The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Cyber Risk Management Podcasts
Welcome to Risk Management: Brick by Brick! Join Jason Reichl on his journey to discover the crucial role technology plays in risk management in the construction sector. Accompanied by industry-leading risk managers, this podcast will deep-dive into the people who are helping to build and maintain the physical world around us.
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
…
continue reading
Welcome to the GRCISO podcast, where Chief Information Security Officers (CISOs) gain indispensable insights into the dynamic world of Cyber Governance, Risk, and Compliance (GRC). Each episode delves into expert analysis and industry perspectives, designed to empower CISOs with the knowledge needed to make informed decisions in today’s complex cybersecurity landscape. Tune in for in-depth discussions, practical advice, and the latest trends to stay ahead in your role. Whether you’re a seaso ...
…
continue reading
"On Aon" offers conversations between Risk Capital and Human Capital experts and guests about the Risk and People issues impacting businesses around the world. Each episode provides unique insights to help industry experts make better decisions across Trade, Technology, Weather and Workforce.
…
continue reading
Experiments in Risk Science
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
"Securing Our Place In The Industry" The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry.
…
continue reading
Welcome to the PRMA Risk Ready podcast, the show for Risk Management Professionals in the High Net Worth Space.
…
continue reading
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
…
continue reading
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
…
continue reading
The Banking on Data podcast is for community bank and credit union leaders who understand that the future of financial services is powered by data. Hosted by Ed Vincent, CEO of Lumio Solutions, this podcast offers executive-level insights into how financial institutions can leverage business intelligence, data strategy, and advanced analytics to drive performance, manage risk, and unlock growth opportunities. Each episode features conversations with industry leaders, data experts, and financ ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The Bare Metal Cyber CRISC Prepcast is a comprehensive audio training series designed to help you master the CRISC certification with confidence. Each episode delivers in-depth coverage of ISACA’s CRISC domains — from risk governance to monitoring — using a uniquely structured, exam-focused format built for long-term retention. Whether you're studying on the go or doing a deep review, this prepcast is your essential guide to IT risk success.
…
continue reading
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
…
continue reading
Cyber Insurance Leaders is dedicated to keeping cyber insurance and security professionals up to date on the latest developments, best practices, and thought leadership from leading voices in the industry. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
…
continue reading
The CYBER5 is hosted by Landon Winkelvoss, Co-Founder at Nisos, and features cybersecurity and investigations industry leaders' thoughts and answers to five questions on one topic on actionable intelligence to enterprise revolving around third-party risk management, adversary research and attribution, digital executive protection, merger and acquisition diligence, brand protection, disinformation, and cyber threat intelligence.
…
continue reading
Each episode, Angela and Vince dig into the key issues facing organizations when it comes to cybersecurity and CPS (Cyber-Physical Systems). Sponsored by Viakoo, the leader in CPS vulnerability remediation.
…
continue reading
Helping clients embrace risk and achieve peak business performance for over 150 years.
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
What the futr is a biweekly podcast that explores the intersection of AI, sales, and humanity. Hosted by Sandesh Patel and Chris Brandt, each episode features AI startup founders and tech leaders sharing real stories, their value proposition, and visions for the future—structured like a smart first-call sales meeting. It’s all about making AI make sense for businesses—and helping people stay informed, not left behind.
…
continue reading
The Dark Dive podcast is designed to demystify the dark web - arming you with everything you need to know about what the dark web is and how it is used. Join us for a deep dive into dark web markets, hacking forums, and ransomware leak sites. Listen to real life stories from experts that feature criminals buying and selling stolen data, trading exploits, and planning cyberattacks from the dark web. Most importantly, find out how the cybersecurity and law enforcement community can do somethin ...
…
continue reading
The Bare Metal Cyber CISM Prepcast is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series offers ...
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Conversations with Thailand is a bi-monthly podcast series by Deloitte Thailand. Listeners can expect to hear insights from subject matter experts across the different business domains that will benefit both organisations and individuals navigate through complexities of today's VUCA world.
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Insurance is a maze. Don’t get lost. Mark Geoghegan asks directions from all the top people in the Global Insurance and Reinsurance Industry
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
Preparing Organizations for Managing Crises
…
continue reading
Barry Kirby explores aspects of Human Factors, from practitioners in the field, through Processes and Tools that are useful (or not) and other Information and News that may be beneficial. For HF people to keep in touch and non-HF people to hear what we do.
…
continue reading
Strategy. Execution. Results. Offering consulting, training & software solutions for companies building complex, highly regulated systems. Learn more @ www.321gang.com
…
continue reading
Breaking Cyber Barriers dives deep into the world of Cybersecurity, uncovering trends and exploring its limitless potential. Join host Liz Vagenas as she speaks with top leaders about the current challenges and opportunities within the industry, as well as strategies for success.
…
continue reading
The Podcast that will help you grow, scale, and exit your professional services firm.
…
continue reading
The Bare Metal Cyber CISA Prepcast is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impact re ...
…
continue reading
SaaS is seen as one of the best things that have ever happened in the world of software in terms of costs and ease of usage. But it’s not enough to embrace its advantages alone. There are two sides to a coin, and even SaaS has a lesser-known side that can harm businesses if left unattended. The dark side of SaaS involves shadow IT, security and compliance risks, and SaaS wastage. We’ve started this podcast series, “SaaS Whispers,” to focus on the inefficiencies and cost overruns posed by inc ...
…
continue reading
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
…
continue reading
Our goal for this series is to bring to listeners the latest insights on trending topics, delivered by specialists from Guy Carpenter and other organizations on the forefront of thought leadership.
…
continue reading

1
Moody's Talks - Focus on Finance
Moody's Investors Service, Ana Arsov, Danielle Reed, Mark Wasden, Bruno Baretta, Donald Robertson
Hosted by Danielle Reed of Moody's Financial Institutions team, Focus on Finance helps you keep on top of developments within the banking, insurance and asset management sectors — from the impact of tech disrupters and cyber risk to the ongoing effects of ESG and lower-for-longer interest rates. Published by Moody's Investors Service..
…
continue reading

1
Third-Party Risk Management in Healthcare
22:02
22:02
Play later
Play later
Lists
Like
Liked
22:02Ever wonder why healthcare organizations are such prime targets for cyberattacks? In this eye-opening conversation with Kelly White, founder of Risk Recon, we uncover the startling reality that healthcare accounts for 37% of all breach events in the last decade. Kelly's journey from soldering Timex Sinclair computers in the late 70s to founding a p…
…
continue reading

1
Live from Black Hat: Ransomware, Responsible Disclosure, and the Rise of AI [Microsoft Threat Intelligence Podcast]
43:56
43:56
Play later
Play later
Lists
Like
Liked
43:56While our team is observing the Labor Day holiday in the US, we hope you will enjoy this episode of The Microsoft Threat Intelligence Podcast . New episodes airs on the N2K CyberWIre network every other Wednesday. In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is live from Black Hat 2025 with a special lineup…
…
continue reading

1
The labor behind the labor. [Special Edition]
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26So, as we mark this Labor Day, join us in celebrating not just the work, but the people who make it possible — the labor behind the labor. This Labor Day, we’re celebrating more than just a holiday — we’re honoring the people who bring their creativity, dedication, and passion to every corner of N2K. The work you hear, read, and see from us doesn’t…
…
continue reading

1
Marina Ciavatta: Going after the human error. [Social engineer] [Career Notes]
11:06
11:06
Play later
Play later
Lists
Like
Liked
11:06Please enjoy this encore of Career Notes. Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent…
…
continue reading

1
Marina Ciavatta: Going after the human error. [Social engineer]
11:06
11:06
Play later
Play later
Lists
Like
Liked
11:06Please enjoy this encore of Career Notes. Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent…
…
continue reading
This week, we are joined by Jamie Levy, Director of Adversary Tactics at Huntress, who is discussing their work on "Active Exploitation of SonicWall VPNs." Huntress has released an urgent threat advisory on active exploitation of SonicWall VPNs, with attackers bypassing MFA, pivoting to domain controllers, and ultimately deploying Akira ransomware.…
…
continue reading
A suspected ransomware attack disrupts hundreds of Swedish municipalities. Google warns Gmail users of emerging cyberattacks tied to the ShinyHunters group. A malicious supply chain attack hits the npm registry. Senators press AFLAC for answers following a data breach. Law enforcement takedowns splinter the ransomware ecosystem. The FBI and Dutch p…
…
continue reading

1
Episode 232 - Clarity Pays: How Narrowing Focus Drives Margin, Growth, and Referrals
24:22
24:22
Play later
Play later
Lists
Like
Liked
24:22By Collective 54
…
continue reading
The FBI shares revelations on Salt Typhoon’s reach. Former NSA and FBI directors sound alarm on infrastructure cybersecurity gaps. Google is launching a new cyber “disruption unit”. A new report highlights cyber risks to the maritime industry. A Pennsylvania healthcare provider suffers a data breach affecting over six hundred thousand individuals. …
…
continue reading
The summer show started with the light hearted goal of evaluating the top security predictions that fill the internet in late December each year. Forever unscripted, Tim and Doug wind up reflecting on the growing gap between physical and virtual information systems. While it is easy to lament, from a cognitive perspective there is little hope, the …
…
continue reading
A whistle-blower claims DOGE uploaded a sensitive Social Security database to a vulnerable cloud server. Allies push back against North Korean IT scams. ZipLine is a sophisticated phishing campaign targeting U.S.-based manufacturing. Researchers uncover a residential proxy network operating across at least 20 U.S. states. Flock Safety license plate…
…
continue reading
If you are an MSP, there is probably at least one tool in both the physical space and the digital space that you were just awestruck when you finally got your hands on it. I sit down with Charles Love of ShowTech Solutions to talk about some tools from the wayback days and how the tools today are in some ways truly transformational in how they save…
…
continue reading
A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting entry-level jobs hardest. Michigan’s Supreme Court upholds limits on ce…
…
continue reading

1
Ep265 Gregg Bundschuh EPIC: A Different Type of Matrix
56:37
56:37
Play later
Play later
Lists
Like
Liked
56:37If you just confined your view to the top four brokers, you might easily assume that not much has happened in the US retail broking segment in the last ten years. But if you broadened you view to the top ten or twenty, you’d be faced with a very large number of billion-dollar-plus revenue broking groups that you would have been hard pressed to name…
…
continue reading

1
Rick Goud: Navigating Europe’s Data Sovereignty Challenges
44:19
44:19
Play later
Play later
Lists
Like
Liked
44:19Dr. Rick Goud brings a unique perspective to the data sovereignty conversation, combining medical informatics expertise with entrepreneurial technology innovation. As co-founder and Chief Innovation Officer of Zivver, a secure digital communications platform acquired by Kiteworks in 2025, Goud's journey began with an unexpected twist – missing out …
…
continue reading
Farmers Insurance discloses a data breach affecting over a million people. Agentic AI tools fall for common scams. A new bill in Congress looks to revive letters of marque for the digital age. Cybercriminals target macOS users with the Shamos infostealer. New Android spyware masquerades as antivirus to target Russian business executives. CISA seeks…
…
continue reading

1
Julian Waits: Find a way to help society. [Serial Entrepreneur] [Career Notes]
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04Please enjoy this encore of Career Notes. Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Ba…
…
continue reading

1
Julian Waits: Find a way to help society. [Serial Entrepreneur]
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04Please enjoy this encore of Career Notes. Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Ba…
…
continue reading

1
Beyond the smoke screen. [Research Saturday]
22:22
22:22
Play later
Play later
Lists
Like
Liked
22:22This week, we are joined by Dr. Renée Burton, VP of Infoblox Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by just 250 virtual machines, tying it directly to named individuals and …
…
continue reading
The FTC warns one country’s “online safety” may be another’s “censorship.” A new bipartisan bill aims to reduce barriers to federal cyber jobs. MURKY PANDA targets government, technology, academia, legal, and professional services in North America. MITRE updates their hardware weaknesses list. Customs and Border Protection conducts a record number …
…
continue reading

1
Episode 231 - Moving Up-Market: How to Win and Keep Enterprise Clients
25:25
25:25
Play later
Play later
Lists
Like
Liked
25:25By Collective 54
…
continue reading
Zero-day clickjacking flaws affect major password managers. The FBI warns that Russian state-backed hackers are exploiting a long-known Cisco flaw. Apple releases emergency patches for a zero-day flaw in the Image I/O framework. Home Depot faces a proposed class action lawsuit accusing it of secretly using facial recognition at self-checkout kiosks…
…
continue reading

1
Compliance ≠ Security: It Sets the Foundation ft Evan Millman, Security GRC Manager @ Abnormal AI
1:13:34
1:13:34
Play later
Play later
Lists
Like
Liked
1:13:34What’s the true relationship between compliance and security? According to Evan Millman, compliance may not be security—but it’s the necessary starting point for building it. In this episode, Raj sits down with Evan to explore how organizations can shift their GRC approach from reactive checkbox checking to a proactive and risk-informed security pr…
…
continue reading
Microsoft releases emergency out-of-band (OOB) Windows updates. Trump targets NSA’s leading AI and cyber expert in clearance revocations. A breach may have compromised the privacy of Ohio medical marijuana patients. Cybercriminals exploit an AI website builder to rapidly create phishing sites. Warlock ransomware operators target Microsoft’s SharePo…
…
continue reading

1
Why D&O Markets Could Cost You More: 4 Hidden Risks You Can't Ignore with Sridhar Manyem
19:05
19:05
Play later
Play later
Lists
Like
Liked
19:05We're coming to you LIVE from Riskworld 2025! In this episode of Risk Management: Brick by Brick, host Jason Reichl sits down with Sridhar Manyem, Senior Director and Head of Industry Research at AM Best, for a deep dive into the Directors & Officers insurance market. As the thought leadership arm of the world's oldest insurance credit rating agenc…
…
continue reading

1
From Fed to Fortune 100: The Security Mindset Shift That Changed Everything
31:24
31:24
Play later
Play later
Lists
Like
Liked
31:24In this episode, Fred sits down with Scott McHugh, a veteran of both federal service and Fortune 100 security leadership, to explore what the public and private sectors can learn from each other. They dive into how public-sector urgency, mission focus, and intelligence practices can strengthen corporate programs—and how the private sector’s agility…
…
continue reading

1
Getting Clients To Take Cybersecurity Seriously
36:31
36:31
Play later
Play later
Lists
Like
Liked
36:31How do you get your clients to take cybersecurity seriously? I sat down with Ann Westerheim of Ekaru to discuss strategies for helping MSP clients improve their cybersecurity posture.
…
continue reading
A researcher uncovers vulnerabilities across Intel’s internal websites that exposed sensitive employee and supplier data. The Kimsuky group (APT43) targets South Korean diplomatic missions. A new DDoS vulnerability bypasses the 2023 “Rapid Reset” fix. Drug development firm Inotiv reports a ransomware attack to the SEC. The UK drops their demand tha…
…
continue reading
HR software giant Workday discloses a data breach. Researchers uncover a zero-day in Elastic’s EDR software. Ghost-tapping is an emerging fraud technique where cybercriminals use NFC relay attacks to exploit stolen payment card data. Germany may be on a path to ban ad blockers. A security researcher documents multiple serious flaws in McDonald’s sy…
…
continue reading
What happens after an employee clicks on a phishing link? Jason Hoenich (hey-nick), the self-proclaimed "Security Awareness Apologist," believes that's where the real education begins. Drawing from his experiences at major entertainment companies like Disney and Sony, Jason shares how live hacking demonstrations where employees witness real-time co…
…
continue reading

1
Dr. Rois Ni Thuama: Get into the game. [Cyber governance]
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50Please enjoy this encore of Career Notes. Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pa…
…
continue reading

1
The CVE countdown clock. [Research Saturday]
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58Bob Rudis, VP Data Science from GreyNoise, is sharing some insights into their work on "Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities." New research reveals a striking trend: in 80% of cases, spikes in malicious activity against enterprise edge technologies like VPNs and firewalls occurred weeks before related CVEs were…
…
continue reading

1
Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50Please enjoy this encore of Career Notes. Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pa…
…
continue reading
Plex urges users to immediately update their Media Server due to an undisclosed security flaw. Cisco warns of a critical remote code execution flaw in their Secure Firewall Management Center software.Rockwell Automation discloses multiple critical and high-severity flaws. Hackers breached a Canadian House of Commons database. Active law enforcement…
…
continue reading

1
Episode 230 - Humans + Agents: Building a Collaborative AI Knowledge Base
19:16
19:16
Play later
Play later
Lists
Like
Liked
19:16By Collective 54
…
continue reading

1
Sp Ep Jeff Ward Ebix Europe: The Unquestionable Benefits of Data-First
53:23
53:23
Play later
Play later
Lists
Like
Liked
53:23Todays’ guest has been working on implanting the best technology into the London Market since the days when computer screens only displayed varying shades of green. He’s someone who I have known for twenty years and have come to rely upon to unpack all the jargon, spell out the acronyms and explain in layman’s terms what is really happening in the …
…
continue reading
A ransomware attack exposes personal medical records of VA patients. New joint guidance from CISA and the NSA emphasizes asset inventory and OT taxonomy. The UK government reportedly spent millions to cover up a data breach. Researchers identified two critical flaws in a widely used print orchestration platform. Phishing attacks increasingly rely o…
…
continue reading
Patch Tuesday. The Matrix Foundation patches high-severity vulnerabilities in its open-source communications protocol. The “Curly COMrades” Russian-aligned APT targets critical infrastructure. Microsoft tells users to ignore new CertificateServicesClient (CertEnroll) errors. Researchers uncover a malware campaign hiding the NjRat Remote Access Troj…
…
continue reading

1
Compliance and GTIA Cybersecurity Trustmark
18:02
18:02
Play later
Play later
Lists
Like
Liked
18:02Getting to compliance... Do you end up with more to do because you have the GTIA Cybersecurity Trustmark Assured? I sit down with Chase Griffin with ShowTech Solutions to talk about their experience and what has transpired since achieving Assured status and how that changed their outlook on improving their compliance to a standard and setting them …
…
continue reading
Hackers leak backend data from the North Korean state-sponsored hacking group Kimsuky. A ransomware attack on a Dutch clinical diagnostics lab exposes medical data of nearly half a million women. One of the world’s largest staffing firms suffers a data breach. Saint Paul, Minnesota, confirms the Interlock ransomware gang was behind a July cyberatta…
…
continue reading

1
Ep264 Andrew McMellin: Putting Markel on the Map
40:01
40:01
Play later
Play later
Lists
Like
Liked
40:01The global, wholesale and specialty insurance and reinsurance segment of the global market has been putting out very strong results in recent times. If I had to highlight a consistent theme in my interviews of the past year, it would be an almost universal desire among carriers for continued growth, but without compromising on profitability as appe…
…
continue reading
CISA issues an Emergency Directive to urgently patch a critical vulnerability in Microsoft Exchange hybrid configurations. SoupDealer malware proves highly evasive. Google patches a Gemini calendar flaw. A North Korean espionage group pivots to financial crime. Russia’s RomCom exploits a WinRAR zero-day. Researchers turn Linux-based webcams into pe…
…
continue reading

1
Cybersecurity Mergers & Acquisitions - Crown Jewels and Red Flags
26:51
26:51
Play later
Play later
Lists
Like
Liked
26:51Ever wonder what lurks beneath the surface of that shiny acquisition target? Our expert panel, featuring M&A Expert Brandon Kern, pulls back the curtain on the hidden cyber risks that can make or break your next deal. When companies merge or acquire, cybersecurity considerations often take a backseat to financial projections and market synergies. Y…
…
continue reading

1
Ed Amoroso: Security shouldn't be the main dish. [Computer Science] [Career Notes]
11:03
11:03
Play later
Play later
Lists
Like
Liked
11:03Please enjoy this encore of Career Notes. Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new ex…
…
continue reading

1
Ed Amoroso: Security shouldn't be the main dish. [Computer Science]
11:03
11:03
Play later
Play later
Lists
Like
Liked
11:03Please enjoy this encore of Career Notes. Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new ex…
…
continue reading

1
Episode 96: Episode 96 - Scattered Spider - Part 1 of 2
14:47
14:47
Play later
Play later
Lists
Like
Liked
14:47In this episode, Richard commences his look into infamous hacking group Scattered Spider.
…
continue reading

1
When malware plays pretend. [Research Saturday]
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30Nicolás Chiaraviglio, Chief Scientist from Zimperium's zLabs, joins to discuss their work on "Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed." Zimperium’s zLabs team has been tracking an evolving banker trojan dubbed DoubleTrouble, which has grown more sophisticated in both its distribution and capabilities. Initially spread via …
…
continue reading
Researchers uncover multiple vulnerabilities in a popular open-source secrets manager. Software bugs threaten satellite safety. Columbia University confirms a cyberattack. Researchers uncover malicious NPM packages posing as WhatsApp development tools.A new EDR killer tool is being used by multiple ransomware gangs. Home Improvement stores integrat…
…
continue reading

1
Episode 229 - Ten Years, Ten Lessons: Scaling with Grit, Focus, and Reinvention
22:24
22:24
Play later
Play later
Lists
Like
Liked
22:24By Collective 54
…
continue reading