Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Cyber Security Technology Podcasts
The opportunity to delve into the 'mindsz' of industry leaders in technology and cyber security.
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading
Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI). Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers.
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
The Cyber-Savvy Boardroom, a Google Cloud Office of the CISO podcast, offers monthly 15-20 minute episodes featuring security leaders, board members, and thought leaders. Hosted by David Homovich and rotating Office of the CISO members, experts share insights for strategic clarity and improved organizational security. Guests include board members, Google Cloud/Google executives, Office of the CISO Board Insights team members, board advisors, and industry thought leaders.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Discover the latest technology trends, meet technology enthusiasts, understand what’s behind talked about technological terms and get inspired by our passion for technology.
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
…
continue reading
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
…
continue reading
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
…
continue reading
The Next Five is the FT’s partner-supported podcast, exploring the future of industries through expert insights and thought-provoking discussions with host Tom Parker. Each episode brings together leading voices to analyse the trends, innovations, challenges and opportunities shaping the next five years in business, technology, health and lifestyle This content is paid for by advertisers and is produced in partnership with the Financial Times’ Commercial Department Hosted on Acast. See acast ...
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Here's what you need to know: this show is different. The Technology Boardroom is your access-all-areas pass to one of Microsoft's leading partners in the UK, a roster of tech experts bringing you technical expertise, roundtable debates and strategic industry advice. Each episode will break down the latest tech developments and trends, ranging from AI and cyber security to sustainability and professional development. A real tech enthusiast? A decision-maker responsible for thousands of emplo ...
…
continue reading
Twice weekly Technology News show covering the Tech Space. With Segments on Science, Mobile, Digital TV, FAA, FCC, Cyber Security, Gadgets and Tech Politics.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading

1
How Hackers Trick Your Brain (Not Your Tech)
26:47
26:47
Play later
Play later
Lists
Like
Liked
26:47Welcome to today’s episode, where we dive into the human side of cybersecurity with one of the most fascinating voices in the industry—Perry Carpenter, Chief Human Risk Strategist at KnowBe4. Perry brings a rare mix of technology expertise, behavioral science, and even stage magic to the world of cybersecurity. He’s the acclaimed author of Transfor…
…
continue reading
Rob and Blake discuss vulnerability and exploit discover in the age of AI and increasingly intelligent cyber threats. Rob Lee is the Chief of Research and Head of Faculty at SANS Institute and runs his own consulting business specializing in information security, incident response, threat hunting, and digital forensics. With more than 20 years of e…
…
continue reading

1
Storytelling, Culture and Cyber Resilience - Ep 165
31:31
31:31
Play later
Play later
Lists
Like
Liked
31:31Cyber resilience goes beyond checkboxes. In this episode, cybersecurity veteran Jerod Brennen (virtual CISO, executive advisor, and indie filmmaker) joins Rob Aragao to explore how storytelling, culture, and business alignment turn security into a true business enabler. Real-world lessons and practical steps help you shift from traditional cybersec…
…
continue reading

1
Lawfare Daily: Federal Judges Rule Against Trump on National Guard Deployment, Tariffs, and Removal of Migrant Children to Guatemala
56:09
56:09
Play later
Play later
Lists
Like
Liked
56:09In a live conversation on Sept. 2, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Senior Editors Scott R. Anderson, Anna Bower, and Lawfare Public Service Fellow Loren Voss to discuss Sunday’s emergency hearing in L.G.M.L. et al. v. Kristi Noem—in which Judge Sparkle Sooknanan blocked the Trump administration’s plans to send unaccomp…
…
continue reading

1
Episode 332 Deep Dive: Emilio Escobar | The Modern CISO
39:10
39:10
Play later
Play later
Lists
Like
Liked
39:10In this episode, we sit down with Emilio Escobar, Chief Information Security Officer at Datadog, as he explores the evolving definition of the modern CISO and what it means to lead security programs in today’s technology-driven organisations. Emilio delves into the transition of CISOs from traditional audit and IT backgrounds to deeply technical an…
…
continue reading

1
SN 1041: Covering All the Bases - SHAKEN Networks, Uncontrollable AI, and Robocall Reckoning
3:03:29
3:03:29
Play later
Play later
Lists
Like
Liked
3:03:29When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a loo…
…
continue reading
When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a loo…
…
continue reading

1
SANS Stormcast Wednesday, September 3rd, 2025: Sextortiion Analysis; Covert Channel DNS/ICMP; Azure AD Secret Theft; Official FreePBX Patches (#)
5:30
5:30
Play later
Play later
Lists
Like
Liked
5:30SANS Stormcast Wednesday, September 3rd, 2025: Sextortiion Analysis; Covert Channel DNS/ICMP; Azure AD Secret Theft; Official FreePBX Patches A Quick Look at Sextortion at Scale Jan analyzed 1900 different sextortion messages using 205 different Bitcoin addresses to look at the success rate, lifetime, and other metrics defining these campaigns. htt…
…
continue reading
Send us a text Support the show If you want to help me with my research please e-mail me. [email protected] If you want to join my question/answer zoom class e-mail me at [email protected] Art By Sarah/Desmond Music by Joakim Karud Little chacha Productions Juan Rodriguez can be reached at TikTok @ProfessorJrod [email protected] @…
…
continue reading
We’re asking the hard question: is technology the problem… to technology? If cybercrime only exists because the internet does, maybe the real solution is to unplug it all, toss the Wi-Fi router into the river, and go back to quills, scrolls, and smoke signals. In this episode, Darnley takes a tongue-in-cheek look at the rise of tech in cybersecurit…
…
continue reading

1
GovTechCon DC: Hybrid Event Aimed at Empowering Innovators in Government Technology
16:10
16:10
Play later
Play later
Lists
Like
Liked
16:10Are you ready to take your place at the forefront of government technology? From September 11–13, 2025, GovTechCon takes over The Square (1850 K St NW, Washington, D.C.) with a hybrid, immersive experience designed to ignite your GovTech journey. Creator, Symone Berry, joins the Security Clearance Careers Podcast to discuss why aspiring professiona…
…
continue reading
In this episode, KJ Burke and Qaiser Habib, head of engineering, Canada at Snowflake, discuss the challenges and strategies for unlocking the power of data within organizations. They explore the evolution of data management, the changing role of IT teams, the importance of data quality, and the shift towards unstructured data. The conversation also…
…
continue reading

1
Exploring Rowhammer, ECC, and the Future of Secure Data Storage with JB Baker
43:13
43:13
Play later
Play later
Lists
Like
Liked
43:13Welcome to a brand new episode of To The Point Cybersecurity, brought to you by Forcepoint! This week, hosts Rachael Lyon and Jonathan Knepher dive into a side of cybersecurity that doesn’t often get the spotlight: the ever-evolving world of memory, storage, and hardware security. They’re joined by JB Baker, Vice President of Marketing and Product …
…
continue reading

1
1,000 Developers Compromised By NX Build System Breach
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44Cybersecurity Today: Major Attacks on NX Build System, Sitecore, and Salesforce In this episode, David Shipley covers a string of significant cybersecurity breaches and vulnerabilities. Highlights include a compromise of the NX build system affecting over 1000 developers, remote code execution flaws in Sitecore's experience platform, and escalating…
…
continue reading

1
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Michael Callahan, Idan Plotnik, Josh Lemos, Chris Boehm - ASW #346
1:08:11
1:08:11
Play later
Play later
Lists
Like
Liked
1:08:11In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
…
continue reading

1
Lawfare Daily: Pocket Rescissions in Congress
36:01
36:01
Play later
Play later
Lists
Like
Liked
36:01On today’s episode, Molly Reynolds, Contributing Editor at Lawfare and Senior Fellow at Brookings, sits down with Zach Price, Associate Professor of Law at UC Law San Francisco, and Phil Wallach, Senior Fellow at the American Enterprise Institute, to discuss pocket rescissions as an approach to cancelling funds previously approved by Congress. They…
…
continue reading

1
Sustainable Surveillance: The Role of Optimized Storage
37:05
37:05
Play later
Play later
Lists
Like
Liked
37:05Steve invites SecureLogiq’s Ben Yoxall to explore the transformative power of optimized storage solutions in video surveillance and security systems. Ben talks about how these innovations not only drive cost efficiency but also align with sustainability goals, offering a competitive edge in today's eco-conscious market. Delve into the evolving IT i…
…
continue reading

1
SANS Stormcast Tuesday, September 2nd, 2025: pdf-parser Patch; Salesloft Compromise; Velociraptor Abuse; NeuVector Default Password (#)
5:39
5:39
Play later
Play later
Lists
Like
Liked
5:39SANS Stormcast Tuesday, September 2nd, 2025: pdf-parser Patch; Salesloft Compromise; Velociraptor Abuse; NeuVector Default Password pdf-parser: All Streams Didier released a new version of pdf-parser.py. This version fixes a problem with dumping all filtered streams. https://isc.sans.edu/diary/pdf-parser%3A%20All%20Streams/32248 Salesloft Drift Put…
…
continue reading

1
EP241 From Black Box to Building Blocks: More Modern Detection Engineering Lessons from Google
31:33
31:33
Play later
Play later
Lists
Like
Liked
31:33Guest: Rick Correa,Uber TL Google SecOps, Google Cloud Topics: On the 3rd anniversary of Curated Detections, you've grown from 70 rules to over 4700. Can you walk us through that journey? What were some of the key inflection points and what have been the biggest lessons learned in scaling a detection portfolio so massively? Historically the SecOps …
…
continue reading

1
Breaking the Sky: How Vulnerable Are Our Satellites?
55:37
55:37
Play later
Play later
Lists
Like
Liked
55:37Send us a text Grant McCracken shares his groundbreaking PhD research on satellite security, revealing how vulnerable our orbital infrastructure is to cyberattacks and the urgent need for better security measures before quantum computing renders current encryption obsolete. • Satellites face unique security challenges with limited patching windows …
…
continue reading

1
The Trials of the Trump Administration, Aug. 29
1:49:02
1:49:02
Play later
Play later
Lists
Like
Liked
1:49:02In a live conversation on YouTube, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Senior Editors Anna Bower and Scott Anderson, Lawfare contributor James Pearce, Lawfare Public Service Fellow Loren Voss, and The Atlantic staff writer Quinta Jurecic to discuss the legality of the Trump administration’s cancellation of $4.9 billion in …
…
continue reading

1
Lawfare Archive: Richard Albert on Constitutional Resilience Amid Political Tumult
46:41
46:41
Play later
Play later
Lists
Like
Liked
46:41From August 23, 2024: Richard Albert, William Stamps Farish Professor in Law, Professor of Government, and Director of Constitutional Studies at the University of Texas at Austin, joins Kevin Frazier, Assistant Professor at St. Thomas University College of Law and a Tarbell Fellow at Lawfare, to conduct a comparative analysis of what helps constitu…
…
continue reading

1
Lawfare Archive: The Wagner Group, One Year After Prigozhin with Vanda Felbab-Brown
39:01
39:01
Play later
Play later
Lists
Like
Liked
39:01From August 28, 2024: On today’s episode, Vanda Felbab-Brown, Director of the Initiative on Nonstate Armed Actors, Co-Director of the Africa Security Initiative, and Senior Fellow in Foreign Policy at the Brookings Institution joins Lawfare Managing Editor Tyler McBrien to help make sense of the recent skirmishes in northern Mali between the junta,…
…
continue reading

1
Cybersecurity Today: Month In Review Panel for August 2025
1:07:32
1:07:32
Play later
Play later
Lists
Like
Liked
1:07:32Cybersecurity Today: Navigating AI Advancements and Future Trends In this episode of 'Cybersecurity Today,' host Jim Love and panelists Tammy Harper, Laura Payne, and David Shipley discuss recent developments in cybersecurity, shifting focus to AI's impact on the industry. They explore emerging threats such as AI-generated ransomware and the effici…
…
continue reading

1
Scaling Laws: Uncle Sam Buys In: Examining the Intel Deal
48:22
48:22
Play later
Play later
Lists
Like
Liked
48:22Peter E. Harrell, Adjunct Senior Fellow at the Center for a New American Security, joins Kevin Frazier, AI Innovation and Law Fellow at the University of Texas School of Law and a Senior Editor at Lawfare, to examine the White House’s announcement that it will take a 10% share of Intel. They dive into the policy rationale for the stake as well as i…
…
continue reading

1
Zipline Phishing, Google Urges Password Resets, and AI-Driven Threats: Cybersecurity Today
9:43
9:43
Play later
Play later
Lists
Like
Liked
9:43In this episode of Cybersecurity Today, host Jim Love delves into the latest cyber threats and risks. Key topics include the new phishing campaign Zipline that flips traditional tactics, Google's call for 2.5 billion Gmail users to reset passwords due to a phishing attack by Shiny Hunters, and the emergence of AI-driven ransomware like Prompt Lock.…
…
continue reading

1
OpenAI under fire, WSU cyber attack update, and letters of marque for hackers
42:53
42:53
Play later
Play later
Lists
Like
Liked
42:53In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft discuss a pair of lawsuits targeting ChatGPT’s maker, cyber crime news, and one US politician’s novel solution to combat hackers. Hollingworth and Croft kick things off by addressing a pair of lawsuits targeting OpenAI and the tragic case of a teenager who was allegedly…
…
continue reading

1
SANS Stormcast Friday, August 29th, 2025: Scans for ZIP Files; FreePBX 0-Day; Passwordstate Patch (#)
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46SANS Stormcast Friday, August 29th, 2025: Scans for ZIP Files; FreePBX 0-Day; Passwordstate Patch Increasing Searches for ZIP Files Attackers are scanning our honeypots more and more for .zip files. They are looking for backups of credential files and the like left behind by careless administrators and developers. https://isc.sans.edu/diary/Increas…
…
continue reading

1
ChatGPT Buzzwords Are Reshaping Human Conversations #1841
37:11
37:11
Play later
Play later
Lists
Like
Liked
37:11New research reveals that ChatGPT’s frequently used words, often referred to as AI buzzwords, are increasingly appearing in everyday human conversations. By analyzing over 22 million words from unscripted podcasts, researchers found a notable rise in terms like “intricate” and “delve,” suggesting AI is subtly influencing how people speak. While the…
…
continue reading

1
Shlomo Eshed Founder & CEO @Romtrex about Industrial Automation OT cyber & Secure Remote Access
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06אני יכול להגיד בביטחון שמרבית אנשי הסייבר שעוסקים במערכות תפעוליות מגיעים ממערכות המידע ולמדו את תחום הבקרה, ללא הבנה של תחום הבקרה לעומק ההגנות יהיו מתוך התפיסה של מערכות מידע טעות מוכרת של הרבה מנהלי מערכות מידע ומנהלי אבטחת מידע בסביבות תפעוליות. משב רוח מרענן הם אנשי בקרה שנכנסו גם לתחום הסייבר, במסגרת המסע שלי למציאת פתרונות גישה מאובטחת מרחוק…
…
continue reading

1
Lawfare Daily: Unpacking Security Guarantees for Ukraine
59:13
59:13
Play later
Play later
Lists
Like
Liked
59:13On today’s episode, Lawfare’s Ukraine Fellow Anastasiia Lapatina sits down with Eric Ciaramella, a Senior Fellow at the Carnegie Endowment for International Peace and Lawfare Contributing Editor, to discuss the history of American security commitments abroad and how it can help inform the debate around security guarantees for Ukraine. To receive ad…
…
continue reading
The term polycrisis has been gaining traction in recent times as the world faces one disaster after another that are all interlinked. The far-reaching implications of a world at risk means boardrooms must remain agile to navigate their businesses past the rocks and into calmer seas. In a break away from our normal format, we've created our own boar…
…
continue reading

1
SANS Stormcast Thursday, August 28th, 2025: Launching Shellcode; NX Compromise; Volt Typhoon Report (#)
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39SANS Stormcast Thursday, August 28th, 2025: Launching Shellcode; NX Compromise; Volt Typhoon Report Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallet…
…
continue reading

1
Can You REALLY Trust AI? The Cybersecurity Risks Explained
24:12
24:12
Play later
Play later
Lists
Like
Liked
24:12Artificial Intelligence is transforming the world—but can it also put you at risk? In this episode of the Learn Online Security Podcast, Richard Bankert (Social Engineering Expert & CEO) and Chris Howells (Director of IT & Head Trainer) break down the hidden dangers of AI in cybersecurity. From data scraping and deepfakes to AI-powered scams and em…
…
continue reading

1
Resilient Cyber w/ Gianna & Maria - The State of Cybersecurity Marketing
17:43
17:43
Play later
Play later
Lists
Like
Liked
17:43In this episode of Resilient Cyber, I sit down with Gianna Whitver and Maria Velasquez to chat about the state of marketing in the cybersecurity industry, as well as their popular event "Cyber Marketing Con" In this episode, we discussed: The background of the CyberMarketingCon and what led Gianna and Maria to co-found the event and community Where…
…
continue reading

1
Rational Security: The “Room Raider” Edition
1:18:50
1:18:50
Play later
Play later
Lists
Like
Liked
1:18:50This week, Scott sat down with old and new Lawfare colleagues—Benjamin Wittes, Renée DiResta, and Michael Feinberg—to talk through the week’s big national security news stories, including: “An Old Fashioned Anti Raid.” Former Trump National Security Advisor (turned Trump critic) John Bolton got a rude awakening this past week when the FBI conducted…
…
continue reading

1
S2 E2: Securing the Grid: Substation Security
22:30
22:30
Play later
Play later
Lists
Like
Liked
22:30In this episode of Simply ICS Cyber, Don C. Weber and Tom VanNorman sit down with Chris Sistrunk to dive into the challenges and realities of Substation Security. Chris, now a Technical Leader at Mandiant & Google Cloud Security, brings years of experience from his time at Entergy, where he specialized in Transmission & Distribution SCADA systems…
…
continue reading

1
Lawfare Daily: ‘War in the Smartphone Age,’ with Matthew Ford
59:06
59:06
Play later
Play later
Lists
Like
Liked
59:06Matthew Ford, Associate Professor at Swedish Defence University and author of “War in the Smartphone Age: Conflict, Connectivity, and the Crises at Our Fingertips,” joins Lawfare’s Justin Sherman to discuss the role of smartphones and related technologies in war, how social media contributes to a collapse of context in the war content we see online…
…
continue reading

1
How a Cyber Attack Paralyzed a City - Ep 164
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20A ransomware attack shut down St. Paul, Minnesota—forcing a state of emergency and even the calling in of the National Guard. Cybersecurity expert Tyler Moffitt unpacks how it happened, who was behind it, and what cities and individuals can learn to avoid becoming the next target. Follow or subscribe to the show on your preferred podcast platform. …
…
continue reading
In this episode of Cybersecurity Today, host Jim Love discusses recent developments in cybersecurity, including a method to bypass GPT5 model safeguards, malware issues in the Google Play Store, NIST's new AI-specific security controls, and a cyber attack that led to a government shutdown in Nevada. The episode also covers a CRM-related breach link…
…
continue reading

1
Episode 331 Deep Dive: Christian Morin | Cyber Security and Organisational Resilience Across ANZ
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34In this episode, we sit down with Christian Morin, Chief Security Officer and Vice President of Product Engineering at Genetec, as he shares his insights on the critical importance of moving beyond a “checkbox” approach to incident response, emphasising the value of regular tabletop exercises and fostering genuine security muscle memory within team…
…
continue reading