The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Cyber Defense Podcasts
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
Welcome to Channel Security Secrets. Join host, Lou Rabon, each week to expose the untold secrets and critical insights from the minds shaping the future of cybersecurity sales in the trusted advisor channel. Channel Security Secrets is brought to you by Cyber Defense Group, on a mission to shift cybersecurity from reactive to resilient. Explore all episodes and resources at: https://www.cdg.io/podcast/
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
We are going to teach you how to defend yourself against cybercrime, privacy abuse, vehicle hacking, bomb drones and cyber warfare, REGARDLESS of your proficiency with computers. Because you don't have to be technical to survive the Digital Age!
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
…
continue reading
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
A "real clear" discussion of contemporary issues in defense featuring the writers and editors of RealClear Defense.
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
Security veterans Joe Patti and Adam Roth share cyber security insights from their virtual bar stools. Join Joe and Adam, along with a diverse lineup of industry insiders, for a view into how the professionals see the security issues that impact all of us. Tune in for engaging discussions, expert analyses, and a behind-the-scenes look into the cybersecurity world. Reach us at [email protected] or @SecCocktailHour on Twitter.
…
continue reading
Taking the cannel to new levels giving short insights to geopolitical issues around the world that everyone should be aware of. Philip INGRAM MBE, is a former senior British Military Intelligence officer and now presenter, presenters friend and commentator on Times Radio, Talk, Sky News, the BBC and many other global channels
…
continue reading
Kill Chain features experts and guests in the platform and vehicle cybersecurity space. Each week we'll discuss the latest in cybersecurity news as well as topics surrounding platform and vehicle cybersecurity.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
In a world where technology and cybersecurity are constantly evolving, staying ahead of the curve is no longer just an option—it's a necessity. Prime Cyber Insights plunges you into the fast-paced universe of tech and cybersecurity, where the stakes are high, and the pace is relentless. Hosted by Niko Pulse and Kyra Pixel, this daily podcast is your essential guide to navigating the ever-changing landscape of technology and cybersecurity. From AI breakthroughs to the latest in cyber threats, ...
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Enterprise Security Tech presents The Cyber Jack Podcast. The Cyber Jack Podcast brings together critical news, expert insights, and product information to help CISOs, CIOs, and CEOs make informed IT technology and cybersecurity decisions.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Welcome to the Defense and Aerospace Report podcast, our weekly podcast on the global defense and aerospace business sponsored by Bell, and hosted by Defense & Aerospace Report Editor Vago Muradian. Each week, we’ll bring you interviews with industry leaders and the business’ best analysts to put events in context, identify trends and keep an eye on what’s next in a fast-moving world. Defense & Aerospace Report is your global source for national security and aerospace news, thought leadershi ...
…
continue reading
Tony Roth, chief investment officer, Wilmington Trust Investment Advisors, Inc, the investment advisory arm of M&T Bank, asks—and answers—the questions that are top of mind for today’s investors. During each episode, Tony and a special guest provide listeners with insights on unfolding market, economic, and other evolving trends, and a window into how client portfolios are being positioned in the face of ongoing uncertainty.
…
continue reading
Worldwise Wealth is a podcast designed for global-minded entrepreneurs and investors eager to build borderless lives. Each episode dives into strategies for international diversification, including second residencies and citizenships, unlocking new financial landscapes, and understanding your global diversification opportunities. With insights from experts across the globe, we offer practical steps for leveraging global markets, reducing tax burdens, and achieving personal freedom through a ...
…
continue reading
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Latest internet technology, trends, and solutions
…
continue reading
We are Morrison & Foerster. We are MoFo. We are synonymous with a commitment to client service and advisors to market-changing deals and impact litigation. Our clients include some of the largest financial institutions, Fortune 100 companies, and leading technology and life sciences companies. We represent investment funds and startup companies, and over the years have supported their growth and development as leading industry players and household brands.
…
continue reading
Shoveling Smoke – A Frantz Ward Lawcast is a podcast series created by Frantz Ward LLP, a full-service law firm in Cleveland, Ohio. Supreme Court Justice Oliver Wendell Holmes said that "lawyers spend a great deal of their time shoveling smoke." One interpretation of his remark is that lawyers take a vague concept or principle and give it shape, clearing away the smoke. Our podcast series focuses on current legal issues and news items that may affect your business, your community or you as a ...
…
continue reading
Future-Proof is your front-row seat to the ideas, innovations, and strategies reshaping business, technology, and sustainability across Saudi Arabia and beyond. Brought to you by ICG—Saudi Arabia’s transformation partner—this podcast explores how leaders, changemakers, and industries are preparing for a world in motion. In every episode, hosts Layla and Karim decode the future: from Vision 2030 and ESG leadership to digital transformation, cybersecurity, and AI. . Whether you're a business e ...
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading

1
Cyber Defense Radio – Koushik Anand - IAM Expert – Hotseat Podcast – 2025
14:19
14:19
Play later
Play later
Lists
Like
Liked
14:19🚨 New Episode of Cyber Defense Radio is LIVE! 🎙️ Hosted by Annabelle Thomas, Cybersecurity Champion of @CyberDefenseMag In this must-hear Hotseat episode, Koushik Anand, independent IAM expert, shares insights from his deep experience designing and deploying enterprise-scale identity solutions with platforms like CyberArk, Okta, PingFederate, Micro…
…
continue reading
Please follow us on YouTube! Want episodes a week early? Consider becoming a Patreon sponsor of the DefSec podcast here. Here are links to the stories we talked about this week: https://krebsonsecurity.com/2025/09/self-replicating-worm-hits-180-software-packages/ https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/…
…
continue reading
The collection of sources provides a comprehensive overview of the AI arms race in cybersecurity, detailing how artificial intelligence is leveraged for both offensive and defensive purposes. On the offensive side, sources emphasize that malicious actors, including nation-state groups and cybercriminals, are increasingly using generative AI to crea…
…
continue reading

1
Inventory, Agility, Reality: How FS-ISAC Sees the Path to PQC
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03As industries continue to treat cryptography as invisible plumbing, the risk of systemic disruption is growing. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Mike Silverman, Chief Strategy & Innovation Officer at FS-ISAC, about why complacency is more dangerous than quantum itself. Mike explains how …
…
continue reading

1
Highlights from AFA's Air, Space & Cyber Conference
29:13
29:13
Play later
Play later
Lists
Like
Liked
29:13Our editors explore the vibe, the headlines, the aircraft, the drones, and the other news coming out of the Air Force Association’s big annual conference at National Harbor, Maryland. Guests: Tom Novelly, Defense One senior reporter covering air and space warfare; And Lauren C. Williams, Defense One senior editor.…
…
continue reading

1
DEFAERO Daily Pod [Sep 24, 25] Jim Lewis & Mark Montgomery on Latest Cyber Headlines
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49Dr. Jim Lewis, a distinguished fellow with the Tech Policy Program at the Center for European Policy Analysis, and Mark Montgomery, a retired US Navy rear admiral who is now the senior director of the Center on Cyber and Technology Innovation at the Foundation for Defense of Democracies as well as a Cyberspace Solarium Commission senior adviser, jo…
…
continue reading

1
AI cyber attacks need AI cyber defense: Ransomware's new danger and how a top expert is fighting back
57:32
57:32
Play later
Play later
Lists
Like
Liked
57:32Everyone's using AI, including ransomware gangs. Podcast guest Karin Lagziel, Director Cybersecurity at consulting firm Sygnia, gives us the news and her cyber defense strategies for fighting back: With more AI, as well as a focus on fundamentals. In this episode: 🔹 The first AI-powered ransomware "Prompt Lock" discovered in the wild 🔹 How Chinese …
…
continue reading
This week addresses the rapidly evolving threat landscape. Ransomware is studied from its early origins to its present role as a multimillion-dollar business model, while advanced persistent threats demonstrate the persistence and adaptability of state-sponsored actors. Insider threats add complexity, highlighting the difficulty of defending agains…
…
continue reading

1
CrowdStrike's AI Innovations in Cyber Defense - SWN #513
37:15
37:15
Play later
Play later
Lists
Like
Liked
37:15In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by ma…
…
continue reading

1
Shmulik Yehezkel Founder & CEO @Pryvaxy on the tight coloration between physical & cyber defense
42:49
42:49
Play later
Play later
Lists
Like
Liked
42:49ביטחון פיזי והגנת סייבר הם שני צדדים של אותה המטבע, כול אחד מהם מהווה השלמה של השני וחשוב למניעת מתקפה על הארגון. ארגונים שאינם ביטחוניים נוטים להפריד ביניהם ושוברים את קו ההגנה הרגיש ממילא נחשון פינקו מארח את אל"מ (מיל'), מייסד ומנכ"ל חברת פריבקסי מבכירי משרד ראש הממשלה לשעבר מקים וראש חטיבת הסייבר המבצעי של משרד הביטחון, ראש בית הספר לסייבר וטכנו…
…
continue reading

1
Cyber Threat Intelligence for Blue Teams with Jordan Kalm (Morado COO)
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50From Army recon missions to building Morado, COO Jordan Kalm reveals how military intelligence tactics translate into modern cyber threat intelligence. In this Simply Defensive episode, Josh Mason and Wade Wells dive into what really works for blue teams and SOC analysts — and what’s just noise. 👉 If you’ve ever wondered how to turn raw intel into …
…
continue reading

1
318. Cyber Defense Tactics for Global Enterprises | Scott Alldridge
33:56
33:56
Play later
Play later
Lists
Like
Liked
33:56Connect with Scott LinkedIn Website Case Studies Connect with Nicole Learn more on YouTube Join our free Telegram group Book a Strategy Call Website
…
continue reading

1
Countering Ransomware, CISA 2015, and Active Cyber Defense with Cynthia Kaiser
33:38
33:38
Play later
Play later
Lists
Like
Liked
33:38Overview Cybersecurity threats are growing more complex as ransomware gangs, nation-states, and criminal networks converge. In this episode, Frank Cilluffo speaks with Cynthia Kaiser, senior vice president at Halcyon and former deputy assistant director for cyber at the FBI. They discuss the looming risk if Congress fails to reauthorize the Cyberse…
…
continue reading

1
Defense Contractors: CMMC Is Here — And the Clock Is Ticking
29:34
29:34
Play later
Play later
Lists
Like
Liked
29:34In our latest Cybersecurity America episode (42), I had the privilege of speaking with Jim Goepel, a true leader in cybersecurity and compliance — and someone who has helped shape the very ecosystem he now advises. Jim is the CEO of Fathom Cyber, a consulting firm in North Wales, PA specializing in: 🔹 CMMC assessment preparation 🔹 CUI education and…
…
continue reading

1
Attica, Crustacean Porn, Broadcom, William of Ockham, Jaguar, SVG, Aaran Leyland... - SWN #516
31:22
31:22
Play later
Play later
Lists
Like
Liked
31:22Attica, Crustacean Porn, Broadcom, William of Ockham, Jaguar, SVG, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-516
…
continue reading

1
Attica, Crustacean Porn, Broadcom, William of Ockham, Jaguar, SVG, Aaran Leyland... - SWN #516
31:22
31:22
Play later
Play later
Lists
Like
Liked
31:22Attica, Crustacean Porn, Broadcom, William of Ockham, Jaguar, SVG, Aaran Leyland, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-516
…
continue reading

1
How Scammers Exploit Trust and FOMO: Kicking Off Cybersecurity Awareness Month with Lisa Plaggemier
33:16
33:16
Play later
Play later
Lists
Like
Liked
33:16Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance, joins host Frank Cilluffo to discuss how public education can combat online scams, fraud, and cyber threats. With billions of campaign impressions and only a nine-person team, the Alliance focuses on motivating behavior change through creative, jargon-free outreach. Plaggem…
…
continue reading

1
Defense & Aerospace Daily Podcast [Sep 30, ’25] US Army’s 1st Cavalry Division Commander Maj. Gen. Tom Feltey
57:01
57:01
Play later
Play later
Lists
Like
Liked
57:01On today’s Land Warfare Series program, sponsored American Rheinmetall, Maj. Gen. Tom Feltey, the commander of the US Army’s 1st Cavalry Division at Fort Hood, Texas, joins Defense & Aerospace Report Editor Vago Muradian to discuss Ukraine war lessons that are helping shape the future of ground combat and his force; how to fight on an increasingly …
…
continue reading
TL;DR: This week's episode is what happens when I go on vacation and have a little time to think. So here we go - let's talk about this Jaguar Land Rover was compromised and ransomware spread. The damage has been 'extensive' to the point where they stopped everything... are there any lessons here? Links https://www.theguardian.com/business/2025/sep…
…
continue reading
This is today’s cyber news for 2025-09-29. A busy slate led by Asahi’s nationwide logistics pause after a cyberattack, a Harrods third-party breach affecting hundreds of thousands of shoppers, and the UK’s rare £1.5B loan guarantee to steady Jaguar Land Rover after a crippling incident. We cover edge-device pressure with Akira ransomware exploiting…
…
continue reading

1
More Than a Hashtag: Two Powerful Ways People Create Change Online
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13If you’ve ever felt the urge to get involved with a cause you care about, the online world can seem like a vast and overwhelming place to start. It’s easy to feel like you’re just one voice among millions. But what does “getting involved” online really look like? The truth is, there are many different and equally valuable ways to contribute. In sim…
…
continue reading

1
Transition to Absurdity and Roleplay: Cindy's and Helen's "Crazy Role" as "Experts"
20:13
20:13
Play later
Play later
Lists
Like
Liked
20:13This Twitter Space, hosted by Alberto Daniel Hill, showcases a significant divergence in flow, transitioning from serious technical discussion and high-stakes hacking claims to an extended, highly theatrical, and absurd roleplay centered on cybersecurity, sexuality, and self-parody, particularly involving Cindy and Helen.Analysis of the Space Flow …
…
continue reading

1
To the Point: The Under the Radar Risk of Letting Counter-Drone Authorities Expire with Matt Hayden
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21In this episode of Cyber Focus: To the Point, Frank Cilluffo sits down with Matt Hayden, former DHS official and current GDIT executive, to unpack the looming expiration of the Preventing Emerging Threats Act. Together, they explore the growing dangers posed by drones—from hobbyist disruptions to nation-state threats—and what’s at stake if Congress…
…
continue reading

1
I told about the dissater3 years before happening. The Inevitable Validation: The PKI “Digital Master Key” Crisis.
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:583. The Predictive Value of Expert Analysis: From the DNIC Warning to the PKI Catastrophe The true value of independent, technically-grounded analysis lies in its predictive power. The same technical illiteracy that led a judge to believe I could “mentally alter evidence” is what blinded officials to the clear and present danger I warned about in 20…
…
continue reading

1
Cyber Defense Radio – Jason Kaplan - CEO - SixMap – Hotseat Podcast – 2025
15:28
15:28
Play later
Play later
Lists
Like
Liked
15:28🚨 New Episode of Cyber Defense Radio is LIVE! 🎙️ Hosted by Annabelle Thomas, Cybersecurity Champion of @CyberDefenseMag In this must-hear episode, Jason Kaplan, CEO & Co-Founder of SixMap.io, steps into the Hotseat Podcast to reveal how their platform is transforming cyber asset attack surface management (CAASM) and giving enterprises the visibilit…
…
continue reading

1
Uruguay's Cybersecurity Landscape: Alberto Daniel Hill.
29:16
29:16
Play later
Play later
Lists
Like
Liked
29:16The collected sources offer a comprehensive view of Uruguay's rapidly evolving, yet vulnerable, cybersecurity landscape and the systemic failures within its legal system, centered around the controversial case of ethical hacker Alberto Daniel Hill. The sources establish Uruguay as a major regional digital hub facing a surge in cyber incidents, nece…
…
continue reading

1
TRAILER: Behind the Mask: A Hacker's Journey
1:25
1:25
Play later
Play later
Lists
Like
Liked
1:25The sources consist primarily of a lengthy, unedited audio transcript of a conversation between individuals, including one referred to as Dexter, alongside excerpts from a related Spotify podcast series and a GitHub repository. The conversation covers extensive ground, discussing the complexities of corruption in police departments, particularly in…
…
continue reading

1
DEFAERO Daily Pod [Sep 29, 25] Week in Review & Byron Callan’s Week Ahead
35:25
35:25
Play later
Play later
Lists
Like
Liked
35:25On today’s Look Ahead program, sponsored by HII, Byron Callan of the independent Washington research firm Capital Alpha Partners joins Defense & Aerospace Report Editor Vago Muradian to discuss the implications of what could be a prolonged government shutdown should President Trump and congressional leaders not be able to strike a deal; the preside…
…
continue reading
This is today’s cyber news for 2025-09-29. Ransomware, zero-days, and persistent backdoors dominated the headlines, showing just how wide the attack surface has become. Medusa claims to have stolen more than 800 gigabytes of Comcast data and is demanding $1.2 million in extortion. Akira continues to find ways around SonicWall VPN multi-factor authe…
…
continue reading
The transcript excerpts provide an extensive overview of the hacking collective Anonymous, tracing its origins from the chaotic and often offensive culture of the 4chan b board and the early history of hacker pranks at MIT. The source details Anonymous's evolution from a group focused on "lulz" (laughs) and online trolling to a powerful force in ha…
…
continue reading

1
Sylvester Stallone, Criminal Justice, and Free Energy
26:08
26:08
Play later
Play later
Lists
Like
Liked
26:08The source documents contain excerpts from a long-running, unstructured audio conversation, likely a recorded social audio space, featuring multiple participants including Alberto and Amy, and later speakers such as Yuri and Zach. A major theme throughout the discussion is the nature of secrets and privacy, with participants debating whether one sh…
…
continue reading

1
Image-Based Sexual Abuse: Global Analysis and Legal Responses
6:56
6:56
Play later
Play later
Lists
Like
Liked
6:56These sources collectively provide a comprehensive overview of the issue of non-consensual intimate imagery, often termed revenge porn, focusing on its legal, psychological, and technological dimensions. The materials explain that victims frequently suffer severe mental health consequences, including symptoms consistent with PTSD, anxiety, and depr…
…
continue reading

1
Defense & Aerospace Report Podcast [Sep 27, ’25 Business Report]
59:50
59:50
Play later
Play later
Lists
Like
Liked
59:50On this week’s Defense & Aerospace Report Business Roundtable, sponsored by Bell, Dr. “Rocket” Ron Epstein of Bank of America Securities, and Richard Aboulafia of the AeroDynamic advisory consultancy join host Vago Muradian to discuss Wall Street ended the week slightly down as a protracted US government shutdown looms; President Trump reversed cou…
…
continue reading

1
The Anti-Podcast Empire: An In-Depth Analysis of the Cybermidnight Club Phenomenon
7:57
7:57
Play later
Play later
Lists
Like
Liked
7:57Introduction: The Prolific Ghost of PodcastingIn the modern media landscape, the Cybermidnight Club presents a compelling paradox: a media entity boasting a vast library of nearly 600 episodes and a relentless daily output, yet it remains a virtual ghost on traditional podcast charts. It is a prolific phantom, generating a constant stream of conten…
…
continue reading

1
Documento Informativo: Análisis de Casos de Falla Sistémica y Verdad Cuestionada
15:44
15:44
Play later
Play later
Lists
Like
Liked
15:44Este documento sintetiza dos casos complejos que, aunque geográficamente y temáticamente distintos, convergen en la exposición de profundas fallas institucionales, la fragilidad de la verdad oficial y las devastadoras consecuencias para los individuos atrapados en el sistema.El primer caso, denominado "Operación Bitcoins" en Uruguay, detalla el arr…
…
continue reading

1
Analiză aprofundată a eșecurilor sistemice și a narațiunilor contestate în aplicarea legii
15:44
15:44
Play later
Play later
Lists
Like
Liked
15:44Rezumat ExecutivAcest document de informare sintetizează două studii de caz distincte, dar tematice, care scot în evidență eșecuri critice în sistemele de justiție penală din Uruguay și Statele Unite. Primul caz, "Operațiunea Bitcoins", examinează arestarea inginerului IT uruguayan Alberto Daniel Hill în 2017, prezentând o discrepanță profundă într…
…
continue reading

1
Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More. - SWN #515
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-515
…
continue reading

1
Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More. - SWN #515
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-515
…
continue reading
Born into a well-educated and well-off Syrian family, Ahmed al-Sharaa – also known by his nom de guerre Abu Mohammad al-Julani – joined Abu Musab al-Zarqawi's organization, al-Qaeda in Iraq, after the U.S. invasion of that country in 2003. Following the outbreak of the Syrian civil war in 2011, he established al-Qaeda’s branch in Syria: Jabhat al-N…
…
continue reading

1
The cases of Alberto Hill and Brandon Beak involve the vanishing or obscuring of official records.
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13* **Beak's Case (Institutional Cover-up):** * Beak's misconduct (sexual misconduct, covering up for colleagues, landing him on the Brady List) was a catalyst that exposed a **massive systemic crisis** in the IPD (2003–2009), marked by excessive force and constitutional rights violations. * The destruction of records was an attempt to **erase histor…
…
continue reading

1
Cyber Defense Radio – Venu Rao – Strobes Security – Hotseat Podcast – 2025
19:55
19:55
Play later
Play later
Lists
Like
Liked
19:55🚨 New Episode of Cyber Defense Radio is LIVE! 🎙️ Hosted by Annabelle Thomas, Cybersecurity Champion of @CyberDefenseMag In this must-hear episode, Venu Rao, CEO & Co-Founder of Strobes Security (@StrobesHQ), steps into the Hotseat Podcast to reveal how their AI-Driven CTEM Platform to minimize threat exposure is transforming how enterprises tackle …
…
continue reading
The EU's ambassador to the U.S. underscores the importance of the bloc's $910 billion defense plans known as Readiness 2030. Guest: European Union Ambassador to the United States Jovita Neliupšienė.
…
continue reading

1
Brandon Beak and the 2007 Inglewood Police Scandal.
24:13
24:13
Play later
Play later
Lists
Like
Liked
24:13Informative Report: The Fragmented Accountability of Brandon BeakBrandon Beak’s history presents a complex picture of professional misconduct followed by allegations of institutional protection and recent personal legal turmoil. Due to documented efforts by the Inglewood Police Department (IPD) to destroy records, obtaining a unified, "whole" view …
…
continue reading

1
Brandon Beak Part 2: The Two Lives of Brandon Beak.
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26Informative Report: The Fragmented Accountability of Brandon Beak Brandon Beak’s history presents a complex picture of professional misconduct followed by allegations of institutional protection and recent personal legal turmoil. Due to documented efforts by the Inglewood Police Department (IPD) to destroy records, obtaining a unified, "whole" view…
…
continue reading