Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Cyber Awareness Podcasts
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Step into the world of digital forensics, mobile forensics, OSINT, and cybersecurity with The Cyber Sleuth Show! Hosted by Kevin DeLong, this podcast dives deep into the ever-evolving landscape of digital investigations, featuring expert guests, cutting-edge tools, real-world case insights, and, of course, the occasional terrible dad joke. From law enforcement investigators and forensic analysts to OSINT specialists and cybersecurity pros, we uncover the latest trends, techniques, and challe ...
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
Industry experts break down the latest news & trends in employee benefits, healthcare reform, regulations and compliance, designed to empower executive decisions.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
U.S. Army Garrison Bavaria's Better in Bavaria podcast, where we share stories and highlight the people behind them - the Soldiers and Army civilians who support our readiness mission all while making our community a great place to work, live and raise a family. - Hosted by Linda A. Read and Andreas Kreuzer - Produced by Kayla Overton, Natalie Simmel, and Ella Händel
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
“WHERE ARE THE WOMEN IN CYBER?” The Landscape In 2022 the cyber security field still consists of 24% women and only 2.2% LGBTQ+ minorities. Long-perpetuated gender, age, and demographic biases held by the ‘Baby Boomer’ and Gen-X groups have led to a severe gap in the representation and advancement of women and minorities in this field. Millennials entered the workforce and attempted to forge a new way by asking for small changes; but definitely conceding others. Currently the Boomers/Gen-X a ...
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
🎙️ Dive into the world of cybersecurity with Cubic Lighthouse Podcast - your expert companion in navigating the latest developments and crucial topics in the field. We dissect complexities, provide strategic insights, and ensure you stay abreast of cutting-edge trends. Whether you're a seasoned professional or a cybersecurity enthusiast, join us for concise expertise and actionable intelligence to enhance your security posture. 🌐🔐
…
continue reading
Bite-sized information about cybersecurity for not-for-profit boards and leaders. In each episode we help leaders of not-for-profits to understand the information security risks to their organisations and they leave with at least one actionable insight that they can put into practice. It also features interviews with not-for-profit leaders sharing their cybersecurity journey, insights and lessons learned.
…
continue reading
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
…
continue reading
Designed to challenge old-school business practices and the traditional business suit culture, on unsuitable on Rea Radio you'll hear industry professionals speak about meaningful, modern solutions to help you enhance your company’s growth. Hosted by Doug Houser.
…
continue reading
The BCI Podcast features conversations with business continuity & resilience professionals from around the world offering insight and guidance on current affairs topics affecting businesses around the globe, as well as tips and insight into career development within the industry.
…
continue reading
The purpose of this podcast is to provide unclassified information about current trends in homeland security for the state of New Jersey, as well as educational information and resources for your awareness.
…
continue reading
Unhackable - a virtually impossible state of being only made plausible through consistent cybersecurity best practices by everyone simultaneously. This is Unhackable, the authoritative Security podcast about deception and personal security. Can you ever be truly Unhackable? No, nobody can. But every episode is designed to help you move forward using actionable cybersecurity best practices that are within reach of everyone. We help you take the steps needed to solve your most important Cybers ...
…
continue reading
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
…
continue reading
Closing The Gender Pay Gap is the podcast for thoughtful HR leaders in technology and cybersecurity companies who want to do more to develop and retain their female talent. Sharing tips, techniques and talent pipeline strategies to help technology companies do more to attract, develop and retain female talent to strengthen the female talent pipeline and close the gender pay gap. From promotions to pay cheques, latest figures reveal men are still out-earning women at work in the technology se ...
…
continue reading

1
Is Your Security Awareness Program Just Ticking Boxes?
49:50
49:50
Play later
Play later
Lists
Like
Liked
49:50This week on The Awareness Angle, Anthony Davis and Luke Pettigrew explore a special episode on what it really takes to build meaningful cybersecurity awareness, as part of preparing for Cybersecurity Awareness Month. 📢 Beyond the Poster Campaign – Open communication channels and positive reinforcement are key to building trust and encouraging peop…
…
continue reading

1
Mastering Social Media OSINT: SMI Aware's Secrets to Cyber Sleuthing
1:01:19
1:01:19
Play later
Play later
Lists
Like
Liked
1:01:19Picture this: you’re scrolling through social media, trying to piece together clues for a case, but the sheer volume of posts, profiles, and comments is overwhelming. Sound familiar? That’s why you need to tune into this episode of The Cyber Sleuth Show with Kevin DeLong and Josh Janow, CEO of SMI Aware. Josh pulls back the curtain on how his team …
…
continue reading

1
How to Measure Cyber Risk Today: Guidelines for Leaders
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to Know Ryan Leirvik who joins us in the studio. Ryan is the CEO of Neuvik & author of Under…
…
continue reading
Many leaders have concerns about employees using AI safely. We explain how to do so in this video. Today we sit with Bill Kleyman-founder of Apolo.us, a pioneer and leader in the space about his efforts for the safe use AI and how to reduce risks with employee use of AI. This is the story of Bill Kleyman and how AI can be used for good Find more he…
…
continue reading

1
CYFIRMA Research- APT36 Phishing Campaign Targets Indian Defense Using Credential-Stealing Malware
6:36
6:36
Play later
Play later
Lists
Like
Liked
6:36Cyber Threat Alert: APT36 Targets Indian Defense with a Sophisticated Phishing Campaign! CYFIRMA has uncovered a targeted cyber-espionage operation by APT36 (Transparent Tribe), a Pakistan-based threat actor. This group is exploiting phishing emails embedded with malicious PDFs mimicking official NIC documents to infiltrate Indian defense systems. …
…
continue reading

1
Navigating AI & Legal in Cyber with Tim Sewell
26:27
26:27
Play later
Play later
Lists
Like
Liked
26:27Artificial intelligence has firmly established itself at the forefront of the cybersecurity agenda, creating both unprecedented opportunities and complex challenges for security leaders. In this eye-opening conversation with cybersecurity veteran Tim Sewell, we dive deep into the realities of implementing effective AI governance and security practi…
…
continue reading

1
Ep. 310 - The 4th Monday Series - Are You Ready for the Storm? with Lisa Miller
30:42
30:42
Play later
Play later
Lists
Like
Liked
30:42Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Lisa Miller, a former Deputy Insur…
…
continue reading

1
Why Hackers Target YOU. Dark Web EXPOSED.
58:40
58:40
Play later
Play later
Lists
Like
Liked
58:40Host David Mauro interviews Jeremy Samide, CEO of Blackwired, about why hackers target you. We expose the latest dark web secrets, and the latest social engineering risks. Find more about Blackwired here: https://www.blackwired.com/ Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at…
…
continue reading
Darnley shines the proton pack spotlight on a real digital spooky fest: the “Librarian Ghouls” cyberattack campaign. These ghostly hackers are haunting machines while you sleep, using legit tools to sneak past defences and mine crypto in the shadows. We break down what it means for everyday users, how to spot the signs, and simple ways to stay prot…
…
continue reading

1
“Real-time beats simulation” - Terry McCorkle on Rethinking Phishing
54:02
54:02
Play later
Play later
Lists
Like
Liked
54:02This week on The Awareness Angle Interviews… Anthony sits down with Terry McCorkle, co-founder of PhishCloud, to rethink everything you think you know about phishing training. From military discipline to startup innovation, Terry brings decades of experience—and strong opinions—on what’s broken in phishing awareness, and how real-time data and huma…
…
continue reading

1
CYFIRMA Research- Tracking Ransomware: May 2025
4:04
4:04
Play later
Play later
Lists
Like
Liked
4:04Stay ahead of evolving ransomware threats with CYFIRMA’s May 2025 Ransomware Report. May witnessed a 15.95% spike in ransomware attacks compared to April, with 545 incidents logged globally. New actors like SafePay and SilentRansomGroup rapidly gained ground, while established groups like Qilin deployed advanced loaders like NETXLOADER and SmokeLoa…
…
continue reading

1
Bridging DevOps and Security: Tracy Reagan on the Future of Open Source
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04In this episode of What's in the SOSS, we sit down with longtime open source leader and DevOps champion Tracy Ragan. From her early days with the Eclipse Foundation to her current work with Ortelius, the Continuous Delivery Foundation, and the OpenSSF, Tracy shares her journey through the ever-evolving world of open source security. We dig into the…
…
continue reading

1
How To Avoid Business Interruption. What Leaders Must do.
22:17
22:17
Play later
Play later
Lists
Like
Liked
22:17Interview of Host David Mauro on topics of How To Avoid Business Interruption. What Leaders Must do. Covering true healthcare breaches which have killed and effected medical care along with small business guidance. Topics include: how to avoid business interruption, what business leaders need to know about cyber attacks, when ransomware kills, how …
…
continue reading

1
The Aftermath. Navigating Reputations and Protecting Your Brand Image
50:19
50:19
Play later
Play later
Lists
Like
Liked
50:19James Potter, CEO of DSE, joins us in the studio for great conversation and exclusive insight on The Aftermath of Data Breaches: Navigating Reputational Damage and Protecting Your Brand Image. Reputational Harm from Data Breaches, Cybersecurity Reputation Management and Operational Leadership. Find more on DSE here: https://www.dse.team/ Topics dis…
…
continue reading

1
Ep. 279 - Security Awareness Series - Dodging Turkeys and Security Awareness with Stacey Edmonds REPLAY
36:52
36:52
Play later
Play later
Lists
Like
Liked
36:52REPLAY (Original Air Date Oct 21, 2024) Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Stacey Edmonds. Stacey is a multi-disciplinary EdTech innovator and Digital Safety Pioneer, driven by a commitment to democratizing knowledge. Stacey's expertise, encompassing social science, education, EdTech, and multi-p…
…
continue reading

1
CYFIRMA Research: Understanding CyberEye RAT Builder- Capabilities and Implications
5:30
5:30
Play later
Play later
Lists
Like
Liked
5:30CYFIRMA’s latest research report analyses a stealthy Windows-based malware known as CyberEye, which is posing a significant threat across systems by offering attackers full remote control through a Telegram Bot API. Once executed, it silently harvests browser-stored passwords, cookies, credit card details, Wi-Fi credentials, and session tokens from…
…
continue reading

1
The Hidden Danger of LNK Files on Your Computer
1:01:45
1:01:45
Play later
Play later
Lists
Like
Liked
1:01:45This week, The Awareness Angle dives into NHS breaches, dodgy shortcut files, and why fake CAPTCHAs are the new phishing frontier. 🧑⚕️ NHS Professionals Breached – Attackers spent 13 months undetected inside the UK’s largest NHS staffing agency. We break down how they got in, why Active Directory matters, and what took so long to tell anyone. 🖥️ S…
…
continue reading

1
Hiring Fraud Exposed! Latest AI Threats to Business.
29:19
29:19
Play later
Play later
Lists
Like
Liked
29:19🔥🚨NEW EPISODE 🔥🚨We delve into the Latest AI Threats To Small Business. Exposing AI Hiring Fraud! Watch to the end to see live examples of how this is happening today. Topics covered: 🔥AI Fraud in Interviews, 🔥How AI Scams Effect Business, 🔥AI Fraud In Job Interviews takeaways AI-driven fraud is a growing concern for businesses. Many resumes are now…
…
continue reading

1
Techno Security East 2025 Wrap Up with Jennifer Salvadori
1:05:17
1:05:17
Play later
Play later
Lists
Like
Liked
1:05:17Join Kevin DeLong on The Cyber Sleuth Show for an exclusive wrap-up of the Techno Security & Digital Forensics Conference East 2025 with Jennifer Salvadori, Event Director. Fresh off the June 3-5 event in Wilmington, NC, Jennifer shares why the conference is relocating back to Myrtle Beach, what the vibrant coastal city brings to the table. They wi…
…
continue reading

1
CYFIRMA Research: Ukraine's Attack on Russia's Strategic Air Force- Live Feed from Revolution in Military Affairs
8:35
8:35
Play later
Play later
Lists
Like
Liked
8:35Ukraine’s daring drone strike reshapes warfare! CYFIRMA’s research team examines how cheap tech took on Russia’s nuclear air force and what it means for global militaries. Link to the Reseach Report: https://www.cyfirma.com/blogs/ukraines-attack-on-russias-strategic-air-force-live-feed-from-a-revolution-in-military-affairs/ #Geopolitics #ThreatInte…
…
continue reading

1
Inside the Mind: Unveiling Cyber Criminals' Motives and the Real-World Dangers of Ransomware
49:49
49:49
Play later
Play later
Lists
Like
Liked
49:49We explore the motives of cyber criminals, examples of cyber crime gang activities, risks of physical harm from ransomware, understanding cyber crime motive, and why its important to understand cyber crime MO (Modus Operandi). Overview of the MO (Modus Operandi) of REVIL, CONTI, HIVE, DARKSIDE and other ransomware gangs and how they drive their ope…
…
continue reading

1
Teen Hacker EXPOSED! PowerSchool Breach Puts 60M Kids at Risk | Protect Your Children Online
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46Teen Hacker EXPOSED! PowerSchool Breach Puts 60M Kids at Risk | Protect Your Children Online 🚨 60 Million Students Exposed in PowerSchool Cyber Attack — What Parents Need to Know NOW A 19-year-old hacker named Matthew D. Lane pulled off one of the largest education data breaches ever, targeting PowerSchool and exposing the personal information of o…
…
continue reading

1
Episode 071 - The Future of HubSpot is Passwordless - Alyssa Robinson
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39The Future of HubSpot is Passwordless Learn how HubSpot’s CISO Alyssa Robinson breaks down passwordless authentication, innovative security strategies, and the art of balancing usability with protection on the latest episode. + + + Find more episodes on YouTube or wherever you listen to podcasts, as well as at netspi.com/agentofinfluence.…
…
continue reading

1
CYFIRMA Research: DuplexSpy RAT- A Stealthy Windows Malware Enabling Full Remote Control and Surveillance
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14A highly modular Windows Remote Access Trojan (RAT), DuplexSpy, written in C#, has surfaced with advanced surveillance and system control capabilities. Features include keylogging, remote shell access, screen & webcam spying, audio eavesdropping, and live C2 chat. It uses fileless execution, UAC bypass, registry persistence, and DLL injection to ev…
…
continue reading

1
Hacking Big Tech. Bryan Seely Interview.
1:04:17
1:04:17
Play later
Play later
Lists
Like
Liked
1:04:17Bryan Seely joins us is a refreshing and hilariously entertaining episode. Bryan is a world-famous cyber security expert, ethical hacker and former U.S. Marine. He is known for his book (Web of Lies) and for intercepting calls to the U.S. Secret Service & FBI, as well as finding major exploits at LinkedIn and several government 3-Letter agencies. C…
…
continue reading

1
Ep. 308 - Human Element Series - Finding Common Ground With Lonnie Marts
33:35
33:35
Play later
Play later
Lists
Like
Liked
33:35Today we are joined by Lonnie Marts. Lonnie is an American creator, entertainer, and host known for his magnetic charm and comedic storytelling. His unique ability to engage audiences has catapulted him to digital stardom, with nearly 3 million highly engaged fans tuning in daily for his comedic skits and feel-good content on social media. A gradua…
…
continue reading
This week, The Awareness Angle celebrates a big win—taking home two awards at InfoSecurity Europe! Anthony and Luke dive into a packed episode covering everything from retail breaches to the shifting world of passwordless authentication. 🏬 Retail Under Attack – From North Face to Cartier and M&S, cyber incidents continue to rock the retail sector. …
…
continue reading
🔥 New Episode Alert 🔥 In this exciting discussion, CISSP security leader Braxton Molton and host David Mauro on why you’re not too small to be hacked, the importance of detection and we explain How Small Business Can Catch Hackers. The message is clear on why small business needs better security. Exclusive insight from the front lines. Send us a te…
…
continue reading

1
21. How to Use Microsoft Defender to Strengthen Your Phishing Security (With Benjamin Pomerleau - Product Owner at CyberPilot)
29:03
29:03
Play later
Play later
Lists
Like
Liked
29:03Microsoft Defender is a hidden gem of features if you use Office365. A lot of companies don't really use it even though it's a part of there plan with Microsoft. Today we dive into how you can use it to get better security when it comes to handling phishing emails. It: Simplifies the phishing reporting for end users Make it easier for IT admins to …
…
continue reading

1
CYFIRMA Research: Firewalls and Frontlines- The India-Pakistan Cyber Battlefield Crisis
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47As tensions between India and Pakistan escalated in early 2025, the conflict spilled into cyberspace. In the wake of the April 22nd Kashmir attack and India’s Operation Sindoor, dozens of hacktivist groups launched a wave of digital assaults — from DDoS attacks and defacements to claimed data breaches — targeting critical infrastructure and governm…
…
continue reading

1
Face of Cybercrime. How Cyber Attacks Kill Patients.
31:00
31:00
Play later
Play later
Lists
Like
Liked
31:00Welcome to Bainbridge, Georgia—where a cyber attack turned Memorial Hospital into a warzone of blinking screens and silent phones. This isn't sci-fi. It's the chilling truth of how ransomware can lead to real-world deaths. In this episode, we unpack the battle between Embargo and Memorial Health, and reveal the emotional and life-threatening toll o…
…
continue reading

1
Live from Techno Security with Martino Jerian of Amped Software
16:23
16:23
Play later
Play later
Lists
Like
Liked
16:23Join Kevin as he speaks with Martino Jerian of Amped Software live from the Techno Security conference in Wilmington, NC.By Cyber Social Hub
…
continue reading

1
NCSC proposes its PQC transition timeline to UK Policy makers: guiding the UK to a quantum-safe future
31:53
31:53
Play later
Play later
Lists
Like
Liked
31:53Post-quantum cryptography is no longer an abstract problem. It's a technology transformation that touches every layer of critical infrastructure, from policy to procurement, systems to supply chains. In this episode, Dr. Jeremy Bradley, Principal Technical Director at the UK’s NCSC and lead author of the government’s official PQC timeline guidance,…
…
continue reading

1
"Security awareness IS marketing" – Sara Carty on Being Unboring
1:13:24
1:13:24
Play later
Play later
Lists
Like
Liked
1:13:24This week on The Awareness Angle Interviews… Anthony sits down with Sara Carty, the founder of UNBORING, to explore why so much cybersecurity marketing feels stale—and what we can do to change it. From drama school to startup life, Sara’s journey is anything but conventional, and her marketing approach is bold, honest, and refreshingly human. 🎭 Fro…
…
continue reading

1
Live from Techno Security with Martin Westman of MSAB
37:50
37:50
Play later
Play later
Lists
Like
Liked
37:50Join Kevin live from Techno Security Conference in Wilmington, NC as he speaks to Martn Westman of MSAB. Here is Martins bio from the conference... lol Martin Westman has worked in the mobile device technology field since 1994. He has held many roles within MSAB over the last 20 years, bouncing back and forth between tech and development, and hes c…
…
continue reading

1
Live from Techno Security with Chad Gish of Magnet Forensics
31:36
31:36
Play later
Play later
Lists
Like
Liked
31:36Join Kevin as he talks with Chad Gish of Magent Forensics https://www.magnetforensics.comBy Cyber Social Hub
…
continue reading

1
Systemic Cyber Risk: A CISO’s Impossible Task
43:14
43:14
Play later
Play later
Lists
Like
Liked
43:14In this episode, Jeffrey Wheatman sits down with Paul Guckian, former BISO at Lloyd’s of London and author of Systemic Cyber Resilience: Why CISOs Can’t Fix Cybersecurity. They unpack why the traditional security model is broken, how systemic risk is the real enemy, and why putting the weight of an entire ecosystem on a single CISO sets everyone up…
…
continue reading

1
CYFIRMA Research- Versa Concerto: Understanding and Mitigating CVE-2025-34027
4:27
4:27
Play later
Play later
Lists
Like
Liked
4:27Critical Alert: CVE-2025-34027 – Authentication Bypass + RCE in Versa Concerto! Organizations using Versa Concerto for network orchestration must take immediate action. This newly disclosed vulnerability allows unauthenticated attackers to bypass login mechanisms and gain remote code execution through exposed REST APIs. The flaw affects key authent…
…
continue reading

1
How Everyone Is Responsible For Cyber Security. Phantom CISO.
1:00:11
1:00:11
Play later
Play later
Lists
Like
Liked
1:00:11Mishaal Khan, Best-selling Author of The Phantom CISO, Founder of Operation Privacy, and vCISO at Mindsight, joins David Mauro to discuss: how to keep your digital footprint safe, how to improve your digital hygiene, and how everyone is responsible for cyber security. https://www.phantomciso.com/ https://www.operationprivacy.com/ Send us a text Gro…
…
continue reading