Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
CISO Podcasts
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
SC Media and Tines are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2025, National Security Corporation. All Rights Reserved
…
continue reading
SC Media and Tines are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
CISO Perspectives explores the evolving landscape of cybersecurity leadership, talent, and risk—because success in cybersecurity is about people, not just technology. Hosted by Kim Jones, veteran CISO and educator, this podcast challenges conventional thinking on leadership, talent pipelines, and the disconnects holding the profession back. Join Kim for candid discussions with industry leaders, and insights that help you build a stronger, more resilient cyber ecosystem.
…
continue reading
The Cyber-Savvy Boardroom, a Google Cloud Office of the CISO podcast, offers monthly 15-20 minute episodes featuring security leaders, board members, and thought leaders. Hosted by David Homovich and rotating Office of the CISO members, experts share insights for strategic clarity and improved organizational security. Guests include board members, Google Cloud/Google executives, Office of the CISO Board Insights team members, board advisors, and industry thought leaders.
…
continue reading
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Johna Till Johnson & John Burke bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions a ...
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
The official EC-Council CISO Forum podcast.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
…
continue reading
Aphinia (https://www.aphinia.com) - a community of 1,500+ CISOs - is brining regular interviews with top information security executives who share their personal stories, actionable insights, helpful tactics to keep your enterprise safe and predictions for the future cybersecurity landscape.
…
continue reading
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
Enterprise AI Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. The show is hosted by Evan Reiser, the CEO & founder of Abnormal AI, and Mike Britton, the CIO & CISO of Abnormal AI.
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
…
continue reading
Join Query CISO Neal Bridges as he explores the world of SecDataOps with different guests each episode. What is SecDataOps? Who should care about it? Wait, wasn’t it a throwaway joke?
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
…
continue reading
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
…
continue reading
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
Your hosts, Tom Meehan, CIO and CISO at CONTROLTEK and Shaun Ferrari, Global Cash Product Director at Currency Research share the latest information on the issues affecting the world of cash today. Featuring interviews with top industry experts and thought leaders, you’ll have a close look at trends, strategies, and technology influencing the world of cash. Stay informed on topics like cash security, payments technology, risks, the cash supply chain, and learn about strategies to support bet ...
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. ...
…
continue reading
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
…
continue reading

1
Identity Sprawl: Unmasking the Invisible Digital Workforce
20:57
20:57
Play later
Play later
Lists
Like
Liked
20:57Identity sprawl, often called secrets sprawl, describes the unmanaged proliferation of digital credentials like API keys and tokens across an organization's IT environment. This widespread distribution creates a massive and expanded attack surface, as non-human identities (NHIs) often possess overprivileged access and their secrets are frequently e…
…
continue reading

1
We're All for a Responsible AI Rollout as Long as It Goes as Fast as Possible
40:00
40:00
Play later
Play later
Lists
Like
Liked
40:00All links and images can be found on CISO Series. This week’s episode is hosted by David Spark, producer of CISO Series and Mike Johnson, CISO, Rivian. Joining them is Jennifer Swann, CISO, Bloomberg Industry Group. In this episode: Vulnerability management vs. configuration control Open source security and supply chain trust Building security lead…
…
continue reading

1
The Sony Hollywood Hack | How Cybercrime Turned A Blockbuster Comedy Into A Global News Story
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41THE SONY HACK: HOLLYWOOD, NORTH KOREA & THE CYBER WAR THAT CHANGED EVERYTHING In 2014, Sony Pictures became ground zero for the first major nation-state cyberattack on a global corporation. The “Guardians of Peace,” linked to North Korea, crippled Sony’s networks, leaked unreleased films, and exposed troves of executive emails that forced high-leve…
…
continue reading

1
#248 - A Black Hat Chat with ThreatLocker CEO Danny Jenkins
11:40
11:40
Play later
Play later
Lists
Like
Liked
11:40In this episode of CISO Tradecraft, host G Mark Hardy sits down with Danny Jenkins, CEO and founder of ThreatLocker, live from the Black Hat conference. Danny shares insights into his technical background and explains how a customer-focused culture drives innovation and improvement at ThreatLocker. Learn about the company's unique practices, such a…
…
continue reading

1
Cybersecurity Leadership Across the Globe with Chris & Damian
34:55
34:55
Play later
Play later
Lists
Like
Liked
34:55In this episode of Life of a CISO, Dr. Eric Cole explores what it truly means to be a cybersecurity leader in today’s interconnected world. Drawing on insights from Hong Kong to London, Dr. Cole breaks down the unique challenges CISOs face globally and reveals the leadership principles that remain universal no matter where you are. You’ll discover …
…
continue reading
In this episode of The Virtual CISO Moment, Dylan Owen shares his journey from webmaster in the 1990s to leading cybersecurity teams at Raytheon and serving as CISO at Nightwing. He reflects on the challenges of transitioning into executive leadership, the realities of the vCISO role, and how SMBs can best approach detection and response. Dylan als…
…
continue reading

1
Teachable Moments: How to Learn from Career Challenges
41:43
41:43
Play later
Play later
Lists
Like
Liked
41:43In this episode of The New CISO, host Steve Moore speaks with Steve Lodin, VP of Information Security at Sallie Mae, about the career challenges that shaped his leadership style and the lessons he’s learned across decades in cybersecurity. From breaking into his high school to experiment with Apple II computers to leading global security teams in E…
…
continue reading

1
AI Adoption vs. Security Reality — Insights from GPSEC STL
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01Sponsors: ObservoAI (www.observo.ai) Guidepoint Security (www.guidepointsecurity.com) Episode Summary: AI isn’t just hype anymore — it’s transforming the way enterprises operate. At GPSEC St. Louis, David Malicoat sits down with Felix Simmons, Principal Security Architect at GuidePoint Security, to cut through the noise around AI adoption, risk, an…
…
continue reading

1
EP 152: Granular, Persistent, Zero Trust: The Case for File-Level Security
37:18
37:18
Play later
Play later
Lists
Like
Liked
37:18By John Verry
…
continue reading

1
Reimagining Security Operations: SOC as a Service and the Role of AI - Kevin Nikkhoo - CSP #215
28:26
28:26
Play later
Play later
Lists
Like
Liked
28:26
…
continue reading

1
Defending the Railroad: AI Risk, Rigor, and Resilience with CN CISO Vaughn Hazen
31:14
31:14
Play later
Play later
Lists
Like
Liked
31:14On the 29th episode of Enterprise AI Defenders, host Mike Britton, Chief Information Security Officer at Abnormal AI, talks with Vaughn Hazen, Chief Information Security Officer at the Canadian National Railway Company. CN is Canada’s largest rail operator and the only one that spans the Atlantic, Pacific, and Gulf coasts, running over 20,000 mil…
…
continue reading

1
Storytelling, Culture and Cyber Resilience - Ep 165
31:31
31:31
Play later
Play later
Lists
Like
Liked
31:31Cyber resilience goes beyond checkboxes. In this episode, cybersecurity veteran Jerod Brennen (virtual CISO, executive advisor, and indie filmmaker) joins Rob Aragao to explore how storytelling, culture, and business alignment turn security into a true business enabler. Real-world lessons and practical steps help you shift from traditional cybersec…
…
continue reading

1
Episode 151: 2025 Cybersecurity Predictions H2 Review — Pt 2
46:42
46:42
Play later
Play later
Lists
Like
Liked
46:42In episode 151 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager conclude their mid-year review of 12 Center for Internet Security® (CIS®) experts' cybersecurity predictions for 2025. Here are some highlights from our episode: 01:12. The importance of consolidating security operations and using what already exists 03:18. The promise of g…
…
continue reading

1
Google: Gmail is secure, Cloudflare blocks largest DDoS attack, Amazon shutters theft campaign
6:55
6:55
Play later
Play later
Lists
Like
Liked
6:55'2.5 billion Gmail users at risk'? Entirely false, says Google Cloudflare blocks largest recorded DDoS attack peaking at 11.5 Tbps Jaguar Land Rover says cyberattack ‘severely disrupted’ production Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect bu…
…
continue reading

1
Securing The Future Of AI With Dr. Peter Garraghan
38:19
38:19
Play later
Play later
Lists
Like
Liked
38:19Episode Summary Machine learning has been around for decades, but as it evolves rapidly, the need for robust security grows even more urgent. Today on the Secure Developer, co-founder and CEO of Mindgard, Dr. Peter Garraghan, joins us to discuss his take on the future of AI. Tuning in, you’ll hear all about Peter’s background and career, his though…
…
continue reading

1
HS111: When Someone Makes Your Cloud Service Go Poof!
38:29
38:29
Play later
Play later
Lists
Like
Liked
38:29The modern enterprise is built on cloud, with most organizations using SaaS for their “horizontal” work horse layers, such as communications, conferencing, HR, and payroll. That makes the enterprise entirely dependent on the good-faith execution and good-will delivery of the cloud providers. Those providers have a huge economic incentive to reliabl…
…
continue reading

1
Leadership Struggle: Habits that Protect Your Energy | A Conversation with Jason Elrod | The Soulful CXO Podcast with Dr. Rebecca Wynn
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33Guest: Jason Elrod, CISO, MultiCare Health System Website: https://www.multicare.org/ LinkedIn: https://www.linkedin.com/in/thejasonelrod/ Website: https://www.limitlesscyber.com/ Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-wynn ________________________________ This Episode’s Sponso…
…
continue reading

1
Palo Alto Networks Breached, Zscaler Customer Data Exposed, WhatsApp Zero-Day Hits Apple
17:50
17:50
Play later
Play later
Lists
Like
Liked
17:50🎙️ Palo Alto Networks Breached, Zscaler Customer Data Exposed, WhatsApp Zero-Day Hits Apple 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 972: Today's episode will discuss the latest news as Palo Alto Networks Breached with more news below: · Ukrainian Network FDN3 Launches Massiv…
…
continue reading

1
How to build a career in cybersecurity with Heath Adams | JOB HUNT BOT FATIGUE
1:08:29
1:08:29
Play later
Play later
Lists
Like
Liked
1:08:29Want to work in cybersecurity but don’t know where to begin? Or just curious what it takes to break into the field? This week, we’re joined by the internet’s very own Heath Adams, better known as The Cyber Mentor. He demystifies the application process and what it takes to build a career in cybersecurity – no matter your background. 👩💻💼 In Crash C…
…
continue reading

1
LLM legalese prompts, Maryland Transit cyberattack, hacking into university
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04LegalPwn technique hides LLMs prompts inside contract legalese Maryland Transit investigating cyberattack Hacker attempts to forge his way into Spanish university Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and …
…
continue reading

1
Google Workspace Hit in Salesforce Wave, TransUnion 4.4M Breach, Nevada Ransomware
18:32
18:32
Play later
Play later
Lists
Like
Liked
18:32🎙️ Google Workspace Hit in Salesforce Wave, TransUnion 4.4M Breach, Nevada Ransomware 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 971: Today's episode will discuss the latest news as Google Workspace Hit in Salesforce Wave with more news below: · Noem Fires FEMA IT Team Over DHS…
…
continue reading

1
The AI Paradox: Unmasking the Secrets Sprawl in 2025
16:13
16:13
Play later
Play later
Lists
Like
Liked
16:13In 2025, the rapid evolution of AI, from sophisticated agents and coding assistants to widespread no-code tools, is inadvertently fueling an unprecedented surge in secrets sprawl across enterprises. This episode delves into how human error, "shadow AI" usage, and interconnected agent-to-agent communications are exposing critical credentials in ever…
…
continue reading

1
Velociraptor C2 tunnel, Baltimore’s expensive con, ransomware gangs multiply
8:11
8:11
Play later
Play later
Lists
Like
Liked
8:11Velociraptor forensic tool used for C2 tunneling City of Baltimore gets socially engineered to the tune of $1.5 million Ransomware gang takedowns create more smaller groups Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day at…
…
continue reading

1
Seattle's Digital Crossroads: Governing Tech & Trust
15:54
15:54
Play later
Play later
Lists
Like
Liked
15:54This podcast explores the complex landscape where Washington State's leading tech industry meets evolving data privacy laws and city policy challenges. We unpack how major players like Amazon navigate stringent regulations such as the My Health My Data Act, implement robust cloud governance and cybersecurity best practices, and respond to demands f…
…
continue reading

1
California Compliance Currents: Navigating Privacy, AI, and Cybersecurity in the Golden State
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38Dive deep into California's cutting-edge privacy and cybersecurity landscape, from the foundational CCPA and CPRA to the intricate new regulations governing Automated Decision-Making Technology (ADMT) and AI. We'll explore how businesses must navigate evolving compliance requirements, consumer rights, and state-led initiatives like Cal-Secure to pr…
…
continue reading

1
Week in Review: Citrix RCE flaw, steganography revived, major telecom fiasco
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Johna Till Johnson, CEO and founder, Nemertes Thanks to our show sponsor, Prophet Security Ever feel like your security team is stuck in a loop of alert fatigue and manual investigations? Meet Prophet Security. Their Agentic AI SOC Pl…
…
continue reading

1
Salt Typhoon IOCs, Google floats ‘cyber disruption unit’, WhatsApp 0-click
2:24:48
2:24:48
Play later
Play later
Lists
Like
Liked
2:24:48Three Buddy Problem - Episode 60: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs wer…
…
continue reading

1
North Carolina's Cyber Crucible: Threats, Resilience, and the Digital Frontier
20:13
20:13
Play later
Play later
Lists
Like
Liked
20:13North Carolina is confronting an unprecedented surge in cyberattacks, with thousands of incidents impacting millions of residents and vital sectors annually. From pervasive ransomware and sophisticated phishing campaigns targeting healthcare, education, and government, to data breaches affecting major tech hubs like the Research Triangle, the digit…
…
continue reading

1
Malicious nx Packages, AI worker scam, Salt Typhoon attacks Netherlands
8:56
8:56
Play later
Play later
Lists
Like
Liked
8:56Malicious nx Packages leak GitHub, Cloud, and AI Credentials North Korean remote worker scheme boosted by generative AI The Netherlands announces Salt Typhoon penetration Huge thanks to our sponsor, Prophet Security Security teams are drowning in alerts - many companies generate upwards of 1000 or more alerts a day, and nearly half go ignored. That…
…
continue reading

1
First AI-Weaponized Supply Chain Attack, Claude AI Used by Hackers, 200 Sweden Cities Hit
22:12
22:12
Play later
Play later
Lists
Like
Liked
22:12🎙️ First AI-Weaponized Supply Chain Attack, Claude AI Used by Hackers, 200 Sweden Cities Hit 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 970: Today's episode will discuss the latest news as First AI-Weaponized Supply Chain Attack with more news below: · ShadowSilk Hits 36 Govern…
…
continue reading

1
Oregon's Digital Frontier: Safeguarding Data & Businesses
17:53
17:53
Play later
Play later
Lists
Like
Liked
17:53Oregon's Digital Frontier explores the intensifying cyber threats facing Oregon businesses and residents, from frequent cyberattacks and data breaches to complex data privacy concerns. We delve into the state's comprehensive response, examining the impact of the Oregon Consumer Privacy Act (OCPA) and Oregon Consumer Information Protection Act (OCIP…
…
continue reading

1
How to Deal with Last Minute Compliance Requirements
31:40
31:40
Play later
Play later
Lists
Like
Liked
31:40All links and images can be found on CISO Series. Check out this post by Geoff Belknap, co-host of Defense in Depth, for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and John Overbaugh, CISO, Alpine Investors. Joining us is our sponsored guest, Pukar Hamal, fo…
…
continue reading

1
Salt Typhoon expands, AI-powered ransomware, Anthropic warns of vibe-hacking
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39FBI warns of expanded Chinese hacking campaign AI-powered ransomware is a thing now Anthropic warns about “vibe-hacking” Huge thanks to our sponsor, Prophet Security SOC analyst burnout is real - repetitive tasks, poor tooling, and constant alert noise are driving them out. Prophet Security fixes this. Their Agentic AI Analyst handles alert triage …
…
continue reading

1
First AI-Powered Ransomware Found, SalesLoft OAuth Breach, Iran Tanker Fleet Hacked
18:03
18:03
Play later
Play later
Lists
Like
Liked
18:03🎙️ First AI-Powered Ransomware Found, SalesLoft OAuth Breach, Iran Tanker Fleet Hacked 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 969: Today's episode will discuss the latest news as First AI-Powered Ransomware Found with more news below: · Japan, US, South Korea Forum Addresse…
…
continue reading

1
305 - Finally here – Group Source of Authority in the cloud
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50Today, we'll take a look at something that is of the essence for anyone working with identities and the shift to the cloud. What is Group SOA, and why should you care? We reflect on the dependencies of Active Directory, the five stages of transformation, and what this capability will help you achieve. (00:00) - Intro and catching up. (05:20) - Show…
…
continue reading

1
Securing the Energy Grid from Cyber Threats with Duke Energy CSO Martin Strasburger
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18On the 30th episode of Enterprise AI Defenders, hosts Mike Britton and Evan Reiser talk with Martin Strasburger, Senior Vice President and Chief Security Officer at Duke Energy. Martin shares how Duke, serving over 11 million customers across the Southeast, protects vital physical and digital infrastructure in a time of accelerating energy demand a…
…
continue reading

1
The Virginia VCDPA: Tech's New Rules of Engagement
18:49
18:49
Play later
Play later
Lists
Like
Liked
18:49This episode delves into the Virginia Consumer Data Protection Act (VCDPA), which took effect on January 1, 2023, exploring how its comprehensive framework for data privacy is shaping the state's vibrant tech sector. We'll examine the specific rights granted to consumers, such as the ability to opt-out of targeted advertising and data sales, and th…
…
continue reading

1
Episode 150: A Roundtable Chat to Celebrate 150 Episodes
33:27
33:27
Play later
Play later
Lists
Like
Liked
33:27In episode 150 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Chad Rogers, Sr. Manager, Digital Media Services, at the Center for Internet Security® (CIS®); Rudy Uhde, Video Editor at CIS; and David Bisson, Sr. Content Strategist at CIS. Together, they use a roundtable chat to celebrate 150 episodes of Cybersecurity Wher…
…
continue reading

1
How a Cyber Attack Paralyzed a City - Ep 164
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20A ransomware attack shut down St. Paul, Minnesota—forcing a state of emergency and even the calling in of the National Guard. Cybersecurity expert Tyler Moffitt unpacks how it happened, who was behind it, and what cities and individuals can learn to avoid becoming the next target. Follow or subscribe to the show on your preferred podcast platform. …
…
continue reading

1
DOGE puts critical SS data at risk? CISA warns of new exploited flaw, K-Pop stock heist attacker extradited to South Korea
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10DOGE Put Critical Social Security Data at Risk, Whistle-Blower Says CISA warns of actively exploited Git code execution flaw Alleged mastermind behind K-Pop celebrity stock heist extradited to South Korea Huge thanks to our sponsor, Prophet Security Your security analysts didn’t sign up to chase false alarms all day. With Prophet Security’s AI SOC …
…
continue reading

1
EP7 Tameron Chappell on Psychology, Trust, and AI Transformation
28:11
28:11
Play later
Play later
Lists
Like
Liked
28:11Hosts: David Homovich, Customer Advocacy Lead, Office of the CISO, Google Cloud Alicja Cade, Director, Office of the CISO, Google Cloud Guest: Tameron Chappell, Chartered Occupational Psychologist Resources: Perspectives on Security for the Board Report (Ed. 4) Cloud CISO Perspectives: How Google secures AI Agents Google Cloud Security Community Bl…
…
continue reading

1
Stablecoins, Regulation, and the Future of Digital Assets
37:22
37:22
Play later
Play later
Lists
Like
Liked
37:22In this episode of The Cash News Podcast, hosts Tom Meehan, Shaun Ferrari, and Brad Moody dive deep into the evolving world of digital assets—focusing on stablecoins, regulation, and recent headlines shaping the crypto space. From Paxos’ $26.5M fine to the Genius Act’s potential guardrails, the conversation unpacks the risks, opportunities, and fut…
…
continue reading

1
The Red Flags of Potential Workplace Violence
17:51
17:51
Play later
Play later
Lists
Like
Liked
17:51In this episode of The Security Podcasts featuring Alan Saquella, Assistant Professor at the College of Business, Security and Intelligence at Embry-Riddle Aeronautical University, we discuss the red flags that a workplace violence incident may be about to occur.
…
continue reading

1
Auchan Retailer Data Breach, Nevada State Offices Halt Services After Major Cyber Incident, South Korea Arrests Hacker Accused of Targeting BTS, Maryland Cyberattack Disrupts Transit Services
20:03
20:03
Play later
Play later
Lists
Like
Liked
20:03🎙️ Auchan Retailer Breach Hits 100K+, Nevada State Offices Down, BTS Hacker Arrested 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 968: Today's episode will discuss the latest news as Auchan Retailer Breach Hits 100K+ with more news below: · Organizations Warned of Exploited Git V…
…
continue reading

1
U.S. vs International and European Cybersecurity Standards | Interview with John Verry
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34In this episode, host Dejan Kosutic, CEO of Advisera, welcomes John Verry, Managing Director at CBIZ Pivot Point Security consulting company. With over 25 years of experience and managing more than a thousand clients, John shares his immense expertise in various cybersecurity frameworks, including ISO 27001, CMMC, HIPAA, and HITRUST. The discussion…
…
continue reading

1
New Study Finds No Email Has Ever “Found You Well”
34:13
34:13
Play later
Play later
Lists
Like
Liked
34:13All links and images can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Mike Johnson, CISO, Rivian. Joining us is David Cross, CISO, Atlassian. In this episode: Breaking the Sales Cycle Leadership Under Fire Predicting the Unpredictable Security Startups' Security Paradox A huge thanks to our …
…
continue reading
Artificial intelligence is rapidly transforming New Zealand's digital landscape, offering new ways to process data, create content, and automate tasks, with services like ChatGPT gaining rapid user adoption. However, this rapid adoption raises significant privacy and cybersecurity concerns, including the malicious use of AI for fraud and deepfake i…
…
continue reading

1
Farmers Insurance also hit by Salesforce breach, UpCrypter phishing campaign, Pakistan hits Indian government agencies
8:20
8:20
Play later
Play later
Lists
Like
Liked
8:20If Salesforce flutters its wings in San Francisco... How is this still tricking people? From tagging to bagging Huge thanks to our sponsor, Prophet Security Security teams are drowning in alerts - many companies generate upwards of 1000 or more alerts a day, and nearly half go ignored. That’s where Prophet Security comes in. Their AI SOC platform a…
…
continue reading

1
#247 - What most leaders don't understand about AI (with Dave Lewis)
35:09
35:09
Play later
Play later
Lists
Like
Liked
35:09In this episode of CISO Tradecraft, host G Mark Hardy engages in an insightful conversation with Dave Lewis, Global Advisory CISO from 1Password, about AI governance and its importance in cybersecurity. They discuss AI policy and its implications, the evolving nature of AI and cybersecurity, and the critical need for governance frameworks to manage…
…
continue reading

1
Farmers Insurance Data Breach, Large Interpol Cybercrime Crackdown in Africa Leads to Arrest of Over 1,200 Suspects, Colt Confirms Customer Data Stolen, DataIO Hit by Ransomware Attack
19:17
19:17
Play later
Play later
Lists
Like
Liked
19:17🎙️ Farmers Insurance 1M+ Breach, Interpol Arrests 1,200+, Colt Data Auctioned, Censorship Battle 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 967: Today's episode will discuss the latest news as Belgian Telecom 850K Breach with more news below: · Tech Companies Face FTC Scrutiny …
…
continue reading