Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
…
continue reading
Cyber Risk Reporting Podcasts
The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Threatscape Briefing delivers daily audio sitreps on the signals shaping global risk and competition. Each episode distills the “One Big Thing” into a concise, executive-ready briefing connecting military, economic, cyber, and cultural flashpoints. Built for analysts, risk managers, and decision-makers, the format is fast, authoritative, and globally timed to keep you ahead of the curve. Threatscape Briefing is part of the Geopolitical Threatscape ecosystem and equips decision‑makers with cl ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
…
continue reading
The Bare Metal Cyber CRISC Audio Course is a comprehensive audio training series designed to help you master the CRISC certification with confidence. Each episode delivers in-depth coverage of ISACA’s CRISC domains — from risk governance to monitoring — using a uniquely structured, exam-focused format built for long-term retention. Whether you're studying on the go or doing a deep review, this prepcast is your essential guide to IT risk success.
…
continue reading
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
…
continue reading
A delicious mix of Insurance and TV
…
continue reading
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
…
continue reading
ABC News Daily is the podcast that helps you understand the issues affecting your world. Every episode, host Samantha Hawley walks through one story with the help of an ABC colleague or expert in under 15 minutes. When you want coverage you can trust, listen to ABC News Daily. Key topics of recent episodes include the Donald Trump administration, DOGE, Tesla, insurance costs, recession risks, egg shortages, DeepSeek, neo-Nazis, Putin and Xi, solar batteries, the jobs market, anti-Semitism, a ...
…
continue reading
1
Conscious Governance
Conscious Governance that helps Boards & CEOs make the choices that create the future for the communities they serve
Conscious Governance is an advisory service that helps Boards & CEOs make the choices that create the future for the communities they serve. We do this by creating clarity from complexity in governance, strategy, risk and leadership.
…
continue reading
Carol Massar and Tim Stenovec bring you reporting from the magazine that helps global leaders stay ahead, plus insight on the people, companies and trends shaping today's complex economy. Watch us LIVE on YouTube: http://bit.ly/3vTiACF.
…
continue reading
Welcome to AcoraCast - The forefront of expertise and innovation, with the freshest IT, cyber security and AI insights brought to you by Acora. Tune in as we unravel the latest trends, tips, and tools, all tailored to empower you in your role as an IT or Security Trailblazer. Interested in seeing what else Acora can do? Visit our website.
…
continue reading
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and he ...
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
The internet in its blooming evolution makes personal data big business – for government, the private sector and denizens of the dark alike. The Data Privacy Detective explores how governments balance the interests of personal privacy with competing needs for public security, public health and other communal goods. It scans the globe for champions, villains, protectors and invaders of personal privacy and for the tools and technology used by individuals, business and government in the great ...
…
continue reading
“From The Blockchain" brings you today’s most innovative entrepreneurs and thought leaders to unpack the true potential of smart contract technology, web3, and the digital frontier! Host Ashley Smith is thrilled to have you join today’s top tier community of forward thinking trailblazers. This show brings substance over hype - say goodbye to the noise of NFT and cryptocurrency market speculation. Instead, From The Blockchain aims foster a culture of idea sharing, creativity, and innovation t ...
…
continue reading
1
The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report [Microsoft Threat Intelligence Podcast]
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29While our team is out on winter break, please enjoy this episode of The Microsoft Threat Intelligence Podcast from our partners at Microsoft. In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a co…
…
continue reading
1
Season finale: Leading security in a brave new world. [CISOP]
43:59
43:59
Play later
Play later
Lists
Like
Liked
43:59In the season finale of CSO Perspectives, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons an…
…
continue reading
1
Trump’s Ukraine Plan Faces New Obstacles After Putin Call
26:35
26:35
Play later
Play later
Lists
Like
Liked
26:35Watch Bloomberg Businessweek LIVE every day on YouTube: http://bit.ly/3vTiACF. President Donald Trump’s push to end the war in Ukraine faced new complications on Monday when Vladimir Putin said he would revise his country’s negotiating position after the Russian leader claimed Ukrainian drones targeted his residence. Putin told Trump of his decisio…
…
continue reading
1
2025 Picks: The productivity problem with car washing
16:32
16:32
Play later
Play later
Lists
Like
Liked
16:32Why have so many hand car wash services replaced automatic machines? It has to do with immigration policies and there are implications for Australia’s productivity which is among the worst in the developed world. Economists insist boosting productivity is the only way to improve our living standards, but could delivering higher wages first actually…
…
continue reading
1
The Hidden Risk in Your Stack [Data Security Decoded]
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik. In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and w…
…
continue reading
1
CYFIRMA Research- APT36 LNK-Based Malware Campaign Leveraging MSI Payload Delivery
5:02
5:02
Play later
Play later
Lists
Like
Liked
5:02Threat Alert: APT 36 CYFIRMA has identified a targeted malware campaign abusing fake NCERT WhatsApp advisory PDFs to compromise Windows systems. Link to the Research Report: APT36 LNK-BASED MALWARE CAMPAIGN LEVERAGING MSI PAYLOAD DELIVERY - CYFIRMA #APT36 #Cyberthreatintelligence #Malware analysis #Threathunting #Cybersecurity #ETLM #CYFIRMA https:…
…
continue reading
1
2025 Picks: Why energy giants want to control solar batteries
16:03
16:03
Play later
Play later
Lists
Like
Liked
16:03It was a decision driven by spite for Sydney man Peter Anderson. He was determined to buy a solar battery for his home so he could take money away from the big power companies, while never receiving a hefty power bill again. But his plan came unstuck after agreeing to participate in a so-called virtual power plant. Today, energy reporter David Merc…
…
continue reading
1
Charity Wright: Pursue what you love. [Threat intelligence] [Career Notes]
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50While our team is out on winter break, please enjoy this episode of Career Notes. Threat intelligence analyst at Recorded Future, Charity Wright, shares her story from the army to her career today. Transitioning from the army to cybersecurity was an exciting change for her. During college she was recruited by the U.S. army where she started her jou…
…
continue reading
1
Excel-lerating cyberattacks. [Research Saturday]
23:43
23:43
Play later
Play later
Lists
Like
Liked
23:43While our team is out on winter break, please enjoy this episode of Research Saturday. This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belaru…
…
continue reading
1
Bloomberg Businessweek Weekend - December 27th, 2025
1:14:57
1:14:57
Play later
Play later
Lists
Like
Liked
1:14:57Featuring some of our favorite conversations of the week from our daily radio show "Bloomberg Businessweek Daily." Hosted by Carol Massar and Tim Stenovec Hear the show live at 2PM ET on WBBR 1130 AM New York, Bloomberg 92.9 FM Boston, WDCH 99.1 FM in Washington D.C. Metro, Sirius/XM channel 121, on the Bloomberg Business App, Radio.com, the iHeart…
…
continue reading
1
CYFIRMA Research- Quishing Campaigns: Advanced QR-Code Phishing Evaluation and Insights
2:33
2:33
Play later
Play later
Lists
Like
Liked
2:33A sophisticated QR-code phishing (“quishing”) campaign is targeting employees with payroll-themed lures, bypassing email security and harvesting credentials via obfuscated, per-victim infrastructure. This trend underscores the growing risk of mobile-based phishing and the need for stronger user awareness and behavior-driven defenses. Link to the Re…
…
continue reading
1
Beyond cyber: Securing the next horizon. [Special Edition]
1:00:13
1:00:13
Play later
Play later
Lists
Like
Liked
1:00:13While our team is out on winter break, please enjoy this Special Edition episode. Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The NightDragon Innovation Summit convened a group of industry leaders to discuss how public and private entities can work together to address emerging …
…
continue reading
1
Sarah Ferguson on interviewing Jacinda Ardern
25:00
25:00
Play later
Play later
Lists
Like
Liked
25:00Sarah Ferguson's interviews illuminate the biggest issues of our times and reveal insights from the most interesting people in public life. How did she stop US ambassador to Israel Mike Huckabee from "flooding the zone" when grilling him on US support for Israel's war in Gaza? What did she learn about compassion in politics when speaking with New Z…
…
continue reading
While our team is out on winter break, please enjoy this episode of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries. Your host is Selena Larson, Proofpoin…
…
continue reading
In today’s episode, we dig into the Electronic Frontier Foundation’s annual Breachies, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet misconfigurations, the Breachies offer a revealing look at how familiar…
…
continue reading
Some stories are best told first-hand by those at the centre of the action. It's how the ABC's Australian Story has brought us so many compelling personal narratives and it's a format that's captivated the program's host Leigh Sales. So which episodes stick in her mind? There's a dramatic rescue on the Franklin River, the widows who found love agai…
…
continue reading
1
A National Strategy for Advanced Air Mobility
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43US Department of Transportation Secretary Sean Duffy last week unveiled the country's first ever "Advanced Air Mobility (AAM) National Strategy," setting up a roadmap to help accelerate American aviation innovation and transform our skies. AAM is a rapidly-emerging aerospace sector focused on safely and efficiently integrating highly automated airc…
…
continue reading
1
CYFIRMA Research- NexusRoute: Attempting to Disrupt an Indian Government Ministry
6:51
6:51
Play later
Play later
Lists
Like
Liked
6:51New Research Alert: NexusRoute Campaign Uncovered We’ve uncovered a large-scale Android malware and phishing operation impersonating Indian government services like mParivahan and e-Challan. Threat actors are abusing GitHub to host malicious APKs and fake payment portals, tricking users into sharing OTPs, UPI PINs, and financial details. The malwar…
…
continue reading
1
S&P 500 Closes at Record High in Tech-Led Advance
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12Watch Bloomberg Businessweek Daily LIVE every day on YouTube: http://bit.ly/3vTiACF. Wall Street traders parsing a batch of economic reports in a session marked by a slowdown in transactions drove stocks to all-time highs. Short-dated bonds underperformed. The dollar fell. In a narrow tech-led advance, the S&P 500 rose for a fourth straight day. Vo…
…
continue reading