Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
Cybersecurity Education Podcasts
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
Hear directly from the frontlines. Our podcast features candid conversations with our own experts as well as external experts driving cybersecurity forward. Real stories, real solutions, real impact.
…
continue reading
This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
In the complex world of education, the Harvard EdCast keeps the focus simple: what makes a difference for learners, educators, parents, and our communities. The EdCast is a weekly podcast about the ideas that shape education, from early learning through college and career. We talk to teachers, researchers, policymakers, and leaders of schools and systems in the US and around the world — looking for positive approaches to the challenges and inequities in education. Through authentic conversat ...
…
continue reading
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Let’s face it: the future is now. We live in a hybrid analog-digital society, and it’s time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? It’s no longer real — just a figment of our imagination. We’re constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. There’s no better place ...
…
continue reading
CyBytes is a podcast that features bite-sized conversations with tech and cybersecurity pros - sharing insights, stories, and actionable advice to help you navigate and thrive in the industry
…
continue reading
A teacher podcast for busy educators—about 10 minutes, every week. Stay current on artificial intelligence in education (plain English), edtech, and what matters in the classroom: culture, instruction, assessment, digital health and wellness, and more. Simple ideas you can use right away. Hosted by AP Computer Science teacher Vicki Davis (Cool Cat Teacher)—author and longtime edtech blogger—this teaching podcast features best-selling teachers, researchers, and in-the-classroom administrators ...
…
continue reading
James McQuiggan brings inspiring stories of cybersecurity practitioners "break-into-industry" stories across all dimensions of cybersecurity.
…
continue reading
Jethro Jones interviews instructional leaders from around the nation to learn and teach what it takes to become a transformative principal. Episodes address topics like Response to Intervention (RTI), Multi-Tiered System of Support (MTSS), Positive Behavior Interventions and Supports (PBIS), the latest advances in educational research, standards-based grading, and interviews with industry leaders like Bill Daggett, Rick Wormeli, Todd Whitaker and even people outside the education like Seth G ...
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
…
continue reading
Discussion
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
SC Media and NowSecure are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Welcome to the "Zero Breach Zone," where we delve into the vital mission of fortifying K-12 schools against breaches and phishing threats. Hosts Andy Lombardo and Phil Hintz lead insightful conversations with top experts in cybersecurity, education, and technology, uncovering strategies to protect our schools. From breaking down the latest digital threats to sharing actionable security measures, this podcast empowers educators, administrators, and parents with the tools they need to safeguar ...
…
continue reading
Welcome to Treasury Talk, a podcast for Michigan taxpayers hosted by State Treasurer, Rachael Eubanks. Our trending topics with Subject Matter Experts will include cybersecurity, tax prep tips, education savings plans, the budget and our economy, and leadership best practices. Listen for take-aways that will support you, your family and your business!
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
On this podcast, I sit down with business leaders, researchers and executives to explore innovative technology solutions and products, whether they’re transforming industries today or still in development. But we go far beyond the tech itself. From real-world use cases and business implementation journeys to cybersecurity challenges and future trends, we uncover what’s shaping the digital landscape. We also dive into topics that matter to every tech professional: Work/life balance, business ...
…
continue reading
SipCyber: Where Great Coffee Meets Essential Cybersecurity What happens when a former special education teacher turned Minnesota State Cybersecurity Coordinator sits down with a perfect cup of coffee? You get cybersecurity advice that's actually approachable. Jen Lotze from IT Audit Labs brings you SipCyber — the podcast that pairs cozy coffee shop discoveries with decaffeinated cybersecurity tips. No jargon. No fear-mongering. Just practical ways to protect yourself, your family, and your o ...
…
continue reading
Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Welcome to Smarter Online Safety: Protect, Empower, Transform—your go-to channel for digital security, AI productivity, and digital transformation. As cyber fraud, identity theft, and AI-driven risks grow, Jocelyn King, “The Queen of Online Safety,” is here to help you stay secure and thrive. A Top 10 Woman in Cybersecurity, speaker, and educator, she has been featured on Dr. Phil, prime-time news, international radio, and top podcasts. 💡 What You’ll Learn: ✔️ Protect yourself & your family ...
…
continue reading
Welcome to the Passwork Cybersecurity Webinars — a space for insightful conversations on digital security and the latest trends in the world of cybersecurity. Each episode, we bring together industry experts, thought leaders, and practitioners to share real-world stories, practical tips, and deep dives into the challenges and innovations shaping our digital lives. Join us as we unravel the complexities of cybersecurity and empower you to protect what matters most.
…
continue reading
Co-hosts Brianna Lennon, county clerk in Boone County, Missouri and Eric Fey, director of elections in St. Louis County, Missouri, talk to subject-matter elections experts and local election administrators to ask the questions that are most meaningful to their work and talk with colleagues about how to best approach issues like voter education, cybersecurity, and integrity.
…
continue reading
Eddie Miro brings years of social engineering experience to bear on an educational and entertaining program around all things social engineering.
…
continue reading
How people connect and learn has evolved in the 50+ years since ACPE was formed. But our mission and ethos haven’t: (1) increasing collaboration and professional development opportunities and (2) fostering long-lasting relationships among our members. We’re eager to keep diversifying ways to connect, learn, and have fun together. The Plugged In podcast is a place for us to amplify the voices of our colleagues and celebrate the work we do in education technology. Join hosts Marc Elliott and R ...
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
"AI Education" is a cutting-edge podcast dedicated to exploring the vast world of artificial intelligence and its impact on society. Each episode delves into current topics and news related to AI, offering listeners a comprehensive understanding of this rapidly evolving field. The podcast breaks down complex concepts into accessible discussions, making it suitable for both AI enthusiasts and newcomers. By covering a wide range of subjects, "AI Education" keeps its audience informed and engag ...
…
continue reading
Dive into the pulse of the Internet with This Week in NET. A weekly roundup of Cloudflare's latest news, innovations and the most impactful developments shaping the Internet. From security updates to performance breakthroughs, we deliver insights that matter to developers, businesses, and Internet enthusiasts alike. Each episode features expert analysis with special guests offering unique perspectives on today's digital challenges and evolving landscape. Follow us @CloudflareTV Read the blog ...
…
continue reading
Ready to earn your AWS Certified Cloud Practitioner credential? Our Audio Course is your ultimate guide to mastering the fundamentals of AWS Cloud, including security, cost management, core services, and cloud economics. Whether you're new to IT or looking to expand your cloud knowledge, this series will help you confidently prepare for the exam and take the next step in your career. Produced by BareMetalCyber.com, your trusted resource for expert-driven cybersecurity education.
…
continue reading
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
UMBC Mic'd Up Podcast welcomes faculty, students, alumni, and industry thought leaders to share their insights and UMBC experiences.
…
continue reading
Cyber Security Compliance and IT Jobs
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Welcome to the ETLA The Beat! This is the official podcast of the EdTech Leader Alliance. This is an Ohio based EdTech Leadership group acting as the COSN Chapter and ISTE Chapter. There is also a yearly ETLA Conference where leaders can meet and network to learn and grow around current topics in education. The group also support DPA, SPDC, Cybersecurity, Mentorship opportunities, AI, the COSN CETL program and more. Episodes will highlight topics supporting the EdTech community. For more inf ...
…
continue reading

1
From Hollywood to Hardware: When AI Stories Come True
17:44
17:44
Play later
Play later
Lists
Like
Liked
17:44Step inside Darnleys Cyber Café for a thought-provoking journey from The Terminator’s Skynet to the eerie futures of Black Mirror. We explore how pop culture’s AI nightmares echo today’s breakthroughs and what they might mean for tomorrow. Grab a coffee, press play, and question how close fiction is to becoming your reality. Click here to send futu…
…
continue reading

1
Mastering C++ Game Animation Programming: Enhance your skills with advanced game animation techniques in C++, OpenGL
19:52
19:52
Play later
Play later
Lists
Like
Liked
19:52A comprehensive guide to developing sophisticated 3D game character animations and virtual worlds. The content covers a wide array of topics, starting with fundamental concepts like loading models and basic animations and progressing to advanced techniques such as GPU-accelerated calculations using compute shaders. Readers will learn about implemen…
…
continue reading

1
Ruby Way, The: Solutions and Techniques in Ruby Programming (Addison-Wesley Professional Ruby Series)
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58A reference for Ruby programming. It covers a vast array of topics, beginning with fundamental data types like strings and numbers, and progressing through complex data structures such as arrays, hashes, and trees. The material also explores object-oriented programming (OOP) principles, file I/O and data storage methods, graphical user interface (G…
…
continue reading

1
Machine Learning for Tabular Data: XGBoost, Deep Learning, and AI
19:09
19:09
Play later
Play later
Lists
Like
Liked
19:09Focuses on machine learning for tabular data, covering its fundamental concepts and practical applications. The sources explore various machine learning and deep learning approaches, with a particular emphasis on gradient boosting techniques like XGBoost and LightGBM, highlighting their efficacy with structured data. Readers will learn about data p…
…
continue reading

1
Learning eBPF: Programming the Linux Kernel for Enhanced Observability, Networking, and Security
21:18
21:18
Play later
Play later
Lists
Like
Liked
21:18A powerful technology for programming the Linux kernel to enhance observability, networking, and security. It explains eBPF's fundamentals, including its virtual machine, instruction set, maps, and helper functions, along with the verifier that ensures program safety. The text details how eBPF programs are written in C (and increasingly Rust), comp…
…
continue reading
With $7B valuation and fresh funding, Cohere partners with AMD. We discuss what’s next. Get the top 40+ AI Models for $20 at AI Box: https://aibox.ai AI Chat YouTube Channel: https://www.youtube.com/@JaedenSchafer Join my AI Hustle Community: https://www.skool.com/aihustle
…
continue reading

1
AI Will Replace Democracy: The Future of Government is Here. Or, is it? Let's discuss! | A Conversation with Eli Lopian | Redefining Society And Technology Podcast With Marco Ciappelli
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35⸻ Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com ______Title: Tech Entrepreneur and Author's AI Prediction - The Last Book Written by a Human Interview | A Conversation with Jeff Burningham | Redefining Society And Technology Podcast With Marco Ciappelli ______Guest: Eli Lopian Founder of Typemock Ltd |…
…
continue reading

1
Learning LangChain: Building AI and LLM Applications with LangChain and LangGraph
46:25
46:25
Play later
Play later
Lists
Like
Liked
46:25A comprehensive guide for developers creating AI and Large Language Model (LLM) applications. The book covers fundamental concepts such as prompt engineering and retrieval-augmented generation (RAG), explaining how to integrate external data and manage conversational memory. It thoroughly explores various cognitive architectures like chains, router…
…
continue reading

1
Learn Quantum Computing with Python and IBM Quantum: Write your own practical quantum programs with Python
25:42
25:42
Play later
Play later
Lists
Like
Liked
25:42A comprehensive guide for individuals seeking to understand and implement quantum programs using Python and the IBM Quantum platform. It explores fundamental quantum computing principles like superposition, entanglement, and interference, detailing how these concepts underpin the creation of quantum circuits. The text also provides practical instru…
…
continue reading

1
Cybersecurity Fundamentals: Cracking the Authentication Code Chapter 5
26:56
26:56
Play later
Play later
Lists
Like
Liked
26:56[email protected] Ever wonder what happens behind the scenes when you tap "Login" on your favorite app? Authentication is the invisible guardian standing between your personal data and potential attackers, and it's more sophisticated than you might think. Authentication systems rely on three critical principles: Confidentiality keeps your cre…
…
continue reading
Not all stories bask in the spotlight. We explore the ones that lingered in the shadows of bigger announcements. This episode proves that shadows often hide treasures. Get the top 40+ AI Models for $20 at AI Box: https://aibox.ai AI Chat YouTube Channel: https://www.youtube.com/@JaedenSchafer Join my AI Hustle Community: https://www.skool.com/aih…
…
continue reading

1
Why Cybersecurity Training Isn’t Working — And What To Do Instead | Human-Centered Cybersecurity Series with Co-Host Julie Haney and Guest Dr. Aunshul Rege | Redefining CyberSecurity with Sean Martin
45:26
45:26
Play later
Play later
Lists
Like
Liked
45:26⬥GUEST⬥ Aunshul Rege, Director at The CARE Lab at Temple University | On Linkedin: https://www.linkedin.com/in/aunshul-rege-26526b59/ ⬥CO-HOST⬥ Julie Haney, Computer scientist and Human-Centered Cybersecurity Program Lead, National Institute of Standards and Technology | On LinkedIn: https://www.linkedin.com/in/julie-haney-037449119/ ⬥HOST⬥ Host: S…
…
continue reading

1
Transforming Higher Education for Tech Careers
19:39
19:39
Play later
Play later
Lists
Like
Liked
19:39Are you curious about how colleges and universities are preparing students for the rapidly evolving tech workforce? In this episode of Full Tech Ahead, host Amanda Razani sits down with Scarlet Clouse, Dean of the College of Education and Director of the Kay Bailey Hutchinson Institute at Angelo State University, to discuss the explosion of AI, cyb…
…
continue reading

1
The End of Search and the Rise of AI Browsers and Voices with Ron Eddings
18:16
18:16
Play later
Play later
Lists
Like
Liked
18:16Search engines aren’t dying quietly, they’re being replaced in real time by AI browsers and voice agents. AI isn’t just answering questions anymore; it’s acting for us. In this episode, Ron Eddings explores how tools like NanoBrowser and Comet are reshaping browsing, why Google may be in trouble, and how AI voices are becoming the new interface for…
…
continue reading
A comprehensive guide for mastering shader programming within the Unity 5 game engine. Authored by Alan Zucconi and Kenneth Lammers, it explores various lighting models, rendering techniques, and visual effects, ranging from basic diffuse shading and texture mapping to advanced concepts like Physically Based Rendering (PBR) and screen effects. The …
…
continue reading

1
Integration of Cloud Computing and IoT: Trends, Case Studies and Applications (Emerging Technologies)
23:36
23:36
Play later
Play later
Lists
Like
Liked
23:36Explores the integration of Cloud Computing and the Internet of Things (IoT), highlighting their combined applications across diverse sectors. It details the fundamental concepts of both cloud computing and IoT, including their architectures, components, advantages, and disadvantages. The source also examines real-world applications such as smart c…
…
continue reading

1
Stay Ahead of DoD's Shift from RMF to CSRMC
16:36
16:36
Play later
Play later
Lists
Like
Liked
16:36The Department of Defense is making one of the most significant changes to cybersecurity compliance in over a decade: a move from the Risk Management Framework (RMF) to the Cybersecurity Risk Management Construct (CSRMC). For defense contractors, integrators, and managed service providers, this shift will redefine how compliance is achieved and mea…
…
continue reading

1
Closing The Gaps: How Security Baselines Make The Difference
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37In this episode of The Collective Podcast, host Jordy Decock sits down with security consultants Thor Nicolaï and Jasper Baes to explore the hidden challenges of maintaining strong security baselines in Microsoft environments. They dive into why small gaps appear, how drift monitoring and exception management can make or break your security posture…
…
continue reading

1
Episode 140: Signals of Post-Quantum Insecurity
19:04
19:04
Play later
Play later
Lists
Like
Liked
19:04In this episode, the Connection Security Center of Excellence team takes us on a journey—both literal and technical—sharing insights gained from a recent reconnaissance road trip across the United States. Their firsthand experiences offer a front-line perspective on the evolving landscape of post-quantum insecurity. Listeners will hear from our sec…
…
continue reading

1
Banning Cell Phones: Quick Fix or False Hope?
30:43
30:43
Play later
Play later
Lists
Like
Liked
30:43Schools around the world are cracking down on student cell phones, with many turning to outright bans as a fix for distraction, bullying, or mental health struggles. But as University of Birmingham Professor Vicky Goodyear and Harvard’s Carrie James explain, the story is more complicated than a simple “phones are bad.” “School phone policies alone …
…
continue reading

1
💢 FileFix Fiasco 💢 Steganography's Stealthy StealC Drop
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53Got a question or comment? Message us here! In this episode of The #SOCBrief, we break down the rising FileFix attack, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proacti…
…
continue reading

1
S2 E4: Industrial Security Alongside a Warzone
21:07
21:07
Play later
Play later
Lists
Like
Liked
21:07Industrial control systems (ICS) and operational technology (OT) are the backbone of modern society—powering electricity, water, gas, communications, manufacturing, chemicals, and even medical technology. But what happens when these systems must be secured in the middle of a warzone? On this episode of Simply ICS Cyber, hosts Don C. Weber and Tom V…
…
continue reading

1
Perfect Lattes, Perfect Credit Scores, Perfect Targets
4:19
4:19
Play later
Play later
Lists
Like
Liked
4:19What happens when you combine the perfect latte with life-changing cybersecurity advice? Welcome to the very first episode of SipCyber! Jennifer Lotze kicks things off at Backstory Coffee Roasters in St. Paul, Minnesota—a hometown hero just three minutes from IT Audit Labs that's roasting beans and building community. But here's the kicker: while y…
…
continue reading

1
#64 Job Interview Secrets From the Other Side of the Table ft. Vladimir Ichkov
37:09
37:09
Play later
Play later
Lists
Like
Liked
37:09Senior penetration tester Vladimir Ichkov shares what really matters in cybersecurity job interviews from the perspective of both a candidate and an interviewer. We discuss the role of soft skills, confidence, and humor in landing a pentesting job, common red flags that turn interviewers away, and how technical experience as a system administrator …
…
continue reading

1
Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap
48:05
48:05
Play later
Play later
Lists
Like
Liked
48:05A practical resource for mastering cybersecurity assessments. The text covers Nmap's versatile applications in network security, including penetration testing, red teaming, and purple teaming, detailing fundamental and advanced scanning techniques. It emphasizes setting up a lab environment for hands-on practice, mapping attack surfaces, identifyin…
…
continue reading

1
Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID
18:30
18:30
Play later
Play later
Lists
Like
Liked
18:30Discuss Radio Frequency Identification (RFID) technology, exploring its evolution and applications across various industries, particularly supply chain management and retail. They examine the technical advancements in RFID, including printed electronics and silicon ink, highlighting their impact on cost reduction and performance. A significant port…
…
continue reading

1
ETLA The Beat S2 E1 HB 96 and Cybersecurity : An EdTech Leaders Alliance Podcast
52:26
52:26
Play later
Play later
Lists
Like
Liked
52:26ETLA The Beat S2 E1 : An Edtech Leaders Alliance Podcast Welcome to ETLA The Beat! This is a monthly podcast sharing news, resources and content from the EdTech Leaders Alliance. As we kick off season 2, we have a focused discussion on cybersecurity, an explanation of HB 96, important deadlines this year and how to meet them in the most cost effect…
…
continue reading

1
Sit Down Conversation With Joan Nwafor - A Cybersecurity/GRC Consultant and Awareness Strategist
34:11
34:11
Play later
Play later
Lists
Like
Liked
34:11Had a great and insightful conversation with Joan about her journey, the challenges, and achievements. We also touched on creating her initiative, "Cyberlingo," starting "CyberTalks With Jojo" and how these are shaping individuals. From her membership program in CyberGirls to what she's up to lately. Bet you are going to love this laid-back convers…
…
continue reading

1
Creating a private AI assistant in Thunderbird
53:08
53:08
Play later
Play later
Lists
Like
Liked
53:08In this episode, Daniel and Chris are joined by Chris Aquino, software engineer at Thunderbird to hear the story of how they developed a privacy-preserving AI executive assistant. They discuss various design decisions including remote (but confidential) inference, local encryption, and model selection. Chris A. does an amazing job describing the jo…
…
continue reading
A quiet data breach at Stellantis could be more than it seems. In this episode of Darnley’s Cyber Café, we take you inside the cyber underbelly of today’s automakers and explore how a single compromise can ripple through an entire industry. What’s really at stake when cars, code, and global supply chains collide? Grab your coffee and tune in to fin…
…
continue reading

1
New GRC course Upcoming Cloud AWS Book New GRC Community
1:44:53
1:44:53
Play later
Play later
Lists
Like
Liked
1:44:53SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
…
continue reading

1
Why Autonomy Is Aviation’s Next Big Leap Forward
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20What if the same innovations making cars self-driving could also make flying safer, faster, and more accessible? For decades, aviation has been bound by the limits of human workload, urban congestion, and safety concerns. But now, a new era is dawning—one where autonomous technologies may redefine how we travel in the skies. In this episode of Full…
…
continue reading

1
Building a Culture of Cybersecurity in K-12 with Itza White, Director of Cybersecurity at Five Star
24:49
24:49
Play later
Play later
Lists
Like
Liked
24:49Welcome to episode 21 of Zero Breach Zone! In this hosts Andy Lombardo and Phil Hintz welcome Itza White, the Director of Cybersecurity for Five Star. The group discusses the unique challenges of cybersecurity in K-12 education, the importance of documentation, and building a culture of security awareness. Itza shares her journey into cybersecurity…
…
continue reading

1
A+ Fundamentals Chapter 1 and 2: Becoming an IT Specialist: Troubleshooting and Hardware Essentials
23:55
23:55
Play later
Play later
Lists
Like
Liked
23:55[email protected] The digital world seems like magic to many, but behind every functioning computer is a complex system of hardware components and methodical troubleshooting approaches. In this comprehensive episode, we pull back the curtain on what makes IT specialists effective problem-solvers and explore the physical heart of computing sys…
…
continue reading

1
Cloudflare turns 15: The origin story with Michelle Zatlyn and Matthew Prince
49:34
49:34
Play later
Play later
Lists
Like
Liked
49:34In this special 15th-anniversary episode of This Week in NET, we sit down with Cloudflare co-founders Michelle Zatlyn and Matthew Prince to revisit the early days — from a Harvard Business School project to launching at TechCrunch Disrupt in 2010. We talk about how culture takes shape, the technical vision of Lee Holloway, and pivotal moments that …
…
continue reading

1
Inside the Snowden Breach with Chris Inglis, Former Deputy Director of the NSA
45:50
45:50
Play later
Play later
Lists
Like
Liked
45:50This episode features Chris Inglis, former U.S. National Cyber Director and longtime Deputy Director of the NSA. With over 40 years in national security, Chris was at the center of one of the most high-stakes breaches in U.S. history: the Edward Snowden incident. In this episode, Chris shares what really happened inside the NSA during those critica…
…
continue reading

1
TOR DARKNET BUNDLE (5 in 1) Master the ART OF INVISIBILITY (Bitcoins, Hacking, Kali Linux)
20:12
20:12
Play later
Play later
Lists
Like
Liked
20:12Provides an extensive overview of operational security (opsec) and anonymity in the digital and physical realms. It thoroughly explains the use of tools like Tor, Freenet, and various encryption methods (PGP, Truecrypt, Veracrypt) to protect digital footprints, communications, and data. The text also highlights the importance of physical security p…
…
continue reading

1
The Developer's Playbook for Large Language Model Security: Building Secure AI Applications
51:44
51:44
Play later
Play later
Lists
Like
Liked
51:44Offers an in-depth look at security concerns surrounding Large Language Models (LLMs), drawing heavily from "The Developer’s Playbook for Large Language Model Security" by Steve Wilson. It presents endorsements highlighting the book's importance for AI developers and security professionals due to the novel risks LLMs introduce. The text outlines va…
…
continue reading

1
Episode 407: AGA GIS and ARM Committee Work with Ben Gilman
36:03
36:03
Play later
Play later
Lists
Like
Liked
36:03This episode of the Pipeliners Podcast features a conversation with Ben Gilman about the American Gas Association’s GIS and Asset Records Management Committee. The discussion explores the evolution of mapping and GIS in the utility industry, the committee’s focus on improving accuracy and best practices, and the growing importance of integrating GI…
…
continue reading

1
Ripple Effect Continues As A Result of The JLR Cyber Attack
4:17
4:17
Play later
Play later
Lists
Like
Liked
4:17- Ripple Effects Continue As a Result of The JLR Cyber Attack. - Fallout From JLR Cyber Breach. - Heathrow Data Breach Concerns. - Global & African Cybersecurity Pulse. Support the show Remember... Even with top-tier security, human negligence and/or error can compromise systems. Invest in employee training—it’s the ultimate safeguard. Stay Informe…
…
continue reading

1
Cybersecurity News: Grok AI Hijacked for Malware, Wi-Fi Heart Rate Hacks, Starlink Competition
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:39Cybercriminals are exploiting X's Grok AI to bypass ad protections and spread malware to millions—while researchers discover your home Wi-Fi can now monitor your heart rate. This week's news breakdown covers the attack vectors you need to know about. Join co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem as they dive into the latest cybersecurit…
…
continue reading

1
Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks
27:04
27:04
Play later
Play later
Lists
Like
Liked
27:04A comprehensive overview of ransomware. It details the history and evolution of various malware types, with a specific focus on ransomware families like Ryuk, WannaCry, and Locky. The sources explore the methods of ransomware distribution, such as email phishing and exploit kits, and explain why traditional antivirus software struggles to detect th…
…
continue reading

1
Speed Up Your Python with Rust: Optimize Python performance by creating Python pip modules in Rust with PyO3
44:05
44:05
Play later
Play later
Lists
Like
Liked
44:05A technical guide published by Packt Publishing in 2021. It focuses on optimizing Python application performance by integrating Rust code. The book provides practical guidance on creating Python pip modules with Rust, managing dependencies using Cargo, and structuring Rust code for efficient integration. It explores advanced topics like concurrency…
…
continue reading

1
Cybersecurity Fundamentals Crypto Keys: Protecting Our Digital World Chapter 3 Part 2
10:02
10:02
Play later
Play later
Lists
Like
Liked
10:02[email protected] Cryptology isn't just theory—it's the invisible shield protecting your every digital move. This second installment of our cryptology deep dive moves beyond the fundamentals to reveal how these powerful tools operate in real-world systems that safeguard our digital lives. Digital signatures stand as one of cryptology's most p…
…
continue reading

1
Reject the Premise, Part 4 with Danny Bauer
52:29
52:29
Play later
Play later
Lists
Like
Liked
52:29In this episode, Jethro and Danny continue their "Reject the Premise" series, a collaborative book-writing and podcast project. They discuss challenging traditional assumptions in education, focusing on reimagining school leadership, student development, and the real purpose of education. Links to Parts 1-3: Reject the Premise 1: Podcasts Link Reje…
…
continue reading
A comprehensive overview of networking fundamentals. It covers essential network concepts, including devices, applications, protocols, and services, explaining their roles within the OSI model and discussing routing and switching characteristics. The text further explores IP addressing components, network topologies, and wireless technologies, alon…
…
continue reading

1
Microsoft Exam MD-100 Windows 10 Certification Guide: Learn the skills required to become a Microsoft Certified Modern Desktop Administrator
13:59
13:59
Play later
Play later
Lists
Like
Liked
13:59Provides comprehensive information on deploying, upgrading, customizing, and configuring the Windows 10 operating system. It covers essential topics such as managing local users, groups, and devices, configuring permissions and file access, implementing local policies, and securing data and applications. The text also explores network configuration…
…
continue reading

1
Azure OpenAI Essentials: A practical guide to unlocking generative AI-powered innovation with Azure OpenAI
29:11
29:11
Play later
Play later
Lists
Like
Liked
29:11A comprehensive guide to leveraging Azure OpenAI. It details the fundamentals of Large Language Models (LLMs), their various applications, and how to integrate them within the Microsoft Azure ecosystem. The book explores advanced topics such as multimodal capabilities, function calling, and Assistants API, along with crucial aspects of privacy, sec…
…
continue reading

1
Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture
25:15
25:15
Play later
Play later
Lists
Like
Liked
25:15A comprehensive guide to securing cloud-native applications and APIs, specifically focusing on OAuth and OpenID Connect standards. The book covers a wide range of topics, including API authorization, token design and management, secure client implementations for various application types (web, mobile, desktop), and the deployment and operational as…
…
continue reading

1
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 275 ~ Watch Now ~
55:01
55:01
Play later
Play later
Lists
Like
Liked
55:01Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 275 ~ Watch Now ~ In this AMA edition of DailyCyber, I break down some of the most pressing issues in cybersecurity today. No guest—just me sharing unfiltered insights from the frontlines of vCISO advisory and leadership. 🔥 What we cover in this AMA: 1️⃣ The Cybersecurity Talent…
…
continue reading