercrime into corporate structures, and the necessity for cybersecurity to be viewed as a stra…
  continue reading
 
The conversation centers on the evolving role of automation in Managed Service Providers (MSPs), particularly the implementation of human-in-the-loop AI systems. Mathieu Tougas, CEO of Mizo Technologies, emphasizes that while automation can significantly enhance efficiency—reporting a 26% increase in technician capacity and a 30% reduction in escal…
  continue reading
 
Cybersecurity Today: MongoDB Vulnerability 'Mongo Bleed' Exploited, Rainbow Six Siege Hacked, Trust Wallet Compromise, and GrubHub Crypto Scams In this episode of Cybersecurity Today, David Shipley covers significant cybersecurity incidents that occurred over the holiday period. The major topics include the 'Mongo Bleed' vulnerability in MongoDB th…
  continue reading
 
This is an interview with former hacker Brian Black. Brian is now on the right side of the battle and bringing his skills to to the fight against hackers. He finds the weaknesses in corporate security so that it can be patched. This was one of my favourite interviews this year. Listening to what Brian has learned and understanding how we can use th…
  continue reading
 
Insurance Journal recaps the biggest stories of 2025, from record-breaking wildfires and climate losses to broker mega-deals, litigation reform, cyber threats, AI-driven layoffs, and signs of recovery in key insurance markets heading into 2026. Watch this end-of-year exclusive with Carrier Management’s Elizabeth Blosfield, Insurance Journal’s Ezra …
  continue reading
 
Robbie Bach, former president of Microsoft's Entertainment and Devices Division, discusses his transition from technology executive to author of political techno-thrillers, focusing on his latest book, The Blockchain Syndicate. The narrative explores themes of digital identity, misinformation, and the vulnerabilities of modern institutions, emphasi…
  continue reading
 
Jim takes a break for some R&R during the holidays and shares his favorite podcast episodes from the year. He acknowledges that some listeners might have heard these episodes already, while others may find them new. The podcast's production is supported by Meter, a company providing integrated networking solutions. Additionally, support from listen…
  continue reading
 
As the increased use of artificial intelligence necessitates connectivity, it will continue to become inextricably linked to the digital network landscape. When people talk about artificial intelligence, they usually focus on algorithms, chips, or data centers. But there’s a less visible piece that determines whether any of it works in the real wor…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play