The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Cybersecurity Interviews Podcasts
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Hosted by Meghna Chakrabarti, On Point is a unique, curiosity-driven combination of original reporting, newsmaker interviews, first-person stories, and in-depth analysis, making the world more intelligible and humane. When the world is more complicated than ever, we aim to make sense of it together. On Point is produced by WBUR.
…
continue reading
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
…
continue reading
Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
Welcome to the What’s Next! Podcast. I’ve met so many brilliant people as I traveled the globe and have had some fascinating conversations that I’ve wished had been recorded so I could share them with you - this podcast was a way for me to recreate those moments and let you in on some fantastic insights. My current conversations center around one objective: what's next for companies and individuals as they look to innovate and grow. I hope these conversations inspire you as much as they have ...
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Delivered is your window into the world of amazing digital products, bold business strategies, and innovation in practice. In a world where 95% of digital products fail, we’re on a mission to find out what sets the 5% apart, bringing you insights from change-makers — business owners, company executives, creatives, tech experts, and other brilliant minds. Brought to you by Infinum, a leading digital product agency, and hosted by Chris Bradshaw, Infinum’s product strategy director.
…
continue reading
Bites and Bytes Podcast explores cybersecurity, technology, and beyond in the food industry. Discover the exciting world where cybersecurity, technology, and the food industry converge on the Bites and Bytes Podcast. As one of the few shows focusing on cybersecurity in the food sector, we offer unique insights and groundbreaking discussions. Our interview-style chats and in-depth discussions reveal the challenges and innovations at the intersection of digital defenses, food protection, and s ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Pressing Matters, from Big Valley Marketing, features conversations with the top influencers in B2B Technology. From Fortt Knox to Audible, the (mostly) journalists we interview on this podcast have been there for all of it – and they have thoughts on where things are going. Whether you're interested in humans, chips, cybercrime, or long-necked lutes ... welcome to Pressing Matters, presented by Big Valley Marketing.
…
continue reading
A podcast from the National Association of State Chief Information Officers (NASCIO). Amy Glasscock and Alex Whitaker interview guests (state CIOs, NASCIO members, strategic partners and colleagues) to get their unique stories and perspectives on state information technology, leadership and lessons learned.
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
…
continue reading
We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!
…
continue reading
The CyberGov Podcast is dedicated to providing government contractors with the latest cybersecurity best practices, industry news, and actionable insights. Our mission is to help businesses safeguard their operations, stay informed about emerging threats, and effectively navigate the complexities of providing services to the government. Through expert interviews, in-depth analysis, and practical advice, we aim to build a more secure and resilient government contracting community.”
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
Former Founder, Mike Viscuso, and Former CEO, Patrick Morley, of cybersecurity firm Carbon Black, which sold to VMware in 2019 for $2.1B, help modern business leaders by discussing the most important entrepreneural topics today.
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
A journey through a diverse collection of remarkable communities and movements figuring out how to build power, solidarity, and connection in a world beset by disasters — both natural and human-caused. From hurricanes to wildfires to reactionary politics and more, The Response's audio documentaries and interviews highlight some of the most inspiring stories of response and pave a path towards the better world we know is possible.
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Fraud Boxer is a podcast dedicated to fraud prevention, payments, and cybersecurity professionals and their industry. Jordan Harris hosts conversations, with his co-hosts Cambria Valente on ”Fraud Focus” and Jacqueline Chilton on ”Payments Corner,” on relevant topics for people in the industry and interview guests from merchants and solution providers to provide insights into a constantly evolving technical space!
…
continue reading
The IoT For All Podcast is focused on bringing together the smartest and most creative minds in the Internet of Things (IoT) industry to share their knowledge and experiences with the world. The ultimate goal is to help others succeed and educate the world on the benefits and inner workings of the Internet of Things industry.
…
continue reading
Interesting interviews with innkeepers and lodging experts, aimed to improve the challenging life of the independent innkeeper and lodging professional.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading

1
ISO-as-a-Service and AI: Innovation in Consultancy | Interview with Alexander Jaber
41:00
41:00
Play later
Play later
Lists
Like
Liked
41:00In this episode of the Secure and Simple Podcast, host Dejan Kosutic interviews Alexander Jaber, CEO of Compliant Business Solutions GmbH, a consulting company from Germany. They discuss ISO 27001 as a service, an innovative approach that combines consulting, policy writing, software, and certification into a cohesive package. Alexander shares insi…
…
continue reading
Microsoft issues emergency updates for zero-day SharePoint flaws. Alaska Airlines resumes operations following an IT outage. The UK government reconsiders demands for Apple iCloud backdoors. A French Senate report raises concerns over digital sovereignty. Meta declines to sign the EU’s new voluntary AI code of practice. A new report claims last yea…
…
continue reading

1
Privilege & Peril: The Resilient Law Firm in 2025
30:04
30:04
Play later
Play later
Lists
Like
Liked
30:04Law firms are a "digital bullseye", acting as custodians of clients' "crown jewels" of confidential and strategic information, making them uniquely vulnerable to escalating cyber threats. Attackers are now leveraging AI to launch hyper-realistic attacks at an unprecedented scale, while the human element remains the primary point of failure, leading…
…
continue reading

1
How did being a sports fan get so expensive?
46:03
46:03
Play later
Play later
Lists
Like
Liked
46:03It can cost a fan up to $5,000 a year to follow major sports, between merchandise and game tickets and TV streaming access. Is the pursuit of profit harming sports fans?By WBUR
…
continue reading

1
Resiliency Unleashed. Careers & The Evolving Cyber Landscape. Michael Centrella, U.S. Secret Service
18:59
18:59
Play later
Play later
Lists
Like
Liked
18:59Michael Centrella is the Assistant Director at the U.S. Secret Service. In this episode, he joins host Kris Lovejoy, Global Security and Resilience Practice Leader at Kyndryl to discuss cybersecurity careers and the evolving industry landscape, including how cybercrime methods are changing, the value of information sharing, and more. As the global …
…
continue reading

1
Coffee Is Your Top Supply Chain Risk: A Conversation with Kyle Kelly
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56SOC analysts, detection engineers, and pentesters—you’re not imagining it: software supply chain security is a dumpster fire 🔥. In this episode of Simply Defensive, we sit down with Kyle Kelly, engineering manager at GitHub and author of Crime Hacks, to unpack the chaos. We cover: - Why malicious packages are sneaking past defenders - The truth abo…
…
continue reading

1
Cybercrime Wire For Jul. 21, 2025. Massive Data Breach Revealed By Texas Agency. WCYB Digital Radio.
1:35
1:35
Play later
Play later
Lists
Like
Liked
1:35The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
Talking Cyber. Man Pleads Guilty To Hacking For Promotion. Heather Engel, Strategic Cyber Partners.
4:38
4:38
Play later
Play later
Lists
Like
Liked
4:38GB Hackers has reported that a Kansas City man pleaded guilty to federal charges after admitting he hacked into the computer systems of multiple organizations in an attempt to promote his cybersecurity services. In this episode, host Amanda Glassner is joined by Heather Engel, Managing Partner at Strategic Cyber Partners, to discuss. To learn more …
…
continue reading

1
Cybercrime News For Jul. 21, 2025. FBI Traces 1,610 Bitcoin to Armenian Hacker. WCYB Digital Radio.
2:39
2:39
Play later
Play later
Lists
Like
Liked
2:39The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
Passwords and the Elderly: Why Writing Them Down Might Be OK
19:54
19:54
Play later
Play later
Lists
Like
Liked
19:54In this episode, join hosts Tom Eston, Scott Wright, and Kevin Johnson as they discuss the controversial topic of seniors writing down passwords. They discuss how threat modeling differs for the elderly, the practicality of using password managers, two-factor authentication, and future solutions like passkeys. The conversation includes humorous ane…
…
continue reading

1
Passwords and the Elderly: Why Writing Them Down Might Be OK
19:55
19:55
Play later
Play later
Lists
Like
Liked
19:55In this episode, join hosts Tom Eston, Scott Wright, and Kevin Johnson as they discuss the controversial topic of seniors writing down passwords. They discuss how threat modeling differs for the elderly, the practicality of using password managers, two-factor authentication, and future solutions like passkeys. The conversation includes humorous ane…
…
continue reading

1
The AI Revolution in Human Risk Management: Beyond Compliance
10:19
10:19
Play later
Play later
Lists
Like
Liked
10:19Traditional security awareness training (SAT) has often proven ineffective, with only 15% of participants actually changing their behavior and a significant majority of data breaches, predicted to be 90% in 2024, involving a human element. Artificial intelligence (AI) is fundamentally transforming SAT by enabling personalized learning experiences, …
…
continue reading

1
Anisha Patel: Right along with them. [Program management] [Career Notes]
8:45
8:45
Play later
Play later
Lists
Like
Liked
8:45Please enjoy this encore of Career Notes: Associate Director at Raytheon Intelligence and Space in the Cyber Protection Services Division Anisha Patel always loved math and it defined her career journey. As a first-generation American from an Asian household, Anisha said she was destined for a STEM-focused career and chose electrical engineering. S…
…
continue reading

1
Who Do Hackers Target The Most? Real Truth About Cyber Crime. FBI vs Cyber Crime.
30:09
30:09
Play later
Play later
Lists
Like
Liked
30:09In this episode of Cyber Crime Junkies, host Dean Mauro explores listener question of who do hackers target the most. He explains the real truth about cyber crime, recent examples of Cyber crime This year, Small business cyber attacks, and he evaluates FBI IC3 Report 2025 Send us a text Growth without Interruption. Get peace of mind. Stay Competiti…
…
continue reading

1
You Can Stop Breaches. Exclusive CISO Insight.
58:37
58:37
Play later
Play later
Lists
Like
Liked
58:37Joining us is Matthew Rosenquist, a massively followed thought leader and Top Voice. A renowned CISO, Cybersecurity leader and strategist, we discuss the role of security leadership, cultural differences on data privacy, importance of choosing trustworthy vendors, and how to stop zero day attacks. Send us a text Growth without Interruption. Get pea…
…
continue reading

1
Beyond CSPM: The Cloud Security Evolution
20:22
20:22
Play later
Play later
Lists
Like
Liked
20:22Cloud Security Posture Management (CSPM) is a critical component for continuously monitoring, detecting, and remediating security risks and compliance violations across cloud environments, particularly addressing misconfigurations which account for over 90% of cloud security breaches. While essential for visibility, risk assessment, and compliance …
…
continue reading

1
Creeping like a spider. [Research Saturday]
20:33
20:33
Play later
Play later
Lists
Like
Liked
20:33This week, we are pleased to be joined by George Glass, Associate Managing Director of Kroll's Cyber Risk business, as he is discussing their research on Scattered Spider and their targeting of insurance companies. While Scattered Spider has recently turned its attention to the airline industry, George focuses on the broader trend of the group’…
…
continue reading

1
Existential Dread, MCP, Cloudflare, ESXI, QR Codes, Salt Typhoon, Aaran Leyland... - SWN #495
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42Existential Dread and Seawater, MCP, Cloudflare, ESxi, QR Codes, Salt Typhoon, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-495
…
continue reading
The UK sanctions Russian military intelligence officers tied to GRU cyber units. An AI-powered malware called LameHug targets Windows systems. Google files a lawsuit against the operators of the Badbox 2.0 botnet. A pair of healthcare data breaches impact over 3 million individuals. Researchers report a phishing attack that bypasses FIDO authentica…
…
continue reading

1
Week of Wonder: Can we save the quietest places in the world?
46:40
46:40
Play later
Play later
Lists
Like
Liked
46:40Our planet’s rich nature sounds are disappearing, drowned out by human-made noise. Sound recordist Matt Mikkelsen travels the world, listening to and working to preserve our vanishing soundscapes.By WBUR
…
continue reading

1
CTRL, ALT, HACKED. Gaming Transformed. Artificial Intelligence & The Evolving Workforce.
19:37
19:37
Play later
Play later
Lists
Like
Liked
19:37According to Eurogamer, Candy Crush developer King, which is under the Microsoft umbrella, is reportedly replacing laid off staff with AI tools they helped to build. In this episode, hosts Paul John Spaulding, Kyle Haglund, VP, Audio Engineering at Cybercrime Magazine, and Sam White, Video Producer at Cybercrime Magazine, discuss this news, alongsi…
…
continue reading

1
Next Level CISO. Security Provider Acquisitions. Greg Crowley, CISO, eSentire.
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01Greg Crowley is the CISO at eSentire. In this episode, he joins host Charlie Osborne to discuss security provider acquisitions and what CISOs should consider in these situations. Next Level CISO is a Cybercrime Magazine podcast brought to you by eSentire, the Authority in Managed Detection and Response. eSentire’s mission is to hunt, investigate an…
…
continue reading

1
Quantum Minute. Quantum Accelerator Successfully Installed In Europe. Sponsored by Applied Quantum.
1:41
1:41
Play later
Play later
Lists
Like
Liked
1:41Quantum Brilliance's quantum accelerator has been successfully installed at Fraunhofer IAF, a leading research institution in Germany. This marks the first room-temperature quantum accelerator of its kind in Europe. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Qua…
…
continue reading

1
Cybercrime News For Jul. 18, 2025. Hacktivists Behind EU Infrastructure Hit End. WCYB Digital Radio.
2:17
2:17
Play later
Play later
Lists
Like
Liked
2:17The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
An Incident Response (IR) playbook is a comprehensive, step-by-step guide essential for organizations to proactively mitigate, detect, respond to, and recover from ransomware incidents. It serves as a single source of truth, enabling swift action to limit an incident's impact, save data, time, and money, and accelerate the return to normal business…
…
continue reading
In the security news: The train is leaving the station, or is it? The hypervisor will protect you, maybe The best thing about Flippers are the clones Also, the Flipper Zero as an interrogation tool Threats are commercial and open-source Who is still down with FTP? AI bug hunters Firmware for Russian drones Merging Android and ChromOS Protecting you…
…
continue reading
Pro-Russian Hackers, scam lords, and ransomware gangs face global justice. Louis Vuitton ties customer data breaches to a single cyber incident. The White House is developing a “Zero Trust 2.0” cybersecurity strategy. OVERSTEP malware targets outdated SonicWall Secure Mobile Access (SMA) devices. An Australian political party suffers a massive rans…
…
continue reading
In this conversation, Dr. Chase Cunningham discusses the current state of cybersecurity, focusing on market growth, the workforce gap, the impact of data breaches, and the role of AI. He emphasizes the importance of zero trust architecture and highlights the human factors that contribute to cybersecurity risks. The discussion also covers incident t…
…
continue reading

1
Week of Wonder: Volcanologist Tamsin Mather on her 'adventures in volcanoland'
46:35
46:35
Play later
Play later
Lists
Like
Liked
46:35What's it like standing on the slopes of an active, erupting volcano? Volcanologist Tamsin Mather takes us on her journey to some of the world's biggest volcanoes.By WBUR
…
continue reading
Welcome to the What's Next! Podcast with Tiffani Bova. I'm super excited to welcome Matt Dixon to the show. He is a Founding Partner at DCM Insights, a global training and advisory firm, and a leading expert in business development and client experience. He's a frequent contributor to HBR and an author of bestselling books, including The Effortless…
…
continue reading

1
Cybercrime News For Jul. 17, 2025. Ransomware Gang Hits Belk, Suits Follow. WCYB Digital Radio.
2:34
2:34
Play later
Play later
Lists
Like
Liked
2:34The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
[M365 AI] Copilot & AI Agents: Tips You Must Know
40:59
40:59
Play later
Play later
Lists
Like
Liked
40:59🚨 Is your organisation ready for Microsoft 365 Copilot?👉 Start with the expert-led Threatscape Copilot Readiness Assessment: https://www.threatscape.com/copilot-for-m365-readiness-assessment-datasheet/Microsoft Copilot is evolving fast — but so are the risks.In this deep-dive with Microsoft AI expert Graham Hosking, we explore the real-world implic…
…
continue reading