Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Cyber Security Technology Podcasts
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
…
continue reading
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
The opportunity to delve into the 'mindsz' of industry leaders in technology and cyber security.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading
Here's what you need to know: this show is different. The Technology Boardroom is your access-all-areas pass to one of Microsoft's leading partners in the UK, a roster of tech experts bringing you technical expertise, roundtable debates and strategic industry advice. Each episode will break down the latest tech developments and trends, ranging from AI and cyber security to sustainability and professional development. A real tech enthusiast? A decision-maker responsible for thousands of emplo ...
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI). Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers.
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading

1
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
The Small Business Cyber Security Guy
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
…
continue reading
DTX Unplugged delves into the major challenges and innovations shaping business transformation, embodying our event's focus on the critical intersection of people, process, and technology. While rooted in the DTX ethos, this will be an industry-focused platform, tackling key issues, spotlighting groundbreaking innovations, and raising awareness for important topics across the sector.
…
continue reading
Twice weekly Technology News show covering the Tech Space. With Segments on Science, Mobile, Digital TV, FAA, FCC, Cyber Security, Gadgets and Tech Politics.
…
continue reading
Welcome to The Monica Talks Cyber Podcast Experience: The fastest, easiest and an engaging way to build and grow your career and business in artificial intelligence, leadership and cybersecurity. Monica Talks Cyber is a technology, career and business podcast and an engaging platform for real stories, discussions and opinions from renowned global experts in technology, leadership and cybersecurity. The podcast show is hosted by Monica Verma, Hacker, CISO, Keynote Speaker, Founder & CEO, Mult ...
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
EXPOSED: The £200k Mistake 90% of Small Businesses Make (Dave From IT Isn’t Supposed To Run Your Technology Strategy!)
40:35
40:35
Play later
Play later
Lists
Like
Liked
40:35Most small business owners think CIO stands for "Chief I-Fix-Everything Officer" and CISO means "Chief I-Worry-About-Security Officer." In this episode, Noel Bradford (actual CIO/CISO) breaks down what these executive roles actually do and why your business desperately needs this strategic thinking - without the six-figure salary. Discover how frac…
…
continue reading

1
How to protect yourself from digital identity theft with Eva Velasquez | VOICE CLONE IDENTITY THEFT
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03Identity theft affects millions of people every year — but do you really know how it works, or how to protect yourself? This week, we’re joined by Eva Velasquez, CEO of the Identity Theft Resource Center, who shares the latest trends in identity crime and what steps you can take if it ever happens to you. 🕵️♀️🔐 In Crash Course, we break down ident…
…
continue reading

1
How AI and Third Party Risk Are Transforming Healthcare Cybersecurity with Ed Gaudet
22:01
22:01
Play later
Play later
Lists
Like
Liked
22:01Welcome back to To the Point Cybersecurity Podcast! This week, hosts Rachael Lyon and Jonathan Knepher sit down with Ed Gaudet, CEO and founder of Senseinet, to dive into the rapidly evolving world of third-party risk management—especially in the healthcare sector. Ed brings more than 25 years of software and cybersecurity expertise, and he shares …
…
continue reading

1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
Play later
Play later
Lists
Like
Liked
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
continue reading

1
S36 Ep6: Dr. Glen Moriarty - Human Connection in a Digital World
19:25
19:25
Play later
Play later
Lists
Like
Liked
19:25Today, Steve speaks with psychologist Dr. Glen Moriarty, founder and CEO of Seven Cups, a free emotional support service with 570,000 trained volunteer listeners who support users in 189 countries. Steve and Glen explore the origins of Seven Cups, its background and its global user base, and discuss why so many feel alone in a hyper-connected onlin…
…
continue reading

1
The AI Power Play That Will Shape Your Career in 2025
13:41
13:41
Play later
Play later
Lists
Like
Liked
13:41The Global AI Power Play Is Here, And It’s Already Shaping Your Career and Business. What if I told you that a $600 billion handshake in Saudi Arabia just reshaped the future of AI and your career, and most professionals have no idea? In this episode, I’ll show you what REALLY happened when Trump met with Elon Musk, Sam Altman, Nvidia’s CEO, and Mi…
…
continue reading

1
The Future of Smart Homes with Apple’s New OS #1844
42:02
42:02
Play later
Play later
Lists
Like
Liked
42:02Apple is developing a new operating system, codenamed “Charismatic,” to power its upcoming smart home hub and tabletop robot. Blending tvOS and watchOS, the platform will feature widgets, multi-user profiles, and Siri-first controls, signaling Apple’s deeper push into the connected home space. -Want to be a Guest on a Podcast or YouTube Channel? Si…
…
continue reading
Join host Helen Gidney, Head of Architecture at Softcat, as she sits down with Adam Spearing, VP of AI Go-To-Market for EMEA at ServiceNow, and Oliver Meadows, ITXM Sales Lead at Softcat. Together, they explore how organisations can streamline internal service operations, dismantle silos, and harness AI to enhance the end-user experience. Whether y…
…
continue reading

1
SANS Stormcast Tuesday, September 30th, 2025: Apple Patch; PAN Global Protect Scans; SSL.com signed malware (#)
5:06
5:06
Play later
Play later
Lists
Like
Liked
5:06SANS Stormcast Tuesday, September 30th, 2025: Apple Patch; PAN Global Protect Scans; SSL.com signed malware Apple Patches Apple released patches for iOS, macOS, and visionOS, fixing a single font parsing vulnerability https://isc.sans.edu/diary/Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400/32330 Increase in Scans for Palo Alto Global Pr…
…
continue reading

1
Designing Urban Spaces with Safety and Sustainability
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05In this episode, Leigh Harper (Associate Director for Security at Cundall), explores the link between security and sustainability in urban development. With experience across various regions, she stresses the need to integrate security measures early in master planning. Leigh discusses the importance of coordination with architects to balance aesth…
…
continue reading

1
CSRMC, LockBit 5.0 & Phishing Fallout - Brutally Honest Security #2
2:33:09
2:33:09
Play later
Play later
Lists
Like
Liked
2:33:09In this episode of Brutally Honest Security, Eric Taylor tears into the week’s most critical and pulse-raising cybersecurity developments — no fluff, just facts and blunt insight. Episode Headlines & Links: 👉 How the newly rebranded Department of War is replacing legacy frameworks with its Cybersecurity Risk Management Construct (CSRMC) - shifting …
…
continue reading

1
EP245 From Consumer Chatbots to Enterprise Guardrails: Securing Real AI Adoption
33:35
33:35
Play later
Play later
Lists
Like
Liked
33:35Guest: Rick Caccia, CEO and Co-Founder, Witness AI Topics: In what ways is the current wave of enterprise AI adoption different from previous technology shifts? If we say “but it is different this time”, then why? What is your take on “consumer grade AI for business” vs enterprise AI? A lot of this sounds a bit like the CASB era circa 2014. How is …
…
continue reading

1
Your AI is not as secure as you think it is, and here's why
50:51
50:51
Play later
Play later
Lists
Like
Liked
50:51Send us a text David Brockler, AI security researcher at NCC Group, explores the rapidly evolving landscape of AI security and the fundamental challenges posed by integrating Large Language Models into applications. We discuss how traditional security approaches fail when dealing with AI components that dynamically change their trustworthiness base…
…
continue reading
Emerging Cybersecurity Threats: Lockbit 5.0, Salesforce AI Vulnerabilities, and China's Cyber Intelligence Advancements In this episode of 'Cybersecurity Today,' host Jim Love discusses the latest cybersecurity threats, including the emergence of Lockbit 5.0 ransomware which can attack multiple platforms simultaneously, and a critical vulnerability…
…
continue reading

1
SANS Stormcast Monday, September 29th, 2025: Convert Timestamps; Cisco Compromises; GitHub Notification Phishing (#)
8:36
8:36
Play later
Play later
Lists
Like
Liked
8:36SANS Stormcast Monday, September 29th, 2025: Convert Timestamps; Cisco Compromises; GitHub Notification Phishing Converting Timestamps in .bash_history Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This new tool converts these timestamps into a more readable…
…
continue reading

1
From Hollywood to Hardware: When AI Stories Come True
17:44
17:44
Play later
Play later
Lists
Like
Liked
17:44Step inside Darnleys Cyber Café for a thought-provoking journey from The Terminator’s Skynet to the eerie futures of Black Mirror. We explore how pop culture’s AI nightmares echo today’s breakthroughs and what they might mean for tomorrow. Grab a coffee, press play, and question how close fiction is to becoming your reality. Click here to send futu…
…
continue reading

1
The Complex Landscape of AI and Cybersecurity
1:04:58
1:04:58
Play later
Play later
Lists
Like
Liked
1:04:58Navigating the Complex Landscape of AI and Cybersecurity: A Conversation with Rob T. Lee In this weekend edition of Cybersecurity Today, host Jim Love interviews Rob T. Lee, the Chief AI Officer and Chief of Research at the SANS Institute. They discuss the intersection of AI, education, and security, highlighting the dual nature of AI as both a tra…
…
continue reading
Grumpy Old Geeks is back with another round of righteous griping and eyebrow-raising headlines in Episode 715: Our Wizard Lies. We kick things off in FOLLOW UP, where TikTok is still the geopolitical hot potato that both the U.S. and China promise to sort out “someday, maybe,” while Wired’s global editorial director explains how tech’s growing poli…
…
continue reading

1
Resilient Cyber w/ Alon Jackson - Enterprise Agentic Security
18:46
18:46
Play later
Play later
Lists
Like
Liked
18:46In this episode of Resilient Cyber, I sit down with Astrix Security Co-Founder and CEO Alon Jackson to discuss the need for secure agentic adoption across the enterprise. This includes Astrix’s approach, which involves enabling enterprises to discover, secure, and deploy AI agents responsibly at scale.…
…
continue reading
The EU's ambassador to the U.S. underscores the importance of the bloc's $910 billion defense plans known as Readiness 2030. Guest: European Union Ambassador to the United States Jovita Neliupšienė.
…
continue reading
Cybersecurity Today: Shadow Leak, SIM Farm Shutdown, Cisco Zero-Day, FBI Warning & Android Advanced Protection In this episode of Cybersecurity Today, host Jim Love discusses several major cybersecurity issues. Key topics include the discovery of the 'Shadow Leak' vulnerability in ChatGPT servers by Radware, the dismantling of a massive SIM farm ne…
…
continue reading

1
SANS Stormcast Friday, September 26th, 2025: Webshells in .well-known; Critical Cisco Vulns Exploited; XCSSET Update; GoAnywhere MFT Exploit Details (#)
5:25
5:25
Play later
Play later
Lists
Like
Liked
5:25SANS Stormcast Friday, September 26th, 2025: Webshells in .well-known; Critical Cisco Vulns Exploited; XCSSET Update; GoAnywhere MFT Exploit Details Webshells Hiding in .well-known Places Our honeypots registered an increase in scans for URLs in the .well-known directory, which appears to be looking for webshells. https://isc.sans.edu/diary/Webshel…
…
continue reading

1
NSW schools to get AI tool, AI Charlie Kirk, EU airports hacked and charities get a cyber helping hand
45:49
45:49
Play later
Play later
Lists
Like
Liked
45:49In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth talk about NSWEduChat, a virtual Charlie Kirk, the impact of a cyber incident disrupting airports across Europe, and how Australian not-for-profits are getting a new tool to face a rising tide of ransomware attacks. Croft and Hollingworth open proceedings with Instagram…
…
continue reading

1
How I’d Learn Cybersecurity in 2025 (If I Were Starting Over)
14:34
14:34
Play later
Play later
Lists
Like
Liked
14:34If I were starting my cybersecurity career from scratch in 2025, this is exactly what I’d do. No fluff, no unnecessary certs, and no wasted time. Too many professionals are burning out chasing certs or bootcamps without real clarity. In this episode, I share my complete 6-step cybersecurity roadmap, the one I’d follow if I had to start all over aga…
…
continue reading

1
CR109: Season 5 Kick Off with Dave, Esmee and Rob
51:16
51:16
Play later
Play later
Lists
Like
Liked
51:16We’re back! In this Season 5 premiere, the team reunites after their summer break to kick off an exciting new chapter. Join us as we catch up, share bold predictions for the year ahead, and explore big questions, like whether 2026 will be the year of the autonomous organization. Expect candid reflections, lively discussion, and a sneak peek at what…
…
continue reading

1
SANS Stormcast Thursday, September 25th, 2025: Hikvision Exploits; Cisco Patches; Sonicawall Anit-Rootkit Patch; Windows 10 Support (#)
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33SANS Stormcast Thursday, September 25th, 2025: Hikvision Exploits; Cisco Patches; Sonicawall Anit-Rootkit Patch; Windows 10 Support Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send cred…
…
continue reading

1
Highlights from AFA's Air, Space & Cyber Conference
29:13
29:13
Play later
Play later
Lists
Like
Liked
29:13Our editors explore the vibe, the headlines, the aircraft, the drones, and the other news coming out of the Air Force Association’s big annual conference at National Harbor, Maryland. Guests: Tom Novelly, Defense One senior reporter covering air and space warfare; And Lauren C. Williams, Defense One senior editor.…
…
continue reading

1
Resilient Cyber w/ Emre Tinaztepe - Forensics at the Frontline
20:44
20:44
Play later
Play later
Lists
Like
Liked
20:44In this episode of Resilient Cyber, I sit down with Binalyze Founder/CEO Emre Tinaztepe. We will discuss how AI and automation are impacting the future of the SOC and the role that forensics-level data can play in incident response and recovery, as well as proactive threat hunting.By Chris Hughes
…
continue reading

1
💢 FileFix Fiasco 💢 Steganography's Stealthy StealC Drop
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53Got a question or comment? Message us here! In this episode of The #SOCBrief, we break down the rising FileFix attack, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proacti…
…
continue reading

1
S2 E4: Industrial Security Alongside a Warzone
21:07
21:07
Play later
Play later
Lists
Like
Liked
21:07Industrial control systems (ICS) and operational technology (OT) are the backbone of modern society—powering electricity, water, gas, communications, manufacturing, chemicals, and even medical technology. But what happens when these systems must be secured in the middle of a warzone? On this episode of Simply ICS Cyber, hosts Don C. Weber and Tom V…
…
continue reading

1
Solving the Cyber Workforce Crisis - Ep 168
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40Women make up only a fraction of the cybersecurity workforce—and many hit a career ceiling just 6 to 10 years in. At the same time, millions of cyber roles remain unfilled, and the talent gap keeps growing. Lynn Dohm, Executive Director of Women in CyberSecurity (WiCyS), is working to change that. In this episode, Lynn shares how WiCyS has grown fr…
…
continue reading

1
Episode 335 Deep Dive: Anne-Marie Paterson | The Changing Face of Risk
42:35
42:35
Play later
Play later
Lists
Like
Liked
42:35In this episode, we sit down with Anne-Marie Paterson, a profound risk executive, to explore the evolving role of the Chief Risk Officer and the changing face of risk management. Anne-Marie shares her perspective on how risk now has a real seat at the C-suite table, emphasising the shift from being a business roadblock to serving as an enabler of s…
…
continue reading

1
GitHub's NPM Lockdown, Deep Fake Threats, and Yellowknife's Cyber Incident: Cybersecurity Today
8:57
8:57
Play later
Play later
Lists
Like
Liked
8:57Cybersecurity Today: GitHub's NPM Lockdown, Deep Fake Threats, and Yellowknife's Cyber Incident In this episode of 'Cybersecurity Today', host Jim Love discusses GitHub's response to widespread supply chain attacks in the NPM ecosystem, the alarming rise of deep fake attacks as highlighted by Gartner, and the remarkable handling of a cyber incident…
…
continue reading

1
SANS Stormcast Wednesday, September 24th, 2025: DoS against the Analyst; GitHub Improvements; Solarwinds and Supermicro BMC vulnerabilities (#)
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23SANS Stormcast Wednesday, September 24th, 2025: DoS against the Analyst; GitHub Improvements; Solarwinds and Supermicro BMC vulnerabilities Distracting the Analyst for Fun and Profit Our undergraduate intern, Tyler House analyzed what may have been a small DoS attack that was likely more meant to distract than to actually cause a denial of service …
…
continue reading
Consumer Reports on Windows 10 updates. Waste (not fraud or abuse) within DoD Cyberoperations. China's DeepSeek produces deliberately flawed code. WebAssembly v3.0 officially released. Firefox v143 updates and new features. Firefox for Android now offers DoH. A nearly terminal flaw in Microsoft's Entra ID. Chrome hits its 6th 0-day this year. Emerg…
…
continue reading

1
SN 1044: The EU's Online Age Verification - Consumer Reports vs. Microsoft
3:01:56
3:01:56
Play later
Play later
Lists
Like
Liked
3:01:56Consumer Reports on Windows 10 updates. Waste (not fraud or abuse) within DoD Cyberoperations. China's DeepSeek produces deliberately flawed code. WebAssembly v3.0 officially released. Firefox v143 updates and new features. Firefox for Android now offers DoH. A nearly terminal flaw in Microsoft's Entra ID. Chrome hits its 6th 0-day this year. Emerg…
…
continue reading