Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
Cyber Security Risks And Solutions Podcasts
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
The DailyCyber Podcast and New Live Stream every Tuesday evening at 5:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of ...
…
continue reading
This podcast series offers risk intelligence and analysis from RANE Network. RANE is a risk intelligence company that provides business professionals with access to critical insights, analysis, and support, enabling them to better anticipate, monitor, and respond to emerging risks and threats. In the RANE podcast series, risk management experts and thought leaders share best practices for managing business risk, geopolitical risk, physical and cyber security risks, compliance risk, and other ...
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
The Defence Horizon Journal Podcasts are part of the blog on security and defence-related topics. For more information visit www.tdhj.org
…
continue reading
Guard Street is a leading holistic cybersecurity provider, specializing in world-class proactive and emergency solutions. As a boutique, we are dedicated to assisting clients with information security risk management which includes risk quantification, compliance across many frameworks, penetration tests and the ability to predict, prevent, detect and respond to security incidents in a fast-moving, distributed landscape.
…
continue reading
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™
Startuprad.io – Europe’s Startup & VC Podcast Network
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
…
continue reading
1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
…
continue reading
YASH cyber security solutions are helping global corporations address a plethora of cyber risks proactively and reactively. We help our customers to grow their business securely, we understand your world.
…
continue reading
Cybersecurity. Privacy. Blockchain. Unfiltered. The Efani Features Podcast is your trusted guide to the evolving world of digital security. Hosted by Mark Kreitzman of Efani, each episode dives deep into the critical issues shaping our digital future - from SIM swap threats and mobile privacy to crypto security and blockchain innovation. Join leading experts, ethical hackers, founders, and privacy advocates as we unpack real-world threats, explore cutting-edge solutions, and share practical ...
…
continue reading
Welcome to the PRMA Risk Ready podcast, the show for Risk Management Professionals in the High Net Worth Space.
…
continue reading
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
…
continue reading
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
…
continue reading
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
1
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
The Small Business Cyber Security Guy
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
…
continue reading
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
…
continue reading
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
Nuix creates innovative software that empowers organizations to simply and quickly find the truth from any data in a digital world. We are a passionate and talented team, delighting our customers with software that transforms data into actionable intelligence. Using Nuix software, customers can overcome the challenges of litigation, investigation, risk, compliance, and security by asking the right questions and getting complete, timely answers. Our collaborative data analytics algorithms and ...
…
continue reading
LegalFuel is the official Florida Bar Podcast. This monthly series is brought to you by The Practice Resource Center of The Florida Bar and will feature esteemed leaders in law discussing new and innovative topics. Its purpose is to help members of The Florida Bar as well as attorneys from other states run better practices and provide better legal services to their clients. Disclaimer: The views expressed by the participants of this program are their own and do not represent the views of, no ...
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, geopolitics, and business, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Send feedback and show ideas to [email protected]. Each discussion delves into the intersection of technology advancement, market dynamics, and the founder journey, offering insigh ...
…
continue reading
Beer is one of the oldest and most widely consumed alcoholic drinks in the world, and the third most popular drink overall after water and tea. Cybersecurity is required today for businesses to protect themselves from the persistent threat of malware and ransomware. Hosts Chris Jordan, CEO of Fluency Security, and Jeremy Murtishaw, CEO of Fortify 24x7 discuss cybersecurity, information technology, and hockey with their guests while enjoying some of their favorite beers. Grab your favorite be ...
…
continue reading
We are obsessed with success and know that it’s a journey, not a destination. We are fascinated with successful individuals in all business sectors, who are working on their goals or bettering themselves on a day 2 day basis.
…
continue reading
1
This Month in German, Swiss and Austrian Startups - December 2025 Deep Dive
23:55
23:55
Play later
Play later
Lists
Like
Liked
23:55A decision-grade map of DACH execution signals for 2026: where regulation creates demand, where AI credibility is earned, and which business models are being repriced. This episode breaks down what actually changed in the DACH startup ecosystem heading into 2026. - Europe's AI advantage in regulated and industrial applications - Why integration and…
…
continue reading
1
Lorrie Cranor: Why Security Fails Real People
23:45
23:45
Play later
Play later
Lists
Like
Liked
23:45Dr. Lorrie Cranor, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vice President, Microsoft, on this week's episode of Afternoon Cyber Tea to discuss the critical gap between security design and real-world usability. They explore why security tools often fail users, the ongoing challe…
…
continue reading
1
Season 1 - Episode 22 (Pedro Kertzman & Valerii Soloninka)
28:36
28:36
Play later
Play later
Lists
Like
Liked
28:36Curiosity can rewrite a career—and change how an investigation ends. We sit down with Valeri Soloninka, a Russian-speaking cybersecurity professional now protecting government entities in the UAE, to trace a path from hands-on engineering to enterprise SOC work and into the high-impact world of operational and tactical cyber threat intelligence. Al…
…
continue reading
1
The Horizon Audiofiles - Ep 070 - Challenges And Opportunities In A Dynamic Cyber Hybrid Landscape
19:19
19:19
Play later
Play later
Lists
Like
Liked
19:19The article contends that security is now defined as much by protecting cognition as by defending machines or borders, with hybrid threats targeting both technological systems and human perception through advanced AI, deepfakes, and automated manipulation tools. As AI becomes integral to defence, the article emphasises the necessity of rigorous, et…
…
continue reading
The DACH startup ecosystem closed 2025 with unusually clear signals for 2026 — AI mega-rounds, defense-grade dual use, and a restructuring of Europe’s venture capital stack. What you’ll learn in this episode: – Why €3B AI valuations change Europe’s startup narrative – How dual use moved from story to category – What founders must understand about c…
…
continue reading
A short update on our publishing schedule. A technical issue caused a brief pause — all content is safe, and we’re back to regular releases from here. 🚪 Connect with Us Partner with us: [email protected] Subscribe: https://linktr.ee/startupradio Feedback: https://forms.gle/SrcGUpycu26fvMFE9 Follow Joe on LinkedIn: http://www.linkedin.com/c…
…
continue reading
1
Simplifying ISO Standards: Insights and Best Practices | Interview with Jim Moran
58:01
58:01
Play later
Play later
Lists
Like
Liked
58:01In this episode of the Secure and Simple Podcast, host Dejan Kosutic, CEO of Advisera, welcomes Jim Moran, founder of SimplifyISO, to discuss the importance and methods of simplifying ISO management systems. Jim, with over 30 years of consulting experience, shares valuable insights on how overly complex management systems can hinder employee unders…
…
continue reading
1
Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya
53:48
53:48
Play later
Play later
Lists
Like
Liked
53:48Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya ~ Watch Now ~ In this episode of DailyCyber, I sit down with Oscar Hedaya, founder and inventor of The Space Safe, the world’s first next-generation connected safe designed to bridge the gap between physical security and modern cyber threats. For decades, safes…
…
continue reading
1
The Horizon Audiofiles - Ep 069 - Cybersecurity, Ethical Governance, And The Risks Of AI Integration
11:09
11:09
Play later
Play later
Lists
Like
Liked
11:09The article contends that security is now defined as much by protecting cognition as by defending machines or borders, with hybrid threats targeting both technological systems and human perception through advanced AI, deepfakes, and automated manipulation tools. As AI becomes integral to defence, the article emphasises the necessity of rigorous, et…
…
continue reading
1
Securing AI Agents: How to Stop Credential Leaks and Protect Non‑Human Identities with Idan Gour
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07Cast your vote for Cyber Sentries as Best Technology Podcast here! Bridging the AI Security Gap—Inside the Rise of Non‑Human Identities In this episode of Cyber Sentries from CyberProof, host John Richards sits down with Idan Gour, co-founder and president of Astrix Security, to unpack one of today’s fastest-emerging challenges: securing AI agents …
…
continue reading
1
Inside the Surge of Targeted Attacks: What It Means for Executive Protection
25:33
25:33
Play later
Play later
Lists
Like
Liked
25:33Host Fred Burton reunites with longtime colleague Scott Stewart, Vice President of Protective Intelligence at Torchstone Global, to unpack the evolving landscape of executive protection. Drawing on recent high-profile attacks and their own book, The Protective Intelligence Advantage, they explore how threat actors operate, what today’s organization…
…
continue reading
1
Your 2026 Business Plan – Impacts of AI, Cyber & Automation on MSPs.
1:02:05
1:02:05
Play later
Play later
Lists
Like
Liked
1:02:05Most MSPs don’t fail because of ransomware. They fail because they drift. They chase revenue without direction. They stack tools without a strategy. And they wake up one year later asking the same dangerous question: “Why didn’t last year change anything?” Today isn’t about theory. It’s about execution. Our guest Gary Pica, doesn’t just teach busin…
…
continue reading
1
The Role of AI in State-Sponsored Cyber Espionage Campaigns
19:00
19:00
Play later
Play later
Lists
Like
Liked
19:00Chinese nation-state actors were observed using Anthropic's Claude Code generative AI coding assistant in an espionage campaign first discovered in mid-September, according to a report from Anthropic released Nov. 13th. In this episode of Essential Geopolitics, RANE’s Cyber Intelligence Analyst Ali Plucinski explores the details of this campaign an…
…
continue reading
1
Inside Data Breaches and Human Behavior with Troy Hunt
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00Troy Hunt, founder of Have I Been Pwned, joins Ann on this week's episode of Afternoon Cyber Tea to explore what billions of breached records reveal about attacker behavior, human weakness, and the state of breach disclosure. He explains why organizations often hesitate to notify victims, how breach fatigue shapes user responses, and why transparen…
…
continue reading
1
Season 1 - Episode 21 (Pedro Kertzman & Charlotte Guiney)
26:49
26:49
Play later
Play later
Lists
Like
Liked
26:49What if your best career move starts where you least expect it? Charlotte joins us to share how a love for global history and policy, a bout of academic burnout, and a train-to-hire detour into agile software set the stage for a thriving path in cyber threat intelligence. Her story shows how curiosity, timing, and a willingness to say yes can turn …
…
continue reading
1
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 281 ~ Watch Now ~
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 281 ~ Watch Now ~ In this AMA edition of DailyCyber, I answer questions cybersecurity leaders face every day — from rebuilding income after a layoff to navigating account compromise scenarios. This episode is packed with insights on mindset, leadership, communication, and techni…
…
continue reading
1
German Startup Ecosystem 2025: AI Becomes Infrastructure & DeepTech Booms
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00AI is no longer the shiny object. It’s becoming infrastructure. And that single shift is transforming the German startup ecosystem in 2025 faster than most founders expected. This month, the DACH region crossed a new threshold: AI is moving from hype into the industrial backbone of Europe — compute scarcity is now strategic, sovereign cloud has bec…
…
continue reading
1
The Horizon Audiofiles - Ep 068 - The Future Challenges And Solutions Of Cybersecurity
19:02
19:02
Play later
Play later
Lists
Like
Liked
19:02Critical communication faces new challenges in terms of cybersecurity in the future. Lessons from Ukraine need to be understood and incorporated to better prepare modern societies. The rapid advancement of technology provides new solutions but also introduces more challenges. Being able to upgrade or adapt old systems to new technology rather than …
…
continue reading
1
Cyber Resilience, a National Solution with Herbert Fensury
30:01
30:01
Play later
Play later
Lists
Like
Liked
30:01Cyber crime is now a daily fact of life and a significant concern in both the private and public sectors but our response capabilities do not seem to be keeping up. This episode dives deep into one organization that is combatting this problem with a combination of academic research, industry expertise and hands-on training with the founder and CEO,…
…
continue reading
1
Mastering Internal Audits for ISO Standards | Interview with Carlos Cruz
1:05:55
1:05:55
Play later
Play later
Lists
Like
Liked
1:05:55In this episode of the Secure and Simple Podcast, host Dejan Kosutic, CEO at Advisera, welcomes Carlos Cruz, founder of Metanoia Consulting and a seasoned expert in ISO standards. Carlos and Dejan share best practices for performing internal audits across various ISO standards, including ISO 27001, and other cybersecurity frameworks such as NIS2 an…
…
continue reading
1
Holiday Scam Season: Spot It, Share It, Stop It
42:41
42:41
Play later
Play later
Lists
Like
Liked
42:41This week on Brutally Honest Security, host Eric Taylor flags a timely and critical risk: the surge in holiday-season scams. As festive shopping, deliveries, and goodwill ramp up, so do scams targeting unsuspecting shoppers, families, and well-meaning gift-givers. Topics covered: 🎯 The most common holiday scams - from fake retail sites and spoofed …
…
continue reading
1
The Horizon Audiofiles - Ep 067 - Defining Cognitive Warfare: Maximalist versus Minimalist Approach
30:27
30:27
Play later
Play later
Lists
Like
Liked
30:27Given the relevance, evolution, and proliferation of cognitive warfare in the modern age, it is necessary to delve deeper into the concept to gain an empirical understanding that can inform future policies and practices. Accordingly, a systematic literature review was carried out to define the concept in relation to six key aspects, namely its dema…
…
continue reading
1
European Tech Sovereignty: The November 2025 DACH Startup News Briefing
22:25
22:25
Play later
Play later
Lists
Like
Liked
22:25Europe's startup narrative is changing fast — from apps and valuations to sovereignty, infrastructure and resilience. In this month's DACH Startup News, we unpack the moves that made European tech sovereignty the defining theme of 2025. What you’ll learn: – Why sovereign cloud is becoming foundational for startups and enterprise buyers – How AI, ro…
…
continue reading
1
Inside the Adversary Mindset: Building Smarter Protection in a Connected World
28:24
28:24
Play later
Play later
Lists
Like
Liked
28:24On this episode of the Connected Intelligence Podcast, Manish Mehta sits down with Chris Wingfield, SVP of Innovations at 360Privacy, to explore the evolving landscape of digital targeting and executive protection. Chris shares how his background in intelligence and signals analysis informs his approach to building proactive, AI-driven cyber threat…
…
continue reading
1
Educating for Resilience: STEM, AI, and the Future of Cybersecurity
31:22
31:22
Play later
Play later
Lists
Like
Liked
31:22Brad L. Mortensen, President of Weber State University joins Ann on this week's episode of Afternoon Cyber Tea to discuss the evolving role of higher education in preparing the future cybersecurity workforce. Brad shares how Weber State supports students from all backgrounds through open enrollment, stackable credentials, real-world learning partne…
…
continue reading
1
Season 1 - Episode 20 (Pedro Kertzman & Sarah Freeman)
37:44
37:44
Play later
Play later
Lists
Like
Liked
37:44Remember when critical infrastructure defenders had to convince people that cyber attacks were even possible? Those days are gone. Today's challenge is prioritizing defenses in a landscape where threats are multiplying faster than resources. Sarah Freeman, Chief Engineer for Intelligence Modeling and Simulation at MITRE's Cyber Infrastructure Prote…
…
continue reading
1
Unlocking AI with the power of Private Cloud
36:00
36:00
Play later
Play later
Lists
Like
Liked
36:00Business leaders are setting AI strategies, and IT teams are expected to deliver results. Research from the IDC shows that 88% of all AI pilots fail to reach production. So enter Private Cloud AI, a new way to role out your AI adoption. In this episode we break down what Private Cloud AI is, why it matters, and how this technology is helping organi…
…
continue reading
1
Faster, Smarter, Scalable: The Future of M365 Management
59:10
59:10
Play later
Play later
Lists
Like
Liked
59:10Today’s conversation is all about what comes next for Microsoft 365 — because after Ignite, it’s clear that we’re entering a brand-new era. AI agents, identity-first security, native Sysmon, tenant baselines — Microsoft is rebuilding the entire stack around speed, intelligence, and scale. And when you talk about managing M365 at scale, there’s one …
…
continue reading
1
Board Certification: Elevating Your Firm (And You!)
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24Board certification recognizes an attorney’s special knowledge, skill, and experience in a specific area of law. Established in 1982 by the Florida Supreme Court, board certification helps consumers identify specialists in 27 different areas of practice. Although the certification program has been an option for over four decades, only around four p…
…
continue reading
1
Inside CyberHoot: How Smarter Cyber Training Stops Attacks Before They Start
36:18
36:18
Play later
Play later
Lists
Like
Liked
36:18What if the biggest cybersecurity threat in your company isn’t your tech — but your people? In this episode of the Efani Features Podcast, host Mark Kreitzman interviews Craig Taylor, veteran cybersecurity expert and CEO of CyberHoot, to uncover why outdated training models are failing — and how a psychology-driven, reward-based approach is changin…
…
continue reading
1
The Explosion of Security Data & Modern Detection with Joshua Scott | DailyCyber 280 ~ Watch Now ~
1:01:10
1:01:10
Play later
Play later
Lists
Like
Liked
1:01:10The Explosion of Security Data & Modern Detection with Joshua Scott | DailyCyber 280 ~ Watch Now ~ In this episode of DailyCyber, I sit down with Joshua Scott, VP of Security at Hydrolix, a leader with nearly 30 years of hands-on experience across enterprise security, cloud architecture, GRC, risk, IR, compliance, detection engineering, and product…
…
continue reading
1
AI Agents Are the New Attackers — Inside the Identity Security Platform Built for 2025
40:41
40:41
Play later
Play later
Lists
Like
Liked
40:41What if the biggest cyber risk inside your company wasn’t malware — but identity? In this episode, I sit down with Santhosh Jayaprakash, founder & CEO of UnoSecur, to unpack one of the fastest-moving transformations in cybersecurity: the rise of identity as the new perimeter. Attackers don’t break in anymore — they log in. And with AI agents, LLM w…
…
continue reading
1
The Horizon Audiofiles - Ep 066 - Deterrence And The Need For Strategic Culture In Germany
31:06
31:06
Play later
Play later
Lists
Like
Liked
31:06This essay examines Germany's lack of strategic culture and its implications for deterrence and security policy. Written in the aftermath of the MSC 2025 and the context of growing geopolitical instability, it highlights how Europe’s reliance on the United States, combined with a weak defence mindset, undermines the ability to deter adversaries. Th…
…
continue reading
In this episode of Essential Geopolitics, RANE’s Asia-Pacific Analyst, Nate Fischler unpacks the motivations behind Indonesia’s interest in the Israel-Gaza conflict and explores the major constraints and defining factors impacting the country’s domestic policy. Register here to receive a complimentary subscription to RiskBook, our curated email dig…
…
continue reading
1
Exploring Cyber Warfare: Risks, Strategies, and Solutions | Interview with Steve Winterfeld
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02In this episode of the Secure and Simple Podcast, host Dejan Kosutic, CEO of Advisera, welcomes Steve Winterfeld, a seasoned security consultant, fractional CISO, and author of the book 'Cyber Warfare Techniques, Tactics, and Tools for Security Practitioners.' The discussion revolves around the relevance of cyber warfare for companies, the differen…
…
continue reading
1
Lost Everything, Found Bitcoin: Self-Custody, Cold Storage & the Road to Digital Freedom
36:06
36:06
Play later
Play later
Lists
Like
Liked
36:06What happens when your bank fails, your government locks your money, and your savings vanish overnight? That’s exactly what happened to Tony Yazbeck, co-founder of The Bitcoin Way, when Lebanon's financial collapse wiped out his life savings. In this riveting episode of the Efani Features Podcast, host Mark Kreitzman talks with Tony about how that …
…
continue reading
1
The Ulimate Partner – Building an MSP Growth Engine with Microsoft
1:02:14
1:02:14
Play later
Play later
Lists
Like
Liked
1:02:14Today we’re talking about what it really takes to partner with a giant. Every MSP wants to grow alongside hyperscalers like Microsoft — but few truly know how to align, scale, and turn partnership into profit. Our guest today has lived that journey from the inside out. Vince Menzione, Founder of The Ultimate Partner and former Microsoft channel lea…
…
continue reading
1
The Horizon Audiofiles - Ep 065 - AI Enabled Cyberspace Operations
31:11
31:11
Play later
Play later
Lists
Like
Liked
31:11Artificial intelligence is reshaping the offence–defence balance in cyberspace. Drawing on recent cases (PromptLock ransomware, Auto-Exploit pipelines, and the Air Force’s DASH wargame) and a systematic review of academic articles, this study examines how AI alters tempo, cost, and thresholds in cyberspace operations. Findings show that AI accelera…
…
continue reading
1
U.S.-Venezuela Tensions: Primary Drivers and Constraints
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26In this episode of Essential Geopolitics, RANE’s Latin America Analyst Mario Braga and RANE’s Senior Middle East and North Africa Analyst Ryan Bohl explain the dynamics of the current situation between Venezuela and the U.S. and deep dive into the complex history of the relationship that shapes the outlook for various cooperative and/or conflict-ri…
…
continue reading
1
AI Compliance Security: How Modular Systems Transform Enterprise Risk Management with Richa Kaul
31:26
31:26
Play later
Play later
Lists
Like
Liked
31:26Cast your vote for Cyber Sentries as Best Technology Podcast here! AI-Powered Compliance: Transforming Enterprise Security In this episode of Cyber Sentries, John Richards speaks with Richa Kaul, CEO and founder of Complyance. Richa shares insights on using modular AI systems for enterprise security compliance and discusses the critical balance bet…
…
continue reading
1
From Statistics to Metrics: Jim McConnell's Guide to Measuring Security's Effectiveness
31:13
31:13
Play later
Play later
Lists
Like
Liked
31:13In this episode of the Connected Intelligence Podcast, Jim McConnell shares insights from more than three decades in corporate and critical infrastructure security, exploring the evolution of converged security and safety metrics. Together with Manish, he discusses how organizations can move beyond silos to create unified, data-driven security stra…
…
continue reading
Join us as we discuss the realities of nation-state cyber threats, the booming ransomware economy, and essential strategies for small-to-mid-sized companies to safeguard their critical assets. This 30-minute talk draws from real-world examples like SolarWinds and Colonial Pipeline, offering actionable advice on identifying "crown jewels" and implem…
…
continue reading
1
VMware Explore on Tour - is Private Cloud the solution your business needs?
35:33
35:33
Play later
Play later
Lists
Like
Liked
35:33Many organisations are rethinking their cloud strategies and searching for smarter, more secure solutions. Private cloud is gaining traction as an alternative, combining the agility and scalability of public cloud with the added control and protection of a dedicated environment. In this episode, we explore how VMware is redefining the private cloud…
…
continue reading
1
From Bouncer to MSP Baller – How to Make Microsoft Notice Your MSP
1:02:19
1:02:19
Play later
Play later
Lists
Like
Liked
1:02:19Today’s guest has one of the most unconventional origin stories in the MSP world. Nabil Aitoumeziane started his career not behind a keyboard—but at the door of a nightclub. While working nights as a bouncer, he began doing something few would dare: asking customers for business introductions and meetings. Fast-forward a few years, and he’s now the…
…
continue reading
1
How Microsoft Is Redefining Global Cyber Defense
35:30
35:30
Play later
Play later
Lists
Like
Liked
35:30Amy Hogan-Burney, Corporate Vice President of Customer Trust and Security at Microsoft joins Ann on this week's episode of Afternoon Cyber Tea to discuss her unexpected journey into cybersecurity, Microsoft’s evolving approach to combating global cybercrime, and the importance of collaboration across the private and public sectors. She reflects on …
…
continue reading
1
Season 1 - Episode 19 (Pedro Kertzman & Tammy Harper)
40:08
40:08
Play later
Play later
Lists
Like
Liked
40:08Imagine a criminal enterprise so sophisticated it employs lawyers, creates flashy recruitment videos, and operates its own university. Welcome to the modern ransomware ecosystem, expertly decoded by threat intelligence researcher Tammy Harper in this eye-opening episode. Harper pulls back the curtain on the surprisingly corporate structure of ranso…
…
continue reading
1
Cocaine's Comeback: Past Lessons We Ignored.
48:24
48:24
Play later
Play later
Lists
Like
Liked
48:24In this episode of RANE Insights, Founder of RANE David Lawrence sits down with Dr. Mark Gold to discuss causes and implications of the recent increase of global cocaine production and use. Mark S. Gold, M.D., is an author, inventor, and mentor who has had over 1,000 peer-reviewed publications since beginning his academic career at the University o…
…
continue reading
1
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 279 ~ Watch Now ~
1:00:04
1:00:04
Play later
Play later
Lists
Like
Liked
1:00:04Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 279 ~ Watch Now ~ In this AMA edition of DailyCyber, we go deep on what’s actually happening in cybersecurity leadership today. From emotional regulation in the SOC to unapproved AI tools in the workplace, this episode unpacks the real conversations CISOs and vCISOs are having b…
…
continue reading