The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Cybersecurity Awareness Podcasts
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
In a world overloaded with information, great leaders separate the signal, the most critical insights that drive success, from the noise of distractions and uncertainty. Signal to Noise by Riviera Partners is the podcast for tech executives, innovators, talent leaders, and investors who need to make meaningful moves, whether in moments of crisis, clarity, or opportunity. In each episode, we sit down with respected leaders to unpack the defining decisions of their careers. Our guests share po ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
DTX Unplugged delves into the major challenges and innovations shaping business transformation, embodying our event's focus on the critical intersection of people, process, and technology. While rooted in the DTX ethos, this will be an industry-focused platform, tackling key issues, spotlighting groundbreaking innovations, and raising awareness for important topics across the sector.
…
continue reading
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Unraveling the (con)fusion between Tech & Risk Management
…
continue reading
Nibble Knowledge is delighted to bring you "The Entropy Podcast"—hosted by Francis Gorman. The Entropy Podcast centers on cybersecurity, technology, and business, featuring conversations with accomplished professionals who share real-world knowledge and experience. Our goal is simple: to leave you better informed and inspired after every episode. We chose the name “Entropy” because it symbolizes the constant flux and unpredictability in cybersecurity, technology, and business. By understandi ...
…
continue reading
SAE International explores critical topics in transportation cybersecurity with industry, government, and legal experts.
…
continue reading
The purpose of this podcast is to provide unclassified information about current trends in homeland security for the state of New Jersey, as well as educational information and resources for your awareness.
…
continue reading
20MinuteLeaders features the world's prominent leaders for short conversations about their journeys and insights.
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Are you a technology professional unsatisfied with your current role? Looking for a resource to help understand changing job functions, changing organizations, or gaining recognition and progression? The Nerd Journey podcast helps explore alternative roles, increase job satisfaction, and accelerate career progression. Each week, we uncover patterns of technical career progression by dissecting careers of guests and discussing different job roles they’ve held, or discussing relevant career to ...
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
…
continue reading
Humans are the key to solving our cybersecurity challenges…but first we need them to be Well Aware. The Well Aware Security Show is hosted by George Finney, CISO for SMU and author of the award winning book, Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future. Security is in your DNA…so be Well Aware!
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
🎙️ Dive into the world of cybersecurity with Cubic Lighthouse Podcast - your expert companion in navigating the latest developments and crucial topics in the field. We dissect complexities, provide strategic insights, and ensure you stay abreast of cutting-edge trends. Whether you're a seasoned professional or a cybersecurity enthusiast, join us for concise expertise and actionable intelligence to enhance your security posture. 🌐🔐
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
…
continue reading
Bite-sized information about cybersecurity for not-for-profit boards and leaders. In each episode we help leaders of not-for-profits to understand the information security risks to their organisations and they leave with at least one actionable insight that they can put into practice. It also features interviews with not-for-profit leaders sharing their cybersecurity journey, insights and lessons learned.
…
continue reading
Are you a cybersecurity professional who wants to be updated with the latest industry news, emerging threats and challenges but you've got no time to wade through white papers or the tech press? Are you a passionate person about cybersecurity who just wants to learn more on how to protect information? We've got you covered. The Cyberstar Talk's Podcast allows you to stay up to date as you’re going on with your daily grind. This channel will provide you with a bunch of exclusive and best inte ...
…
continue reading
Thriving With Technology is the podcast from techwellness.com. Our Mission is to bring awareness, balance and health to our relationship with tech. Our new reality makes that harder than ever, BUT, it's not impossible. We’ll help you find it without having to abandon the technology that makes life easy, convenient and connected. Join the movement today at techwellness.com
…
continue reading
CSIAC's Mission Mission Statement CSIAC is chartered to leverage the best practices and expertise from government, industry, and academia in order to promote technology domain awareness and solve the most critically challenging scientific and technical problems in the following areas: Cybersecurity and Information Assurance, Software Engineering, Modeling and Simulation, and Knowledge Management/Information Sharing.
…
continue reading
Welcome to Lighting it Up, where host Jennifer Cox brings you into insightful conversations with powerful, innovative, and inspiring people from the tech world and beyond. This podcast highlights the journeys, challenges, and successes of those who are shaping the future—covering everything from navigating neurodiversity to leading with impact. Each episode features candid discussions, practical advice, and fresh perspectives on thriving in today’s fast-evolving landscape. Whether you’re a s ...
…
continue reading
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
…
continue reading
Welcome to The Geek in Review, where podcast hosts, Marlene Gebauer and Greg Lambert discuss innovation and creativity in legal profession.
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
…
continue reading
Certify – CompTIA Security+ 701 Audio Course is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecu ...
…
continue reading
Step into the world of digital forensics, mobile forensics, OSINT, and cybersecurity with The Cyber Sleuth Show! Hosted by Kevin DeLong, this podcast dives deep into the ever-evolving landscape of digital investigations, featuring expert guests, cutting-edge tools, real-world case insights, and, of course, the occasional terrible dad joke. From law enforcement investigators and forensic analysts to OSINT specialists and cybersecurity pros, we uncover the latest trends, techniques, and challe ...
…
continue reading
The TribalHub podcast shares stories of tribal leaders who are driving their organizations, businesses that are collaborating with tribes, and leaders in the industry who are savvy about technology. Subscribe on your favorite podcast platform! TribalHub...Connections, Membership, Opportunity.
…
continue reading
Welcome to the What’s Next! Podcast. I’ve met so many brilliant people as I traveled the globe and have had some fascinating conversations that I’ve wished had been recorded so I could share them with you - this podcast was a way for me to recreate those moments and let you in on some fantastic insights. My current conversations center around one objective: what's next for companies and individuals as they look to innovate and grow. I hope these conversations inspire you as much as they have ...
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
Unhackable - a virtually impossible state of being only made plausible through consistent cybersecurity best practices by everyone simultaneously. This is Unhackable, the authoritative Security podcast about deception and personal security. Can you ever be truly Unhackable? No, nobody can. But every episode is designed to help you move forward using actionable cybersecurity best practices that are within reach of everyone. We help you take the steps needed to solve your most important Cybers ...
…
continue reading

1
Reshare- Heard at TribalNet: Promoting Cybersecurity Awareness
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04Don't miss your second chance at this one! In this episode of the TribalHub podcast, Michelle Bouschor sits down with Patrick Tinklenberg, Vice President of IT, Sycuan Casino, Toni Pepper, CEO, Pepper Consulting LLC and Robin Villareal, CIO, Gila River Resorts & Casinos, to discuss how they promote cybersecurity awareness at their properties. From …
…
continue reading

1
S2E18 Cybersecurity Awareness on a Shoestring Budget
31:49
31:49
Play later
Play later
Lists
Like
Liked
31:49Welcome back to ByteWise! October is right around the corner and it is Cybersecurity Awareness Month. This episode is packed with budget-friendly, creative ideas to boost security awareness in your organization and personal life. The four key themes of this year's Cybersecurity Awareness Month: strong passwords, multi-factor authentication (MFA), r…
…
continue reading

1
RELOAD: The Secret to Thinking like Leonardo Da Vinci with Michael Gelb
30:57
30:57
Play later
Play later
Lists
Like
Liked
30:57Welcome to the What's Next! Podcast with Tiffani Bova. This week, I’m reflecting on a conversation I had a while back with world-famous juggler, Michael Gelb. Michael is the world’s leading authority on the application of genius thinking to personal and organizational development. He is the author of 16 books including How to Think Like Leonardo Da…
…
continue reading

1
Reshare- Unpacking 'Warrior Within': A Conversation with DJ Vanas at TribalNet's 25th Conference & Tradeshow
24:39
24:39
Play later
Play later
Lists
Like
Liked
24:39Don't miss out on this one for a second time! In this episode, TribalHub sits down with DJ Vanas to explore Warrior Within, his powerful keynote delivered at TribalNet’s 25th anniversary conference. Join us as DJ shares insights into the message behind Warrior Within, the inspiration drawn from personal and collective strength, and how this keynote…
…
continue reading
Send Bidemi a Text Message! In this episode, host Bidemi Ologunde spoke with Matt Topper, president of UberEther and a 20+ year veteran of cybersecurity and identity/access management. Matt broke down zero trust without the buzzwords, explained how people-first IAM unlocks business growth, and shared hard-won lessons from public-sector environments…
…
continue reading

1
CYFIRMA Research: Unmasking a Python Stealer- XillenStealer
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18🚨 Threat Intelligence Alert – XillenStealer 🚨 CYFIRMA research identifies XillenStealer, a Python-based open-source information stealer circulating on GitHub, built to exfiltrate: 🔹 Browser credentials & cookies 🔹 Cryptocurrency wallets 🔹 Discord, Steam, Telegram sessions 🔹 System & network data + screenshots Key insights: ⚙️ Builder GUI lowers ent…
…
continue reading
When a fraudster posing as a vendor stole more than $1.5 million from the City of Baltimore, it exposed how even large public agencies can fall victim to Business Email Compromise (BEC) scams. In this episode of Darnley’s Cyber Café, we break down how the attack happened, why these schemes work, and what public-sector organizations and everyday fin…
…
continue reading

1
Protecting your Identity and Brand. Expert Panel Discussion.
46:55
46:55
Play later
Play later
Lists
Like
Liked
46:55New Episode with Special Guest John McLaughlin. Keeping your brand out of the news from a reputation-damaging data breach is top priority for sound leadership. Keeping criminal hackers out of your private information and stopping them from having unauthorized access to data they have no right to access, often depends on one critical factor: identif…
…
continue reading

1
Building Cyber Awareness with Craig Taylor
33:31
33:31
Play later
Play later
Lists
Like
Liked
33:31In this episode of "The Entropy Podcast", host Francis Gorman speaks with Craig Taylor, CEO of CyberHoot, about the challenges and innovations in cybersecurity awareness training. They discuss the failures of traditional phishing awareness programs, the importance of positive reinforcement in training, and the role of gamification in engaging emplo…
…
continue reading
In this special Credit Union Edition of the ByteWise Podcast, Daniela, Brian, and Glen are joined by Tom Costello, CEO of Upstreme, to unpack the future of the Automated Cybersecurity Examination Tool (ACET) and its impact on credit unions. For years, ACET has been the standard tool for cybersecurity self-assessments, but with its foundation—the FF…
…
continue reading

1
Resume Damage: The Turbulence of Changing Job Levels and Finding a Mess to Clean Up with Paul Nadeau (2/2)
48:50
48:50
Play later
Play later
Lists
Like
Liked
48:50Pursuing a role in leadership is one thing, but what happens when you try to return to life as an individual contributor? Our guest, Paul Nadeau, equates this experience to having “resume damage.” Join us for episode 345 as we dive into the differences between pursuing a technical career path as an individual contributor and a career path in people…
…
continue reading

1
How Toufic Boubez Built 5 Startups Without Taking the Top Seat
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07Every modern company is, at its core, a technology company, and the founder's job is evolving just as fast as the tech they build. Few people have navigated this better than Toufic Boubez. A five-time founder and seasoned tech leader, Toufic has done it all: from two-person startups to tech giants like Splunk and IBM. In this episode of Signal to N…
…
continue reading

1
Cyber Threat Intelligence for Blue Teams with Jordan Kalm (Morado COO)
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50From Army recon missions to building Morado, COO Jordan Kalm reveals how military intelligence tactics translate into modern cyber threat intelligence. In this Simply Defensive episode, Josh Mason and Wade Wells dive into what really works for blue teams and SOC analysts — and what’s just noise. 👉 If you’ve ever wondered how to turn raw intel into …
…
continue reading

1
CYFIRMA Research- Digital Frontlines: India Under Multi-Nation Hacktivist Attacks
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57India faced a wave of coordinated cyberattacks in July-August 2025 from multiple countries targeting government and public systems. Notably, a sophisticated malware campaign impersonated the Income Tax Department, tricking users into downloading a malicious file linked to a Chinese-operated server for data theft. Other attacks included data breache…
…
continue reading

1
Apple Calendar Invites Are Being Turned Into Phishing Scams
51:56
51:56
Play later
Play later
Lists
Like
Liked
51:56This week on The Awareness Angle, Anthony Davis and Luke Pettigrew kick off Cybersecurity Awareness Month with new short videos made in collaboration with Hoxhunt—covering spear phishing, deepfakes, and the psychology behind social engineering. Then it’s straight into the big security stories of the week: from iCloud phishing invites to Scattered S…
…
continue reading

1
AI & the Fifth Domain of Warfare: A Talk with Eyal Balicer, Cybersecurity Innovator & Thought Leader
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04By Michael Matias, CEO of Clarity and Forbes 30 Under 30 alumCybersecurity has entered a new domain—literally. As Eyal Balicer put it in our recent conversation: “Cyberspace is now the fifth domain of warfare.” But in this domain, the battleground isn’t just code. It’s control.Eyal brings a rare vantage point to the AI-cyber nexus—he’s held senior …
…
continue reading

1
Unlocking GRC Potential with AI: A Conversation with Yair Kuznitsov, CEO of Anecdotes
26:26
26:26
Play later
Play later
Lists
Like
Liked
26:26By Michael Matias, CEO of Clarity and Forbes 30 Under 30 alum The intersection of Governance, Risk, and Compliance (GRC) and artificial intelligence (AI) marks one of today’s most significant business transformations. In my recent conversation with Yair Kuznitsov, an expert in AI and GRC, it became clear that GRC’s role within enterprises has funda…
…
continue reading

1
Biggest Cyber Insurance Mistakes To Avoid
58:02
58:02
Play later
Play later
Lists
Like
Liked
58:02Joined by Joseph Brunsman discussing how to avoid cyber insurance mistakes, biggest cyber insurance mistakes to avoid, and how to transfer risk for SMBs. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show 🔥New Sp…
…
continue reading

1
CYFIRMA Research- Tracking Ransomware – August 2025
4:42
4:42
Play later
Play later
Lists
Like
Liked
4:42Stay ahead with CYFIRMA’s Monthly Ransomware Report – Aug 2025. CYFIRMA’s August 2025 Ransomware Report recorded 522 global victims, a slight dip but still far above 2023–24 levels. Qilin led with 84 attacks, while Akira surged by 35% targeting SonicWall VPNs and abusing Intel drivers for BYOVD evasion. Charon adopted APT-grade stealth, and 4L4MD4R…
…
continue reading

1
CYFIRMA Research- Grey Zone Warfare in China's Stalled South China Sea Ambition
8:23
8:23
Play later
Play later
Lists
Like
Liked
8:23China's South China Sea ambitions stalled: ASEAN Fights Back Amid U.S. Distractions – check out the latest CYFIRMA report on Beijing's ambitions hitting a wall in the South China Sea, and the fallout in cyberspace. Link to the Research Report: https://www.cyfirma.com/research/grey-zone-warfare-in-chinas-stalled-south-china-sea-ambitions/ #Geopoliti…
…
continue reading
This conversation explores the rapid advancements of AI in healthcare, emphasizing the importance of compliance and the risks associated with shadow AI. It discusses the necessity of prompt training for safe AI usage, the evolving threats of ransomware and social engineering, and the implications of deepfakes in cybersecurity. The conversation conc…
…
continue reading
In this episode of The New CISO, host Steve Moore speaks with Dr. Timo Wandhöfer, Group CISO and Head of Information Security & Business Continuity Management at Klöckner & Co, about the evolving responsibilities of modern CISOs and why influencing—not just convincing—stakeholders is essential for success. From his early career as a researcher in c…
…
continue reading

1
RELOAD: Being Strong for Life and Getting Results with Gold’s Gym CEO Adam Zeitsiff
29:54
29:54
Play later
Play later
Lists
Like
Liked
29:54Welcome to the What's Next! Podcast with Tiffani Bova. This week, I’m reflecting on a conversation I shared with Adam Zeitsiff a while back. Adam is the President & CEO of Gold’s Gym - one of the world’s most recognizable and iconic brands. Gold’s Gym serves over 3 million people daily with more than 700 locations across 23 different countries on 6…
…
continue reading
Send Bidemi a Text Message! In this episode, host Bidemi Ologunde presented six stories about secrecy versus privacy. Support the showBy CHIP STORY Media & Rainmaker Podcasts
…
continue reading

1
CYFIRMA Research- Fake Telegram Premium Site Distributes New Lumma Stealer Variant
5:21
5:21
Play later
Play later
Lists
Like
Liked
5:21CYFIRMA researchers have uncovered a malware campaign exploiting a spoofed Telegram Premium site—telegrampremium[.]app—to distribute a new variant of Lumma Stealer. Key Findings: • Drive-by download delivers malicious start.exe without user interaction • Targets browser credentials, crypto wallets, system info • Employs obfuscation, DGA-based domai…
…
continue reading

1
From Counter-Terrorism to Cybersecurity: Leading with Purpose in a Turbulent World
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58In this powerful episode of DTX Unplugged, we sit down with Kam Karaji, Cybersecurity Director at the NFL, whose extraordinary career journey spans from counter-terrorism operations as a decorated police officer, to protecting global digital infrastructure for some of the world's biggest brands. Now one of the Wall Street Journal’s top 140 CISOs, K…
…
continue reading

1
CYFIRMA Research- CVE-2025-8671 – HTTP/2 MadeYouReset Vulnerability DDoS Attacks
4:08
4:08
Play later
Play later
Lists
Like
Liked
4:08Critical Alert: CVE-2025-8671 – HTTP/2 “MadeYouReset” DoS Vulnerability Organizations operating HTTP/2-enabled infrastructure—such as Apache Tomcat, Netty, F5 BIG-IP, Jetty, and other affected stacks—must act swiftly. This newly uncovered flaw enables attackers to bypass HTTP/2 stream-concurrency protections and trigger unbounded backend processing…
…
continue reading

1
Episode 074 - Step into a Cybersecurity Time Machine - Jeff Man
29:50
29:50
Play later
Play later
Lists
Like
Liked
29:50Step into a Cybersecurity Time Machine - Jeff Man Cybersecurity strategy is not the same as it was 40 years ago. In this episode, Jeff Man, Sr. Information Security Consultant at OBS, joins host Nabil Hannan to discuss his extensive career in cybersecurity. They explore Jeff’s invention of the cryptologic cipher wheel, becoming an expert in securit…
…
continue reading

1
Creating a Cyber Aware Culture for Local Water Utilities
27:50
27:50
Play later
Play later
Lists
Like
Liked
27:50Deputy Managing Director at the Cyber Readiness Institute Lessie Skiba joins host Bryson Bort to discuss the CRI’s new program connecting small- and medium-sized water utilities with cyber coaches to strengthen their resilience. What if the most effective cybersecurity solution isn't a new piece of technology, but a human connection? How can we emp…
…
continue reading
WATCH this episode on our YouTube channel! Ever wondered why employees keep finding ways around your security controls? The answer might lie in how those controls are designed and implemented. In this thought-provoking episode, we're joined by Matt Belanger, CIO of Republic Airways, to tackle one of cybersecurity's most persistent challenges: the f…
…
continue reading

1
Stay Calm and Don’t Panic: Translating Military Leadership Lessons to the Corporate World with Paul Nadeau (1/2)
47:44
47:44
Play later
Play later
Lists
Like
Liked
47:44Imagine transitioning from individual contributor at a company to managing an organization of 155 people. That’s quite the promotion. How would you approach that kind of change? Before you get too anxious about what’s coming, Paul Nadeau, our guest this week in episode 344, has two pieces of advice: stay calm, and don’t panic. Paul’s career began a…
…
continue reading

1
CYFIRMA Research- Tracking Ransomware – July 2025
4:21
4:21
Play later
Play later
Lists
Like
Liked
4:21Stay ahead with CYFIRMA’s Monthly Ransomware Report – July 2025. CYFIRMA’s July 2025 Ransomware Report recorded 504 global victims, a 7.5% rise from June, reflecting sustained threat levels. Qilin remained the most active, while Incransom and SafePay surged. Interlock introduced FileFix, a stealthy Windows UI-based delivery method; GLOBAL GROUP lau…
…
continue reading

1
Ep. 188 Are GRC Analyst roles dead, is GRC engineering the future, tech startups
1:54:00
1:54:00
Play later
Play later
Lists
Like
Liked
1:54:00Book your cyber consultation here: https://calendly.com/techtuaulconsulting ------------------------------------------------------------------------------------ In this episode of The TechTual Talk, HD chats with AJ Yawn and GRC practitioner Abdie Mohamed about the evolving field of Governance, Risk, and Compliance (GRC). They discuss how GRC roles…
…
continue reading
CYFIRMA’s latest report explores Infos3c Grabber Stealer, a Python-based grabber malware that steals passwords, wallets, gaming accounts & Discord/Telegram data, captures screenshots, and exfiltrates via Discord. Use endpoint security + traffic monitoring to stay safe. Link to the Research Report: https://www.cyfirma.com/research/unveiling-a-python…
…
continue reading

1
OSINT Language as a Tool with Skip Schiphorst
30:40
30:40
Play later
Play later
Lists
Like
Liked
30:40In this episode, Francis Gorman interviews Skip Schiphorst, an expert in Open Source Intelligence (OSINT) and language studies. They discuss the critical role of language skills in OSINT, the importance of understanding cultural naming conventions, and the methodologies for conducting multilingual research. Skip emphasizes the need for careful vett…
…
continue reading

1
How Self Sovereign Identity Can Protect You Online
1:04:56
1:04:56
Play later
Play later
Lists
Like
Liked
1:04:56Joe Casanova joins us. Joe is the founder and CEO of Furlough, a thriving digital ecosystem of more than 20k entrepreneurs, brand owners, marketers, and digital pros that fosters career-upskilling and business growth via collaboration. Joe has a decade of experience helping brands to grow and innovate across the e-commerce, influencer, tech, and be…
…
continue reading

1
How a Detective Became the Ginger Hacker: SOC Life, Job Hunts & Blue Team Wisdom
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02From the streets to the SOC. 💻 In this episode of Simply Defensive, Josh Mason and Wade Wells talk with Andrew Crotty — aka Ginger Hacker. A former detective turned Tier 3 SOC analyst and Army reservist, Andrew shares his journey into cyber, the struggles of breaking in, and the lessons he’s learned (including the rookie mistake that accidentally d…
…
continue reading

1
CYFIRMA Research- REVENANT: Executionless, Self-Assembling Threat Hidden in System Entropy
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29New Threat Model: Executionless Persistence Across Endpoints & AI Layers REVENANT introduces a forward-looking multi-stage attack framework that chains stealthy, executionless techniques to persist not just on systems, but in the operational memory of AI assistants. Key Highlights: Executionless delivery via fonts, clipboard state, and localization…
…
continue reading

1
KM&I Meets Legal Tech Connect: Two Tracks, One Community with Patrick DiDomenico and Kevin Klein
53:43
53:43
Play later
Play later
Lists
Like
Liked
53:43This week we are joined by Patrick DiDomenico and Kevin Klein, two longtime builders of knowledge programs and legal tech gatherings. They walk through the evolution of KM&I for Legal, now entering year three, and the debut of its co-located counterpart, Legal Tech Connect. Both events run in New York on October 22 and 23, with a single community, …
…
continue reading
CYFIRMA has uncovered Salat Stealer (WEB_RAT) — a Go-based infostealer targeting Windows. It exfiltrates browser credentials, cryptocurrency wallets, and Telegram session data while evading detection through advanced persistence. Attributed to Russian-speaking actors, it operates under a MaaS model. Explore our in-depth analysis and mitigation stra…
…
continue reading

1
700+ Companies Hit by SalesLoft Drift Hack, Are You At Risk?
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14This week on The Awareness Angle, Anthony Davis and Luke Pettigrew celebrate the 50th episode with community shoutouts, fresh awareness content, and a packed lineup of security stories. From password manager flaws to the first AI-powered ransomware. Whether it’s car dealerships grinding to a halt or deepfakes making truth harder to pin down, this o…
…
continue reading
Some cons don’t succeed because of the smooth-talking seller. Instead, they succeed because of the crowd. Enter The Shill -- a hidden accomplice pretending to be just another customer, audience member, or lucky passerby. They're in the crowd, acting as a 'normal' audience member... all with the goal of bringing validation to the con-artist's claims…
…
continue reading

1
How the FBI fights Cyber Crime. Four Truths.
58:42
58:42
Play later
Play later
Lists
Like
Liked
58:42Ever wondered what really happens in a cyber crime manhunt and take-down? What the FBI actually does in cybersecurity? How they help the publc? Today we got the rare chance to sit down with Special Agent with the FBI’s Cyber Crime Division (RET.), Scott Augenbaum. He shares practical ways how to protect yourself online. His model called the Four (4…
…
continue reading