Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cybersecurity Fundamentals Podcasts

show episodes
 
The CompTIA IT Fundamentals+ Audio Course is your step-by-step guide to building a rock-solid foundation in IT, covering hardware, software, networking, databases, and security in a way that’s clear and approachable. Designed for beginners and those looking to prepare for more advanced certifications, each episode turns exam objectives into practical lessons you can follow with confidence. Produced by BareMetalCyber.com, this series gives you the knowledge and momentum to pass the exam and l ...
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Artwork
 
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
  continue reading
 
Artwork

1
Simply ICS Cyber

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
  continue reading
 
Ready to earn your AWS Certified Cloud Practitioner credential? Our Audio Course is your ultimate guide to mastering the fundamentals of AWS Cloud, including security, cost management, core services, and cloud economics. Whether you're new to IT or looking to expand your cloud knowledge, this series will help you confidently prepare for the exam and take the next step in your career. Produced by BareMetalCyber.com, your trusted resource for expert-driven cybersecurity education.
  continue reading
 
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
  continue reading
 
Artwork

1
Tech Tasty

Megan and Jackson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
This podcast is about the news and events surrounding the tech industry. It will also talk about jobs like but not limited to Cybersecurity, Web Development, and Network Fundamentals.
  continue reading
 
Artwork

1
Manufacturing Hub

Vlad Romanov & Dave Griffith

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We bring you manufacturing news, insights, discuss opportunities, and cutting edge technologies. Our goal is to inform, educate, and inspire leaders and workers in manufacturing, automation, and related fields.
  continue reading
 
Artwork
 
Practical, efficient and fun, The Legal Department podcast delivers the bottom line of what busy in-house attorneys need to know to level up their career. Whether you’re the general counsel or just starting a career in a corporate law department, The Legal Department podcast is the place to get real world advice from leading legal executives, executive coaches, and other thought leaders on how to grow your career and deliver more value to your clients. Through conversations with prominent ge ...
  continue reading
 
Artwork
 
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
  continue reading
 
Artwork

1
Techstrong Unplugged

Techstrong Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to Techstrong Unplugged, the go-to podcast for young adults stepping into the immersive world of technology. Brought to you by Techstrong, this series demystifies the tech industry and empowers the next generation. Whether you’re a digital native looking to expand your knowledge or a tech enthusiast eager to explore new trends, Techstrong Unplugged is your bridge to understanding the fundamentals and beyond. In each episode, we’ll dive into the latest in tech, from AI breakthroughs t ...
  continue reading
 
Artwork

1
Ahead of the Threat

Federal Bureau of Investigation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
  continue reading
 
If you’re concerned about revenue at your hospital, then The Hospital Finance podcast is your go-to source for information and insights that can help you protect and enhance the revenue your hospital has earned. From regulatory changes to revenue cycle optimization, readmissions to bundled payments, you’ll get important perspectives, news and strategies from leading experts in healthcare finance. For show notes and additional resources from BESLER, visit https://www.besler.com/podcasts
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Loading …
show series
 
[email protected] What’s the weakest link in your world—an old router, a forgotten Windows box, or that “anyone with the link” setting you meant to change? We unpack the real vulnerabilities hiding in small businesses, nonprofits, and home networks, then share a clear playbook to find them early and fix them fast without enterprise budgets. W…
  continue reading
 
Explores various facets of opportunistic networks (OppNets), which are dynamic, infrastructure-less wireless networks leveraging mobile device interactions for data transfer, often via a "store-carry-forward" mechanism. It details different routing protocols, categorizing them by approaches like replication-based (e.g., Epidemic, Spray and Wait), s…
  continue reading
 
We clarify the distinct but coordinated roles of Incident Response (IR) Plans, Disaster Recovery (DR) Plans, and Business Continuity (BC) Plans, which together form a resilient defense system against modern disruptions. This episode details the foundational controls essential for organizational readiness, emphasizing cyber hygiene basics like Multi…
  continue reading
 
Insider threats are not just technical breaches but fundamentally human failures, where employees exploit their legitimate access due to a complex mix of financial stress, revenge, and unmet expectations. This episode explores how personality traits like narcissism and organizational shortcomings create a "Trust Trap," allowing behavioral precursor…
  continue reading
 
Provides an extensive overview of modern cybersecurity strategies, emphasizing the evolving role of the Chief Information Security Officer (CISO) from a technical expert to a strategic business leader. It covers critical aspects such as building a culture of security, managing diverse threat actors (nation-states, cybercriminals, hacktivists, and i…
  continue reading
 
Modern municipalities rely heavily on interconnected IoT devices and sensors to optimize services, creating urban environments that utilize cloud computing and AI for enhanced quality of life. However, this expanded complexity significantly increases the attack surface, making cities attractive targets for cybercriminals executing ransomware and de…
  continue reading
 
When code meets intuition, innovation gets personal. But what happens when we let AI vibe with our ideas? In this episode, Ron Eddings covers the rise of AI-driven development from Vibe Coding, where natural language shapes real code, to the emerging Model Context Protocols (MCPs) that redefine how apps talk to AI. He breaks down the recent Figma M…
  continue reading
 
Serves as an in-depth guide to Secure Access Service Edge (SASE). It explores the evolution of network security from traditional WANs to modern, cloud-centric architectures, emphasizing the need for SASE in today's distributed and dynamic enterprise environments. The source details SASE's foundational components, including SD-WAN, various security …
  continue reading
 
At Automate 2025, Vlad and Dave take Manufacturing Hub inside the Siemens booth to explore how one of the world’s largest industrial technology companies is shaping the future of manufacturing. From the latest S7-1200 G2 PLC to industrial copilots powered by AI, digital twins that simulate entire factories, and virtual PLCs redefining automation, t…
  continue reading
 
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. In this episode, Lead Practitioner Shannon Lane dives into Configuration Management and how audits can keep your systems strong and secure. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission We beli…
  continue reading
 
A field guide for designing, building, and assessing machine learning and AI systems. The book addresses the risks of AI failures, such as algorithmic discrimination and data privacy violations, which have become more common with wider adoption of ML technologies. It outlines a holistic approach to risk mitigation, combining technical practices, bu…
  continue reading
 
The industrial threat landscape never stands still — and neither can defenders. In this episode of Simply ICS Cyber, Don and Tom sit down with Joe Slowik, a globally recognized expert in cyber threat intelligence (CTI), detection engineering, and incident response for ICS, OT, and critical infrastructure environments. With over 15 years of experien…
  continue reading
 
Explores the integration of ITIL (Information Technology Infrastructure Library) principles with DevOps methodologies, offering innovative techniques for their combined application. It provides an in-depth look at ITIL's foundational concepts, including service lifecycle phases like strategy, design, transition, and operation, alongside essential p…
  continue reading
 
[email protected] Ever wish the network would just explain itself? We walk through the real language of connectivity—how links come alive, how packets choose their paths, and how a few core ideas unlock routers, firewalls, addressing, and the exam questions that test them. It starts with the wire (and the air): DSL over copper, cable scaling …
  continue reading
 
In this Office Hours discussion, Stacy Bratcher is joined by Leah Huddleston, Chief Legal Officer/Corporate Secretary at CBIZ, and Candace Jackson, Senior Vice President/General Counsel/Corporate Secretary of Silvaco. They share their journeys from associate general counsel and deputy GC to their current chairs, highlighting the most valuable lesso…
  continue reading
 
An introductory guide to cybersecurity and ethical hacking using Python. It covers fundamental concepts such as network basics, the CIA triad (Confidentiality, Integrity, and Availability), and different types of hackers, including black hat, white hat, and script kiddies. The book outlines the phases and methodologies of hacking, from reconnaissan…
  continue reading
 
We analyze how global Digital ID systems, mandatory age verification laws (like the UK Online Safety Act and Texas SB2420), and anti-encryption pushes (such as EU Chat Control) are converging to form an unprecedented architecture for monitoring human behavior. This convergence is systematically destroying online anonymity by necessitating the colle…
  continue reading
 
[email protected] What if the world’s hard drives merged into one invisible place—and you used it a hundred times today without thinking? We pull back the curtain on cloud storage, tracing its unlikely path from room-sized machines and punch cards to AWS’s game-changing S3, Dropbox’s frictionless sync, and the moment Netflix stopped shipping …
  continue reading
 
The global scam crisis has become an "industrial revolution for fraud," fueled by AI weaponization, deepfakes, and voice cloning that make sophisticated scams nearly indistinguishable from reality, resulting in combined losses across major economies exceeding $70 billion in 2024-2025. We examine how international criminal networks are exploiting in…
  continue reading
 
A comprehensive guide to enhancing network security using open-source tools. It begins by emphasizing the importance of strong password management and multi-factor authentication, before moving into detailed discussions of firewall configuration for network perimeter defense. The text then explores Host Intrusion Detection Systems (HIDS) for server…
  continue reading
 
The modern CISO is facing an aggressive threat landscape driven by the weaponization of AI, leading to hyper-realistic phishing and polymorphic malware, while ransomware remains the top risk (70% of organizations concerned). We dissect the shift in priorities, where operational resilience and business continuity now rank as the number one cybersecu…
  continue reading
 
Explores the multifaceted field of network science, detailing various network types such as social, biological, and technological systems like the Internet and telephone networks. It examines fundamental network properties including paths, connectivity, and the small-world effect, alongside different mathematical representations of networks. The so…
  continue reading
 
The global annual costs associated with cybersecurity are forecasted to reach a staggering 10.5 trillion by the end of 2025. Despite this immense financial backdrop, 80% of Chief Information Security Officers (CISOs) believe they operate with insufficient budgets to ensure robust security measure, contributing to an overwhelming 88% of CISOs functi…
  continue reading
 
Explores various facets of network security and performance, providing practical guidance for hardening systems and optimizing network elements. It covers topics such as client and server security configurations, including detailed steps for Windows and Linux environments, and the benefits of virtualization for disaster recovery and elastic perform…
  continue reading
 
This podcast explores how Iran's strategy of asymmetric warfare hinges on sophisticated state-sponsored groups like APT42 and IRGC-backed hacktivist networks to achieve strategic goals while maintaining plausible deniability. We investigate the operations of digital proxies, including CyberAv3ngers and Handala Hack, as they target U.S. political ca…
  continue reading
 
Modern robotic picking is moving beyond neat rows and perfect lighting conditions. In this Automate 2025 conversation, Vlad and Dave sit down with Kevin Wu from Siemens to explore how Simatic Robot Pick AI Pro is tackling the messy reality of warehouses and factories. They discuss how the new edge architecture with the Simatic IPC BX 59 A and an NV…
  continue reading
 
[email protected] What keeps a business alive when the lights flicker, a server drops, or an ISP blinks? We pull back the curtain on practical resilience—how continuity planning, capacity, and clear runbooks turn chaos into a minor hiccup—then pressure-test the plan with drills, documentation, and ruthless honesty. We start by grounding COOP …
  continue reading
 
The real edge in cybersecurity isn’t found in new tools, it’s built through timeless fundamentals and a mindset that never stops learning. In this episode, Ron sits down with Rich Greene, Senior Solutions Engineer and Instructor at SANS Institute, to uncover how true cyber value starts with skills, curiosity, and mindset. Rich shares his remarkable…
  continue reading
 
An extensive guide to Mastering Tableau, a prominent business intelligence tool, focusing on its advanced features for data analysis and visualization. It covers best practices for visual design, including formatting, color usage, and reducing clutter to create impactful data stories. Readers will learn about data preparation and handling using Tab…
  continue reading
 
Dan Dodson interviews Dr. Bradley Fowler, author of “Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education,” discussing the pressing cybersecurity workforce shortages and the role of education and leadership in addressing risks. Dr. Fowler shares insights from his research, emphasizing human error as a major cau…
  continue reading
 
The Middle East serves as a hotbed of geopolitics, where rivalries—particularly between Iran and the Saudi/UAE axis—have made the cyber realm the vanguard of statecraft. This episode analyzes how nations deploy asymmetric capabilities, ranging from destructive malware like Shamoon and sophisticated state-sponsored espionage operations (such as APT3…
  continue reading
 
Detailing its installation, configuration, and management for various IT infrastructure needs. It covers fundamental concepts like server roles, disk management, networking protocols, and PowerShell cmdlets for administration. The text also thoroughly explores advanced topics such as virtualization with Hyper-V, including virtual disks, networks, a…
  continue reading
 
Show Notes: The Data Use, Retention and Disposal Episode KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. In this episode, Vice President of Privacy Assurance Services, Mark Hinely shares the ins and outs of data use, retention and disposal. Join Our Cybersecurity Mission: https://www.li…
  continue reading
 
[email protected] What if your “all-in-one” router is doing too much—and your Wi‑Fi “speed” isn’t the real bottleneck? We pull back the rack door and trace the digital bloodstream from SOHO setups to enterprise backbones, translating jargon into choices you can actually make. Starting with LANs, WANs, WLANs, and SANs, we map how scope changes…
  continue reading
 
The cybersecurity industry faces a critical global shortage of 3.4 million workers, a deficit compounded by evolving threats, high attrition rates due to burnout, and geopolitical factors such as costly H-1B visa policies. We investigate how major tech hubs like Nama Bengaluru are rising as global capability centers (GCCs) for AI and cybersecurity,…
  continue reading
 
An introduction to Power BI, outlining its use in business intelligence applications. It covers fundamental concepts like data modeling, DAX calculations, and various visualization types such as bar, line, waterfall, scatter, donut, treemap, and map charts. The text also explains how to connect and shape data from diverse sources using Power Query …
  continue reading
 
A practical resource for developing, deploying, and scaling containerized applications. It covers fundamental concepts like containerization versus virtual machines, Kubernetes architecture, and various Azure container services, alongside advanced topics such as serverless Kubernetes, Windows containers, and integrating with Azure DevOps for contin…
  continue reading
 
The foundation of digital security is collapsing as autonomous, AI-driven phishing and deepfakes escalate cyber threats, while the looming quantum threat forces organizations to prepare against the risk of nation-states executing "harvest now, decrypt later" (HNDL) attacks. This episode explores the critical strategic response required in 2026: org…
  continue reading
 
[email protected] A tiny stick changed how we move information—and how attackers move too. We pull back the curtain on the USB flash drive’s quiet takeover: why floppies and CD-Rs failed us, how flash memory and USB converged, and which teams across Singapore, Israel, and China raced to ship the first pocket drive that actually worked. From e…
  continue reading
 
Discuss artificial intelligence and deep learning techniques applied to malware analysis and detection, as well as other cybersecurity challenges. They cover various neural network architectures like MLPs, CNNs, RNNs, LSTMs, and GANs, and their effectiveness in tasks such as classifying malware families, identifying malicious URLs, and detecting an…
  continue reading
 
A comprehensive guide to the security architecture of mobile telecommunications systems, particularly focusing on Long Term Evolution (LTE). It details the evolution of cellular security from analogue systems to 2G (GSM), 3G (UMTS), and the Evolved Packet System (EPS), highlighting common vulnerabilities and subsequent design improvements. The text…
  continue reading
 
What if protecting your digital twin becomes the new cyber hygiene? In this week's episode, Ron welcomes back cybersecurity leader Jason Rebholz, CEO of Evoke, to discuss how AI is reshaping the fundamentals of cyber hygiene. From data breaches and deepfakes to everyday habits that protect our digital lives, Jason shares how small actions and smart…
  continue reading
 
A practical guide to Narrowband Internet of Things (NB-IoT), detailing its underlying cellular communication technologies like 4G and 5G LTE, and its applications in Machine Type Communication (MTC). The text covers Arduino-based projects for developers, showcasing the use of an NB-IoT hardware board with a microcontroller (MCU) and Quectel BG96 mo…
  continue reading
 
ICC 2025 was a clear level up for the Ignition community. In this conversation Vlad and Dave share on the ground insights from a week of packed sessions, vendor showcases, and ProveIt demonstrations that brought working integrations to life. They unpack why the move to a larger venue created more chances for deep technical conversations, how the co…
  continue reading
 
[email protected] Cloud perimeters are fading, identities are multiplying, and threats move faster than patches. We dive into the real mechanics of securing a hybrid world—mapping cloud deployment choices, clarifying shared responsibility across SaaS, PaaS, and IaaS, and showing how Zero Trust reshapes defenses around identity, posture, and c…
  continue reading
 
The impending end-of-life (EOL) for operating systems like Windows 10 creates an immediate and permanent security vulnerability, essentially transforming these unpatched systems into prime targets for sophisticated cyber threats and ransomware attacks. This failure to maintain supported software leads to massive financial liabilities, including pot…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play