Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Cyber Awareness Podcasts
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
…
continue reading
Step into the world of digital forensics, mobile forensics, OSINT, and cybersecurity with The Cyber Sleuth Show! Hosted by Kevin DeLong, this podcast dives deep into the ever-evolving landscape of digital investigations, featuring expert guests, cutting-edge tools, real-world case insights, and, of course, the occasional terrible dad joke. From law enforcement investigators and forensic analysts to OSINT specialists and cybersecurity pros, we uncover the latest trends, techniques, and challe ...
…
continue reading
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
ICAEW is a professional membership organisation that provides insight and leadership to the global accountancy and finance profession.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
The TribalHub podcast shares stories of tribal leaders who are driving their organizations, businesses that are collaborating with tribes, and leaders in the industry who are savvy about technology. Subscribe on your favorite podcast platform! TribalHub...Connections, Membership, Opportunity.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Where cybersecurity leaders spill their guarded secrets. Hosted by AlterAim, The Breach Room dives deep with CEOs, founders, and power players in the cybersecurity world. From breakthrough wins to high-stakes roadblocks, each episode unpacks real stories, industry insights, and battle-tested strategies driving the future of cyber defense. If you’re scaling a cybersecurity company, or just want to hear how the best do it. This is your inside access.
…
continue reading
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
Produced by AI and based on articles published in ICAEW's Insights section.
…
continue reading
Industry experts break down the latest news & trends in employee benefits, healthcare reform, regulations and compliance, designed to empower executive decisions.
…
continue reading
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
…
continue reading
U.S. Army Garrison Bavaria's Better in Bavaria podcast, where we share stories and highlight the people behind them - the Soldiers and Army civilians who support our readiness mission all while making our community a great place to work, live and raise a family. - Hosted by Linda A. Read and Andreas Kreuzer - Produced by Kayla Overton, Natalie Simmel, and Ella Händel
…
continue reading
“WHERE ARE THE WOMEN IN CYBER?” The Landscape In 2022 the cyber security field still consists of 24% women and only 2.2% LGBTQ+ minorities. Long-perpetuated gender, age, and demographic biases held by the ‘Baby Boomer’ and Gen-X groups have led to a severe gap in the representation and advancement of women and minorities in this field. Millennials entered the workforce and attempted to forge a new way by asking for small changes; but definitely conceding others. Currently the Boomers/Gen-X a ...
…
continue reading
🎙️ Dive into the world of cybersecurity with Cubic Lighthouse Podcast - your expert companion in navigating the latest developments and crucial topics in the field. We dissect complexities, provide strategic insights, and ensure you stay abreast of cutting-edge trends. Whether you're a seasoned professional or a cybersecurity enthusiast, join us for concise expertise and actionable intelligence to enhance your security posture. 🌐🔐
…
continue reading
The Mitchell Institute for Aerospace Studies is proud to present The Aerospace Advantage, with Heather ”Lucky” Penney as the host. Every week, Lucky takes listeners into the world of aerospace power and help the audience understand what it takes to fly and fight in the sky, while also protecting America’s interests in space. Whether talking to top generals, standing on a flight line full of combat aircraft, looking at a rocket being prepared for launch, or hearing from those who have laid it ...
…
continue reading
Bite-sized information about cybersecurity for not-for-profit boards and leaders. In each episode we help leaders of not-for-profits to understand the information security risks to their organisations and they leave with at least one actionable insight that they can put into practice. It also features interviews with not-for-profit leaders sharing their cybersecurity journey, insights and lessons learned.
…
continue reading
Designed to challenge old-school business practices and the traditional business suit culture, on unsuitable on Rea Radio you'll hear industry professionals speak about meaningful, modern solutions to help you enhance your company’s growth. Hosted by Doug Houser.
…
continue reading
The BCI Podcast features conversations with business continuity & resilience professionals from around the world offering insight and guidance on current affairs topics affecting businesses around the globe, as well as tips and insight into career development within the industry.
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
…
continue reading
A podcast where I speak with people about their career path. Focusing on their decisions, success, advice, key traits, career moves, mentoring and listening to interesting stories. This podcast is an interesting perspective on how careers can take a linear path to success, but all often career paths take a zig-zag path. Fun Stuff to learn about. Enjoy!
…
continue reading
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Unhackable - a virtually impossible state of being only made plausible through consistent cybersecurity best practices by everyone simultaneously. This is Unhackable, the authoritative Security podcast about deception and personal security. Can you ever be truly Unhackable? No, nobody can. But every episode is designed to help you move forward using actionable cybersecurity best practices that are within reach of everyone. We help you take the steps needed to solve your most important Cybers ...
…
continue reading
Welcome to "The CvCISO Podcast" - an extension of SecurityStudio's vCISO training program. Designed to keep the conversation alive beyond the confines of traditional training, this podcast is your ongoing resource for all things related to Virtual Chief Information Security Officers (vCISOs). This podcast is a space where vCISOs can continue to explore, discuss, and evolve their understanding of the cybersecurity landscape. Join us as we delve into the experiences, perspectives, and challeng ...
…
continue reading
Closing The Gender Pay Gap is the podcast for thoughtful HR leaders in technology and cybersecurity companies who want to do more to develop and retain their female talent. Sharing tips, techniques and talent pipeline strategies to help technology companies do more to attract, develop and retain female talent to strengthen the female talent pipeline and close the gender pay gap. From promotions to pay cheques, latest figures reveal men are still out-earning women at work in the technology se ...
…
continue reading

1
Episode 187 Cyber Security Engineers, Advanced Degrees, & Security Awareness
1:53:03
1:53:03
Play later
Play later
Lists
Like
Liked
1:53:03Go to our sponsor https://aura.com/techtualchatter to get a 14- day FREE trial and see if your personal information has been leaked online ------------------------------------------------------------------------------------ In this episode of The TechTual Talk, Dr. Jeree Spicer returns to share her journey from cybersecurity risk roles to earning h…
…
continue reading

1
Grok Chatbot Leaks 370,000 Private Conversations
44:56
44:56
Play later
Play later
Lists
Like
Liked
44:56This week on The Awareness Angle, Anthony Davis and Luke Pettigrew come together for a special in-person episode while filming new Cybersecurity Awareness Month videos. From exposed AI chats to insider sabotage, telecom breaches, and Denmark’s bold new deepfake law, the conversation digs into how human behaviour, weak controls, and patchy regulatio…
…
continue reading
What happens after an employee clicks on a phishing link? Jason Hoenich (hey-nick), the self-proclaimed "Security Awareness Apologist," believes that's where the real education begins. Drawing from his experiences at major entertainment companies like Disney and Sony, Jason shares how live hacking demonstrations where employees witness real-time co…
…
continue reading

1
Breaking Into Cybersecurity: Craig Taylor's Journey and Insights on AI and Cyber Awareness
35:08
35:08
Play later
Play later
Lists
Like
Liked
35:08In this episode of Breaking into Cybersecurity, Craig Taylor, CEO of Cyber Hoo, shares his journey into the cybersecurity field. With a background in psychology, Taylor discusses his early career, the establishment of his company, and the challenges he faced along the way. He emphasizes the importance of positive reinforcement in cybersecurity trai…
…
continue reading

1
S35 Ep9: SUMMER LISTENING Margaret Heffernan - Cyber, CISO and the Board: Turning awareness into action
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36Explore how CISOs can educate the board, build resilience, and invest effectively in security, with Steve Dubin, ISF CEO, and Margaret Heffernan, a Professor of Practice at the University of Bath School of Management. Mentioned in this episode: ISF Analyst Insight Podcast Read the transcript of this episode Subscribe to the ISF Podcast wherever you…
…
continue reading

1
AI Risks EXPOSED--How Hackers Use AI Today
1:05:02
1:05:02
Play later
Play later
Lists
Like
Liked
1:05:02Don't let your small business fall victim to devastating cyber attacks! Expert joins us t discuss AI Risks exposed. We explore how hackers use AI to target small businesses. From AI Social engineering to data theft, learn what you need to know to protect your business from cyber threats. Send us a text Growth without Interruption. Get peace of mind…
…
continue reading

1
AI and Your Privacy. Digital Citizenship Today.
1:02:31
1:02:31
Play later
Play later
Lists
Like
Liked
1:02:31This is the story of AI and Your Privacy. Digital Citizenship Today. Antoinette King, Author of the book Digital Citizens Guide to Cybersecurity. She is the founder of Credo Cyber Consulting, LLC, who has over 20 years of experience in the security industry, from physical security to digital security. Grab her book: https://www.amazon.com/Digital-C…
…
continue reading

1
Reshare- Heard at TribalNet: Promoting Cybersecurity Awareness
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04Don't miss your second chance at this one! In this episode of the TribalHub podcast, Michelle Bouschor sits down with Patrick Tinklenberg, Vice President of IT, Sycuan Casino, Toni Pepper, CEO, Pepper Consulting LLC and Robin Villareal, CIO, Gila River Resorts & Casinos, to discuss how they promote cybersecurity awareness at their properties. From …
…
continue reading

1
From CEO to Cyber Advocate: Lessons from Isaac Koenig
36:48
36:48
Play later
Play later
Lists
Like
Liked
36:48Summary: In this episode of The Breach Room, host Lu speaks with Isaac, CEO of Care Technology Group, about the evolving landscape of cybersecurity, the importance of proactive measures for small businesses, and the role of AI in enhancing security measures. Isaac shares his journey into entrepreneurship, the responsibilities of a CEO, and the chal…
…
continue reading
Whether it’s performance or policy, there’s rarely an episode of The Tax Track that doesn’t mention HMRC. In this special episode we talk to one of the senior leaders at HMRC, Jonathan Athow, Director General for Customer Strategy and Tax Design.The government’s stated priorities for HMRC are to modernise and reform the tax system, improve customer…
…
continue reading

1
From SEAL Teams to Corporate Security: Lessons from the Frontlines of Risk Management
35:48
35:48
Play later
Play later
Lists
Like
Liked
35:48In this episode of Ontic's Connected Intelligence Podcast, Jake Williams and Robin Miller share how their Navy backgrounds shaped the founding of Fortified Risk Group and their unique approach to integrating digital and physical security. They discuss the evolution of corporate security, from intelligence-driven threat assessments to proactive risk…
…
continue reading
We’re asking the hard question: is technology the problem… to technology? If cybercrime only exists because the internet does, maybe the real solution is to unplug it all, toss the Wi-Fi router into the river, and go back to quills, scrolls, and smoke signals. In this episode, Darnley takes a tongue-in-cheek look at the rise of tech in cybersecurit…
…
continue reading

1
Automating the Blue Team | Kevin Mata (Swimlane) on SOAR & AI in Cybersecurity
32:43
32:43
Play later
Play later
Lists
Like
Liked
32:43Automation is changing the way defenders work. In this episode of Simply Defensive, we sit down with Kevin Mata, Director of Cloud Operations at Swimlane, to talk about his journey from flipping burgers at In-N-Out to flipping SOC alerts with automation, SOAR, and AI. Kevin shares how he got started in cybersecurity, how Swimlane helps Blue Teams s…
…
continue reading

1
S36 Ep3: Karena Man - Cultivating Trust: Engaging Boards on Cyber and AI
27:48
27:48
Play later
Play later
Lists
Like
Liked
27:48In today’s episode, Steve speaks with Karena Man, whose expertise is connecting organizations with experts in technology as a Senior Client Partner at Korn Ferry. Karena highlights the growing awareness of cyber by boards of directors — an awareness brought on by the increase in cyber intrusions. She also emphasizes the importance of storytelling a…
…
continue reading
CYFIRMA identified TinkyWinkey, a stealthy Windows keylogger, capable of capturing keystrokes, system info, and active windows. It leverages DLL injection and persistent services to evade detection and maintain long-term presence. Link to the Research Report: https://www.cyfirma.com/research/tinkywinkey-keylogger/ #CyberSecurity #ThreatIntelligence…
…
continue reading

1
Proactive Protection: Will Reed on Cybersecurity as a Business Imperative
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11Summary: In this episode of The Breach Room, host LuIs Guzman interviews Will Reed, CEO of Better Every Day Cyber, discussing his journey in cybersecurity, the importance of proactive measures for small and medium-sized businesses (SMBs), and the role of AI in enhancing cybersecurity practices. Will emphasizes the need for SMBs to recognize cyberse…
…
continue reading

1
The Sony Hollywood Hack | How Cybercrime Turned A Blockbuster Comedy Into A Global News Story
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41THE SONY HACK: HOLLYWOOD, NORTH KOREA & THE CYBER WAR THAT CHANGED EVERYTHING In 2014, Sony Pictures became ground zero for the first major nation-state cyberattack on a global corporation. The “Guardians of Peace,” linked to North Korea, crippled Sony’s networks, leaked unreleased films, and exposed troves of executive emails that forced high-leve…
…
continue reading

1
Ep. 319 - The Doctor Is In Series - Can You Trust Your Gut? - All About Intuition
27:05
27:05
Play later
Play later
Lists
Like
Liked
27:05Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we will discuss understandings and developments in the field of psychology. In today’s episode, Chris and Abbie delve into the fascinating world of intuition and gut feelings. They explore whether these instincts are rooted in biology or shaped by past experiences and discuss t…
…
continue reading

1
The People Behind the Protection: Insights from Stephen Deal
55:15
55:15
Play later
Play later
Lists
Like
Liked
55:15Summary In this episode, Stephen Deal, the Vice President of Sales and Service at CYDEF, discusses the importance of human-based threat hunting in cybersecurity, leveraging AI technology, and the challenges faced in the industry. He emphasizes the significance of building relationships with customers, utilizing social media for business growth, and…
…
continue reading

1
🔥Marketing Warfare: How A New Framework is IGNITING Small Business Growth
54:42
54:42
Play later
Play later
Lists
Like
Liked
54:42David Mauro and co-host Zach Moskow engage with Kevin McGrew, author of 'The New Rules of Marketing Warfare.' They discuss the intersection of marketing and leadership, emphasizing the importance of frameworks in business strategy. Kevin shares insights on the SMAC framework (Shoot, Move, Adapt, Communicate) and how it can help businesses navigate …
…
continue reading

1
CvCISO Podcast Episode 62: The AI Myth or Fact Game
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10The podcast features a lively discussion among hosts and guests. Cybersecurity news is a critical topic in today's digital landscape. AI raises ethical questions regarding likeness and consent. Recent breaches highlight the need for accountability in cybersecurity. Community engagement is essential for raising awareness about cybersecurity issues. …
…
continue reading

1
CvCISO Podcast Episode 61 : St. Paul Ransomware Cyber Attack
57:42
57:42
Play later
Play later
Lists
Like
Liked
57:42In this episode, the hosts discuss the recent cybersecurity attack on St. Paul, Minnesota, exploring the nature of the attack, the implications for city services, and the importance of effective communication and incident response planning. They emphasize the need for transparency and accountability in handling such incidents, as well as the role o…
…
continue reading

1
Want to Prevail Against China? It’s Time to Reinvest in Air Force Capacity, Capabilities, and Readiness — Ep. 252
1:10:02
1:10:02
Play later
Play later
Lists
Like
Liked
1:10:02Episode Summary: America’s ability to secure its interests, whether deterring conflict or fighting and wining, demands a robust Air Force. The current security environment will tolerate nothing less. The service has traditionally measured its prowess via capacity, capabilities, and readiness. The Air Force currently lags in each of these three area…
…
continue reading

1
Ransomware Negotiations EXPOSED: Inside Cyber Hostage Deals with Kurtis Minder
1:00:43
1:00:43
Play later
Play later
Lists
Like
Liked
1:00:43Kurtis Minder, seasoned ransomware negotiator, shares insights into the complex world of cybercrime negotiations. He discusses the psychological aspects of negotiating with cybercriminals, the role of AI in both offense and defense, and the importance of understanding the motivations behind cybercrime. The conversation also touches on the evolving …
…
continue reading

1
Crypto Fraud Exposed - How Cyber Crime Turns Violent
32:34
32:34
Play later
Play later
Lists
Like
Liked
32:34This is the true cyber crime story of Lamborghini Carjackers Lured by a $243M Cyber heist, a dive into crypto fraud cases and how cyber crime turns violent. This episode explores the dramatic rise and fall of Ray Diaz, a young man entangled in a world of cybercrime, luxury, and violence. It delves into the consequences of doxxing, the ruthless natu…
…
continue reading

1
CYFIRMA Research- APT36 Campaign Targets Indian Defense BOSS Linux system
3:41
3:41
Play later
Play later
Lists
Like
Liked
3:41CYFIRMA has uncovered an ongoing cyber-espionage campaign orchestrated by APT36, a Pakistan-linked threat actor, targeting Indian Government entities. Key Highlights: Initial Access: Spear-phishing emails delivering weaponized .desktop files disguised as PDFs. Target Platforms: Windows & Linux BOSS OS. Malware Behavior: Downloads & executes ELF pay…
…
continue reading

1
Securing the Future: Client-Focused Strategies with Steven Ward
38:30
38:30
Play later
Play later
Lists
Like
Liked
38:30Summary: In this episode of The Breach Room, host Luis interviews Steven Ward, CEO of Polaris Risk, discussing the intersection of cybersecurity and physical security, the importance of client-focused services, and the evolving role of AI in the industry. Steven emphasizes the need for businesses to invest in cybersecurity early, the significance o…
…
continue reading
CYFIRMA research exposes Lazarus Stealer — a stealthy Android banking malware targeting Russian financial institutions. Key Attack Vectors: Overlay Attack: Displays fake banking login screens to steal card details & account credentials. Silent SMS Notification Blocking: Obtains default SMS handler rights to suppress OTP alerts from the victim’s vie…
…
continue reading

1
CYFIRMA Research- Android Malware Posing as Indian Bank Apps
8:44
8:44
Play later
Play later
Lists
Like
Liked
8:44Posing as Indian banking apps, this Android malware deploys a hidden main payload that silently installs, maintains stealthy persistence, and facilitates credential theft. It harvests SMS, steals debit card details, and hijacks call forwarding all while leveraging Firebase Cloud Messaging (FCM) as its Command & Control (C2) channel. Link to the Res…
…
continue reading

1
From Awareness to Action: Cybersecurity Training that Works with Craig Taylor
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10Summary: In this episode of The Breach Room, host Luis interviews Craig Taylor, CEO of CyberHoot, discussing the evolution of cybersecurity, innovative training methods, and the importance of engaging employees in cybersecurity practices. Craig shares his journey in the industry, emphasizing the need for positive reinforcement in training to change…
…
continue reading

1
Higher Education under Cyber Attack. Clemson CISO John Hoyt.
56:47
56:47
Play later
Play later
Lists
Like
Liked
56:47John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss …
…
continue reading

1
S36 Ep2: Debra Andrews - Balancing Human Insight with AI in Marketing
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11In this week’s episode, Steve sits down with Debra Andrews, president and owner of Marketri. Marketri, a strategic marketing firm. Steve and Debra talk about what goes into creating a marketing plan that the C-suite can get on board with, and Deb shares how she and her team work to balance human knowledge with the speed of artificial intelligence. …
…
continue reading

1
The Importance of Process and Ownership in Business with Asal Gibson
33:09
33:09
Play later
Play later
Lists
Like
Liked
33:09Summary: In this episode of The Breach Room, host Luis interviews Asal Gibson, the president of CyRoot Academy and CEO of CyRoot LLC. They discuss the mission of CyRoot Academy to provide free technical education to veterans and underserved communities, the importance of leadership and expectation management, and the challenges of transitioning fro…
…
continue reading

1
Ep. 318 - The 4th Monday Series - Finding Stable Employment in a Crazy Economy with Bobby Knost
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Bobby Knost. Bobby is a proud memb…
…
continue reading

1
Inside Hack Defender Academy: Gamified Malware Training for Blue Teamers
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27Ready to level up your defensive cybersecurity skills? In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Dan Regalado and Belem — the founders of Hack Defender Academy — to explore how they’re using CTF-style challenges, real malware cases, and gamification to prepare the next generation of defenders. 💡 We cover: Why gami…
…
continue reading

1
Third-Party Risk Management in Healthcare
22:02
22:02
Play later
Play later
Lists
Like
Liked
22:02Ever wonder why healthcare organizations are such prime targets for cyberattacks? In this eye-opening conversation with Kelly White, founder of Risk Recon, we uncover the startling reality that healthcare accounts for 37% of all breach events in the last decade. Kelly's journey from soldering Timex Sinclair computers in the late 70s to founding a p…
…
continue reading

1
Enhancing Humans in Your SOC with RedCarbon
14:56
14:56
Play later
Play later
Lists
Like
Liked
14:56All links and images can be found on CISO Series. In this episode, Simone Rapizzi, CSO at RedCarbon, explains how their AI-powered platform uses specialized models to automate threat detection and response while learning from each customer's unique environment. Joining him are Jonathan Waldrop, former CISO, and John Scrimsher, CISO at Kontoor Brand…
…
continue reading

1
Your VPN Extension Might Be Watching You Right Now
59:05
59:05
Play later
Play later
Lists
Like
Liked
59:05This week on The Awareness Angle, Anthony Davis and Luke Pettigrew unpack the latest mix of cyber weirdness, policy drama, and awareness lessons—from fake law firm emails dropping malware to pro-Russian hackers playing with dam floodgates. It’s a week of scams, slips, and security culture stories you’ll want to hear. 🇬🇧 Age Verification Laws – UK a…
…
continue reading

1
SIN CITY CYBERATTACK | Inside MGM Casino's $100M Hack
30:20
30:20
Play later
Play later
Lists
Like
Liked
30:20SIN CITY CYBERATTACK: INSIDE THE MGM & CAESARS CASINO BREACHES In September 2023, Las Vegas turned into ground zero for one of the most disruptive cyberattacks in U.S. history. MGM Resorts, owner of iconic casinos on the Strip, saw slot machines go dark, hotel check-ins grind to a halt, and operations paralyzed for days. At the same time, Caesars E…
…
continue reading

1
Disconnected by Design: The Case for 5th and 6th Generation Airpower — Ep. 251
56:36
56:36
Play later
Play later
Lists
Like
Liked
56:36Episode Summary: This week we’re talking about what it’ll take to project airpower into the heart of the fight in a conflict with China. Most of the time we think about enemy fighter planes, surface-to-air missiles, and AAA, but the biggest challenge might come down to electromagnetic spectrum operations. China has long-studied US warfighting const…
…
continue reading
We are joined today by special guest, former FBI special agent Nancy Aguilar, who had worked the Boston Marathon Bombing and other high-profile investigations. She is also the host and creator of Baddass in heels: https://badassinheels.com/ We discuss: FBI Profiling and negotiation, FBI Profiling and counter terrorism, and other key topics: how fbi…
…
continue reading