Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Cybersecurity Expert Podcasts
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
…
continue reading
Hosted by cybersecurity and anti-fraud leader Paul Benda of the American Bankers Association, the ABA Fraudcast brings you expert insights, tools and strategies to help fight fraud.
…
continue reading
Cybermidnight Clubā Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isnāt guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMCās Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
The Expert Podcast brings you firsthand narratives from experts across diverse industries, including private investigators, general contractors and builders, insurance agencies, vehicle specialists, lawyers, and many others.
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. Iām Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
…
continue reading
Welcome to The Lockdown. Privacy doesnāt have to be all-or-nothing. The inability to attain extreme levels of privacy shouldnāt deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
…
continue reading
Sunnyās Silver Linings is a Top MSP Channel Podcast hosted by the CEO of IT By Design, Sunny Kaila. Sunny and his guests cover a wide range of MSP and Talent-based topics, including MSP services, cybersecurity, customer service, and strategies to achieve growth and success in the channel. Listen now to take your business to the next level! https://hubs.ly/Q02DrxnQ0
…
continue reading
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether youāre a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for todayās top cybersecurity threats, AI-driven atta ...
…
continue reading
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Letās face it: the future is now. We live in a hybrid analog-digital society, and itās time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? Itās no longer real ā just a figment of our imagination. Weāre constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. Thereās no better place ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
1
Secure & Simple ā Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
āSecure & Simpleā demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you wonāt be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
This Week in NET is Cloudflareās weekly roundup exploring the Internetās past, present, and future. Hosted by JoĆ£o TomĆ© with expert guests, it shares insights that matter to developers, businesses, and Internet enthusiasts alike. Follow us on X: @CloudflareTV and @Cloudflare Read our blog posts at blog.cloudflare.com Watch our full video library at cloudflare.tv/ThisWeekInNet
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast ā your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in todayās interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Hosted by Brett Gallant, founder of Adaptive Office Solutions, The Adaptive Mindset is the podcast for entrepreneurs and leaders ready to embrace change, overcome limiting beliefs, and grow both personally and professionally. Through compelling stories, expert insights, and actionable strategies, each episode empowers you to adapt, lead, and thrive in a rapidly changing world. From mindset shifts to business resilience and cybersecurity, this is your go-to resource for unlocking your full po ...
…
continue reading
a unique perspective on technology
…
continue reading
Techstrong Gang is your go-to weekday show on Techstrong TV and your favorite podcast platform, bringing together a rotating lineup of top thought leaders and technologists to break down the biggest stories and trends shaping the tech world. Hosted by industry veterans Alan Shimel, Mike Vizard, Mitchell Ashley, Jon Swartz, Lisa Martin, Tracy Ragan, Sulagna Saha, Anne Ahola Ward, Bonnie Schneider, and more, the show dives deep into everything from DevOps and cybersecurity to AI and cloud inno ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Welcome to F for Forensics ā the ultimate digital forensic podcast for cybersecurity professionals, investigators, and tech sleuths! Hosted by Ben and Alex, each episode explores the tools, techniques, and real-world cases behind computer forensics, file system analysis, data recovery, incident response, and more. Whether you're into NTFS carving, malware artifacts, or forensic imaging, this is your byte-sized boost of expert insight and geeky banter. Subscribe now for deep dives into digita ...
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
Empowering Your IT Career Journey ā From the first step to success! With a passion for technology and a mission to uplift others, Iām here to guide you through the dynamic IT industry. Whether you're just starting or looking to advance, youāve found a community dedicated to your growth. Advice & Insights: From Help Desk to Director of Network Operations in 3 years, I share strategies to fast-track your career. Expert Conversations: Gain exclusive insights from industry leaders. Letās make IT ...
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best ā subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
Ready to earn your AWS Certified Cloud Practitioner credential? Our Audio Course is your ultimate guide to mastering the fundamentals of AWS Cloud, including security, cost management, core services, and cloud economics. Whether you're new to IT or looking to expand your cloud knowledge, this series will help you confidently prepare for the exam and take the next step in your career. Produced by BareMetalCyber.com, your trusted resource for expert-driven cybersecurity education.
…
continue reading
We are in the throws of the digital revolution. During this time, it can be challenging to sift through all of the hype and find what works, what is still viable two years from now, and what contributes to your organization. Many IT organizations need help with confusing messages and conflicting technologies. We help organizations sort through the chatter and embrace digital transformation. The world of digital transformation is constantly changing, and you need to know what is viable today. ...
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping todayās digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the worldās most dangerous cyberattacks unfolded and what todayās security professionals must learn from them. Whether youāre a Chief Information Security Officer, a secur ...
…
continue reading
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
…
continue reading
On WEāRE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Talk to Th3 Doc with Steve Meek is designed for executives seeking to learn from a balance of business and technology experts, focused on helping SMBs through practical, high-level insights. Hosted by Steve 'The Doctor' Meek, an experienced business owner and technology strategist, episodes break down complex topics in General Business, Cybersecurity, Artificial Intelligence and Technical Support, into clear, actionable conversations tailored for leadership decision-making. These include top ...
…
continue reading
Tune in as we dissect recent AI news, explore cutting-edge innovations, and sit down with influential voices shaping the future of AI. Whether you're a seasoned expert or just dipping your toes into the AI waters, our podcast is your go-to resource for staying informed and inspired. #IntelAI @IntelAI
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
TechDaily.ai is your go-to platform for daily podcasts on all things technology. From cutting-edge innovations and industry trends to practical insights and expert interviews, we bring you the latest in the tech worldāone episode at a time. Stay informed, stay inspired!
…
continue reading
1
Ransomware in the Fast Lane: Lessons from the Jaguar Land Rover Attack
19:37
19:37
Play later
Play later
Lists
Like
Liked
19:37When ransomware forced Jaguar Land Rover to halt production for six weeks, the impact rippled through global supply chains ā from luxury car lines to small suppliers fighting to stay afloat. In this episode, Sherri Davidoff and Matt Durrin examine what happened, why manufacturing has become ransomwareās top target, and what new data from Sophos andā¦
…
continue reading
1
š“ Oct 27ās Top Cyber News NOW! - Ep 992
1:34:45
1:34:45
Play later
Play later
Lists
Like
Liked
1:34:45The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what ā¦
…
continue reading
1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Mike Poole, Conor Mulherin, Dave Lewis - ESW #430
1:39:12
1:39:12
Play later
Play later
Lists
Like
Liked
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical ā¦
…
continue reading
1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Dave Lewis, Mike Poole, Conor Mulherin - ESW #430
1:39:12
1:39:12
Play later
Play later
Lists
Like
Liked
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical ā¦
…
continue reading
1
The $610 Million Poly Network Hack: The Greatest Heist That Never Was
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52The $610 Million Poly Network Hack: The Greatest Heist That Never Was In one of the most shocking moments in crypto history, a lone hacker exploited a vulnerability in Poly Networkās cross-chain protocolādraining over $610 million in digital assets across Ethereum, Binance Smart Chain, and Polygon. Then, in a twist no one saw coming⦠they gave it aā¦
…
continue reading
1
Itās Always DNS: Lessons from the AWS Outage
19:07
19:07
Play later
Play later
Lists
Like
Liked
19:07In episode 404 (no pun intended!) we discuss the recurring issue of DNS outages, the recent Amazon AWS disruption, and what this reveals about our dependency on cloud services. The conversation touches on the need for tested business continuity plans, the implications of DNS failures, and the misconceptions around cloud infrastructureās automatic fā¦
…
continue reading
1
Itās Always DNS: Lessons from the AWS Outage
19:07
19:07
Play later
Play later
Lists
Like
Liked
19:07In episode 404 (no pun intended!) we discuss the recurring issue of DNS outages, the recent Amazon AWS disruption, and what this reveals about our dependency on cloud services. The conversation touches on the need for tested business continuity plans, the implications of DNS failures, and the misconceptions around cloud infrastructure's automatic fā¦
…
continue reading
1
Armadaās Unified CMMC Compliance Framework
5:07
5:07
Play later
Play later
Lists
Like
Liked
5:07Luis G. Batista C.P.M., CPSM [email protected] Office: (305) 306-1800 Ext. 800 Website LinkedIn Schedule Introduction CAGE: 9QG33 UEI: K6UZHLE1WUA7 CyberComply CMMC GRC A Product of Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading
1
CMMC Compliance: GRC, PreVeil, and MSSP Synergy
11:31
11:31
Play later
Play later
Lists
Like
Liked
11:31Luis G. Batista C.P.M., CPSM [email protected] Office: (305) 306-1800 Ext. 800 Website LinkedIn Schedule Introduction CAGE: 9QG33 UEI: K6UZHLE1WUA7 CyberComply CMMC GRC A Product of Armada Cyber DefenseBy Armada Cyber Defense LLC
…
continue reading
1
Robo Bees, side, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet - SWN #523
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-523
…
continue reading
1
Robo Bees, side, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet - SWN #523
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
…
continue reading
1
Cloudflare Connect 2025 Highlights: Common & Company
28:23
28:23
Play later
Play later
Lists
Like
Liked
28:23In this special episode, host JoĆ£o TomĆ© reports from Cloudflare Connect Las Vegas (October 13-16) ā the companyās first-ever global event, bringing together customers, partners, and developers from over 60 countries. In the intro, we also share whatās coming next week on the Cloudflare blog ā a special five-day series focused on Internet Measuremenā¦
…
continue reading
In this fully connected episode, Daniel and Chris explore the emerging concept of tiny recursive networks introduced by Samsung AI, contrasting them with large transformer based models. They explore how these small models tackle reasoning tasks with fewer parameters, less data, and iterative refinement, matching the giants on specific problems. Theā¦
…
continue reading
1
š“ Oct 24ās Top Cyber News NOW! - Ep 991
1:45:01
1:45:01
Play later
Play later
Lists
Like
Liked
1:45:01The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what ā¦
…
continue reading
Alan, Mike, Jon, Chris Blask, Ira Winkler, Fred Wilmot and Futurum Group president Dan O'Brien dive into how alliances between providers of artificial intelligence (AI) platforms such as Google, Anthropic, IBM and Groq are creating some strange bedfellows. Then the gang takes a look at the degree to which cybersecurity teams are starting to lose thā¦
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 131
16:08
16:08
Play later
Play later
Lists
Like
Liked
16:08Chris Steffen and Ken Buckler from EMA discuss insider threats for Cybersecurity Awareness Month.By Enterprise Management Associates + DEVOPSdigest
…
continue reading
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of thā¦
…
continue reading
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of thā¦
…
continue reading
The sources comprise a transcript of a YouTube video titled "Saving Samantha on Twitter Spaces" and a Spotify podcast listing for the same event, hosted by the "Cybermidnight Club ā Hackers, Cyber Security and Cyber Crime." The primary source, the transcript, documents a live, often chaotic discussion among several individualsāAlberto, Sapit, Nana,ā¦
…
continue reading
The provided texts offer two distinct perspectives on modern forms of influence and security, with the Darknet Diaries podcast excerpts exploring the history and function of PSYOP (Psychological Operations), or Military Information Support Operations (MISO). These audio transcripts explain how the US military uses non-lethal methodsāincluding leaflā¦
…
continue reading
1
š“ Oct 23ās Top Cyber News NOW! - Ep 990
1:29:51
1:29:51
Play later
Play later
Lists
Like
Liked
1:29:51The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what ā¦
…
continue reading
Alan, Mike, Jon, Garima Bajpai and Teri Robinson take a hard look at the degree to which Silicon Valley may have lost its way in age of oligarch. Then the gang dives into the AI browser wars following the launch of new alternative from Open AI before discussing the implications of a lawsuit thay involves how facial recogntion technology is being usā¦
…
continue reading
AI was supposed to make life easier. So why are tech teams more burned out than ever? In this episode of IT Visionaries, host Chris Brandt and guest co-host Lacey Peace unpack the real reasons behind the burnout crisis sweeping through tech and cybersecurity teams in 2025. From the ādo more with lessā culture to the false promise of AI automation, ā¦
…
continue reading
1
Keeping Russian Economy Afloat: Kremlin's Economic High Wire Act
43:52
43:52
Play later
Play later
Lists
Like
Liked
43:52Is Russia close to an economic collapse? Dmitri Alperovitch sits down with Chris Weafer, an expert on the Russian economy, to assess how long the Kremlin can keep this high wire act going. 00:00 Introduction 01:17 Current State of the Russian Economy 10:02 Budget Challenges and Military Spending 19:29 Impact of Oil Prices and Sanctions 30:10 Economā¦
…
continue reading
1
RondoDox Botnet Expansion: The Shotgun Approach to IoT Exploitation
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19Got a question or comment? Message us here! This week on the #SOCBrief, Andrew breaks down RondoDox, a rapidly growing botnet campaign taking aim at routers, DVRs, and IoT devices worldwide. With over 50 vulnerabilities across 30+ vendors, this āshotgunā exploitation strategy is fueling massive DDoS and crypto-mining attacks. Support the show Watchā¦
…
continue reading
1
AI Resumes, LinkedIn & the Cost of Vacancy ā With James Bier | Talk To Th3 Doc Ep. 118
1:00:19
1:00:19
Play later
Play later
Lists
Like
Liked
1:00:19š§ In Episode 118 of Talk To Th3 Doc, host Steve āThe Doctorā Meek sits down with staffing strategist James Bier to tackle one of the biggest challenges facing todayās SMB leaders ā the 42-day hiring drag and the hidden costs that come with it.From AI-generated resumes that blur candidate quality to LinkedIn networking that opens new recruiting pipeā¦
…
continue reading
1
š“ Oct 22ās Top Cyber News NOW! - Ep 989
1:15:49
1:15:49
Play later
Play later
Lists
Like
Liked
1:15:49The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what ā¦
…
continue reading
1
Navigating the Complex World of Cyber Law - Insights from a Pentester-Turned-Lawyer with Pamela
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30In this episode of the Security by Default podcast, host Joe Carson engages with Pamela Victor Ibitamuno, a lawyer with a unique background in penetration testing. They discuss the critical intersection of cyber law and cybersecurity, exploring the challenges faced in prosecuting cyber crimes, the importance of understanding intent, and the need foā¦
…
continue reading
1
Security That Sticks: Shaping Human Behavior - Rinki Sethi, Nicole Jiang - BSW #418
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securiā¦
…
continue reading
1
Security That Sticks: Shaping Human Behavior - Nicole Jiang, Rinki Sethi - BSW #418
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securiā¦
…
continue reading
1
The urgency of scam prevention as a national priority
19:32
19:32
Play later
Play later
Lists
Like
Liked
19:32Inaction is not an option. That is the thesis of United We Stand: A National Strategy to Prevent Scams, a new report from the Aspen Institute. Discussing the reportās recommendations and insights on this edition of the ABA Fraudcast is Kate Griffin, director of Aspenās National Task Force on Fraud and Scam Prevention. āThe very first call to actionā¦
…
continue reading
1
SN 1048: Mic-E-Mouse - AWS Goes Down Hard
2:50:35
2:50:35
Play later
Play later
Lists
Like
Liked
2:50:35Think your mouse is harmless? Steve and Leo uncover how modern optical mice might be secretly "listening" in, and reveal why satellite data pouring down on us is almost entirely unsecured. The long awaited lawsuit to block Texas SB2420. Embattled Texas SB2420 also impacts Google Play. At long last, NIST modernizes their password policy. Scattered Lā¦
…
continue reading
Think your mouse is harmless? Steve and Leo uncover how modern optical mice might be secretly "listening" in, and reveal why satellite data pouring down on us is almost entirely unsecured. The long awaited lawsuit to block Texas SB2420. Embattled Texas SB2420 also impacts Google Play. At long last, NIST modernizes their password policy. Scattered Lā¦
…
continue reading
1
The Afterlife, AWS, ClickFix, Agentic AI, Robot Lumberjacks, Robocalls, Aaran Leyland - SWN #522
37:43
37:43
Play later
Play later
Lists
Like
Liked
37:43The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them!
…
continue reading
1
The Afterlife, AWS, ClickFix, Agentic AI, Robot Lumberjacks, Robocalls, Aaran Leyland - SWN #522
37:43
37:43
Play later
Play later
Lists
Like
Liked
37:43The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn morā¦
…
continue reading
1
104: AI Isnāt Coming for All Jobs⦠Just Yours!
47:51
47:51
Play later
Play later
Lists
Like
Liked
47:51Careerist gives you a proven roadmap, mentorship, and job placement support, everything you need to launch a tech career fast.: https://crst.co/mt06BAI is changing everything, faster than anyone expected. But hereās the real question: Will AI take your job⦠or are we asking the wrong question entirely?In this episode, Daniel Lowrie and I sit down tā¦
…
continue reading
Mike, Mitch, JP Morgenthal and Stephen Foskett, president of the Tech Field Day arm of the Futurum Group, dive into the lessons to be learned from this week's global Amazon Web Services (AWS) cloud outage. Then the gang takes a look at NetApp's evolving data management strategy in the age of artificial intelligence (AI) and how Kubernetes could be ā¦
…
continue reading
1
What Actually Works in OT Vulnerability Management with Dan Cartmill, TXOne Networks
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18In this episode of the Industrial Cybersecurity Insider, host Dino sits down with Dan Cartmill, Sr. Global Product Marketing Director for TXOne Networks, to discuss the often misunderstood world of OT vulnerability management. Dan brings a unique perspective, having started as a practitioner 17 years ago, before transitioning to the vendor side. Thā¦
…
continue reading
1
š“ Oct 21ās Top Cyber News NOW! - Ep 988
1:00:09
1:00:09
Play later
Play later
Lists
Like
Liked
1:00:09The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what ā¦
…
continue reading
1
New Book: SPIES, LIES, AND CYBER CRIME | Former FBI Spy Hunter Eric O'Neill Explains How Cybercriminals Use Espionage techniques to Attack Us | Redefining Society And Technology Podcast With Marco Ciappelli ...
48:16
48:16
Play later
Play later
Lists
Like
Liked
48:16____________Podcast Redefining Society and Technology Podcast With Marco Ciappelli https://redefiningsocietyandtechnologypodcast.com ____________Host Marco Ciappelli Co-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybeā¦
…
continue reading
1
From Fixing Cars to Fueling Leaders: Eric Svedberg's Journey in Entrepreneurship
43:04
43:04
Play later
Play later
Lists
Like
Liked
43:04In episode 42 of The Adaptive Mindset, Brett Gallant interviews Eric Svedberg, an entrepreneur and coach, about his journey from being the youngest Amoco dealer in the U.S. to leading European Autoworks. He shares insights on leadership, marketing, and recruitment, as well as practical strategies for overcoming todayās business challenges. Tune in ā¦
…
continue reading
1
š“ Oct 20ās Top Cyber News NOW! - Ep 987
3:02:04
3:02:04
Play later
Play later
Lists
Like
Liked
3:02:04The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what ā¦
…
continue reading
1
Mastering Integrated ISO Management Systems | Interview with Jim Moran
48:29
48:29
Play later
Play later
Lists
Like
Liked
48:29In this episode of Secure and Simple Podcast, hosted by Dejan Kosutic, we are joined by Jim Moran, founder of Simplify ISO and member of the ISO Committee 280. With over 30 years of experience in consulting and various ISO standards, Jim shares his insights on the High-level Structure (HLS) of ISO management standards and the integration of variousā¦
…
continue reading
1
The Cyber War We Canāt See with Dr. Chase Cunningham, CSO of Demo-Force.com
29:29
29:29
Play later
Play later
Lists
Like
Liked
29:29This episode features Dr. Chase Cunningham, Chief Strategy Officer at Demo-Force.com. Widely known as āDr. Zero Trustā, heās the creator of the Zero Trust Extended Framework and former Forrester principal analyst. With decades of experience supporting the NSA, U.S. Navy, FBI Cyber, and other government missions, Chase brings deep expertise on how nā¦
…
continue reading
1
Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
1:03:39
1:03:39
Play later
Play later
Lists
Like
Liked
1:03:39Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it mā¦
…
continue reading
1
Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
1:03:39
1:03:39
Play later
Play later
Lists
Like
Liked
1:03:39Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it mā¦
…
continue reading