Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
theCUBEresearch principal Cybersecurity analyst Jon Oltsik hosts the newest SiliconANGLE podcast focusing on bridging the gap between Cybersecurity and all other parts of tech
…
continue reading
Welcome to the podcast from 404 Media where Joseph, Sam, Emanuel, and Jason catch you up on the stories we published this week. 404 Media is a journalist-owned digital media company exploring the way technology is shaping–and is shaped by–our world. We bring you unparalleled access to hidden worlds both online and IRL through investigative reporting, smart blogging, and breaking news. At 404 Media you’ll read, and hear, stories you can’t find anywhere else written by journalists who are lead ...
…
continue reading
Official Website: https://psysecure.com/podcast/ Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through news, research, and real-world examples. Join us for a thought-provoking journey into a world where anything can be faked, truth is increasingly elusive, and human nature meets artificial intelligence head-on.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Join Query CISO Neal Bridges as he explores the world of SecDataOps with different guests each episode. What is SecDataOps? Who should care about it? Wait, wasn’t it a throwaway joke?
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
Big Ideas. Simplified. Join the OrionX team and guests in lively discussions of trends and products that can impact your investment decisions and change the technology options you consider.
…
continue reading
Our latest TIAKI thought leadership to help determined leaders achieve differentiation in the global sports ecosystem. Listen to our expert analysis and bold thinking to help you achieve the extraordinary in sport.
…
continue reading
Join the brightest SolarWinds minds and IT industry influencers, as they cut through the jargon and give you the tools you need to grow and keep your tech knowledge razor-sharp. Come with questions—leave with actionable steps and practical insights. Have ideas for future episodes or topics? Tweet us @ SolarWinds using #TechPod.
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
A bi-weekly podcast that helps you curb cybersecurity risk and tackle technology challenges
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
The opportunity to delve into the 'mindsz' of industry leaders in technology and cyber security.
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading

1
Cybersecurity, Privacy, Risk Management, Cryptocurrencies, Fintech, Information Technology
Shahid Sharif
Career guidance & consulting services in Information Technology, Cybersecurity, Privacy, Risk Management, Cryptocurrencies, & Fintech #self improvement # productivity #cybersecurity #security #privacy #risk #fintech #blockchain #cryptocurrencies
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
…
continue reading
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
…
continue reading
Welcome to InTechnology, hosted by Camille Morhardt. In this podcast you will hear conversations with industry leaders and technical experts in cybersecurity, sustainability, and technology. Our guests will explain their approach to recognize emerging trends and to create best practices… where more and more, the health of an organization depends on embracing the interconnectedness of these three areas.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading

1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Hosted by Niles Benghauser of CTO Security, this podcast covers a wide range of developments in the world of cybersecurity and managed information technology (IT).
…
continue reading
Redefining Society and Technology Podcast | Musing On Society and Technology | Hosted by Marco Ciappelli | Let's face it: the future is now. We live in a Hybrid Analog Digital Society and it's time to stop ignoring the profound impact technology has on us. The line between the physical and virtual worlds is no longer real—it's a figment of our imagination. We're constantly juggling convenience, privacy, freedom, security, and the very future of humanity in a precarious balancing act. There’s ...
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading

1
E40 - Unpacking the 2025 Verizon DBIR Report: Key Cybersecurity Insights for SMBs
45:40
45:40
Play later
Play later
Lists
Like
Liked
45:40Unpacking the 2025 Verizon DBIR Report: Key Cybersecurity Insights for SMBs Welcome back to Off The Wire! In this episode, hosts Tanner and Anthony dive deep into the 2025 Verizon Data Breach Investigations Report (DBIR). With 35 years of combined IT experience, they discuss the evolving threat landscape, notable trends in cybersecurity, and the im…
…
continue reading

1
The Strategic Value of Architecture Review Board (ARB)
12:46
12:46
Play later
Play later
Lists
Like
Liked
12:46Discover why Architecture Review Boards (ARBs) are vital for financial institutions navigating digital transformation. Learn how ARBs drive strategic alignment, ensure regulatory compliance, reduce technical debt, and optimize costs while enabling innovation. This comprehensive guide outlines the value proposition of ARBs and provides implementatio…
…
continue reading

1
The Monthly Cybersecurity Review: Data Breaches, Ransomware, and Critical Infrastructure
56:44
56:44
Play later
Play later
Lists
Like
Liked
56:44In this episode of 'Cybersecurity Today', host Jim Love is joined by panelists Laura Payne from White Tuque and David Shipley from Beauceron Security to review significant cybersecurity events over the past month. The discussion covers various impactful stories such as the disappearance of a professor, a data breach at Hertz, and government officia…
…
continue reading

1
Week in Review: Hackers pump stocks, Microsoft stops screenshots, AI encrypts cybersecurity
29:05
29:05
Play later
Play later
Lists
Like
Liked
29:05Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Nick Espinosa, host, The Deep Dive Radio Show. Here’s where you can find him: Daily Podcast on SoundCloud | YouTube | Forbes | Twitter/X | Facebook | BlueSky | Mastodon Thanks to our show sponsor, Vanta Do you know the status of your …
…
continue reading

1
Cybersecurity Company CEO Charged for Planting Malware
3:43
3:43
Play later
Play later
Lists
Like
Liked
3:43- CEO of a Cybersecurity Company Charged for Planting Malware. - Microsoft to Expand Hotpatching. - Apple Airplay is Being Exploited. - Ransomware Cripples Hospitals. Support the show Remember... Even with top-tier security, human negligence and/or error can compromise systems. Invest in employee training—it’s the ultimate safeguard. Stay Informed,…
…
continue reading

1
Cybersecurity Awesomeness Podcast - Episode 109
11:54
11:54
Play later
Play later
Lists
Like
Liked
11:54Chris Steffen and Ken Buckler from EMA discuss how the bad guys are using AI to perform cyberattacks.By Enterprise Management Associates + DEVOPSdigest
…
continue reading

1
Mastering Cybersecurity: Part 2 – Securing Systems and Environments
40:33
40:33
Play later
Play later
Lists
Like
Liked
40:33In this episode, Steve and John dive into why securing systems is a must-know skill in cybersecurity. Learn the basics of system hardening, access control, and logging, plus practical tools and labs to get hands-on. They also explore how AI can boost your defense game — and why thinking like both an attacker and defender will set you apart. +++++++…
…
continue reading

1
Regulated, Ruthless & Ready: Inside James Hait’s Wealth Fortress | Out of the Dark
59:32
59:32
Play later
Play later
Lists
Like
Liked
59:32In this episode of Out of the Dark, host Niles Benghouser sits down with James Hait, founder of Victory Wealth Services, to dive deep into what it really takes to run a successful, secure, and compliant financial services firm. James shares how his company navigates complex SEC regulations, prepares for audits, and fosters a strong internal culture…
…
continue reading

1
Cybersecurity Defense Ecosystem Episode 2: Conference Experience Insights
56:00
56:00
Play later
Play later
Lists
Like
Liked
56:00Send us a text Presenters: Evgeniy Kharam, Cybersecurity Architect | Evangelist | Consultant | Advisor | Podcaster | Visionary | Speaker | Nim Nadarajah, C.CISO, Cyber Security, Compliance & Transformation Expert | Executive Board Member | Keynote Speaker Julian Lee, Publisher, Community Builder, Speaker, Channel Ecosystem Developer with a focus on…
…
continue reading

1
Episode 135: Five Lightning Chats at RSAC Conference 2025
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30In episode 135 of Cybersecurity Where You Are, Sean Atkinson is joined live at RSAC Conference 2025 by five attendees, including two Center for Internet Security® (CIS®) employees. He conducts a lightning chat with each attendee to get their thoughts about the conference, how it reflects the changing cybersecurity industry, and the role CIS plays i…
…
continue reading

1
Beyond the Breach: Cyber Intel from the FBI's Former Cyber Chief
30:07
30:07
Play later
Play later
Lists
Like
Liked
30:07In this episode of Reimagining Cyber, Rob Aragao welcomes Matt Gorham, former Assistant Director of the FBI’s Cyber Division and current leader of PwC’s Cyber and Risk Innovation Institute. Gorham shares critical insights from his 25-year FBI career and discusses the evolution of ransomware—especially the rise of ransomware-as-a-service models and …
…
continue reading

1
Visibility Revisited: Trends Shaping the Future of OT Cybersecurity
35:09
35:09
Play later
Play later
Lists
Like
Liked
35:09In this special rewind episode we highlight outside influences shaping control system integrity, the impact of AI, emerging technologies, and the dynamics of building a career in OT cybersecurity. Drawing from frontline experiences and industry events like the S4 Conference, the discussion explores the growing organizational shift toward dedicated …
…
continue reading

1
Network for Rent: The Criminal Market Built on Outdated Routers
9:37
9:37
Play later
Play later
Lists
Like
Liked
9:37Cybercriminals are exploiting outdated routers to build massive proxy networks that hide malware operations, fraud, and credential theft—right under the radar of enterprise defenses. In this episode, Sherri and Matt unpack the FBI’s May 2025 alert, the role of TheMoon malware, and how the Faceless proxy service industrializes anonymity for hire. Le…
…
continue reading

1
Fortinet ON AIR #5 - Navigating AI, Misinformation & Cyber Resilience with Orange Cyberdefense
21:56
21:56
Play later
Play later
Lists
Like
Liked
21:56Fortinet ON AIR is a video podcast series recorded live at Mobile World Congress 2025 in Barcelona, featuring expert voices from across the telecommunications ecosystem.In each episode, we dive into the evolving cybersecurity landscape—exploring how telcos and service providers can stay secure, resilient, and competitive in a fast-changing digital …
…
continue reading

1
Episode 88: Two-Time CISO Showdown Champion (and Chad)
46:05
46:05
Play later
Play later
Lists
Like
Liked
46:05Alias Cybersecurity Jonathan Kimmitt is joined by Chad Kliewer to discuss the exciting CISO Showdown competition between Chief Information Security Officers (CISOs) at BSidesOK. They delve into the history of the showdown, how it works, and highlight significance of the championship belt. Tune in as they share insights and fun facts about this uniq…
…
continue reading

1
The Best and Brightest: 6 Years of Supporting the President’s Cup Cybersecurity Competition
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40A strong cyber defense is vital to public- and private-sector activities in the United States. In 2019, in response to an executive order to strengthen America’s cybersecurity workforce, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) partnered with the SEI to develop and run the President’s Cup Cyberse…
…
continue reading

1
Inside AeroVironment: Managing Global Cybersecurity for Uncrewed Defense Systems
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19In This Episode Jan Mast discusses his role leading global cybersecurity at AeroVironment, a defense contractor at the forefront of uncrewed aerial, ground, and now underwater systems. He explains how the company manages international data regulations and CMMC compliance through advanced Microsoft configurations, while continuing to expand its oper…
…
continue reading
Monzy Merza, CEO and Co founder of Crogl joins theCUBE Research Principal Analyst of Cybersecurity Jon Oltsik for another episode of The Cybersecurity BridgeBy SiliconANGLE
…
continue reading

1
End Compliance Theatre: How Automation Can Save Your Business
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38In this eye-opening episode of Cybersecurity Chronicles, we tackle a critical challenge facing executives today: the devastating impact of cyberattack downtime. Join Netswitch's VP Sean Mahoney, CFO Bernard Mendoza, and cyber resilience expert Steve Piggott as they move beyond "compliance theatre" to discuss why automated disaster recovery (DR) isn…
…
continue reading

1
Recent UK Retail Ransomware Carnage is the ‘Canary in a Coalmine’ Moment for Sport
19:58
19:58
Play later
Play later
Lists
Like
Liked
19:58Send us a text Hey everyone, and welcome back to the show! Today we're discussing a critical warning sign for the sports industry: the recent wave of ransomware attacks hitting UK retailers. This TIAKI article argues that this "carnage" serves as a stark "canary in a coalmine" final warning, highlighting the urgent need for sports organizations to …
…
continue reading

1
Ep.10 - Truth in Marketing An Honest Regard on Marketing Cybersecurity RSA 2025
31:02
31:02
Play later
Play later
Lists
Like
Liked
31:02Welcome to Episode 10 of our Dirty South Security podcast series, where we dive deep into the world of marketing within the cybersecurity industry, especially in the context of RSA 2025. In this episode, we tackle some of the most pressing and controversial topics in the field: Topics Covered: AI Misrepresentations at RSA and Beyond Explore the pra…
…
continue reading
In this episode of Risk & Reels, Jeffrey Wheatman sits down with Craig Taylor, CEO of CyberHoot, to talk about how small businesses are navigating the evolving world of cybersecurity compliance—especially the demanding standards of CMMC. From Apollo 13-style ingenuity to the unintended consequences of regulation, Craig shares a 30-year perspective …
…
continue reading

1
DEF CON's Noob Village: Creating Space for Cybersecurity Beginners
22:00
22:00
Play later
Play later
Lists
Like
Liked
22:00Send us a text Ready to break down the intimidating barriers of cybersecurity conferences? Join us for an eye-opening conversation with Josh Mason, a former Air Force pilot and cyber warfare officer who's on a mission to make the industry more accessible to newcomers. Josh shares his personal journey from military service into the cybersecurity fie…
…
continue reading

1
Setting Honest Expectations for Cybersecurity Career Paths with Debi McCormack
13:46
13:46
Play later
Play later
Lists
Like
Liked
13:46Welcome to Clearly Cyber, the podcast hosted by PRPR. We were excited to be joined by Debi McCormack, Communications Director at The Cyber Scheme, for our new episode. Debi talks about the importance of setting honest expectations about job prospects in the industry, and how organisations can communicate better about the roles that are currently av…
…
continue reading

1
220. Increasing Visibility of the Device Supply Chain to Improve Cybersecurity: Solutions from Lenovo and Intel
20:02
20:02
Play later
Play later
Lists
Like
Liked
20:02In this latest episode of InTechnology, Intel’s Rajan Panchanathan sits down with Nima Baiati, Executive Director and General Manager of Cybersecurity Solutions at Lenovo, to delve into the increasing risks of cybersecurity threats, and the complexities surrounding supply chain security in today's interconnected world. Nima describes Lenovo's proac…
…
continue reading

1
Get ALL the Challenges of Cybersecurity AND Fewer Resources
40:22
40:22
Play later
Play later
Lists
Like
Liked
40:22All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining us is Charles Blauner, formerly of Team8 (at time of recording) and now operating partner, Crosspoint Capital. In this episode: Expanding collective defense Getting tal…
…
continue reading

1
Bridging Cultures and Cybersecurity – A Conversation with Maryam Shoraka
38:58
38:58
Play later
Play later
Lists
Like
Liked
38:58Podcast: Cyber Mindsz Host: Mark Williams Guest: Maryam Shoraka Episode Title: Bridging Cultures and Cybersecurity – A Conversation with Maryam Shoraka 🔗 Links Mentioned Throughout the Podcast 🌐 Quigly Website - https://www.quigly.com.au/ 📖 Rebel Ideas by Matthew Syed - https://www.matthewsyed.co.uk/book/rebel-ideas-the-power-of-diverse-thinking/ 👩…
…
continue reading

1
Part 2: Solving the Top 10 Problems with Vulnerability Management
38:32
38:32
Play later
Play later
Lists
Like
Liked
38:32Once again, we're back with all the answers. Traditional vulnerability management comes with many pitfalls, and we're counting down the solutions to all the problems you might be running into. Ivanti's Chris Goettl and Robert Waters break down the back five on our list: a periodic approach to remediation, poor prioritization, lack of business conte…
…
continue reading

1
#43 Grind Now, Relax Later: The Harsh Reality of Breaking Into Cybersecurity ft. Matthew Younker (Zumi Yumi)
34:29
34:29
Play later
Play later
Lists
Like
Liked
34:29In this episode of The Hacker’s Cache, Matthew Younker (aka Zumi Yumi) shares the raw truth about what it really took to break into offensive security, working full time, going to college, and grinding for OSCP with almost zero rest. He opens up about the unhealthy sacrifices he made, why OSWA was harder than OSCP, and how his journey from Army haz…
…
continue reading

1
Cybersecurity Fundamentals: Modern Day Best Practices
17:42
17:42
Play later
Play later
Lists
Like
Liked
17:42Send us a text In this episode of CyberSound, Jason Pufahl, Steve Maresca, and Michael Grande revisit foundational cybersecurity practices—what’s still essential, what’s evolved, and what’s next. From patching and multi-factor authentication (MFA) to security awareness training, backups, and endpoint detection and response (EDR), the trio discusses…
…
continue reading