Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Cybersecurity Awareness Podcasts
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
James McQuiggan brings inspiring stories of cybersecurity practitioners "break-into-industry" stories across all dimensions of cybersecurity.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
SC Media is proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
In a world overloaded with information, great leaders separate the signal, the most critical insights that drive success, from the noise of distractions and uncertainty. Signal to Noise by Riviera Partners is the podcast for tech executives, innovators, talent leaders, and investors who need to make meaningful moves, whether in moments of crisis, clarity, or opportunity. In each episode, we sit down with respected leaders to unpack the defining decisions of their careers. Our guests share po ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
DTX Unplugged delves into the major challenges and innovations shaping business transformation, embodying our event's focus on the critical intersection of people, process, and technology. While rooted in the DTX ethos, this will be an industry-focused platform, tackling key issues, spotlighting groundbreaking innovations, and raising awareness for important topics across the sector.
…
continue reading
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
…
continue reading
SAE International explores critical topics in transportation cybersecurity with industry, government, and legal experts.
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
The purpose of this podcast is to provide unclassified information about current trends in homeland security for the state of New Jersey, as well as educational information and resources for your awareness.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and he ...
…
continue reading
Humans are the key to solving our cybersecurity challenges…but first we need them to be Well Aware. The Well Aware Security Show is hosted by George Finney, CISO for SMU and author of the award winning book, Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future. Security is in your DNA…so be Well Aware!
…
continue reading
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Tastier than a bucket of kittens
…
continue reading
Unraveling the (con)fusion between Tech & Risk Management
…
continue reading
🎙️ Dive into the world of cybersecurity with Cubic Lighthouse Podcast - your expert companion in navigating the latest developments and crucial topics in the field. We dissect complexities, provide strategic insights, and ensure you stay abreast of cutting-edge trends. Whether you're a seasoned professional or a cybersecurity enthusiast, join us for concise expertise and actionable intelligence to enhance your security posture. 🌐🔐
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading
Technology as it impacts our society told from the point of view of a blind technologist
…
continue reading
Bite-sized information about cybersecurity for not-for-profit boards and leaders. In each episode we help leaders of not-for-profits to understand the information security risks to their organisations and they leave with at least one actionable insight that they can put into practice. It also features interviews with not-for-profit leaders sharing their cybersecurity journey, insights and lessons learned.
…
continue reading
CSIAC's Mission Mission Statement CSIAC is chartered to leverage the best practices and expertise from government, industry, and academia in order to promote technology domain awareness and solve the most critically challenging scientific and technical problems in the following areas: Cybersecurity and Information Assurance, Software Engineering, Modeling and Simulation, and Knowledge Management/Information Sharing.
…
continue reading
Thriving With Technology is the podcast from techwellness.com. Our Mission is to bring awareness, balance and health to our relationship with tech. Our new reality makes that harder than ever, BUT, it's not impossible. We'll help you find it without having to abandon the technology that makes life easy, convenient and connected. Join the movement today at techwellness.com
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading
Seasoned professionals chatting about current accounting, audit, tax, and operational issues germane to tax-exempt entities including nonprofits, associations, employee benefit plans, labor unions, and other business enterprises.
…
continue reading
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
…
continue reading
Growth & Grace is a radio show that merges entrepreneurial insights with holistic practices, emphasizing how business success, personal well-being, and the creation of generational wealth are interconnected.
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It's a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
…
continue reading
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
…
continue reading
1
GodLoader Malware Loader: What You Need to Be Aware of
4:02
4:02
Play later
Play later
Lists
Like
Liked
4:02This story was originally published on HackerNoon at: https://hackernoon.com/godloader-malware-loader-what-you-need-to-be-aware-of. We would like to take this opportunity to remind users about some good security practices when it comes to downloading and executing software. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
…
continue reading
October is Cybersecurity awareness month but I give tips for security that last all year.By Kevin Sisco
…
continue reading
1
Dr. Mack Jackson Jr. Strengthens Cybersecurity Awareness and Fights Social Engineering Threats
28:35
28:35
Play later
Play later
Lists
Like
Liked
28:35Dr. Mack Jackson Jr., a Las Vegas native and cybersecurity expert, discussed the importance of cybersecurity awareness on this episode. He highlighted the human factor in cybersecurity, emphasizing that even the most sophisticated systems can be compromised by untrained employees. Dr. Jackson shared examples of cyber attacks on major companies like…
…
continue reading
In this episode of Cisco Champion Radio, we spotlight Cybersecurity Awareness Month and the resources available to help you strengthen your skills and defenses in an evolving threat landscape. With cyberattacks growing more sophisticated and the industry facing a global shortage of 4 million professionals, the need for education and training has ne…
…
continue reading
1
Leaha Crawford Launches Tax Education Series and Celebrates Community Achievements
27:14
27:14
Play later
Play later
Lists
Like
Liked
27:14Leaha Crawford and Julian Rosado discuss upcoming events and personal updates. Leaha is excited about teaching a six-week tax class starting next week, aimed at individuals, entrepreneurs, and those interested in learning tax preparation. She emphasizes the importance of due diligence and compliance, sharing her 30-year experience in tax preparatio…
…
continue reading
I talk about how the technology behind social media platforms are not to blame. We the people are responsible for what we put onto these platformsBy Kevin Sisco
…
continue reading
1
What Are The BIGGEST Cyber Security Risks In SaaS Platforms?
36:38
36:38
Play later
Play later
Lists
Like
Liked
36:38What Are The BIGGEST Cyber Security Risks In SaaS Platforms? How safe are software-as-a-service platforms? Yasir Ali is the Founder and CEO of Polymer, explores hidden cyber security risks in software as a service platforms and innovative ways to reduce risks in software messaging apps. Polymer is a data loss prevention platform for Software-as-a-s…
…
continue reading
1
From Bartender to Cybersecurity: Brent "CodeBrew" Buch's Unique Journey
31:50
31:50
Play later
Play later
Lists
Like
Liked
31:50This week we chat with Brent Buch, also known as Code Brew, to explore his fascinating transition from working in the food and beverage industry to becoming a junior database administrator and aspiring cybersecurity professional. Brent discusses the challenges he faced breaking into the cybersecurity field, the value of transferable skills from bar…
…
continue reading
1
teissTalk: Getting the board’s ‘aye’ on your cyber-security investments
45:29
45:29
Play later
Play later
Lists
Like
Liked
45:29Bridging the CISO-board disconnect which hinders your cyber-security progress Measuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investments Focusing on governance and compliance – how to answer when asked “are we compliant? Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Zia …
…
continue reading
1
Digital Dependence EXPOSED--A Billion Dollar MELTDOWN & AI SECRETS
45:48
45:48
Play later
Play later
Lists
Like
Liked
45:48When Amazon AWS and Microsoft Azure crashed, half a billion dollars vanished overnight. In this episode, David Mauro, Dr. Sergio Sanchez, and Zack Moscow uncover the ethics surrounding AI and the need for tech awareness, highlighting the importance of digital detox in maintaining a healthy balance. We break down: 💥 The $550M AWS outage & how it spr…
…
continue reading
1
The Cybersecurity Perception Gap: Why Executives and IT Teams Don’t See Risk the Same Way
16:44
16:44
Play later
Play later
Lists
Like
Liked
16:44Executives say they’re confident in their cybersecurity, but their teams aren’t so sure. In this episode of Darnley’s Cyber Café, we explore the growing cybersecurity perception gap between leadership and practitioners, why it matters, how to fix it, and what it reveals about the state of cyber resilience in 2025. Tune in to uncover how confidence …
…
continue reading
1
S12|E13 Inside the Secure AI Factory: Defending AI with Cisco’s AI PODs
45:53
45:53
Play later
Play later
Lists
Like
Liked
45:53In this episode of Cisco Champion Radio, we explore how Cisco is integrating security into AI deployment through the Secure AI Factory—a framework designed to ensure that innovation and protection evolve hand in hand.Our experts unpack how the Secure AI Factory brings together security, observability, and AI infrastructure through modular AI pods, …
…
continue reading
1
Understanding Ransomware Gangs: Key Information
45:07
45:07
Play later
Play later
Lists
Like
Liked
45:07David Mauro interviews Jon DiMaggio, a well-respected cybercrime investigator, delving into Understanding Ransomware Gangs: Key Information. Including the operations of LockBit, once the Top ransomware gang and now a Cyber Crime Gang Exposed. We discuss the Ransomware Take Down of #Lockbit, and how Jon’s research led to cyber criminals exposed on #…
…
continue reading
1
Capita Fined £14 Million For Lapse in Governance
3:25
3:25
Play later
Play later
Lists
Like
Liked
3:25- Capita Fined £14 Million For Lapse in Governance - Hackers Explore SharePoint Vulnerability. - Nuclear Site Breach - AWS Outage Ripple Effect On Major Websites. - NCSC Reports Rise In Cyber Attacks In UK. - Supply Chain Gets New Rules/Guidelines By US Authority. Support the show Remember... Even with top-tier security, human negligence and/or err…
…
continue reading
1
CYFIRMA Research: Android/BankBot- YNRK Mobile Banking Trojan
3:50
3:50
Play later
Play later
Lists
Like
Liked
3:50New Malware Analysis Report Our latest research uncovers Android/BankBot-YNRK, a mobile banking trojan disguised as a legitimate app such as Google News. Key findings: • Abuses Accessibility Services for remote control • Uses C2 servers at ping.ynrkone[.]top for device commands • Targets financial and cryptocurrency applications • Employs code obfu…
…
continue reading
1
The $10 Billion Logic Error: What Happens When Security Moves Faster Than Sanity
13:31
13:31
Play later
Play later
Lists
Like
Liked
13:31This story was originally published on HackerNoon at: https://hackernoon.com/the-$10-billion-logic-error-what-happens-when-security-moves-faster-than-sanity. This article investigates how the July 2024 CrowdStrike crash exposed the fragility of automated AI‑driven security systems and their global fallout. Check more stories related to cybersecurit…
…
continue reading
Mobile Threat Alert: GhostGrab Malware! Cybercriminals are getting more sophisticated, and GhostGrab is a clear example. This Android malware doesn’t just steal banking credentials—it can also: Run hidden cryptocurrency mining that drains your battery and CPU Harvest debit card and online banking login information Intercept SMS messages, including …
…
continue reading
1
Can Meta’s AI Scam Detector Actually Stop Them?
1:02:00
1:02:00
Play later
Play later
Lists
Like
Liked
1:02:00This week on The Awareness Angle, Ant Davis and Luke Pettigrew unpack a wave of global cyber stories — from telecom breaches and AI-powered defence tools to sextortion scams and the emotional risks of “friendly” chatbots. It’s a mix of human stories, technical takeaways, and practical lessons for anyone trying to stay safe in an AI-shaped world. 📡 …
…
continue reading
1
OpenAI’s ChatGPT Atlas: What It Means for Cybersecurity and Privacy
15:13
15:13
Play later
Play later
Lists
Like
Liked
15:13In this episode, we explore OpenAI’s groundbreaking release GPT Atlas, the AI-powered browser that remembers your activities and acts on your behalf. Discover its features, implications for enterprise security, and the risks it poses to privacy. Join hosts Tom Eston and Scott Wright as they discuss everything from the browser’s memory function to v…
…
continue reading
1
OpenAI's ChatGPT Atlas: What It Means for Cybersecurity and Privacy
15:14
15:14
Play later
Play later
Lists
Like
Liked
15:14In this episode, we explore OpenAI's groundbreaking release GPT Atlas, the AI-powered browser that remembers your activities and acts on your behalf. Discover its features, implications for enterprise security, and the risks it poses to privacy. Join hosts Tom Eston and Scott Wright as they discuss everything from the browser's memory function to v…
…
continue reading
New Episode🔥This one explores why news outlets focus on the aftermath of a data breach but rarely on the lives impacted. We discuss cybersecurity in the age of AI dangers and its impact on individuals. It's time we address what is cybercrime, the resulting cyber threats, and data protection including identity theft. Download your Take-Home Resource…
…
continue reading
1
What Powers a Leader LIKE Crowdstrike CTO to Climb to the TOP?
59:40
59:40
Play later
Play later
Lists
Like
Liked
59:40What Powers a Leader LIKE Crowdstrike CTO to Climb to the TOP? At 17, he left his Caribbean home and came to the US. After initial struggles she landed a job and after inserting his way into a tech issue, the trajectory of his career changed and he now sits as the Chief Field CTO for the Americas at Crowdstrike. Send us a text Growth without Interr…
…
continue reading
1
Empowering Businesses Through Smart Credit Solutions and Community Banking
30:00
30:00
Play later
Play later
Lists
Like
Liked
30:00The program discussed the rebranding of Western Alliance Bank's streamline product to the Business Advantage product, offering a $100,000 line of credit with an interest rate of prime plus 0.95% and a five-year term. The product requires no financial reporting and has minimal fees. Denials are primarily due to credit score thresholds. The importanc…
…
continue reading
1
From Culinary Arts to Cybersecurity: The Journey and Humor of Dan 'Haircut Fish' Rearden
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56In this episode of Simply Secured, host James Mcquiggan engages in an insightful and entertaining conversation with Dan “The Haircut Fish” Rearden. Dan shares his unconventional journey from various odd jobs and college culinary arts to becoming a SOC analyst. Dan talks about his love for technology, self-guided learning through TryHackMe, and tran…
…
continue reading
1
Cyfirma Research- CVE-2025-6541: TP-Link Omada Gateway Remote Command Injection Vulnerability Analysis
4:51
4:51
Play later
Play later
Lists
Like
Liked
4:51Critical Alert: CVE-2025-6541 – TP-Link Omada Gateway Remote Command Injection Organizations using TP-Link Omada Gateway devices must act immediately. This critical vulnerability allows attackers to execute arbitrary OS-level commands via the device web management interface. Exploitation can lead to full device compromise, exposure of credentials, …
…
continue reading
1
Transforming Global IT Compliance: Rashmi Sets New Standards in NIST Framework Implementation
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56This story was originally published on HackerNoon at: https://hackernoon.com/transforming-global-it-compliance-rashmi-sets-new-standards-in-nist-framework-implementation. Rashmi Bharathan leads a global NIST compliance overhaul, improving audit readiness by 70% and setting new benchmarks in IT governance excellence. Check more stories related to cy…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/to-infinity-and-delete. In 1998, disaster struck at Pixar. A single mistyped command — rm -rf / — began erasing Toy Story 2 from existence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
…
continue reading
Titania Jordan, best-selling author and TV personality (Today Show, GMA etc) and CMO of Bark, joins us to discuss Parenting Today With Social Media. Key Topics: parenting today with social media, social media companies and parenting today, parenting today with tech addiction, holding social media companies accountable today, how social media harms …
…
continue reading
Tune into Tech Unscripted for a candid discussion on building AI-ready data centers. This episode brings together leading experts to share their insights on the massive infrastructure shifts required for explosive AI growth. Discover the critical need for increased network bandwidth, the challenges and solutions in data center liquid cooling, and …
…
continue reading
1
What Every E-Commerce Brand Should Know About Prompt Injection Attacks
11:38
11:38
Play later
Play later
Lists
Like
Liked
11:38This story was originally published on HackerNoon at: https://hackernoon.com/what-every-e-commerce-brand-should-know-about-prompt-injection-attacks. Prompt injection is hijacking AI agents across e-commerce. Learn how to detect, prevent, and defend against this growing AI security threat. Check more stories related to cybersecurity at: https://hack…
…
continue reading
1
Is Ransomware Dead? What Cyber Criminals Are Saying.
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Is Ransomware Dead? Jon DiMaggio, Author of The Art of Cyber Warfare and Chief Security Researcher at Analyst 1, joins us, in this second of a two-part discussion. Here we discuss: how cyber crime is shifting gears exclusive look inside their shocking new tactics insight from the mouths of top cyber crime gang leaders. We bring you Inside the Corpo…
…
continue reading
1
AI Browsers Can’t Tell Friend From Foe: Use Them at Your Own Risk
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25The new wave of AI browsers: Atlas and Comet gives the promise to “think for you” while you browse. They summarize, interpret, and filter the web in real time. But what happens when the assistant inside your browser can’t tell the difference between your command and a malicious instruction coming from the page itself? In this episode of Darnley’s C…
…
continue reading
1
How IPinfo Turns Registry Data into Real Intelligence
18:58
18:58
Play later
Play later
Lists
Like
Liked
18:58This story was originally published on HackerNoon at: https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence. Explore IP addresses, ASNs, and RIR challenges—and see how IPinfo transforms static WHOIS records into dynamic, verifiable intelligence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
…
continue reading
1
How AI Is Cutting Healthcare Product Timelines in Half with Megan Rothney
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58The intersection of healthcare and AI represents one of the most promising frontiers in medical innovation. But how do we balance rapid technological advancement with patient safety? This question lies at the heart of a fascinating conversation between Eóin O'Toole and Megan Rothney, the Vice President of Product at PictorLabs. In this episode of t…
…
continue reading
1
How to Protect Your Kids Online When They're Playing Video Games
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48This story was originally published on HackerNoon at: https://hackernoon.com/how-to-protect-your-kids-online-when-theyre-playing-video-games. Avoid linking external services to your game console, such as signing in with a social media account or other platform and set up restricted child accounts. Check more stories related to cybersecurity at: htt…
…
continue reading
1
Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats
3:50
3:50
Play later
Play later
Lists
Like
Liked
3:50This story was originally published on HackerNoon at: https://hackernoon.com/arsen-launches-smishing-simulation-to-help-companies-defend-against-mobile-phishing-threats. The tool lets companies create and send their own text-message campaigns safely, at scale. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Y…
…
continue reading
1
Cybersecurity Secrets Schools Never Teach
1:37:40
1:37:40
Play later
Play later
Lists
Like
Liked
1:37:40New Episode🔥We explore the often overlooked connection between a significant data breach and mental health, focusing on the resulting anxiety and cyber security concerns. We discuss how data security impacts identity theft and the rising rates of cyber attack. It's time we address the emotional fallout from these incidents. Learn Cybersecurity Secr…
…
continue reading
1
Quarterly Tax Estimates 101 for New Partners & Solo Pros
18:33
18:33
Play later
Play later
Lists
Like
Liked
18:33In this episode, Calibre Tax Partner Jeff Lewis is joined by Tax Director Ethan Gewalb and Supervising Senior Evan Peoples to demystify estimated taxes for self-employed individuals, new partners, and small business owners. They cover the fundamentals—methods, due dates, penalties—and then dig into what really matters: cash-flow management, dynamic…
…
continue reading
1
The $610 Million Poly Network Hack: The Greatest Heist That Never Was
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52The $610 Million Poly Network Hack: The Greatest Heist That Never Was In one of the most shocking moments in crypto history, a lone hacker exploited a vulnerability in Poly Network’s cross-chain protocol—draining over $610 million in digital assets across Ethereum, Binance Smart Chain, and Polygon. Then, in a twist no one saw coming… they gave it a…
…
continue reading
1
Can You Trust Open AI’s New ChatGPT Atlas Browser?
1:05:18
1:05:18
Play later
Play later
Lists
Like
Liked
1:05:18This week on The Awareness Angle, Ant Davis and Luke Pettigrew dive into the fast-moving collision between AI innovation, real-world breaches, and human behaviour. From Sotheby’s data leak to AI browsers that remember your every move, this episode explores where awareness, policy, and technology are all being stress-tested. 🏭 Sotheby’s, Muji & JLR …
…
continue reading
1
It’s Always DNS: Lessons from the AWS Outage
19:07
19:07
Play later
Play later
Lists
Like
Liked
19:07In episode 404 (no pun intended!) we discuss the recurring issue of DNS outages, the recent Amazon AWS disruption, and what this reveals about our dependency on cloud services. The conversation touches on the need for tested business continuity plans, the implications of DNS failures, and the misconceptions around cloud infrastructure’s automatic f…
…
continue reading