The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
…
continue reading
A "real clear" discussion of contemporary issues in defense featuring the writers and editors of RealClear Defense.
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. ...
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
…
continue reading
In a world where technology and cybersecurity are constantly evolving, staying ahead of the curve is no longer just an option—it's a necessity. Prime Cyber Insights plunges you into the fast-paced universe of tech and cybersecurity, where the stakes are high, and the pace is relentless. Hosted by Niko Pulse and Kyra Pixel, this daily podcast is your essential guide to navigating the ever-changing landscape of technology and cybersecurity. From AI breakthroughs to the latest in cyber threats, ...
…
continue reading
Taking the cannel to new levels giving short insights to geopolitical issues around the world that everyone should be aware of. Philip INGRAM MBE, is a former senior British Military Intelligence officer and now presenter, presenters friend and commentator on Times Radio, Talk, Sky News, the BBC and many other global channels
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Kill Chain features experts and guests in the platform and vehicle cybersecurity space. Each week we'll discuss the latest in cybersecurity news as well as topics surrounding platform and vehicle cybersecurity.
…
continue reading
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
OT Cyber | From the Plant Floor Up (powered by DYNICS) is a podcast focused on diving into the latest innovations and developments in the industrial control systems and cybersecurity space. Hosted by Jeff Smith, CTO at DYNICS.
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
Enterprise Security Tech presents The Cyber Jack Podcast. The Cyber Jack Podcast brings together critical news, expert insights, and product information to help CISOs, CIOs, and CEOs make informed IT technology and cybersecurity decisions.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
…
continue reading
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Tony Roth, chief investment officer, Wilmington Trust Investment Advisors, Inc, the investment advisory arm of M&T Bank, asks—and answers—the questions that are top of mind for today’s investors. During each episode, Tony and a special guest provide listeners with insights on unfolding market, economic, and other evolving trends, and a window into how client portfolios are being positioned in the face of ongoing uncertainty.
…
continue reading
We are Morrison & Foerster. We are MoFo. We are synonymous with a commitment to client service and advisors to market-changing deals and impact litigation. Our clients include some of the largest financial institutions, Fortune 100 companies, and leading technology and life sciences companies. We represent investment funds and startup companies, and over the years have supported their growth and development as leading industry players and household brands.
…
continue reading
Enterprise AI Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. The show is hosted by Evan Reiser, the CEO & founder of Abnormal AI, and Mike Britton, the CIO & CISO of Abnormal AI.
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
Official Website: https://psysecure.com/podcast/ Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
News, views, and insights into the cybersecurity realm produced by Greg Johnson, CEO of Webcheck Security. www.webchecksecurity.com
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
Shoveling Smoke – A Frantz Ward Lawcast is a podcast series created by Frantz Ward LLP, a full-service law firm in Cleveland, Ohio. Supreme Court Justice Oliver Wendell Holmes said that "lawyers spend a great deal of their time shoveling smoke." One interpretation of his remark is that lawyers take a vague concept or principle and give it shape, clearing away the smoke. Our podcast series focuses on current legal issues and news items that may affect your business, your community or you as a ...
…
continue reading
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
Welcome to ’Hacker Hacks,’ the podcast where we dive deep into the mysterious world of cybersecurity. Each episode unveils the tactics, techniques, and procedures used by both ethical and malicious hackers, empowering you with knowledge to defend your digital realm. Whether you’re a seasoned IT professional, an emerging tech enthusiast, or just curious about the digital shadows, ’Hacker Hacks’ is your ultimate guide to understanding the tricks of the trade and the tools to thwart them. Subsc ...
…
continue reading
Welcome to UK News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to stay updated on the latest news from the UK, covering politics, culture, business, and more. Whether you're a UK resident, an expat, or simply interested in British affairs, UK News Daily is your reliable source. Tune in every day to be well-informed and to stay ...
…
continue reading
CyberCast offers a different and thoughtful perspective on the cybersecurity issues facing industry and government today. 213656
…
continue reading
Founded in 2022, securitygen is a global start-up focused on telecom security.
…
continue reading
Welcome to Shephard Studio's special series on Five Eyes Connectivity, sponsored by our partner Viasat. Over three episodes, we will look at the changing face of modern warfare across the land, sea and air domains through the prism of three key technology areas - Satellite communications, Line-of-sight datalinks, and cybersecurity. We will hear from senior military leaders about the changing nature of today’s threats, and how unfettered access across the electromagnetic spectrum can no longe ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
In this episode, Jerry and Andrew discuss the importance of data security, phishing attacks targeting hiring managers, the implications of paying ransoms, and the recent Disney data breach incident. They emphasize the need for better training for employees and the challenges of managing software supply chains. The conversation highlights the evolvi…
…
continue reading

1
Inside AeroVironment: Managing Global Cybersecurity for Uncrewed Defense Systems
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19In This Episode Jan Mast discusses his role leading global cybersecurity at AeroVironment, a defense contractor at the forefront of uncrewed aerial, ground, and now underwater systems. He explains how the company manages international data regulations and CMMC compliance through advanced Microsoft configurations, while continuing to expand its oper…
…
continue reading

1
Wikipedia Fights UK Safety Act, Newcastle Hosts 2025 Mercury Prize, Obesity Rates Surge in Northern England, UK Boosts Cyber Defenses £16M, and more...
11:46
11:46
Play later
Play later
Lists
Like
Liked
11:46Wikipedia Challenges UK Online Safety Act Over Volunteer Privacy Concerns Newcastle to Host 2025 Mercury Prize, Shifting Focus from London to Diverse UK Talent Obesity Rates Soar in Northern England, Urgent Action Needed to Bridge Health Disparities UK Government's Cyber Defenses Criticized; Urgent £16M Boost Announced Amid Rising Threats Labour MP…
…
continue reading

1
Cyber Defense Radio – Roy Kikuchi – Safous – Hotseat Podcast – 2025
16:08
16:08
Play later
Play later
Lists
Like
Liked
16:08🚨 New Episode of Cyber Defense Radio is LIVE! 🎙️ Hosted by Gary @Miliefsky, Publisher of @CyberDefenseMag In this deep-dive conversation, Roy Kikuchi, Global Partner Alliance Manager of Safous @Safous_TYA, shares how their remote privileged access management (PAM) solution is redefining secure access — even across legacy OT environments. We explore…
…
continue reading

1
S6 E6: Deepfake Defense & AI Cybersecurity - Stopping Social Engineering with Aaron Painter
18:00
18:00
Play later
Play later
Lists
Like
Liked
18:00In this episode of 2 Cyber Chicks, Erika and Jax discuss the rapidly evolving world of AI-powered cyber threats with Aaron Painter, CEO of Nametag Inc. and a deepfake expert. With cybercriminals leveraging AI to clone voices and fabricate identities, businesses face a growing threat from social engineering attacks. Aaron shares insights on how his …
…
continue reading

1
Cyber Defense Dialogues - 2025 NATO Summit
35:50
35:50
Play later
Play later
Lists
Like
Liked
35:50Brandon Van Grack, former senior official at the U.S. Department of Justice and chair of MoFo’s Global National Security practice, joins our hosts to explore the seismic impact of the Trump administration on U.S. foreign policy and security. Bringing over a decade of experience monitoring national security threats in China and Russia, Brandon takes…
…
continue reading

1
Armada Cyber Defense Channel Partner Overview
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58Channel Partner Overview CyberGap.app CyberComply Console CyberComply.app Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading

1
From Awareness to Action: The Blueprint for Quantum-Resilient Security | Garfield Jones
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23Quantum migration isn’t a future concern, it’s a present-tense priority. In this episode of Shielded: The Last Line of Cyber Defense, Johannes Lintzen and Dr. Garfield Jones take a deep dive into the practical challenges of post-quantum migration, focusing on how organizations can apply the APA framework (Awareness, Preparedness, Action) to make th…
…
continue reading

1
The Security Sensei's Brew: Demystifying Digital Defense One Cup At a Time
1:09:07
1:09:07
Play later
Play later
Lists
Like
Liked
1:09:07Join us as we brew insights with Craig Taylor, a cybersecurity veteran bringing 30+ years of expertise to your cup. With his CISSP certification since 2001 and as co-founder of CyberHoot, Craig has championed global cyber literacy while building an impressive career spanning web hosting, finance, and manufacturing giants, including CSC, JP Morgan C…
…
continue reading

1
Why Endpoint Security is Your First Line of Defense
47:09
47:09
Play later
Play later
Lists
Like
Liked
47:09Ever wonder if endpoint security truly deserves the hype as your first line of defense—or is there more to the story? In this lively episode of Cyber After Hours—Endpoint Security: Is It Really the First Line of Defense?—Paul Marco and Evan Morgan kick things off by swapping stories about the unpredictable rollercoaster of entrepreneurship, proving…
…
continue reading
When we think of addressing cybercrime, we often view it from a position of defense: how to prepare for an attack, how to respond to an attack, and how to recover from an attack. I would posit that organizations should also consider addressing these issues from a position of offense. This podcast welcomes Garylene “Gage” Javier, Legal Counsel, Priv…
…
continue reading
Send us a text In this episode, we break down everything you need to know about ISO 27001 certification, the international gold standard for information security management. Whether you're just starting your compliance journey or looking to deepen your understanding of the certification process, this comprehensive guide has you covered. We'll explo…
…
continue reading

1
51. Behind the Likes: What Small Business Owners Must Know About Social Media Fraud
59:00
59:00
Play later
Play later
Lists
Like
Liked
59:00In this episode of UnHacked, hosts Justin Shelley and Mario Zake are joined by Tim O'Hearn, author and former software engineer, to explore the darker side of social media engagement strategies. Tim shares insights from his personal journey of creating social media bots and discusses the implications of fake activity on platforms like Instagram. Th…
…
continue reading

1
UK Government Faces Copyright Pressure, Wiggins Discusses Addiction Recovery, King Charles Hosts Macron in UK, UK Reduces Aid Budget, and more...
12:23
12:23
Play later
Play later
Lists
Like
Liked
12:23(0:10): UK Government Pressured to Update Copyright Laws for AI Protection Amidst Music Industry Backlash (2:29): Tour de France Champ Bradley Wiggins Opens Up About Addiction and Path to Recovery (4:46): King Charles III to Host Macron in UK: Renewed Franco-British Ties Post-Brexit (7:01): UK Aid Budget Slashed: Minister Chapman Advocates Expertis…
…
continue reading

1
Cybersecurity Budgeting: Where to Spend, Where to Save
55:08
55:08
Play later
Play later
Lists
Like
Liked
55:08Ever wonder if you’re throwing money at cybersecurity or genuinely investing in it? In Episode 25 of Cyber After Hours—titled “Cybersecurity Budgeting: Where to Spend, Where to Save”—co-hosts Paul Marco and Evan Morgan dive into the nuts and bolts of smart spending. Fresh off their experiences at recent conferences, including some focused on K-12 e…
…
continue reading

1
024 - Minimize What Can Be Known with the OSINT Defense & Security Framework (OSDF)
42:19
42:19
Play later
Play later
Lists
Like
Liked
42:19In this episode, I discuss what has been keeping me away from the mic, the Open Source Intelligence Defense and Security Framework (ODSF), and share updates on privacy topics including browser security, autonomous taxis, airport security cameras, and managing cryptocurrency. I also address listener questions about anonymous SIM cards and creating s…
…
continue reading

1
Bulgarians Sentenced for Espionage, Police Investigate Fire at Starmer's Home, London Transport Chaos Unfolds, UK House of Lords Supports Creator Protections, and more...
11:20
11:20
Play later
Play later
Lists
Like
Liked
11:20(0:10): Bulgarians Sentenced for Russian Espionage Plot; Ringleader Receives Nearly 11 Years (2:17): Counter-Terrorism Police Probe Fire at PM Keir Starmer's London Home Before Immigration Reform Announcement (4:04): London's Transport Chaos: Power Outage Halts Underground and Sparks Government Probe (5:58): UK Government Defeated on AI Copyright P…
…
continue reading

1
The First 100 Days: The Trump Administration's Impact on the Economy and Markets
51:15
51:15
Play later
Play later
Lists
Like
Liked
51:15On May 6, Head of Wealth Management Lisa Roberts moderated a conversation with Chief Investment Officer Tony Roth, Chief Investment Strategist Meghan Shue, and Chief Economist Luke Tilley where they examined policy, the economy, and markets 100 days into President Trump’s second term. Topics covered during the conversation included: How key policy …
…
continue reading

1
Harry Faces Backlash Over Charles, £27.5M Investment to Address Domestic Abuse, NHS Launches Brain Injury Prevention Program, M4 Closed After Fatal Crash, and more...
10:43
10:43
Play later
Play later
Lists
Like
Liked
10:43(0:10): Prince Harry Faces Backlash Over Comments on King Charles' Health Amid Strained Royal Ties (2:14): Report Calls for £27.5M Investment to Address Domestic Abuse's Mental Health Impact on Women (4:28): NHS Launches Nationwide Programme to Prevent Brain Injuries in Childbirth, Boost Maternity Care (6:33): Fatal Minibus Crash Closes M4 Near Rea…
…
continue reading

1
S3 E6: From Submarines to Cybersecurity - Navigating Small Business Security
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37Welcome to another episode of Simply Defensive! In this installment, hosts Josh Mason and Wade Wells are joined by cybersecurity expert James Berley. James shares his unique journey from a submarine sonar technician in the Navy to founding his own security firm, Secure Point Solutions, which specializes in helping small businesses tackle cybersecur…
…
continue reading

1
End Compliance Theatre: How Automation Can Save Your Business
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38In this eye-opening episode of Cybersecurity Chronicles, we tackle a critical challenge facing executives today: the devastating impact of cyberattack downtime. Join Netswitch's VP Sean Mahoney, CFO Bernard Mendoza, and cyber resilience expert Steve Piggott as they move beyond "compliance theatre" to discuss why automated disaster recovery (DR) isn…
…
continue reading

1
Tariffs and Tensions: A Deep Dive Into U.S.-China Relations
46:53
46:53
Play later
Play later
Lists
Like
Liked
46:53In this episode of Capital Considerations, Tony Roth and Shehzad Qazi, managing director at China Beige Book, offer an unfiltered analysis of China’s economic outlook and its complex relationship with the United States. While China's manufacturing and policy support are keeping growth afloat, deep-rooted challenges—from weak consumer demand to a fa…
…
continue reading

1
Tackling People, Process, and Perception in Cybersecurity
33:47
33:47
Play later
Play later
Lists
Like
Liked
33:47In this episode of Cyber Talks, we speak with Craig Peppard, CISO at Ivari Canada, about why people and processes - not just technology - are the real frontline in cybersecurity. The conversation unpacks the limitations of traditional security awareness training, explores how to move beyond blame to address systemic process failures, and highlights…
…
continue reading

1
Securing Mortgage Data in a 50-State Compliance Maze with Rohbair Jean
55:01
55:01
Play later
Play later
Lists
Like
Liked
55:01In this Episode Rohbair Jean sheds light on the unique challenges of securing a mortgage company operating across all 50 states, each with different regulatory requirements. He discusses how compliance often trails behind real-world threats, urging leaders not to treat frameworks like NIST or GLBA as finish lines but as baselines. His advice? Use c…
…
continue reading
Two nuclear-armed countries, India and Pakistan, are locked in their most serious conflict in two decades. Early Wednesday morning, after weeks of pledging to retaliate for the deadliest terrorist attack in more than a decade, India launched missiles across its border into Pakistan. Meanwhile, Pakistan claims it took down Indian fighter jets and ha…
…
continue reading

1
Melanie Phllips on Who Built the West and Who Can Save It
1:02:35
1:02:35
Play later
Play later
Lists
Like
Liked
1:02:35Melanie Phillips is a British journalist, broadcaster, and author. Her weekly column currently appears in The Times of London. She’s a regular panelist on BBC Radio’s The Moral Maze and speaks on public platforms throughout the English-speaking world. Her best-selling book, “Londonistan,” about the British establishment’s capitulation to Islamist a…
…
continue reading

1
Liam Payne's Estate Sparks Tributes, Artists Demand Stronger AI Protections, Historic England Showcases Women Photographers, England Faces Summer Drought, and more...
11:22
11:22
Play later
Play later
Lists
Like
Liked
11:22(0:10): Liam Payne's $32.2M Estate: Legacy, Tributes, and the Toll of Public Scrutiny (2:11): UK's AI Bill Faces Backlash: Artists Demand Stronger Copyright Protections Against AI Exploitation (4:56): Historic England Celebrates Women Photographers' Impact on WWII with New Photo Collection (6:57): England Braces for Summer Drought After Driest Spri…
…
continue reading

1
Cyber Challenges in Medicine: A Conversation with Kathie Philippou
33:00
33:00
Play later
Play later
Lists
Like
Liked
33:00In this episode of Cyber Survivor, host Dan Dodson speaks with Kathie Philippou, who has 40 years of experience in practice management. Kathie shares her journey from humble beginnings in healthcare administration to navigating the digital transformation of medical practices. She discusses the challenges of implementing electronic medical records a…
…
continue reading

1
50. Security Is a Team Sport: Turning Employees from Liabilities to Cyber Defenders
45:33
45:33
Play later
Play later
Lists
Like
Liked
45:33This episode focuses on the critical role people play in cybersecurity. The hosts discuss how most breaches (95-97%) involve human error, emphasizing that while technology defenses are important, humans remain the weakest link. They explore how hackers exploit human psychology through social engineering and why creating a positive security culture …
…
continue reading

1
UK India Seal Historic Trade Deal, UK Ministers Address SME Loan Crisis, NHS Launches AI Health Prediction, Couple Charged in Infant Murder, and more...
11:11
11:11
Play later
Play later
Lists
Like
Liked
11:11(0:10): UK and India Seal Historic Trade Deal, Boosting Bilateral Trade to $120 Billion by 2030 (2:16): UK Ministers to Tackle SME Loan Crisis with Bank Executives Amid Growing Concerns (4:59): NHS's New AI 'Foresight' to Revolutionize Healthcare by Predicting Health Risks from Vast Patient Data (7:02): Couple Charged with Murder of Five-Week-Old B…
…
continue reading

1
Security in the DevOps Era: Balancing Speed and Safety
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37Ever feel like the faster you develop, the harder it gets to stay secure? You're not alone—and you're certainly not imagining things! In this episode of Cyber After Hours—Security in the DevOps Era: Balancing Speed and Safety—Paul and Evan are joined by Josh Dixon for a lively discussion that starts with relatable confessions about battling imposte…
…
continue reading

1
14 - The Intersection of Business and Cybersecurity
39:42
39:42
Play later
Play later
Lists
Like
Liked
39:42What are the real costs of cybersecurity implementation? Spoiler alert: it’s far more complex than it appears on the surface. Cybersecurity is a people and process problem, not a technology problem. Most of implementation costs come in the form of time, effort and coordination throughout the organization. In this episode, we reach back to classroom…
…
continue reading

1
Dartmoor Wildfire Consumes 12500 Acres, Man Arrested for Cruise Murder, Elderly Patients Endure Long A&E Waits, UK Invests in GP Surgeries, and more...
12:15
12:15
Play later
Play later
Lists
Like
Liked
12:15(0:10): Devastating Dartmoor Wildfire Consumes 12,500 Acres, Firefighters Battle to Control Blaze (2:25): Murder at Sea: Man Arrested After Fatal Incident on MSC Virtuosa Cruise (4:32): Elderly Patients Face 12-Hour A&E Waits Amidst Systemic NHS Failures: Urgent Reform Needed (7:02): UK Invests £102 Million to Modernize Over 1,000 GP Surgeries, Boo…
…
continue reading
On this special episode of Afternoon Cyber Tea, Ann brings listeners inside the 2025 RSA Conference to explore the intersection of AI, quantum computing and cyber resiliency with two visionary experts: Massachusetts Institute of Technology’s Vinod Vaikuntanathan and Dr. Sasha O’Connell from The Aspen Institute. Vinod shares how quantum computing po…
…
continue reading

1
Defensive Security Podcast Episode 305
1:25:09
1:25:09
Play later
Play later
Lists
Like
Liked
1:25:09In this episode, we discuss the Google Mandiant 2025 M-Trends report. The report is available here: https://services.google.com/fh/files/misc/m-trends-2025-en.pdf Like what we’re doing and want to help support us? Donate here: https://www.patreon.com/defensivesecBy Jerry Bell and Andrew Kalat
…
continue reading

1
S3 E5: The Ultimate Guide to Detection as Code and Blue Team Tactics with David French
48:33
48:33
Play later
Play later
Lists
Like
Liked
48:33Join hosts Josh Mason and Wade Wells as they sit down with David French for an insightful episode of Simply Defensive. Discover David's journey from coding CCTV systems to becoming a staff security engineer at Google Cloud. Explore their discussion on detection as code, automation, detection testing, and relevant tools like Dorothy and Atomic Red T…
…
continue reading

1
Navigating New DOD ODP Mandates in NIST SP 800-171 Revision 3
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36Send us a text 🚨 Working with the Department of Defense or handling Controlled Unclassified Information (CUI)? Here’s what you need to know about the DOD’s new approach to NIST SP 800-171 Revision 3 ODP values. Just listened to the latest episode of CMMC News, where the hosts did a deep dive into the recent DOD memo standardizing “Organization Defi…
…
continue reading

1
Teen Death Ignites Safety Outcry, Suspected Murder Crash in Rochdale, Reform UK Challenges Labour Ahead, Victims Fear Delays in Compensation, and more...
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44(0:10): Tragic Death of Teen in Warehouse Fire Sparks Community Outcry for Improved Safety Measures (2:21): Rochdale Woman Dies in Suspected Murder Crash; Driver Arrested, Police Seek Witnesses (3:57): Reform UK Emerges as Significant Challenger to Labour, Stirring Political Landscape Ahead of General Election (6:21): UK Infected Blood Scandal: Vic…
…
continue reading

1
Cybersecurity News: E-Z Pass Scam, Dead Internet Theory & $16.6B FBI Report
42:21
42:21
Play later
Play later
Lists
Like
Liked
42:21Join The Audit for a news-packed episode as cybersecurity expert Matt Starland recounts a chilling near-miss with an E-Z Pass phishing scam—received just minutes after renting a car in Florida. His close call highlights how scammers exploit timing and context to deceive even seasoned professionals. In this episode, we discuss: How a security pro ne…
…
continue reading

1
Bombers and Ballistic Missiles with Gen. Bussiere
1:02:57
1:02:57
Play later
Play later
Lists
Like
Liked
1:02:57China is conducting what a top US military officer called a breathtaking expansion and modernization of its nuclear and conventional forces. An October 2024 Defense Intelligence Agency report estimated that by 2030, “China will have more than 1,000 operational nuclear warheads, most of which will be fielded on systems capable of ranging the contine…
…
continue reading

1
M&A Without Mayhem: Cyber Lessons from CISO Frank DePaola
41:51
41:51
Play later
Play later
Lists
Like
Liked
41:51In this Episode Frank shares how building a playbook for consistent M&A integration became critical—not just for operations, but for cybersecurity and regulatory alignment. He details his framework built on the Three Cs: Cybersecurity (identity, MFA, EDR, cloud visibility), Compliance (mapping tools across frameworks like ISO, NIST, and CMMC), and …
…
continue reading

1
Why Public Biotechs Back Better Cybersecurity with Anthony Morano
43:12
43:12
Play later
Play later
Lists
Like
Liked
43:12In this episode… Anthony Morano shares how he leveraged a background in finance and self-taught programming to become a hands-on IT and cybersecurity leader in biotech. Starting with annuity calculations in Excel and VB, Anthony moved from labor unions to life sciences, eventually earning leadership roles at some of the most regulated organizations…
…
continue reading

1
Reform UK Surprises in By-Election, Chancellor Reeves Faces Investigation, Ethel Caterham Becomes Oldest Person, Ed Sheeran Announces Homecoming Shows, and more...
12:08
12:08
Play later
Play later
Lists
Like
Liked
12:08(0:10): Nigel Farage's Reform UK Stuns Labour in Runcorn By-Election, Signaling Political Shift (2:24): Chancellor Rachel Reeves Investigated for Undeclared Theatre Tickets Amid Election Pressure (4:37): 115-Year-Old Ethel Caterham Crowned World's Oldest Person After Brazilian Nun's Passing (6:45): Ed Sheeran Announces Ipswich Homecoming Shows for …
…
continue reading

1
100 Days of Trump: The Ask-Me-Anything Edition
49:53
49:53
Play later
Play later
Lists
Like
Liked
49:53To mark the first 100 days of the second Trump White House, we have a special ask-me-anything episode. Amid a firehose of news, which policies will endure, and which are purely rhetorical? How does Foreign Policy find the signal in the noise? FP Live’s executive producer, Dana Sherne, turns the tables on host Ravi Agrawal as he assesses the implica…
…
continue reading

1
Step-by-Step Guide: SAM.gov Registration, SBA DSBS Profile, and Capability Statement Creation
15:08
15:08
Play later
Play later
Lists
Like
Liked
15:08General Overview CyberGap.app CyberComply Console CyberComply.app Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading

1
Ex-Scout Leader Sentenced for Abuse, UK Police Face Mass Resignations, PAC Demands HMRC Modernization, 23% of Adults Spot Medical Errors, and more...
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49(0:10): Fugitive Ex-Scout Leader, 81, Sentenced to 46 Years for Decades of Child Abuse Across UK (2:23): Quarter of UK Police Ready to Quit: Pay Cuts Spark Public Safety Crisis (5:08): PAC Slams HMRC: Rising Costs, Declining Trust, and Urgent Call for Modernization (7:33): 23% of Adults in England Find Errors in Medical Records, Sparking Safety Con…
…
continue reading