Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
CISO Podcasts
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
SC Media and NowSecure are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
CISO Perspectives explores the evolving landscape of cybersecurity leadership, talent, and risk—because success in cybersecurity is about people, not just technology. Hosted by Kim Jones, veteran CISO and educator, this podcast challenges conventional thinking on leadership, talent pipelines, and the disconnects holding the profession back. Join Kim for candid discussions with industry leaders, and insights that help you build a stronger, more resilient cyber ecosystem.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
SC Media and NowSecure are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership.© Copyright 2025, National Security Corporation. All Rights Reserved
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
The Cyber-Savvy Boardroom, a Google Cloud Office of the CISO podcast, offers monthly 15-20 minute episodes featuring security leaders, board members, and thought leaders. Hosted by David Homovich and rotating Office of the CISO members, experts share insights for strategic clarity and improved organizational security. Guests include board members, Google Cloud/Google executives, Office of the CISO Board Insights team members, board advisors, and industry thought leaders.
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Johna Till Johnson & John Burke bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions a ...
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
The official EC-Council CISO Forum podcast.
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
Aphinia (https://www.aphinia.com) - a community of 1,500+ CISOs - is brining regular interviews with top information security executives who share their personal stories, actionable insights, helpful tactics to keep your enterprise safe and predictions for the future cybersecurity landscape.
…
continue reading
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Are you ready to explore the future of cybersecurity? Join us on Cyber Talks by Devoteam the videocast where industry experts, thought leaders, and practitioners share their insights, experiences, and strategic perspectives. Hosted by Rui Shantilal, VP of Devoteam Cyber Trust, each episode delves into key cybersecurity topics—from Offensive Security and DORA Compliance to Third-Party Risk Management and IAM. Whether you're a seasoned security leader, a CISO navigating complex challenges, or ...
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
Join Query CISO Neal Bridges as he explores the world of SecDataOps with different guests each episode. What is SecDataOps? Who should care about it? Wait, wasn’t it a throwaway joke?
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
…
continue reading
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
…
continue reading
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
…
continue reading
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
…
continue reading
Your hosts, Tom Meehan, CIO and CISO at CONTROLTEK and Shaun Ferrari, Global Cash Product Director at Currency Research share the latest information on the issues affecting the world of cash today. Featuring interviews with top industry experts and thought leaders, you’ll have a close look at trends, strategies, and technology influencing the world of cash. Stay informed on topics like cash security, payments technology, risks, the cash supply chain, and learn about strategies to support bet ...
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading

1
The Geopolitics of Code: Quantifying Risk in the Global Software Supply Chain
16:16
16:16
Play later
Play later
Lists
Like
Liked
16:16Global supply chains, particularly in critical sectors like technology, are facing unprecedented threats from sophisticated adversaries who exploit vulnerabilities in third-party software and digital ecosystems. This geopolitical reality is driving stringent international regulations, such as the EU's NIS2 Directive and Cyber Resilience Act (CRA), …
…
continue reading

1
S7E44 - A Conversation with Christopher Carter
32:21
32:21
Play later
Play later
Lists
Like
Liked
32:21In this episode, Greg Schaffer welcomes Christopher Carter, Chairman and CEO of Approyo, for a dynamic conversation about SAP, cybersecurity, and leadership. Chris shares his journey from early days at Coca-Cola to building a successful SAP consulting business, discusses key risks in SAP environments, and explores how AI is shaping threat detection…
…
continue reading

1
Now That You Mention It I HAVE Heard Some Hype Around These AI Tools
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24All links and images can be found on CISO Series. This week’s episode is hosted by David Spark, producer of CISO Series and Mike Johnson, CISO, Rivian. Joining them is Erwin Lopez, CISO, SLAC National Accelerator Laboratory. In this episode: The AI experimentation phase isn't optional When selling security becomes the hardest part of the job Threat…
…
continue reading
Regulation is a double-edged sword. While it helps create structure, establish accountability, and set standards, it also creates unnecessary hurdles, slower response times, and overly rigid systems. With every administration, policy goals and subsequently regulatory stances change, which can have major impacts on business operations. In this episo…
…
continue reading

1
#251 - AI Just Changed Data Security Requirements with Ronan Murphy
43:51
43:51
Play later
Play later
Lists
Like
Liked
43:51Learn how to elevate Data Protection in the Age of AI with Ronan Murphy In this episode of CISO Tradecraft, host G Mark Hardy and guest Ronan Murphy, Chief Strategy Officer at Forcepoint, discuss the critical importance of data protection for enterprises in the age of AI. Discover expert insights on common mistakes CISOs make, how AI revolutionizes…
…
continue reading

1
Ep 153: Inside ISO 42001: The Future of AI Governance with Danny Manimbo
40:09
40:09
Play later
Play later
Lists
Like
Liked
40:09By John Verry
…
continue reading

1
Cybersecurity, AI, and Communication: Dr. Eric Cole with Dr. Jill Schiefelbein
35:32
35:32
Play later
Play later
Lists
Like
Liked
35:32In this episode of Life of a CISO, Dr. Eric Cole sits down with communication strategist and tech-human behavior expert Dr. Jill Schiefelbein. Together, they explore the critical intersection of cybersecurity, leadership, and communication—diving into why technical solutions alone aren’t enough without clear messaging to executives, employees, and …
…
continue reading
In this episode of The New CISO, host Steve Moore speaks with Dr. Timo Wandhöfer, Group CISO and Head of Information Security & Business Continuity Management at Klöckner & Co, about the evolving responsibilities of modern CISOs and why influencing—not just convincing—stakeholders is essential for success. From his early career as a researcher in c…
…
continue reading

1
Responsible AI or Responsible Marketing? A CISO’s Take
47:30
47:30
Play later
Play later
Lists
Like
Liked
47:30"I get it. I need to stop banging on the table. This will be fixed in future episodes. Sorry for the poor sound experience." - David Get your Responsible AI Vendor Due Diligence Checklist here: https://webforms.pipedrive.com/f/ccV6a7kFIWKZpodmLcDbBhKhYnVU5N81A2tM20DGC8gepc0UtzfcqYaHXfzBi8gzuz Episode Summary: In this episode of The Professional CIS…
…
continue reading

1
OT on the Frontlines: Threat Intelligence You Can’t Ignore - Dawn Cappelli - CSP #216
33:18
33:18
Play later
Play later
Lists
Like
Liked
33:18Dawn Capelli, Head of OT-CERT at Dragos, unpacks the evolving risks to Operational Technology. From nation-state attacks on Ukraine’s infrastructure to hacktivists targeting U.S. water systems, she explains the PIPEDREAM malware, the top five SANS critical OT controls, and how Dragos’ OT-CERT program offers free resources to help organizations defe…
…
continue reading

1
The Sony Hollywood Hack | How Cybercrime Turned A Blockbuster Comedy Into A Global News Story
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41THE SONY HACK: HOLLYWOOD, NORTH KOREA & THE CYBER WAR THAT CHANGED EVERYTHING In 2014, Sony Pictures became ground zero for the first major nation-state cyberattack on a global corporation. The “Guardians of Peace,” linked to North Korea, crippled Sony’s networks, leaked unreleased films, and exposed troves of executive emails that forced high-leve…
…
continue reading

1
Episode 154: Integration of Incident Response into DevSecOps
33:12
33:12
Play later
Play later
Lists
Like
Liked
33:12In episode 154 of Cybersecurity Where You Are, Sean Atkinson discusses incident response in DevSecOps, exploring challenges and solutions in modern software development. He emphasizes the importance of integrating security into development processes and speaks about common issues like alert fatigue and software supply chain vulnerabilities. Here ar…
…
continue reading

1
European airports restore services, CISA deals with GeoServer exploit, Jaguar Land Rover extends shutdown
6:51
6:51
Play later
Play later
Lists
Like
Liked
6:51European airports restoring services after system breach CISA deals with GeoServer exploit App for outing Charlie Kirk’s critics leaks personal data Huge thanks to our sponsor, Conveyor Have you been personally victimized by a questionnaire this week? The queue never ends. But Conveyor can change that story. With AI that answers questionnaires of a…
…
continue reading

1
Solving the Cyber Workforce Crisis - Ep 168
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40Women make up only a fraction of the cybersecurity workforce—and many hit a career ceiling just 6 to 10 years in. At the same time, millions of cyber roles remain unfilled, and the talent gap keeps growing. Lynn Dohm, Executive Director of Women in CyberSecurity (WiCyS), is working to change that. In this episode, Lynn shares how WiCyS has grown fr…
…
continue reading

1
EP8 Francis deSouza on Enterprise Cyber Leadership
20:51
20:51
Play later
Play later
Lists
Like
Liked
20:51Hosts: David Homovich, Customer Advocacy Lead, Office of the CISO, Google Cloud Nick Godfrey, Senior Director and Head of Office of the CISO, Google Cloud Guest: Francis deSouza, COO, Google Cloud Resources: Board of Directors Insights Hub NIST Cybersecurity Framework Tabletopping the tabletop: New perspectives from cybersecurity’s favorite role-pl…
…
continue reading

1
Autonomous Identity Governance With Paul Querna
31:24
31:24
Play later
Play later
Lists
Like
Liked
31:24Episode Summary Can multi-factor authentication really “solve” security, or are attackers already two steps ahead? In this episode of The Secure Developer, we sit down with Paul Querna, CTO and co-founder at ConductorOne, to unpack the evolving landscape between authentication and authorisation. In our conversation, Paul delves into the difference …
…
continue reading

1
Building a Business-Aligned Cybersecurity Strategy | Interview with Thom Langford
53:14
53:14
Play later
Play later
Lists
Like
Liked
53:14In this episode, Dejan Kosutic, CEO at Advisera, chats with Thom Langford, CTO of the EMEA region at Rapid7 and a director at (TL)2 Security. Thom shares invaluable insights from his 30-year career in cybersecurity, focusing on creating a business-aligned cybersecurity strategy and building a cybersecurity culture. Learn why understanding your busi…
…
continue reading

1
The AI Paradox: Why Global Cyber Costs are Falling, But the Threat is Rising (The 5 Pillars of Readiness)
36:56
36:56
Play later
Play later
Lists
Like
Liked
36:56Cyber incidents are escalating sharply worldwide, characterized by a staggering 21 percent average annual growth rate in disclosed incidents since 2014 and the increasing sophistication of AI-driven attacks like deepfakes and advanced phishing. Despite this escalating threat volume, the global average cost of a data breach recently dropped by 9% to…
…
continue reading

1
EDR-Freeze, DeepMind persuasion, vendors exit ATT&CK
7:46
7:46
Play later
Play later
Lists
Like
Liked
7:46EDR-Freeze tool suspends security software DeepMind updates Frontier Safety Framework Major vendors withdraw from MITRE EDR Evaluations Huge thanks to our sponsor, Conveyor Security reviews don’t have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Conveyo…
…
continue reading

1
Airport Cyberattack Disrupts Europe Flights, Microsoft Entra ID Flaw, Scattered Spider Arrests
19:09
19:09
Play later
Play later
Lists
Like
Liked
19:09🎙️ Airport Cyberattack Disrupts Europe Flights, Microsoft Entra ID Flaw, Scattered Spider Arrests 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 983: Today's episode will discuss the latest news as Airport Cyberattack Disrupts Europe Flights with more news below: · Russian Spy Grou…
…
continue reading

1
Systematic Security: Protecting Sweden's Digital Frontline Amid Hybrid Threats.
14:56
14:56
Play later
Play later
Lists
Like
Liked
14:56Sweden's integration into NATO, coupled with sustained, sophisticated cyber operations from state actors like Russia, China, and Iran, has dramatically intensified the threat level against its Critical Infrastructure and Vital Societal Functions (VSF & CI). To combat this escalating threat, Swedish legislation, including the new Cybersecurity Act (…
…
continue reading

1
Exploring Storage Control with ThreatLocker
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01All links and images can be found on CISO Series. In this episode, Rob Allen, chief product officer at ThreatLocker, explains how their Storage Control solution addresses these challenges by implementing program-level access restrictions that work alongside traditional user permissions. Joining him are Jonathan Waldrop, CISO-at-large, and Nick Ryan…
…
continue reading

1
European airport cyberattack, SMS celltower scam, GPT4-powered ransomware
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26European airport disruption due to cyberattack check-in and baggage software SMS scammers now using mobile fake cell towers GPT-4-powered MalTerminal malware creates ransomware and Reverse Shell Huge thanks to our sponsor, Conveyor If security questionnaires make you feel like you’re drowning in chaos, you’re not alone. Endless spreadsheets, portal…
…
continue reading

1
The Price of Smartness: Singapore's Digital Social Contract with Surveillance
17:53
17:53
Play later
Play later
Lists
Like
Liked
17:53Singapore's data landscape is legally defined by the exclusion of public agencies from the principal data protection law (PDPA), which creates significant disparities in data handling between the government and private entities. The national push for a "Smart Nation" integrates massive data collection through ubiquitous IoT sensors and mandatory pr…
…
continue reading

1
Ciberataques y la Brecha: El Reto Digital de Colombia
19:28
19:28
Play later
Play later
Lists
Like
Liked
19:28A pesar de su posición como líder en digitalización en América Latina, Colombia es un objetivo constante de ciberataques, con incidentes de ransomware que han paralizado a entidades gubernamentales críticas, incluyendo la rama judicial y el sector de la salud. Esta vulnerabilidad sistémica se agrava por la persistente brecha digital y socioeconómic…
…
continue reading

1
Hacked Dreams: The Cyber War for Colombia's Digital Economy
13:35
13:35
Play later
Play later
Lists
Like
Liked
13:35Colombia, while a dynamic hub for startups and innovation, is facing a severe and persistent threat landscape, being targeted by sophisticated ransomware and phishing campaigns that frequently compromise public administration, financial, and IT sectors. This vulnerability is compounded by foundational gaps, including concentrated telecom markets, u…
…
continue reading

1
Week in Review: Student hackers increase, CISA wants CVE, Microsoft called hypocritical
35:56
35:56
Play later
Play later
Lists
Like
Liked
35:56Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests Jack Kufahl, CISO, Michigan Medicine, and Nick Espinosa, host, The Deep Dive Radio Show Thanks to our show sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust C…
…
continue reading

1
Cyber Talks: DORA & NIS2 Explained – A Practical Guide to EU Cyber Resilience & Compliance
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12Are you prepared for DORA and NIS2, the EU regulations fundamentally reshaping the cybersecurity landscape? For many organisations in the financial and critical infrastructure sectors, navigating these new frameworks presents a significant challenge, moving beyond a simple checklist to demand true operational resilience. In this episode of Cyber Ta…
…
continue reading

1
Aotearoa's New Zealand Digital Shield: Navigating Privacy & Cyber Threats
17:28
17:28
Play later
Play later
Lists
Like
Liked
17:28Explore how New Zealand is proactively shaping its digital future, implementing new regulations like the Biometric Processing Privacy Code 2025 and a national AI strategy to safeguard personal information while fostering innovation. Discover the escalating cyber threat landscape facing Kiwis, from sophisticated AI-powered attacks and ransomware to …
…
continue reading

1
Google patches zero-day, Copilot’s forced installation, Scattered Spider arrests
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07Google patches sixth Chrome zero-day exploited in attacks this year Microsoft to force install the Microsoft 365 Copilot app in October Two more Scattered Spider teen suspects arrested Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your secu…
…
continue reading

1
JLR Cyber Shockwave Hits Auto Sector, ShinyHunters Claims 1.5B Salesforce Records, SonicWall Breach
19:43
19:43
Play later
Play later
Lists
Like
Liked
19:43🎙️ JLR Cyber Shockwave Hits Auto Sector, ShinyHunters Claims 1.5B Salesforce Records, SonicWall Breach 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 982: Today's episode will discuss the latest news as JLR Cyber Shockwave Hits Auto Sector with more news below: · Details Emerge on …
…
continue reading
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is our sponsored guest, Kara Sprague, CEO, HackerOne. In this episode: Shadow AI as a control problem Rethinkin…
…
continue reading

1
Aadhaar, AI, and Your Data: India's Privacy Tightrope
16:47
16:47
Play later
Play later
Lists
Like
Liked
16:47Explore India's journey with the Aadhaar system, the world's largest digital identity program, designed to provide unique identification to over 1.3 billion residents and revolutionize financial services. Delve into the complex challenges of balancing ubiquitous identification with robust cybersecurity threats, including AI-driven attacks, rampant …
…
continue reading

1
What Manufacturing Can Teach You About Scaling Enterprise AI
38:29
38:29
Play later
Play later
Lists
Like
Liked
38:29CIO Classified is back! More CIO secrets. More battle-tested IT wisdom. Straight from leading CIOs across a wide range of industries. In this episode, host Ian Faison and co-host Yousuf Khan dive into the deep end of technology leadership in manufacturing. Ben Davis, Executive Vice President of IT at Cambria, joins the show to talk about his sweepi…
…
continue reading

1
Insight Partners warns thousands, Scattered Spider feigns retirement, Consumer Reports calls Microsoft 'hypocritical'
7:58
7:58
Play later
Play later
Lists
Like
Liked
7:58Insight Partners warns thousands after ransomware breach Scattered Spider gang feigns retirement, breaks into bank instead Consumer Reports calls Microsoft 'hypocritical' Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture i…
…
continue reading
In this week's episode, we share ideas, experiences and lessons learned running AI workloads at home. On a laptop, in a custom-built AI rig, and everything in between! (00:00) - Intro and catching up. (03:37) - Show content starts. Show links - HuggingFace - Ollama & Open WebUI - LMStudio - Azure AI Foundry Local Feedback - Give us feedback!…
…
continue reading

1
Jaguar Land Rover Week 2 Shutdown, 40 NPM Packages Compromised, ChatGPT Calendar Abuse
18:00
18:00
Play later
Play later
Lists
Like
Liked
18:00🎙️ Jaguar Land Rover Week 2 Shutdown, 40 NPM Packages Compromised, ChatGPT Calendar Abuse 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 981: Today's episode will discuss the latest news as Jaguar Land Rover Week 2 Shutdown with more news below: · Apple Rolls Out iOS 26 macOS Tahoe…
…
continue reading

1
Golden State Guardrails: California's Tech Regulation Frontier
16:52
16:52
Play later
Play later
Lists
Like
Liked
16:52This podcast unpacks California's dynamic legislative landscape, exploring its pioneering efforts to regulate data privacy and artificial intelligence. We delve into key bills, from mandating universal opt-out signals in browsers (AB 566) and device-based age verification for minors (AB 1043) to expanding data broker transparency (SB 361) and estab…
…
continue reading

1
Episode 153: Advice for Newcomers to IT and Cybersecurity
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37In episode 153 of Cybersecurity Where You Are, Sean Atkinson is joined by Jason Ashong, IT Support Specialist at the Center for Internet Security® (CIS®). Jason shares his journey from tinkering with tech as a kid to working in IT and pursuing cybersecurity research. The conversation covers education, mentorship, hands-on experience, and advice for…
…
continue reading

1
Cyber programs extended, older Apple devices attacked, chatbots aid phishing scams
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16House lawmakers move to extend two key cyber programs Apple 0-day likely used in spy attacks affected older devices Reuters crafts phishing scam with AI chatbot help Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture in one…
…
continue reading
This week on Reimagining Cyber, we unpack one of the biggest supply chain attacks of the year: the NPM hack. Attackers compromised widely used packages like Chalk and Debug—billions of weekly downloads—slipping in code that silently hijacked crypto transactions. Tyler Moffitt joins us to explain how it happened, who’s most at risk, and the practica…
…
continue reading

1
Retrieval-Augmented Generation With Bob Remeika From Ragie
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45Episode Summary Bob Remeika, CEO and Co-Founder of Ragie, joins host Danny Allan to demystify Retrieval-Augmented Generation (RAG) and its role in building secure, powerful AI applications. They explore the nuances of RAG, differentiating it from fine-tuning, and discuss how it handles diverse data types while mitigating performance challenges. The…
…
continue reading

1
HS112: Standardizing NaaS Service Definitions
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12Network-as-a-Service (NaaS) promises enterprises the ability to set up and configure connectivity and network security with a couple of clicks. But for NaaS to truly transform enterprise networking, one thing has been missing: standards. Enter Mplify (formerly the Metro Ethernet Forum), a non-profit focused on standardizing NaaS service definitions…
…
continue reading

1
Ukraine DDoS Russian Election, 500GB Great Firewall Leak, Uvalde Schools Ransomware
21:36
21:36
Play later
Play later
Lists
Like
Liked
21:36🎙️ Ukraine DDoS Russian Election, 500GB Great Firewall Leak, Uvalde Schools Ransomware 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 980: Today's episode will discuss the latest news as Ukraine DDoS Russian Election with more news below: · China's Internet Watchdog Mandates 1-Hour…
…
continue reading

1
How cyber warfare really works with Hayley Benedict | DISRUPT CONFLICT RISK SYSTEM
1:09:41
1:09:41
Play later
Play later
Lists
Like
Liked
1:09:41What does cyberwarfare really look like behind the headlines? This week, Roo sits down with Hayley Benedict, a cyber intelligence analyst at RANE, to explore the evolving world of digital conflict. From hacktivists to disinformation specialists, Hayley shares how nation states, criminals, and ideologically driven groups are blurring lines — and why…
…
continue reading

1
S7E43 - A Conversation with Wesley Widner
31:41
31:41
Play later
Play later
Lists
Like
Liked
31:41On this episode of The Virtual CISO Moment, Wesley Widner shares his inspiring journey from law enforcement to cybersecurity, emphasizing the power of networking, authenticity, and a lifelong learning mindset. Wes founded White Hat Wes Cybersecurity to help others break into the field by providing a free platform for sharing blogs, projects, and cy…
…
continue reading

1
Wait, SMS Doesn’t Stand for “Super Mega Secure?”
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55All links and images can be found on CISO Series. This week’s episode is hosted by David Spark, producer of CISO Series and Andy Ellis, principal of Duha. Joining us is our sponsored guest, Brian Long, CEO, Adaptive Security. In this episode: Hiring North Korean operatives on a Tuesday AI coding and the death of specifications Deepfake personas bey…
…
continue reading

1
Cybersikkerhed i Danmark: Den Digitale Frontlinje
20:52
20:52
Play later
Play later
Lists
Like
Liked
20:52Følg med i Danmarks kamp for digital sikkerhed i 2025, fra EU-formandskabets kontroversielle "Chatkontrol"-forslag til den nationale implementering af NIS2-direktivet. Vi ser på, hvordan danske virksomheder og borgere påvirkes af et landskab med øgede cybertrusler – herunder høj cyberkriminalitet og spionage – og nye regler, samtidig med at regerin…
…
continue reading

1
Digital Denmark: Sovereignty at a Crossroads
19:04
19:04
Play later
Play later
Lists
Like
Liked
19:04Explore how Denmark, at the forefront of European digitalization, is navigating complex cybersecurity challenges in 2025. From spearheading controversial "Chat Control" proposals during its EU Council Presidency to strategically phasing out foreign Big Tech in favor of open-source solutions, this podcast unpacks the nation's bold moves towards digi…
…
continue reading
The 1995 film Hackers celebrates its 30th anniversary in 2025. To mark the occasion, host Max Havey sat down for a chat with guests Neil Thacker, Netskope's Global Privacy and Data Protection Officer, and Abby Olcese, Film Editor at The Pitch, to talk about the film and their relationship to it over the intervening three decades. Together they disc…
…
continue reading