Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cyber Podcasts
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Russia knows our weaknesses. But do you? A major five-part series from Sky News and Tortoise which imagines how a Russian attack on the UK could play out – and invites real-life former ministers, military chiefs and other experts to figure out how to defend the country. Written and presented by Sky News' security and defence editor, Deborah Haynes. This is Deborah's second podcast series for Sky News. In her first series, Into The Grey Zone, Deborah explores the murky evolution of warfare. W ...
…
continue reading
"Securing Our Place In The Industry" The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry.
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The opportunity to delve into the 'mindsz' of industry leaders in technology and cyber security.
…
continue reading
Your Favorite Existentialist-Anarchist Internet Badass Commentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
…
continue reading
From the mystical world of religion, the endless debate of temporal politics and the meaningless existence of ”born with a death sentence” and why god went wrong.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Cyber Sitrep brings you all the latest cybersecurity news, commentary, and threat intelligence. Focused on small to midsize businesses who we feel have been left behind. Hosted by Eric from Corvus Technologies and Mike from Digital Beachhead who bring their unique perspective based on their military and cybersecurity experience. If you want to understand more about how cybersecurity is important to your organization, enjoy funny tales or just want to learn more about the field of cybersecuri ...
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
The podcast from those well-versed in all things cyber. Mandy Haeburn-Little, Cyber Woman of the Year 2021, in conjunction with the National Cyber Resilience Centre Group (NCRCG), brings listeners access to strategic conversations with industry leaders and figures in the UK’s cyber resilience landscape. With a changing roster of high-profile guests from across policing, government, academia and business, stay tuned for the latest in the UK’s cyber security landscape. The NCRCG is a non-profi ...
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Email feedback and show ideas to [email protected]. Join us as we examine the next major tech cycle, uncover emerging global tech hubs, and analyze where VC investment d ...
…
continue reading

1
Episode 11- The Evolution of Healthcare Security: Insights from Steven Ramirez
45:00
45:00
Play later
Play later
Lists
Like
Liked
45:00In this episode of Cyber Survivor host Dan Dodson interviews Steven Ramirez, Chief Information Security and Technology Officer at Renown Health. They discuss the evolution of healthcare cybersecurity over the past decade, emphasizing increased funding, improved identity management, and the importance of governance. Ramirez highlights the growing th…
…
continue reading

1
SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches;
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20Development%3A%20Why%20and%20How./32092 Animation-Driven Tapjacking on Android Attackers can use a clic…
…
continue reading
This briefing document summarizes the key themes, ideas, and facts presented in the "King Burrito's Universal Takeover: A Digital Saga" excerpts, primarily drawn from the "kingburrito.mp3" audio recording. The central figure, Alberto (aka "King Burrito"), hosts a dynamic and often chaotic Twitter Space, blending spontaneous musical performances, pe…
…
continue reading

1
Karma, Good Deeds and Reaping - Nomad Cyber Ghost S1 E3
27:08
27:08
Play later
Play later
Lists
Like
Liked
27:08Karma, good deeds and reaping being good to the unlovable. Loving the friendless brings forth healing in thy heart.By Michael J. Snow
…
continue reading
Want to support us? Want even MORE DefSec? Starting this week, we are providing more DefSec for our Patreon donors. Sign up to be a Patreon donor today: https://www.patreon.com/defensivesec https://www.youtube.com/watch?v=BRzMJbBZ490 Links: https://www.csoonline.com/article/4012801/the-top-red-teamer-in-the-us-is-an-ai-bot.html https://www.darkread…
…
continue reading

1
Cyber Health Check: How to Assess Your Security Products Effectively
26:55
26:55
Play later
Play later
Lists
Like
Liked
26:55#cybersecurity #productanalysis #cyberhealth Is your cybersecurity stack protecting you—or leaving you exposed? In this episode, we break down the essentials of product assessment for cyber health. Learn how to evaluate tools, identify gaps, and ensure your defenses align with modern threats. Whether you’re a security leader or a technical pro, thi…
…
continue reading

1
Emotional Firewalls: Mastering EQ to Outsmart Global Cyber Threats
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10Cybercrime Junkies Podcast interviews former NATO specialist and international intelligence expert, Nadja El Fertasi, about the role played by emotional intelligence in cyber security and Emotional Intelligence in AI. We discuss emotional firewalls, learning EQ (emotional intelligence) and how it can stop social engineering attacks, how internation…
…
continue reading

1
AI vs. Invoice Fraud: Inside AppZen’s Security Strategy with Chris Bollerud
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17In This Episode Chris Bollerud shares how AppZen tackles fraud in expense and invoice processes using AI-driven automation. From scanning 100% of expense reports to matching invoices against purchase orders and flagging anomalous vendor behavior, AppZen is transforming how financial compliance is handled in enterprises of all sizes. Chris explains …
…
continue reading

1
Rubio Spoofed, RondoDox Botnet, Batavia Spyware
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43Four members of President Trump's cabinet impersonated Is this some kind of a game? Batavia attacks Russian industrial companies Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely o…
…
continue reading

1
Smart Devices & Legacy Systems: The Big Risks in Healthcare Cyber - Ep 157
17:24
17:24
Play later
Play later
Lists
Like
Liked
17:24In this episode of Reimagining Cyber, Rob Aragao (Chief Security Strategist, OpenText) speaks with Ed Gaudet, CEO and founder of Censinet, about the high-stakes intersection of cybersecurity and healthcare. With hospitals increasingly reliant on connected medical devices and legacy systems, the risks extend beyond data breaches—they directly impact…
…
continue reading

1
Hacking the Harvest: Jonathan Braley on Ransomware, GPS Disruption, and Securing U.S. Agriculture
27:49
27:49
Play later
Play later
Lists
Like
Liked
27:49In this episode of Cyber Focus, Frank Cilluffo sits down with Jonathan Braley, Director of the Food and Agriculture Information Sharing and Analysis Center (Food and Ag-ISAC), to explore the growing cybersecurity threats facing the U.S. food and agriculture sector. They examine the integration of operational technology (OT), the rise in ransomware …
…
continue reading

1
Johann Most: Life of a Radical - SEDI hosts Tom Goyens
1:27:56
1:27:56
Play later
Play later
Lists
Like
Liked
1:27:56On June 29th, 2025, the Sam and Esther Dolgoff Institute (SEDI) hosted historian Tom Goyens for a compelling talk on the life and legacy of Johann Most, the infamous yet often misunderstood figure of early anarchism. Drawing on his forthcoming scholarly biography from the University of Illinois Press—the first of its kind in English—Goyens traced M…
…
continue reading

1
Ransomware Negociator Received Payments from Ransomware Groups
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10Ransomware negotiators may be called in to save some financial burden on organizations suffering from one of the worst cyberattacks they can. However, they seem like the natural people for ransomware groups to corrupt, and allegedly one such group did corrupt one such person. Sources: https://pastebin.com/fANnhtTj…
…
continue reading

1
Strictly Cyber EP 3 - Cyber Security Technology to Keep Your Data Protected
57:16
57:16
Play later
Play later
Lists
Like
Liked
57:16In this episode of Strictly Cyber, James and I are talking all about the tech that keeps your business safe behind the scenes. We break down the key tools — like firewalls, antivirus, encryption and cloud backups — and explain how they actually work to protect your data. No jargon, no fluff, just real talk about what you need and why it matters. If…
…
continue reading
This week on The Awareness Angle, Anthony Davis and Luke Pettigrew unpack everything from text scams and AI scrapers to school shutdowns and insider threats. It’s a mix of the strange, the serious, and the preventable, plus a few thoughts on whether changing the Blue Screen of Death was really necessary. Episode note - In this episode, we mention t…
…
continue reading

1
Episode 139: Financial Services Cybersecurity Challenges & How to Address Them - Part 1
41:12
41:12
Play later
Play later
Lists
Like
Liked
41:12In this episode, we dive into the unique cybersecurity challenges faced by the financial services sector, from high-value targets and strict compliance requirements to the constant threat of phishing and ransomware. Whether you're on the red team, blue team, or in leadership, this episode will help you strengthen your security posture in one of the…
…
continue reading

1
Secure Your Summer: Top Cyber Myths, Busted [Threat Vector]
38:00
38:00
Play later
Play later
Lists
Like
Liked
38:00While the N2K CyberWire team is observing Independence Day in the US, we thought you'd enjoy this episode of Threat Vector from our podcast network. Listen in and bust those cyber myths. In this episode of Threat Vector, David Moulton talks with Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance. Lisa shares insights from th…
…
continue reading

1
Qantas hacked, AI to power the Australian economy, and women’s health clinic hacked
39:57
39:57
Play later
Play later
Lists
Like
Liked
39:57In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft are joined by Australian Aviation’s Jake Nelson to talk about the Qantas data breach before our usual suspects talk up the latest AI news, followed by some alarming local hacks. AI is the topic for Hollingworth and Croft as the pair start with a chat about News Corp’s n…
…
continue reading
Show notes Follow John https://www.linkedin.com/in/john-caballero/ Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberweekly Like and Follow our X page https://twitter.com/thecyberweekly Follow Deogratius Okello https://www.linkedin.com/in/deo-okello/ https://twitter.com/deookello51 Follow Josephine Olok https://www.linkedin…
…
continue reading

1
Cyber Defense Radio – Dr. Tina Srivastava – Badge – HotSeat Podcast – 2025
12:56
12:56
Play later
Play later
Lists
Like
Liked
12:56🚨 New Episode of Cyber Defense Radio is LIVE! 🎙️ Hosted by @Miliefsky, Publisher of @CyberDefenseMag In this insightful conversation, Dr. Tina Srivastava, MIT PhD, inventor, and Co-Founder of @BadgeInc, shares how credentialless authentication is transforming identity security across enterprise and government sectors. 🔐 We cover critical innovation…
…
continue reading

1
Securing Local Government: What Ohio’s New Cyber Rules Mean for You
13:58
13:58
Play later
Play later
Lists
Like
Liked
13:58Additional Resources: https://cyber.ohio.gov Free Webinar: https://hubs.ly/Q03vK0tB0 ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/contact-us/ ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follo…
…
continue reading

1
Auto Tech at a Crossroads: Navigating the U.S. Ban on Foreign Vehicle Systems – PlaxidityX Ep 24
14:42
14:42
Play later
Play later
Lists
Like
Liked
14:42As today’s vehicles evolve into software-defined data hubs, concerns over national security have extended deep into automotive supply chains. In this episode of Cars, Hackers, and Cyber Security, we unpack the U.S. government’s sweeping new ban on connected vehicle systems originating from China and Russia-and what it means for automakers, supplier…
…
continue reading

1
#78- Cybercriminals Aggressively Shifting to Easier Targets: Small & Medium Businesses
33:53
33:53
Play later
Play later
Lists
Like
Liked
33:53The average ransomware claim is down, but incidents are up. What does that mean? Threat actors are targeting smaller businesses, and Business Email Compromise (BEC) is the attack of choice. With Dan Candee @CorkCyber.By Extra Something Media
…
continue reading

1
Ep. 57 – Building a Resilient Cyber MGA Through Discipline and Consistency – with Greg Markell
1:00:42
1:00:42
Play later
Play later
Lists
Like
Liked
1:00:42When the market softened, Ridge didn’t follow the crowd. Here’s how discipline became their competitive edge. In this episode, host Anthony Hess sits down with Greg Markell, President & CEO at Ridge Canada Cyber Solutions Inc., for a candid conversation on what it takes to build a sustainable cyber MGA. Greg shares how Ridge has resisted the pull o…
…
continue reading

1
Resilient Cyber w/ AJ Yawn - Transforming Compliance Through GRC Engineering
35:53
35:53
Play later
Play later
Lists
Like
Liked
35:53In this episode, we sat down with AJ Yawn, Author of the upcoming book GRC Engineering for AWS and Director of GRC Engineering at Aquia, to discuss how GRC engineering can transform compliance. We discussed the current pain points and challenges in Governance, Risk, and Compliance (GRC), how GRC has failed to keep up with software development and t…
…
continue reading

1
Love for his family was his fuel to conquer the AIGP certification!
10:05
10:05
Play later
Play later
Lists
Like
Liked
10:05ABOUT THIS EPISODE:The Blak Cyber podcast presents "The AI Governance Mentors Series, Episode 2 featuring Albert Kittoe, Project Manager, Scrum Master. Albert recently passed the AIGP (Artificial Intelligence Governance Professional), and shares some of his insights.The burning desire to protect his family drove Albert to sit for the AIGP exam.Plea…
…
continue reading
Join Dr. Joseph and Alfredzo as they close out Season 2 of the Cyber Coffee Hour! They'll share their favorite moments and biggest takeaways from the past season, chat about their exciting summer plans, and give you a sneak peek into what to expect when Season 3 kicks off this Fall. Have a Cup of Coffee with Us! SUBSCRIBE to the Cyber Coffee Hour w…
…
continue reading

1
Cyber Warfare, Disinformation, and Geopolitical Risks with Dr. Bilyana Lilly
38:17
38:17
Play later
Play later
Lists
Like
Liked
38:17In this bonus episode, Ciaran and James sit down with Dr. Bilyana Lilly, to discuss cyber disinformation, diplomacy and defense. Here Bilyana sheds light on how geopolitical risk affects technology, including cyber threats, information warfare, and the evolving global security landscape. To learn more about our guest Dr. Bilyana Lilly and for links…
…
continue reading

1
Digital Trust in the GenAI Era with Jon Geater
24:18
24:18
Play later
Play later
Lists
Like
Liked
24:18We're excited to bring you this new episode of Clearly Cyber featuring Jon Geater. Jon has been leading some truly innovative work in data provenance and is helping shape a culture built on proof and trust. In this episode, we dive into the implications of generative AI and deepfakes, and explore how they’re reshaping our understanding of truth and…
…
continue reading

1
teissTalk: Surviving a critical CVE - a high-impact playbook
47:42
47:42
Play later
Play later
Lists
Like
Liked
47:42Risk-based prioritising using severity scoring and patch analysis Escaping the silo trap - bridging the gap between IT and security teams Automate rules to handle high-severity vulnerabilities and zero-days Jonathan Craven, Host, teissTalk https://www.linkedin.com/in/jonathanbcraven/ Tiago Rosado, Chief Information Security Officer, Asite https://w…
…
continue reading

1
Episode 32: A legacy of Growth - Phil Jackman
18:41
18:41
Play later
Play later
Lists
Like
Liked
18:41This episode of It's Cyber Up North is a bit of a weepy one! With Phil Jackman set to retire from CyberNorth, Danielle and Phil take a look back over the journey of CyberNorth – from initial inception, to a glimpse into what the future now holds for CyberNorth as Danielle Phillips takes over the reins.…
…
continue reading

1
Digital Forensics & Incident Response (DFIR) with Surefire Cyber.
35:42
35:42
Play later
Play later
Lists
Like
Liked
35:42Cyber threats aren't slowing down—and neither are we. In episode 38 of Cyber Security America, I sit down with two powerhouses from Surefire Cyber—Karla Reffold and Billy Cordio—to pull back the curtain on what’s really happening in today’s incident response and threat intelligence landscape. 💡 What we cover: 📈 Real-world ransomware trends (like lo…
…
continue reading

1
Cybersecurity for All: Inclusion, Community, and the Mission: Jacqui Loustau on AWSN and Future Leadership
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58🗓️ Episode Overview: In this powerful and inspiring episode of Cyber Mindsz, Jacqui Loustau, Executive Director of AWSN, shares her journey through the cybersecurity landscape—from help desk support in Europe to speaking on global stages and founding the Australian Women in Security Network. With passion and purpose, Jacqui discusses AWSN’s role in…
…
continue reading

1
Ep. 95 Market Conditions and the Future of the Market from one of the industry experts!
15:13
15:13
Play later
Play later
Lists
Like
Liked
15:13Send us a text Ep. 95 of the Cyber Law Revolution is live! In this episode, thrilled to have Patrick Cannon, chief claims officer from Onda, join the show and discuss his path in cyber, current market conditions, and where he sees the market going over the next 3-5 years. You won't want to miss it! Keep the questions, calls, etc. coming - 410-917-5…
…
continue reading
Darnley shines the proton pack spotlight on a real digital spooky fest: the “Librarian Ghouls” cyberattack campaign. These ghostly hackers are haunting machines while you sleep, using legit tools to sneak past defences and mine crypto in the shadows. We break down what it means for everyday users, how to spot the signs, and simple ways to stay prot…
…
continue reading