Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Cyber Security Podcasts
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
…
continue reading
Join in on weekly podcasts that aim to illuminate how AI transforms cybersecurity—exploring emerging threats, tools, and trends—while equipping viewers with knowledge they can use practically (e.g., for secure coding or business risk mitigation).
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Thuis aan de keukentafel praat Roel Rens met Microsoft- en IT-experts over actuele IT-topics.
…
continue reading
We are going to teach you how to defend yourself against cybercrime, privacy abuse, vehicle hacking, bomb drones and cyber warfare, REGARDLESS of your proficiency with computers. Because you don't have to be technical to survive the Digital Age!
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
The DailyCyber Podcast and New Live Stream every Tuesday evening at 5:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of ...
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
The Next Five is the FT’s partner-supported podcast, exploring the future of industries through expert insights and thought-provoking discussions with host Tom Parker. Each episode brings together leading voices to analyse the trends, innovations, challenges and opportunities shaping the next five years in business, technology, health and lifestyle This content is paid for by advertisers and is produced in partnership with the Financial Times’ Commercial Department Hosted on Acast. See acast ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The purpose of "FounderStoriez Channel" is to interview Entrepreneurs from around the world to share their story, experience, and wisdom with you so you can learn from them and be inspired.
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC). Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy. It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates. Security & GRC ...
…
continue reading
4
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Conversations at the crossroads of data, AI, governance, cybersecurity, and digital transformation. Join Kate Carruthers as she dives into the world of data, AI, governance, cybersecurity, and digital transformation. Each episode explores how technology is changing business, society, and everyday life. From protecting privacy to powering innovation, this podcast breaks down the trends and ideas shaping the future of our digital world - all in clear, engaging conversations you’ll actually enj ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
1
Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security
56:51
56:51
Play later
Play later
Lists
Like
Liked
56:51Question? Text our Studio direct. Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over th…
…
continue reading
1
Lorrie Cranor: Why Security Fails Real People [Afternoon Cyber Tea]
23:45
23:45
Play later
Play later
Lists
Like
Liked
23:45While our team is out on winter break, please enjoy this episode of Afternoon Cyber Tea with Ann Johnson from our partners at Microsoft Security. Dr. Lorrie Cranor, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vice President, Microsoft, on this week's episode of Afternoon Cyber Tea …
…
continue reading
1
Dune Security's Revolutionary Approach: AI and Cybersecurity
34:08
34:08
Play later
Play later
Lists
Like
Liked
34:08*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id= "request-WEB:0cf8a03d-e57a-43f6-9f7c-26bb6994647d-20" data-testid= "conversation-turn-42" data-scroll-anchor="true" data-turn= "assistant"> 🎙 Episode 48: AI and Cybersecurity — How Dune Security Is Reinventing User Risk M…
…
continue reading
1
SANS Stormcast Sunday, December 28th, 2025: MongoDB Unauthenticated Memory Leak CVE-2025-14847
5:50
5:50
Play later
Play later
Lists
Like
Liked
5:50MongoDB Unauthenticated Attacker Sensitive Memory Leak CVE-2025-14847 Over the Christmas holiday, MongoDB patched a sensitive memory leak vulnerability that is now actively being exploited https://www.mongodb.com/community/forums/t/important-mongodb-patch-available/332977 https://github.com/mongodb/mongo/commit/505b660a14698bd2b5233bd94da3917b585c5…
…
continue reading
Este documento sintetiza un análisis del abuso sexual basado en imágenes (IBSA), trazando su evolución desde hackeos dirigidos a celebridades hasta la amenaza actual de los "deepfakes" generados por IA. Las fuentes revelan un cambio significativo en la comprensión y la terminología, alejándose de la etiqueta engañosa "pornografía de venganza" hacia…
…
continue reading
1
teissTalk: 2026 predictions for OT security and the future of cyber physical systems
43:18
43:18
Play later
Play later
Lists
Like
Liked
43:18Exploitable vulnerabilities within OT devices and how this is expected to change Cyber warfare risk in 2026 - how organisations can defend themselves Securing the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjord…
…
continue reading
1
Defensive Security Podcast Episode 334
1:07:21
1:07:21
Play later
Play later
Lists
Like
Liked
1:07:21Want to be the first to hear our episodes each week? Become a Patreon donor here. Merry Christmas and Happy Holidays! Links to this week’s stories: https://krebsonsecurity.com/2025/12/most-parked-domains-now-serving-malicious-content/ https://thehackernews.com/2025/12/russia-linked-hackers-use-microsoft-365.html?m=1 https://cybersecuritynews.com/am…
…
continue reading
1
Episode 101: Episode 101 - Part 2 - Security knowledge alone is not enough
25:01
25:01
Play later
Play later
Lists
Like
Liked
25:01In Part 2 of this series, Richard continues with the lessons needed to get you to the next level in your security journey.
…
continue reading
1
Live Special: Securing the Connected World with Thomas Harvey
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15In this special live episode of Cyber Leaders, Ciaran sits down with Thomas Harvey, CISO at Santander UK. As one of the UK’s leading operational cybersecurity figures, Thomas discusses the growing need for cross-sector collaboration, why a more connected security community is essential to national cyber resilience, and how building trust can help c…
…
continue reading
1
CCT 307: Practice CISSP Questions - Security Policies and Procedures
20:17
20:17
Play later
Play later
Lists
Like
Liked
20:17Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Headlines say the talent shortage is easing, yet nearly half of UK busine…
…
continue reading
1
Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya
53:48
53:48
Play later
Play later
Lists
Like
Liked
53:48Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya ~ Watch Now ~ In this episode of DailyCyber, I sit down with Oscar Hedaya, founder and inventor of The Space Safe, the world’s first next-generation connected safe designed to bridge the gap between physical security and modern cyber threats. For decades, safes…
…
continue reading
1
Securing AI Agents: How to Stop Credential Leaks and Protect Non‑Human Identities with Idan Gour
32:41
32:41
Play later
Play later
Lists
Like
Liked
32:41Bridging the AI Security Gap—Inside the Rise of Non‑Human Identities In this episode of Cyber Sentries from CyberProof, host John Richards sits down with Idan Gour, co-founder and president of Astrix Security, to unpack one of today’s fastest-emerging challenges: securing AI agents and non-human identities (NHIs) in the modern enterprise. As compan…
…
continue reading
While our team is out on winter break, please enjoy this episode of Research Saturday. Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishin…
…
continue reading
1
Stop Taking Bad Advice. An Open Letter To The World
4:02
4:02
Play later
Play later
Lists
Like
Liked
4:02Question? Text our Studio direct. We’ve trained people to fear nation-state hackers…while getting breached by rushed clicks and skipped updates. Cybercrime doesn’t win because it’s smart. It wins because people are tired. We’ve been trained to panic about rare, cinematic attacks… while leaving the front door unlocked every single day. The boring tr…
…
continue reading
1
The Illusion of Security: How IAM Anti-Patterns Sneak into Every System
6:42
6:42
Play later
Play later
Lists
Like
Liked
6:42This story was originally published on HackerNoon at: https://hackernoon.com/the-illusion-of-security-how-iam-anti-patterns-sneak-into-every-system. IAM isn’t security by default. Learn how common IAM anti-patterns create false confidence, enable breaches, and how to fix them before it’s too late. Check more stories related to cybersecurity at: htt…
…
continue reading
Tech giants say artificial intelligence can outsmart the storm, predicting tomorrow’s weather faster than ever. We return to a conversation we had with Paris Perdikaris of the University of Pennsylvania. He tells us about a new tension: forecasts are only as good as the public data that fuels them – and now even that is in doubt. Learn about your a…
…
continue reading
1
NYC Inauguration bans Flipper Zero, UK taxes crypto, Finland seizes ship
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15NYC mayoral inauguration bans Flipper Zero and Raspberry Pi devices Crypto must now share account details with UK tax officials Finland seizes suspected cable sabotage ship Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to impleme…
…
continue reading
While our team is out on winter break, please enjoy this episode of Cyber Things from our partners at Armis. Welcome to Episode 2 of Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire in an homage to Stranger Things. Host Rebecca Cradick, VP of Global Communications at Armis, is joined by Curtis Simpson…
…
continue reading
1
James McLeary: When a Nation-State Attack Tests a CISO
36:16
36:16
Play later
Play later
Lists
Like
Liked
36:16What do you do when a nation-state attack hits just days into a new CISO role and it’s already Friday? In this episode of THEOS Cybernova, James McLeary shares real-world lessons from leading a live cyber incident response under intense pressure. From coordinating multiple DF/IR firms to fast-tracking procurement in Asia, this conversation reveals …
…
continue reading
1
Ransomware Negotiations EXPOSED: Inside Cyber Hostage Deals with Kurtis Minder
1:02:27
1:02:27
Play later
Play later
Lists
Like
Liked
1:02:27Question? Text our Studio direct. Kurtis Minder, seasoned ransomware negotiator, shares insights into the complex world of cybercrime negotiations. He discusses the psychological aspects of negotiating with cybercriminals, the role of AI in both offense and defense, and the importance of understanding the motivations behind cybercrime. The conversa…
…
continue reading
1
CCT 311: Practice CISSP Questions and AI In The SOC (Domain 3)
28:42
28:42
Play later
Play later
Lists
Like
Liked
28:42Send us a text Ready to turn CISSP Domain 3.5 into practical moves you can deploy on Monday? We unpack how real SOC teams apply microsegmentation, identity-aware controls, and targeted inspection to crush lateral movement without dragging performance. Along the way, we demystify AI’s role: where detection engineering benefits from crisp use cases, …
…
continue reading
1
Unleash Protocol hackers drain millions, DarkSpectre campaigns exposed, Shai-Hulud attack led Trust Wallet heist
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14Hackers drain millions from Unleash Protocol DarkSpectre campaigns exposed Shai-Hulud attack led Trust Wallet heist Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us …
…
continue reading
1
Confronting China’s Expanding Cyber Threats [Threat Vector]
22:55
22:55
Play later
Play later
Lists
Like
Liked
22:55While our team is out on winter break, please enjoy this episode of Threat Vector from our partners at Palo Alto Networks. In this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outd…
…
continue reading
1
Hot sauce and hot takes: An Only Malware in the Building special.
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37While our team is out on winter break, please enjoy this episode of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally…
…
continue reading
1
After the Blast: How One CEO Fought Back 💥 | A True Crime
1:21:20
1:21:20
Play later
Play later
Lists
Like
Liked
1:21:20Question? Text our Studio direct. Robert Cioffi, CEO of a small company discusses the highly emotional impact that a major ransomware attack had on his, his customers and the community.The Emotional Toll of Cyber Attack was horrific to witness and made national news. Learn how to get prepared in this True Cyber Crime Story. Season 8 is officially h…
…
continue reading
1
End-of-Year Wrap: 2025 Threat Trends and Bold Predictions for 2026 🎆
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14Got a question or comment? Message us here! In this special end-of-year SOC Brief, Andrew breaks down the biggest threat-actor and ransomware trends that shaped 2025, and what cybersecurity teams should be preparing for in 2026. From AI-powered ransomware and supply-chain attacks to the growing blur between nation-state operations and cybercrime, t…
…
continue reading
1
The $50,000 PDF No One Reads: Why Your Security Audits Are Failing
4:50
4:50
Play later
Play later
Lists
Like
Liked
4:50This story was originally published on HackerNoon at: https://hackernoon.com/the-$50000-pdf-no-one-reads-why-your-security-audits-are-failing. Security isn't about generating paperwork; it's about finding the cracks before the water gets in. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check e…
…
continue reading
1
Silver Fox targets Indian users, Mustang Panda deploys ToneShell, will prompt injection ever be 'solved'?
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25Silver Fox targets Indian users Mustang Panda deploys ToneShell Will prompt injection ever be 'solved'? Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in…
…
continue reading
1
Audit ≠ Security: Building Auditable Controls in a High-Velocity World ft Varun Prasad, Cloud Security & Privacy Assurance @ BDO
59:17
59:17
Play later
Play later
Lists
Like
Liked
59:17Audits are often misunderstood, frequently disliked, and almost always viewed as a necessary evil — but what if that mindset is holding security teams back? In this episode of Security & GRC Decoded, Raj Krishnamurthy sits down with Varun Prasad to unpack what audits are actually designed to do: provide reasonable assurance, not absolute security. …
…
continue reading
1
Ransomware Is NOT the Greatest Threat | Here Is What's Coming
49:55
49:55
Play later
Play later
Lists
Like
Liked
49:55Question? Text our Studio direct. New Episode🔥The Cybercrime Junkies show discusses the evolution of ransomware, highlighting how it has shifted from simple file locking to direct extortion. We explore the latest ransomware trends and the significant ransomware impact on critical sectors like hospitals and supply chains. This ransomware attack stra…
…
continue reading
1
The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report [Microsoft Threat Intelligence Podcast]
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29While our team is out on winter break, please enjoy this episode of The Microsoft Threat Intelligence Podcast from our partners at Microsoft. In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a co…
…
continue reading
While our team is out on winter break, please enjoy this episode of Word Notes. A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks. CyberWire Glossary link: https://thecyberwire.com/glossary/simulated-phishing Audio r…
…
continue reading
1
Coupang recovers laptop in river, Trust Wallet reports 2k+ wallets drained, Sax discloses 2024 data breach
6:46
6:46
Play later
Play later
Lists
Like
Liked
6:46Coupang recovers laptop allegedly thrown into river Trust Wallet reports 2k+ wallets drained Sax discloses 2024 data breach Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. …
…
continue reading
Artificial intelligence is rewriting the rules of weather forecasting — spotting storms sooner, warning us faster, and increasing the potential to save lives. But cuts to NOAA and the National Weather Service threaten the very data that makes it possible. In this CyberMonday crossover with WAMU’s 1A, we hear from listeners as we return to an episod…
…
continue reading
1
Season finale: Leading security in a brave new world. [CISOP]
43:59
43:59
Play later
Play later
Lists
Like
Liked
43:59In the season finale of CSO Perspectives, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons an…
…
continue reading
1
The Department of Know: year in review and predictions
34:47
34:47
Play later
Play later
Lists
Like
Liked
34:47Link to episode page To end off a tumultuous year, our final Department of Know episode of 2025 features a chat between host Rich Stroffolino and producer Steve Prentice. Join them as they chat about the biggest stories of 2025, the trends we are seeing, and what we can expect in the new year. Thanks to our show sponsor, ThreatLocker Want real Zero…
…
continue reading
1
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
52:29
52:29
Play later
Play later
Lists
Like
Liked
52:29Question? Text our Studio direct. Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro…
…
continue reading
1
AI Surveillance: Unmasking Flock Safety’s Insecurities
51:20
51:20
Play later
Play later
Lists
Like
Liked
51:20Security researcher Jon “Gainsec” Gaines and YouTuber Benn Jordan discuss their examination of Flock Safety’s AI-powered license plate readers and how cost-driven design choices, outdated software, and weak security controls expose them to abuse. The post AI Surveillance: Unmasking Flock Safety’s Insecurities appeared first on The Security Ledger w…
…
continue reading
1
CCT 310: Wi-Fi Hopping And Database Defense - CISSP Training
43:57
43:57
Play later
Play later
Lists
Like
Liked
43:57Send us a text A neighboring Wi‑Fi, a handful of stolen credentials, and a quiet leap into a high‑value network—the kind of pivot that sounds cinematic until you realize how practical it is. We unpack that playbook and turn it into concrete defenses you can deploy across your environment, from client endpoints and browsers to databases, servers, an…
…
continue reading
1
The Audit 2025: Deepfakes, Quantum & AI That Changed Everything
22:57
22:57
Play later
Play later
Lists
Like
Liked
22:57In this special year-end episode, Joshua Schmidt revisits the most mind-bending moments from The Audit's 2025 season. From Justin Marciano and Paul Vann demonstrating live deepfakes in real-time (yes, they actually did it on camera) to Bill Harris explaining how Google's quantum experiments suggest parallel universes, to Alex Bratton's urgent warni…
…
continue reading
1
Rainbow Six Siege breach, backup generators for AI, LastPass reverberations
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Rainbow Six Siege suffers breach, gamers go shopping Diesel generators and aircraft engines in high demand to power AI LastPass 2022 breach reverberates through crypto world Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implem…
…
continue reading
AI is undoubtedly the technology of the year for hacks and scams. While scammers are busy using AI to make scams more convincing, scam baiters are fighting back with ingenious grandma-style AIs that keep scammers busy for hours on end. There have also been some spectacular busts of scam centers. What’s next, AI scammers chatting with AI scam baiter…
…
continue reading
1
The Hidden Risk in Your Stack [Data Security Decoded]
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik. In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and w…
…
continue reading