Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cybersecurity Brief Podcasts

show episodes
 
Artwork

1
Daily Cyber Threat Brief

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
  continue reading
 
The Cyber Resilience Brief is your 15-minute pulse on how organizations can build stronger defenses and achieve true cyber resilience. Each episode dives into the practical realities of Breach and Attack Simulation (BAS), adversarial exposure validation, and the evolving strategies that keep modern enterprises secure. Hosted by Tova Dvorin and brought to you by SafeBreach — the leader in Adversarial Exposure Validation — this podcast features insights from cybersecurity leaders, integration ...
  continue reading
 
Artwork

1
The Security Brief

Hound Security Systems

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
In a world where security threats evolve daily, staying informed isn't just smart—it's essential. Welcome to the security breif, the podcast that cuts through the noise of the security industry. Each episode, we dive deep into the latest articles, trends, and expert insights, breaking down complex topics into clear, actionable advice. From the future of CCTV and AI-powered analytics to the fundamentals of access control and cybersecurity, we use real-world blog posts as our launchpad for dis ...
  continue reading
 
Stay ahead of the curve with Streamline Studios Daily Brief — your quick, clear, and reliable rundown of the latest in technology. Each episode delivers bite-sized updates on the biggest stories shaping startups, AI, cybersecurity, big tech, and innovation around the globe. Hosted with a friendly, no-fluff style, this daily brief is designed for busy professionals, tech enthusiasts, and innovators who want the essential news without the noise. In just a few minutes, you’ll get the insights y ...
  continue reading
 
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
  continue reading
 
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
  continue reading
 
Artwork
 
Welcome to Tech News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news of all things tech, including the latest developments in areas such as artificial intelligence, robotics, cybersecurity, gadgets, apps, and more. Whether you're a tech enthusiast, industry professional, or simply curious about the potential ...
  continue reading
 
Artwork
 
Interviews with executives and thought leaders on cybersecurity in business today. Hosted by Alan Hart, also the host of Marketing Today with Alan Hart. Alan talks to non-technical business leaders about the current state of cybersecurity across industries. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Here's an Idea

Tech Briefs (SAE Media Group)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Here’s an Idea is Tech Briefs' original podcast series features the stories behind today’s most innovative technologies and the inventors responsible for creating them.
  continue reading
 
Artwork

1501
It's 5:05! Daily cybersecurity and open source briefing

Contributors from Around the World

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
“It’s 5:05!'' is a daily audio news cast highlighting security and open source stories from around the world. We filter for the real cybersecurity and open source stories in the news, so you won't have to. Each day, a global team of journalists contribute stories they found interesting in their daily research from the previous 24 hours. We present them to you in an easy to listen to format, making the resources available at the end of each episode so you can do a deep dive on stories you fin ...
  continue reading
 
Artwork

1
The Backup Wrap-Up

W. Curtis Preston (Mr. Backup)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
  continue reading
 
Welcome to "The SSCC: On Air", the official podcast of the Ski and Snowboard CyberSecurity Conference! Gear up and hit the road with us as we bring you exclusive conversations with our event sponsors, delving into the thrilling intersection of winter sports and cutting-edge cybersecurity. Picture this: cruising up to the conference with the mountains as your backdrop, and The SSCC: On Air podcast as your soundtrack. Join us for insightful discussions with industry leaders, cybersecurity expe ...
  continue reading
 
Artwork

1
Tech Times

Mr. Fresh

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Tech Times is a mobile podcast comprised of 5 - 7 minute bite-sized episodes about various and current tech topics interest. The commentary is brief and gives the listener and inside view to how our ever-evolving world of technology is perceived all from a light-hearted look. Tech Times can be found on Apple Music, Spotify, Google Podcasts, and other podcast streaming platforms. Thanks for listening! Original episodes 10 through 22 can be heard here: http://www.vibesnscribes.com/tech-times-a ...
  continue reading
 
Become a Paid Subscriber: https://podcasters.spotify.com/pod/show/alphawave/subscribe While you wait for Elon Musk to launch Neurolink, Web 3.0 digital marketing firm ALPHA CHAIN LABS LTD. has produced the next best thing to super-intelligent cognition. Introducing The Alpha Wave. Experience the Singularity first hand while you evolve the value of your mind and its potential in the Web 3.0 ecosystem. THE ALPHA WAVE is text to speech excerpts from the most innovative minds, peer reviewed acad ...
  continue reading
 
Loading …
show series
 
This story was originally published on HackerNoon at: https://hackernoon.com/take-a-virtual-tour-of-surveillance-tech-along-the-usmexico-border. We looked at surveillance technology in 27 different cities on both sides of the border. Some of the tech I saw were autonomous towers, aerostat blimps, etc. Check more stories related to cybersecurity at:…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
Is GoHighLevel actually a real way to make money — or just another shiny object? In this in-depth episode, we break down the entire GoHighLevel opportunity ladder based on real user experiences, Reddit insights, and proven business models. Whether you’re a beginner or already offering digital services, this episode gives you a clear, no-fluff look …
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
Most IT teams can't meet their recovery time objective—and they don't even know it. In this episode of The Backup Wrap-up, Curtis and Prasanna explain why your RTO is probably fantasy, who should actually be setting it (hint: not you), and what recovery time actual really means. We cover the critical difference between objectives and reality, why t…
  continue reading
 
(0:10): Google Sues China-Based Cybercrime Ring, Backs New Anti-Scam Legislation (1:57): EU Investigates Google for Alleged Unfair Demotion of News Publishers Amid DMA Scrutiny (3:52): Disney+ Revolutionizes Streaming with AI and User-Generated Content Amidst Legal and Brand Challenges (5:41): Tesla Shifts Gears: Plans to Incorporate Apple CarPlay …
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
You’ve invested thousands in a state-of-the-art intruder alarm. You see the keypads and sensors every day, so you assume you're protected. But what if that system has a hidden fault? In this critical episode of The Security Brief, we investigate the single most overlooked factor in security: ongoing professional maintenance. We reveal how a "false …
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
In this deep-dive episode of The Security Brief, we are exploring the definitive rulebook for professional intruder alarms in the UK. What is the real difference between a certified, police-responsive system and one that an insurer won't even recognize? The answer lies in a complex web of standards, urgent deadlines, and strict operational rules. T…
  continue reading
 
Are you a business owner in 2025 wondering if your security cameras are up to the job? The world of CCTV has split in two: the reliable, old-school Analogue systems versus the smart, high-tech IP network cameras. Sticking with what's cheap and simple might seem smart, but could it be costing you more in the long run? In this episode, we cut through…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
In this episode of The Cyber Resilience Brief, hosts Tova Dvorin and Adrian Culley explore the domino effect of supply chain vulnerabilities within critical infrastructure. Using real-world examples like SolarWinds, MOVEit, and Log4j, they unpack how a single compromised vendor can ripple across entire sectors—and how Adversary Exposure Validation …
  continue reading
 
(0:10): TSMC Hits Record Revenue Amid AI Chip Demand, Faces Challenges with US-China Tensions and Market Volatility (2:21): OpenAI Ventures Into Healthcare with AI-Powered Personal Health Assistant Plans (4:27): Clio Secures $5B Funding, Acquires vLex to Revolutionize Legal AI Landscape (6:26): Tesla Faces Leadership Shake-Up as Cybertruck Sales St…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
(0:10): India's Deeptech Market Set to Soar to $30 Billion by 2030, Fueled by Robotics and Defense Innovation (2:10): AirPods 4 Hit Record-Low Prices on Amazon Ahead of Black Friday (4:31): Microsoft Reveals Whisper Leak: AI Attack Exposes Encrypted Conversations Through Traffic Analysis (6:44): Apple Fitness+ Overhaul: Strategic Shift Aims to Boos…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
Many organizations believe that Microsoft 365 backup is handled by Microsoft. That's a dangerous misconception. In this episode, W. Curtis Preston (Mr. Backup) and Microsoft 365 expert Vanessa Toves explain why you own your data and are responsible for protecting it—not Microsoft. They discuss the limitations of the recycle bin, why retention polic…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/i-built-a-password-tool-in-2-weekends-and-got-1000-users. Indian government portals are a mess when it comes to passwords. Millions of Indians get locked out daily, not knowing what they did wrong. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
  continue reading
 
(0:10): Snap Partners with Perplexity AI for In-App Search, Aiming to Outshine TikTok and Meta (2:25): SoftBank and OpenAI Launch Japan-Focused AI Platform 'Cristal Intelligence' to Transform Industries (4:32): Chan Zuckerberg Initiative Shifts Focus to AI-Driven Science, Doubling Biohub Funding in $1 Billion Push (6:53): Alphabet's AI Data Centre …
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
(0:10): Ripple Secures $500M Investment, Valuation Hits $40B Amid Institutional Crypto Adoption (2:20): Thomson Reuters Launches AI for Tax, Audit, Legal: Streamlining Workflows, Boosting Speed and Accuracy (4:27): Google's Epic Settlement Proposal Aims to Slash App Store Fees and Elevate Alternative Platforms (6:24): Japan Paves Way for Third-Part…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
Europe is a prime target for global adversaries. There is a strong emphasis on eCrime across the region as well as a rise in hacktivism and espionage stemming from ongoing conflicts. The CrowdStrike 2025 European Threat Landscape Report breaks down these trends. In this episode, Adam and Cristian cover the highlights. They start with cybercrime, a …
  continue reading
 
(0:10): Apple Unveils iOS 26.1 and tvOS 26.1 with New Features and EU Delays (1:49): Meta Unveils WhatsApp on Apple Watch: Messaging on the Go with Enhanced Features (1:58): Apple to Launch Budget MacBook Under $1,000 by 2026, Targeting Students and Casual Users (3:53): AMD's Q3 Revenue Soars 36%, Faces Mixed Analyst Sentiment Amid AI Demand and In…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
In this episode of The Cyber Resilience Brief, host Tova Dvorin and SafeBreach offensive security engineer Adrian Culley explore the high-stakes world of critical infrastructure cybersecurity. November marks Critical Infrastructure Security and Resilience Month, and the discussion dives deep into why continuous validation — not periodic testing — i…
  continue reading
 
(0:10): US Approves Nvidia AI Chip Exports to UAE Amid AI Investment Surge, Sparking Security Concerns (2:28): Apple Gears Up for 50th Anniversary with Bold Product Launches and Innovations in 2026 (4:57): Cognizant and Anthropic Partner to Revolutionize Enterprise AI with Claude Integration (7:33): Xanadu Quantum Goes Public in $3.6B SPAC Deal, Ey…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-$10-billion-logic-error-what-happens-when-security-moves-faster-than-sanity. This article investigates how the July 2024 CrowdStrike crash exposed the fragility of automated AI‑driven security systems and their global fallout. Check more stories related to cybersecurit…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/godloader-malware-loader-what-you-need-to-be-aware-of. We would like to take this opportunity to remind users about some good security practices when it comes to downloading and executing software. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/transforming-global-it-compliance-rashmi-sets-new-standards-in-nist-framework-implementation. Rashmi Bharathan leads a global NIST compliance overhaul, improving audit readiness by 70% and setting new benchmarks in IT governance excellence. Check more stories related to cy…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/to-infinity-and-delete. In 1998, disaster struck at Pixar. A single mistyped command — rm -rf / — began erasing Toy Story 2 from existence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/what-every-e-commerce-brand-should-know-about-prompt-injection-attacks. Prompt injection is hijacking AI agents across e-commerce. Learn how to detect, prevent, and defend against this growing AI security threat. Check more stories related to cybersecurity at: https://hack…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
The ShinyHunters threat group has transformed from a dark-web data broker into one of the most dangerous alliances in modern cybercrime. In this episode of The Cyber Resilience Brief, host Tova Dvorin and Adrian Culley, Offensive Security Engineer at SafeBreach, break down how the group’s merger with Scattered Spider marks a new era of as-a-service…
  continue reading
 
(0:10): ACCC Sues Microsoft for Allegedly Misleading Consumers with Microsoft 365 Price Hikes (2:00): Japan Launches JPYC, Aiming for 10 Trillion Yen Stablecoin Market Amid Blockchain Integration Drive (4:21): China's AI-Powered Military Tech Advances: Robot Dogs, Drone Swarms, and DeepSeek's Rapid Scenario Analysis (7:06): Google Unveils AI-Powere…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence. Explore IP addresses, ASNs, and RIR challenges—and see how IPinfo transforms static WHOIS records into dynamic, verifiable intelligence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
  continue reading
 
(0:10): OpenAI's New AI Tool Revolutionizes Music Creation Amid Legal and Ethical Challenges (2:37): Apple Maps to Introduce AI-Driven Ads, Faces Potential Backlash Over Privacy Concerns (4:31): Microsoft Layoffs Highlight 'Great Flattening' and AI Shift, Redefining Job Security in Tech Industry (6:08): Tesla Unleashes FSD 14.1.4 Update: Enhanced N…
  continue reading
 
In the finale of our Cybersecurity Awareness Month series, SafeBreach’s Cyber Resilience Brief delivers its most powerful episode yet — The Cyber Resilience Playbook. Join hosts Tova Dvorin and Adrian Culley as they connect the dots between Breach and Attack Simulation (BAS), Adversarial Exposure Validation (AEV), and Continuous Automated Red Teami…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-to-protect-your-kids-online-when-theyre-playing-video-games. Avoid linking external services to your game console, such as signing in with a social media account or other platform and set up restricted child accounts. Check more stories related to cybersecurity at: htt…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/arsen-launches-smishing-simulation-to-help-companies-defend-against-mobile-phishing-threats. The tool lets companies create and send their own text-message campaigns safely, at scale. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Y…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
Ransomware detection is more complex than most organizations realize. In this episode, cybersecurity expert Mike Saylor breaks down the real-world signs of ransomware attacks—from users complaining about slow computers to smart devices acting strangely. We explore polymorphic malware that changes based on its target, the risks posed by managed serv…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play