Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cyber Podcasts
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Not another cyber podcast — a creative one that uncovers the people, places, and brand stories shaping cyber culture.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
The opportunity to delve into the 'mindsz' of industry leaders in technology and cyber security.
…
continue reading
Your Favorite Existentialist-Anarchist Internet Badass Commentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
A podcast for anyone and everyone interested in leadership in the cybersecurity industry - we talk about the challenges impacting our industry & how leadership can address that and gain insights, advice and the occasional anecdote from experienced leaders who are happy to share their stories with us!
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Breaking Cyber Barriers dives deep into the world of Cybersecurity, uncovering trends and exploring its limitless potential. Join host Liz Vagenas as she speaks with top leaders about the current challenges and opportunities within the industry, as well as strategies for success.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Cyber Sitrep brings you all the latest cybersecurity news, commentary, and threat intelligence. Focused on small to midsize businesses who we feel have been left behind. Hosted by Eric from Corvus Technologies and Mike from Digital Beachhead who bring their unique perspective based on their military and cybersecurity experience. If you want to understand more about how cybersecurity is important to your organization, enjoy funny tales or just want to learn more about the field of cybersecuri ...
…
continue reading
Cyber Security Compliance and IT Jobs
…
continue reading
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
The Cyber Nerds - Beyond The Sofa's Podcast Reviews. Discussions. Arguments. Beyond the Sofa is the official podcast from the best YouTube reactors on the planet. Tune in to weekly episodes.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
The podcast from those well-versed in all things cyber. Mandy Haeburn-Little, Cyber Woman of the Year 2021, in conjunction with the National Cyber Resilience Centre Group (NCRCG), brings listeners access to strategic conversations with industry leaders and figures in the UK’s cyber resilience landscape. With a changing roster of high-profile guests from across policing, government, academia and business, stay tuned for the latest in the UK’s cyber security landscape. The NCRCG is a non-profi ...
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading

1
Resilient Cyber w/ Rob T. Lee - Navigating AI's Impact on Cyber & the Workforce
39:08
39:08
Play later
Play later
Lists
Like
Liked
39:08In this episode of Resilient Cyber, I sit down with the SANS Institute's Chief of Research (COR) & Chief AI Officer (CAIO), Rob T. Lee to discuss AI's impact on cybersecurity and the workforce. We will discuss SANS Critical AI Security Guidelines, the opportunities and obstacles AI presents for cybersecurity, and how practitioners should navigate A…
…
continue reading

1
Peter Kropotkin: Science, Ethics, and Class Struggle – SEDI Hosts Iain McKay
1:27:10
1:27:10
Play later
Play later
Lists
Like
Liked
1:27:10In this SEDI session, anarchist writer and editor Iain McKay delivers a brisk, idea-dense tour of Peter Kropotkin’s science, ethics, and revolutionary politics—showing how the famed geographer’s fieldwork and evolutionary arguments undergird a living anarchist program. McKay (lead author of An Anarchist FAQ and editor/translator of major Kropotkin …
…
continue reading

1
How the FBI fights Cyber Crime. Four Truths.
58:42
58:42
Play later
Play later
Lists
Like
Liked
58:42Ever wondered what really happens in a cyber crime manhunt and take-down? What the FBI actually does in cybersecurity? How they help the publc? Today we got the rare chance to sit down with Special Agent with the FBI’s Cyber Crime Division (RET.), Scott Augenbaum. He shares practical ways how to protect yourself online. His model called the Four (4…
…
continue reading

1
Week in Review: Baltimore’s expensive gaffe, ransomware takedown outcomes, Workiva Salesforce breach
27:47
27:47
Play later
Play later
Lists
Like
Liked
27:47Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Ray Espinoza, vp of information security, Elite Technology Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day …
…
continue reading

1
Wheels left spinning after cyber incident.
29:42
29:42
Play later
Play later
Lists
Like
Liked
29:42A cyberattack disrupts Bridgestone’s manufacturing operations. CISA warns of critical vulnerabilities in products used across multiple sectors. Additional cybersecurity firms confirm data exposure in the recent Salesforce–Salesloft Drift attack. A configuration vulnerability in Sitecore products leads to remote code execution. HHS promises stricter…
…
continue reading
Shoot us a Message and It might feature on our next Podcast Episode! Another Rick Up My Sleeve As Peacemaker receives praise as a hero, he uses the alternate dimension to deepen his bond with Harcourt. Meanwhile, Economos faces criticism for the mission's failure. Support the show Watch our exclusive content and daily show reactions here TCN Patreo…
…
continue reading

1
Satoshi's Bride: Reconstruction of a Lost Narrative The original complete manuscript of the story was "left on the system lost".
51:36
51:36
Play later
Play later
Lists
Like
Liked
51:36The book "The Indelible Mark: A Protocol for the Heart" was created through a unique collaboration between its author, Alberto Daniel Hill, and an artificial intelligence (AI). The creation process itself is deeply intertwined with the book's core themes.Here's a breakdown of how the book was created:• Reconstruction of a Lost Narrative The origina…
…
continue reading

1
Episode 148: Securing Windows: Common Misconfigurations That Give Attackers The Advantage
54:45
54:45
Play later
Play later
Lists
Like
Liked
54:45This is the webinar I gave in August 2025 on the topic of common Windows misconfigurations I see during internal pentests. Make sure you grab your free gifts! https://securit360.com/free-gifts https://links.spenceralessi.com/creds https://go.spenceralessi.com/windows-slides Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov…
…
continue reading

1
CYFIRMA Research- Typhoon in the Fifth Domain: China's Evolving Cyber Strategy
6:24
6:24
Play later
Play later
Lists
Like
Liked
6:24China's Cyber Shift: From espionage to sabotage, Targeting Global Infrastructure – check out, the newest CYFIRMA blog on Beijing's ambitions in the Fifth Domain. Link to the Research Report: https://www.cyfirma.com/blogs/typhoon-in-the-fifth-domain-chinas-evolving-cyber-strategy/ #Geopolitics #CYFIRMAresearch #ThreatIntelligence #cybersecurity #ETL…
…
continue reading

1
SANS Stormcast Friday, September 5th, 2025: Cloudflare Response to 1.1.1.1 Certificate; AI Modem Namespace Reuse; macOS Vulnerability Allowed Keychain Decryption
8:18
8:18
Play later
Play later
Lists
Like
Liked
8:18Unauthorized Issuance of Certificate for 1.1.1.1 Cloudflare published a blog post with more details regarding the bad 1.1.1.1 certificate that was issued by Fina. https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/ AI Model Namespace Reuse Deleted accounts on Huggingface can be taken over by other entities unrelated to th…
…
continue reading

1
‘Nudify’ app ban, hacker threatens artists with AI punishment, and fake ID marketplace takedown
35:09
35:09
Play later
Play later
Lists
Like
Liked
35:09In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft discuss the latest AI news, some worrying trends in cyber crime, and this year’s largest supply chain hack, impacting hundreds of companies worldwide. Hollingworth and Croft kick things off by looking at the NSW government embracing AI and the federal government’s timel…
…
continue reading
✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/contact-us/ ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @secdefllc for real-time tweets. Follow our CEO Shawn Waldman for his…
…
continue reading

1
Episode VIIII - Scaling Without Losing Soul
16:25
16:25
Play later
Play later
Lists
Like
Liked
16:25Executive Coach and Growth Strategist Judy Sunblade discusses how CXO's can build revenue engines that grow --- and still feel human.
…
continue reading

1
Leading Cyber - in conversation with Kathryn Cardose
1:02:34
1:02:34
Play later
Play later
Lists
Like
Liked
1:02:34In this episode, I chat with Kathryn about her own leadership career, how it started, its evolution and lessons learned along the way. We also talk about the importance of mindset and of building cultures where people can thrive. Have a listen, hope you enjoy it and if you do, please don't forget to like, rate, like and subscribe. Thanks again for …
…
continue reading

1
#82 - The Phishing Paradox: Why Security Training Might Be Making You MORE Vulnerable
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14Discover the surprising reason security training may be making you an easy target for hackers, and the better way to fight back. With CyberHoot CEO Craig Taylor.By Extra Something Media
…
continue reading

1
Yossi Shani Founder & CEO @YazamTech about files inspection, Deep Scan & CDR
53:37
53:37
Play later
Play later
Lists
Like
Liked
53:37לראייתי כול קובץ שנכנס לארגון דורש בדיקה והלבנה, בעידן שמערכות הלבנה מסוגלות לבצע בדיקה ללא לייטנסי ומבלי לעכב את המשתמש כול קובץ צריך לעבור סניטציה. אחת ולתמיד מה ההבדל בין מערכת הלבנת קבצים לבין בדיקת וירוסים (נוזקות)? בתחילת הדרך המשמעות של הלבנה הייתה בדיקה של הקבצים ע"י מספר מנועי אנטי וירוס בד"כ 3-5 בו זמנית ו"הצבעה" ביניהם על תקינות הקובץ אם…
…
continue reading

1
Episode 15- Inside the Ransomware Negotiation Room with T.J. Ramsey
40:49:08
40:49:08
Play later
Play later
Lists
Like
Liked
40:49:08Dan Dodson and cybersecurity expert T.J. Ramsey discussed the escalation of ransomware attacks in healthcare, emphasizing that ransomware is a form of extortion malware used primarily for financial gain, with attackers operating like organized crime syndicates. Ramsey traced his journey from military intelligence to cybersecurity, explained the ope…
…
continue reading
#cybersecurity #databreach #staysafeonline In this episode of The Cyber Sitrep, Eric and Mike dive into the alarming question: “How did they get my data?!” From massive data breaches to everyday phishing attempts, we break down the tactics attackers use to steal personal information and what you can do to protect yourself. Stay ahead of the threats…
…
continue reading

1
Storytelling, Culture and Cyber Resilience - Ep 165
31:31
31:31
Play later
Play later
Lists
Like
Liked
31:31Cyber resilience goes beyond checkboxes. In this episode, cybersecurity veteran Jerod Brennen (virtual CISO, executive advisor, and indie filmmaker) joins Rob Aragao to explore how storytelling, culture, and business alignment turn security into a true business enabler. Real-world lessons and practical steps help you shift from traditional cybersec…
…
continue reading

1
Data First, AI Second: CIO Patrick Lawrence's Roadmap for Mid-Market Expansion
34:51
34:51
Play later
Play later
Lists
Like
Liked
34:51Guest Introduction Patrick Lawrence serves as Chief Information Officer at Economy Exterminators, a growing pest control company operating across the Carolinas. With more than 25 years in technology, he blends leadership and practical IT execution to modernize operations, strengthen data integrity, and guide the company through a mid-market expansi…
…
continue reading

1
Sen. Gary Peters Sounds the Alarm on CISA 2015 Renewal, Cyber Budget Cuts, and Local Defense Gaps
25:17
25:17
Play later
Play later
Lists
Like
Liked
25:17Congress is back from August recess with just weeks to act on vital national issues. One key deadline: reauthorizing the 2015 law that shields companies when they share threat intelligence with the federal government. In this episode, Senator Gary Peters (D-MI) joins host Frank Cilluffo to explain why renewing CISA 2015 is essential to national sec…
…
continue reading
We’re asking the hard question: is technology the problem… to technology? If cybercrime only exists because the internet does, maybe the real solution is to unplug it all, toss the Wi-Fi router into the river, and go back to quills, scrolls, and smoke signals. In this episode, Darnley takes a tongue-in-cheek look at the rise of tech in cybersecurit…
…
continue reading
The key to success - collaboration? In our latest podcast our guests Debra Cairns (Net-Defence) and Ed Bartlett (Hicomply) join Danielle Phillips (CyberNorth) to discuss how collaboration and not competitiveness has grown their business and continues to see them thrive.
…
continue reading

1
Victims Email Phishers First in Zipline Campaign
7:32
7:32
Play later
Play later
Lists
Like
Liked
7:32Usually in phishing cases, you are emailed by the attackers first, but can attackers lie in wait for you to email them first? Surprisingly, yes. How is this even possible? Find out today! Sources: https://pastebin.com/4b2vsrwHBy Chloe Thonus
…
continue reading

1
Grok Chatbot Leaks 370,000 Private Conversations
44:56
44:56
Play later
Play later
Lists
Like
Liked
44:56This week on The Awareness Angle, Anthony Davis and Luke Pettigrew come together for a special in-person episode while filming new Cybersecurity Awareness Month videos. From exposed AI chats to insider sabotage, telecom breaches, and Denmark’s bold new deepfake law, the conversation digs into how human behaviour, weak controls, and patchy regulatio…
…
continue reading
A billion-dollar rivalry, a spy on the inside, and a sting operation for the history books. This isn’t a Netflix drama — it’s a real lawsuit. In this episode, GTC dives into the explosive case of Rippling vs. Deel, where Rippling alleges Deel deployed a corporate spy in their ranks. This case has it all and is the exact kind of story that you might…
…
continue reading

1
S2 E2: Securing the Grid: Substation Security
22:30
22:30
Play later
Play later
Lists
Like
Liked
22:30In this episode of Simply ICS Cyber, Don C. Weber and Tom VanNorman sit down with Chris Sistrunk to dive into the challenges and realities of Substation Security. Chris, now a Technical Leader at Mandiant & Google Cloud Security, brings years of experience from his time at Entergy, where he specialized in Transmission & Distribution SCADA systems…
…
continue reading

1
Defensive Security Podcast Episode 318
1:15:32
1:15:32
Play later
Play later
Lists
Like
Liked
1:15:32I have no idea why Riverside.fm (the service we use to record the podcast) has such an audio/video sync problem for the first minute or so of the recording. We’re working on it… On to the show. Here are the links for this week’s episode: https://www.bleepingcomputer.com/news/security/new-downgrade-attack-can-bypass-fido-auth-in-microsoft-entra-id h…
…
continue reading

1
Third-Party Risk Management in Healthcare
22:02
22:02
Play later
Play later
Lists
Like
Liked
22:02Ever wonder why healthcare organizations are such prime targets for cyberattacks? In this eye-opening conversation with Kelly White, founder of Risk Recon, we uncover the startling reality that healthcare accounts for 37% of all breach events in the last decade. Kelly's journey from soldering Timex Sinclair computers in the late 70s to founding a p…
…
continue reading

1
Episode 470 - The Risks and Rewards of Agentic AI
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41As we enter the era of agentic AI, we must also address its risks. At Zenith Live 2025, we speak with Ed Henry, Zscaler, Senior Data Scientist and discuss agentic AI, its potential to streamline operations, and what are some of the key security challenges. #ZL2025 #zerotrustsecurity #mysecuritytv #zscaler…
…
continue reading

1
Cyber Physical Threats and Securing Society: A Conversation with Sam Mackenzie
35:02
35:02
Play later
Play later
Lists
Like
Liked
35:02In this episode of the Cyber Minds podcast, we sit down with Sam Mackenzie —cybersecurity expert and critical infrastructure leader—to explore the real-world impacts of cyber attacks on physical systems. Sam shares compelling stories from autonomous vehicles to raw sewage hacks, giving listeners a rare glimpse into the intersection of digital threa…
…
continue reading

1
From Combat Boots to Cybersecurity - Nia Luckey on her journey
53:08
53:08
Play later
Play later
Lists
Like
Liked
53:08In this episode of the Cybersecurity America Podcast, sponsored by DarkStack7, host Joshua Nicholson sits down with Nia Luckey — Army veteran, published author, and cybersecurity leader — to talk about her powerful journey from military service to the frontlines of cyber defense. Nia shares lessons on resilience, leadership, and transitioning from …
…
continue reading

1
Cyber Defense Radio - Vince Crisler - Celerium - Hotseat Podcast - 2025
15:14
15:14
Play later
Play later
Lists
Like
Liked
15:14Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this insightful episode features Vince Crisler, a proven cybersecurity leader helping organizations modernize how they prepare for, defend against, and respond to threats. Celerium delivers advanced capabilities for real-time threat intelligence sharing, incident response support, and o…
…
continue reading

1
From stealing servers to saving lives: Working in red teaming | Jim Broome
56:50
56:50
Play later
Play later
Lists
Like
Liked
56:50Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Jim Broome of Direct Defense has been doing red teaming since before it became a term — back when a "pentest" meant $25,000, no questions asked and walking out with a server u…
…
continue reading

1
Agentic AI in the SOC: Risk, Reliability, and the Future of Security Operations
36:32
36:32
Play later
Play later
Lists
Like
Liked
36:32Agentic AI is moving from hype to reality, reshaping how enterprises operate, and how cyber defenders must adapt. In this CyberTalks episode, Mark Gillett (Chief Product Officer, eSentire) is joined by Ben Wilde (Head of Innovation, Georgian) to break down the risks, reliability challenges, and opportunities presented by autonomous AI agents. In th…
…
continue reading

1
Raffles & Revolutions: Black Hat’s Human Side
25:41
25:41
Play later
Play later
Lists
Like
Liked
25:41At the world’s largest cybersecurity conference, the real story isn’t just the tech — it’s the people. In this episode, Humanizing Cyber takes you on a guided tour from the casino floor to the Business Hall at Black Hat USA, where more than 21,700 attendees and 400 vendors converge. We begin in Startup City, where founders in 8×10 booths pitch big …
…
continue reading
Show notes ISACA Conference https://eainfosec.org/ Follow Eric https://www.linkedin.com/in/eric-ssekiziyivu-6593a136 Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberweekly Like and Follow our X page https://twitter.com/thecyberweekly Follow Deogratius Okello https://www.linkedin.com/in/deo-okello/ https://twitter.com/deoo…
…
continue reading
In this episode, Ciaran and James are joined by SANS Chief of Research and Head of Faculty, Rob Lee, to tackle the one big issue on everyone’s mind, AI. Rob shares his expert insight on the rapid rise of AI, from mainstream adoption to cognitive impact, and examines the threats, opportunities, and where human judgment still matters. Contact: Have q…
…
continue reading