A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Cyber Assurance Podcasts
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
…
continue reading
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Welcome, interstellar travelers, to the Hitchhiker’s Guide to the GRC Technology Galaxy, your improbable companion through the expanding universe of governance, risk, and compliance. In a cosmos where regulations multiply faster than Tribbles, cyber incidents drop like falling whales, and third parties sprout surprises with Vogon-level timing, this podcast is your towel, your Babel Fish, and your improbability drive rolled into one. Each episode, Michael Rasmussen and guests explore the cons ...
…
continue reading
The EY Academy Podcast is designed for third level students. It is a platform to provide further insight from a business perspective on what you are learning in the classroom. Professors and Lectures from colleges around the country submit questions and experts within our business answer them. Its casual, in a relaxed format and hopefully really informative. Coming soon – The EY Career Hub where we advise students on everything from what a graduate programme is to how to perform great at int ...
…
continue reading
1
The Governance Guide Reimagined: Cura in the GRC Galaxy
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with Cura Software Solutions to explore how a platform that began as a focused risk tool has evolved into a global, end-to-end GRC ecosystem. From enterprise risk to operational resilience, audit, compliance, legal, analytics, and more, Cura now span…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, ph…
…
continue reading
1
Private Network Access (PNA) (noun) [Word Notes]
5:36
5:36
Play later
Play later
Lists
Like
Liked
5:36Please enjoy this encore of Word Notes. A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link. Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.By N2K Networks
…
continue reading
1
The Culture at the Center of the Galaxy: Decision Focus in the GRC Galaxy
23:28
23:28
Play later
Play later
Lists
Like
Liked
23:28In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with the team at Decision Focus to explore why the future of GRC isn’t about more features, it’s about better decisions. They discuss how culture, values, and the people building and using the technology shape outcomes far more than checklists or tem…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing s…
…
continue reading
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, …
…
continue reading
Please enjoy this encore of Word Notes. The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. CyberWire Glossary link: …
…
continue reading
1
The Assurance Singularity: AuditBoard in the GRC Galaxy
21:05
21:05
Play later
Play later
Lists
Like
Liked
21:05In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with Jason Sechrist of AuditBoard to explore how the company has transformed from an audit tool into one of the most intelligent platforms in the GRC cosmos. They discuss what makes AuditBoard distinctly improbable—a platform that’s as beautiful as i…
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, …
…
continue reading
101
Identity access management (IAM) (noun) [Word Notes]
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management Audio reference link: “The Wrath of Khan (1982) ‘Kirk’s Response,’” by Russell, YouTube, 16 May 2017.…
…
continue reading
1
Seeing Through the Risk Matrix: Riskonnect in the GRC Galaxy
33:47
33:47
Play later
Play later
Lists
Like
Liked
33:47In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen connects with the Riskonnect CEO, Jim Wetekamp, to explore how the company is helping organizations see through the code of risk, from insurable exposures and geopolitical volatility to AI-driven analysis and quantified decision-making. The discussion dives in…
…
continue reading
This week, while Dave Bittner is on vacation, hosts Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing …
…
continue reading
20 years after their paths first crossed, three Canadian security professionals regroup to discuss a new risk management strategy book based on hard won field experience. Patrick Hayes was a security strategist before organizations knew this was success differentiator. For decades he has been guiding organizations large and small, public, private a…
…
continue reading
1
NCSC Annual Review 2025: Crisis in the Boardroom, AI driven threats and Supply Chain Resilience Roadmap
33:14
33:14
Play later
Play later
Lists
Like
Liked
33:14Trish and Tom take a deep dive into the NCSC Annual Review for 2025 and unpack practical tips for business leaders. We're tearing open the most critical report of the year: the NCSC Annual Review 2025. The message from GCHQ is crystal clear: Cyber risk is no longer just an IT issue—it’s a boardroom priority. Forget those old assumptions—the threats…
…
continue reading
Please enjoy this encore of Word Notes. The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. CyberWire Glossary…
…
continue reading
1
The Event-Based Guide to the Galaxy: SureCloud in the GRC Galaxy
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with Alex Hollis of SureCloud to discuss how the company is rewriting the rules of digital risk and resilience. SureCloud’s event-sourced architecture captures everything that ever happens in the system (every change, every control, every decision) a…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal ex…
…
continue reading
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer Audio reference link: “What Is Abstraction in Computer Science,” by Codexpanse, YouTube, 29 October 2018.…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
1
The Improbability of Compliance Made Simple: Comply in the GRC Galaxy
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with Comply to explore what sets the firm apart in the sprawling universe of financial services compliance. Serving clients across the US, UK, and more than 60 countries, Comply supports firms of every size, from global institutions to boutique shops…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
…
continue reading
By N2K Networks
…
continue reading
By N2K Networks
…
continue reading
1
From Sysadmin to Ethical Hacker: Phillip Wylie shares Skills, Labs, and Real-World Strategies
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25Send us a text Want a real-world map into penetration testing instead of a maze of hot takes? We sit down with Philip Wiley—offensive security veteran, teacher, and author of The Pentester Blueprint—to unpack practical paths that work today. Philip traces his journey from sysadmin to consultant and shows how prior roles become leverage in security:…
…
continue reading
1
Evolving Through the Galaxy: Archer in the GRC Galaxy
23:29
23:29
Play later
Play later
Lists
Like
Liked
23:29In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with Steve Scharlman of Archer to chart the platform’s evolution from its early days to its role today as a cornerstone of enterprise risk and compliance. Once a household name for CISOs, Archer has become just as essential for chief risk officers, e…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are …
…
continue reading
Please enjoy this encore of Word Notes. A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence. CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, I…
…
continue reading
1
So Long, and Thanks for All the Risk: Renee Murphy in the GRC Galaxy
38:22
38:22
Play later
Play later
Lists
Like
Liked
38:22In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with Renee Murphy, analyst, advisor, and master storyteller, to look back at the origins of the term “GRC” and trace how the technology space has evolved since its early days. Together they reflect on their parallel paths as analysts shaping the fiel…
…
continue reading
This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and …
…
continue reading
Please enjoy this encore of Word Notes. A subset of security orchestration, the management of identities across an organization's set of digital islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestrationBy N2K Networks
…
continue reading
1
The Interconnectedness of All Things: Workiva in the GRC Galaxy
31:05
31:05
Play later
Play later
Lists
Like
Liked
31:05In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with Workiva to explore what happens when GRC, ESG, and finance finally converge on a single platform. The conversation digs into what Workiva brings to the GRC landscape, where it’s best of breed, and why the interconnectedness of governance, risk, …
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and…
…
continue reading
1
Small Businesses Are Prime Targets, But There Are Ways to Fight Back
27:09
27:09
Play later
Play later
Lists
Like
Liked
27:09Send us a text "We're too small to be hacked" might be the most dangerous myth in small business cybersecurity today. As James Baierle, founder of SecurePoint Solutions, asks with a touch of irony – how exactly do you let the bad guys know to leave you alone? The hard truth is you can't, and that's why specialized security services for small busine…
…
continue reading
Please enjoy this encore of Word Notes. A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: http…
…
continue reading
1
Regulation at the Speed of AI: Corlytics in the GRC Galaxy
18:11
18:11
Play later
Play later
Lists
Like
Liked
18:11In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen navigates with Corlytics through the ever-expanding cosmos of regulatory change. With 30 million pages of regulatory text published each year, Corlytics combines the precision of AI with the insight of top-tier subject matter experts and data scientists to mak…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal …
…
continue reading
Part 2 of this summer break episode takes a bit of a light hearted look at the cyber security industry predictions that become the norm in late December and early January. Eight or nine months later, how accurate where they? Take a listen, there are a couple surprises. The conversation uncovers a few ongoing challenges with the cyber security indus…
…
continue reading
Please enjoy this encore of Word Notes. A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 202…
…
continue reading
1
Life, the Universe, and Objectives: Corporater in the GRC Galaxy
22:24
22:24
Play later
Play later
Lists
Like
Liked
22:24In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen explores with Corporater why risk cannot exist in isolation from objectives and performance, despite how many organizations and technology providers treat it. Drawing on ISO 31000’s definition of risk as “the effect of uncertainty on objectives,” the conversat…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
…
continue reading
Please enjoy this encore of Word Notes. The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: https://thecyberwire.com/glossary/devops Audio reference link: "10+ Deploys Per Day: Dev and Ops Cooperation at Flickr," by John Allspaw and …
…
continue reading
1
Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join Selena Larson, Proofpoint intelligence analyst and host of their po…
…
continue reading
1
Don’t Panic, It’s Configurable: CoreStream in the GRC Galaxy
16:53
16:53
Play later
Play later
Lists
Like
Liked
16:53Strap in, interstellar travelers, our first stop in the GRC Technology Galaxy is with CoreStream, a platform that proves configurability doesn’t have to feel like Vogon poetry. Michael Rasmussen chats with the CoreStream crew about how they’ve built a system that adapts to you, delivering value faster than a hyperspace jump. From rapid implementati…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are ma…
…
continue reading
The summer show started with the light hearted goal of evaluating the top security predictions that fill the internet in late December each year. Forever unscripted, Tim and Doug wind up reflecting on the growing gap between physical and virtual information systems. While it is easy to lament, from a cognitive perspective there is little hope, the …
…
continue reading
1
Standing Out in the Security Crowd: Jerry Bell's Path to Success
25:29
25:29
Play later
Play later
Lists
Like
Liked
25:29Send us a text What does it take to build an online community of 50,000 cybersecurity professionals? Jerry Bell, founder of InfoSec Exchange and former CISO for IBM Cloud, reveals the journey behind creating one of the most influential Mastodon servers in the security world. When Twitter underwent significant changes in 2022, Bell's Fediverse serve…
…
continue reading
1
Waterfall Software Development Method (noun) [Word Notes]
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25Please enjoy this encore of Word Notes. A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-software-development Audio reference link: “Creating Video Games - Agile Software Development,” by Sara Verr…
…
continue reading
1
Scammers hit the right notes in the wrong way.
49:06
49:06
Play later
Play later
Lists
Like
Liked
49:06This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We s…
…
continue reading
1
Agile Software Development Method (noun) [Word Notes]
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45Please enjoy this encore of Word Notes. A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning CyberWire Glossary link: https://thecyberwire.com/glossary/agile-software-development Audio reference link: "Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe," …
…
continue reading