The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
…
continue reading
CISA Podcasts
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
This is THE PODCAST for learning about how to dominate your professional accounting or finance career and how to become certified in your field as a CPA, CMA, EA, CIA or CISA. Bryan Kesler walks you through the steps he took to pass the CPA exam while working full time and hosts interviews with people very similar to yourself to learn how they are successful in their careers. Bryan launched his blog theCPAguide.com and CMAguide.com in July of 2012 and has helped thousands of people sign up a ...
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
A delicious mix of Insurance and TV
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
A delicious mix of Insurance and TV
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Just Security is an online forum for the rigorous analysis of national security, foreign policy, and rights. We aim to promote principled solutions to problems confronting decision-makers in the United States and abroad. Our expert authors are individuals with significant government experience, academics, civil society practitioners, individuals directly affected by national security policies, and other leading voices.
…
continue reading
Technology has become increasingly important to policy debates, but these debates won’t be productive without an understanding of how the technology in question works. AEI Visiting Fellow Shane Tews interviews tech industry experts to explain how the apps, services, and structures of today's information technology systems work, and how they shape our social and economic life.
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
…
continue reading
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
…
continue reading
The Cyber Resilience Brief is your 15-minute pulse on how organizations can build stronger defenses and achieve true cyber resilience. Each episode dives into the practical realities of Breach and Attack Simulation (BAS), adversarial exposure validation, and the evolving strategies that keep modern enterprises secure. Hosted by Tova Dvorin and brought to you by SafeBreach — the leader in Adversarial Exposure Validation — this podcast features insights from cybersecurity leaders, integration ...
…
continue reading
IT authors and entrepreneurs Ryan Morris, Karl Palachuk, and Dave Sobel provide commentary on the changing world of technology opportunities and emerging tech. We want to expand the discussion from the SMB IT channel to all things tech - with one eye on the future and the other on profits. Join us!
…
continue reading
…
continue reading
A FEMA podcast highlighting innovation in the field of emergency management and sharing stories of communities and individuals recovering after disasters.
…
continue reading
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
…
continue reading
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
…
continue reading
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
…
continue reading
Emagine the Future is a cybersecurity and technology podcast aimed to offer ambitious technology and national security professionals with actionable insights and unique stories from proven industry leaders. Each week, we release conversations with experts from the intelligence, defense, civilian, and private sectors where we discuss current events, career and skill development, technology and national security, and the future. Obtain the edge you need to stay current, to accelerate your deve ...
…
continue reading
“It’s 5:05!'' is a daily audio news cast highlighting security and open source stories from around the world. We filter for the real cybersecurity and open source stories in the news, so you won't have to. Each day, a global team of journalists contribute stories they found interesting in their daily research from the previous 24 hours. We present them to you in an easy to listen to format, making the resources available at the end of each episode so you can do a deep dive on stories you fin ...
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
1
AI-Orchestrated Cyber Espionage and the Future of Cyber Defense with CISA's Nick Andersen
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37AI is speeding up cyber operations and shrinking the window for defenders to respond. Nick Andersen, who leads CISA's Cybersecurity Division, explains why Anthropic's recent report caught attention: it described what Anthropic called the first publicly reported AI-orchestrated cyber espionage campaign, in which threat actors misused its Claude mode…
…
continue reading
1
Microsoft Bug Bounty, CISA hiring surge, US goes offensive in cyber ops, OWASP Top 10
42:22
42:22
Play later
Play later
Lists
Like
Liked
42:22Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in cybersecurity, including Microsoft's overhaul of its bug bounty program, CISA's hiring strategy amidst workforce challenges, the US's shift towards a more aggressive cyber strategy, and insights from the updated OWASP Top 10 vulnerabilities. The…
…
continue reading
1
CISA vs. CISA: How Cybersecurity Legislation Is Being Held Hostage by Politics (with Caitlin Clarke, Cristin Flynn Goodwin, and Jim Lewis)
55:40
55:40
Play later
Play later
Lists
Like
Liked
55:40One of the most important cybersecurity laws in the country quietly expired last October with no sign of reauthorization on the horizon. Instead, the conflation between the 2015 Cybersecurity Information Sharing Act and the Cybersecurity and Infrastructure Security Agency has led to a political standstill that will only have negative impacts on Ame…
…
continue reading
1
DOJ CISA Warn Russia Hackers Targeting Critical Infrastructure, Aeroflot Hacked Through Little-Known Vendor, Chrome Zero-Day Vulnerability Exploited, Intel AMD Processors Affected by PCIe Vulnerabilities ...
17:58
17:58
Play later
Play later
Lists
Like
Liked
17:58🎙️ DOJ CISA Warn Russia Targeting Critical Infrastructure, Chrome Zero-Day, Intel AMD PCIe Flaws 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1026: Today's episode will discuss the latest news: · Google Patches Gemini Enterprise Vulnerability Exposing Corporate Dat…
…
continue reading
1
React2Shell Exploits, CISA’s Brickstorm Warning, ShadyPanda’s Browser Weaponization
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John along with systems security engineer Corey and intelligence analyst Hayden as they discuss: Chinese Threat Groups Exploiting the React2Shell Vulnerability (1:18) CISA Issues Alert on Persistent Brickstorm Backdoor Attacks (9:05) ShadyPanda Hackers Turn Millions of Browsers into Weapon…
…
continue reading
1
Ep. 33 - BRICKSTORM Reemerges: CISA & NSA Warn of New Persistence Tactics and Cyber Resilience Gaps
12:31
12:31
Play later
Play later
Lists
Like
Liked
12:31In Episode 33 of The Cyber Resilience Brief, hosts Tova Dvorin and Adrian Culley revisit the BRICKSTORM threat—this time through the lens of the new CISA, NSA, and Canadian Cyber Centre joint advisory. While Episode 24 explored BRICKSTORM’s origin, stealth techniques, and UNC5221’s long-term espionage campaign, this episode focuses on what’s change…
…
continue reading
1
How CISA Data Is Shaping Smarter Cyber Risk Decisions
1:57
1:57
Play later
Play later
Lists
Like
Liked
1:57CISA’s threat data helps companies and insurers sharpen their cyber-risk strategies by sharing real-time insights on attack patterns, emerging threats, and proactive defense tactics. Watch this sneak peek at the Insuring Cyber Podcast with host Elizabeth Blosfield and guest Brent Rieth of Aon – to watch the full interview visit https://www.insuranc…
…
continue reading
1
22.7 Million Impacted in Aflac Data Breach, Shinhan Card Data Breach, Nova Scotia Power Incident Report Confirms Cyberattack, FCC Bans Foreign Made Drones and Key Communication Equipment
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31🎙️ Aflac 2.2M Breach, Shinhan Card Data Breach, Nova Scotia Power Cyberattack, FCC Bans Foreign Drones 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1033: Today's episode will discuss the latest news: Critical MongoDB Vulnerability Threatens Database Security Threat…
…
continue reading
1
Romania Water Agency Ransomware, Nissan Red Hat Breach, University of Phoenix 3.5M Data Breach
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29🎙️ Romania Water Agency Ransomware, Nissan Red Hat Breach, University of Phoenix 3.5M Data Breach 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1032: Today's episode will discuss the latest news: La Poste France DDoS Disruption Days Before Christmas Spotify Disables…
…
continue reading
1
Introducing the BSP Maturity Model for Identity
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the Security Maturity Model, focusing on identity security. They explore the current state of security practices, identifying areas where organizations may be behind the curve, on track, or ahead of the curve in their security measures. Key topics include the importan…
…
continue reading
1
Ep. 36 - TIBER-EU Explained: How Threat-Led Red Teaming Is Redefining Cyber Resilience
13:14
13:14
Play later
Play later
Lists
Like
Liked
13:14Threat-led red teaming is no longer optional in Europe — it’s becoming the foundation of cyber resilience. In this episode of The Cyber Resilience Brief, host Tova Dvorin is joined by Adrian Culley, SafeBreach’s offensive security expert for Europe and the UK, to break down the TIBER-EU framework and why it’s reshaping how financial institutions an…
…
continue reading
1
Episode 231: WTH 2025: Laptop Farms, Campus Cults, and the End of Anonymity
43:00
43:00
Play later
Play later
Lists
Like
Liked
43:00From AI regulation fights and North Korean laptop farms to Nigerian campus cults, the human toll of online crime, and the death of online anonymity it's time to review the year in cyber stories—the good, the bad, the unimaginable, and what to do when "they" come for you. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
1
Senate Confirms Pentagon CIO, North Korea $2B Crypto Stolen, UK Foreign Office Hacked by China
17:25
17:25
Play later
Play later
Lists
Like
Liked
17:25🎙️ Senate Confirms Pentagon CIO, North Korea $2B Crypto Stolen, UK Foreign Office Hacked by China 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1031: Today's episode will discuss the latest news: Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water…
…
continue reading
1
The Access‑Trust Gap: Why security can’t see what work depends on
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35In our final episode of 2025, Dave Lewis, global advisory CISO for 1Password, joins Greg Otto to unpack the “access‑trust gap”: the growing mismatch between what employees (and tools like AI assistants) can access at work and what security teams can actually see, verify, and control. Dav explains how this gap shows up in everyday ways—logins that b…
…
continue reading
1
Auto Parts Giant LKQ Confirms Oracle EBS Breach, FBI Takes Down Alleged Money Laundering Operation, Cisco Warns of Unpatched AsyncOS Zero-Day, SonicWall Fixes Actively Exploited CVE
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33🎙️ Auto Parts Giant LKQ Oracle EBS Breach, FBI Takes Down Money Laundering Op, Cisco AsyncOS Zero-Day 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1030: Today's episode will discuss the latest news: · Critical React2Shell Flaw Exploited in Ransomware Attacks · Kims…
…
continue reading
1
Can the U.S. Still Lead on Anti-Corruption? Understanding the Combating Global Corruption Act
38:18
38:18
Play later
Play later
Lists
Like
Liked
38:18The Combating Global Corruption Act marks a new chapter in how the U.S. approaches corruption abroad. For the first time, the State Department must publicly rank foreign governments based on their anti-corruption efforts–evaluations that may carry real consequences for foreign aid, diplomacy, and sanctions. Yet the rollout comes at a moment of cont…
…
continue reading
1
React2Shell Attacks Evolve, ClickFix Attacks, and Holiday Season Threats
31:38
31:38
Play later
Play later
Lists
Like
Liked
31:38Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analyst Ivan as they discuss: React2Shell Exploits Flood the Internet as Attacks Continue (1:06) ClickFix Style Attack Leveraging Grok and ChatGPT for Malware Delivery (7:39) New ConsentFix Attack Hijacking Microsoft Accounts via Azure CLI (13:50) Holiday Season Attac…
…
continue reading
1
Russia GRU Sandworm Targets Energy Sector, Venezuela Oil Giant PDVSA Cyberattack, 700Credit 5.8M Breach
16:09
16:09
Play later
Play later
Lists
Like
Liked
16:09🎙️ Russia GRU Sandworm Targets Energy Sector, Venezuela Oil Giant PDVSA Cyberattack, 700Credit 5.8M Breach 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1029: Today's episode will discuss the latest news: · Hackers Exploit Newly Patched Fortinet Auth Bypass Flaws · …
…
continue reading
1
Ep. 35 - BAS, APTs, AEV, and CTEM Explained: A Practical Guide to Cybersecurity Acronyms
17:55
17:55
Play later
Play later
Lists
Like
Liked
17:55In this episode of the Cyber Resilience Brief, hosts Tova Dvorin and Adrian Culley clearly and practically explain some of the most commonly used — and most commonly misunderstood — terms in modern cybersecurity. Together, they break down: What Breach and Attack Simulation (BAS) actually means in practice How Advanced Persistent Threats (APTs) oper…
…
continue reading
1
Revisiting Offensive Cyber Discussion with Adm. Mike Rogers (Ret.)
45:10
45:10
Play later
Play later
Lists
Like
Liked
45:10In this re-releases episode of Cyber Focus, host Frank Cilluffo sits down with Admiral Mike Rogers (Ret.), former Commander of U.S. Cyber Command and Director of the National Security Agency. Rogers shares insights from his leadership across two administrations, discussing offensive cyber operations, the evolution of Cyber Command, and pressing nat…
…
continue reading
1
SoundCloud Breach VPN Access Disrupted, Jaguar Land Rover Staff Data Stolen, France Ministry Hacked
18:30
18:30
Play later
Play later
Lists
Like
Liked
18:30🎙️ SoundCloud Breach VPN Access Disrupted, Jaguar Land Rover Staff Data Stolen, France Ministry Hacked 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1028: Today's episode will discuss the latest news: · Pornhub Extorted After Hackers Steal Premium Member Activity Da…
…
continue reading
A deadbolt clicks. This email, that voice--they sound all right. Then things go sideways. This week, 911 Cyber CEO Marc Raphael joins the pod to explore how AI makes scams faster, smoother, and harder to spot, and what you can do to stay hard to hit in the new threatscape. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
1
Former Accenture Employee Charged Over Cybersecurity Fraud, Coupang Data Breach Traced to Ex-Employee Who Retained System Access, Apple Two Zero-Day Flaws Exploited, MITRE Releases 2025 List
17:46
17:46
Play later
Play later
Lists
Like
Liked
17:46🎙️ Ex-Accenture Employee Charged Cybersecurity Fraud, Coupang Breach Ex-Employee, Apple 2 Zero-Days 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1027: Today's episode will discuss the latest news: · Coupang Data Breach Traced to Ex-Employee Who Retained System Acce…
…
continue reading
1
How AI has complicated enterprise mobile security
38:49
38:49
Play later
Play later
Lists
Like
Liked
38:49In this episode of Safe Mode, Jim Dolce, CEO of Lookout, reveals that 40% of phishing attacks now target mobile devices—yet CISOs are drastically underspending on mobile security compared to email protection. Jim demonstrates how AI-powered attacks have become devastatingly effective, showing how his team created a voice-cloning impersonation attac…
…
continue reading
1
Microsoft Patch Tuesday 57 Flaws 3 Zero-Days, Adobe Patches 140 Bugs, Fortinet Critical FortiCloud Flaw
18:02
18:02
Play later
Play later
Lists
Like
Liked
18:02🎙️ Microsoft Patch Tuesday 57 Flaws 3 Zero-Days, Adobe Patches 140 Bugs, Fortinet Critical FortiCloud Flaw 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1025: Today's episode will discuss the latest news: · Ivanti Warns of Critical Endpoint Manager Code Execution Fl…
…
continue reading
1
Ep. 34 - Inside the Jaguar Land Rover Cyberattack: Supply Chain Failure, Scattered Spider, and the New Threat Ecosystem
14:38
14:38
Play later
Play later
Lists
Like
Liked
14:38The Jaguar Land Rover cyberattack has already cost the UK billions — and exposed a critical weakness in modern cybersecurity: supply chain risk. In this episode of The Cyber Resilience Brief, SafeBreach hosts Tova Dvorin and Adrian Culley sit down with Steve Cobb, CISO of SecurityScorecard, to unpack what really happened, why groups like Scattered …
…
continue reading
1
The Hidden Backbone of the Internet: Subsea Cable Security with Alex Botting
37:25
37:25
Play later
Play later
Lists
Like
Liked
37:25Undersea cables quietly carry almost all global internet traffic yet rarely feature in security debates. This episode explains how subsea infrastructure underpins the global economy, data flows, and modern military operations while facing frequent "accidental" disruptions and growing geopolitical risk. Listeners hear why chokepoints, island depende…
…
continue reading
1
React2Shell Exploitation Surges, Ransomware Payments Hit $4.5B, Poland Arrests Ukrainian Hackers
14:00
14:00
Play later
Play later
Lists
Like
Liked
14:00🎙️ React2Shell Exploitation Surges, Ransomware Payments Hit $4.5B, Poland Arrests Ukrainian Hackers 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1024: Today's episode will discuss the latest news: · Critical Apache Tika Vulnerability Leads to XXE Injection Attacks …
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the growing cybersecurity threat posed by the Chinese state-sponsored group, Salt Typhoon. They discuss the group's tactics, motivations, and the implications for global security. The conversation highlights China's strategic focus on economic power as a means of n…
…
continue reading
1
Episode 229: Why Most Cybersecurity Advice Is Wrong
46:51
46:51
Play later
Play later
Lists
Like
Liked
46:51How do you stay safe online? (Wrong answers only.) Avoid public Wi-Fi, QR codes, charging stations. Cyber OG Bob Lord (Yahoo, DNC, CISA) wrote an open letter tackling the real harm caused by bad advice, and offering a better path with proven practices to stay safe online. Check out https://www.hacklore.org/letter Learn more about your ad choices. V…
…
continue reading
1
Beyond the Label: ECU Students Take On Ultra-Processed Food Risks | IJA Aftershow: Brenda Wells & ECU
19:54
19:54
Play later
Play later
Lists
Like
Liked
19:54A group of ECU students, led by Dr. Brenda Wells, presents a capstone project on the hidden risks of ultra-processed foods—exploring legal, health, and insurance implications while gaining real-world public-speaking experience. Watch the full Academy of Insurance class that’s discussed in the aftershow: https://www.ijacademy.com/beyond-the-label-th…
…
continue reading
1
EP. 16: The Whopper Lawsuit, Pineapple Drama & Insurance Legends Unite
39:55
39:55
Play later
Play later
Lists
Like
Liked
39:55Join our Golfertainment hosts George Jack, Patrick Wraight, and Kevin Amrhein alongside special guest Frank Pennachio—Florida insurance pro, author, Tampa Bay Rays fan, and all-around great conversationalist—as they dive into a festive mix of holiday cheer, standout insurance cases, and bold predictions for the year ahead. Frank brings wisdom, big …
…
continue reading
1
EP. 16: The Whopper Lawsuit, Pineapple Drama & Insurance Legends Unite
39:55
39:55
Play later
Play later
Lists
Like
Liked
39:55Join our Golfertainment hosts George Jack, Patrick Wraight, and Kevin Amrhein alongside special guest Frank Pennachio—Florida insurance pro, author, Tampa Bay Rays fan, and all-around great conversationalist—as they dive into a festive mix of holiday cheer, standout insurance cases, and bold predictions for the year ahead. Frank brings wisdom, big …
…
continue reading
1
US Organizations Warned of Chinese Malware Used for Long-Term Persistence, Critical React2Shell Flaw in React Next.js, New Wave of VPN Login Attempts Targets Palo Alto GlobalProtect Portals
16:04
16:04
Play later
Play later
Lists
Like
Liked
16:04🎙️ China Malware Long-Term Persistence US Warning, Critical React2Shell Flaw, Palo Alto VPN Attack Wave 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1023: Today's episode will discuss the latest news: · Researchers Uncover 30 Flaws in AI Code Assistants and Develop…
…
continue reading
Jennifer Palmieri is chief people officer at Westfield, which certainly isn’t a regional p/c carrier anymore. She has witnessed growth in specialty lines and international risks. It’s nearing $5 billion in revenues and 4,000 employees. We checked in with Jen on how human resource strategies are playing out. “My leadership philosophy centers on auth…
…
continue reading
Jennifer Palmieri is chief people officer at Westfield, which certainly isn’t a regional p/c carrier anymore. She has witnessed growth in specialty lines and international risks. It’s nearing $5 billion in revenues and 4,000 employees. We checked in with Jen on how human resource strategies are playing out. “My leadership philosophy centers on auth…
…
continue reading
1
253 - Shadow IT and SaaS Sprawl - The Hidden Security Risk in Your Organization
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01Enjoying the content? Let us know your feedback! Imagine discovering that your organization is running nearly ten times more applications than your IT team knows about. Imagine learning that two out of every three cloud tools being used by your employees were never approved, never vetted for security, and are completely invisible to your monitoring…
…
continue reading
1
Breaking down the latest era of Chinese cyberespionage with Booz Allen's Nate Beach-Westmoreland
29:37
29:37
Play later
Play later
Lists
Like
Liked
29:37In this episode, we sit down with Nate Beach-Westmoreland, Head of Strategic Cyber Threat Intelligence at Booz Allen, to explore the evolving sophistication of Chinese cyber operations and their implications for U.S. national security. Our guest breaks down how the PRC leverages trusted-relationship abuse, network edge exploitation, and AI-powered …
…
continue reading
1
Zombie Accounts, Broken Surplus, and the 2026 Forecast | IJA Aftershow: Chris Burand
11:59
11:59
Play later
Play later
Lists
Like
Liked
11:59In this Academy aftershow, George and Patrick talk with this week’s instructor, Chris Burand, about identifying weak carriers, understanding industry missteps, and why intangible assets may determine what happens next in 2026. Watch the full Academy of Insurance class that’s discussed in the aftershow: Predicting 2026: Capacity, Competition, and Ca…
…
continue reading
1
Marquis Data Breach Impacts Over 74 US Banks, Freedom Mobile Discloses Data Breach, Retail Giant Leroy Merlin Discloses Data Breach, Arizona Attorney General Sues Chinese Online Retailer Temu
18:47
18:47
Play later
Play later
Lists
Like
Liked
18:47🎙️ Marquis Breach Hits 74+ US Banks, Freedom Mobile Data Exposed, Arizona Sues Temu Data Theft 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1022: Today's episode will discuss the latest news: · India Drops Mandate for Sanchar Saathi App Amid Privacy and Surveillanc…
…
continue reading
1
EP. 103: What Insurers Should Know About Banking for Cannabis Companies
19:14
19:14
Play later
Play later
Lists
Like
Liked
19:14Banking in the cannabis industry is a niche that few people may understand. It’s not without risk, but there are hundreds of banks offering their services to cannabis operators. In our latest episode, we talk to specialty banker Peter Su with First Central Savings bank about cannabis banking and what insurance and claims professionals should know a…
…
continue reading
1
EP. 103: What Insurers Should Know About Banking for Cannabis Companies
19:14
19:14
Play later
Play later
Lists
Like
Liked
19:14Banking in the cannabis industry is a niche that few people may understand. It’s not without risk, but there are hundreds of banks offering their services to cannabis operators. In our latest episode, we talk to specialty banker Peter Su with First Central Savings bank about cannabis banking and what insurance and claims professionals should know a…
…
continue reading
1
Scattered Lapsus$ Hunters, SilverFox's ValleyRat Campaign, and More
25:01
25:01
Play later
Play later
Lists
Like
Liked
25:01Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analysts Alex and Hayden as they discuss: Scattered Lapsus$ Hunters Targeting Zendesk (1:14) Microsoft Teams Guest Access Phishing Bypass (3:37) Dark AI Tools Enhancing Threat Actors (6:08) Silver Fox’s Campaign: Chinese APT Spotlight (10:05) John Dilgen: Cyber Threat…
…
continue reading
1
Ep. 32 - Inside “The Com”: The Social-Engineering Supergroup Behind Global Ransomware Attacks
17:12
17:12
Play later
Play later
Lists
Like
Liked
17:12In this episode of The Cyber Resilience Brief, host Tova Dvorin and offensive security expert Adrian Culley expose The Com—the decentralized cybercrime collective behind threat groups like Lapsus$, Scattered Spider (UNC 3944 / Octo Tempest), and ShinyHunters. Together, they break down how this teenage-to-young-adult adversary ecosystem has weaponiz…
…
continue reading
1
North Korea Targets Crypto Exchange and IT Engineers, Penn Confirms Data Theft, Android Zero-Days Actively Exploited, 400K Secrets Exposed in Shai Hulud 2.0 Attack
17:05
17:05
Play later
Play later
Lists
Like
Liked
17:05North Korea Hacks Crypto, Android Under Attack, 400K Dev Secrets Exposed 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1021: Today's episode will discuss the latest news: · Android December patches two zero-days as CISA warns active exploitation · Iran targets Israe…
…
continue reading
1
Why Third-Party Risk Is Bigger Than Ever | Risky Future Summit
2:54
2:54
Play later
Play later
Lists
Like
Liked
2:54Organizations and insurers must adopt a shared, structured third-party risk strategy—balancing centralized oversight with decentralized responsibility—because modern vendor, cloud, and software-supply-chain exposures are too massive and interconnected for any single team to manage alone. Check out this sneak peek from the Risky Future Summit! To wa…
…
continue reading
1
EP. 110: Solving Insurance’s ‘Document Chaos’ with Agentic AI
21:33
21:33
Play later
Play later
Lists
Like
Liked
21:33In this episode of The Insuring Cyber Podcast, Kasey Roh, U.S. CEO of Upstage AI, discusses how AI is transforming some of the most complex and time-consuming workflows in insurance. Kasey breaks down how Upstage’s document intelligence technology is aiming to reshape underwriting and claims operations, as well as the evolving balance between human…
…
continue reading
1
EP. 110: Solving Insurance’s ‘Document Chaos’ with Agentic AI
21:33
21:33
Play later
Play later
Lists
Like
Liked
21:33In this episode of The Insuring Cyber Podcast, Kasey Roh, U.S. CEO of Upstage AI, discusses how AI is transforming some of the most complex and time-consuming workflows in insurance. Kasey breaks down how Upstage’s document intelligence technology is aiming to reshape underwriting and claims operations, as well as the evolving balance between human…
…
continue reading
1
The Army's "No Fail" Cyber Mission with Brandon Pugh
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48Army Principal Cyber Advisor Brandon Pugh joins Frank Cilluffo to address a stark reality: if critical infrastructure fails, the Army cannot mobilize. To meet this "no fail" mission, Pugh explains how the service is aggressively merging cyber with electronic warfare and cutting red tape to field new technology in days rather than years. They also d…
…
continue reading
1
Coupang Data Breach Impacts 33.7 Million People, AI Malware Campaigns Return, $29 Million in Crypto Seized in Takedown, India Mandates Cybersecurity App, & Chinese Front Companies Exposed in Espionage ...
17:25
17:25
Play later
Play later
Lists
Like
Liked
17:25🎙️ Coupang 33.7M Data Breach, AI Malware Returns, Crypto Seized & China Exposed 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1020: Today's episode will discuss the latest news: · $29 million Bitcoin seized in crypto-mixer operation · India launches national cyberse…
…
continue reading