Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cybersecurity Fundamentals Podcasts

show episodes
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Artwork

1
Simply ICS Cyber

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
  continue reading
 
The CompTIA IT Fundamentals+ Audio Course is your step-by-step guide to building a rock-solid foundation in IT, covering hardware, software, networking, databases, and security in a way that’s clear and approachable. Designed for beginners and those looking to prepare for more advanced certifications, each episode turns exam objectives into practical lessons you can follow with confidence. Produced by BareMetalCyber.com, this series gives you the knowledge and momentum to pass the exam and l ...
  continue reading
 
Artwork
 
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
  continue reading
 
Artwork

51
The Security Brief

Hound Security Systems

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
In a world where security threats evolve daily, staying informed isn't just smart—it's essential. Welcome to the security breif, the podcast that cuts through the noise of the security industry. Each episode, we dive deep into the latest articles, trends, and expert insights, breaking down complex topics into clear, actionable advice. From the future of CCTV and AI-powered analytics to the fundamentals of access control and cybersecurity, we use real-world blog posts as our launchpad for dis ...
  continue reading
 
Artwork

1
Tech Tasty

Megan and Jackson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
This podcast is about the news and events surrounding the tech industry. It will also talk about jobs like but not limited to Cybersecurity, Web Development, and Network Fundamentals.
  continue reading
 
The Tech+ Audio Course is your complete, on-demand study companion for mastering the CompTIA Tech+ (FC0-U71) certification exam. Designed for those beginning their journey into information technology, it guides you step by step through every domain and objective of the official exam blueprint. Each episode transforms complex IT concepts into clear, relatable lessons filled with practical examples, definitions, and real-world applications. Whether you’re learning about hardware components, so ...
  continue reading
 
The A+ Audio Course is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this Audio Course breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most, helping you understand, retain, and apply essential IT concepts—from hardware and networking to operating systems, security, troubleshooting, and professi ...
  continue reading
 
Artwork
 
Practical, efficient and fun, The Legal Department podcast delivers the bottom line of what busy in-house attorneys need to know to level up their career. Whether you’re the general counsel or just starting a career in a corporate law department, The Legal Department podcast is the place to get real world advice from leading legal executives, executive coaches, and other thought leaders on how to grow your career and deliver more value to your clients. Through conversations with prominent ge ...
  continue reading
 
Artwork

1
Manufacturing Hub

Vlad Romanov & Dave Griffith

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We bring you manufacturing news, insights, discuss opportunities, and cutting edge technologies. Our goal is to inform, educate, and inspire leaders and workers in manufacturing, automation, and related fields.
  continue reading
 
Artwork

1
Ahead of the Threat

Federal Bureau of Investigation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
  continue reading
 
Artwork

1
Ciphered Reality

RITC Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to Ciphered Reality – your trusted source for cybersecurity tips, tricks, and guidance. Powered by RITC Cybersecurity, this podcast is tailored for individuals and businesses looking to secure their digital assets in an increasingly connected world. We break down complex cybersecurity topics into simple, actionable insights to help you safeguard your data, identity, and online presence. Whether you’re a tech-savvy user or just getting started, Cybphered Reality helps you stay informe ...
  continue reading
 
Artwork

1
Techstrong Unplugged

Techstrong Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to Techstrong Unplugged, the go-to podcast for young adults stepping into the immersive world of technology. Brought to you by Techstrong, this series demystifies the tech industry and empowers the next generation. Whether you’re a digital native looking to expand your knowledge or a tech enthusiast eager to explore new trends, Techstrong Unplugged is your bridge to understanding the fundamentals and beyond. In each episode, we’ll dive into the latest in tech, from AI breakthroughs t ...
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Loading …
show series
 
[email protected] In this episode of Technology Tap: CompTIA Study Guide, we delve into endpoint security—a crucial topic for anyone preparing for IT certification exams, especially CompTIA. Traditional firewalls no longer fully protect your network; attackers now exploit endpoints like laptops, phones, printers, and smart devices to breach s…
  continue reading
 
Cybersecurity risks continue to evolve, and this episode focuses on the fundamentals organizations need to establish, along with three important threat updates from the past week. Mike and Mari explain how teams can strengthen internal security practices and implement training that reduces common incidents. NEWS COVERED IN THIS EPISODE 1. Horaditus…
  continue reading
 
[email protected] In this episode of Technology Tap: CompTIA Study Guide, we dive deep into incident response, forensics, and monitoring essentials crucial for your tech exam prep. Learn the full incident response lifecycle—preparation, detection, analysis, containment, eradication, recovery, and lessons learned—to develop your IT skills and …
  continue reading
 
Three banks in four days isn't just a bragging right for penetration testers. It's a wake-up call showing that expensive security tools and alarm systems often fail when tested by skilled operators who understand both human behavior and technical vulnerabilities. Greg Hatcher and John Stigerwalt, co-founders of White Knight Labs, talk about their l…
  continue reading
 
[email protected] What if your help desk could solve recurring IT problems in minutes, not hours? In this episode, we explore the backbone of reliable IT support, focusing on clear SOPs that remove guesswork, SLAs that align technical work with business risk, and an effective ticketing flow that transforms scattered fixes into measurable outc…
  continue reading
 
In-house legal professionals are more than advisors – they’re strategic leaders. This episode of The Legal Department is a replay of a dynamic discussion about how personal branding and influence can elevate your impact, visibility, and career. Listen to the real-world strategies, lessons learned, and tools for building your brand authentically – b…
  continue reading
 
*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id= "request-WEB:53f1f067-5698-4ab7-84a8-7f82cb2b4525-1" data-testid= "conversation-turn-4" data-scroll-anchor="true" data-turn= "assistant"> In this episode of the Pipeliners Podcast, Dr. Keith Leewis joins the show for a pr…
  continue reading
 
Send us a text We trace a journey from a teenage online threat to security engineering at global scale, exploring how deep fundamentals and distributed thinking shape reliable defenses. Along the way, we unpack certifications, teaching at scale, and building a practical path for learners worldwide. • curiosity-driven path from fear to purpose • fou…
  continue reading
 
[email protected] In this episode of Technology Tap: CompTIA Study Guide, we explore the fascinating evolution of technology from the launch of Sputnik in 1957 to the ubiquitous smartphones of today. Discover how early innovations like ARPANET laid the groundwork for the internet, shaping the landscape of technology education and IT skills de…
  continue reading
 
In this episode, Mike and Nikki break down what PCI compliance really means for businesses and why it remains one of the most important guardrails for protecting consumer payment data. They also discuss two active cybersecurity developments: • A Python-based WhatsApp worm spreading the Eternidade Stealer across Brazilian devices • An exploited flaw…
  continue reading
 
[email protected] In this episode of Technology Tap: CompTIA Study Guide, we dive deep into cloud security fundamentals, perfect for those preparing for the CompTIA Security+ exam. Join our study group as we explore the shifting security landscape from locked server rooms to identity-based perimeters and data distributed across regions. This …
  continue reading
 
When your firewall forgets to buckle up, the crash doesn’t happen in the network first, it happens in your blindspots. In this episode, Ron is joined by returning guest Chris Hughes, Co-Founder of Aquia and host of the Resilient Cyber podcast. Chris helps reframe vulnerability work as exposure management, connect technical risk to human resilience,…
  continue reading
 
[email protected] Printers and multifunction devices are more than just simple office tools—they're intricate systems combining optical, thermal, mechanical, and networked computing components. In this episode, we decode printer technology and its critical role in business operations, highlighting how these devices impact IT skills developmen…
  continue reading
 
In this week's episode of the Pipeliners Podcast, Dr. Keith Leewis joins to discuss the differences between old and new steel pipe and why those distinctions matter for pipeline integrity and maintenance practices. The conversation highlights how manufacturing methods, coatings, and metallurgical properties influence how pipeline materials behave o…
  continue reading
 
Send us a text We trace Jake’s unlikely route from journalism to the White House, how DEF CON’s Voting Village began, and why imposter syndrome can be a secret advantage when paired with relentless learning. Then we pull apart cyber strategy, Stuxnet’s signal value, and a plan to choke fentanyl through targeted offensive operations against cartels’…
  continue reading
 
[email protected] Join Professor JRod in this technology education episode exploring the history of modern technology and early internet innovations. Remember the thrill of logging on, the greeting of “You’ve got mail,” and the sense that a whole new world lived behind a phone line? We go back to the moment when America Online turned the inte…
  continue reading
 
Handing over a project is one of the most underestimated and misunderstood phases in manufacturing and industrial automation. In this episode of Manufacturing Hub, Vlad and Dave sit down to break apart real stories from the field covering MES rollouts, line commissioning, SCADA and ignition development, operational adoption, and the very real conse…
  continue reading
 
The real disruption isn’t AI replacing humans, it’s the shocking possibility that human labor was the economic bubble all along. In this episode, Ron Eddings sits down with Daniel Miessler, founder of Unsupervised Learning and longtime security leader, to break open why companies are hitting record profits with shrinking workforces, and what that m…
  continue reading
 
AI agents aren't just reacting anymore, they're thinking, learning, and sometimes deleting your entire production database without asking. The real question isn't if your AI agent will be hacked, it's when, and whether you'll have the right hooks in place to stop it before it happens. In this episode, Ron breaks down the ChatGPT Atlas vulnerability…
  continue reading
 
[email protected] Learn essential IT skills development for passing your CompTIA exams in mobile tech support. A detailed guide to the mobile era for tech exam prep. Phones aren’t just gadgets anymore—they’re identity, payments, photos, and the keys to work. We take you on a clear, practical tour of the mobile landscape that A+ technicians ne…
  continue reading
 
This episode of the Pipeliners Podcast features a conversation with metallurgical expert Keith Leewis, who introduces the fundamentals of pipeline metallurgy and explains how steelmaking practices have evolved over time. The discussion explores the key concepts that influence how modern and legacy pipeline steels behave, setting the stage for a mul…
  continue reading
 
Send us a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how Bo…
  continue reading
 
[email protected] Explore technology education and IT skills development through the history of modern tech, from CRTs to OLED displays. A single glowing dot in a glass tube changed how we understand the world. We follow that spark from Carl Ferdinand Braun’s cathode-ray breakthrough to radar operators reading life-and-death blips, to living …
  continue reading
 
🛡️ Welcome to The Ciphered Reality Podcast! In this episode, hosts Mike and Nikki dive into essential tips for safe online shopping and discuss the latest cybersecurity threats you need to know about. In This Episode: 🛒 Safe Online Shopping Tips - Learn how to protect yourself from fake websites, phishing scams, and fraudulent retailers during your…
  continue reading
 
[email protected] Detailed technology education and IT skills development guide covering mainframes to cloud computing for CompTIA prep. One idea rewired computing: what if one machine could convincingly pretend to be many? We start with mainframes and time sharing, then move through hypervisors, virtual machines, and the moment virtualizatio…
  continue reading
 
On this episode of the Pipeliners Podcast, Pete Weber of DoC Mapping joins Russel Treat to discuss how operators determine depth of cover for pipelines at water crossings and why it matters for integrity and risk management. The conversation explores regulatory expectations, historical and modern inspection practices, and emerging technologies that…
  continue reading
 
Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, …
  continue reading
 
🔒 RITC Cybersecurity Podcast | Latest Breach News, Threat Insights & Expert Breakdown (31st Jan 2025) In this episode, Mike and Mari dive into two major cybersecurity stories shaking the industry this week: 🔥 Headlines Covered 1. Schneider Electric Data Breach by Hellcat Ransomware Gang We unpack how the attack unfolded, what it reveals about suppl…
  continue reading
 
Former Bain consultant and executive coach Anita Kishore knows how to run a good meeting. When a CEO cancelled a standing meeting with her, Anita learned the hard way that planning ahead and communicating meeting objectives are essential for any meeting. As an executive coach, she helps executives maximize their effectiveness through good meeting h…
  continue reading
 
This episode takes you inside the reality of becoming a systems integrator and growing a technical services business from the ground up. Vlad and Dave share their personal experiences launching and running integration companies, the lessons they learned as engineers moving into business ownership, and the challenges that come with finding customers…
  continue reading
 
In this episode of Simply ICS Cyber, Don and Tom welcome Sam Blaney, retired Chief Warrant Officer (CW3) from the Georgia National Guard and current cybersecurity professor at the University of North Georgia. Sam shares insights from his career building and leading Cyber Protection Team 170, his transition into teaching, and his continued work help…
  continue reading
 
[email protected] IT skills development in networking essentials made simple; a clear technology education resource for CompTIA exam preparation. The everyday internet feels effortless, but behind every click lives a maze of services quietly doing the heavy lifting. I pull back the curtain on the systems that make your workday possible—file s…
  continue reading
 
This anniversary episode of the Pipeliners Podcast features host Russel Treat reflecting on eight years of the show, highlighting its mission of education through conversation and the breadth of technical topics covered. He discusses the evolution of the show, acknowledges key contributors and sponsors, and offers insights into what may be ahead fo…
  continue reading
 
Send us a text We trace how cyber policy tries to catch up with fast-moving threats, from decades-old laws to a new push for offensive capabilities. Along the way, we unpack what real resilience looks like for SMEs, critical infrastructure, and the talent pipeline that holds it all together. • Verona’s route from public policy to cybersecurity • Wh…
  continue reading
 
You’ve invested thousands in a state-of-the-art intruder alarm. You see the keypads and sensors every day, so you assume you're protected. But what if that system has a hidden fault? In this critical episode of The Security Brief, we investigate the single most overlooked factor in security: ongoing professional maintenance. We reveal how a "false …
  continue reading
 
In this deep-dive episode of The Security Brief, we are exploring the definitive rulebook for professional intruder alarms in the UK. What is the real difference between a certified, police-responsive system and one that an insurer won't even recognize? The answer lies in a complex web of standards, urgent deadlines, and strict operational rules. T…
  continue reading
 
Are you a business owner in 2025 wondering if your security cameras are up to the job? The world of CCTV has split in two: the reliable, old-school Analogue systems versus the smart, high-tech IP network cameras. Sticking with what's cheap and simple might seem smart, but could it be costing you more in the long run? In this episode, we cut through…
  continue reading
 
What if your security team never missed a single alert and actually had time to think strategically? In this episode, Ahmed Achchak, CEO and Co-Founder of Qevlar AI, reveals how autonomous SOCs are reshaping security operations worldwide. From tackling alert fatigue to empowering analysts with intelligent AI-driven investigations, Ahmed shares the …
  continue reading
 
In this conversation recorded at the Ignition Community Conference, Vlad, Dave, and their guest David Grussenmeyer from Inductive Automation explore one of the most important and inspiring stories in the world of industrial automation education. David leads the Educational Engagement Program at Inductive Automation and has spent the last several ye…
  continue reading
 
In this episode of the Pipeliners Podcast, host Russel Treat talks with Rob Jennings of the American Petroleum Institute about how the rapid growth in electricity demand is creating new opportunities for the natural gas and pipeline industries. The discussion explores the changing dynamics of U.S. power generation, including the resurgence of domes…
  continue reading
 
Send us a text We explore why most breaches are identity failures and how to flip the model with hardware-backed, device-bound credentials that never move. Jason shares global threat trends, startup lessons, and a blueprint for preventing credential theft across people, agents, and machines. • life on the road, burnout signals and recovery • global…
  continue reading
 
🎙️ PHISHING & RANSOMWARE PREVENTION | Latest Cybersecurity News & Best Practices In this episode, we dive deep into two rapidly emerging cyber risks impacting businesses across the U.S.: 🔹 AI Agent Security – Whose responsibility is it? With AI adoption exploding across industries, organizations are now facing a new threat landscape. Who is account…
  continue reading
 
Who said cybersecurity had to be serious? The future of cyber is creative, human, and even a little sexy. In this special 400th episode, Ron Eddings celebrates six incredible years of Hacker Valley Studio with one of cyber’s most creative voices, Maria Velasquez, Co-Founder of the Cybersecurity Marketing Society and Co-Host of Breaking Through in C…
  continue reading
 
The growing need for visibility and response in industrial environments is driving more organizations to consider ICS/OT Security Operations Centers — but what does that actually look like for small and medium-sized operations? In this episode of Simply ICS Cyber, Don and Tom sit down with Dan Gunter, CEO and founder of Insane Cyber, to discuss how…
  continue reading
 
Attention all legal operations professionals! This episode is for you. Legal Ops consultant Lyndsey Cain of LegalEng is in The Legal Department to talk about how to make your legal tech implementation a success. From identifying a non-IT leader, knowing your goals, having a comms plan, and an ongoing governance structure, Lyndsey shares that succes…
  continue reading
 
[email protected] Ever wonder how your phone grabs an IP address the instant you join Wi‑Fi? We break down the invisible handshake that makes it happen: DORA. From discovery to acknowledgement, we map each step of the DHCP exchange, explain lease timers, and show how networks hand out addresses at scale without stepping on their own toes. Alo…
  continue reading
 
In this episode of the Pipeliners Podcast, host Russel Treat welcomes Andrew Bell (Explorer Pipeline) and CaLae Miller (CEM Solutions) to discuss the Stockyards Corrosion Short Course, an annual training event in Fort Worth, Texas. The conversation covers the course's origins, its "by technicians, for technicians" philosophy, and the hands-on, real…
  continue reading
 
Public vs Private Cybersecurity: Who’s doing it better? In this episode of the RITC Cybersecurity Podcast, hosts Mike and Mari dive deep into the evolving cyber battlefield between public institutions and private enterprises. Topics Covered: The Mysterious Elephant APT group infiltrating public sector networks The rise of Qilin Ransomware and its t…
  continue reading
 
Send us a text We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience. • mapping careers toward emerging security domains • zero trust for satellites and pat…
  continue reading
 
[email protected] A census solved with cardboard, a company remade by a $5 billion gamble, and a tiny firmware layer that cracked open the PC market—this is the human story behind how computing became a platform, not a product. We go from Hermann Hollerith’s 1890 insight to IBM’s sales-first system that taught the world to think in fields and…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play