Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cyber Podcasts
They steal billions: Cyber Hack investigates the alleged cyber gangs and the heists and hacks they’re accused of carrying out. No one is said to be safe. From Hollywood studios, to international banks, from crypto exchanges to small businesses and health care companies, law enforcement agencies say they cause chaos around the globe. Who will be next? And where is the money going? Latest season: Evil Corp. The Russian Evil Corp is accused of being a family crime gang, responsible for stealing ...
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Russia knows our weaknesses. But do you? A major five-part series from Sky News and Tortoise which imagines how a Russian attack on the UK could play out – and invites real-life former ministers, military chiefs and other experts to figure out how to defend the country. Written and presented by Sky News' security and defence editor, Deborah Haynes. This is Deborah's second podcast series for Sky News. In her first series, Into The Grey Zone, Deborah explores the murky evolution of warfare. W ...
…
continue reading
"Securing Our Place In The Industry" The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Your Favorite Existentialist-Anarchist Internet Badass Commentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
…
continue reading
Cyber Insurance Leaders is dedicated to keeping cyber insurance and security professionals up to date on the latest developments, best practices, and thought leadership from leading voices in the industry. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
We are going to teach you how to defend yourself against cybercrime, privacy abuse, vehicle hacking, bomb drones and cyber warfare, REGARDLESS of your proficiency with computers. Because you don't have to be technical to survive the Digital Age!
…
continue reading
In this podcast, we delve into various aspects of cybersecurity, inviting global security leads to discuss trends, the impact of new concepts and regulations, talent retention, and more through one-on-one discussions.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
The Cyber Nerds - Beyond The Sofa's Podcast Reviews. Discussions. Arguments. Beyond the Sofa is the official podcast from the best YouTube reactors on the planet. Tune in to weekly episodes.
…
continue reading
The podcast from those well-versed in all things cyber. Mandy Haeburn-Little, Cyber Woman of the Year 2021, in conjunction with the National Cyber Resilience Centre Group (NCRCG), brings listeners access to strategic conversations with industry leaders and figures in the UK's cyber resilience landscape. With a changing roster of high-profile guests from across policing, government, academia and business, stay tuned for the latest in the UK's cyber security landscape. The NCRCG is a non-profi ...
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
1
CHAOS | Cybersecurity Predictions You Need to Know NOW
36:10
36:10
Play later
Play later
Lists
Like
Liked
36:10Question? Text our Studio direct. New Episode🔥CHAOS | Cybersecurity Predictions You Need to Know NOW. Cybercrime Junkies show dives into the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers …
…
continue reading
1
🔴 Dec 24’s Top Cyber News NOW! - Ep 1033
1:35:44
1:35:44
Play later
Play later
Lists
Like
Liked
1:35:44The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
…
continue reading
Shoot us a Message and It might feature on our next Podcast Episode! Bags VIP fight ticket confirmed. Warning: You accept all risks, may be filmed and exposed to bodily fluids. Hotel rules: No outside drinks. Gender-specific restrooms only. Enjoy VIP access. Support the show Watch our exclusive content and daily show reactions here TCN Patreon Can'…
…
continue reading
1
The Biggest Professional Data Leak You’ve Never Heard Of (And Why It Matters)
10:10
10:10
Play later
Play later
Lists
Like
Liked
10:10A massive, unsecured database exposed billions of professional records such as names, emails, job roles, work history, and more...now quietly sitting open on the internet. In this episode of Darnley’s Cyber Café, we unpack how a leak this size changes the game for phishing, social engineering, and AI-powered scams, why professionals are now prime t…
…
continue reading
1
ServiceNow to acquire cybersecurity startup Armis, MacSync Stealer adopts quieter installation, Nissan customer data stolen in Red Hat raid
6:54
6:54
Play later
Play later
Lists
Like
Liked
6:54ServiceNow to acquire cybersecurity startup Armis MacSync Stealer adopts quieter installation Nissan customer data stolen in Red Hat raid Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real envir…
…
continue reading
1
Security Is Everyone's Job and Why That Matters More Than Ever with Bryan Tomczyk
46:46
46:46
Play later
Play later
Lists
Like
Liked
46:46Guest Introduction Bryan Tomczyk serves as a Cybersecurity Engineer at GP Strategies Corporation, where he works closely with senior IT and infrastructure teams to secure systems across a large, global organization. GP Strategies operates primarily as a training and professional services company, supporting clients across multiple countries and ind…
…
continue reading
Most threat actors come and go with the times, not lasting more than a couple years. Prince of Persia was assumed to be one such group, but it turns out they not only returned but never left in the first place. Sources: https://pastebin.com/9yJ1fxP3By Chloe Thonus
…
continue reading
1
Ben Fletcher and Dockworker Power – SEDI Hosts Peter Cole
1:03:23
1:03:23
Play later
Play later
Lists
Like
Liked
1:03:23On November 23, 2025, the Sam and Esther Dolgoff Institute (SEDI) hosted historian Peter Cole for an expansive talk on Ben Fletcher, the Industrial Workers of the World (IWW), and the radical legacy of dockworkers’ internationalism—from Philadelphia’s segregated waterfronts to Durban, South Africa, and beyond. Cole traced the rise of the Marine Tra…
…
continue reading
1
Ep. 60 – Defensible Truth in DFIR: Why Preserving Evidence Beats Quick Fixes – with Devon Ackerman
54:31
54:31
Play later
Play later
Lists
Like
Liked
54:31In incident response, if you wipe systems first and ask questions later, you’re deleting the truth. In this episode, host Anthony Hess sits down with Devon Ackerman, Global Head of Digital Forensics and Incident Response at Cybereason, to unpack what serious DFIR looks like when your audience is regulators, legal counsel, and insurance carriers and…
…
continue reading
1
Microsoft Account Hacks, WhatsApp Ghost Pairing, and Extensions Spy On AI
1:01:41
1:01:41
Play later
Play later
Lists
Like
Liked
1:01:41This week on The Awareness Angle, breaches, extortion, and quietly invasive tech all collide. From real estate firms leaking highly sensitive data to browser extensions secretly harvesting AI conversations, the theme this week is trust, and how easily it gets abused. Luke is back from holiday, and we kick off with Breach Watch, starting with a New …
…
continue reading
1
SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. Bu…
…
continue reading
1
Defensive Security Podcast Episode 333
1:11:50
1:11:50
Play later
Play later
Lists
Like
Liked
1:11:50Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.theregister.com/2025/12/09/hypervisor_ransomware_attacks_increasing https://www.bleepingcomputer.com/news/security/react2shell-flaw-exploited-to-breach-30-orgs-77k-ip-addresses-vulnerable https://www.infosecurity-magazine.com/…
…
continue reading
1
Episode 162: Before the Breach How Attackers Profile Your Organization
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22In this episode, Brad and Spencer from SecurIT360's Offensive Security group delve into the crucial reconnaissance phase attackers undertake before launching an attack. They discuss the real-world impact of seemingly harmless data leaks, how attackers chain them together to build a profile of your organization, and common misconceptions about what …
…
continue reading
Suitability Profile: Alberto Daniel HillIntroductionAlberto Daniel Hill is a complex figure who sits at the intersection of elite cybersecurity, digital activism, and deep personal resilience. Forged by an innate curiosity and tempered by the trauma of an incarceration that he defines as unjust, his profile transcends that of a mere technical exper…
…
continue reading
1
Live Special: Securing the Connected World with Thomas Harvey
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15In this special live episode of Cyber Leaders, Ciaran sits down with Thomas Harvey, CISO at Santander UK. As one of the UK’s leading operational cybersecurity figures, Thomas discusses the growing need for cross-sector collaboration, why a more connected security community is essential to national cyber resilience, and how building trust can help c…
…
continue reading
1
AI-Orchestrated Cyber Espionage and the Future of Cyber Defense with CISA's Nick Andersen
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37AI is speeding up cyber operations and shrinking the window for defenders to respond. Nick Andersen, who leads CISA's Cybersecurity Division, explains why Anthropic's recent report caught attention: it described what Anthropic called the first publicly reported AI-orchestrated cyber espionage campaign, in which threat actors misused its Claude mode…
…
continue reading
1
Bondi shooting misinformation, ShinyHunters returns, and how to stay cyber safe while travelling
45:49
45:49
Play later
Play later
Lists
Like
Liked
45:49This week, for the last Cyber Uncut of 2025, David Hollingworth and Daniel Croft talk about Grok's spreading of misinformation regarding the tragic Bondi terror attack, OpenAI's admission of "high cyber risk", the re-emergence of ShinyHunters with a string of possible extortion attempts, ransomware attacks on medical centres, and important tips for…
…
continue reading
1
2025 Cybersecurity Macroeconomic Retrospective
25:48
25:48
Play later
Play later
Lists
Like
Liked
25:48In this episode of Resilient Cyber, I sit down with my friend and the Founder of Return on Security (RoS), 💰 Mike Privette. Mike is the among the best our community has to offer when it comes to analyzing the macroeconomic trends of the cybersecurity ecosystem, from M&A, fundraising, startups, innovation, and venture capital. We will dig into the m…
…
continue reading
Summary In this conversation, Ebun Idowu shares her journey into cybersecurity, detailing her educational background, professional experiences, and insights gained along the way. She discusses the transition from being a master's student to working in a startup, the challenges faced in threat hunting, and the importance of balancing coursework with…
…
continue reading
**The vCISO In The Green Glass Corner Office Podcast has been re-branded to The Blak Cyber Podcast presents The CISSP Dojo Series** 🎧 The Blak Cyber Podcast presents The CISSP Dojo SeriesThe podcast where we talk about the practical/real-world application of the CISSP CBK.📜 Episode SummaryIn this episode, we go over the "ISC2 Code of Ethics."📚 Oper…
…
continue reading
1
AI & Cybersecurity: Balancing Risk & Innovation
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06This week on Simplifying Cyber, Aaron Pritz and Cody Rivers sit down with Jax Scott — combat veteran, podcast host (Two Cyber Chicks), and VP of Cybersecurity at Pearson — for a conversation that’s equal parts leadership, risk reality, and “why is everyone still confused about BISOs?” Jax shares her unconventional path into cybersecurity (perfume s…
…
continue reading
Venezuela’s state oil company blames a cyberattack on the U.S. An Iranian hacker group offers cash bounties for doxing Israelis. Germany’s lower house of parliament suffers a major email outage. South Korea’s e-commerce breach exposes personal information of nearly all of that nation’s adults. Researchers report active exploitation of two critical …
…
continue reading
1
Spreadsheets to AI Agents The Next Era of Enterprise GRC with Richa Kaul
46:11
46:11
Play later
Play later
Lists
Like
Liked
46:11In episode 47 of Cybersecurity America, host Joshua Nicholson is joined by Richa Kaul, CEO and Founder of Complyance, to explore how agentic AI and intelligent automation are reshaping enterprise Governance, Risk, and Compliance (GRC). Richa breaks down why traditional, spreadsheet-driven GRC programs are failing at scale—and how organizations are …
…
continue reading
1
Translating 30 Years of SIEM and Security Leadership into Executive Business Value
1:20:31
1:20:31
Play later
Play later
Lists
Like
Liked
1:20:31Join us as we talk with Rick Weaver, seasoned cybersecurity leader and Project Delivery Lead at Thrive. With over 30 years of experience, Rick breaks down how to align large-scale security transformations with business risk and compliance. Learn how he translates complex SIEM and incident response data into strategic value for executives. Don't mis…
…
continue reading
1
teissTalk: 2026 threat trends - securing your organisation against next-gen cyber attacks
43:16
43:16
Play later
Play later
Lists
Like
Liked
43:16How cyber criminals are weaponising AI to defeat your threat detection and response Beyond encryption – how ransomware has evolved to include data exfiltration, publication threats and supply chain compromise How geopolitical tensions are increasing nation-sponsored cyber-campaigns - proxy attacks, IT worker scams and supply chain risks Thom Langfo…
…
continue reading
1
Episode 22- Ransom or Rebuild? Claudia Rast on the Hard Math of Hospital Cyberattacks
31:11
31:11
Play later
Play later
Lists
Like
Liked
31:11Alarms don’t always sound when hospitals are under attack. Sometimes the first signal is a locked EHR, diverted ambulances, and a clinical team scrambling to deliver care without the tools they trained on. We sit down with Butzel attorney Claudia Rast—leader of cybersecurity and AI practices and former co-chair of the ABA’s presidential cybersecuri…
…
continue reading
Send us a text Episode 100(!!!!!) of the Cyber Law Revolution is live! A bit sentimental because it's been five years since I launched this podcast, and reaching 100 is pretty cool to me! Looking back on the last five years and listening to my past podcasts was both entertaining and horrifying. Specifically, so much has changed and continues to evo…
…
continue reading
1
#90: The Discord Breach – Could it Happen to You?
24:17
24:17
Play later
Play later
Lists
Like
Liked
24:17Complyance CEO Richa Kaul discusses how third parties can expose sensitive data (passports, IDs) and provides actionable steps to prevent loss and protect revenue.By Extra Something Media
…
continue reading
1
CYFIRMA Research: North Korean Cyber Crime as a Statecraft Tool
7:08
7:08
Play later
Play later
Lists
Like
Liked
7:08After Russia’s veto of the UN Panel of Experts and increased military cooperation over the war in Ukraine, North Korea is ramping up sanctions evasion—deepening its military ties with Moscow and stealing billions in cryptocurrency to finance its WMD programs. Link to the Research Report: NORTH KOREAN CYBER CRIME AS A STATECRAFT TOOL - CYFIRMA #Nort…
…
continue reading
In today’s podcast we cover four crucial cyber and technology topics, including: 1. VPN providers under fire 2. Apache flaw allows access to sensitive data 3. 40 Year old U.S.-based man gives identity to North Koreans 4. Portugal aims to protect security researchers I'd love feedback, feel free to send your comments and feedback to | cyberandtechwi…
…
continue reading
1
Securing the Future: Anthony Grieco's Insights on Cyber Threats
12:35
12:35
Play later
Play later
Lists
Like
Liked
12:35In this episode of the 'Better Safe Than Sorry' podcast, Adrian Havette from Wipro Switzerland's Cybersecurity Practice interviews Anthony Greco, Senior Vice President and Chief Security and Trust Officer at Cisco. They discuss the evolving threat landscape, the impact of AI on cyberattacks, the importance of upgrading network infrastructure, and t…
…
continue reading
1
Episode 36: Why Diversity Matters in Cyber Security
28:24
28:24
Play later
Play later
Lists
Like
Liked
28:24In this episode we are live from Cyberfest 2025 and discussing why diversity matters in Cyber Security with CyberNorth’s Thea Scott and UK Governments Stuart Frost BEM and Parisa Akaber, Siemens. Tune in as we take a deep-dive around: · Why diversity is such a critical factor in building resilient and effective cyber security teams · The important …
…
continue reading
1
Episode 89 - Omar Romero - Founder and CEO of ROSE IT Services Limited
19:55
19:55
Play later
Play later
Lists
Like
Liked
19:55In this episode, host Evgeniy Kharam speaks with Omar Romero, CEO of Rose IT Services, a Trinidad-based MSP serving the Caribbean and North America. Omar shares his story of launching the company post-2008 crash, scaling without VC or franchising, building a team from scratch, and adapting to evolving tech, from cybersecurity to automation. He also…
…
continue reading
This is today’s cyber news for December third, 2025. Attackers are turning hacked home cameras, developer tools, and mobile phones into powerful surveillance and access channels that traditional controls struggle to cover. Leaders who understand these overlaps can better prioritize resilience, privacy, and vendor risk. Listeners will hear about sma…
…
continue reading