Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Artwork
 
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Artwork

1
Resilient Cyber

Chris Hughes

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Artwork

1
ISACA Podcast

ISACA Podcast

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
  continue reading
 
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
  continue reading
 
Artwork

1
Stop the World

Australian Strategic Policy Institute (ASPI)

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Everything seems to be accelerating: geopolitics, technology, security threats, the dispersal of information. At times, it feels like a blur. But beneath the dizzying proliferation of events, discoveries, there are deeper trends that can be grasped and understood through conversation and debate. That’s the idea behind Stop the World, the Australian Strategic Policy Institute’s podcast on international affairs and security. Each week, we cast a freeze-frame around the blur of events and bring ...
  continue reading
 
Artwork

1
TechSurge: Deep Tech VC Podcast

Celesta Capital | Deep Tech Venture Capital Firm

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Email feedback and show ideas to [email protected]. Join us as we examine the next major tech cycle, uncover emerging global tech hubs, and analyze where VC investment d ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork

1
KBKAST

KBI.Media

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
  continue reading
 
Artwork

1
Dirty South Security Podcast

VerSprite Cybersecurity

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Artwork
 
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
The Cyber-Savvy Boardroom, a Google Cloud Office of the CISO podcast, offers monthly 15-20 minute episodes featuring security leaders, board members, and thought leaders. Hosted by David Homovich and rotating Office of the CISO members, experts share insights for strategic clarity and improved organizational security. Guests include board members, Google Cloud/Google executives, Office of the CISO Board Insights team members, board advisors, and industry thought leaders.
  continue reading
 
Artwork

1
Razorwire Cyber Security

Razorthorn Security

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
  continue reading
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
  continue reading
 
Cyber Dogs Ai is a podcast about tips on navigating ai, how to stay safe in the digital landscape, general conversations regarding technology and how to use it for our benefit! DON’T PUT YOURSELF IN THE DIGITAL DOGHOUSE! Hit that follow button, and stay tuned for more!
  continue reading
 
Welcome to The Monica Talks Cyber Podcast Experience: The fastest, easiest and an engaging way to build and grow your career and business in artificial intelligence, leadership and cybersecurity. Monica Talks Cyber is a technology, career and business podcast and an engaging platform for real stories, discussions and opinions from renowned global experts in technology, leadership and cybersecurity. The podcast show is hosted by Monica Verma, Hacker, CISO, Keynote Speaker, Founder & CEO, Mult ...
  continue reading
 
Artwork

1
2 Cyber Chicks

Simply Cyber Media Group

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
  continue reading
 
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Artwork

1
Tech Observer

Tech Observer

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Tech Observer Podcasts bring diverse perspectives from government technology leaders, CIOs, CISOs, CTOs and policy makers on the use of technology for governance, operational efficiency and improving public service delivery.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
Ahead of the Threat

Federal Bureau of Investigation

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
  continue reading
 
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
  continue reading
 
Loading …
show series
 
In an increasingly interconnected world, organizations face the dual imperative of adhering to complex and evolving data protection laws while simultaneously fortifying their defenses against escalating cyber threats driven by geopolitical tensions. This podcast explores the critical role of Chief Information Security Officers (CISOs) in bridging t…
  continue reading
 
Can you land a CISO role without the title, the connections, or the years of "required" experience? Yes and I did it in 90 days. This isn’t luck. It’s strategy. In today's episode, I walk you through the exact roadmap I used to go from rejected applications and zero C-level experience to signing my first CISO contract. In this episode, you’ll learn…
  continue reading
 
Interview of Host David Mauro on topics of How To Avoid Business Interruption. What Leaders Must do. Covering true healthcare breaches which have killed and effected medical care along with small business guidance. Topics include: how to avoid business interruption, what business leaders need to know about cyber attacks, when ransomware kills, how …
  continue reading
 
Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider build for Windows 11, Microsoft is testing an export feature for data stored by Recall. The feature is limited to European …
  continue reading
 
Anne Wojcicki, founder of 23andMe, has successfully repurchased the genetic testing firm out of bankruptcy through her non-profit TTAM for $305 million, surpassing a prior winning bid from Regeneron. The deal, which excludes the company’s liabilities, may ease public concerns over genetic data transfers, given Wojcicki’s continued leadership. The a…
  continue reading
 
James Potter, CEO of DSE, joins us in the studio for great conversation and exclusive insight on The Aftermath of Data Breaches: Navigating Reputational Damage and Protecting Your Brand Image. Reputational Harm from Data Breaches, Cybersecurity Reputation Management and Operational Leadership. Find more on DSE here: https://www.dse.team/ Topics dis…
  continue reading
 
Guest: Daniel Fabian, Principal Digital Arsonist, Google Topic: Your RSA talk highlights lessons learned from two years of AI red teaming at Google. Could you share one or two of the most surprising or counterintuitive findings you encountered during this process? What are some of the key differences or unique challenges you've observed when testin…
  continue reading
 
Explore the critical challenges of securing artificial intelligence as we delve into a series of real-world malicious operations leveraging AI for deceptive employment schemes, cyber threats, social engineering, and covert influence. This episode uncovers how threat actors from various countries are exploiting AI capabilities, while also highlighti…
  continue reading
 
Send us a text Security is increasingly viewed as a strategic business advantage rather than just a necessary cost center. The dialogue explores how companies are leveraging their security posture to gain competitive advantages in sales cycles and build customer trust. • Taylor's journey from aspiring physical therapist to cybersecurity expert thro…
  continue reading
 
Think you can manage industrial systems like your IT infrastructure? Think again. In this episode of The Audit, Dino Busalachi unpacks the high-stakes complexity of OT-IT convergence—and why your trusty IT playbook flatlines on the plant floor. Join the IT Audit Labs crew as we dive into the chaos of managing 10,000+ industrial assets across a spra…
  continue reading
 
Host David Shipley discusses several critical cybersecurity incidents and developments. WestJet, Canada's second-largest airline, faced a cybersecurity breach impacting its mobile app and internal systems. The airline is working with law enforcement to investigate while emphasizing the integrity of its flight operations. Additionally, the Anubis ra…
  continue reading
 
Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://unit42.paloaltonetworks.com/malicious-javascript-using-jsfiretruck-as-obfuscation/ JavaScript obfuscated with JSF*CK is bei…
  continue reading
 
Join us for an insider’s view at why and how we built Tresorit Engage — our latest solution designed to streamline external collaboration with clients and partners.We’ll walk you through the journey that led to Engage Rooms and how it helps businesses run projects at full speed and collaborate with full confidence. We’ll look into how to spin up da…
  continue reading
 
Cyber deception is undergoing a significant transformation, moving beyond static honeypots to become a dynamic and proactive defense strategy against sophisticated threats. This episode explores how artificial intelligence and advanced frameworks are revolutionizing deception, enabling adaptive defenses, and enhancing threat intelligence gathering.…
  continue reading
 
In this episode of The Digital India Podcast, Mohd Ujaley explores cyber resilience, ransomware and AI-driven security with Sandeep Bhambure, Vice President and Managing Director, Veeam India & SAARC. Discover: 🔹 Why data exfiltration is now more dangerous than ransomware 🔹 How AI is changing cyber defense strategies 🔹 India’s critical infrastructu…
  continue reading
 
🔥🚨NEW EPISODE 🔥🚨We delve into the Latest AI Threats To Small Business. Exposing AI Hiring Fraud! Watch to the end to see live examples of how this is happening today. Topics covered: 🔥AI Fraud in Interviews, 🔥How AI Scams Effect Business, 🔥AI Fraud In Job Interviews takeaways AI-driven fraud is a growing concern for businesses. Many resumes are now…
  continue reading
 
This episode dives into the evolving landscape of insider threats, from accidental negligence to sophisticated nation-state operations leveraging remote work environments. We explore how "trusted persons" with authorized access can intentionally or unintentionally compromise an organization's assets, highlighting the unique challenges of detecting …
  continue reading
 
In this episode of 'Cybersecurity Today,' hosts John Pinard and Jim Love introduce their unique show, 'The Secret CISO,' which aims to dive deep into the lives and thoughts of CISOs and similar roles, beyond the usual interview-style format. The guest for this episode is Priya Mouli, CISO at Sheridan College, who shares her journey from engineering…
  continue reading
 
🔐 Inside the SOC 🔐 Go behind the scenes with the Alias Security Operations Center (SOC) team to learn how they operate, collaborate, and tackle today’s top cyber threats ⚔️. Find out why a SOC matters, and how organizations can still leverage SOC insights and support, even without one in-house 💼. 🎧 Tap in and get cyber-smart with the experts. #Cybe…
  continue reading
 
In this episode, Steve Goodman and Bastiaan Verdonk interview Victor King from Quest on best practices for Active Directory security. They discuss identifying misconfigurations, managing privileged access, and continuous environmental monitoring. Want to stay up to date on all things Practical 365? Follow us on Twitter, Facebook, and Linkedin to st…
  continue reading
 
This podcast explores how cybersecurity risk management can be seamlessly integrated into broader enterprise privacy and operational processes. We delve into the critical need for CISOs to translate technical jargon into business-oriented language, focusing on financial impacts, operational risks, and business continuity. Discover how shifting from…
  continue reading
 
In this episode of The Cyber Threat Perspective, we highlight the pentest findings that, frankly, have no business showing up in 2025. From accounts with weak passwords and no MFA to plaintext credentials on file shares, we break down the common misconfigurations and oversights that attackers still abuse, despite years of seeing the same issues ove…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love discusses critical AI-related security issues, such as the Echo Leak vulnerability in Microsoft's AI, MCP's universal integration risks, and Meta's privacy violations in Europe. The episode also explores the dangers of internet-exposed cameras as discovered by BitSight, highlighting the urgent n…
  continue reading
 
In this episode, we sit down with Matt Watts, Global Data Expert, as he explores the journey from storage to intelligent data infrastructure. Matt walks us through the four major technology waves that have shaped the industry: modular technologies, virtualization, cloud computing, and the dawn of intelligent data infrastructure driven by AI. He sha…
  continue reading
 
We explore the motives of cyber criminals, examples of cyber crime gang activities, risks of physical harm from ransomware, understanding cyber crime motive, and why its important to understand cyber crime MO (Modus Operandi). Overview of the MO (Modus Operandi) of REVIL, CONTI, HIVE, DARKSIDE and other ransomware gangs and how they drive their ope…
  continue reading
 
In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft talk about furry hacking collectives, a spree of ransomware attacks targeting Australian healthcare organisations, and good news for farmers. Hollingworth and Croft start their chat by catching up on a defacement campaign targeting a website administered by the US Depar…
  continue reading
 
Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot…
  continue reading
 
In the rapidly evolving landscape of artificial intelligence, traditional executive roles like the CAIO, CTO, and CISO inadequately address unique AI security challenges, leading to significant gaps in coverage and specialized expertise. This episode delves into the foundational distinctions between AI Governance, Risk, and Compliance (GRC) and tra…
  continue reading
 
NASA firmly debunked claims by influencer Laysa Peixoto, who portrayed herself as a career astronaut selected for lunar and Mars missions. Clarifying that Peixoto had no official affiliation, NASA explained she participated only in a student workshop. Additional claims of university credentials were also proven false, intensifying the controversy. …
  continue reading
 
In this episode, we’re flipping the script on traditional security thinking. As security champions, we know that resiliency isn’t just a buzzword—it’s the backbone of modern cybersecurity strategy. Join us as we unpack: 🔐 From Security to Resiliency – Were we too confident in the early days of CISO-ship? We reflect on the evolution of security lead…
  continue reading
 
Every organization is built on people, structures, and culture. But culture isn’t static—it evolves with every interaction, ambition, and shift in circumstance. As IT drives business transformation, new technologies reshape how people connect and collaborate. In this ever-changing landscape, a strong, adaptive culture is the key to lasting success.…
  continue reading
 
Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows…
  continue reading
 
Teen Hacker EXPOSED! PowerSchool Breach Puts 60M Kids at Risk | Protect Your Children Online 🚨 60 Million Students Exposed in PowerSchool Cyber Attack — What Parents Need to Know NOW A 19-year-old hacker named Matthew D. Lane pulled off one of the largest education data breaches ever, targeting PowerSchool and exposing the personal information of o…
  continue reading
 
Register for Free, Live webcasts & summits: https://poweredbybhis.com 00:00 - PreShow Banter™ — Time to Bake 05:12 - Chatbot Tells Addict to Take Drugs - Talkin’ Bout [infosec] News 2025-05-06 06:08 - Story # 1: Meta and Yandex are de-anonymizing Android users’ web browsing identifiers 12:55 - Story # 2: Therapy Chatbot Tells Recovering Addict to H…
  continue reading
 
Welcome to 🎙️The SOC Brief 🎙️our byte-sized mini series bringing you weekly updates straight from the Security Operations Center. In this episode, Andrew, Dax, and Dylan break down what life in the SOC looks like, the rise of malvertising, and the emerging threat known as Recipe Lister, discussing how it’s being tracked. Tune in for a quick, expert…
  continue reading
 
The Future of HubSpot is Passwordless Learn how HubSpot’s CISO Alyssa Robinson breaks down passwordless authentication, innovative security strategies, and the art of balancing usability with protection on the latest episode. + + + Find more episodes on YouTube or wherever you listen to podcasts, as well as at netspi.com/agentofinfluence.…
  continue reading
 
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumar’s dynamic keynote from BlueHat India 2025, where he explores the evolving threat landscape of AI through the lens of the Microsoft AI Red Team. From adversarial machine learning to psychosocial harms and persuasive AI, Ram highlights real-world…
  continue reading
 
This episode of 'Cybersecurity Today' hosted by Jim Love covers various significant events in the cybersecurity landscape. OpenAI has banned multiple ChatGPT accounts linked to state-sponsored hackers from countries including China, Russia, North Korea, Iran, and the Philippines for developing malware, generating disinformation, and conducting scam…
  continue reading
 
In this episode, we sit down with Imran Husain, Chief Information Security Officer at MillerKnoll, as he discusses the evolving landscape of cybersecurity threats in the manufacturing sector. Imran explores the challenges that arise as manufacturing increasingly integrates with online technologies and IoT, highlighting the unique vulnerabilities po…
  continue reading
 
During escalating civil unrest, traditional emergency resources can become overwhelmed, leaving individuals and businesses to fend for themselves. This podcast delves into the critical strategies of personal self-protection, including the 'Gray Man' theory for blending in, and property hardening, from the 'Gray House' concept to overt 'Hard Target'…
  continue reading
 
In this episode of Reimagining Cyber, we break down the key findings from the 2025 Cybersecurity Staff Compensation Benchmark Report from the Institute for Applied Network Security (IANS). Host Ben sits down with Rob Aragao (Chief Security Strategist, OpenText) to explore why over 50% of cybersecurity professionals just below the CISO level are con…
  continue reading
 
Welcome to Razorwire, where we examine the realities facing cybersecurity professionals on the front lines of digital defence. In this episode, I am joined by Rob Priest, a former NHS insider with 24 years of experience, and returning co-host Richard Cassidy to expose the cybersecurity crisis gripping Britain's healthcare system. From WannaCry's de…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play