Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Cybersecurity Compliance Podcasts
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
…
continue reading
Cyber Security Compliance and IT Jobs
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
…
continue reading
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Hear directly from the frontlines. Our podcast features candid conversations with our own experts as well as external experts driving cybersecurity forward. Real stories, real solutions, real impact.
…
continue reading
Welcome to "Cyber Compliance and Beyond," a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
Guard Street is a leading holistic cybersecurity provider, specializing in world-class proactive and emergency solutions. As a boutique, we are dedicated to assisting clients with information security risk management which includes risk quantification, compliance across many frameworks, penetration tests and the ability to predict, prevent, detect and respond to security incidents in a fast-moving, distributed landscape.
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Feeling overwhelmed by digital risks and cybersecurity threats? The Safe Podcast is your guide to making sense of it all. We blend technical expertise with real-world business insight to break down digital governance and cybersecurity into clear, actionable strategies. Because governance isn’t just about compliance, it’s about building trust, driving innovation, and setting your business up for long-term success in an ever-evolving digital world.
…
continue reading
Verbose Mode is a bi-weekly podcast from the team at TuxCare, where IT pros Eric Hendricks and Chris DeMars dig into open source, enterprise IT, and cybersecurity without the jargon. Each episode blends real-world stories, practical insights, and a bit of geeky humor to keep sysadmins, developers, IT leaders, and open-source enthusiasts informed and inspired.
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
…
continue reading
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Today, software is the power that moves society. To stay in control over their intellectual property and remain competitive on the market software publishers and intelligent device manufacturers need to integrate top-notch protections against counterfeiting, reverse engineering, and tampering and implement an orchestration of license models that fully respond to the customer’s needs on a global scale. CodeMeter by Wibu-Systems is a comprehensive and award-winning suite of hardware-, software ...
…
continue reading
Sunny's Silver Linings is a Top MSP Channel Podcast hosted by the CEO of IT By Design, Sunny Kaila. Sunny and his guests cover a wide range of MSP and Talent-based topics, including MSP services, cybersecurity, customer service, and strategies to achieve growth and success in the channel. Listen now to take your business to the next level! https://hubs.ly/Q02DrxnQ0
…
continue reading
Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
…
continue reading
1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™
Startuprad.io – Europe’s Startup & VC Podcast Network
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
A podcast from the National Association of State Chief Information Officers (NASCIO). Amy Glasscock and Alex Whitaker interview guests (state CIOs, NASCIO members, strategic partners and colleagues) to get their unique stories and perspectives on state information technology, leadership and lessons learned.
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Welcome to 'Risk Grustlers,' where we celebrate the extraordinary journeys of modern-day Risk Leaders who embrace the art of 'Grustle'—a powerful fusion of Grind and Hustle. Our podcast dives into the innovative strategies and bold decisions taken by these risk-takers, shaping the future of cybersecurity and risk management. Join us as we explore their inspiring stories, insightful advice, and cutting-edge technologies that define the alternative GRC landscape.
…
continue reading
FINRA Unscripted is the voice of the nation’s largest non-government securities regulator. We bring together FINRA leaders to discuss existing and emerging regulatory topics that impact the broker-dealer industry. We share best practices for compliance officers, insights into the operations of a 3,500 person self-regulated organization and educational tools and information for investors. Every investor in America relies on one thing: fair financial markets. That is what FINRA works every day ...
…
continue reading
Welcome to the Ctrl-Alt-Secure podcast, your guide to navigating the ever-changing landscape of cybersecurity. Join us as we delve into the latest trends, threats, and innovations shaping the infosec space.
…
continue reading
Every Wednesday, Cybernomics delivers straight-to-the-point insights for business leaders who aren’t tech experts but need to make big calls about technology, cybersecurity, and digital strategy. We break down the hidden costs, incentives, and opportunities behind today’s most important tech decisions. No jargon. Just clear conversations with seasoned tech executives. Whether you’re budgeting for compliance, evaluating vendors, or planning your next digital investment, Cybernomics helps you ...
…
continue reading
Welcome to Maritime SoftwareHub, the people-focused Podcast for professionals that are passionate about digitalization across the maritime, trade, and satcoms space. Hosted by ex-shipbrokers and talent acquisition leaders Callum Beaumont and Daniel Duggin, of Cordell Beaumont - Digital Search & Recruitment. Each episode will feature highly influential figures within the digital shipping space and will showcase their particular role specialisms and career journey. We aim to discuss key functi ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
1
Exploring Cyber Warfare: Risks, Strategies, and Solutions | Interview with Steve Winterfeld
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02In this episode of the Secure and Simple Podcast, host Dejan Kosutic, CEO of Advisera, welcomes Steve Winterfeld, a seasoned security consultant, fractional CISO, and author of the book 'Cyber Warfare Techniques, Tactics, and Tools for Security Practitioners.' The discussion revolves around the relevance of cyber warfare for companies, the differen…
…
continue reading
1
KI, Sicherheit und Compliance: Eine neue industrielle Dreifaltigkeit (German)
17:12
17:12
Play later
Play later
Lists
Like
Liked
17:12Künstliche Intelligenz verändert die Innovationsprozesse von Unternehmen – aber nur, wenn sie sicher ist. In diesem Gespräch erklärt Stefan Bamberg, Director Sales and Key Account Management bei Wibu-Systems, wie Schutz, Lizenzierung und Compliance das Fundament für vertrauenswürdige KI und nachhaltige Geschäftsmodelle bilden. Highlights: Die doppe…
…
continue reading
1
Compliance Convergence: Harmonizing DORA, NIS2, and SEC for 2025 Resilience
13:18
13:18
Play later
Play later
Lists
Like
Liked
13:18The simultaneous enforcement of the EU’s DORA (January 2025 deadline) and NIS2, alongside the U.S. SEC’s four-day disclosure rule (effective late 2023), has created an increasingly fragmented and high-stakes compliance landscape for global enterprises. This episode details how organizations can move beyond segregated checklists to build a unified c…
…
continue reading
1
Beyond Compliance: effective partnering to support NIS2 resilience
42:43
42:43
Play later
Play later
Lists
Like
Liked
42:43What does NIS2 really mean for your day-to-day security operations? In this episode of The Collective Podcast, host Jordy Decock sits down with Michael Van Horenbeeck, Microsoft Security MVP and CEO of The Collective, to unpack how organizations can move from NIS2 compliance checklists to measurable resilience. They explore why 24-hour incident rep…
…
continue reading
1
Transforming Global IT Compliance: Rashmi Sets New Standards in NIST Framework Implementation
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56This story was originally published on HackerNoon at: https://hackernoon.com/transforming-global-it-compliance-rashmi-sets-new-standards-in-nist-framework-implementation. Rashmi Bharathan leads a global NIST compliance overhaul, improving audit readiness by 70% and setting new benchmarks in IT governance excellence. Check more stories related to cy…
…
continue reading
1
Episode 158: Scaling CMMC Compliance with Nerdio
32:27
32:27
Play later
Play later
Lists
Like
Liked
32:27In episode 158 of Cybersecurity Where You Are, Sean Atkinson is joined by Andy Weidner, Product Manager at Nerdio, and Jason Ingalls, Chief Cybersecurity Officer at C3 Integrated Solutions. Together, they explore how organizations can navigate the complexities of Cybersecurity Maturity Model Certification (CMMC) compliance using automation, scalabl…
…
continue reading
1
Beg Bounty: The New Wave of Unrequested Bug Claims and What They Mean | A Conversation with Casey Ellis | Redefining CyberSecurity with Sean Martin
36:25
36:25
Play later
Play later
Lists
Like
Liked
36:25⬥EPISODE NOTES⬥ Understanding Beg Bounties and Their Growing Impact This episode examines an issue that many organizations have begun to notice, yet often do not know how to interpret. Sean Martin is joined by Casey Ellis, Founder of Bugcrowd and Co-Founder of disclose.io, to break down what a “beg bounty” is, why it is increasing, and how security…
…
continue reading
1
SecurityMetrics Wins "Data Leak Detection Solution of the Year" in 2025 CyberSecurity Breakthrough
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26This story was originally published on HackerNoon at: https://hackernoon.com/securitymetrics-wins-data-leak-detection-solution-of-the-year-in-2025-cybersecurity-breakthrough. SCI reduces the chances of an e-commerce skimming attack through the inspection of a website's shopping cart by a SecurityMetrics Forensic Investigator. Check more stories rel…
…
continue reading
1
Securing Java Microservices with Zero Trust Architecture
5:38
5:38
Play later
Play later
Lists
Like
Liked
5:38This story was originally published on HackerNoon at: https://hackernoon.com/securing-java-microservices-with-zero-trust-architecture. Zero Trust replaces outdated network trust in microservices. Learn how identity, mTLS, OPA, and Vault build a secure, modern architecture. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyb…
…
continue reading
1
Building Cybersecurity Resilience Through FINRA Forward
40:42
40:42
Play later
Play later
Lists
Like
Liked
40:42Today's cybersecurity threats aren't isolated incidents—they are sophisticated operations orchestrated by organized criminals and even nation states. This new reality demands we respond not as individual organizations, but as a unified industry with shared intelligence and coordinated defenses. Through FINRA Forward, we are applying this perspectiv…
…
continue reading
1
The Crown Jewels of Governance: Australian Cyber Security Priorities for Boards in 2025-26
12:25
12:25
Play later
Play later
Lists
Like
Liked
12:25Australia faces a heightened global cyber threat environment driven by geopolitical tensions, with malicious actors continuing to target organizations of all types and sizes, which has led to rising cybercrime costs and serious data breaches. Drawing on guidance from the Australian Signals Directorate (ASD) and the Australian Institute of Company D…
…
continue reading
1
Episode 162: A Managed Approach to a Managed Attack Surface
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24In Episode 162 of Cybersecurity Where You Are, Tony Sager sits down with Tina Williams-Koroma, Founder and CEO of TCecure, LLC and CyDeploy, Inc. Together, they discuss why "cyber insecurity is not inevitable" and how organizations can take a managed approach to attack surface management. Along the way, Tina shares her journey from software develop…
…
continue reading
1
Health and Wellness of the CISO as They Crack Under Pressure and Need a BISO to Scale - Dr. Yonesy Núñez - BSW #422
56:46
56:46
Play later
Play later
Lists
Like
Liked
56:46It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
…
continue reading
1
Rob Rae Unpacks Managed Intelligence (EP 942)
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18Presented by Thread — the AI-powered service desk transforming MSP support, automation, and productivity for today’s IT leaders. https://www.itbusinesspodcast.com/thread/ Rob Rae breaks down the next era for IT businesses—Managed Intelligence Providers. Learn about real-world AI adoption, Pax8’s industry playbooks, and how events shape the MSP futu…
…
continue reading
1
Mastering MSP Cybersecurity with OpenText (EP 941)
24:45
24:45
Play later
Play later
Lists
Like
Liked
24:45Presented by Thread — the AI-powered service desk transforming MSP support, automation, and productivity for today’s IT leaders. https://www.itbusinesspodcast.com/thread/ If you’re an MSP aiming to modernize your cybersecurity stack and stay ahead of technology shifts, this episode is your key resource. Mike and Jason share candid insights on autom…
…
continue reading
How can Azure Site Reliability Engineering Agents help your Azure infrastructure? While at Techorama in Utrecht, Richard chatted with Deepthi Chelupati about the LLM service that helps you build and maintain more reliable applications and infrastructure in Azure. Deepthi talks about monitoring deployment problems, handling errors in production, and…
…
continue reading
1
Cloudflare, Gh0stRAT, npm, North Koreans, Arch, Steam, Documentaries, Aaran Leyland.. - SWN #530
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24Cloudflare, Gh0stRAT, npm, North Korean Employees, Arch Linux Steam Machine, Documentaries, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-530
…
continue reading
1
From Punk Rock Anarchist to Bank Security Leader: An Unlikely Journey in Threat Intelligence | SecureTalk with Joe Rossi
51:25
51:25
Play later
Play later
Lists
Like
Liked
51:25Most threat intelligence programs can't prove their value. Joe Rossi's team at Zions Bank did the opposite—preventing $3 million in fraud annually while actually attracting new customers to the bank. In this episode, former punk rock kid turned threat intelligence leader Joe Rossi reveals why your most valuable security intelligence isn't from expe…
…
continue reading
1
The Generative Firewall: Securing AI and Using AI for Defense
13:56
13:56
Play later
Play later
Lists
Like
Liked
13:56This episode explores the transformative challenge of modern security, focusing on how organizations must adapt their strategies to both secure generative AI applications and leverage AI to strengthen existing defenses. We dive into the critical concepts of securing functionally non-deterministic AI systems by implementing external security boundar…
…
continue reading
1
PP087: Why SBOMs Are Cooler and More Useful Than You Think
46:08
46:08
Play later
Play later
Lists
Like
Liked
46:08Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software. Why should you care about SBOMs? Our guest, Natalie Somersall, is here... …
…
continue reading
1
E075 - Privacy and Security with New Spotify Features
37:39
37:39
Play later
Play later
Lists
Like
Liked
37:39In this episode of Socializing Security, hosts Brian and Milou discuss the implications of Spotify's new instant messaging feature, the risks associated with shadow IT, and the integration of ChatGPT with Spotify. They explore privacy and security concerns, particularly for users who may not be aware of the changes in the platform's functionality. …
…
continue reading
1
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
…
continue reading
1
Episode 415: 8th Anniversary with Russel Treat
25:31
25:31
Play later
Play later
Lists
Like
Liked
25:31This anniversary episode of the Pipeliners Podcast features host Russel Treat reflecting on eight years of the show, highlighting its mission of education through conversation and the breadth of technical topics covered. He discusses the evolution of the show, acknowledges key contributors and sponsors, and offers insights into what may be ahead fo…
…
continue reading
1
Adam Slutskin Talks MSP Success at IT Nation (EP 940)
21:32
21:32
Play later
Play later
Lists
Like
Liked
21:32Presented by Thread — the AI-powered service desk transforming MSP support, automation, and productivity for today’s IT leaders. https://www.itbusinesspodcast.com/thread/ Join Uncle Marv at IT Nation as he sits down with Adam Slutskin—co-founder, President, and CRO of CyberFOX—for a candid conversation about what it takes to succeed as an MSP, both…
…
continue reading
1
The Power of GTIA Membership with Dan & MJ (EP 939)
28:47
28:47
Play later
Play later
Lists
Like
Liked
28:47Presented by Thread — the AI-powered service desk transforming MSP support, automation, and productivity for today’s IT leaders. https://www.itbusinesspodcast.com/thread/ Join Uncle Marv as he sits down with GTIA’s Dan Wensley and MJ Shoer for a candid discussion about elevating the IT industry. The guests share their experience transitioning from …
…
continue reading
1
The Ulimate Partner – Building an MSP Growth Engine with Microsoft
1:02:14
1:02:14
Play later
Play later
Lists
Like
Liked
1:02:14Today we’re talking about what it really takes to partner with a giant. Every MSP wants to grow alongside hyperscalers like Microsoft — but few truly know how to align, scale, and turn partnership into profit. Our guest today has lived that journey from the inside out. Vince Menzione, Founder of The Ultimate Partner and former Microsoft channel lea…
…
continue reading
1
Ep 66: Nautica Group | People, Process, and Platforms: The Future of Maritime Services
29:52
29:52
Play later
Play later
Lists
Like
Liked
29:52In this episode of Maritime SoftwareHub – The People Podcast, Jason Berman, Founder and CEO of Nautica Consulting Group, shares insights into the evolution of maritime technology and the importance of data integration in the industry. He discusses the development of their ERP system, Agency One, and the challenges of technology adoption in a tradit…
…
continue reading
1
Right of Boom: What Happens When Cybersecurity Prevention Fails
38:59
38:59
Play later
Play later
Lists
Like
Liked
38:59If your organization treats cybersecurity as something IT "handles," you're already behind. The regulators know it. The plaintiffs' attorneys know it. And when the breach happens, your board will discover it the expensive way. WHY YOU SHOULD LISTEN Krishan Thakker, a seasoned executive legal advisor, delivers the uncomfortable truths that consultan…
…
continue reading
1
Rogue Agents and Railgun Fights: Securing the AI Frontier
42:33
42:33
Play later
Play later
Lists
Like
Liked
42:33Nation-state hackers are now deploying autonomous AI agents like Claude to execute 80–90% of sophisticated espionage and crime campaigns at machine speed, requiring human intervention at only a few critical decision points. Defenders are thrust into an urgent "AI vs. AI arms race," racing to adopt proactive measures like Google's Big Sleep to detec…
…
continue reading
1
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
1:56:49
1:56:49
Play later
Play later
Lists
Like
Liked
1:56:49Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
…
continue reading
1
Red Team Warfare: A Navy Cyber Officer's Inside Look at Military Offensive Operations
41:13
41:13
Play later
Play later
Lists
Like
Liked
41:13What if your security team is playing defense while hackers play offense 24/7? Foster Davis, former Navy cyber warfare officer and founder of BreachBits, breaks down why traditional penetration tests become obsolete in weeks—and how continuous red teaming changes the game. From hunting pirates in the Indian Ocean to defending critical infrastructur…
…
continue reading
1
Risk Grustlers | EP 18 | Bridging the dev–security divide ft. Siyavash G. Nia (Black Hat Special)
24:37
24:37
Play later
Play later
Lists
Like
Liked
24:37In this episode of Risk Grustlers, Nicholas Muy, CISO at Scrut Automation, sits down with Siyavash G. Nia, CISO at ShyftLabs, to talk about what actually works for smaller teams that care about security but do not have an army of specialists: making vulnerabilities real for developers, using QA as a bridge instead of a shield, using GRC tools for s…
…
continue reading
1
CompTIA to GTIA: Industry Insights with Carolyn April (EP 938)
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Presented by Thread — the AI-powered service desk transforming MSP support, automation, and productivity for today’s IT leaders. https://www.itbusinesspodcast.com/thread/ Dive deep into the channel’s evolution with industry veteran Carolyn April of GTIA. Uncle Marv and Carolyn discuss the organization’s new nonprofit focus, major reports like the S…
…
continue reading
1
Revenue Rescues with Megan Killion (EP 937)
30:27
30:27
Play later
Play later
Lists
Like
Liked
30:27Presented by Thread — the AI-powered service desk transforming MSP support, automation, and productivity for today’s IT leaders. https://www.itbusinesspodcast.com/thread/ Uncle Marv welcomes revenue consultant Megan Killion, previously an agency owner, who shares behind-the-scenes lessons on MSP sales, client targeting, and the realities of lead ge…
…
continue reading
1
The 90% Attack: Inside the First AI-Orchestrated Cyber Espionage Campaign
12:18
12:18
Play later
Play later
Lists
Like
Liked
12:18Anthropic revealed on November 13, 2025, that Chinese state-sponsored hackers successfully weaponized its Claude AI system to conduct the first documented AI-orchestrated cyber espionage campaign. The sophisticated operation, which targeted approximately 30 global organizations including technology companies, financial institutions, and government …
…
continue reading
1
Beyond the First Lie: Building Communication Resilience with the RESIST Framework
17:09
17:09
Play later
Play later
Lists
Like
Liked
17:09Explore the systematic RESIST 3 framework, which guides government communicators through six sequential steps designed to build resilience against the impacts of manipulated, false, and misleading information (MDM). This episode details the crucial "Recognise" stage, where communicators use the FIRST indicators (Fabrication, Identity, Rhetoric, Sym…
…
continue reading
1
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, More... - SWN #529
28:45
28:45
Play later
Play later
Lists
Like
Liked
28:45Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
…
continue reading
1
Ditching Best Practices with Keith Ellis (EP 936)
43:09
43:09
Play later
Play later
Lists
Like
Liked
43:09Keith Ellis joins the show to challenge MSPs everywhere: Are you stuck in survival mode, repeating average practices, or ready for exponential growth? Through personal stories, battle-tested business wisdom, and examples from Microsoft, LinkedIn, and industry disruptors, this episode reveals how commitment, habits and bold thinking transform both m…
…
continue reading
1
AI as a Service: Synthreo’s MSP Playbook (EP 935)
22:48
22:48
Play later
Play later
Lists
Like
Liked
22:48Uncle Marv sits down with Callan Sapien of Synthreo to unpack how Synthreo evolved from early ML automation to an MSP-ready AI platform launched in the summer after an acquisition. They discuss the realities of the AI agent and copilot market, the need to focus on observable client problems, and the tension between high-margin opportunities and the…
…
continue reading
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
…
continue reading
Show Notes: The Monitoring and Enforcement Episode KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. In this episode, Vice President of Privacy Assurance Services, Mark Hinely shares the importance of monitoring and enforcement. Join Our Cybersecurity Mission: https://www.linkedin.com/sho…
…
continue reading
1
Entrepreneur Mindset How MSPs Scale From Services to Intelligence
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42
…
continue reading
1
From Perimeter to Pipeline: Securing the OWASP Top 10 in the Cloud Era
13:33
13:33
Play later
Play later
Lists
Like
Liked
13:33The 2025 OWASP Top 10 reveals a fundamental shift in application security, showing how threats have transformed from simple code flaws like buffer overflows to exploiting the systemic complexity of cloud-native and microservices architectures. This newest list confirms the continued dominance of Broken Access Control (A01) and spotlights the critic…
…
continue reading
1
teissTalk: AI defence against offence - are you playing catch-up in the new security arms race?
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17Leveraging AI-powered solutions to anticipate, detect and contain asymmetric cyber threats Augmenting security teams through AI efficiencies – reducing alert fatigue whilst improving detection speed and accuracy Best AI security practices on safeguarding critical systems and sensitive data against AI-driven cyber threats Thom Langford, Host, teissT…
…
continue reading
AI adoption is outpacing every major tech wave of the past two decades, reshaping the digital enterprise faster than most security leaders expected. In this episode of Threat Vector, Meerah Rajavel, Chief Information Officer at Palo Alto Networks, joins David Moulton to talk about how CIOs can successfully lead AI transformation while securing new …
…
continue reading
1
Conference Recap: ASCII, IT Nation & Swag (EP 934)
1:02:23
1:02:23
Play later
Play later
Lists
Like
Liked
1:02:23In this live IT Nation recap episode, Uncle Marv threads travel anecdotes, conference takeaways, and practical MSP automation into a cohesive narrative. He shares a whirlwind tour that included Lakeland, Philly, and Orlando, culminating in conference reflections and a candid look at the event’s content breadth. The episode doubles as a field report…
…
continue reading
1
The Pax8 Agent Store Revolution with Eric Torres (933)
18:41
18:41
Play later
Play later
Lists
Like
Liked
18:41Join Uncle Marv and Eric Torres, VP of Channel and Community Engagement at Pax8, as they break down the latest in AI-powered MSP automation, cloud marketplaces, and the launch of Pax8’s pioneering agent store. Hear how the company is changing the way MSPs deliver value with customizable solutions and managed intelligence. Takeaways: Pax8’s agent s…
…
continue reading