Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Security Risks And Solutions Podcasts

show episodes
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Brutally Honest Security

Barricade Cyber Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
  continue reading
 
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
  continue reading
 
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
  continue reading
 
Artwork

801
RANE Podcast Series

RANE Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This podcast series offers risk intelligence and analysis from RANE Network. RANE is a risk intelligence company that provides business professionals with access to critical insights, analysis, and support, enabling them to better anticipate, monitor, and respond to emerging risks and threats. In the RANE podcast series, risk management experts and thought leaders share best practices for managing business risk, geopolitical risk, physical and cyber security risks, compliance risk, and other ...
  continue reading
 
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
  continue reading
 
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
  continue reading
 
Artwork

1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™

Startuprad.io – Europe’s Startup & VC Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
  continue reading
 
Artwork

1
Smells Like Identity Hygiene

SPHERE - Identity Hygiene Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
  continue reading
 
Cybersecurity. Privacy. Blockchain. Unfiltered. The Efani Features Podcast is your trusted guide to the evolving world of digital security. Hosted by Mark Kreitzman of Efani, each episode dives deep into the critical issues shaping our digital future - from SIM swap threats and mobile privacy to crypto security and blockchain innovation. Join leading experts, ethical hackers, founders, and privacy advocates as we unpack real-world threats, explore cutting-edge solutions, and share practical ...
  continue reading
 
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
  continue reading
 
Artwork

1
Cyber security risks and solutions

Cyber security risks and solut

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
  continue reading
 
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
  continue reading
 
Artwork
 
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Cybersecurity

Senthilvel Kumar

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
YASH cyber security solutions are helping global corporations address a plethora of cyber risks proactively and reactively. We help our customers to grow their business securely, we understand your world.
  continue reading
 
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
  continue reading
 
Artwork

1
The AI Security Edge

theaisecurityedge

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
  continue reading
 
Artwork

1
The Cyber Cookie

CommSec Communications and Security Limited

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
  continue reading
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Artwork
 
Nuix creates innovative software that empowers organizations to simply and quickly find the truth from any data in a digital world. We are a passionate and talented team, delighting our customers with software that transforms data into actionable intelligence. Using Nuix software, customers can overcome the challenges of litigation, investigation, risk, compliance, and security by asking the right questions and getting complete, timely answers. Our collaborative data analytics algorithms and ...
  continue reading
 
The world of healthcare is rapidly evolving. Join us in exploring the trends, strategies and innovations that are reshaping the industry. Powered by Taylor Healthcare, the Digital Healthcare Experience is a platform for conversations with leaders on the forefront of the digital healthcare revolution. Watch our videos on YouTube @TheDigitalHealthcareExperience This podcast is your gateway to the latest trends and breakthroughs in digital health. In each episode our hosts from Taylor Healthcar ...
  continue reading
 
LegalFuel is the official Florida Bar Podcast. This monthly series is brought to you by The Practice Resource Center of The Florida Bar and will feature esteemed leaders in law discussing new and innovative topics. Its purpose is to help members of The Florida Bar as well as attorneys from other states run better practices and provide better legal services to their clients. Disclaimer: The views expressed by the participants of this program are their own and do not represent the views of, no ...
  continue reading
 
Artwork

1
TechSurge: Deep Tech Podcast

Celesta Capital | Deep Tech Venture Capital Firm

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, geopolitics, and business, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Send feedback and show ideas to [email protected]. Each discussion delves into the intersection of technology advancement, market dynamics, and the founder journey, offering insigh ...
  continue reading
 
Artwork

1
The Daily Threat

QIT Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
Artwork

51
Beers & Bytes Podcast

Beers & Bytes Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Beer is one of the oldest and most widely consumed alcoholic drinks in the world, and the third most popular drink overall after water and tea. Cybersecurity is required today for businesses to protect themselves from the persistent threat of malware and ransomware. Hosts Chris Jordan, CEO of Fluency Security, and Jeremy Murtishaw, CEO of Fortify 24x7 discuss cybersecurity, information technology, and hockey with their guests while enjoying some of their favorite beers. Grab your favorite be ...
  continue reading
 
Artwork

1
Day 2 Day

Jonny Crosthwaite & Glen T

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We are obsessed with success and know that it’s a journey, not a destination. We are fascinated with successful individuals in all business sectors, who are working on their goals or bettering themselves on a day 2 day basis.
  continue reading
 
Loading …
show series
 
Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
  continue reading
 
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
  continue reading
 
In this episode of Essential Geopolitics, RANE’s Latin America Analyst Mario Braga and RANE’s Senior Middle East and North Africa Analyst Ryan Bohl explain the dynamics of the current situation between Venezuela and the U.S. and deep dive into the complex history of the relationship that shapes the outlook for various cooperative and/or conflict-ri…
  continue reading
 
In this episode, we sit down with Ahmad "AK" Khater, Founder and CEO of iTXPROS, to explore the rise of digital dentistry and what it means for the future of dental care. Tune in to discover how technology is helping dentistry move from classical to digital...one byte at a time. Watch the full video here. You'll learn: What digital dentistry really…
  continue reading
 
AI-Powered Compliance: Transforming Enterprise Security In this episode of Cyber Sentries, John Richards speaks with Richa Kaul, CEO and founder of Complyance. Richa shares insights on using modular AI systems for enterprise security compliance and discusses the critical balance between automation and human oversight in cybersecurity. Why Enterpris…
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
In this episode of the Connected Intelligence Podcast, Jim McConnell shares insights from more than three decades in corporate and critical infrastructure security, exploring the evolution of converged security and safety metrics. Together with Manish, he discusses how organizations can move beyond silos to create unified, data-driven security stra…
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
Many organisations are rethinking their cloud strategies and searching for smarter, more secure solutions. Private cloud is gaining traction as an alternative, combining the agility and scalability of public cloud with the added control and protection of a dedicated environment. In this episode, we explore how VMware is redefining the private cloud…
  continue reading
 
Today’s guest has one of the most unconventional origin stories in the MSP world. Nabil Aitoumeziane started his career not behind a keyboard—but at the door of a nightclub. While working nights as a bouncer, he began doing something few would dare: asking customers for business introductions and meetings. Fast-forward a few years, and he’s now the…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
Amy Hogan-Burney, Corporate Vice President of Customer Trust and Security at Microsoft joins Ann on this week's episode of Afternoon Cyber Tea to discuss her unexpected journey into cybersecurity, Microsoft’s evolving approach to combating global cybercrime, and the importance of collaboration across the private and public sectors. She reflects on …
  continue reading
 
Imagine a criminal enterprise so sophisticated it employs lawyers, creates flashy recruitment videos, and operates its own university. Welcome to the modern ransomware ecosystem, expertly decoded by threat intelligence researcher Tammy Harper in this eye-opening episode. Harper pulls back the curtain on the surprisingly corporate structure of ranso…
  continue reading
 
Modern data analytic methods and tools—including artificial intelligence (AI) and machine learning (ML) classifiers—are revolutionizing prediction capabilities and automation through their capacity to analyze and classify data. To produce such results, these methods depend on correlations. However, an overreliance on correlations can lead to predic…
  continue reading
 
In this episode of RANE Insights, Founder of RANE David Lawrence sits down with Dr. Mark Gold to discuss causes and implications of the recent increase of global cocaine production and use. Mark S. Gold, M.D., is an author, inventor, and mentor who has had over 1,000 peer-reviewed publications since beginning his academic career at the University o…
  continue reading
 
Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
  continue reading
 
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 279 ~ Watch Now ~ In this AMA edition of DailyCyber, we go deep on what’s actually happening in cybersecurity leadership today. From emotional regulation in the SOC to unapproved AI tools in the workplace, this episode unpacks the real conversations CISOs and vCISOs are having b…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
In September 2025, Nepal’s government banned major social-media platforms, which ignited wider youth protests over corruption, unemployment, and elite privilege. After days of deadly protests, Prime Minister K.P. Sharma Oli resigned, paving the way for an interim leader to take charge and call for fresh elections for March 2026. This is the most re…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Today we’re talking about one of the biggest shifts in offensive security that MSPs, CISOs, and defenders cannot ignore. For years, pen testing was about human creativity — sneaking in where we “shouldn’t” be, showing you how you’d really get burned in an incident. But in 2025, that world is colliding with AI and automated attack platforms that cla…
  continue reading
 
In Episode 4 of Brutally Honest Security, host Eric Taylor takes aim at one of the most revealing cyber-incidents of the year: the Information Commissioner’s Office’s £14 million penalty against Capita plc and subsidiary CPSL following a breach that exposed 6.6 million individuals and almost one terabyte of data. You’ll hear: • 📉 How an infected fi…
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
🏁 The Deep Dive is here. Germany, Austria and Switzerland enter a new startup cycle where the headline isn’t “Who raised the biggest check?” but “Who’s building the most defensible foundation?” Hosts Jörn ‘Joe’ Menninger and Chris Fahrenbach break down October 2025’s most important stories in AI, fintech, venture capital, and climate tech. 🔎 What Y…
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
How can you ever know whether an LLM is safe to use? Even self-hosted LLM systems are vulnerable to adversarial prompts left on the internet and waiting to be found by system search engines. These attacks and others exploit the complexity of even seemingly secure AI systems. In our latest podcast from the Carnegie Mellon University Software Enginee…
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
What if Europe — not Silicon Valley — defined the future of AI? In this October 2025 episode of Startuprad.io Startup News, hosts Jörn “Joe” Menninger and Chris Fahrenbach break down the latest stories shaping Europe’s AI Supercluster, led by DeepL, Black Forest Labs, and N8N. From record climate tech funding to biotech breakthroughs and industrial…
  continue reading
 
Featuring Dr. Lindsey Jarrett, PhD, Vice President at the Center for Practical Bioethics. Watch the full video here. How can healthcare organizations create responsible policies for AI and emerging technologies so innovation doesn't outpace ethics? In this episode, we dive into the world of practical bioethics, exploring how it can help healthcare …
  continue reading
 
Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
  continue reading
 
When you're a lawyer, keeping accurate records is crucial. It's not just about good business; it's about protecting yourself from potential disciplinary action and ensuring you can deliver the best service to your clients. A bad record-keeping system can lead to lost files, missed deadlines, and a host of other issues that can land you in trouble. …
  continue reading
 
In this episode, host Fred Burton and co-host Cindy Marble sit down with Michael Evanoff, CSO at Verkada, to discuss his remarkable career spanning corporate security and diplomatic protection. Evanoff reflects on his experiences at the U.S. Department of State and in the private sector, sharing lessons on leadership, collaboration, and adapting pr…
  continue reading
 
Eric Taylor slices through the week’s noise in Brutally Honest Security — no spin, only sharp, actionable insight. This episode covers the crucial headlines every security pro should know: 🔧 Microsoft’s October Patch Tuesday: a record-scale release — 172 vulnerabilities patched, including multiple zero-days — and why patch prioritization matters no…
  continue reading
 
Imagine waking up to find your entire crypto portfolio, 1.2 million XRP, gone overnight. That’s exactly what happened to Brandon LaRoque, a longtime XRP investor who lost $3 million in a single hack. In this emotional and brutally honest episode of the Efani Features Podcast, host Mark Kreitzman sits down with Brandon to unpack one of the most deva…
  continue reading
 
Political instability is on the rise in Africa, driven by a new wave of youth activism. Gen Z is increasingly vocal in demanding political and economic reforms, as seen in Morocco and Madagascar. In Morocco, the Gen Z 212 protests began in late September, criticizing the government's public service provision, corruption in the government and the cu…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
Darren Kane, Chief Security Officer at NBN, Australia’s national broadband network joins Ann on this week's episode of Afternoon Cyber Tea to shares insights from his unique journey through law enforcement, financial enforcement, and corporate security, and how those experiences shaped his leadership of a converged security organization that unites…
  continue reading
 
"Basically, everyone just do whatever they feel like and then call it intelligence." With these provocative words, Freddy Murre cuts straight to the heart of what's wrong with most cyber threat intelligence practices today. Drawing from 13 years of intelligence experience spanning military operations and private sector work, Freddy exposes the crit…
  continue reading
 
As Microsoft wraps up a decade of Windows 10 support, we’re seeing a real moment of decision for businesses. If you haven’t made the move yet, it’s time to ask - are we upgrading, adapting, or exposing ourselves to risk? With cyber threats ramping up and support winding down, knowing your options isn’t just helpful - it’s essential. This time we're…
  continue reading
 
Today we’re tackling one of the biggest shifts in modern network security. VPNs are breaking under the weight of hybrid work, SaaS sprawl, and constant attack — and MSPs are being forced to rethink how they secure access itself. Enter Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) — not just buzzwords, but the blueprint for …
  continue reading
 
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play