In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
Cybersecurity Interviews Podcasts
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
…
continue reading
Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
Welcome to the What’s Next! Podcast. I’ve met so many brilliant people as I traveled the globe and have had some fascinating conversations that I’ve wished had been recorded so I could share them with you - this podcast was a way for me to recreate those moments and let you in on some fantastic insights. My current conversations center around one objective: what's next for companies and individuals as they look to innovate and grow. I hope these conversations inspire you as much as they have ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Pressing Matters, from Big Valley Marketing, features conversations with the top influencers in B2B Technology. From Fortt Knox to Audible, the (mostly) journalists we interview on this podcast have been there for all of it – and they have thoughts on where things are going. Whether you're interested in humans, chips, cybercrime, or long-necked lutes ... welcome to Pressing Matters, presented by Big Valley Marketing.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference.
…
continue reading
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
A daily news program covering the top stories in technology with a weekend in depth interview.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!
…
continue reading
Bites and Bytes Podcast explores cybersecurity, technology, and beyond in the food industry. Discover the exciting world where cybersecurity, technology, and the food industry converge on the Bites and Bytes Podcast. As one of the few shows focusing on cybersecurity in the food sector, we offer unique insights and groundbreaking discussions. Our interview-style chats and in-depth discussions reveal the challenges and innovations at the intersection of digital defenses, food protection, and s ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Where Warlocks Stay Up Late is an interview series dedicated to documenting the history of cybersecurity. Inspired by the seminal book “Where Wizards Stay Up Late: The Origins of the Internet”, this interview series aims to capture the stories, insights, and legacies of the pioneering figures who shaped the field of cybersecurity from its inception to the present day.
…
continue reading
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
…
continue reading
A podcast from the National Association of State Chief Information Officers (NASCIO). Amy Glasscock and Alex Whitaker interview guests (state CIOs, NASCIO members, strategic partners and colleagues) to get their unique stories and perspectives on state information technology, leadership and lessons learned.
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Fraud Boxer is a podcast dedicated to fraud prevention, payments, and cybersecurity professionals and their industry. Jordan Harris hosts conversations, with his co-hosts Cambria Valente on ”Fraud Focus” and Jacqueline Chilton on ”Payments Corner,” on relevant topics for people in the industry and interview guests from merchants and solution providers to provide insights into a constantly evolving technical space!
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Welcome to F for Forensics — the ultimate digital forensic podcast for cybersecurity professionals, investigators, and tech sleuths! Hosted by Ben and Alex, each episode explores the tools, techniques, and real-world cases behind computer forensics, file system analysis, data recovery, incident response, and more. Whether you're into NTFS carving, malware artifacts, or forensic imaging, this is your byte-sized boost of expert insight and geeky banter. Subscribe now for deep dives into digita ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
Interesting interviews with innkeepers and lodging experts, aimed to improve the challenging life of the independent innkeeper and lodging professional.
…
continue reading
Jethro Jones interviews instructional leaders from around the nation to learn and teach what it takes to become a transformative principal. Episodes address topics like Response to Intervention (RTI), Multi-Tiered System of Support (MTSS), Positive Behavior Interventions and Supports (PBIS), the latest advances in educational research, standards-based grading, and interviews with industry leaders like Bill Daggett, Rick Wormeli, Todd Whitaker and even people outside the education like Seth G ...
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
The IoT For All Podcast is focused on bringing together the smartest and most creative minds in the Internet of Things (IoT) industry to share their knowledge and experiences with the world. The ultimate goal is to help others succeed and educate the world on the benefits and inner workings of the Internet of Things industry.
…
continue reading

1
Best Practices for Writing Policies and Procedures | Interview with Carlos Cruz
1:23:00
1:23:00
Play later
Play later
Lists
Like
Liked
1:23:00In this episode of the Secure and Simple Podcast, host Dejan Kosutic interviews Carlos Cruz, founder of Metanoia Consulting in Portugal. They discuss essential best practices for creating and managing policies, procedures, plans, and other documents for compliance with ISO standards and cybersecurity regulations. Carlos shares insights on the disti…
…
continue reading

1
Interview with Evan Reiser: Founder & CEO of Abnormal AI
52:09
52:09
Play later
Play later
Lists
Like
Liked
52:09In this episode of the Cybersecurity Mentors Podcast, John, Steve, and Evan Reiser, Founder & CEO of Abnormal AI, discuss Evan's journey from a gaming enthusiast to a leader in cybersecurity. We explore the evolution of email security, the impact of AI on the industry, and the importance of mentorship and continuous learning. Evan shares valuable l…
…
continue reading

1
Demystifying State Technology Procurement with NASCIO President Amanda Crawford
17:03
17:03
Play later
Play later
Lists
Like
Liked
17:03Amy and Alex are joined by NASICO President and Texas state CIO Amanda Crawford to discuss her president's initiative around state IT procurement and the report that was released last week. NASCIO held a number of listening sessions between state and corporate members to learn about procurement pain points and how to to avoid them. See the report h…
…
continue reading

1
Compliance and GTIA Cybersecurity Trustmark
18:02
18:02
Play later
Play later
Lists
Like
Liked
18:02Getting to compliance... Do you end up with more to do because you have the GTIA Cybersecurity Trustmark Assured? I sit down with Chase Griffin with ShowTech Solutions to talk about their experience and what has transpired since achieving Assured status and how that changed their outlook on improving their compliance to a standard and setting them …
…
continue reading

1
300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet... - SWN #502
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-502
…
continue reading
Hackers leak backend data from the North Korean state-sponsored hacking group Kimsuky. A ransomware attack on a Dutch clinical diagnostics lab exposes medical data of nearly half a million women. One of the world’s largest staffing firms suffers a data breach. Saint Paul, Minnesota, confirms the Interlock ransomware gang was behind a July cyberatta…
…
continue reading

1
Support For Veterans. Finding Jobs & Building Careers. Rich Comitz, American Corporate Partners.
15:31
15:31
Play later
Play later
Lists
Like
Liked
15:31Rich Comitz is the Chief Operating Officer at American Corporate Partners, also known as ACP. ACP is a national nonprofit organization focused on helping returning Veterans and Active-Duty Spouses find their next careers through one-on-one mentoring, networking and online career advice. In this episode, Comitz joins host Paul John Spaulding to disc…
…
continue reading

1
An Identity Crisis: How AI Agents Are Redefining Enterprise Security | with Rishi Bhargava
41:13
41:13
Play later
Play later
Lists
Like
Liked
41:13The cybersecurity landscape just shifted permanently, and most organizations aren't ready. While CISOs struggle with alert fatigue from 40+ security tools, a new threat vector is emerging that makes traditional identity management obsolete: AI agents acting autonomously across enterprise systems. Join Secure Talk host Justin Beals for a critical co…
…
continue reading

1
Modern Ways to Improve Presentation Skills with Nausheen Chen.
50:55
50:55
Play later
Play later
Lists
Like
Liked
50:55Nausheen Chen joins us. She is a wildly popular professional public speaking coach with clients like leaders at Google, Amazon and huge brands like Timberland and more. Check out her site:www.speaking.coach Nausheen has a free course we encourage you to check out! https://www.speaking.coach/free-course/ She shares her insights on modern ways to imp…
…
continue reading

1
Cybercrime Wire For Aug. 12, 2025. Cyberattack Hits Major Russian ISP Filanko. WCYB Digital Radio.
1:18
1:18
Play later
Play later
Lists
Like
Liked
1:18The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
Navigating the Cybersecurity Landscape with Tim Shipp
33:33
33:33
Play later
Play later
Lists
Like
Liked
33:33In this episode of Simply Offensive, Phillip Wylie is joined by Tim Shipp to discuss various aspects of cybersecurity, including the evolution of the field over the past 25 years, the importance of offensive security, and the challenges faced by both red and blue teams. Tim shares his extensive background in cybersecurity, touching on incident resp…
…
continue reading

1
Cybercrime News For Aug. 12, 2025. Columbia Uni. Breach Exposes 900K Records. WCYB Digital Radio.
2:41
2:41
Play later
Play later
Lists
Like
Liked
2:41The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
Africa's Digital Frontier: Navigating Opportunity and Cyber Risk
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33Africa is undergoing a profound digital transformation, driven by its mobile-first connectivity, innovative fintech solutions, and a burgeoning tech startup ecosystem, which together offer unprecedented opportunities for financial inclusion and economic growth across the continent. However, this rapid digitalization is accompanied by significant cy…
…
continue reading

1
DtSR Episode 665 - From Black Hat 2025 with Exhaustion
29:12
29:12
Play later
Play later
Lists
Like
Liked
29:12Send the hosts a message - try it now! TL;DR: This week's show is a testament to surviving a week of Hacker Summer Camp out in Las Vegas. I have an interview with Ray Canzanese, Jr. (again, because y'all love him) and a bit of my take-away / rant from the week I spent out in the desert. Enjoy, I hope you made it home safe and learned something. Goo…
…
continue reading

1
The Future of Supply Chain Security - Janet Worthington - ASW #343
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
…
continue reading

1
China Criticizes NVIDIA, GitHub CEO Resigns, and Siri Delays: Hashtag Trending Tech News
9:26
9:26
Play later
Play later
Lists
Like
Liked
9:26In this episode of Hashtag Trending, host Jim Love covers a variety of significant tech news stories. China criticizes NVIDIA's H20 chips, urging firms to use domestic AI hardware instead, reflecting geopolitical tensions. GitHub's CEO Thomas Dohmke resigns, leading to the platform's integration into Microsoft's core AI division. Linus Torvalds ret…
…
continue reading

1
Ransomware Risk Report. Incident Response Planning. Adam Keown, Global CISO, Eastman.
4:21
4:21
Play later
Play later
Lists
Like
Liked
4:21From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heathe…
…
continue reading
CISA issues an Emergency Directive to urgently patch a critical vulnerability in Microsoft Exchange hybrid configurations. SoupDealer malware proves highly evasive. Google patches a Gemini calendar flaw. A North Korean espionage group pivots to financial crime. Russia’s RomCom exploits a WinRAR zero-day. Researchers turn Linux-based webcams into pe…
…
continue reading

1
Black Hat 2025. BreachLock On Facing Today's Cyber Threats. Seemant Sehgal, Founder & CEO.
6:49
6:49
Play later
Play later
Lists
Like
Liked
6:49Seemant Sehgal is the founder and CEO of BreachLock. In this episode, he joins host Amanda Glassner from Black Hat 2025 in Las Vegas, Nevada, to discuss what the company showcased at this year's conference, as well as the latest on facing today's cyber threat landscape. This episode is brought to you by BreachLock. To learn more about our sponsor, …
…
continue reading

1
Cybercrime Wire For Aug. 11, 2025. Data Breach Hits Major Australian University. WCYB Digital Radio.
1:15
1:15
Play later
Play later
Lists
Like
Liked
1:15The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
Cybercrime News For Aug. 11, 2025. GreedyBear Crypto Theft Hits Industrial Scale WCYB Digital Radio.
2:46
2:46
Play later
Play later
Lists
Like
Liked
2:46The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
F is for Finding Ghosts in RAM – Live Memory Forensics
32:04
32:04
Play later
Play later
Lists
Like
Liked
32:04In this episode we dive into the fast-paced world of live memory forensics. Discover how RAM can reveal active malware, stolen credentials, decrypted messages, and other volatile evidence before it disappears. Learn the tools, techniques, and real-world cases that prove RAM never lies—until you power off. Thank you for listening! Find us on social …
…
continue reading

1
Latin America's Digital Reckoning: Breaches, Vulnerability, and Mexico's New Data Shield
17:17
17:17
Play later
Play later
Lists
Like
Liked
17:17Latin America has become a hotspot for cyber activity, with countries like Chile, Mexico, and Colombia experiencing significant data breaches and ransomware attacks on critical infrastructure. This widespread vulnerability is often fueled by frequently outdated cybersecurity measures, a talent gap, and a pervasive lack of awareness at high levels o…
…
continue reading
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecu…
…
continue reading

1
ESW at BlackHat and the weekly enterprise security news - ESW #419
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
…
continue reading

1
GPT5 Rollout Challenges, AI Copyright Lawsuit, and Tech Billionaires' Doomsday Bunkers
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48In this episode of 'Hashtag Trending,' host Jim Love discusses several key topics in the tech world. OpenAI's GPT5 rollout faced substantial issues, prompting user backlash and the temporary return of GPT-4 for Plus users. Meanwhile, a class action lawsuit by authors against Anthropic could potentially involve up to 7 million plaintiffs over AI cop…
…
continue reading

1
Random Smishing Text Scams: Why “Do I Know You?” Texts Are Dangerous
4:11
4:11
Play later
Play later
Lists
Like
Liked
4:11In this episode, we discuss a rising scam involving random smishing text messages. Learn how these messages work, why they’re effective, and what you can do to protect yourself. Discover the dangers of replying to vague text messages from unknown numbers and get practical tips on how to block and report spam texts. Stay safe by not engaging with th…
…
continue reading

1
Random Smishing Text Scams: Why “Do I Know You?” Texts Are Dangerous
4:12
4:12
Play later
Play later
Lists
Like
Liked
4:12In this episode, we discuss a rising scam involving random smishing text messages. Learn how these messages work, why they're effective, and what you can do to protect yourself. Discover the dangers of replying to vague text messages from unknown numbers and get practical tips on how to block and report spam texts. Stay safe by not engaging with th…
…
continue reading

1
Horror Stories Of When Data Back-ups Fail
56:49
56:49
Play later
Play later
Lists
Like
Liked
56:49Shocking stories from a global leader Gabe Gambill with Quorum covering horror stories of when data back ups fail, saving yourself when data back ups fail, and how to get back data after ransomware. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online …
…
continue reading

1
Ciberseguridad en LATAM: La Región Más Vulnerable y su Batalla por la Resiliencia Digital
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09América Latina se ha convertido en un objetivo principal para los ciberdelincuentes, siendo considerada la región menos preparada globalmente a pesar de su rápida digitalización, lo que ha expuesto a empresas y gobiernos a un aumento exponencial de ciberataques. Exploraremos incidentes críticos como el ataque de ransomware Conti en Costa Rica, las …
…
continue reading

1
Safeguarding the Smart City: Hong Kong's Cyber Resilience in the AI Era
34:52
34:52
Play later
Play later
Lists
Like
Liked
34:52This episode delves into how Hong Kong is bolstering its cybersecurity through landmark legislation like the Protection of Critical Infrastructures (Computer Systems) Bill, which sets strict security protocols and reporting obligations for essential services. We explore the city's extensive collaborative initiatives, from the Cyber Security and Tec…
…
continue reading

1
Building Sustainable Systems in Schools with Patrick Mongrain
33:59
33:59
Play later
Play later
Lists
Like
Liked
33:59In this episode, Jethro Jones welcomes Patrick Mongrain, a middle school teacher, instructional coach, and restorative justice specialist, to discuss building sustainable systems in education. Patrick shares his “Moneyball” approach—leveraging data and analytics to improve classroom instruction and teacher support. He emphasizes the importance of m…
…
continue reading

1
Ed Amoroso: Security shouldn't be the main dish. [Computer Science] [Career Notes]
11:03
11:03
Play later
Play later
Lists
Like
Liked
11:03Please enjoy this encore of Career Notes. Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new ex…
…
continue reading

1
The Digital Panopticon: Your ID, Their Control
16:20
16:20
Play later
Play later
Lists
Like
Liked
16:20This episode uncovers how global digital ID systems, paired with stringent age verification and online surveillance laws, are systematically eroding personal privacy and online anonymity. We delve into the comprehensive collection of biometric and behavioral data, examining how it creates a "digital twin" of every individual and enables cross-borde…
…
continue reading