Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Cyber Security Technology Podcasts
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The opportunity to delve into the 'mindsz' of industry leaders in technology and cyber security.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
…
continue reading
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Cyber Dogs Ai is a podcast about tips on navigating ai, how to stay safe in the digital landscape, general conversations regarding technology and how to use it for our benefit! DON’T PUT YOURSELF IN THE DIGITAL DOGHOUSE! Hit that follow button, and stay tuned for more!
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
The Cyber Ways Podcast brings academic cyber security research into the "real world." We interview top academic researchers to find how their research can be put into practice by cyber security professionals. Our focus is on behavioral aspects of cyber security. Occasionally, we touch on related topics, such as information privacy and surveillance.Each episode discusses one published, peer-reviewed article to reveal the practical implications of the research. Your hosts, Tom Stafford and Cra ...
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Email feedback and show ideas to [email protected]. Join us as we examine the next major tech cycle, uncover emerging global tech hubs, and analyze where VC investment d ...
…
continue reading
Everything seems to be accelerating: geopolitics, technology, security threats, the dispersal of information. At times, it feels like a blur. But beneath the dizzying proliferation of events, discoveries, there are deeper trends that can be grasped and understood through conversation and debate. That’s the idea behind Stop the World, the Australian Strategic Policy Institute’s podcast on international affairs and security. Each week, we cast a freeze-frame around the blur of events and bring ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
…
continue reading
The Cyber-Savvy Boardroom, a Google Cloud Office of the CISO podcast, offers monthly 15-20 minute episodes featuring security leaders, board members, and thought leaders. Hosted by David Homovich and rotating Office of the CISO members, experts share insights for strategic clarity and improved organizational security. Guests include board members, Google Cloud/Google executives, Office of the CISO Board Insights team members, board advisors, and industry thought leaders.
…
continue reading
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
…
continue reading
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
…
continue reading
Here's what you need to know: this show is different. The Technology Boardroom is your access-all-areas pass to one of Microsoft's leading partners in the UK, a roster of tech experts bringing you technical expertise, roundtable debates and strategic industry advice. Each episode will break down the latest tech developments and trends, ranging from AI and cyber security to sustainability and professional development. A real tech enthusiast? A decision-maker responsible for thousands of emplo ...
…
continue reading
Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI). Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers.
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
The Campus Technology Insider podcast explores current trends and issues impacting technology leaders in higher education. Listen in as Executive Editor Rhea Kelly chats with ed tech experts and practitioners about their work, ideas and experiences.
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
Twice weekly Technology News show covering the Tech Space. With Segments on Science, Mobile, Digital TV, FAA, FCC, Cyber Security, Gadgets and Tech Politics.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Best 10-minute, daily tech podcast on emerging technologies, hundreds of Silicon Valley CEOs, Influencers and Celebrities. Hosted by technology executive and creator of Coruzant Technologies.
…
continue reading
"Humanizing cybersecurity with candid tales from cyberspace and beyond!" Voices of the Vigilant builds and shares knowledge by engaging with diverse voices and perspectives within the cybersecurity industry.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading

1
Strictly Cyber EP 3 - Cyber Security Technology to Keep Your Data Protected
57:16
57:16
Play later
Play later
Lists
Like
Liked
57:16In this episode of Strictly Cyber, James and I are talking all about the tech that keeps your business safe behind the scenes. We break down the key tools — like firewalls, antivirus, encryption and cloud backups — and explain how they actually work to protect your data. No jargon, no fluff, just real talk about what you need and why it matters. If…
…
continue reading

1
Lawfare Archive: Juliette Kayyem on the Baltimore Bridge Collapse and Crisis Management
41:56
41:56
Play later
Play later
Lists
Like
Liked
41:56From April 9, 2024: In the early morning on March 26, a Singapore-flagged cargo ship crashed into Baltimore’s Francis Scott Key Bridge. The bridge collapsed, resulting in the death of six of the eight individuals conducting maintenance on the bridge. The incident has disrupted commuter traffic and the transport of hazardous materials, and it has ha…
…
continue reading

1
Cybersecurity Month in Review: Key Insights and Emerging Threats July 11, 2025
1:10:10
1:10:10
Play later
Play later
Lists
Like
Liked
1:10:10In this episode of 'Cybersecurity: Today's Month in Review,' the panel of experts, including Laura Payne, David Shipley, and new guest Tammy Harper, delve into major cybersecurity stories from the past month. Discussions range from the recent arrest of a Montreal scam operator, Scattered Spider's targeted attacks on various sectors, and the impacts…
…
continue reading

1
Charlie Thomas on Building Billion-Dollar Startups and the Future of Cyber Resilience | Ep 1082
16:04
16:04
Play later
Play later
Lists
Like
Liked
16:04In this episode of The Digital Executive podcast, host Brian Thomas sits down with Charlie Thomas, a veteran tech leader known for scaling startups to $100M+ in recurring revenue. Now at the helm of Mitiga, Charlie shares his approach to building exceptional teams, anticipating market shifts, and mentoring founders—several of whom have led companie…
…
continue reading
Scott Augenbaum, retired FBI Agent in the Cyber Division shares his truths framework about the FBI vs Cyber Crime and the fbi perspective of cyber crime. Topics: fbi perspective of cyber crime, fbi view of cyber crime, explaining the fbi stance on cyber crime, lessons learned from fbi on cyber crime, lessons on cyber crime from fbi, war between the…
…
continue reading

1
MCP Security Flaws, Anthropic Copyright Ruling & Google's Gemma 3n: News of the Week (7/11/25)
2:19
2:19
Play later
Play later
Lists
Like
Liked
2:19In this episode of Campus Technology Insider Podcast Shorts, Rhea Kelly highlights recent developments in higher education technology, including Backslash Security's discovery of vulnerabilities in the Model Context Protocol, a U.S. District Court's ruling on Anthropic's use of copyrighted books, and Google DeepMind's launch of the lightweight AI m…
…
continue reading

1
Lawfare Daily: Bribery and the Second Trump Administration with John Keller
58:43
58:43
Play later
Play later
Lists
Like
Liked
58:43John Keller, now a partner at Walden, Macht, Haran, & Williams, channeled his experience as the former chief of the Public Integrity Section at the Department of Justice to talk about bribery with James Pearce, Lawfare Legal Fellow. After explaining the basics of bribery law and whether a current or former president could face a bribery prosecution…
…
continue reading

1
Cybersecurity Today: Marks and Spencer Hack, Brazilian Bank Breach, and McDonald's Data Vulnerability
10:46
10:46
Play later
Play later
Lists
Like
Liked
10:46In this episode of Cybersecurity Today, host Jim Love discusses major updates on the recent cyber attack on Marks and Spencer, revealing new details and arrests. The breach involved sophisticated social engineering that infiltrated the company's network through an IT service provider, leading to 150GB of stolen data. Love then covers a massive insi…
…
continue reading

1
Episode 322 Deep Dive: Courtney Guss | Resilience in Real Time: Women, Leadership and the Frontlines of Cyber Crisis
41:43
41:43
Play later
Play later
Lists
Like
Liked
41:43In this episode, we sit down with Courtney Guss, Director of Crisis Response at Sempris, as she sheds light on why a crisis plan alone won’t always save organizations in moments of disruption. Courtney unpacks surprising research showing that despite 97% of organizations regularly planning and training for crises, 76% still suffer significant impac…
…
continue reading

1
Grok 4 Surpasses OpenAI and Google, Now Top AI Model #1831
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37xAI’s Grok 4 achieves the highest Artificial Intelligence Index score, outperforming OpenAI, Google Gemini 2.5 Pro, and Anthropic Claude 4 Opus in extensive benchmarks. Grok 4 excels notably in coding, mathematics, and advanced reasoning tasks despite moderate speed and pricing. -Thinking of buying a Starlink? Use my link to support the show. -Get …
…
continue reading

1
SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches;
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this particular case, the Yandex mail server was the primary victim of these attacks. https://isc.sans.edu/diary/SSH%20Tunneling%20in%20Act…
…
continue reading

1
SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches; (#)
5:49
5:49
Play later
Play later
Lists
Like
Liked
5:49SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches; SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this partic…
…
continue reading

1
AUKUS must succeed. With Sir Stephen Lovegrove
26:54
26:54
Play later
Play later
Lists
Like
Liked
26:54This week on Stop the World, we were delighted to host Sir Stephen Lovegrove, the UK Prime Minister’s special representative on AUKUS. Dave speaks to Sir Stephen about the UK and US reviews of AUKUS, what success looks like for pillars one and two and where we need to move more quickly, including focusing on specific capabilities in pillar two. It’…
…
continue reading

1
Lawfare Daily, Bonus Edition: Unpacking the July 7 Hearing for Kilmar Abrego Garcia
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02On July 8, Lawfare Editor-in-Chief Benjamin Wittes sat down for a bonus edition of Lawfare Live with Lawfare Senior Editors Anna Bower and Roger Parloff to discuss Kilmar Abrego Garcia's July 7 hearing in federal court in Greenbelt, Maryland. To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also s…
…
continue reading

1
Scaling Laws: Ethan Mollick: Navigating the Uncertainty of AI Development
1:06:21
1:06:21
Play later
Play later
Lists
Like
Liked
1:06:21Ethan Mollick, Professor of Management and author of the “One Useful Thing” Substack, joins Kevin Frazier, the AI Innovation and Law Fellow at the University of Texas School of Law and a Senior Editor at Lawfare, and Alan Rozenshtein, Associate Professor at Minnesota Law and a Senior Editor at Lawfare, to analyze the latest research in AI adoption,…
…
continue reading

1
How to Build Credibility and Coverage in Cybersecurity Media with Dan Raywood
25:46
25:46
Play later
Play later
Lists
Like
Liked
25:46In this episode, we’re joined by cybersecurity journalist Dan Raywood to explore how organisations can successfully navigate the cybersecurity media landscape. Dan shares his journey into cybersecurity reporting, what sets it apart from other industries, and how the field has evolved over his career. He also offers valuable advice for organisations…
…
continue reading

1
KBI.Media Update | KBKast Partners with Vanta as First Exclusive Sponsor
1:02
1:02
Play later
Play later
Lists
Like
Liked
1:02KBI.Media is proud to announce a landmark partnership between KBKast, the flagship security podcast for leadership, and Vanta, the leading trust management platform. In a dynamic and rapidly evolving media landscape, companies like Vanta are exploring innovative platforms to amplify their presence and impact. This partnership enables KBKast to: Inv…
…
continue reading

1
CR0105: How little we still understand about GreenOps with James Hall, Green Pixie
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39GreenOps is a cultural transformation that empowers developers to turn emissions data into meaningful action, bridging the communication gap with ESG teams and exposing the critical truth that cloud cost and carbon cost are not the same, which fundamentally reshapes how we approach sustainable IT. This week, Dave, Esmee and Rob talk to James Hall, …
…
continue reading

1
SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches;
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20Development%3A%20Why%20and%20How./32092 Animation-Driven Tapjacking on Android Attackers can use a clic…
…
continue reading

1
SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches; (#)
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches; Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20…
…
continue reading

1
My Data Room, your Patient Portal: How Dr. Shields uses Engage rooms for secure patient engagement
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09My Data Room, your Patient PortalWhat if every patient had a dedicated, secure digital space — designed just for them?Join us to hear how Dr. Shields uses Tresorit Engage to turn virtual data rooms into personalized patient portals, enabling secure, transparent communication and document sharing throughout the care journey. From onboarding and cons…
…
continue reading

1
When AI Looks First: How Agentic Systems Are Reshaping Cybersecurity Operations | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3
4:32
4:32
Play later
Play later
Lists
Like
Liked
4:32Before a power crew rolls out to check a transformer, sensors on the grid have often already flagged the problem. Before your smart dishwasher starts its cycle, it might wait for off-peak energy rates. And in the world of autonomous vehicles, lightweight systems constantly scan road conditions before a decision ever reaches the car’s central proces…
…
continue reading

1
Jim LaRoe on Elevating Cybersecurity Through Innovation, Engineering, and Relentless Leadership | Ep 1081
10:27
10:27
Play later
Play later
Lists
Like
Liked
10:27In this episode of The Digital Executive podcast, host Brian Thomas speaks with Jim LaRoe, a uniquely skilled leader whose background spans engineering, law, and entrepreneurship. As CEO of Symphion, Jim shares how his diverse experience has shaped a high-performing culture centered around relentless work ethic, continuous innovation, and uncomprom…
…
continue reading

1
Dumpster Disasters: How Medical Records End Up on the Streets
22:03
22:03
Play later
Play later
Lists
Like
Liked
22:03When private medical records are dumped in an alley, who really pays the price? In this episode of the Learn Online Security Podcast, Tamara Michèle and Chris Howells unpack a disturbing privacy breach involving discarded psychiatric files and the fallout that followed. They explore the real-life consequences of identity theft, how sensitive data c…
…
continue reading

1
Emotional Firewalls: Mastering EQ to Outsmart Global Cyber Threats
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10Cybercrime Junkies Podcast interviews former NATO specialist and international intelligence expert, Nadja El Fertasi, about the role played by emotional intelligence in cyber security and Emotional Intelligence in AI. We discuss emotional firewalls, learning EQ (emotional intelligence) and how it can stop social engineering attacks, how internation…
…
continue reading

1
Secure AF SOC Brief #5 - Chrome CVE-2025-6554
9:04
9:04
Play later
Play later
Lists
Like
Liked
9:04Got a question or comment? Message us here! In this episode of The SOC Brief, the team unpacks a critical zero-day vulnerability in Google Chrome (CVE-2025-6554) that’s being actively exploited. Learn how attackers use type confusion bugs to hijack browser memory, what makes this exploit so dangerous, and why it’s targeting high-value organizations…
…
continue reading

1
Rational Security: The “Game Changers” Edition
1:15:30
1:15:30
Play later
Play later
Lists
Like
Liked
1:15:30This week, Scott sat down with fellow Senior Editors Molly Reynolds and Alan Rozenshtein to talk through the week’s big national security news, including: “One Bill to rule them all, One Bill to find them, One Bill to bring them all and in the darkness bind them.” Republicans in Congress narrowly enacted President Trump’s “One Big Beautiful Bill” l…
…
continue reading

1
Lawfare Daily: The Double Black Box: Ashley Deeks on National Security AI
55:44
55:44
Play later
Play later
Lists
Like
Liked
55:44Lawfare Senior Editor Alan Rozenshtein sits down with Ashley Deeks, the Class of 1948 Professor of Scholarly Research in Law at the University of Virginia School of Law, to discuss her new book, “The Double Black Box: National Security, Artificial Intelligence, and the Struggle for Democratic Accountability.” They talk about the core metaphor of th…
…
continue reading

1
AI Threats, Enterprise Security, and Google's Confusing Gemini Release: Cybersecurity Today
12:57
12:57
Play later
Play later
Lists
Like
Liked
12:57In this episode of 'Cybersecurity Today,' host Jim Love discusses the recent deep fake attack on high-ranking US government officials using AI voice cloning technology. The conversation highlights the growing ease and risks of AI-generated impersonations. The episode also covers the advancements in AI systems connecting with enterprise data and the…
…
continue reading

1
Episode 321 Deep Dive: Graeme Neilson | How the Security Industry Ignores the Halting Problem
40:10
40:10
Play later
Play later
Lists
Like
Liked
40:10In this episode, we sit down with Graeme Neilson, Founder and Chief Research Officer at Siege, as he unpacks why the security industry often ignores the halting problem—a foundational concept in computer science that explains why software will always contain bugs and vulnerabilities. Graeme challenges the efficacy of awareness training programs, ar…
…
continue reading

1
Human Risk Intelligence: Is Behavioural Data the New Defence?
38:01
38:01
Play later
Play later
Lists
Like
Liked
38:01How do we measure and manage the human element of cyber risk beyond technology and basic security training? Welcome to Razorwire, where we uncover what really matters in cybersecurity. I’m James Rees and in this episode, talking about the world of human risk intelligence with Flavius Plesu, Founder and CEO of OutThink. We'll question whether staff …
…
continue reading

1
Smart Devices & Legacy Systems: The Big Risks in Healthcare Cyber - Ep 157
17:24
17:24
Play later
Play later
Lists
Like
Liked
17:24In this episode of Reimagining Cyber, Rob Aragao (Chief Security Strategist, OpenText) speaks with Ed Gaudet, CEO and founder of Censinet, about the high-stakes intersection of cybersecurity and healthcare. With hospitals increasingly reliant on connected medical devices and legacy systems, the risks extend beyond data breaches—they directly impact…
…
continue reading

1
SN 1033: Going on the Offensive - The Digital Arms Race
3:04:57
3:04:57
Play later
Play later
Lists
Like
Liked
3:04:57Another Israeli spyware vendor surfaces. Win11 to delete restore points more quickly. The EU accelerates its plans to abandon Microsoft Azure. The EU sets timelines for Post-Quantum crypto adoption. Russia to create a massive IMEI database. Canada and the UK create the "Common Good Cyber Fund". U.S. states crack down on Bitcoin ATMs amid growing sc…
…
continue reading

1
SN 1033: Going on the Offensive - The Digital Arms Race
3:04:57
3:04:57
Play later
Play later
Lists
Like
Liked
3:04:57Another Israeli spyware vendor surfaces. Win11 to delete restore points more quickly. The EU accelerates its plans to abandon Microsoft Azure. The EU sets timelines for Post-Quantum crypto adoption. Russia to create a massive IMEI database. Canada and the UK create the "Common Good Cyber Fund". U.S. states crack down on Bitcoin ATMs amid growing sc…
…
continue reading

1
SANS Stormcast Wednesday, July 9th, 2025: Microsoft Patches; Opposum Attack;
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44Microsoft Patch Tuesday, July 2025 Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was disclosed before being patched, and none of the vulnerabilities have so far been e…
…
continue reading

1
SANS Stormcast Wednesday, July 9th, 2025: Microsoft Patches; Opposum Attack; (#)
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44SANS Stormcast Wednesday, July 9th, 2025: Microsoft Patches; Opposum Attack; Microsoft Patch Tuesday, July 2025 Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was discl…
…
continue reading

1
Ep 91: The Engineers React to Breach News
45:27
45:27
Play later
Play later
Lists
Like
Liked
45:27Got a question or comment? Message us here! In this episode, our security engineers break down the latest cybersecurity headlines, from the real scoop behind the “16 billion password” leak to the rise of hacker groups like Scattered Spider. 🕷️ We discuss how attackers bypass MFA, why exploited data keeps resurfacing, and what organizations can do t…
…
continue reading

1
Exploring Cybersecurity Excellence with Dr. Selwyn Ellis
36:40
36:40
Play later
Play later
Lists
Like
Liked
36:40Dr. Selwyn Ellis, the Bosley Whitmore Endowed Professor and head of the Department of Computer Information Systems at Louisiana Tech University, engages in a profound conversation with hosts Craig Van Slyke and Thomas Stafford regarding the establishment and maintenance of cybersecurity research and education programs that adhere to national standa…
…
continue reading

1
Lawfare Daily: Michael Feinberg on Leaving the FBI
53:22
53:22
Play later
Play later
Lists
Like
Liked
53:22Until late May, Michael Feinberg was a senior FBI counterintelligence agent focused on China. All that changed one weekend, when the Deputy FBI Director found out that he was still friends with a former FBI official who had been fired years ago. In his first interview following his essay, “Goodbye to All That,” in Lawfare last week. Feinberg sat do…
…
continue reading

1
Breaking Barriers in Tech with Tanisha Martin | Pt. 1
24:32
24:32
Play later
Play later
Lists
Like
Liked
24:32Send us a text In this episode of the Cyber Savvy Podcast, host Mike Shelah welcomes Tanisha Martin, founder of Black Girls Hack. They discuss Tanisha's journey in cybersecurity, her new book, and the importance of diversity in the tech industry. Tanisha shares her experiences and insights on how to break into cybersecurity, the significance of net…
…
continue reading

1
SANS Stormcast Tuesday, July 8th, 2025: Detecting Filename (Windows); Atomic Stealer now with Backdoor; SEO Scams
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29What s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS infostealer adds backdoor for persistent attacks Malware analyst discovered a new version of the Atomic macOS info-st…
…
continue reading

1
SANS Stormcast Tuesday, July 8th, 2025: Detecting Filename (Windows); Atomic Stealer now with Backdoor; SEO Scams (#)
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29SANS Stormcast Tuesday, July 8th, 2025: Detecting Filename (Windows); Atomic Stealer now with Backdoor; SEO Scams What’s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS inf…
…
continue reading

1
Will AI take your job in 2025? AI, automation and the future of work
48:30
48:30
Play later
Play later
Lists
Like
Liked
48:30This week on The Technology Boardroom, join Chris O'Brien, Arno Nel and Jake Harvey as they attempt to carve out an answer to the question everyone seems to be asking: will AI take my job? "I do think expectations are probably a little bit overblown," says Chris, Advania's Products and Services director. But what expectations? And how far are we fr…
…
continue reading

1
EP233 Product Security Engineering at Google: Resilience and Security
25:44
25:44
Play later
Play later
Lists
Like
Liked
25:44Guest: Cristina Vintila, Product Security Engineering Manager, Google Cloud Topic: Could you share insights into how Product Security Engineering approaches at Google have evolved, particularly in response to emerging threats (like Log4j in 2021)? You mentioned applying SRE best practices in detection and response, and overall in securing the Googl…
…
continue reading

1
Lawfare Daily: The Offensive Cyber Industry and U.S.-China Relations with Winnona Bernsen
40:19
40:19
Play later
Play later
Lists
Like
Liked
40:19Winnona Bernsen, nonresident fellow at the Atlantic Council’s Cyber Statecraft Initiative and founder of DistrictCon, joins Lawfare Contributing Editor Justin Sherman to discuss her recently released report "Crash (Exploit) and Burn: Securing the Offensive Cyber Supply Chain to Counter China in Cyberspace." They discuss the offensive cyber industry…
…
continue reading