Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Security Technology Podcasts

show episodes
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Shared Security is the the longest-running cybersecurity and privacy podcast where industry veterans Tom Eston, Scott Wright, and Kevin Johnson break down the week’s security WTF moments, privacy fails, human mistakes, and “why is this still a problem?” stories — with humor, honesty, and hard-earned real-world experience. Whether you’re a security pro, a privacy advocate, or just here to hear Kevin yell about vendor nonsense, this podcast delivers insights you’ll actually use — and laughs yo ...
  continue reading
 
Artwork

1
Cyber Security America

Joshua R Nicholson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
  continue reading
 
Artwork
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Artwork

1
Resilient Cyber

Chris Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Artwork

1
Brutally Honest Security

Barricade Cyber Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Artwork

1
Cyber Defense Radio

Cyber Defense Magazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
Artwork

1
The Next Five

FT Partner Studio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Next Five is the FT’s partner-supported podcast, exploring the future of industries through expert insights and thought-provoking discussions with host Tom Parker. Each episode brings together leading voices to analyse the trends, innovations, challenges and opportunities shaping the next five years in business, technology, health and lifestyle This content is paid for by advertisers and is produced in partnership with the Financial Times’ Commercial Department Hosted on Acast. See acast ...
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Artwork

1
Simply ICS Cyber

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Mastering Cybersecurity is your narrated audio guide to the essential building blocks of digital protection. Each 10–15 minute episode turns complex security concepts into clear, practical lessons you can apply right away—no jargon, no fluff. From passwords and phishing to encryption and network defense, every topic is designed to strengthen your understanding and confidence online. Whether you’re new to cybersecurity or refreshing your knowledge, this series makes learning simple, smart, an ...
  continue reading
 
Artwork

1
Technology and Security

Dr Miah Hammond-Errey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
  continue reading
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
Security Cocktail Hour

Joe Patti and Adam Roth

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security veterans Joe Patti and Adam Roth welcome a diverse lineup of cybersecurity and information security experts to share their insights at the virtual bar. From cutting edge topics like AI and Operational Technology (OT) to the realities of careers and mental health, you'll get the inside view of what's happening across the industry and what it's really like to work in these fields, from the people who do it every day. Reach us at [email protected] or @SecCocktailHour on ...
  continue reading
 
Artwork

1
KBKAST

KBI.Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
  continue reading
 
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
  continue reading
 
Artwork

1
Dirty South Security Podcast

VerSprite Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Artwork

1
Stop the World

Australian Strategic Policy Institute (ASPI)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Everything seems to be accelerating: geopolitics, technology, security threats, the dispersal of information. At times, it feels like a blur. But beneath the dizzying proliferation of events, discoveries, there are deeper trends that can be grasped and understood through conversation and debate. That’s the idea behind Stop the World, the Australian Strategic Policy Institute’s podcast on international affairs and security. Each week, we cast a freeze-frame around the blur of events and bring ...
  continue reading
 
Artwork

1
GDPR Now!

Karen Heaton/Data Protection 4 Business

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
  continue reading
 
Artwork
 
Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI). Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers.
  continue reading
 
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
  continue reading
 
Artwork

1
2 Cyber Chicks

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
  continue reading
 
Artwork

1
Redefining Society and Technology Podcast

Marco Ciappelli, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Let’s face it: the future is now. We live in a hybrid analog-digital society, and it’s time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? It’s no longer real — just a figment of our imagination. We’re constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. There’s no better place ...
  continue reading
 
Loading …
show series
 
In this episode of the Technology & Security podcast, host Dr. Miah Hammond-Errey is joined by Kate Carruthers. Kate is currently the head of data analytics and AI at the Australian Institute of Company Directors. She shares her journey from defending Westfield against state and non-state cyber attacks to leading UNSW's enterprise data, AI, and cyb…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love discusses the shocking discovery of over 80,000 leaked credentials and secrets in online code formatting tools with Jake Knott, a principal security researcher from Watchtower. They delve into the vulnerabilities exposed by these tools, the inadvertent leaking of sensitive information, and how a…
  continue reading
 
The former Army Ranger explores how AI might reshape drone warfare, America's tech race with China, Russia's war in Ukraine, and much more. Guest: Paul Scharre, executive vice president at the Center for a New American Security and author of several books, including "Four Battlegrounds: Power in the Age of Artificial Intelligence," and "Army of Non…
  continue reading
 
On this episode, Silent Sector breaks down what cybersecurity really looks like beyond the buzzwords. We dive into CTEM and why continuous exposure management beats the outdated once-a-year pen test. You’ll hear how adversarial simulation, social engineering, and threat modeling work together to reveal real-world risk—not just compliance checkboxes…
  continue reading
 
Send us a text The most reliable way to learn cybersecurity is to touch the tools, break things safely, and build them back with intent. That’s the heartbeat of our conversation with John Hammond, where we unpack how hands-on labs, community feedback, and a healthy mindset can speed up your growth and make it last. We start with the spirit of DEF C…
  continue reading
 
Cybersecurity Today: Spider-Man Phishing Kit, Gogs Zero-Day Exploits, and Recent Patches In this episode, host Jim Love discusses recent cybersecurity issues including the Spider-Man phishing kit targeting European banks and cryptocurrency users, a zero-day vulnerability in the self-hosted Git service Gogs, and various security updates. The Spider-…
  continue reading
 
This week gave us the gift of some more React Server Components vulnerabilities (0:22) and further exploitation of the previously disclosed bugs by a variety of threat groups. There were also a long list of vulnerabilities disclosed by Microsoft, Adobe, and others, which we discuss in the context of how difficult vulnerability management is right n…
  continue reading
 
In this episode I sit down with my friend and Vulnerability Researcher Patrick Garrity 👾🛹💙 of VulnCheck to do a roundup of the latest trends, analysis and insights into the vulnerability and exploitation ecosystem throughout the past year. We covered a lot of great topics, including: - The most notable vulnerability trends over 2025, including what…
  continue reading
 
This episode discusses the US Department of War's AI "Manifest Destiny", hackers going hard on Aussie victims, and Australia bringing in its brand new social media ban. Hosts David Hollingworth and Daniel Croft kick things off with artificial intelligence, with CommBank trialling a new DevOps agent and the Pentagon launching its new GenAI.mil platf…
  continue reading
 
SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 "My…
  continue reading
 
Since joining NATO in 2024, Sweden has taken on a more prominent role in European security. Swedish Defense Minister Pål Jonson joined Ryan in Washington to discuss how Sweden is supporting Ukraine, rebuilding its own military with more resources, and pushing for a faster, more agile defense acquisition system.…
  continue reading
 
Today we continue the AI theme with a TSD Summit Sessions conversation on China and AI with Selina Xu, who leads China and AI research and strategic initiatives in the Office of Eric Schmidt. Who is winning the AI race between the US and China? Are they focusing on the same things? Where do China’s capabilities stand today? How is AI being adopted …
  continue reading
 
SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerab…
  continue reading
 
Cybercrime doesn’t take holidays off. December is one of the busiest months for hackers. In this festive special of Darnley’s Cyber Café, we dig into why cyberattacks surge during the holidays, how scammers exploit online shopping hype, and why distracted employees and understaffed IT teams make the perfect storm for breaches. We also unpack the ps…
  continue reading
 
AI is evolving faster than most organizations can keep up with — and the truth is, very few companies are prepared for what’s coming in 2026. In this episode of Reimagining Cyber, Rob Aragao speaks with Ken Johnston, VP of Data, Analytics and AI at Envorso, about the uncomfortable reality: autonomous AI systems are accelerating, regulations are tig…
  continue reading
 
Cybersecurity Today: Google Chrome's AI Safety Plan, React2Shell Fixes, & New Ransomware Tactics In this episode of Cybersecurity Today, host Jim Love discusses Google's new security blueprint for AI-powered Chrome agents, highlighting measures against indirect prompt injections and model errors. Learn about Next JS's new tool for addressing the cr…
  continue reading
 
Coming from a military family, Erin Whitmore was prepared for a career of service. But her path took her not into the military, but the intelligence community, first in the private sector supporting the DIA and NGA, and later as a cybersecurty program manager in the Office of the Director of National Intelligence. She eventually joined CIA as an op…
  continue reading
 
In this episode, we sit down with Amberley Brady, founder at Realfoodprice, as she explores the urgent issue of food security as a national security crisis in Australia. Amberley discusses the four pillars of food security—availability, access, utilization, and stability—emphasising how fragile supply chains, economic shocks, climate events, and cy…
  continue reading
 
A devastating new React vulnerability earned a "perfect 10" for risk, letting attackers remotely run code on a million-plus servers with a single HTTP request. Find out what happened, how fast attackers moved in, and why this bug changes everything for web security. France's VanityFair face a stiff fine over cookies. GrapheneOS pulls out of France …
  continue reading
 
A devastating new React vulnerability earned a "perfect 10" for risk, letting attackers remotely run code on a million-plus servers with a single HTTP request. Find out what happened, how fast attackers moved in, and why this bug changes everything for web security. France's VanityFair face a stiff fine over cookies. GrapheneOS pulls out of France …
  continue reading
 
In this episode of the Contested Ground podcast, hosts Phil Tarrant and Major General (Ret'd) Dr Marcus Thompson are joined by special guest Dr Ross Babbage, chief executive officer of Strategic Forum and Non-Resident Senior Fellow at the Center for Strategic and Budgetary Assessments in Washington DC. Together, the trio dive into Australia's rapid…
  continue reading
 
SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches. Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution…
  continue reading
 
It’s our annual festive special! 🎄✨We’re wrapping up 2025 with a holiday extravaganza packed tighter than a Christmas turkey — complete with games, AI shenanigans, and some truly unhinged cybersecurity headlines. From celebrity deepfakes to record-breaking hacks, we’re revisiting the wildest moments of the year in tech. In “Real or AI?!”, the team …
  continue reading
 
In the first Summit Sessions interview post-Sydney Dialogue, David Wroe speaks with leading global AI safety expert, Dr Roman Yampolskiy. Roman is founding director of the Cyber Security Lab at the University of Louisville, and author of many books including “AI: Unexplainable, Unpredictable, Uncontrollable”. This week, ASPI convened the fourth Syd…
  continue reading
 
SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as "undocumented" may actually be documented in the underlying hardware description. https://www.to…
  continue reading
 
Guest Introduction Andrew DeBratto, Chief Information Security Officer at Hunton Andrews Kurth LLP, leads cybersecurity strategy for one of the world's top 100 law firms. With more than 25 years in IT and two decades in the legal sector, Andrew combines operational discipline with forward-thinking innovation. His leadership at Hunton Andrews Kurth …
  continue reading
 
Job scams are getting scary good. We're talking AI deepfakes, fake recruiters, and cryptocurrency traps that are fooling even tech-savvy professionals. In this Security Cocktail Hour holiday special, Joe and Adam break down four of the most dangerous job scams hitting people right now—because nothing says "Happy Holidays" quite like protecting your…
  continue reading
 
Send us a text We trace Jake’s unlikely route from journalism to the White House, how DEF CON’s Voting Village began, and why imposter syndrome can be a secret advantage when paired with relentless learning. Then we pull apart cyber strategy, Stuxnet’s signal value, and a plan to choke fentanyl through targeted offensive operations against cartels’…
  continue reading
 
In today’s podcast we cover four crucial cyber and technology topics, including: 1. VPN providers under fire 2. Apache flaw allows access to sensitive data 3. 40 Year old U.S.-based man gives identity to North Koreans 4. Portugal aims to protect security researchers I'd love feedback, feel free to send your comments and feedback to | cyberandtechwi…
  continue reading
 
Guest Introduction Rao Tadepalli is the CEO and Founder of DigiTran, a digital transformation and AI advisory firm specializing in insurance and financial services. Previously the CIO of Slide Insurance, Rao has spent decades guiding insurers through modernization, core system evolution, cloud adoption, and AI driven process redesign. Today he help…
  continue reading
 
Explosive React Vulnerability and AI Tool Flaws Uncovered: Major Implications for Cybersecurity In this episode of Cybersecurity Today, host David Shipley discusses a new significant React vulnerability, React2Shell, that has caused widespread confusion and debate in the security community. This major flaw, affecting a widely used web framework, po…
  continue reading
 
In this episode we discuss the rising challenge of AI-generated videos, including deepfakes and synthetic clips that can deceive even a skeptical viewer. Once the gold standard of proof, video content is now increasingly manipulated through advanced AI tools like Sora 2 and Google’s Nano Banana, making it harder to separate reality from fiction. To…
  continue reading
 
In this episode we discuss the rising challenge of AI-generated videos, including deepfakes and synthetic clips that can deceive even a skeptical viewer. Once the gold standard of proof, video content is now increasingly manipulated through advanced AI tools like Sora 2 and Google's Nano Banana, making it harder to separate reality from fiction. To…
  continue reading
 
Episode 14 – Leadership in the AI Era with Ruby Agarwal (VP Cloud Platform & Operations @ Avaya) The game has permanently changed. AI isn’t coming for your job tomorrow; it’s already rewriting the operating system of every security and technology organization today. In this no-BS episode, Tony UV sits down with Ruby Agarwal to separate leadership t…
  continue reading
 
SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln AutoIT3 Compiled Scripts Dropping Shellcodes Malicious AutoIT3 scripts are usign the "FileInstall" function to include additional scripts at compile time that are dropped as temporary files during execution. https://isc.sans.edu/diary/AutoIT3%20Compiled%20…
  continue reading
 
In the final episode of “Inside the Mind of a Ransomware Operator,” Chris and Nick look ahead to the next decade of cybercrime. What happens when ransomware goes fully autonomous? AI that picks the most valuable files… then negotiates the ransom in 17 languages Malware that mimics real human behavior so perfectly that EDR can’t tell the difference …
  continue reading
 
Why do people ignore cybersecurity until it’s too late? In this episode of Darnley’s Cyber Café, we dive into the psychology behind cyber neglect, the illusion of “it won’t happen to me,” and why privacy still matters in a world where everything feels exposed. Using real data and relatable examples (including one about bathroom stalls…), we break d…
  continue reading
 
Dr. Steve Mancini: https://www.linkedin.com/in/dr-steve-m-b59a525/ Marco Ciappelli: https://www.marcociappelli.com/ Nothing Has Changed in Cybersecurity Since War Games — And That's Why We're in Trouble "Nothing has changed." That's not what you expect to hear from someone with four decades in cybersecurity. The industry thrives on selling the next…
  continue reading
 
In this episode, we explore the hidden human cost of major cyber incidents—the stress on IT teams, the disruption to patient care, the executives forced into impossible decisions, and the ripple effects felt by everyday people who rely on critical systems. Beyond the technical breakdown, we examine how breaches impact lives, strain organizations, a…
  continue reading
 
Cybersecurity Today: The Rise of Living Off the Land Strategies & More In this episode of Cybersecurity Today's Month in Review, host Jim Love is joined by Laura Payne from White Tuque and David Shipley from Beauceron Security. They discuss several pressing cybersecurity issues, including the growing threat of 'living off the land' strategies where…
  continue reading
 
Episode 46: Building the Future with Agentic AI — Deep Dive with Ben Wilcox In this episode of Cybersecurity America, technologist and Proarch leader Ben Wilcox breaks down the biggest insights from Microsoft Ignite, including breakthroughs in agentic AI, emerging security trends, and what organizations must prepare for as AI-driven systems rapidly…
  continue reading
 
Dennis and Lindsey react (!) to the React2Shell vulnerability disclosure and the quick exploitation of it by Chinese threat actors, then discuss the continues intrusions into critical infrastructure by the Salt Typhoon actors and this week's congressional hearing on telecom network security. Finally, we talk about some upcoming hacker movie episode…
  continue reading
 
As the UN’s Secretary-General António Guterres said in July this year, “Now, we are on the cusp of a new era. Fossil fuels are running out of road. The sun is rising on a clean energy age.” Renewables and nuclear did reach an historic 40% share of global electricity generation in 2024, with renewables alone supplying roughly 32% of global power for…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play