Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Essentials Podcasts

show episodes
 
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
  continue reading
 
Artwork

4
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
  continue reading
 
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
  continue reading
 
Artwork

1
South West Cyber Beat

South West Cyber Resilience Centre

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We are a Police led not for profit company. We offer simple, free and easily understood cyber security guidance for small and medium sized businesses. Remember it doesnt have to be complicated or expensive to give your business the cyber protection and peace of mind that you need. All this from industry experts who partner with us in the cyber security arena.
  continue reading
 
Artwork

4
The Pink Room with Bryony

Bryony Roberts, owner of Pragmatic Consultancy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to The Pink Room Podcast. A space for values-led professionals and business owners who want to lead with heart, act with clarity, and make a meaningful impact without losing themselves along the way. Hosted by Bryony Roberts, founder of Pragmatic Consultancy, this podcast lifts the curtain on the real work behind purpose-driven growth. Part mentor, part truth-teller, part coach in your corner, Bryony shares stories, insights, and behind-the-scenes lessons from years spent helping peo ...
  continue reading
 
Artwork

1
GRC Academy

Jacob Hill

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Governance, Risk, and Compliance Academy (GRC) Academy is a training and research platform for GRC professionals, executives, and anyone else who wants to increase their knowledge in the GRC space!
  continue reading
 
The Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the ever-evolving realm of technology and digital innovation. Each episode is a treasure trove of knowledge, focusing on critical areas such as cybersecurity, the intricacies of SEO, and the latest advances in the digital world. Greg's expertise as a technical advisor shines through as he explores the nuances of digital marketing, offering listeners an in-depth understanding of the skills needed to stay ahead in t ...
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Artwork

1
Cybertraps Podcast

Frederick Lane & Jethro Jones

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!
  continue reading
 
Artwork

1
Essential Digital

Sagar Pandya

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The latest AI and cybersecurity conversations to help you achieve digital greatness to grow your organizations, empower your teams, and protect your data, all delivered from your host Sagar Pandya.
  continue reading
 
I'm Andy Poulton and I've been marketing online since 1999. Listen to my podcasts to learn a little more about a wide range of digital marketing and online security security issues. I talk about Search Engine Optimisation - SEO Google Ads, Facebook Ads and other forms of Pay per Click - PPC Social Media Marketing Email Marketing Video Marketing Web Design and Web Usability Cyber Security Passwords and Password Security And quite a bit more
  continue reading
 
Unlock the secrets to financial success with the Boomers, Bucks, and Bling Podcast! Hosted by Carl Spiteri, a veteran Mortgage Loan Originator with over 30 years of experience, this podcast is your ultimate guide to mastering the financial intricacies of buying, selling, and lending in today's dynamic market. Whether you're a home buyer, lender, or seller, Carl's expert insights and practical advice will empower you to make informed decisions that lead to lasting financial stability. Each ep ...
  continue reading
 
Artwork
 
It’s easy to get lost in the space that is cybersecurity which encompasses dozens of specialty areas that can be further segmented into more than 50 career roles. Andrew Hoffritz, a cybersecurity enthusiast and professional, interviews a diverse selection of cybersecurity-minded professionals worldwide each month and pulls back the curtain on how to break into the cybersecurity field, discussing unique skills and why cybersecurity is a continuously growing field. Each episode contains powerf ...
  continue reading
 
Artwork

1
Learn Online Security Podcast

Learn Online Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI). Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers.
  continue reading
 
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
  continue reading
 
‘Tech Insurance Leaders’ – the podcast that positions you at the forefront of the digital insurance landscape. Our host Louisa Weix, Managing Partner at TittmannWeix, interviews Chief Claims Officers, Tech Officers, Claims Directors, and other insurance professionals about: - Cutting-edge insurance products - Complex issues surrounding AdTech and Media Claims - Artificial Intelligence - Data Security, and more. Here, you’ll gain the knowledge and guidance you need to thrive in the fast-paced ...
  continue reading
 
Artwork

1
Alongside

NorthStandard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
NorthStandard‘s podcast features thought-provoking discussions on news and topics in the maritime industry. We talk with experts from the club and special guests in the field from around the world
  continue reading
 
PJO Insurance Brokerage is a full-service independent insurance agency that specializes in providing personalized insurance solutions for individuals and businesses. With our brokers having over 60 years of combined insurance experience, at PJO Insurance Brokerage, we take pride in the fact that we put our clients’ needs first and foremost.
  continue reading
 
Artwork

1
Fortinet Cybersecurity Podcast

Fortinet Cybersecurity Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
  continue reading
 
Welcome to **Mind the Breach**, the podcast series designed to protect your UK small business from the costly threat of payment fraud. I'm Sarah, and in this essential series, **The Phantom Invoice: Protecting Your UK Small Business from Payment Scams**, we're diving deep into the number one cyber threat facing businesses like yours across the UK. Are you a small business owner, director, or sole trader worried about cunning scams that could wipe out your hard-earned profits? Then this show ...
  continue reading
 
Loading …
show series
 
Send us a text In this episode of The Pink Room, Bryony Roberts from Pragmatic Consultancy is joined by Chani and Clive Simms of MetaDefence Labs, experts in GDPR, Cyber Essentials, and vulnerability management. Together, they discuss the growing cybersecurity threats facing businesses, the importance of preventative measures, and why board-level e…
  continue reading
 
Got a question or comment? Message us here! 💡 This week on The SOC Brief, we’re breaking down incident response (IR) ... why it’s essential, how to build a strong plan, and what SOC teams can do to turn chaos into control. From preparation and containment to recovery and lessons learned, learn how a solid IR strategy saves time, money, and reputati…
  continue reading
 
In this episode of Boomers, Bucks, & Bling, Carl sits down with Southern California financial advisor Jon to talk about the biggest challenges Baby Boomers face in retirement. From rising housing costs to new tax rules, this episode is packed with practical strategies to help you protect your retirement income, keep your family close, and make the …
  continue reading
 
Finding the Perfect Vendor: Navigating IT Vendor Relationships Welcome to Off The Wire, the podcast that helps you curb your cybersecurity risk and tackle technology challenges. In this episode, Tanner and Anthony, seasoned IT executives, discuss the ins and outs of selecting the right vendors for your business. They explore the qualities to look f…
  continue reading
 
I have an incredible announcement to share! 👀 Before that though, let me share some of my history with you. Back in 2016, I started a side-business called TEKFused LLC focused on web design/hosting. Fast forward to 2022, I launched GRC Academy, and since then I’ve released 3 CMMC courses, released 50+ podcast episodes, and partnered with some amazi…
  continue reading
 
The notes go here. I really can't go and look for them right now. This week in InfoSec is a sticky pickle Rant of the Week will have you guessing at who it could possibly be, again… Billy Big Balls is why british men need to take their passport to the bathroom these days Industry News is the latest and greatest security news stories from around the…
  continue reading
 
Artificial Intelligence is transforming the world—but can it also put you at risk? In this episode of the Learn Online Security Podcast, Richard Bankert (Social Engineering Expert & CEO) and Chris Howells (Director of IT & Head Trainer) break down the hidden dangers of AI in cybersecurity. From data scraping and deepfakes to AI-powered scams and em…
  continue reading
 
Send us a text Processes are the backbone of any business but too many companies either drown in paperwork or rely on unwritten habits that only a few people understand. In this episode, we discuss what are business processes, when they should be written down, and when they need to be lived and breathed as part of your company’s culture. I’ll share…
  continue reading
 
Got a question or comment? Message us here! Fresh off the chaos of DEF CON 33, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickman’s clutch CTF victory and Will’s bold dive into the Social Engineering Community’s Vishing Competition. No sleep, all signal. Suppor…
  continue reading
 
Embracing AI in the Cooperative Sector: Insights and Strategies Join Tanner Greer, Chief Technology Officer at Blue Ridge Energy, and Anthony Kent from Four County EMC as they share their perspectives on integrating artificial intelligence in the cooperative industry. With a combined 35 years of IT experience, they discuss practical approaches, use…
  continue reading
 
Got a question or comment? Message us here! In this episode, we break down the emerging Crypto24 ransomware attacks that use living-off-the-land techniques to bypass EDR. We’ll explore how these attacks unfold and the defensive strategies SOCs and organizations can use, like layered security, enhanced monitoring, and rapid response, to stay ahead o…
  continue reading
 
Got a question or comment? Message us here! This week, we’re unpacking the phishing wave hitting SaaS platforms ... from social engineering to OAuth abuse and AI voice spoofing. Learn why people remain the #1 attack vector and how to stay one step ahead. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcas…
  continue reading
 
You’re not alone in underestimating how easily authority can be faked! In this episode of the Learn Online Security Podcast, Richard Bankert and Chris Howells expose the hidden world of authority-based social engineering attacks — a psychological tactic hackers use to bypass security by posing as trusted figures. 🔍 What You’ll Learn: 📌What social e…
  continue reading
 
Welcome to Boomers Bucks and Bling, where retirement planning gets a modern (and sometimes thrilling) twist! In this episode, host Carl Spiteri sits down with Medicare expert Keith Burkowski to take the confusion out of one of the most important decisions retirees will face: signing up for Medicare. Whether you’re approaching 65 or helping a loved …
  continue reading
 
Top 5 Cybersecurity Policies Vital for IT Departments | Off The Wire Podcast Join Tanner and Anthony, seasoned IT executives with over 35 years of experience, as they debate the top five critical cybersecurity policies that every IT department should implement. From incident response plans to password policies, they break down the most vital measur…
  continue reading
 
Send us a text In this reflective episode of The Pink Room, Bryony Roberts compares milestones to birthdays, defined as fixed dates that can’t be moved, and moments that invite us to take stock of where we’ve been. Bryony discusses the importance of recognising both personal and professional growth, not just in terms of achievements, but in the exp…
  continue reading
 
It’s officially back-to-school season—and not just for the kids! In this episode of the Code of Entry Podcast, Greg and Keri chat about the highs and lows of the first day back, the tech their kids are using (TI-84s still exist?!), and how schools are navigating digital evolution. But that’s not all… We dive deep into: 💻 When to revamp your website…
  continue reading
 
Got a question or comment? Message us here! On this episode of the #SOCBrief, we break down attacks on SonicWall firewalls. A wave of ransomware, possibly exploiting zero-day vulnerabilities, is compromising even fully patched systems. Learn how SOCs can respond fast and stay ahead. Support the show Watch full episodes at youtube.com/@aliascybersec…
  continue reading
 
Send us a text In this Pink Room session, Bryony Roberts from Pragmatic Consultancy reflects on turning 50 and the ripple effects it had on her business routines. After a period of family celebrations, school holidays, and life’s inevitable interruptions, Bryony opens up about the challenge and importance of staying consistent in a small business. …
  continue reading
 
In this episode, James and I talk about something that doesn't get enough attention: the everyday habits that make or break your cyber security. Strong cyber security is not just about buying the right tech. It is about putting the right processes and policies in place to help your team make good decisions and avoid costly mistakes. In this episode…
  continue reading
 
Got a question or comment? Message us here! This week’s SOC Brief unpacks how a misconfigured cloud bucket exposed 72,000+ user images from the Tea app, complete with geolocation metadata and real IDs. From national security risks to doxxing fallout, we break down what went wrong and what your security team must do to avoid the same mistakes. Suppo…
  continue reading
 
In this milestone episode, Greg and Keri raise a toast to five years of Code of Entry! 🥂 From launching a business during COVID to building a powerhouse team and embracing SEO, websites, and special projects, this candid conversation highlights what worked, what flopped, and what’s next. Whether you're an entrepreneur, digital marketing nerd, or ju…
  continue reading
 
Boomers Bucks and Bling Ep. 15 | Why You Need a Living Trust Before Retirement Welcome back to Boomers Bucks and Bling—where retirement planning meets real talk, real strategy, and a little bit of sparkle ✨. In this episode, host Carl Spiteri sits down with estate planning attorney Danielle Barger, founding partner at Barger & Batiste Law. Together…
  continue reading
 
Unlocking the Power of Low-Code Development with Adam W. In this episode of Off the Wire, hosts Tanner and Anthony are joined by Adam W., a Senior Workflow Engineer at Shift Four, to dive deep into the world of low-code and no-code development. Adam shares his journey from help desk technician to low-code expert, discusses the various levels of cod…
  continue reading
 
In this episode, host Jethro Jones discusses the crucial topic of AI and cybersecurity with Sam Bourgeois, an experienced IT director with a background in private industry and education. The conversation covers the importance of AI standards, the ethical implications of AI use, and the need for cybersecurity awareness among young people. Sam introd…
  continue reading
 
Got a question or comment? Message us here! A critical zero-day (CVE-2025-53770) is actively targeting on-premises SharePoint servers AND it’s already been used to compromise over 100 organizations. In this #SOCBrief, Andrew and Tanner break down how the exploit works and what steps your team should take now. If your SharePoint instance is public-f…
  continue reading
 
Just like athletes review game film to win, you need to recognize the plays scammers run against you. In this perspective-changing episode of the Learn Online Security Podcast, we compare cybersecurity threats to professional sports strategy. 🎙️ Hosted by Tamara Michèle with experts Richard Bankert and Chris Howells, we uncover how most people are …
  continue reading
 
Got a question or comment? Message us here! In this week’s #SOCBrief, we break down why offboarding policies are ABSOLUTELY critical for security teams. Overlooked items from abandoned accounts to old VPN access can leave backdoors wide open. Learn how SOCs monitor, contain, and shut down lingering access, and why communication between HR, IT, and …
  continue reading
 
Got a question or comment? Message us here! 🎙️ NEW! Aligned by Design: CISO x Legal Introducing! A fresh new series that explores the intersection of cybersecurity and legal strategy. Join Alias CISO Jonathan Kimmitt and privacy attorney Tom Vincent as they unpack what happens when technology, compliance, risk, and law collide. From real-world expe…
  continue reading
 
8th July 2008: Several DNS vendors released patches to mitigate an attack method discovered by Dan Kaminsky which could be used to cause DNS cache poisoning. Kaminsky had discovered the vulnerability 6 months prior and reported it to vendors privately so they could address it. RIP, Dan. https://x.com/todayininfosec/status/1942695691270193211 10th J…
  continue reading
 
This episode dives deep into UK Supply Chain Cyber Security, a critical and often overlooked area in today's digital world. So, what exactly is it? It's about securing the entire network of external partners, suppliers, and third-party services that your business relies on. Imagine your company as only as strong as its weakest link. In the UK, this…
  continue reading
 
Send us a text In this episode of The Pink Room, host Bryony Roberts welcomes Kruti, Pragmatic Consultancy’s Sustainability Consultant, to share her journey from Mumbai to the UK and from architecture to impact. Kruti reflects on how her childhood, growing up in a multi-generational household where nothing went to waste, gave her an early appreciat…
  continue reading
 
Got a question or comment? Message us here! Hackers just unleashed the largest DDoS attack in history, peaking at 7.3 Tbps and 4.8 billion packets per second. In just 45 seconds, it pummeled its target with the data equivalent of over 9,000 HD movies, a powerful reminder of how far attack capabilities have evolved. 🎧 Tune in to today’s SOC Brief fo…
  continue reading
 
Deep Dive into Microsegmentation for Cybersecurity Welcome to Off The Wire, the podcast that helps you curb your cybersecurity risk and tackle technology challenges. In this episode, hosts Tanner and Anthony discuss the concept of microsegmentation, its implementation, and its importance in improving network security. With decades of IT experience,…
  continue reading
 
Send us a text We often think belief comes after we succeed, after we’ve proved ourselves, hit the milestone, or won the approval. But what if that’s backwards? In this empowering episode of The Pink Room, Bryony Roberts flips the script on how we see confidence and belief. She shares why believing in yourself is not something you earn at the finis…
  continue reading
 
27th June 2007: Live Free or Die Hard was released. Cop John McClane partners with hacker Matt Farrell to stop cyberterrorists trying to take down the US's infrastructure. Traceroute (1337!) is used to find the ringleader's location, then McClane kills him by shooting HIS OWN shoulder. https://x.com/todayininfosec/status/1938731279937057144 1st Jul…
  continue reading
 
When private medical records are dumped in an alley, who really pays the price? In this episode of the Learn Online Security Podcast, Tamara Michèle and Chris Howells unpack a disturbing privacy breach involving discarded psychiatric files and the fallout that followed. They explore the real-life consequences of identity theft, how sensitive data c…
  continue reading
 
Got a question or comment? Message us here! In this episode of The SOC Brief, the team unpacks a critical zero-day vulnerability in Google Chrome (CVE-2025-6554) that’s being actively exploited. Learn how attackers use type confusion bugs to hijack browser memory, what makes this exploit so dangerous, and why it’s targeting high-value organizations…
  continue reading
 
Got a question or comment? Message us here! In this episode, our security engineers break down the latest cybersecurity headlines, from the real scoop behind the “16 billion password” leak to the rise of hacker groups like Scattered Spider. 🕷️ We discuss how attackers bypass MFA, why exploited data keeps resurfacing, and what organizations can do t…
  continue reading
 
In this episode of Strictly Cyber, James and I are talking all about the tech that keeps your business safe behind the scenes. We break down the key tools — like firewalls, antivirus, encryption and cloud backups — and explain how they actually work to protect your data. No jargon, no fluff, just real talk about what you need and why it matters. If…
  continue reading
 
In this final episode of the prepcast, we shift focus from content to performance. You’ve learned the material—now it's time to master the test. We walk through proven strategies for final review, including how to prioritize domains, balance study time, and simulate test conditions. You’ll get tips on memory recall, cognitive pacing, and avoiding e…
  continue reading
 
Vendor relationships introduce risk far beyond basic performance metrics—and in this episode, we dive into the executive oversight practices required to manage those risks. You’ll learn how to assess third-party risk using tiered models, risk questionnaires, and onsite audits. We also discuss how to require evidence of compliance, conduct assessmen…
  continue reading
 
Securing a vendor is only the beginning—the real work lies in managing performance, risk, and accountability. This episode focuses on the contractual elements that govern third-party relationships, including service level agreements (SLAs), key performance indicators (KPIs), penalties for non-compliance, and confidentiality clauses. You’ll learn ho…
  continue reading
 
Procurement is more than just purchasing tools—it’s a strategic process that shapes your organization's security ecosystem. In this episode, we walk you through the essentials of security procurement, including how to develop Requests for Proposals (RFPs) and Requests for Information (RFIs), establish evaluation criteria, and conduct vendor due dil…
  continue reading
 
As cybersecurity budgets grow, so does the need to justify investments with clear, measurable value. In this episode, we explore how CISOs evaluate the return on investment (ROI) of security initiatives, technologies, and services. You’ll learn how to calculate ROI using both quantitative and qualitative factors, including risk reduction, productiv…
  continue reading
 
Security budgeting doesn’t end once funding is approved—CISOs must continuously manage, adjust, and defend their budgets in the face of shifting priorities and evolving threats. In this episode, we explore the fundamentals of dynamic budget management, including tracking expenditures, reallocating resources, and responding to unexpected events such…
  continue reading
 
Financial fluency is essential for every CISO—and in this episode, we break down the core principles of financial management in the context of enterprise cybersecurity. You’ll learn how to interpret balance sheets, manage operational and capital expenditures, and build forecasts that align with multi-year strategic plans. We explain how to calculat…
  continue reading
 
Effective security leaders think in frameworks—and in this episode, we explore two of the most influential planning models for enterprise architecture: TOGAF (The Open Group Architecture Framework) and SABSA (Sherwood Applied Business Security Architecture). You’ll learn how these frameworks guide long-term security strategy by aligning governance,…
  continue reading
 
Security is no longer a siloed function—it must be embedded in business strategy. In this episode, we examine how CISOs align cybersecurity initiatives with overarching organizational goals. You’ll learn how to interpret business drivers, engage with other executive leaders, and shape security programs that enable growth, agility, and competitive a…
  continue reading
 
As security operations evolve, the idea of the autonomous SOC is moving from concept to implementation. In this episode, we explore what defines an autonomous Security Operations Center and how automation, AI, machine learning, and orchestration platforms are converging to reduce human intervention. You’ll learn about the architectural components o…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play