Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Analyst Podcasts

show episodes
 
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
  continue reading
 
Artwork

1
NeedleStack

Authentic8

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
  continue reading
 
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Artwork

1
CyberSpeak's Podcast

Bret Padres and Ovie Carroll

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted by two former federal agents who investigated computer crime, this is a technology Podcast covering Computer Security, Computer Crime and Computer Forensics Topics.
  continue reading
 
Machine learning and artificial intelligence are dramatically changing the way businesses operate and people live. The TWIML AI Podcast brings the top minds and ideas from the world of ML and AI to a broad and influential community of ML/AI researchers, data scientists, engineers and tech-savvy business and IT leaders. Hosted by Sam Charrington, a sought after industry analyst, speaker, commentator and thought leader. Technologies covered include machine learning, artificial intelligence, de ...
  continue reading
 
Artwork
 
The CYSA PrepCast is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
  continue reading
 
Artwork

1
The Cyber Hub

Techie Pedias

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Dipanshu Parashar is a Blogger || influencer || Author || digital marketer. He brings out the best tech stories and shares the difficult moments which made his journey a huge success. He is currently India's youngest Cybersecurity author and security analyst.
  continue reading
 
Welcome to Sibylline Insight, the podcast where we delve into the intricate world of global intelligence and geopolitics. Join our hosts as they sit down with members of the Global Intelligence Team to provide in-depth analysis and context to the most pressing geopolitical developments of our time. Each episode features long-form interviews that unravel the complexities behind current events, offering listeners a unique perspective on international affairs. Whether you’re a seasoned analyst ...
  continue reading
 
Artwork

1
The Synopsis

Speedwell Research, LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Speedwell Research spends hundreds of hours researching public businesses each month and in "The Synopsis" they share their key learnings. Most business podcasts are superficial and assume their listeners are unsophisticated. In contrast, The Synopsis trusts listeners are interested in learning about complex, industry-specific issues, so long as they are explained clearly. We cover businesses from inception to current day, coupling business analysis and an investors lens. Start listening tod ...
  continue reading
 
Artwork

1
Dear Infosec

ISF Analyst Insight Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
  continue reading
 
Artwork
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
  continue reading
 
Artwork

1
The Gay Johnny Bravo

The Gay Johnny Bravo

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
“When men have realized that time has upset many fighting faiths, they may come to believe even more than they believe the very foundations of their own conduct that the ultimate good desired is better reached by free trade in ideas — that the best test of truth is the power of the thought to get itself accepted in the competition of the market” - Supreme Court Justice Oliver Wendell Holmes Jr., Abrams v. United States (1919) Some of the most important issues that face society today are diff ...
  continue reading
 
Artwork

1
AnalystANGLE

SiliconANGLE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Offical Podcast feed for SiliconANGLE Media's podcast where our hosts and guests reflect upon the many events the CUBE provides coverage for. @theCUBE@dvellante@stu@furrier
  continue reading
 
Artwork

1
BCG on Compliance

Boston Consulting Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
What are today’s most pressing criminal trends and how are compliance experts adapting to counter those threats? As financial crimes become increasingly sophisticated, compliance can no longer be just a checkbox. It’s emerged as a transformative force in every industry, reshaping practices in ethics, risk management, money laundering and cyber security. Introducing BCG on Compliance, a biweekly podcast from Boston Consulting Group where we dive deep into the minds driving that change. Hosted ...
  continue reading
 
Artwork

1
H4unt3d Hacker

H4unt3d Hacker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
The H4unt3d Hacker podcast is an idea that came to be from a conversation over a glass of bourbon. We bring you REAL talk about cybersecurity. Want to know how hackers see the world and events? Then tune in and go on a trip with the H4unt3d Hackers in their hoppin H4unt3d house. Mike Jones "H4unt3d" Mike is a former hacktivist, red teamer, SIGINT operator and intelligence analyst. Mike left the world of illegal hacking to help businesses and individuals learn how and why they are attacked an ...
  continue reading
 
Artwork

4
The Jabbari Lincoln Files

Sign Curve Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A gripping financial technology spy thriller. Produced by a former CIA officer. *****YOU CAN NOW BINGE SEASON 1. SEASON 2 IS FORTHCOMING***** The story: Jabbari Lincoln is the CIA’s top financial analyst. He happens to be Muslim. And he’s at the top of his professional game when he is unfairly suspected of being disloyal to the United States and gets suspended by the Agency. Dejected and disgraced, he takes on a central bank consulting gig in Nigeria. But as he uncovers a sophisticated cyber ...
  continue reading
 
Artwork

1
The Digital Forensics Files Podcast

Tyler Hatch, B.A., LL.B.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
  continue reading
 
Artwork

1
The TechTual Talk

Henri Davis, The Radcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
  continue reading
 
Loading …
show series
 
In this Dialogue episode of The Synopsis, Drew has a "dialogue" of one as he reviews 2Q25 earnings from AppFolio. You can find free versions of these updates below. AppFolio 2Q25 Business Update *Expert Call Transcripts* If you want to get a free trial to access >200k AlphaSense expert call transcripts, use this link here. ~*~ For full access to al…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Curious about the skills needed for modern cyber attacks? Join host Kim along with intelligence analysts John & Hayden as they discuss: Apple Patches Exploited Zero-Day (1:40) Hackers Abuse Linux Files to Drop Malware (3:50) Silk Typhoon Attacks Cloud Supply Chains (7:21) ReliaQuest Uncovers Cybercr…
  continue reading
 
By the autumn of 1989, the hunt for Pablo Escobar and the Medellín cartel was intensifying. With the US military and intelligence agencies now directly involved, a new, more aggressive phase of the War on Drugs had begun. Join Gordon and David as they explore how Escobar, facing a relentless manhunt, leverages his position to strike an extraordinar…
  continue reading
 
Today, we're joined by Prince Canuma, an ML engineer and open-source developer focused on optimizing AI inference on Apple Silicon devices. Prince shares his journey to becoming one of the most prolific contributors to Apple’s MLX ecosystem, having published over 1,000 models and libraries that make open, multimodal AI accessible and performant on …
  continue reading
 
Got a question or comment? Message us here! Fresh off the chaos of DEF CON 33, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickman’s clutch CTF victory and Will’s bold dive into the Social Engineering Community’s Vishing Competition. No sleep, all signal. Suppor…
  continue reading
 
Send us a text In this episode, we delve into the transformative journey of artificial intelligence and its profound impact on job markets worldwide. From automation to innovation, AI is reshaping industries, creating new opportunities, and challenging traditional employment paradigms. Join us as we explore how AI is redefining work, the skills nee…
  continue reading
 
By the late 1980s, Pablo Escobar’s grip on the cocaine trade was unmatched. But a new threat loomed: extradition to the United States. To Escobar, it was a fate worse than death. His answer was brutal - declare open war on the Colombian state. In this episode, Gordon and David trace the rise of the so-called “Extraditables,” a loose alliance of car…
  continue reading
 
In this new episode format we give a very short briefing on financial news of the week. This draws on our new weekly newsletter called "The Investor's Briefing". If you wish to read it, you can find it here. ~*~ For full access to all of our updates and in-depth research reports become a Speedwell Member here. Please reach out to info@speedwellrese…
  continue reading
 
book one on one time with me here: https://calendly.com/techtuaulconsulting ------------------------------------------------------------------------------------ In this episode of The TechTual Talk, @symonebeez shares her real journey into tech, dispels common misconceptions about breaking into the industry, talks about the value of hard work and r…
  continue reading
 
This week, we chat with Federico Castro, a cybersecurity professional and member of the ISC2 Central Florida chapter, known by his nickname 'FedEx'. We discuss FedX’s transition from physical security and construction into cybersecurity, fueled by his diagnosis of ADHD and his pursuit of education. Federico highlights the importance of networking, …
  continue reading
 
This informative interview is with Ramneek Kundra, the Chief Investment Officer of DSP Pension Funds. In it we talk about investment philopsophy, portfolio construction and investing in the Indian stock market. You can learn more about DSP Pension Funds here. *~*~*~*~* Get access to all of Speedwell Research's in-depth Research Reports here. If you…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Intrigued by Warlock ransomware's Chinese connection? Join host Kim along with intelligence analysts Joey & John as they discuss: \Warlock Ransomware Attacks Against Telecoms (3:12) New FortiSIEM Flaw Exploited in the Wild (5:19) Man-in-the-Prompt Attack Steals Data from LLMs (8:04) How ReliaQuest T…
  continue reading
 
Got a question or comment? Message us here! In this episode, we break down the emerging Crypto24 ransomware attacks that use living-off-the-land techniques to bypass EDR. We’ll explore how these attacks unfold and the defensive strategies SOCs and organizations can use, like layered security, enhanced monitoring, and rapid response, to stay ahead o…
  continue reading
 
In compliance, moments of uncertainty can define careers and reshape organizations. But what does it take to make sound judgments under intense pressure? How do you steer a team through a crisis without overpromising or losing trust? To explore these questions, our guest host and BCG senior executive Bernhard Gehra, is joined by senior compliance p…
  continue reading
 
In the early 1980s, Pablo Escobar reinvented himself. He was no longer just the man who could smuggle tonnes of cocaine into Miami - he was the successful businessman, the philanthropist, the proud family man. To the poor, he built homes and football fields. To the powerful, he offered campaign donations and political loyalty. Listen as Gordon and …
  continue reading
 
Today, we're joined by Jack Parker-Holder and Shlomi Fruchter, researchers at Google DeepMind, to discuss the recent release of Genie 3, a model capable of generating “playable” virtual worlds. We dig into the evolution of the Genie project and review the current model’s scaled-up capabilities, including creating real-time, interactive, and high-re…
  continue reading
 
What does it take to build an effective Cyber Threat Intelligence function from scratch? In this eye-opening conversation, Bianca Miclea shatters the myth that cybersecurity is only for those with traditional technical backgrounds. Bianca shares her remarkable journey from politics student to cybersecurity leader, revealing how her academic backgro…
  continue reading
 
Send us a text Carlos Corrador shares his journey from aspiring lawyer to founding Condor Agency, a specialized marketing firm for B2B tech services companies. We explore how deep specialization, personal branding, and adapting to AI are critical for survival in today's rapidly changing business landscape. • Started as a sports journalist in Venezu…
  continue reading
 
Colombia in the mid-20th century was a place of beauty and bloodshed - where jungle mountains sheltered rebels, the cities were ruled by oligarchs, and outlaw legends became folk heroes. Into this world stepped Pablo Escobar. Charming, calm, and calculating, he would become one of the richest men in history - and one of the deadliest. In this first…
  continue reading
 
In this new episode format we give a very short briefing on financial news of the week. This draws on our new weekly newsletter called "The Investor's Briefing". If you wish to read it, you can find it here. ~*~ For full access to all of our updates and in-depth research reports become a Speedwell Member here. Please reach out to info@speedwellrese…
  continue reading
 
Learn how you can work with me one on one to secure a $90K+ cybersecurity role: https://techtualconsulting.tech/video-training ------------------------------------------------------------------------------------ In this episode of The TechTual Talk, HD interviews Tavis Mitchell, a former coaching client who tripled his salary by leveraging help des…
  continue reading
 
In this wonderful episode with Emmy award winning Kathy Chambers, we explore her fascinating journey as a project manager at Antisyphon Training with Black Hills Information Security. Kathy's unique path from broadcast journalism to cybersecurity offers valuable insights for anyone considering a career transition or looking to leverage their existi…
  continue reading
 
Got a question or comment? Message us here! This week, we’re unpacking the phishing wave hitting SaaS platforms ... from social engineering to OAuth abuse and AI voice spoofing. Learn why people remain the #1 attack vector and how to stay one step ahead. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcas…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Want to know if ShinyHunters and Scattered Spider are really working together? Join host Kim along with detection engineer Marken as they discuss: WinRAR Zero-Day Exploited in RomCom Attacks (1:44) New EDR Killer Popular with Ransomware Groups (4:30) Data Breach Reveal Kimsuky Inner Workings (11:31)…
  continue reading
 
In this episode of Behind the Binary, we sit down with Dr. Jared DeMott to pull back the curtain on the world of cybersecurity. Formerly with the Microsoft Security Response Center (MSRC), Jared shares invaluable wisdom on managing bug bounty programs at scale and what truly makes a good bug report. We then pivot to explore his fascinating career j…
  continue reading
 
In this special episode of the Insight Podcast, Lead Analyst Kailyn Johnson and Associate Analyst Denise Schipani return to discuss the evolving role of AI in cyber operations. Denise highlights the increasing adoption of AI by both cyber criminals and state-sponsored groups to enhance social engineering attacks. They also cover the potential risks…
  continue reading
 
Who was the Nazi General who called the Allied Gunnerside mission “the most splendid coup I have seen?” How did the Norwegians stop the Nazis' nuclear program for good? And how did one commando use a large amount of laxatives to save his mother's life? Operation Gunnerside was a dangerous mission to destroy a Nazi heavy water plant in Norway. Led b…
  continue reading
 
In this episode, we're joined by Lin Qiao, CEO and co-founder of Fireworks AI. Drawing on key lessons from her time building PyTorch, Lin shares her perspective on the modern generative AI development lifecycle. She explains why aligning training and inference systems is essential for creating a seamless, fast-moving production pipeline, preventing…
  continue reading
 
Send us a text Sergey Novikov shares his fascinating journey from early days at Kaspersky Lab through his evolution as a malware analyst and cybersecurity expert, offering unique insights into the changing threat landscape and ethical considerations of security research. • Started at Kaspersky in 2002 when it was a small startup with fewer than 100…
  continue reading
 
What was the most dangerous mission of World War II? How did a small team of Norwegian skiers stop the Nazis from building a nuclear bomb? And, what exactly is heavy water, and why was it so important to the Nazis? Operation Gunnerside was a high-stakes, real-life mission to sabotage a Nazi nuclear program in Norway. Led by the young and fearless J…
  continue reading
 
In this new episode format we give a very short briefing on financial news of the week. This draws on our new weekly newsletter called "The Investor's Briefing". If you wish to read it, you can find it here. ~*~ For full access to all of our updates and in-depth research reports become a Speedwell Member here. Please reach out to info@speedwellrese…
  continue reading
 
Join us for an exciting episode with Joseph Cadden, aka Casually Joseph, a passionate cybersecurity expert and Palo Alto MDR security analyst. Joseph shares his fascinating journey from building gaming computers in high school to pursuing a master's degree and working in managed detection and response. We explore the importance of certifications, e…
  continue reading
 
In this Dialogue episode of The Synopsis, Drew has a "dialogue" of one as he reviews 2Q25 earnings from Floor & Decor and Meta. You can find free versions of these updates below. Meta 2Q25 Business Update Floor & Decor 2Q25 Business Update **If you want to get a free trial to access >200k AlphaSense expert call transcripts, use this link here. ~*~ …
  continue reading
 
Akira ransomware group is exploiting potential zero-day vulnerabilities, and digital risk protection (DRP) threats are rapidly evolving. Join host Joey, along with intelligence analysts John and Hayden, as they dive into: Akira Ransomware Exploiting a Potential Zero Day Plague Backdoor Emerges as Silent Intruder Evolving Tactics of North Korean Att…
  continue reading
 
Got a question or comment? Message us here! On this episode of the #SOCBrief, we break down attacks on SonicWall firewalls. A wave of ransomware, possibly exploiting zero-day vulnerabilities, is compromising even fully patched systems. Learn how SOCs can respond fast and stay ahead. Support the show Watch full episodes at youtube.com/@aliascybersec…
  continue reading
 
How did the Stuxnet cyberweapon, designed to be covert, break out into the wild? What were the world-changing implications of this sophisticated attack on Iran's nuclear centrifuges, and what happened when it was exposed? Listen as David McCloskey and Gordon Corera reach the finale of their series on the Stuxnet cyberweapon, discussing its discover…
  continue reading
 
In this episode of Sibylline's "Power Players" series, Intelligence Analyst Claire Brady explores the shadowy and influential Wagner Group. Founded in 2014 by Dmitry Utkin, a former Russian military intelligence officer, the Wagner Group has evolved from a small band of elite military personnel into a formidable force with a global reach. Known for…
  continue reading
 
Book a call here: https://calendly.com/techtuaulconsulting ------------------------------------------------------------------------------------ In this episode of The TechTual Talk HD and Cybershortieee cover the Tea app new hack, where private messages were leaked. They also discuss paloalto $25 billion acquisition of CyberArk, St. Paul suffered a…
  continue reading
 
The Story of 200 Forgotten Murder Victims By Robert Riggs They were daughters. Mothers. Sisters. Strangers. Their lives ended violently—and their names were lost to time. For more than half a century, Detroit’s forgotten dead lay buried beneath weeds and silence—unidentified murder victims dumped into paupers’ graves, sometimes stacked in vaults th…
  continue reading
 
What does cybersecurity look like when you're protecting the world's largest streaming service and content studio? Jason Chan, who built and led Netflix's security team for over a decade, takes us behind the scenes of securing one of the most transformative companies in modern history. From Netflix's humble beginnings as a DVD-by-mail service to it…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play