Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Cyber Security Technology Podcasts
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We're going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject's benefit or ju ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI). Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers.
…
continue reading
Mastering Cybersecurity is your narrated audio guide to the essential building blocks of digital protection. Each 10–15 minute episode turns complex security concepts into clear, practical lessons you can apply right away—no jargon, no fluff. From passwords and phishing to encryption and network defense, every topic is designed to strengthen your understanding and confidence online. Whether you’re new to cybersecurity or refreshing your knowledge, this series makes learning simple, smart, an ...
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Broadcasting Ideas and Connecting Minds at the Intersection of Cybersecurity, Technology and Society. Founded by Sean Martin and Marco Ciappelli in 2015, ITSPmagazine is a multimedia platform exploring how technology, cybersecurity, and society shape our world. For over a decade, we've recognized this convergence as one of the most defining forces of our time—and it's more critical than ever. Our global community encourages intellectual exchange, challenging assumptions and diving deep into ...
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Let’s face it: the future is now. We live in a hybrid analog-digital society, and it’s time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? It’s no longer real — just a figment of our imagination. We’re constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. There’s no better place ...
…
continue reading
Sirens, a new podcast from the ladies of Bombshell, dissects the institutions of American power. With their trademark wit and charm, join Loren DeJonge Schulman, Radha Iyengar Plumb, and Erin Simpson as they sound the alarm on technology, governance, and national security issues. (And maybe lure men to their deaths.)
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
DTX Unplugged delves into the major challenges and innovations shaping business transformation, embodying our event's focus on the critical intersection of people, process, and technology. While rooted in the DTX ethos, this will be an industry-focused platform, tackling key issues, spotlighting groundbreaking innovations, and raising awareness for important topics across the sector.
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
The opportunity to delve into the 'mindsz' of industry leaders in technology and cyber security.
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading
1
The Ethics of AI in Legal Practice: Lessons from Andrew DeBratto
44:21
44:21
Play later
Play later
Lists
Like
Liked
44:21Guest Introduction Andrew DeBratto, Chief Information Security Officer at Hunton Andrews Kurth LLP, leads cybersecurity strategy for one of the world’s top 100 law firms. With more than 25 years in IT and two decades in the legal sector, Andrew combines operational discipline with forward-thinking innovation. His leadership at Hunton Andrews Kurth …
…
continue reading
1
EP249 Data First: What Really Makes Your SOC 'AI Ready'?
30:37
30:37
Play later
Play later
Lists
Like
Liked
30:37Guest: Monzy Merza, co-founder and CEO at Crogl Topics: We often hear about the aspirational idea of an "IronMan suit" for the SOC—a system that empowers analysts to be faster and more effective. What does this ideal future of security operations look like from your perspective, and what are the primary obstacles preventing SOCs from achieving it t…
…
continue reading
1
Cybersecurity Secrets Schools Never Teach
1:37:40
1:37:40
Play later
Play later
Lists
Like
Liked
1:37:40New Episode🔥We explore the often overlooked connection between a significant data breach and mental health, focusing on the resulting anxiety and cyber security concerns. We discuss how data security impacts identity theft and the rising rates of cyber attack. It's time we address the emotional fallout from these incidents. Learn Cybersecurity Secr…
…
continue reading
1
Prescription Drug Use and Your Security Clearance
15:01
15:01
Play later
Play later
Lists
Like
Liked
15:01Using illegal drugs is obviously a problem... just check out the DOHA cases we review every month on ClearanceJobsBlog(dot)com and News(dot)ClearanceJobs(dot)com. What we see more confusion surrounding is prescription use (+ abuse). Sean Bigley and Lindy Kyzer report on the topic. Hosted on Acast. See acast.com/privacy for more information.…
…
continue reading
1
Pwn2Own Ireland 2025: Major Cybersecurity Revelations & Critical Vulnerabilities
13:45
13:45
Play later
Play later
Lists
Like
Liked
13:45In this episode of Cybersecurity Today, host David Shipley covers the latest updates from the Pwn2Own 2025 event in Ireland, where top hackers earned over $1 million for uncovering 73 zero-day vulnerabilities. Despite significant hype, AI's impact on cybersecurity remains limited. We also dive into a critical Microsoft WSUS flaw under active exploi…
…
continue reading
1
Inside Offensive AI: From MCP Servers To Real Security Risks
1:06:01
1:06:01
Play later
Play later
Lists
Like
Liked
1:06:01Send us a text Security gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defenders are using language models today, where they fall apart, and how to build guardrails that hold up under pressure. From MCP servers that look a lot …
…
continue reading
1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE (#)
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysi…
…
continue reading
1
Undercover Investigation. Top Cyber Crime Ransomware Gang EXPOSED. LOCKBIT
27:16
27:16
Play later
Play later
Lists
Like
Liked
27:16A story like a crime thriller--all true. Legendary Security Researcher and Author, Jon DiMaggio, of Analyst1, joins us to discuss his undercover investigation and exposure of the inner working of one of the top cyber crime gangs on the planet: LOCKBIT. Jon DiMaggio’s latest blockbuster report Ransomware Diaries VOL 3: https://analyst1.com/ransomwar…
…
continue reading
1
The Cyber Café Playbook: Safety Is a Story We Tell Ourselves
9:27
9:27
Play later
Play later
Lists
Like
Liked
9:27This special Playbook episode distills the most important lessons from previous discussions — not as stories, but as rules. A framework for those who still believe digital safety is something they possess rather than something they must earn. If you think you understand the risk, start here and test that belief. Click here to send future episode re…
…
continue reading
1
Teaching Artificial Intelligence the Right Way with Dr. Sergio Sanchez
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37Guest Introduction Dr. Sergio Sanchez, CIO and CSO at Coleman Health Services, returns to The Cyber Business Podcast for his second appearance to explore the growing relationship between artificial intelligence, cybersecurity, and human ethics. As a returning guest and the host of Behind the Digital Curtain, Sergio combines deep technical knowledge…
…
continue reading
1
Navigating Cybersecurity in Small and Medium Businesses with White Hat Hacker Graham Berry
41:10
41:10
Play later
Play later
Lists
Like
Liked
41:10In this episode of Cybersecurity Today, host Jim Love sits down with Graham Barrie a CISO and white hat hacker, to discuss the critical importance of cybersecurity for small and medium-sized businesses. From the moment Berry fell in love with technology through a Tandy TRS 80 to his current role helping businesses secure their data, this conversati…
…
continue reading
We open with a sobering follow-up: the future is less about AI toast (though Red Dwarf predicted it) and more about a soul-stripping "infrastructure of meaningless" after an AWS outage proved how fragile the internet is. Corporate overlords, like Elon Musk, are taking note: he finally addressed Starlink's use by Asian scam syndicates, but his atten…
…
continue reading
Paul Eckloff was a US Secret Service Agent for 23 years. 14 of which were spent protecting the US Presidents. Before that? Paul was a High School Teacher. Today? Paul is one of the top cybersecurity, privacy and data experts in the world and a leader with Lexis/Nexis Risk Solutions. Send us a text Growth without Interruption. Get peace of mind. Sta…
…
continue reading
1
Cybersecurity Today: New Threats from AI and Code Extensions
8:14
8:14
Play later
Play later
Lists
Like
Liked
8:14In today's episode, host Jim Love discusses the discovery of the 'Glass Worm,' a self-spreading malware hidden in Visual Studio Code extensions downloaded over 35,000 times. The worm, hiding its malicious JavaScript in invisible unicode characters, steals developer credentials and drains crypto wallets. He also covers the security flaws in AI-power…
…
continue reading
1
Wikipedia's AI woes, Tassie NFP hit by ransomware, and Bryan Cranston strikes back
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth talk about the latest AI news, the week in cyber crime, an important Aussie merger, and how a Hollywood actor is reclaiming his identity. The pair kick things off with some AI news, including Wikipedia woes, OpenAI's Atlas, and Yelp's new AI travel offering. Hollingwort…
…
continue reading
1
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit (#)
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu…
…
continue reading
1
CR113: Bridging the digital skills gap in a complex world with Mike Nayler, AWS
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14The skills we teach today will decide the world we live in tomorrow but the digital skills gap is something we've been dealing with for decades, but it’s growing faster than ever, it starts with kids and stretches all the way into late IT careers, and now we're finally taking a more connected, lifelong approach to closing it. This week, Dave, Esmee…
…
continue reading
1
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability. (#)
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability. webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans…
…
continue reading
1
RondoDox Botnet Expansion: The Shotgun Approach to IoT Exploitation
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19Got a question or comment? Message us here! This week on the #SOCBrief, Andrew breaks down RondoDox, a rapidly growing botnet campaign taking aim at routers, DVRs, and IoT devices worldwide. With over 50 vulnerabilities across 30+ vendors, this “shotgun” exploitation strategy is fueling massive DDoS and crypto-mining attacks. Support the show Watch…
…
continue reading
1
S2 E6: Keeping Up With ICS Threat Intelligence
22:33
22:33
Play later
Play later
Lists
Like
Liked
22:33The industrial threat landscape never stands still — and neither can defenders. In this episode of Simply ICS Cyber, Don and Tom sit down with Joe Slowik, a globally recognized expert in cyber threat intelligence (CTI), detection engineering, and incident response for ICS, OT, and critical infrastructure environments. With over 15 years of experien…
…
continue reading
A nation-state attacker quietly lived inside F5’s network and walked away with BIG-IP source code and undisclosed vulnerability details. In this episode we pull apart why a breach of a cybersecurity company is far more dangerous than a breach of a bank or retailer — and what individuals and businesses can do to protect themselves when even the “exp…
…
continue reading
1
Neurodiversity, Gaming, and the Next Generation of Cybersecurity
26:35
26:35
Play later
Play later
Lists
Like
Liked
26:35In this episode, Fergus Hay, CEO & Co-Founder of The Hacking Games explores the fascinating overlap between gaming, cybersecurity, and the power of neurodivergent minds. Recorded live at DTX London 2025, join Fergus and DTX Unplugged hosts Ollie Pickup and Sabrina Berko in solving one of today’s biggest challenges - the cyber talent gap. From shock…
…
continue reading
1
Episode 339 Deep Dive: M.K. Palmore | Leading Through Uncertainty: Security, Safety, and Cyber Awareness in a Time of Crisis
39:59
39:59
Play later
Play later
Lists
Like
Liked
39:59In this episode, we sit down with M.K. Palmore, Chief Executive Officer at Apogee Global RMS, as he explores strategies for leading through uncertainty with a focus on security, safety, and cyber awareness in times of crisis. M.K. emphasises the critical importance of practicing security response scenarios, noting that organisations truly respond b…
…
continue reading
51
Ransomware Dominates Cyber Attacks & AI Tools for Cybersecurity | Tech News Update
8:01
8:01
Play later
Play later
Lists
Like
Liked
8:01In this episode of Cybersecurity Today, your host Jim Love discusses Microsoft's latest findings on how ransomware and extortion account for over half of all cyber attacks globally, highlighting the shift toward financially driven crimes. Learn about the breach at the Kansas City National Security Campus due to a SharePoint vulnerability and how An…
…
continue reading
In this episode, Rob Aragao sits down with futurist Heather Vescent to explore how strategic foresight can be applied to cybersecurity. Heather explains what it means to be a futurist—blending creativity with analytical research—and shares her journey from Silicon Valley to becoming a leader in foresight methodologies. She discusses her early work …
…
continue reading
Think your mouse is harmless? Steve and Leo uncover how modern optical mice might be secretly "listening" in, and reveal why satellite data pouring down on us is almost entirely unsecured. The long awaited lawsuit to block Texas SB2420. Embattled Texas SB2420 also impacts Google Play. At long last, NIST modernizes their password policy. Scattered L…
…
continue reading
1
SN 1048: Mic-E-Mouse - AWS Goes Down Hard
2:50:35
2:50:35
Play later
Play later
Lists
Like
Liked
2:50:35Think your mouse is harmless? Steve and Leo uncover how modern optical mice might be secretly "listening" in, and reveal why satellite data pouring down on us is almost entirely unsecured. The long awaited lawsuit to block Texas SB2420. Embattled Texas SB2420 also impacts Google Play. At long last, NIST modernizes their password policy. Scattered L…
…
continue reading
1
SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln; (#)
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln; What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu webs…
…
continue reading
1
More on the unitary executive with Laura Dickinson
30:26
30:26
Play later
Play later
Lists
Like
Liked
30:26If you're wondering what happens when as the foundations of separtion of power shift in real time, then this mini-episode is for you! Join the ladies of Bombshell for the fasinating, full length interview with Laura Dickinson of GWU Law School. We get an expert view on recent Supreme Court rulings, what executive power really means, and where we go…
…
continue reading
1
New Book: SPIES, LIES, AND CYBER CRIME | Former FBI Spy Hunter Eric O'Neill Explains How Cybercriminals Use Espionage techniques to Attack Us | Redefining Society And Technology Podcast With Marco Ciappelli ...
48:16
48:16
Play later
Play later
Lists
Like
Liked
48:16____________Podcast Redefining Society and Technology Podcast With Marco Ciappelli https://redefiningsocietyandtechnologypodcast.com ____________Host Marco Ciappelli Co-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybe…
…
continue reading
1
What's Next for Humanity with Artificial Intelligence?
45:01
45:01
Play later
Play later
Lists
Like
Liked
45:01What's Next for Humanity with Artificial Intelligence? David Mauro interviews Mike Acerra, the president and founder of Luxblox, about AI and its role in humanity. They discuss the evolution of technology, from typewriters to computers, and the impact of AI on various industries. Mike shares the story of how Luxblox was created and how it encourage…
…
continue reading
1
Episode 075 - Why “Scan, Find, Patch” Is No Longer Enough - Mark Goldenberg
25:44
25:44
Play later
Play later
Lists
Like
Liked
25:44The traditional "scan, find, patch" method is falling short against today’s threat landscape. In this episode, Mark Goldenberg, Sr. Security Solutions Architect at Defy Security, outlines a modern approach to vulnerability management. Tune in to learn how to level-up your proactive security efforts by focusing on risk prioritization, fostering coll…
…
continue reading
1
New Book: SPIES, LIES, AND CYBER CRIME | Former FBI Spy Hunter Eric O'Neill Explains How Cybercriminals Use Espionage techniques to Attack Us | Redefining Society And Technology Podcast With Marco Ciappelli ...
48:16
48:16
Play later
Play later
Lists
Like
Liked
48:16____________Podcast Redefining Society and Technology Podcast With Marco Ciappelli https://redefiningsocietyandtechnologypodcast.com ____________Host Marco Ciappelli Co-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybe…
…
continue reading
1
Bridging Academia and Industry: Josh Brunty's Approach to Cybersecurity Training and Recruitment
28:10
28:10
Play later
Play later
Lists
Like
Liked
28:10Welcome to this week's episode of Forcepoint's "To the Point Cybersecurity Podcast." Hosts Rachael Lyon and Jonathan Knepher are joined by Dr. Josh Brunty, Professor of Cyber Forensics and Cybersecurity at Marshall University and the head coach of the U.S. Cyber Team for the U.S. Cyber Games. Together, they dive into the latest trends in cybersecur…
…
continue reading
1
Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
1:03:39
1:03:39
Play later
Play later
Lists
Like
Liked
1:03:39Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
…
continue reading
1
Why Human Connection Still Matters in the Digital Banking Age with Eric Lynner
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36Guest Introduction Eric Lynner, Chief Information Officer at First Independent Bank in Minnesota, brings more than 15 years of experience in IT leadership, customer service, and infrastructure management. Starting his career on the help desk and advancing through system and network engineering roles, Eric has built a reputation for hands-on leaders…
…
continue reading
1
S36 Ep9: Maria Ross - The Human Side of Cybersecurity: Empathy, Risk, and Resilience
41:52
41:52
Play later
Play later
Lists
Like
Liked
41:52Maria Ross keynote Speaker and Award-winning journalist welcomes Steve Durbin at the Empathy Podcast for a compelling discussion on the intersection of empathy and leadership. Managers focus on tasks, leaders empower people. Curiosity is the defining trait of an empathetic leader, the ability to set aside ego and truly listen.…
…
continue reading