Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Critical Infrastructure Networking Podcasts
This is Powering the Future, a podcast series brought to you by Smart Grid Forums. Join host Mandana White and top industry experts as we spark vital conversations around critical infrastructure and the power grid of tomorrow. One Planet, One Power Grid.
…
continue reading
Welcome to Your Network’s Edge by RAD, where innovation meets connectivity. This podcast highlights how RAD’s technologies are empowering businesses and service providers. In every episode, we provide in-depth insights into the world of IoT, 5G, network Edge, and AI-powered networking, showcasing how RAD’s solutions empower service providers and critical infrastructure operators to stay ahead. Whether you’re a communications service provider, an industrial IoT professional, or someone passio ...
…
continue reading
T-Minus Space Daily from N2K CyberWire delivers critical daily intelligence on what powers, protects, and connects the space industry and innovation. N2K CyberWire’s space team makes visible the global connections that facilitate connectivity and commerce through space networks. We cover the news of the day and regularly feature experts covering space’s role in critical infrastructure and national security, space operations and intelligence, data and cybersecurity in space, domestic and inte ...
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The Network+ Audio Course is your comprehensive audio training series for mastering the CompTIA Network+ certification. Designed for learners on the go, this Audio Course transforms exam objectives into clear, structured, and engaging episodes tailored for auditory learning. Whether you're walking, commuting, or studying between shifts, each episode breaks down complex networking topics into digestible segments aligned with the official CompTIA blueprint. From OSI layers and IP addressing to ...
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
The Tech+ Audio Course is your complete, on-demand study companion for mastering the CompTIA Tech+ (FC0-U71) certification exam. Designed for those beginning their journey into information technology, it guides you step by step through every domain and objective of the official exam blueprint. Each episode transforms complex IT concepts into clear, relatable lessons filled with practical examples, definitions, and real-world applications. Whether you’re learning about hardware components, so ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
…
continue reading
Carbon Clarity is a podcast for the carbon curious - with interviews, news and views from experts in the world of carbon and sustainability. We connect with some amazing guests to bring you insight, interest and clarity. If you want to find out more about Hut22, head over to our website: hut22.co.uk
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
In-Stat podcasts are based on reports which provides actionable research, market analysis and forecasts of advanced communications services, infrastructure, end-user devices and semiconductors. Our insights are derived from both a deep technology understanding and comprehensive research, which examines each segment of the value chain for each market. Technology vendors, service providers, technology professionals and market specialists, worldwide, rely on In-Stat’s tenured, experienced staff ...
…
continue reading
Tune into the Internet of Things. In this podcast IoT Insiders' editor digs into the world of IoT; an ever-changing swarth of industry experts with each episodes, IoT Unplugged promises to be an equally informative and intriguing auditory journey that will keep its listeners up to date with all the issues surrounding IoT today and tomorrow.
…
continue reading
Astonishing growth. Resiliency. Quantum security. Imagine what could happen when "The data center strikes back?"... Join us global innovation leaders Kyndryl and Nokia for our new three-part podcast series as we explore the industry trends, customer use cases and game-changing technology solutions set to rock your data center's world. In each episode, Peter Nass, an offering Manager from Kyndryl, will be joined by experts from Kyndryl and Nokia – two of today's global leaders in technology, ...
…
continue reading
The Society of American Military Engineers leads collaborative efforts to identify and resolve national security infrastructure-related challenges. Founded in 1920, SAME unites public and private sector individuals and organizations from across the architecture, engineering, construction, environmental and facility management, cyber security, project planning, contracting and acquisition, and related disciplines in support of national security. Headquartered in Alexandria, Va., SAME provides ...
…
continue reading
ISNR is the only event in Europe that allows you to network and do business with high security end users and sector professionals. ISNR brings together government, public sector, police and emergency response, transport and critical national infrastructure stakeholders with commercial and private security organisations. This focused event delivers a unique opportunity to learn from a comprehensive seminar program and high-level, industry leading conference. Showcasing the complete range of t ...
…
continue reading
The fiber optic industry plays a critical role in the modern society. Everyday around the globe fiber networks are being deployed to connect everyone and everything. Magnus Angermund, who has more than 25 years of experience from the industry, interviews profiles within and around the fiber industry about interesting subjects, such as market trends and technical trends. It will also be deep dives in areas like investments, sea cables, build out in certain countries, market drivers and much more.
…
continue reading
A Broad array of topics in the technology space Informative, relevant, and engaging. Without the self-serving narrative. We aim to share industry best practices, drive awareness, and discuss what thought leaders share. Companies or manufacturers often only focus on their area of interest, which is short-sighted, limiting, and siloed. Our diversity and partner network offers substantial, informative value. Similar challenges and growth aspirations exist in the b2b and b2c space. This podcast ...
…
continue reading
1
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
59:02
59:02
Play later
Play later
Lists
Like
Liked
59:02For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
…
continue reading
1
Tech Segment: MITM Automation + Security News - Josh Bressers - PSW #904
2:07:47
2:07:47
Play later
Play later
Lists
Like
Liked
2:07:47This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
…
continue reading
1
Tech Segment: MITM Automation + Security News - Josh Bressers - PSW #904
2:07:47
2:07:47
Play later
Play later
Lists
Like
Liked
2:07:47This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
…
continue reading
Starcloud has successfully trained and run the first large AI model in space. DARPA has awarded BAE a Phase 2 contract to advance autonomous space-based surveillance. Firefly Aerospace will host Volta Space Technologies’ wireless power receiver on Firefly’s Blue Ghost Mission 2 lander on the far side of the Moon, and more.Remember to leave us a 5-s…
…
continue reading
MDA Space has signed a partnership agreement with the Government of Canada and Telesat Corporation to develop and deliver military satellite communications (MILSATCOM) capabilities. SpaceX launched the NROL-77 mission on a Falcon 9 rocket from Cape Canaveral Space Force Station in Florida yesterday. China set a new record, launching three rockets i…
…
continue reading
1
Salesforce Security Risks, Boards Duty of Care, and Managing CISO Risks - Justin Hazard - BSW #425
52:57
52:57
Play later
Play later
Lists
Like
Liked
52:57Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
…
continue reading
1
Salesforce Security Risks, Boards Duty of Care, and Managing CISO Risks - Justin Hazard - BSW #425
52:57
52:57
Play later
Play later
Lists
Like
Liked
52:57Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
…
continue reading
1
Hypnotoad, AI Galore, Storm-0249, DocuSign, Broadside, Goldblade, Aaran Leyland... - SWN #536
34:50
34:50
Play later
Play later
Lists
Like
Liked
34:50We've got: Hypnotoad, AI Galore, Storm-0249, DocuSign, Broadside, Goldblade, Ships at Sea, Sora, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-536
…
continue reading
1
Hypnotoad, AI Galore, Storm-0249, DocuSign, Broadside, Goldblade, Aaran Leyland... - SWN #536
34:50
34:50
Play later
Play later
Lists
Like
Liked
34:50We've got: Hypnotoad, AI Galore, Storm-0249, DocuSign, Broadside, Goldblade, Ships at Sea, Sora, Aaran Leyland, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-536
…
continue reading
The US Senate Commerce Committee has voted to advance the nomination of Jared Isaacman to lead NASA. The Soyuz MS-27 crew has returned to Earth. Muon Space has been awarded a $1.9 million Small Business Innovation Research (SBIR) Direct to Phase II contract by SpaceWERX, and more. Remember to leave us a 5-star rating and review in your favorite pod…
…
continue reading
1
How OT Managed Services Are Revolutionizing Industrial Cybersecurity
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Dino sits down with industrial automation and industrial cybersecurity expert Kevin Kumpf, fresh off the floor of Rockwell Automation Fair 2025. They discuss why OT managed services are finally becoming viable for manufacturing, the critical 80/20 split between people and technology challenges, and how the industry's "silver tsunami" of retiring ta…
…
continue reading
1
Making OAuth Scale Securely for MCPs - Aaron Parecki - ASW #360
1:07:43
1:07:43
Play later
Play later
Lists
Like
Liked
1:07:43The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a new…
…
continue reading
1
Making OAuth Scale Securely for MCPs - Aaron Parecki - ASW #360
1:07:43
1:07:43
Play later
Play later
Lists
Like
Liked
1:07:43The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a new…
…
continue reading
1
Europe’s big bet on sovereign space intelligence.
26:15
26:15
Play later
Play later
Lists
Like
Liked
26:15ICEYE has secured €150 million in new funding. NASA has selected two science instruments designed for astronauts to deploy on the surface of the Moon during the Artemis IV mission. Cosmonaut Sergey Ryzhikov to hand over command of the ISS to four-time space flyer NASA astronaut Mike Fincke, and more. Remember to leave us a 5-star rating and review …
…
continue reading
1
Fix your dumb misconfigurations, AI isn't people, and the weekly news - Wendy Nather, Danny Jenkins - ESW #436
1:34:58
1:34:58
Play later
Play later
Lists
Like
Liked
1:34:58Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security program quick wins. Everyone freaks out about vulnerabilities, patching, and exploits. Meanwhile, security tools are misconfigured. Thousands of unused software packages increase remediation effort and a…
…
continue reading
1
Fix your dumb misconfigurations, AI isn't people, and the weekly news - Danny Jenkins, Wendy Nather - ESW #436
1:34:58
1:34:58
Play later
Play later
Lists
Like
Liked
1:34:58Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security program quick wins. Everyone freaks out about vulnerabilities, patching, and exploits. Meanwhile, security tools are misconfigured. Thousands of unused software packages increase remediation effort and a…
…
continue reading
1
The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin)
30:14
30:14
Play later
Play later
Lists
Like
Liked
30:14The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin) When attackers breached HubSpot in March 2022, they weren’t after HubSpot at all. They were after the customers of its customers. Crypto firms like Trezor, BlockFi, and Swan Bitcoin suddenly saw their users targeted by near-perfect phishing emails designed to st…
…
continue reading
In late 2023, the world’s most trusted identity provider experienced the kind of breach it was designed to prevent. Attackers quietly infiltrated Okta’s customer support system, stole session tokens hidden inside HAR files and used them to impersonate users across some of the most secure organizations on earth. For two full weeks, the intruders ope…
…
continue reading
Nearly 15 years after its inclusion in a 2011 annual appropriations bill, the Wolf Amendment remains a hotly debated topic reflecting many of the core geopolitical and philosophical issues at the heart of the debate over the U.S.-China relationship on matters of space and more. The Aerospace Corporation has created a series of debates arguing for a…
…
continue reading
1
Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Toilet Cams, North Korea, Brickstorm, MCP, India, React2Shell, Proxmox, Metaverse, Josh Marpet, and More, on the Security Weekly News. Show Notes: https://securityweekly.com/swn-535
…
continue reading
1
Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Toilet Cams, North Korea, Brickstorm, MCP, India, React2Shell, Proxmox, Metaverse, Josh Marpet, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-535
…
continue reading
Canada has announced its intention to contract MDA Space to build, test, and launch an additional radar imaging satellite. HawkEye 360 has been awarded a contract extension from the National Reconnaissance Office (NRO) and the Commercial Systems Program Office (CSPO) to expand its ongoing work. NASA has extended its Cooperative Agreement with CASIS…
…
continue reading
Kristofer Fröjd, Senior VP of Strategy & Business Development at Ellevio AB, joins Mandana White to unpack how AI, regulation, and new tech are driving the energy transition.By Smart Grid Forums
…
continue reading
1
Holiday Hack Challenge, AI, Internet of Trash - Ed Skoudis - PSW #903
2:10:41
2:10:41
Play later
Play later
Lists
Like
Liked
2:10:41This week we welcome Ed Skoudis to talk about the holiday hack challenge (https://sans.org/HolidayHack). In the security news: Oh Asus Dashcam botnets Weird CVEs being issued CodeRED, but not the worm Free IP checking Internet space junk and IoT Decade old Linux kernel vulnerabilities Breaking out of Claude code Malicious LLMs Hacker on a plan gets…
…
continue reading
1
Holiday Hack Challenge, AI, Internet of Trash - Ed Skoudis - PSW #903
2:10:41
2:10:41
Play later
Play later
Lists
Like
Liked
2:10:41This week we welcome Ed Skoudis to talk about the holiday hack challenge (https://sans.org/HolidayHack). In the security news: Oh Asus Dashcam botnets Weird CVEs being issued CodeRED, but not the worm Free IP checking Internet space junk and IoT Decade old Linux kernel vulnerabilities Breaking out of Claude code Malicious LLMs Hacker on a plan gets…
…
continue reading
1
Building safer spaceports & smarter satellites.
29:51
29:51
Play later
Play later
Lists
Like
Liked
29:51NASA Administrator nominee Jared Isaacman faced questioning on Project Athena and future NASA priorities at his Senate confirmation hearing. Space Leasing International (SLI) has signed an agreement for the purchase of two of AscendArc's Ka-band satellites with a combined value of over $200 million. Shield AI and Sedaro are partnering to advance au…
…
continue reading
1
UKSA announces £17M in new funding for space innovation.
13:27
13:27
Play later
Play later
Lists
Like
Liked
13:27The UK Space Agency (UKSA) announces new funding to drive sovereign space innovation. The US administration's nominee for the NASA leadership role, Jared Isaacman, appeared in front of Congress today. Nuclear energy startup Antares has raised $96 million in a Series B funding round, and more. Remember to leave us a 5-star rating and review in your …
…
continue reading
1
Shadow Risks in SaaS, Cybersecurity Market Has Lost Its Mind, and Rise of the CTrO - Mike Puglia - BSW #424
1:06:01
1:06:01
Play later
Play later
Lists
Like
Liked
1:06:01While many businesses rely on Microsoft 365, Salesforce and Google Workspace security features, critical blind spots remain—the recent series of high profile SaaS breaches demonstrate this. So what should you do? Mike Puglia, General Manager of Kaseya Labs, joins Business Security Weekly to discuss the risks in SaaS applications. In this segment, M…
…
continue reading
1
Shadow Risks in SaaS, Cybersecurity Market Has Lost Its Mind, and Rise of the CTrO - Mike Puglia - BSW #424
1:06:01
1:06:01
Play later
Play later
Lists
Like
Liked
1:06:01While many businesses rely on Microsoft 365, Salesforce and Google Workspace security features, critical blind spots remain—the recent series of high profile SaaS breaches demonstrate this. So what should you do? Mike Puglia, General Manager of Kaseya Labs, joins Business Security Weekly to discuss the risks in SaaS applications. In this segment, M…
…
continue reading
1
AI semantics, Calendly, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland... - SWN #534
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15AI semantics, Calendly, GreyNoise, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland, and More... Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-534
…
continue reading
1
AI semantics, Calendly, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland... - SWN #534
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15AI semantics, Calendly, GreyNoise, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland, and More... Show Notes: https://securityweekly.com/swn-534
…
continue reading
The European Space Agency (ESA) has approved a €1.35 billion spending plan to support space defense programs across its 23 member states. The European Space Agency (ESA) has said that a German astronaut will be the first European to fly to the moon with a future NASA-led Artemis mission. Deloitte has contracted Spire Global to design, build and ope…
…
continue reading
1
Former U.S. Secret Service Special Agent Shares Cyber Criminal Secrets
38:23
38:23
Play later
Play later
Lists
Like
Liked
38:23Former U.S. Secret Service Special Agent Richard LaTulip joins Craig Duckworth to reveal the hidden world of cyber criminal networks and infrastructure attacks. Drawing from his undercover work infiltrating dark web forums and catching some of the world's most sophisticated threat actors, Richard breaks down why traditional security approaches fail…
…
continue reading
Mandana White talks to Peter Hemmer of Grid to Great about how “digitise–centralise–virtualise” is transforming substation protection and control, and what it unlocks for future-ready grids.By Smart Grid Forums
…
continue reading
1
Virtualising Grid Protection with Eutoenergy
10:25
10:25
Play later
Play later
Lists
Like
Liked
10:25Mandana White sits down with Ali Karademir, Co-Founder and CEO of Eutoenergy, to explore how virtualised protection and automation are reshaping the power grid. From interoperability to modernisation, discover how vPAC is redefining the future of digital substations.By Smart Grid Forums
…
continue reading
Can AI make the power grid truly explainable? Svein Harald Olsen of Statnett tells Mandana White how Talk2PowerSystem uses CIM, Knowledge Graphs, and AI to turn data complexity into clarity.By Smart Grid Forums
…
continue reading
1
Decarbonising Power - Ireland’s Race to a Cleaner Grid
18:36
18:36
Play later
Play later
Lists
Like
Liked
18:36Mandana White speaks with John Reilly, Head of Renewable Energy at BnM, about Ireland’s path to decarbonisation, the slow pace of renewables, and how the grid can accelerate the clean energy transition.By Smart Grid Forums
…
continue reading
1
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
59:02
59:02
Play later
Play later
Lists
Like
Liked
59:02For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
…
continue reading
The European Space Agency’s (ESA’s) Member States commit €22.1 billion Euros in contributions at the annual ministerial meeting. Europe's Vega C rocket launched an advanced Korean Earth-observation satellite from French Guiana. A SpaceX Falcon 9 rocket launched on November 28 from Vandenberg Space Force Base for the Transporter-15 mission, and more…
…
continue reading
1
Critical Infrastructure: Everything is Connected and Vulnerable
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52When hackers target the systems controlling your water, power, and transportation, the consequences go far beyond data breaches—people can die. Leslie Carhartt, Technical Director of Incident Response at Dragos, pulls back the curtain on one of cybersecurity's most critical blind spots: industrial control systems that keep society running but remai…
…
continue reading