News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Cyber Security Risks And Solutions Podcasts
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
Welcome to the PRMA Risk Ready podcast, the show for Risk Management Professionals in the High Net Worth Space.
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
…
continue reading
This podcast series offers risk intelligence and analysis from RANE Network. RANE is a risk intelligence company that provides business professionals with access to critical insights, analysis, and support, enabling them to better anticipate, monitor, and respond to emerging risks and threats. In the RANE podcast series, risk management experts and thought leaders share best practices for managing business risk, geopolitical risk, physical and cyber security risks, compliance risk, and other ...
…
continue reading
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
…
continue reading

1
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
The Small Business Cyber Security Guy
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
…
continue reading
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
…
continue reading
YASH cyber security solutions are helping global corporations address a plethora of cyber risks proactively and reactively. We help our customers to grow their business securely, we understand your world.
…
continue reading
Where cybersecurity leaders spill their guarded secrets. Hosted by AlterAim, The Breach Room dives deep with CEOs, founders, and power players in the cybersecurity world. From breakthrough wins to high-stakes roadblocks, each episode unpacks real stories, industry insights, and battle-tested strategies driving the future of cyber defense. If you’re scaling a cybersecurity company, or just want to hear how the best do it. This is your inside access.
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven atta ...
…
continue reading
Welcome to Ciphered Reality – your trusted source for cybersecurity tips, tricks, and guidance. Powered by RITC Cybersecurity, this podcast is tailored for individuals and businesses looking to secure their digital assets in an increasingly connected world. We break down complex cybersecurity topics into simple, actionable insights to help you safeguard your data, identity, and online presence. Whether you’re a tech-savvy user or just getting started, Cybphered Reality helps you stay informe ...
…
continue reading
Bringing together leaders in the technology space to discuss the challenges they're facing and the solutions they're delivering.
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Nuix creates innovative software that empowers organizations to simply and quickly find the truth from any data in a digital world. We are a passionate and talented team, delighting our customers with software that transforms data into actionable intelligence. Using Nuix software, customers can overcome the challenges of litigation, investigation, risk, compliance, and security by asking the right questions and getting complete, timely answers. Our collaborative data analytics algorithms and ...
…
continue reading

1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Send feedback and show ideas to [email protected]. Each discussion delves into the intersection of technology advancement, market dynamics, and the founder journey, offe ...
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
Beer is one of the oldest and most widely consumed alcoholic drinks in the world, and the third most popular drink overall after water and tea. Cybersecurity is required today for businesses to protect themselves from the persistent threat of malware and ransomware. Hosts Chris Jordan, CEO of Fluency Security, and Jeremy Murtishaw, CEO of Fortify 24x7 discuss cybersecurity, information technology, and hockey with their guests while enjoying some of their favorite beers. Grab your favorite be ...
…
continue reading
We are obsessed with success and know that it’s a journey, not a destination. We are fascinated with successful individuals in all business sectors, who are working on their goals or bettering themselves on a day 2 day basis.
…
continue reading

1
Solving the Cyber Workforce Crisis - Ep 168
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40Women make up only a fraction of the cybersecurity workforce—and many hit a career ceiling just 6 to 10 years in. At the same time, millions of cyber roles remain unfilled, and the talent gap keeps growing. Lynn Dohm, Executive Director of Women in CyberSecurity (WiCyS), is working to change that. In this episode, Lynn shares how WiCyS has grown fr…
…
continue reading
What happens when the same AI tools that make coding easier also give cybercriminals new powers? In this episode of Cyberside Chats Live, we explore the rise of “vibe coding” and its darker twin, “vibe hacking.” You’ll learn how AI is reshaping software development, how attackers are turning those vibes into cybercrime, and what it means for the fu…
…
continue reading

1
Brutally Honest Security | Episode 1: September 22, 2025
2:25:01
2:25:01
Play later
Play later
Lists
Like
Liked
2:25:01When it comes to cybersecurity, sugarcoating is not an option. Brutally Honest Security cuts through the noise with raw, unfiltered insights from Eric Taylor — a seasoned digital forensics and incident response (DFIR) expert known for his “no-holds-barred” style. Each episode dives straight into the heart of information security: 🔥 Ransomware updat…
…
continue reading

1
Disruption is Coming for the Vulnerability Management Market - Tod Beardsley - ESW #425
1:47:15
1:47:15
Play later
Play later
Lists
Like
Liked
1:47:15Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
…
continue reading

1
Disruption is Coming for the Vulnerability Management Market - Tod Beardsley - ESW #425
1:47:15
1:47:15
Play later
Play later
Lists
Like
Liked
1:47:15Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
…
continue reading

1
The Art of Data Storytelling: Denise Lu on Music, Journalism & Visualizing the News
33:18
33:18
Play later
Play later
Lists
Like
Liked
33:18Summary: In this episode of The Breach Room, the host sits down with Denise Lu, graphics editor at The Washington Post, to discuss her path from musicology student to leading data visualization journalist. Denise reflects on how her academic background in music shaped her analytical approach, her transition into news graphics at The New York Times …
…
continue reading

1
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 275 ~ Watch Now ~
55:01
55:01
Play later
Play later
Lists
Like
Liked
55:01Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 275 ~ Watch Now ~ In this AMA edition of DailyCyber, I break down some of the most pressing issues in cybersecurity today. No guest—just me sharing unfiltered insights from the frontlines of vCISO advisory and leadership. 🔥 What we cover in this AMA: 1️⃣ The Cybersecurity Talent…
…
continue reading

1
IVR Systems & Impact of AI: The Ciphered Reality Podcast welcomes Steven from Newbridge Solutions
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42Join us on the latest episode of The Ciphered Reality Podcast, where your hosts Mike and Mari sit down with Steven from Newbridge Solutions to explore the impact of AI and the future of evolving IVR systems. In this episode, we unpack: How dynamically adapting IVR systems transform customer experience The direct impact on business toplines and grow…
…
continue reading

1
Humanizing Security: Ken Fanger on Culture, CMMC, and AI
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41Summary In this episode of The Breach Room, Ken Fanger, president of On Technology Partners, shares his extensive experience in cybersecurity, emphasizing the importance of humanizing security, creating a culture of psychological safety, and the need for education in cybersecurity. He discusses the challenges small businesses face in achieving comp…
…
continue reading

1
Ransomware Protection & Latest Cybersecurity News: The Ciphered Reality Podcast
43:04
43:04
Play later
Play later
Lists
Like
Liked
43:04Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: Ransomware Protection. How to stay safe online where malicious threat actors lurk on every corner? Identifying & Staying Safe with ever-evolving AI Landscape. Tune in for an insightful episod…
…
continue reading

1
University Security & Latest Cybersecurity News: The Ciphered Reality Podcast
35:39
35:39
Play later
Play later
Lists
Like
Liked
35:39Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: University Security. How to stay safe online where malicious threat actors lurk on every corner? Identifying & understanding more about how malware is offered as a service online. Tune in for…
…
continue reading

1
Student & Parent Cyberawareness | Copyright Phishing Lures - The Ciphered Reality Podcast
33:25
33:25
Play later
Play later
Lists
Like
Liked
33:25Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: Student & Parent Cyberawareness. How to stay safe online where malicious threat actors lurk on every corner? Identifying & Staying Safe from the latest malware expanding through copyright phi…
…
continue reading

1
The Fractional CTO Revolution: Brandie Kayser on Cybersecurity, Marketing & SMB Survival
26:23
26:23
Play later
Play later
Lists
Like
Liked
26:23Summary: In this episode of The Breach Room, Lu interviews Brandie Kayser, the CTO of Rochester IT Business Solutions. They discuss Brandie's journey into cybersecurity, the importance of proactive measures for small to medium-sized businesses, and the critical role of employee training in preventing cyber threats. Brandie shares insights on market…
…
continue reading

1
PRMA Insurance Thought Leaders Insight Series- Scott McCollum, Founder & Chief Solutions Officer at McRoof
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41The PRMA Insurance Thought Leaders Insight Series with Spencer Houldin, alongside leading thought leaders in the industry, aims to examine the insurance terrain, identify solutions to navigating the bumpy roads, and provide a roadmap that guides risk management professionals in the right direction. In this episode our host, Spencer Houldin, Managin…
…
continue reading

1
PQC vs. QKD: What Matters Now and What Can Wait
36:23
36:23
Play later
Play later
Lists
Like
Liked
36:23As regulators publish guidance and timelines tighten, organizations can’t treat quantum readiness as a “future-us” problem. Will Collison details HSBC’s approach: begin the migration now, build crypto agility into architecture, and manage both internal upgrades and external dependencies across vendors, partners, and customers. He clarifies where PQ…
…
continue reading
This week on Reimagining Cyber, we unpack one of the biggest supply chain attacks of the year: the NPM hack. Attackers compromised widely used packages like Chalk and Debug—billions of weekly downloads—slipping in code that silently hijacked crypto transactions. Tyler Moffitt joins us to explain how it happened, who’s most at risk, and the practica…
…
continue reading

1
Navigating the Future of Corporate Security: Insights from the Clarity Factory's Annual CSO Survey
34:15
34:15
Play later
Play later
Lists
Like
Liked
34:15Rachel Briggs, CEO of The Clarity Factory, joins us again on the Connected Intelligence Podcast to share findings from The Clarity Factory's Annual CSO Survey, proudly sponsored by Ontic. We explore how security leaders can break silos, tackle insider risk, and adapt to the rapidly evolving threat landscape. She highlights the growing need for cros…
…
continue reading

1
The Benefits of Rust Adoption for Mission-and-Safety-Critical Systems
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38A recent Google survey found that many developers felt comfortable using the Rust programming language in two months or less. Yet barriers to Rust adoption remain, particularly in safety-critical systems, where features such as memory and processing power are in short supply and compliance with regulations is mandatory. In our latest podcast from t…
…
continue reading

1
The Saga Continues: More Dirt on the Salesforce–Drift Breach
16:58
16:58
Play later
Play later
Lists
Like
Liked
16:58When we first covered the Salesforce–Drift breach, we knew it was bad. Now it’s clear the impact is even bigger. Hundreds of organizations — including Cloudflare, Palo Alto Networks, Zscaler, Proofpoint, Rubrik, and even financial firms like Wealthsimple — have confirmed they were affected. The root cause? A compromised GitHub account that opened t…
…
continue reading

1
Season 1 - Episode 15 (Pedro Kertzman & Adam Goss)
27:32
27:32
Play later
Play later
Lists
Like
Liked
27:32What does it take to become a cybersecurity "unicorn"? According to Adam Goss, it's the rare combination of threat intelligence expertise with cross-domain skills that truly drives innovation in our industry. Adam takes us on his unconventional journey from aspiring penetration tester to CTI specialist and educator, revealing the critical mindset s…
…
continue reading

1
Inside the Supply Chain Threat: Michael Mehlberg on AI, Risk & the Cyber Arms Race
29:44
29:44
Play later
Play later
Lists
Like
Liked
29:44Summary: In this episode of The Breach Room, host Lu interviews Michael Mehlberg, CEO of DarkSky Technology, discussing the evolving landscape of cybersecurity, particularly focusing on software supply chain risks and the integration of AI in cybersecurity operations. Michael shares insights on the importance of risk management, the role of policy …
…
continue reading

1
Cyber Threat Intelligence for Blue Teams with Jordan Kalm (Morado COO)
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50From Army recon missions to building Morado, COO Jordan Kalm reveals how military intelligence tactics translate into modern cyber threat intelligence. In this Simply Defensive episode, Josh Mason and Wade Wells dive into what really works for blue teams and SOC analysts — and what’s just noise. 👉 If you’ve ever wondered how to turn raw intel into …
…
continue reading

1
EXPOSED: The £200k Mistake 90% of Small Businesses Make (Dave From IT Isn’t Supposed To Run Your Technology Strategy!)
40:35
40:35
Play later
Play later
Lists
Like
Liked
40:35Most small business owners think CIO stands for "Chief I-Fix-Everything Officer" and CISO means "Chief I-Worry-About-Security Officer." In this episode, Noel Bradford (actual CIO/CISO) breaks down what these executive roles actually do and why your business desperately needs this strategic thinking - without the six-figure salary. Discover how frac…
…
continue reading

1
Forrester's AEGIS Framework, the weekly news, and interviews with Fortra and Island - Jeff Pollard, Rohit Dhamankar, Michael Leland - ESW #424
1:40:37
1:40:37
Play later
Play later
Lists
Like
Liked
1:40:37Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
…
continue reading

1
Forrester's AEGIS Framework, the weekly news, and interviews with Fortra and Island - Jeff Pollard, Rohit Dhamankar, Michael Leland - ESW #424
1:40:37
1:40:37
Play later
Play later
Lists
Like
Liked
1:40:37Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
…
continue reading

1
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 274 ~ Watch Now ~
1:00:08
1:00:08
Play later
Play later
Lists
Like
Liked
1:00:08Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 274 ~ Watch Now ~ In this special AMA edition of DailyCyber, I take your questions and dig into the hottest issues facing cybersecurity leaders today. No guest—just unfiltered insights from the frontlines of vCISO work. 🔥 What we cover in this AMA: 1️⃣ SMB security—minimum essen…
…
continue reading

1
What Gabbard's ODNI Cuts Mean for Corporate Security
18:10
18:10
Play later
Play later
Lists
Like
Liked
18:10Director of National Intelligence Tulsi Gabbard has unveiled what she calls ODNI 2.0 — a sweeping overhaul that will cut nearly half of the agency’s workforce, eliminate or consolidate several intelligence centers, and slash more than $700 million in annual costs. RANE’s Cyber Intelligence Analyst Hayley Benedict explains the increased cybersecurit…
…
continue reading

1
The Breach Room with Will Casterlow, CSIO @ Triad Cyber Solutions
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30Summary: In this conversation, Will Casterlow, a cybersecurity and compliance consultant, discusses the critical importance of cybersecurity in today's digital landscape. He emphasizes the need for businesses to implement robust policies and practices to protect themselves from cyber threats. Will also explores how AI can be leveraged to enhance bu…
…
continue reading
In this episode of Essential Geopolitics, RANE’s Global Economy Analyst Markus Jaeger analyzes the risks associated with potentially compromised Fed independence in light of President Trump’s criticism of the organization. Register here to receive a complimentary subscription to RiskBook, our curated email digest with the latest risk news and analy…
…
continue reading

1
Fix the Flag: Rethinking Secure Code Training with Pedram Hayati
39:20
39:20
Play later
Play later
Lists
Like
Liked
39:20Episode Summary CTFs are fun, but do they actually make developers write more secure code? In this episode of Secured, Cole Cornford is joined by Pedram Hayati (Founder of SecDim & SecTalks) to explore why most developer security training fails, and how SecDim’s “Fix the Flag” approach is changing the game. From contrived WebGoat-style examples to …
…
continue reading

1
81 Security Patches + Windows 10’s Final Countdown: What Every Business Owner Must Know
12:50
12:50
Play later
Play later
Lists
Like
Liked
12:50September 2025 Patch Tuesday Show NotesSeptember 2025 Patch Tuesday: Critical Business Update Special Edition with Graham Falkner Microsoft's September Patch Tuesday brings 81 security fixes, including 9 critical vulnerabilities already being exploited by attackers. This episode provides essential business guidance for small business owners navigat…
…
continue reading

1
3, 5 or 8 Years? The Realistic Timeline for Migration and the Task That Can’t Wait
40:59
40:59
Play later
Play later
Lists
Like
Liked
40:59As executives continue to postpone action, the window for preparing secure systems in the quantum era is rapidly closing. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Adrian Neal, Senior Director and Global Lead for Post-Quantum Cryptography at Capgemini, about the real timelines and challenges of P…
…
continue reading

1
Empowering Clients, Leading Cyber: Dennis Underwood on the Future of Security
22:06
22:06
Play later
Play later
Lists
Like
Liked
22:06Summary: In this episode of The Breach Room, host Luis interviews Dennis Underwood, CEO of a cybersecurity company, discussing the evolution of cybersecurity strategies, the role of a CEO, current trends, challenges in the industry, and the future of cybersecurity with AI. Dennis emphasizes the importance of empowering clients to take responsibilit…
…
continue reading

1
Connected App, Connected Risk: The Salesforce–Drift Incident
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54A single weak app integration opened the door for attackers to raid data from some of the world’s largest companies. Salesforce environments were hit hardest—with victims like Cloudflare, Palo Alto Networks, and Zscaler—but the blast radius also reached other SaaS platforms, including Google Workspace. In this episode of Cyberside Chats, Sherri Dav…
…
continue reading

1
From Service to Security: Jereme on Cyber, Business, and Veteran Entrepreneurship
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59Summary: In this episode of The Breach Room, host Luis interviews Jereme, CEO of Axia Security Group, who shares his journey from military service to entrepreneurship in the cybersecurity field. Jereme discusses the challenges of starting a business, the importance of targeted marketing, and the need for proactive security measures. He emphasizes t…
…
continue reading

1
How a Detective Became the Ginger Hacker: SOC Life, Job Hunts & Blue Team Wisdom
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02From the streets to the SOC. 💻 In this episode of Simply Defensive, Josh Mason and Wade Wells talk with Andrew Crotty — aka Ginger Hacker. A former detective turned Tier 3 SOC analyst and Army reservist, Andrew shares his journey into cyber, the struggles of breaking in, and the lessons he’s learned (including the rookie mistake that accidentally d…
…
continue reading

1
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - HD Moore, Jason Passwaters, J.J. Guy, Theresa Lanowitz, Mickey Bresman, Yuval Wollman, Jawahar “Jawa” Sivasankaran - ESW ...
2:06:06
2:06:06
Play later
Play later
Lists
Like
Liked
2:06:06Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
…
continue reading

1
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - Theresa Lanowitz, Yuval Wollman, Mickey Bresman, J.J. Guy, Jason Passwaters, HD Moore, Jawahar “Jawa” Sivasankaran - ESW ...
2:06:06
2:06:06
Play later
Play later
Lists
Like
Liked
2:06:06Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
…
continue reading

1
Threat Modeling: Protecting Our Nation’s Complex Software-Intensive Systems
35:02
35:02
Play later
Play later
Lists
Like
Liked
35:02In response to Executive Order (EO) 14028, Improving the Nation’s Cybersecurity, the National Institute of Standards and Technology (NIST) recommended 11 practices for software verification. Threat modeling is at the top of the list. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Natasha Shevchenko and Ale…
…
continue reading

1
The AI Security Edge - Force Multipliers with Dennis Hurst | Ep 7
23:41
23:41
Play later
Play later
Lists
Like
Liked
23:41Caroline Wong welcomes Dennis Hurst, Founder and President of Saltworks Security, for an insightful conversation on how AI is transforming application security. With more than 30 years of experience, Dennis explains how AI acts as a force multiplier—amplifying both attacker capabilities and defender effectiveness. They explore the challenges of sec…
…
continue reading

1
The Truth Behind the "Gmail Hack" - Ep 166
13:35
13:35
Play later
Play later
Lists
Like
Liked
13:35Headlines claimed that 2.5 billion Gmail accounts were hacked—but what really happened? In this episode of Reimagining Cyber, Ben and threat intelligence expert Tyler Moffitt break down the facts behind the so called Gmail hack You’ll hear how cybercrime group ShinyHunters exploited a Salesforce system linked to Google—not Gmail itself—and why misl…
…
continue reading

1
Proactive Protection: Will Reed on Cybersecurity as a Business Imperative
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11Summary In this episode of The Breach Room, host LuIs Guzman interviews Will Reed, CEO of Better Every Day Cyber, discussing his journey in cybersecurity, the importance of proactive measures for small and medium-sized businesses (SMBs), and the role of AI in enhancing cybersecurity practices. Will emphasizes the need for SMBs to recognize cybersec…
…
continue reading