Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cybersecurity Education Podcasts

show episodes
 
Artwork

1
The Hacker's Cache

Kyser Clark - Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
  continue reading
 
Mastering Cybersecurity is your narrated audio guide to the essential building blocks of digital protection. Each 10–15 minute episode turns complex security concepts into clear, practical lessons you can apply right away—no jargon, no fluff. From passwords and phishing to encryption and network defense, every topic is designed to strengthen your understanding and confidence online. Whether you’re new to cybersecurity or refreshing your knowledge, this series makes learning simple, smart, an ...
  continue reading
 
A teacher podcast for busy educators—about 10 minutes, every week. Stay current on artificial intelligence in education (plain English), edtech, and what matters in the classroom: culture, instruction, assessment, digital health and wellness, and more. Simple ideas you can use right away. Hosted by AP Computer Science teacher Vicki Davis (Cool Cat Teacher)—author and longtime edtech blogger—this teaching podcast features best-selling teachers, researchers, and in-the-classroom administrators ...
  continue reading
 
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork
 
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
  continue reading
 
Artwork

4
Redefining Society and Technology Podcast

Marco Ciappelli, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Let’s face it: the future is now. We live in a hybrid analog-digital society, and it’s time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? It’s no longer real — just a figment of our imagination. We’re constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. There’s no better place ...
  continue reading
 
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
  continue reading
 
Artwork
 
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
  continue reading
 
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
  continue reading
 
Artwork

1
CMMC Academy

Armada Cyber Defense LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
  continue reading
 
SipCyber: Where Great Coffee Meets Essential Cybersecurity What happens when a former special education teacher turned Minnesota State Cybersecurity Coordinator sits down with a perfect cup of coffee? You get cybersecurity advice that's actually approachable. Jen Lotze from IT Audit Labs brings you SipCyber — the podcast that pairs cozy coffee shop discoveries with decaffeinated cybersecurity tips. No jargon. No fear-mongering. Just practical ways to protect yourself, your family, and your o ...
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
Cybertraps Podcast

Frederick Lane & Jethro Jones

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!
  continue reading
 
Artwork
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Artwork

4951
This Week in NET

Cloudflare

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
This Week in NET is Cloudflare’s weekly roundup exploring the Internet’s past, present, and future. Hosted by João Tomé with expert guests, it shares insights that matter to developers, businesses, and Internet enthusiasts alike. Follow us on X: @CloudflareTV and @Cloudflare Read our blog posts at blog.cloudflare.com Watch our full video library at cloudflare.tv/ThisWeekInNet
  continue reading
 
Artwork

1
Zero Breach Zone

Andy Lombardo & Phil Hintz

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to the "Zero Breach Zone," where we delve into the vital mission of fortifying K-12 schools against breaches and phishing threats. Hosts Andy Lombardo and Phil Hintz lead insightful conversations with top experts in cybersecurity, education, and technology, uncovering strategies to protect our schools. From breaking down the latest digital threats to sharing actionable security measures, this podcast empowers educators, administrators, and parents with the tools they need to safeguar ...
  continue reading
 
Artwork

1
Full Tech Ahead

Amanda Razani

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
On this podcast, I sit down with business leaders, researchers and executives to explore innovative technology solutions and products, whether they’re transforming industries today or still in development. But we go far beyond the tech itself. From real-world use cases and business implementation journeys to cybersecurity challenges and future trends, we uncover what’s shaping the digital landscape. We also dive into topics that matter to every tech professional: Work/life balance, business ...
  continue reading
 
Artwork

1
Simply ICS Cyber

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
  continue reading
 
Artwork

1
Practical AI

Practical AI LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
  continue reading
 
Artwork

1
High Turnout Wide Margins

High Turnout Wide Margins

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Co-hosts Brianna Lennon, county clerk in Boone County, Missouri and Eric Fey, director of elections in St. Louis County, Missouri, talk to subject-matter elections experts and local election administrators to ask the questions that are most meaningful to their work and talk with colleagues about how to best approach issues like voter education, cybersecurity, and integrity.
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Artwork

1
The Bid Picture with Bidemi Ologunde

CHIP STORY Media & Rainmaker Podcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Bid Picture is a podcast about building a healthier relationship with technology. Host Bidemi Ologunde blends deep-dive monologues with candid conversations with entrepreneurs and innovators solving real-world problems—from everyday devices to emerging tech like AI—helping listeners use tech more wisely and live better.
  continue reading
 
Artwork

1
Treasury Talk PODCAST

Treasury Talk with MI Treasurer Rachael Eubanks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Treasury Talk, a podcast for Michigan taxpayers hosted by State Treasurer, Rachael Eubanks. Our trending topics with Subject Matter Experts will include cybersecurity, tax prep tips, education savings plans, the budget and our economy, and leadership best practices. Listen for take-aways that will support you, your family and your business!
  continue reading
 
Artwork
 
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
  continue reading
 
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
  continue reading
 
We are in the throws of the digital revolution. During this time, it can be challenging to sift through all of the hype and find what works, what is still viable two years from now, and what contributes to your organization. Many IT organizations need help with confusing messages and conflicting technologies. We help organizations sort through the chatter and embrace digital transformation. The world of digital transformation is constantly changing, and you need to know what is viable today. ...
  continue reading
 
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
  continue reading
 
Artwork

1101
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
  continue reading
 
Artwork

51
Smart Talks with IBM

Pushkin Industries and iHeartPodcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Malcolm Gladwell, author and host of Revisionist History, for Smart Talks with IBM as he speaks with visionaries who are creatively applying technology in business to drive change and transform their industries. This season, Smart Talks with IBM is hitting the road. We’re stepping outside the studio to explore how IBM clients are using artificial intelligence to transform the way they do business. It’s a fresh look behind the curtain of technology, where big ideas meet cutting-edge solu ...
  continue reading
 
Artwork

3101
The TechTual Talk

Henri Davis, The Radcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
  continue reading
 
Artwork

1
Simply Defensive

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
  continue reading
 
Loading …
show series
 
Many people first meeting cybersecurity feel lost in a storm of disconnected tools, rules, and scary headlines about breaches. Without a shared map of attacker behavior, every new term or alert can feel random and hard to compare meaningfully. The MITER ATTACK matrix gives that shared map by organizing real attacker behaviors into a picture that pe…
  continue reading
 
In this episode of Simply Defensive, host Josh Mason and co-host discuss their experiences and challenges in cybersecurity, along with guest Victoria, a student and SOC analyst at UNLV. The conversation covers the complexities of building a Security Operations Center (SOC) and compares academic learning with real-world applications. Victoria shares…
  continue reading
 
The Explosion of Security Data & Modern Detection with Joshua Scott | DailyCyber 280 ~ Watch Now ~ In this episode of DailyCyber, I sit down with Joshua Scott, VP of Security at Hydrolix, a leader with nearly 30 years of hands-on experience across enterprise security, cloud architecture, GRC, risk, IR, compliance, detection engineering, and product…
  continue reading
 
Question? Text our Studio direct. 🔥New Episode🔥 dives into a famous betrayal case, showcasing the breach movie trailer as an example of Hollywood's take on espionage. This story highlights the perilous nature of insider threat and the critical importance of **counterintelligence**. We explore this true spy narrative, bringing you another compelling…
  continue reading
 
Focusing on the application of user experience (UX) principles to Extended Reality (XR), which includes Virtual Reality (VR) and Augmented Reality (AR). The content explores the history of XR, the rise of UX design, and how these methodologies are crucial for driving the adoption of immersive technologies in areas like EdTech, MedTech, enterprise, …
  continue reading
 
Get into cybersecurity here : https://app.techtualconsulting.tech/bundles/57 ------------------------------------------------------------------------------------ In this episode, HD and CyberShortieee dive into everything from navigating IT career moves and salary negotiation, to analyzing the recent Cloudflare outage, security breaches at DoorDash…
  continue reading
 
Question? Text our Studio direct. What Happens in Your BRAIN During Social Engineering Attacks We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Growth without Interr…
  continue reading
 
This week we chat with Bill Boston, also known as 'The Real Bilbo,' to explore his extensive journey from IT support roles to becoming a cybersecurity professional. With over 20 years in support and a strong background in healthcare and consulting, Bill shares unique insights into overcoming mental health challenges, the importance of being fair, f…
  continue reading
 
In this captivating deep dive, discover how AI is revolutionizing education by personalizing learning experiences and empowering educators. Imagine a classroom where lessons are tailored to each student’s unique needs, fostering engagement and retention like never before. As AI becomes a vital ally in teaching, educators are adapting their methods …
  continue reading
 
An extensive table of contents and introductory material for a guide on using the popular code editor for Python development. The source details fundamental setup procedures such as installing Visual Studio Code, configuring a Python interpreter and extensions, and managing core editor features like settings, keybindings, and the Command Palette. F…
  continue reading
 
In this episode of the Cybersecurity Mentors Podcast, Eric O'Neill shares his experiences as an undercover FBI agent who caught one of the most damaging spies in U.S. history, Robert Hansen. He discusses the evolution of cybercrime, the importance of understanding cyber attacks, and the intersection of espionage and cybersecurity. O'Neill emphasize…
  continue reading
 
Question? Text our Studio direct. LOCKBIT Cyber Crime Takedown Uncovered! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Backgroun…
  continue reading
 
Can AI really revolutionize insurance? Amanda Razani interviews Sonny Patel, CPO and CTO of Socotra, to explore how artificial intelligence is transforming the industry. Patel explains how Socotra’s policy administration system leverages AI to streamline policy management, boost efficiency, and support better decision‑making. He highlights AI’s rol…
  continue reading
 
Send Bidemi a Text Message! In this episode, host Bidemi Ologunde spoke with Gal Borenstein—CEO and founder of The Borenstein Group—to unpack how brands earn and scale trust in a noisy, AI-driven world. They dig into the “trust deficit” in B2B/B2G, what separates branding from true trust-building, and how to keep human authenticity while using AI a…
  continue reading
 
In today's digital landscape, AI tools pose significant risks to national security and business integrity. Discover the latest global cybersecurity rankings and learn why Europe is excelling in international cybersecurity challenges. This video dives deep into rising cyber threats, examines successful global defense strategies, and explores the imp…
  continue reading
 
Argues that cybersecurity is primarily a behavioral challenge rather than a technological one, emphasizing that people are the cause of nearly all security incidents. The book introduces and elaborates on nine key cybersecurity habits—such as vigilance, skepticism, diligence, and deception—which are presented as actionable behaviors for both indivi…
  continue reading
 
Andy chats with a real person (not an advisor), Beth Pinsker, a columnist for MarketWatch, about her new book, My Mother's Money, A Guide to Financial Caregiving. In the book, Beth details her personal experience in becoming her mother's financial caregiver, both during her mother's end of life and health decline, and beyond her mother's death and …
  continue reading
 
⬥EPISODE NOTES⬥ Understanding Beg Bounties and Their Growing Impact This episode examines an issue that many organizations have begun to notice, yet often do not know how to interpret. Sean Martin is joined by Casey Ellis, Founder of Bugcrowd and Co-Founder of disclose.io, to break down what a “beg bounty” is, why it is increasing, and how security…
  continue reading
 
Got a question or comment? Message us here! A new zero-day. 63 flaws. Endless patching chaos. This week’s #SOCBrief breaks down Microsoft’s November Patch Tuesday and what it means for your SOC. We’ll cover the top critical CVEs, patching priorities, and how to keep your systems resilient before attackers strike. Support the show Watch full episode…
  continue reading
 
Fireflies CEO, Krish Ramineni shares how the company is transforming AI-powered note-taking into a deeper layer of knowledge automation. He breaks down the technology behind real-time functionality like Live Assist, the user behavior patterns driving product evolution, and how Fireflies is innovating far beyond meetings. Krish also shares insights …
  continue reading
 
In this episode of Simply ICS Cyber, Don and Tom welcome Sam Blaney, retired Chief Warrant Officer (CW3) from the Georgia National Guard and current cybersecurity professor at the University of North Georgia. Sam shares insights from his career building and leading Cyber Protection Team 170, his transition into teaching, and his continued work help…
  continue reading
 
Trust is essential in our daily lives—but it's also what scammers exploit most. In this episode of SipCyber, Jen Lotze visits Central Park Coffee in Owatonna, MN, to discuss two evolving scams that prey on human trust: quishing (QR code fraud) and pig butchering (romance investment scams). From fake QR codes on restaurant tables to elaborate romanc…
  continue reading
 
In this episode of Darnley's Cyber Café, Darnley exposes how everyday people around the world are unknowingly helping hackers infiltrate global companies. We break down fake remote job scams, identity laundering, and the red flags that businesses and individuals need to watch for. Learn how cybercriminals recruit ordinary citizens, why these scheme…
  continue reading
 
Join us for a deep dive into the transformative world of Artificial Intelligence! Discover how AI is reshaping businesses, enhancing shopping experiences, and raising essential ethical questions. In this video, we explore the emergence of AI-generated employees and how they may redefine workplace dynamics. Learn about innovative AI tools like Googl…
  continue reading
 
These excerpts from the book "Hands-on Data Virtualization with Polybase" provide an extensive look at how to implement data virtualization using PolyBase within SQL Server, including its use in Big Data Clusters and Azure Synapse Analytics. The text thoroughly explains the technical details, prerequisites, and setup procedures for connecting SQL S…
  continue reading
 
Question? Text our Studio direct. Join us as we delve into the uncharted territory where artificial intelligence meets modern warfare, exploring the profound implications and potential consequences of this revolutionary intersection. From autonomous drones to predictive analytics, we'll examine how AI is transforming the face of combat and defense …
  continue reading
 
Welcome to episode 14 of the Zero Breach Zone, in this episode hosts Phil Hintz and Andy Lombardo dive into the current state of K-12 cybersecurity, analyzing key findings from the Cisco Talos 2024 report. They explore the concerning rise in ransomware attacks targeting educational institutions, the struggles schools face with limited security budg…
  continue reading
 
Annie Byrd, a 2023 graduate of UMBC’s Community Leadership program, shares how her path through equity work, gender and women’s studies, and community partnerships led her to meaningful social impact. In this episode of UMBC Mic'd Up, she reflects on unlearning, building relationships, and discovering how leadership shows up in everyday life. Annie…
  continue reading
 
As drones move from niche gadgets to everyday infrastructure, they’re also becoming a new kind of storytelling canvas. In this episode, Jamar Williams, CEO and founder of Promo Drone, joins host Amanda Razani to share how his team is turning drones into flying video messaging boards for fan engagement, advertising, and public safety. Jamar explains…
  continue reading
 
[email protected] The everyday internet feels effortless, but behind every click lives a maze of services quietly doing the heavy lifting. I pull back the curtain on the systems that make your workday possible—file shares that just appear on your desktop, printers that hum along until a 200‑page PDF wrecks the queue, and the alphabet soup of …
  continue reading
 
In this episode of Simply Offensive, Phillip Wylie interviews Daniel Lowrie, who shares his extensive background in IT and cybersecurity, particularly in penetration testing and education. Daniel discusses his journey from IT to teaching, effective learning strategies for aspiring pen testers, the importance of hands-on experience, and engaging tea…
  continue reading
 
Malcolm Gladwell heads to San Francisco Tech Week to talk with IBM’s new Director of Research Jay Gambetta in front of a live audience. They discuss IBM’s plans to scale quantum computing power, the groundbreaking experiments already underway, and what impact these new computers could have on chemistry, medicine, and even finance. This is a paid ad…
  continue reading
 
All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is our sponsored guest, Nathan Hunstad, director, security, Vanta. In this episode: Metrics that matter Testing for real AI as an assistant Intelligence without context Hu…
  continue reading
 
This episode features Nathan Wenzler, Field Chief Information Security Officer at Optiv. With nearly 30 years of experience leading cybersecurity programs across government agencies, nonprofits, and Fortune 1000 companies, Nathan has spent his career at the intersection of people, process, and technology. He’s helped organizations redefine what it …
  continue reading
 
A practical guide for building and deploying DevOps pipelines using various open-source tools. The content focuses heavily on Linux fundamentals, including managing files, directories, users, and permissions, while also introducing modern DevOps practices. Specific technologies covered are VirtualBox and Vagrant for creating environments, core web …
  continue reading
 
This anniversary episode of the Pipeliners Podcast features host Russel Treat reflecting on eight years of the show, highlighting its mission of education through conversation and the breadth of technical topics covered. He discusses the evolution of the show, acknowledges key contributors and sponsors, and offers insights into what may be ahead fo…
  continue reading
 
From teaching AP art history to brokering cyber insurance deals. 🎓➡️🛡️ In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Andy Runyan from Yukon to break down everything blue teamers need to know about cyber insurance — before an incident happens. Andy shares his unconventional journey from fourth-generation educator and b…
  continue reading
 
Empowering Communities: The Impact of Excellent Local Government Leadership Join us in this episode of Off the Wire as we interview Glenn Hasteadt, a retired IT director and longtime leader in local government. Glenn shares his insights on the importance of great government leadership, the impact technology has on communities, and the lessons he's …
  continue reading
 
What if math could feel like play? 🎲 In this inspiring episode, mathematician and educator Dan Finkel—founder of Math for Love—joins Vicki Davis, the Cool Cat Teacher, to explore how curiosity, productive struggle, and play can make math more meaningful and fun for every learner. Discover how to start math lessons with questions, why struggle build…
  continue reading
 
A comprehensive guide for security professionals and testers, detailing methodologies for identifying and exploiting numerous web application vulnerabilities. It extensively covers topics like authentication flaws, session management issues, access controls, injection attacks (such as SQL and XML injection), and Cross-Site Scripting (XSS), using to…
  continue reading
 
This week we have a captivating conversation with Christine Smoley, as she shares her journey from an academic background in phenomenology to a successful career in cybersecurity. Key topics include networking at DEFCON, the importance of language acquisition and mental models, challenges of building security teams in startups, and her unique inter…
  continue reading
 
Question? Text our Studio direct. A young undercover FBI operative risks everything to expose America’s most devastating traitor — revealing how Cold-War spycraft evolved into today’s cybercrime economy. The shocking true story of Robert Hanssen — the FBI mole who sold America’s deepest secrets to Russia for over 20 years, leading to the execution …
  continue reading
 
Digital Transformation for the week of November 17, 2025 including news from Artificial Intelligence, Cybersecurity, Advanced Communications, and Embracing Digital Transformation.In a bold leap towards the future, a company is set to operate with entirely AI-generated employees, raising important questions about the chaos and ethical considerations…
  continue reading
 
Send Bidemi a Text Message! In this episode, host Bidemi Ologunde investigates how ordinary people around the world are unknowingly footing the electricity bill for Big Tech’s booming AI data centers. From hidden charges in your utility bill to billion-dollar subsidies for companies like Google, Meta, Microsoft, OpenAI, and Amazon, this critical ep…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play