Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Cybersecurity Fundamentals Podcasts
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
The CompTIA IT Fundamentals+ Audio Course is your step-by-step guide to building a rock-solid foundation in IT, covering hardware, software, networking, databases, and security in a way that’s clear and approachable. Designed for beginners and those looking to prepare for more advanced certifications, each episode turns exam objectives into practical lessons you can follow with confidence. Produced by BareMetalCyber.com, this series gives you the knowledge and momentum to pass the exam and l ...
…
continue reading
This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
…
continue reading
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
…
continue reading
In a world where security threats evolve daily, staying informed isn't just smart—it's essential. Welcome to the security breif, the podcast that cuts through the noise of the security industry. Each episode, we dive deep into the latest articles, trends, and expert insights, breaking down complex topics into clear, actionable advice. From the future of CCTV and AI-powered analytics to the fundamentals of access control and cybersecurity, we use real-world blog posts as our launchpad for dis ...
…
continue reading
This podcast is about the news and events surrounding the tech industry. It will also talk about jobs like but not limited to Cybersecurity, Web Development, and Network Fundamentals.
…
continue reading
The Tech+ Audio Course is your complete, on-demand study companion for mastering the CompTIA Tech+ (FC0-U71) certification exam. Designed for those beginning their journey into information technology, it guides you step by step through every domain and objective of the official exam blueprint. Each episode transforms complex IT concepts into clear, relatable lessons filled with practical examples, definitions, and real-world applications. Whether you’re learning about hardware components, so ...
…
continue reading
The A+ Audio Course is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this Audio Course breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most, helping you understand, retain, and apply essential IT concepts—from hardware and networking to operating systems, security, troubleshooting, and professi ...
…
continue reading
Practical, efficient and fun, The Legal Department podcast delivers the bottom line of what busy in-house attorneys need to know to level up their career. Whether you’re the general counsel or just starting a career in a corporate law department, The Legal Department podcast is the place to get real world advice from leading legal executives, executive coaches, and other thought leaders on how to grow your career and deliver more value to your clients. Through conversations with prominent ge ...
…
continue reading
We bring you manufacturing news, insights, discuss opportunities, and cutting edge technologies. Our goal is to inform, educate, and inspire leaders and workers in manufacturing, automation, and related fields.
…
continue reading
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
…
continue reading
Welcome to Ciphered Reality – your trusted source for cybersecurity tips, tricks, and guidance. Powered by RITC Cybersecurity, this podcast is tailored for individuals and businesses looking to secure their digital assets in an increasingly connected world. We break down complex cybersecurity topics into simple, actionable insights to help you safeguard your data, identity, and online presence. Whether you’re a tech-savvy user or just getting started, Cybphered Reality helps you stay informe ...
…
continue reading
Welcome to Techstrong Unplugged, the go-to podcast for young adults stepping into the immersive world of technology. Brought to you by Techstrong, this series demystifies the tech industry and empowers the next generation. Whether you’re a digital native looking to expand your knowledge or a tech enthusiast eager to explore new trends, Techstrong Unplugged is your bridge to understanding the fundamentals and beyond. In each episode, we’ll dive into the latest in tech, from AI breakthroughs t ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
1
Endpoint Security Threats and Defenses | Cybersecurity Fundamentals Chapter 10
30:43
30:43
Play later
Play later
Lists
Like
Liked
30:43[email protected] In this episode of Technology Tap: CompTIA Study Guide, we delve into endpoint security—a crucial topic for anyone preparing for IT certification exams, especially CompTIA. Traditional firewalls no longer fully protect your network; attackers now exploit endpoints like laptops, phones, printers, and smart devices to breach s…
…
continue reading
1
Cybersecurity Fundamentals: Horaditus Trojan and the New ChatGPT Browser Atlas: The Ciphered Reality Podcast by RITC Cybersecurity
38:01
38:01
Play later
Play later
Lists
Like
Liked
38:01Cybersecurity risks continue to evolve, and this episode focuses on the fundamentals organizations need to establish, along with three important threat updates from the past week. Mike and Mari explain how teams can strengthen internal security practices and implement training that reduces common incidents. NEWS COVERED IN THIS EPISODE 1. Horaditus…
…
continue reading
1
Incident Response and Forensics Essentials | CompTIA Security Exam Prep
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58[email protected] In this episode of Technology Tap: CompTIA Study Guide, we dive deep into incident response, forensics, and monitoring essentials crucial for your tech exam prep. Learn the full incident response lifecycle—preparation, detection, analysis, containment, eradication, recovery, and lessons learned—to develop your IT skills and …
…
continue reading
1
Breaking Into Banks and Bypassing Modern Security with Greg Hatcher and John Stigerwalt
33:31
33:31
Play later
Play later
Lists
Like
Liked
33:31Three banks in four days isn't just a bragging right for penetration testers. It's a wake-up call showing that expensive security tools and alarm systems often fail when tested by skilled operators who understand both human behavior and technical vulnerabilities. Greg Hatcher and John Stigerwalt, co-founders of White Knight Labs, talk about their l…
…
continue reading
1
Help Desk Mastery: IT Support Best Practices & SOPs
28:46
28:46
Play later
Play later
Lists
Like
Liked
28:46[email protected] What if your help desk could solve recurring IT problems in minutes, not hours? In this episode, we explore the backbone of reliable IT support, focusing on clear SOPs that remove guesswork, SLAs that align technical work with business risk, and an effective ticketing flow that transforms scattered fixes into measurable outc…
…
continue reading
1
ACC Replay: The Influential Counsel: Mastering Personal Branding In The Corporate World [E83]
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07In-house legal professionals are more than advisors – they’re strategic leaders. This episode of The Legal Department is a replay of a dynamic discussion about how personal branding and influence can elevate your impact, visibility, and career. Listen to the real-world strategies, lessons learned, and tools for building your brand authentically – b…
…
continue reading
1
Episode 419: Determining Fitness for Service with Keith Leewis
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id= "request-WEB:53f1f067-5698-4ab7-84a8-7f82cb2b4525-1" data-testid= "conversation-turn-4" data-scroll-anchor="true" data-turn= "assistant"> In this episode of the Pipeliners Podcast, Dr. Keith Leewis joins the show for a pr…
…
continue reading
1
Master The Fundamentals, Then Change The System
57:21
57:21
Play later
Play later
Lists
Like
Liked
57:21Send us a text We trace a journey from a teenage online threat to security engineering at global scale, exploring how deep fundamentals and distributed thinking shape reliable defenses. Along the way, we unpack certifications, teaching at scale, and building a practical path for learners worldwide. • curiosity-driven path from fear to purpose • fou…
…
continue reading
1
From Sputnik to Smartphones: A Journey Through Technology Education and IT Skills Development
28:32
28:32
Play later
Play later
Lists
Like
Liked
28:32[email protected] In this episode of Technology Tap: CompTIA Study Guide, we explore the fascinating evolution of technology from the launch of Sputnik in 1957 to the ubiquitous smartphones of today. Discover how early innovations like ARPANET laid the groundwork for the internet, shaping the landscape of technology education and IT skills de…
…
continue reading
2051
Decoding PCI Compliance and How It Protects Consumers Today & Latest Cybersecurity News: The Ciphered Reality Podcast by RITC Cybersecurity
48:05
48:05
Play later
Play later
Lists
Like
Liked
48:05In this episode, Mike and Nikki break down what PCI compliance really means for businesses and why it remains one of the most important guardrails for protecting consumer payment data. They also discuss two active cybersecurity developments: • A Python-based WhatsApp worm spreading the Eternidade Stealer across Brazilian devices • An exploited flaw…
…
continue reading
1
Cloud Security Made Simple: Your CompTIA Security+ Study Guide
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03[email protected] In this episode of Technology Tap: CompTIA Study Guide, we dive deep into cloud security fundamentals, perfect for those preparing for the CompTIA Security+ exam. Join our study group as we explore the shifting security landscape from locked server rooms to identity-based perimeters and data distributed across regions. This …
…
continue reading
1
Defending Your Cyber Systems and Your Mental Attack Surface with Chris Hughes
34:10
34:10
Play later
Play later
Lists
Like
Liked
34:10When your firewall forgets to buckle up, the crash doesn’t happen in the network first, it happens in your blindspots. In this episode, Ron is joined by returning guest Chris Hughes, Co-Founder of Aquia and host of the Resilient Cyber podcast. Chris helps reframe vulnerability work as exposure management, connect technical risk to human resilience,…
…
continue reading
1
Printers, Decoded: Understanding Printer Technology for IT Professionals Chapter 10
32:13
32:13
Play later
Play later
Lists
Like
Liked
32:13[email protected] Printers and multifunction devices are more than just simple office tools—they're intricate systems combining optical, thermal, mechanical, and networked computing components. In this episode, we decode printer technology and its critical role in business operations, highlighting how these devices impact IT skills developmen…
…
continue reading
1
Episode 418: Issues with Old vs. New Pipe with Keith Leewis
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51In this week's episode of the Pipeliners Podcast, Dr. Keith Leewis joins to discuss the differences between old and new steel pipe and why those distinctions matter for pipeline integrity and maintenance practices. The conversation highlights how manufacturing methods, coatings, and metallurgical properties influence how pipeline materials behave o…
…
continue reading
1
Power Without Stealth: Should America Flex In Cyberspace Or Starve Cartels Online
1:13:48
1:13:48
Play later
Play later
Lists
Like
Liked
1:13:48Send us a text We trace Jake’s unlikely route from journalism to the White House, how DEF CON’s Voting Village began, and why imposter syndrome can be a secret advantage when paired with relentless learning. Then we pull apart cyber strategy, Stuxnet’s signal value, and a plan to choke fentanyl through targeted offensive operations against cartels’…
…
continue reading
1
Technology Education: History of Modern Technology - AOL and Early Internet Era
25:40
25:40
Play later
Play later
Lists
Like
Liked
25:40[email protected] Join Professor JRod in this technology education episode exploring the history of modern technology and early internet innovations. Remember the thrill of logging on, the greeting of “You’ve got mail,” and the sense that a whole new world lived behind a phone line? We go back to the moment when America Online turned the inte…
…
continue reading
1
Ep. 236 - How to Deliver Manufacturing Projects That Operations Actually Use
1:31:14
1:31:14
Play later
Play later
Lists
Like
Liked
1:31:14Handing over a project is one of the most underestimated and misunderstood phases in manufacturing and industrial automation. In this episode of Manufacturing Hub, Vlad and Dave sit down to break apart real stories from the field covering MES rollouts, line commissioning, SCADA and ignition development, operational adoption, and the very real conse…
…
continue reading
1
Thriving Beyond Human Labor with Context-Powered AI with Daniel Miessler
29:40
29:40
Play later
Play later
Lists
Like
Liked
29:40The real disruption isn’t AI replacing humans, it’s the shocking possibility that human labor was the economic bubble all along. In this episode, Ron Eddings sits down with Daniel Miessler, founder of Unsupervised Learning and longtime security leader, to break open why companies are hitting record profits with shrinking workforces, and what that m…
…
continue reading
1
Building EDR for AI: Controlling Autonomous Agents Before They Go Rogue with Ron Eddings
19:36
19:36
Play later
Play later
Lists
Like
Liked
19:36AI agents aren't just reacting anymore, they're thinking, learning, and sometimes deleting your entire production database without asking. The real question isn't if your AI agent will be hacked, it's when, and whether you'll have the right hooks in place to stop it before it happens. In this episode, Ron breaks down the ChatGPT Atlas vulnerability…
…
continue reading
1
A+ Fundamentals: Mobile Tech Era | CompTIA Study Guide Chapter 9
29:41
29:41
Play later
Play later
Lists
Like
Liked
29:41[email protected] Learn essential IT skills development for passing your CompTIA exams in mobile tech support. A detailed guide to the mobile era for tech exam prep. Phones aren’t just gadgets anymore—they’re identity, payments, photos, and the keys to work. We take you on a clear, practical tour of the mobile landscape that A+ technicians ne…
…
continue reading
1
Episode 417: Fundamentals of Pipeline Metallurgy with Keith Leewis
48:14
48:14
Play later
Play later
Lists
Like
Liked
48:14This episode of the Pipeliners Podcast features a conversation with metallurgical expert Keith Leewis, who introduces the fundamentals of pipeline metallurgy and explains how steelmaking practices have evolved over time. The discussion explores the key concepts that influence how modern and legacy pipeline steels behave, setting the stage for a mul…
…
continue reading
1
Unlocking Data Protection: Vishnu Varma on Cybersecurity Challenges
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55Send us a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how Bo…
…
continue reading
1
History Of Modern Technology: OLED and Beyond | Technology Education
26:28
26:28
Play later
Play later
Lists
Like
Liked
26:28[email protected] Explore technology education and IT skills development through the history of modern tech, from CRTs to OLED displays. A single glowing dot in a glass tube changed how we understand the world. We follow that spark from Carl Ferdinand Braun’s cathode-ray breakthrough to radar operators reading life-and-death blips, to living …
…
continue reading
1
Tips on Safe Online Shopping | Latest News: The Ciphered Reality Podcast from RITC Cybersecurity
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29🛡️ Welcome to The Ciphered Reality Podcast! In this episode, hosts Mike and Nikki dive into essential tips for safe online shopping and discuss the latest cybersecurity threats you need to know about. In This Episode: 🛒 Safe Online Shopping Tips - Learn how to protect yourself from fake websites, phishing scams, and fraudulent retailers during your…
…
continue reading
1
A+ Fundamentals: Mainframes To Cloud | IT Skills Development Chapter 8
32:25
32:25
Play later
Play later
Lists
Like
Liked
32:25[email protected] Detailed technology education and IT skills development guide covering mainframes to cloud computing for CompTIA prep. One idea rewired computing: what if one machine could convincingly pretend to be many? We start with mainframes and time sharing, then move through hypervisors, virtual machines, and the moment virtualizatio…
…
continue reading
1
Episode 416: Identifying Depth of Cover for Pipelines Crossing Waterways with Pete Weber
38:29
38:29
Play later
Play later
Lists
Like
Liked
38:29On this episode of the Pipeliners Podcast, Pete Weber of DoC Mapping joins Russel Treat to discuss how operators determine depth of cover for pipelines at water crossings and why it matters for integrity and risk management. The conversation explores regulatory expectations, historical and modern inspection practices, and emerging technologies that…
…
continue reading
1
From Sewers To Subsea: Rethinking Data Centers And Defense
52:57
52:57
Play later
Play later
Lists
Like
Liked
52:57Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, …
…
continue reading
1
Robust Cybersecurity Solutions for Your Business: The Ciphered Reality Podcast
40:36
40:36
Play later
Play later
Lists
Like
Liked
40:36🔒 RITC Cybersecurity Podcast | Latest Breach News, Threat Insights & Expert Breakdown (31st Jan 2025) In this episode, Mike and Mari dive into two major cybersecurity stories shaking the industry this week: 🔥 Headlines Covered 1. Schneider Electric Data Breach by Hellcat Ransomware Gang We unpack how the attack unfolded, what it reveals about suppl…
…
continue reading
1
Escape From Meeting Hell: Run Better Meetings With Anita Kishore, Executive Coach [E82]
27:58
27:58
Play later
Play later
Lists
Like
Liked
27:58Former Bain consultant and executive coach Anita Kishore knows how to run a good meeting. When a CEO cancelled a standing meeting with her, Anita learned the hard way that planning ahead and communicating meeting objectives are essential for any meeting. As an executive coach, she helps executives maximize their effectiveness through good meeting h…
…
continue reading
1
Ep. 235 - How to Build and Run a Systems Integration Company in Manufacturing
1:23:16
1:23:16
Play later
Play later
Lists
Like
Liked
1:23:16This episode takes you inside the reality of becoming a systems integrator and growing a technical services business from the ground up. Vlad and Dave share their personal experiences launching and running integration companies, the lessons they learned as engineers moving into business ownership, and the challenges that come with finding customers…
…
continue reading
In this episode of Simply ICS Cyber, Don and Tom welcome Sam Blaney, retired Chief Warrant Officer (CW3) from the Georgia National Guard and current cybersecurity professor at the University of North Georgia. Sam shares insights from his career building and leading Cyber Protection Team 170, his transition into teaching, and his continued work help…
…
continue reading
1
A+ Fundamentals: Network Services Made Simple | IT Skills Development Chapter 7
29:57
29:57
Play later
Play later
Lists
Like
Liked
29:57[email protected] IT skills development in networking essentials made simple; a clear technology education resource for CompTIA exam preparation. The everyday internet feels effortless, but behind every click lives a maze of services quietly doing the heavy lifting. I pull back the curtain on the systems that make your workday possible—file s…
…
continue reading
1
Episode 415: 8th Anniversary with Russel Treat
25:31
25:31
Play later
Play later
Lists
Like
Liked
25:31This anniversary episode of the Pipeliners Podcast features host Russel Treat reflecting on eight years of the show, highlighting its mission of education through conversation and the breadth of technical topics covered. He discusses the evolution of the show, acknowledges key contributors and sponsors, and offers insights into what may be ahead fo…
…
continue reading
1
Inside The Global Push For Offensive Cyber And Smarter Defense
45:32
45:32
Play later
Play later
Lists
Like
Liked
45:32Send us a text We trace how cyber policy tries to catch up with fast-moving threats, from decades-old laws to a new push for offensive capabilities. Along the way, we unpack what real resilience looks like for SMEs, critical infrastructure, and the talent pipeline that holds it all together. • Verona’s route from public policy to cybersecurity • Wh…
…
continue reading
1
Alarm Maintenance Keeps Insurance Valid Prevents Failure
32:55
32:55
Play later
Play later
Lists
Like
Liked
32:55You’ve invested thousands in a state-of-the-art intruder alarm. You see the keypads and sensors every day, so you assume you're protected. But what if that system has a hidden fault? In this critical episode of The Security Brief, we investigate the single most overlooked factor in security: ongoing professional maintenance. We reveal how a "false …
…
continue reading
1
The UK Alarm Rulebook: Securing Police Response After the 2025 Switch-Off
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04In this deep-dive episode of The Security Brief, we are exploring the definitive rulebook for professional intruder alarms in the UK. What is the real difference between a certified, police-responsive system and one that an insurer won't even recognize? The answer lies in a complex web of standards, urgent deadlines, and strict operational rules. T…
…
continue reading
1
IP CCTV systems vs analogue CCTV: Which is better for your business in 2025?
30:53
30:53
Play later
Play later
Lists
Like
Liked
30:53Are you a business owner in 2025 wondering if your security cameras are up to the job? The world of CCTV has split in two: the reliable, old-school Analogue systems versus the smart, high-tech IP network cameras. Sticking with what's cheap and simple might seem smart, but could it be costing you more in the long run? In this episode, we cut through…
…
continue reading
1
Can AI Run Your SOC Better Than You? with Ahmed Achchak
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48What if your security team never missed a single alert and actually had time to think strategically? In this episode, Ahmed Achchak, CEO and Co-Founder of Qevlar AI, reveals how autonomous SOCs are reshaping security operations worldwide. From tackling alert fatigue to empowering analysts with intelligent AI-driven investigations, Ahmed shares the …
…
continue reading
1
Ep. 234 - What Students Learn When They Build Ignition Projects in Seventy Two Hours
30:54
30:54
Play later
Play later
Lists
Like
Liked
30:54In this conversation recorded at the Ignition Community Conference, Vlad, Dave, and their guest David Grussenmeyer from Inductive Automation explore one of the most important and inspiring stories in the world of industrial automation education. David leads the Educational Engagement Program at Inductive Automation and has spent the last several ye…
…
continue reading
1
Episode 414: Growing Electricity Demand is a Pipeline Opportunity with Rob Jennings
35:48
35:48
Play later
Play later
Lists
Like
Liked
35:48In this episode of the Pipeliners Podcast, host Russel Treat talks with Rob Jennings of the American Petroleum Institute about how the rapid growth in electricity demand is creating new opportunities for the natural gas and pipeline industries. The discussion explores the changing dynamics of U.S. power generation, including the resurgence of domes…
…
continue reading
1
The FUTURE of Device Authentication is Here NOW
45:11
45:11
Play later
Play later
Lists
Like
Liked
45:11Send us a text We explore why most breaches are identity failures and how to flip the model with hardware-backed, device-bound credentials that never move. Jason shares global threat trends, startup lessons, and a blueprint for preventing credential theft across people, agents, and machines. • life on the road, burnout signals and recovery • global…
…
continue reading
1
Phishing & Ransomware Prevention | AI Agent Security & Cybersecurity News: The Ciphered Reality Podcast
43:39
43:39
Play later
Play later
Lists
Like
Liked
43:39🎙️ PHISHING & RANSOMWARE PREVENTION | Latest Cybersecurity News & Best Practices In this episode, we dive deep into two rapidly emerging cyber risks impacting businesses across the U.S.: 🔹 AI Agent Security – Whose responsibility is it? With AI adoption exploding across industries, organizations are now facing a new threat landscape. Who is account…
…
continue reading
1
Making Cybersecurity Marketing Creative (and a Little Sexy) with Maria Velasquez
30:04
30:04
Play later
Play later
Lists
Like
Liked
30:04Who said cybersecurity had to be serious? The future of cyber is creative, human, and even a little sexy. In this special 400th episode, Ron Eddings celebrates six incredible years of Hacker Valley Studio with one of cyber’s most creative voices, Maria Velasquez, Co-Founder of the Cybersecurity Marketing Society and Co-Host of Breaking Through in C…
…
continue reading
1
S2 E7: ICS/OT Security Operations Centers
25:56
25:56
Play later
Play later
Lists
Like
Liked
25:56The growing need for visibility and response in industrial environments is driving more organizations to consider ICS/OT Security Operations Centers — but what does that actually look like for small and medium-sized operations? In this episode of Simply ICS Cyber, Don and Tom sit down with Dan Gunter, CEO and founder of Insane Cyber, to discuss how…
…
continue reading
1
Do This Before You Spend $$$ on Legal Tech With Lyndsey Cain Of LegalEng [E79]
35:50
35:50
Play later
Play later
Lists
Like
Liked
35:50Attention all legal operations professionals! This episode is for you. Legal Ops consultant Lyndsey Cain of LegalEng is in The Legal Department to talk about how to make your legal tech implementation a success. From identifying a non-IT leader, knowing your goals, having a comms plan, and an ongoing governance structure, Lyndsey shares that succes…
…
continue reading
[email protected] Ever wonder how your phone grabs an IP address the instant you join Wi‑Fi? We break down the invisible handshake that makes it happen: DORA. From discovery to acknowledgement, we map each step of the DHCP exchange, explain lease timers, and show how networks hand out addresses at scale without stepping on their own toes. Alo…
…
continue reading
1
Episode 413: Stockyards Corrosion Short Course with Andrew Bell, Calae Miller
30:04
30:04
Play later
Play later
Lists
Like
Liked
30:04In this episode of the Pipeliners Podcast, host Russel Treat welcomes Andrew Bell (Explorer Pipeline) and CaLae Miller (CEM Solutions) to discuss the Stockyards Corrosion Short Course, an annual training event in Fort Worth, Texas. The conversation covers the course's origins, its "by technicians, for technicians" philosophy, and the hands-on, real…
…
continue reading
1
Public Vs Private Cybersecurity | Latest Cybersecurity News: The Ciphered Reality Podcast by RITC Cybersecurity
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24Public vs Private Cybersecurity: Who’s doing it better? In this episode of the RITC Cybersecurity Podcast, hosts Mike and Mari dive deep into the evolving cyber battlefield between public institutions and private enterprises. Topics Covered: The Mysterious Elephant APT group infiltrating public sector networks The rise of Qilin Ransomware and its t…
…
continue reading
1
The Future Hides In Plain Sight: Will We See It In Time?
56:20
56:20
Play later
Play later
Lists
Like
Liked
56:20Send us a text We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience. • mapping careers toward emerging security domains • zero trust for satellites and pat…
…
continue reading
1
History of Modern Technology: Cards, Codes, And Courage | Technology Education
25:03
25:03
Play later
Play later
Lists
Like
Liked
25:03[email protected] A census solved with cardboard, a company remade by a $5 billion gamble, and a tiny firmware layer that cracked open the PC market—this is the human story behind how computing became a platform, not a product. We go from Hermann Hollerith’s 1890 insight to IBM’s sales-first system that taught the world to think in fields and…
…
continue reading