ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
Cyber Threat Hunting Podcasts
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
The CYSA Audio Course is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
…
continue reading
Intel 471's podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, all over a cocktail ...
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
All Hands on Tech, hosted by Eilish and Greg, brings together Nova Scotia’s tech community to uncover the secrets of what makes our province the best place for collaboration, innovation, and growth. Each episode hear from local digital experts as we dive into all of the amazing things happening in Nova Scotia’s fastest-growing sector and learn why so many organizations and individuals are calling Canada’s Ocean Playground home. All Hands on Tech is proudly produced by Digital Nova Scotia (DN ...
…
continue reading
SpyCast, the official podcast of the International Spy Museum, is a journey into the shadows of international espionage. Each week, host Sasha Ingber brings you the latest insights and intriguing tales from spies, secret agents, and covert communicators, with a focus on how this secret world reaches us all in our everyday lives. Tune in to discover the critical role intelligence has played throughout history and today. Brought to you from Airwave, Goat Rodeo, and the International Spy Museum ...
…
continue reading
Guardians of Innocence is a powerful and informative podcast designed to equip parents, teachers, and communities with the knowledge and tools needed to protect children from the growing threat of trafficking. Each episode dives deep into the tactics traffickers use to target vulnerable children—both online and in real life—and provides actionable advice on how to recognize the warning signs. Through expert interviews with cyber safety professionals, law enforcement, and survivors, we uncove ...
…
continue reading
It’s easy to get lost in the space that is cybersecurity which encompasses dozens of specialty areas that can be further segmented into more than 50 career roles. Andrew Hoffritz, a cybersecurity enthusiast and professional, interviews a diverse selection of cybersecurity-minded professionals worldwide each month and pulls back the curtain on how to break into the cybersecurity field, discussing unique skills and why cybersecurity is a continuously growing field. Each episode contains powerf ...
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Dive into the hidden world of Windows Event Logs — where SOC analysts uncover patterns, trace intrusions, and expose how attackers exploit the very logs meant to catch them. Learn how to spot the signals, build timelines, and stay one step ahead of the breach. X: @almorabea X: @CyberRiddler Website: https://thecyberriddler.com…
…
continue reading
*Threat Hunting Workshop: Hunting for Persistence - Level 2 September 24, 2025 | 12:00 - 1:00 PM ET Sign Up: https://www.intel471.com/resources/webinars/threat-hunting-workshop-16-hunting-for-persistence-level-2 ---------- Top Headlines: Jamf Threat Labs | Learn about ChillyHell, a modular Mac backdoor: https://www.jamf.com/blog/chillyhell-a-modula…
…
continue reading
Keith Bulfin was a banker, not a spy. But then came a special client–a supposed coffee importer who was actually a banker for Mexican and Colombian drug cartels. Soon, U.S. authorities were knocking on Keith’s door. He ended up behind bars in a maximum security prison. While in prison, Bulfin ended up befriending leaders of drug cartels and eventua…
…
continue reading

1
S3 Ep42: [LIVE] AI for Security Teams: Scaling Impact Without Losing Control
1:30:39
1:30:39
Play later
Play later
Lists
Like
Liked
1:30:39In this episode of Out of the Woods, we explored how AI is reshaping security operations beyond threat hunting. We highlighted real progress in insider threat detection, faster triage, and incident response while underscoring the ongoing need for human judgment. We also addressed integration challenges, tool sprawl, skill gaps, and risks such as ha…
…
continue reading

1
Cyber Threat Intelligence for Blue Teams with Jordan Kalm (Morado COO)
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50From Army recon missions to building Morado, COO Jordan Kalm reveals how military intelligence tactics translate into modern cyber threat intelligence. In this Simply Defensive episode, Josh Mason and Wade Wells dive into what really works for blue teams and SOC analysts — and what’s just noise. 👉 If you’ve ever wondered how to turn raw intel into …
…
continue reading

1
Global Vision, Local Roots: Palladium MC’s AI Revolution
54:43
54:43
Play later
Play later
Lists
Like
Liked
54:43From landmine detection to sustainable farming, Palladium MC is redefining how AI and robotics can transform industries. In this episode of All Hands on Tech, Claire Quirion speaks with founders Olesya Shyvikova and Chris Curtis about their journey from dBy Digital Nova Scotia
…
continue reading

1
Field Notes: Why Cyber Attacks Are Accelerating
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04The threat landscape is moving faster than ever—and traditional response playbooks aren't keeping up. In this live Field Notes episode, Eric Brown and Nick Mellum dive into the surge of recent cyberattacks hitting state governments, transit systems, and critical infrastructure across the U.S. From Nevada's complete state office shutdown to Maryland…
…
continue reading
This Thursday marks the 24th anniversary of the September 11th terrorist attacks, which spawned a decade-long search for the man behind them – Osama Bin Laden. Ed Bogan was the Chief of Operations for the CIA Counterterrorism Center’s Pakistan / Afghanistan Department. He takes us into agency headquarters, where he oversaw the raid on Bin Laden’s c…
…
continue reading

1
How a Detective Became the Ginger Hacker: SOC Life, Job Hunts & Blue Team Wisdom
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02From the streets to the SOC. 💻 In this episode of Simply Defensive, Josh Mason and Wade Wells talk with Andrew Crotty — aka Ginger Hacker. A former detective turned Tier 3 SOC analyst and Army reservist, Andrew shares his journey into cyber, the struggles of breaking in, and the lessons he’s learned (including the rookie mistake that accidentally d…
…
continue reading

1
Healthcare Ransomware: When Cyberattacks Turn Deadly
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08When ransomware hits a hospital, it's not just data that's at stake—patients are dying. Ed Gaudet, CEO of Censinet, reveals the shocking research proving what healthcare security professionals feared: cyberattacks on hospitals directly increase mortality rates and disrupt life-saving care. But Ed's biggest concern? The eerie quiet before what he be…
…
continue reading
*[LIVE] Out of the Woods: The Threat Hunting Podcast - AI for Security Teams: Scaling Impact Without Losing Control September 11, 2025 | 12:00 - 1:30 PM ET Sign Up: https://www.intel471.com/resources/podcasts/ai-for-security-teams-scaling-impact-without-losing-control …
…
continue reading

1
Automating the Blue Team | Kevin Mata (Swimlane) on SOAR & AI in Cybersecurity
32:43
32:43
Play later
Play later
Lists
Like
Liked
32:43Automation is changing the way defenders work. In this episode of Simply Defensive, we sit down with Kevin Mata, Director of Cloud Operations at Swimlane, to talk about his journey from flipping burgers at In-N-Out to flipping SOC alerts with automation, SOAR, and AI. Kevin shares how he got started in cybersecurity, how Swimlane helps Blue Teams s…
…
continue reading

1
An Assassination in Athens and a CIA Officer’s Legacy
31:47
31:47
Play later
Play later
Lists
Like
Liked
31:47It’s been 50 years since the assassination of the CIA’s former Station Chief in Athens, Richard Welch. At the time, he was the agency’s highest level officer killed in the line of duty. A Greek, Marxist terrorist group called 17 November claimed responsibility for his death, but that was just the beginning. Former senior operations officer Ralph Ma…
…
continue reading

1
From the SpyCast Vault: : Escaping Tehran with The CIA Pt. 2
29:04
29:04
Play later
Play later
Lists
Like
Liked
29:04We return to November, 1979 when radical Iranian students seized the US Embassy in Tehran and took dozens of Americans hostage. Mark and Cora Lijek were two American officials stuck in Tehran, and in 2008 they shared their story with the late Peter Earnest, the founding director of the International Spy Museum. And this time they were joined by ret…
…
continue reading

1
MBD Studio: Grilled Cheese Mascots and Un-trendy Marketing
42:51
42:51
Play later
Play later
Lists
Like
Liked
42:51In this episode of All Hands on Tech we're joined by Michael Broley, Founder & CEO of MBD Studios, to talk about his journey from working in sales at Xerox to founding an agency, un-trendy marketing tactics, and mascots?! Michael discusses the excitement of helping businesses bring their brands to life from logos to customer journeys by using agile…
…
continue reading

1
Inside Hack Defender Academy: Gamified Malware Training for Blue Teamers
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27Ready to level up your defensive cybersecurity skills? In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Dan Regalado and Belem — the founders of Hack Defender Academy — to explore how they’re using CTF-style challenges, real malware cases, and gamification to prepare the next generation of defenders. 💡 We cover: Why gami…
…
continue reading

1
The Deepfake Hiring Crisis: AI Fraud in Job Interviews
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24What happens when your next hire isn't who they claim to be? In this eye-opening episode of The Audit, we dive deep into the alarming world of AI-powered hiring fraud with Justin Marciano and Paul Vann from Validia. From North Korean operatives using deepfakes to infiltrate Fortune 500 companies to proxy interviews becoming the new normal, this con…
…
continue reading
In this episode of ConversingLabs, host Carolynn van Arsdale interviews Kadi McKean, Community Manager at ReversingLabs, to discuss a new initiative aimed at securing the open source software supply chain: the Spectra Assure Community Badge. As a result of threat actors continuing to target open source software (OSS) platforms like PyPI and npm, it…
…
continue reading
*[LIVE] Out of the Woods: The Threat Hunting Podcast - AI for Security Teams: Scaling Impact Without Losing Control September 11, 2025 | 12:00 - 1:30 PM ET Sign Up: https://www.intel471.com/resources/podcasts/ai-for-security-teams-scaling-impact-without-losing-control …
…
continue reading

1
From the SpyCast Vault: Escaping Tehran with The CIA
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41We'll go back in time to November, 1979 when radical Iranian students seized the US Embassy in Tehran and took dozens of Americans hostage. Six US officials managed to find refuge with Canadian embassy staff, and 11 weeks later, the CIA led a daring operation to sneak them out of Iran disguised as a Hollywood film crew. Mark and Cora Lijek were two…
…
continue reading

1
Rob Allen (ThreatLocker) on Zero Trust, Proactive Security, and Ransomware Prevention
25:27
25:27
Play later
Play later
Lists
Like
Liked
25:27In Season 4, Episode 4 of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Rob Allen, Chief Product Officer at ThreatLocker, to dive deep into the world of Zero Trust security, proactive cybersecurity strategies, and ransomware prevention. Rob shares expert insights on: Proactive vs. Reactive cybersecurity — why a balanced security s…
…
continue reading

1
Nova Social Media & Marketing: From Professional Basketball Player to Local Entrepreneur
50:33
50:33
Play later
Play later
Lists
Like
Liked
50:33In this episode, we're joined by Patrick Manifold, Founder & CEO of Nova Social Media & Marketing. Patrick discusses his journey from growing up in England, becoming a professional basketball player, moving to Nova Scotia and launching the business. Learn how Nova Social has created their local-first brand through organic development and programs l…
…
continue reading
*[LIVE] Out of the Woods: The Threat Hunting Podcast - AI for Security Teams: Scaling Impact Without Losing Control September 11, 2025 | 12:00 - 1:30 PM ET Sign Up: https://www.intel471.com/resources/podcasts/ai-for-security-teams-scaling-impact-without-losing-control …
…
continue reading

1
Catching an Iranian-American Missile Broker
35:38
35:38
Play later
Play later
Lists
Like
Liked
35:38Reza Olangian, a dual US-Iranian citizen, left behind his life in Silicon Valley to spy for Iran in the capital. And by the time DEA special agent Jeffrey James Higgins found out about him in 2011, Olangian was trying to acquire hundreds of surface-to-air missiles. That kicked off an elaborate, multi-country sting operation… and a 25-year prison se…
…
continue reading

1
How CTF Culture Gamifies Your Way to Unbreakable Security Teams
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10Can you spot the difference between real cybersecurity talent and someone using ChatGPT to fake their way through interviews? In this episode of The Audit, Thomas Rogers from Meta CTF reveals how Capture the Flag competitions are becoming the ultimate litmus test for authentic cyber skills—and why traditional hiring methods are failing in the AI er…
…
continue reading

1
Lethal Dissent: Iran’s Spy Games in Turkey
29:56
29:56
Play later
Play later
Lists
Like
Liked
29:56Washington and Tehran have a long and complicated history, with tensions that rise, fall and then rise again. Just this summer, we watched the U.S. and Israel strike Iran’s nuclear infrastructure. This month, SpyCast is bringing you a series of special episodes on Iran, looking back and forward, to unveil the country’s intelligence priorities, capa…
…
continue reading

1
Why Your CISO Needs a “Shut Up, Boss” Button
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09What if GitHub sucks for security detections—and AI is finally good enough to replace it? Join Josh Mason and Wade Wells as they sit down with Aaron Mog, the outspoken founder of Detections.ai, to unpack why detection engineering is broken—and how his new platform signed up 4,000+ users in just two weeks. Aaron doesn’t hold back. From ranting about…
…
continue reading
Scott Poley and Tom Kostura are joined by Ben McGavin, Threat Hunting Team Lead at RSM Defense, and Justin Dolgos, Senior Threat Hunter at RSM Defense, for a conversation on what it takes to build and run a threat hunting program inside an MSSP. They walk through how their team prioritizes hunts, manages detection logic across multi-tenant environm…
…
continue reading

1
Agent 202: New Secrets Emerge on an American Who Spied for Cuba
30:32
30:32
Play later
Play later
Lists
Like
Liked
30:32Codenamed "Agent 202," Kendall Myers went undetected as a spy for Cuba for nearly 30 years. He worked at the State Department’s Foreign Service Institute, secretly spying for Cuba out of an earnest love for the island, its people, and their leader Fidel Castro. Myers was caught in 2009, after he retired. State Department Security Specialist and for…
…
continue reading

1
Cybersecurity News: Vikings Vishing Lost $240K, Scattered Spider & F1 Racing
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13Dallas Turner's $240,000 fraud loss isn't just celebrity news—it's a wake-up call for anyone with a bank account. When even NFL linebackers fall victim to social engineering, what does that mean for the rest of us? In this episode of The Audit, co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem break down the sophisticated tactics behind this mas…
…
continue reading

1
Why Jack in the Box Might Have the Best Security Team in Fast Food
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58How does a Navy fire control tech who once wrangled a six-barrel death robot become the head of security operations at Jack in the Box? In this episode of Simply Defensive, we sit down with Chris Julio — SOC Manager, veteran, and self-proclaimed lover of both metrics and munchie meals. Chris shares his journey from Windows NT and dot-matrix printer…
…
continue reading

1
DeepSense: Deep Tech & Deeper Oceans - AI Beneath the Surface
37:25
37:25
Play later
Play later
Lists
Like
Liked
37:25What happens when cutting-edge AI meets the vast, mysterious world beneath the waves? This episode of All Hands on Tech with Digital Nova Scotia dives into how students, researchers, and industry are teaming up to tackle some of our biggest ocean challenges. Discover how underwater drones, smart sensors, and machine learning are tracking thousands …
…
continue reading

1
S3 Ep37: Be Effective, Not Just Subjective
54:26
54:26
Play later
Play later
Lists
Like
Liked
54:26*Intel-Driven Threat Hunting Workshop: Analyzing Malware Behaviors July 31, 2025 | 11:00 AM - 1:00 PM ET Sign Up: https://intel471.com/resources/webinars/intelligence-driven-threat-hunting-workshop-analyzing-malware-behaviors *Meet with Intel 471 at Black Hat 2025 at Booth #5742 More info & events: https://intel471.com/lp/black-hat-usa-2025 -------…
…
continue reading

1
Agent of Chaos: The Austrian Fugitive Running Russia’s Global Spy Networks
31:24
31:24
Play later
Play later
Lists
Like
Liked
31:24Today he’s one of the most wanted men in the world, but before Jan Marsalek fled to Russia, he was the COO of payment-processing firm Wirecard. Officials and investigators say Marsalek used the company to finance Moscow’s covert operations and spy networks in Africa and Europe. In 2020, nearly €2 billion vanished from Wirecard, along with Marsalek.…
…
continue reading

1
Coffee Is Your Top Supply Chain Risk: A Conversation with Kyle Kelly
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56SOC analysts, detection engineers, and pentesters—you’re not imagining it: software supply chain security is a dumpster fire 🔥. In this episode of Simply Defensive, we sit down with Kyle Kelly, engineering manager at GitHub and author of Crime Hacks, to unpack the chaos. We cover: - Why malicious packages are sneaking past defenders - The truth abo…
…
continue reading
*Intel-Driven Threat Hunting Workshop: Analyzing Malware Behaviors July 31, 2025 | 11:00 AM - 1:00 PM ET Sign Up: https://intel471.com/resources/webinars/intelligence-driven-threat-hunting-workshop-analyzing-malware-behaviors *Meet with Intel 471 at Black Hat 2025 at Booth #5742 More info & events: https://intel471.com/lp/black-hat-usa-2025 -------…
…
continue reading

1
S3 Ep35: [LIVE] The Intersection of AI and Threat Hunting: What Problems Emerge, What Problems Get Solved
1:30:51
1:30:51
Play later
Play later
Lists
Like
Liked
1:30:51In this episode of Out of the Woods: The Threat Hunting Podcast, we explored how AI is being used in threat hunting, from generating hypotheses to enriching data and shaping detection logic. We talked through some of the challenges teams are facing, including false positives and tool limitations, and discussed where human expertise is still essenti…
…
continue reading

1
From Intel Officer to White House Adviser: A Chat with The Museum’s Executive Director
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03This week we spoke with the International Spy Museum's Executive Director, Colonel Chris Costa. His decades-long career in the intelligence community spanned multiple continents, running sensitive operations in Panama, Bosnia, Iraq, and Afghanistan, where he earned two Bronze stars for his human intelligence contributions. Later, Costa advised Navy…
…
continue reading

1
Episode 130: Root Cause Analysis and Incident Performance Metrics
13:59
13:59
Play later
Play later
Lists
Like
Liked
13:59Every incident response process must end with two critical questions: What went wrong? And how do we prevent it next time? In this final episode of Domain 4, we explore the structure and value of root cause analysis (RCA) and the metrics analysts use to evaluate incident response performance. You'll learn techniques for identifying the initial fail…
…
continue reading

1
Episode 129: Regulatory and Law Enforcement Reporting
12:59
12:59
Play later
Play later
Lists
Like
Liked
12:59When a breach crosses a legal threshold, reporting to regulators or law enforcement may be required. In this episode, we examine the processes and obligations associated with regulatory reporting under frameworks like GDPR, HIPAA, PCI DSS, and state-level data breach laws. You’ll learn what types of incidents trigger mandatory disclosure, how quick…
…
continue reading

1
Episode 128: Customer and Media Communications
13:31
13:31
Play later
Play later
Lists
Like
Liked
13:31Sometimes the most difficult part of a security incident isn’t stopping the threat—it’s explaining what happened to the people affected. In this episode, we explore how organizations communicate with customers, partners, and the media during and after an incident. You’ll learn what kinds of disclosures are required, what language builds trust, and …
…
continue reading

1
Episode 127: Legal and PR Communications During an Incident
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48Communication during a security incident isn't just internal—it can affect your company’s reputation, legal standing, and customer trust. In this episode, we examine how security teams coordinate with legal departments and public relations professionals to craft official statements and limit liability. You'll learn how analysts contribute to this p…
…
continue reading

1
Episode 126: Writing Effective Incident Response Reports
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48When the incident is over, the reporting begins. In this episode, we explore how security analysts write effective incident response reports that document what happened, how it was discovered, what actions were taken, and what outcomes resulted. You’ll learn how to construct a clear executive summary, provide a precise who-what-when-where-why break…
…
continue reading

1
Episode 125: Incident Declaration and Escalation Procedures
13:30
13:30
Play later
Play later
Lists
Like
Liked
13:30Not every alert becomes an incident—but when one does, it needs to be declared formally and escalated swiftly. In this episode, we walk through the process of incident declaration, including the criteria used to define what qualifies as an incident and the steps analysts take to classify severity. You’ll learn how escalation procedures are triggere…
…
continue reading

1
Episode 124: Stakeholder Communication for Incident Response
13:16
13:16
Play later
Play later
Lists
Like
Liked
13:16During an incident, clear and timely communication becomes a matter of urgency—not just best practice. In this episode, we cover how security analysts coordinate communication across teams and leadership tiers when responding to security events. You’ll learn how to identify the right stakeholders based on the severity and scope of the incident, and…
…
continue reading

1
Episode 123: Identifying Stakeholders for Vulnerability Reporting
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25Not all stakeholders need the same level of technical detail—but all of them need accurate, timely, and actionable reporting. In this episode, we explore how analysts identify and tailor communication for different stakeholder groups during the vulnerability management process. You’ll learn who needs to know what—from system administrators and deve…
…
continue reading

1
Episode 122: Metrics and KPIs in Vulnerability Management
13:32
13:32
Play later
Play later
Lists
Like
Liked
13:32You can’t improve what you don’t measure. In this episode, we focus on key performance indicators (KPIs) and metrics used to evaluate the effectiveness of vulnerability management programs. You’ll learn how metrics like vulnerability age, remediation time, recurrence rates, and vulnerability density across asset classes are used to benchmark perfor…
…
continue reading
Even when vulnerabilities are known and documented, remediation doesn’t always move forward. In this episode, we examine the most common inhibitors to remediation—technical, procedural, and political obstacles that delay or prevent action. You’ll learn how factors like legacy systems, proprietary dependencies, business process interruptions, organi…
…
continue reading

1
Episode 120: Action Plans and Remediation Communication
13:33
13:33
Play later
Play later
Lists
Like
Liked
13:33Once vulnerabilities are identified, the work isn’t done—it’s just beginning. In this episode, we explore how analysts develop and communicate action plans for addressing discovered risks. You’ll learn how patching schedules, configuration changes, user awareness efforts, and compensating controls are communicated clearly to technical teams, projec…
…
continue reading

1
Episode 119: Creating and Understanding Compliance Reports
14:50
14:50
Play later
Play later
Lists
Like
Liked
14:50Security isn't just about stopping threats—it's also about proving due diligence. In this episode, we explore how security teams create and interpret compliance reports aligned with frameworks like PCI DSS, HIPAA, NIST 800-53, and ISO 27001. You’ll learn how reports are structured to demonstrate adherence to technical controls, timelines, audit req…
…
continue reading