A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael āRooā Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Cybersecurity Tips Podcasts
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
Itās a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
In this episode, Tyler and Bob break down cybersecurity in a fun, human wayāno tech jargon overload, just real tips and tricks to keep your business safe. From password tricks and phishing scams to the importance of backups and cloud security, they share easy-to-follow advice with plenty of humour and relatable insights. If youāve ever ignored an update or used āpassword123,ā this oneās for you. Tune in, laugh a little, and learn how to become a cybersecurity rockstar!
…
continue reading
CyberSound⢠is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrowās Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating todayās evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain whatās going on and why it matters. But this isnāt just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. Youāll get practical tips, real-world ...
…
continue reading
SipCyber: Where Great Coffee Meets Essential Cybersecurity What happens when a former special education teacher turned Minnesota State Cybersecurity Coordinator sits down with a perfect cup of coffee? You get cybersecurity advice that's actually approachable. Jen Lotze from IT Audit Labs brings you SipCyber ā the podcast that pairs cozy coffee shop discoveries with decaffeinated cybersecurity tips. No jargon. No fear-mongering. Just practical ways to protect yourself, your family, and your o ...
…
continue reading
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
…
continue reading
Welcome to Treasury Talk, a podcast for Michigan taxpayers hosted by State Treasurer, Rachael Eubanks. Our trending topics with Subject Matter Experts will include cybersecurity, tax prep tips, education savings plans, the budget and our economy, and leadership best practices. Listen for take-aways that will support you, your family and your business!
…
continue reading
This is your guide to navigating the ever-evolving world of cybersecurity. Hosted by Annie-Mei Forster and Anika Guenov, this podcast breaks down complex topics into relatable, easy-to-understand conversations. Whether you're a tech enthusiast, a curious newcomer, or a professional looking for fresh perspectives, join us as we explore cyber threats, digital safety tips, and the human stories behind the screen. Follow us on Instagram @thecybersecuritygals
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
This podcast is for lawyers who want more freedom, flexibility, and control over their practice. Ernie focuses on the 20% of tools and strategiesāespecially AIāthat deliver 80% of the results. No buzzwords. No hype. Just clear, practical insights on using AI, automation, outsourcing, marketing, cybersecurity, and smart systems to reduce friction, streamline workflows, and run your practice your wayāfrom anywhere.
…
continue reading
Welcome to The Defender's Journal (our next step up from The Tech Stack), where we delve into the lives and minds of leading professionals in the cybersecurity space. Discover their unique stories, motivations, perspectives on the industry, and tips for long-term success! *Interested in joining us on the show? Please connect with Cameron Wenham or Jeff Harrod!
…
continue reading
A weekly podcast with cybersecurity and physical security tips for the logistics community and security professionals. Hosted by a retired FBI Special Agent and former UK Intelligence Community member. Give a listen, tell a friend.
…
continue reading
You already know the monthly OUCH! Newsletter brings you the latest cybersecurity tipsābut now, weāre taking it even further. Tune in to the new OUCH! Podcast, where we go deeper on cybersecurity topics and give you extra insights to stay ahead of the threats.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
An instructional technology podcast featuring all the ed tech happenings in the Redlands Unified School District, with a side of chips and salsa.
…
continue reading
If you are looking for the latest stock tip, look elsewhere. Here, you'll find sound strategies based on financial principles that apply to your life. This isn't about financial jargon. This is about you. So listen, learn and ask questions of your own. After all, it's your money.
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
This is the podcast to discuss how to Get a Job in Tech, interview stories and advice. always awesome Get a Job in Tech Interview and job search strategies that work https://getajobinit.teachable.com/ https://garymcneelyit.com/ https://x.com/garymcneelyIT Interview and job search strategies that work Book by Gary McNeely Link: http://a.co/fxrPYIH
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Welcome to The Pulse On Cyber ā your quick, clear, and powerful source for staying safe in todayās digital world. Hosted by CJ James, cybersecurity specialist and founder of CJ Network Systems, this podcast delivers fast, actionable cybersecurity tips in under two minutes. Each episode gives everyday consumers and small-to-medium businesses simple, real-world ways to protect themselves from the newest threats, scams, and digital risks. From phishing and password breaches to mobile scams and ...
…
continue reading
We cover diabetes technology, news, research, and management tips through expert interviews and people with diabetes who use the tech. We cover all the insulin pump and continuous glucose monitor (CGM) updates, patient stories and news from every diabetes conference.
…
continue reading
…
continue reading
Techtonic is the podcast that's all about groundbreaking progress in your tech job search. Whether you're a tech professional on the hunt for your next big opportunity or a team leader looking for expert insights on navigating the tech hiring market, this is the place for you. Every episode, we bring you real stories, struggles, resume hacks, professional branding, and success tips directly from those in the trenches and top hiring managers.
…
continue reading
Welcome to TiPS: Today in Public Safety! Stay informed. Stay prepared. Stay connected. TiPS: Today in Public Safety delivers the latest insights in Next Generation 911 (NG911) and public safety technology, helping you navigate the innovations transforming emergency response. Hosted by Mark J. Fletcher, ENP (āFletchā), a leading expert with 14 U.S. patents, each episode dives into real-world trends in NG911 implementation, interoperability, cybersecurity, and emergency communications strategy ...
…
continue reading
Welcome to the Passwork Cybersecurity Webinars ā a space for insightful conversations on digital security and the latest trends in the world of cybersecurity. Each episode, we bring together industry experts, thought leaders, and practitioners to share real-world stories, practical tips, and deep dives into the challenges and innovations shaping our digital lives. Join us as we unravel the complexities of cybersecurity and empower you to protect what matters most.
…
continue reading
1
KeyStoneās Stock Talk ā Canadian & US Small-Cap Growth & Dividend Stocks, Tips & Portfolio Building Strategies
Stock Talk Podcast by KeyStone Financial
Hosted by Ryan Irvine, Brennan Habetler, and Brett Rodway - the podcast is highly interactive taking listener questions each week on individual Canadian & U.S. stocks as well as stock portfolio building strategies. The podcast focuses on high quality Canadian Dividend growth stocks, unknown & profitable Canadian Small-Cap stocks, U.S. tech leaders and high growth small-cap stocks. We also provide simple portfolio building tips for DIY investors. Weekly show highlights include: - Case For & A ...
…
continue reading
Weekly Information Security News. Stay up to date on whatās going on in the InfoSec world in about 40 minutes. Join us for InfoSec news and stay for some friendly banter, guest interviews, gadget reviews, tech interview tips, and hilarious dad jokes! New episodes every Monday.
…
continue reading
A teacher podcast for busy educatorsāabout 10 minutes, every week. Stay current on artificial intelligence in education (plain English), edtech, and what matters in the classroom: culture, instruction, assessment, digital health and wellness, and more. Simple ideas you can use right away. Hosted by AP Computer Science teacher Vicki Davis (Cool Cat Teacher)āauthor and longtime edtech bloggerāthis teaching podcast features best-selling teachers, researchers, and in-the-classroom administrators ...
…
continue reading
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
…
continue reading
Cybersecurity career, technology, and success tips.
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
The Smart Communications Podcast helps busy nonprofit leaders build their communications skills and develop their organizationās voice. Every episode shares insights and practical tips to help you leverage strategic communications to advance your nonprofitās mission.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
"The Digital Revolution with Jim Kunkle", is an engaging podcast that delves into the dynamic world of digital transformation. Hosted by Jim Kunkle, this show explores how businesses, industries, and individuals are navigating the ever evolving landscape of technology. On this series, Jim covers: Strategies for Digital Transformation: Learn practical approaches to adopting digital technologies, optimizing processes, and staying competitive. Real-Life Case Studies: Dive into inspiring success ...
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
Cyber Snacks, by Buckingham, is a podcast dedicated to providing useful data privacy and cybersecurity tips in bite-sized pieces. The goal is to keep each episode short, simple, actionable, and reasonable.
…
continue reading
Cybersecurity, Startups & Artificial Intelligence... but fun. Welcome to a place where hacking meets humor, AI meets absurdity, and your online safety might just be saved by a bad meme. We live in a world where your fridge can spy on you, your toaster has a firmware update, and a Nigerian prince still wants your money ā but now through ChatGPT. Itās wild out there. This podcast arms you with the knowledge to survive and thrive in todayās tech jungle. Youāll get practical tips, real-world sto ...
…
continue reading
1
š Cybersecurity Unmasked š EP 27: North York Nonprofit Averts Data Breach Through Awareness
15:43
15:43
Play later
Play later
Lists
Like
Liked
15:43One click. One password. That's all it took to put an entire North York nonprofit minutes away from disaster. In this episode of Cybersecurity Unmasked, we share a real case study from our own clientsāhow a single moment of awareness stopped what could have been a catastrophic $200K+ data breach. This phishing attack wasn't some poorly written scamā¦
…
continue reading
1
How to Optimize Your CGM Alerts and Settings - ODT
1:00:49
1:00:49
Play later
Play later
Lists
Like
Liked
1:00:49On our new show Optimizing Diabetes Tech (ODT) my co-host Gary Scheiner CDCES and I discuss how people with diabetes can take full advantage of their continuous glucose monitors to make managing Diabetes easier and safer. We get into how to react to alarms, adjust settings, and the features you need to know about. We also answer your questions abouā¦
…
continue reading
1
The Hallucination Trap: Cutting Through AI Vendor Hype and Red Flags
14:40
14:40
Play later
Play later
Lists
Like
Liked
14:40The cybersecurity market is saturated with "AI washing," forcing CISOs to rigorously vet vendors promising "autonomous" capabilities that often lack genuine intelligence. This episode provides a battle-tested framework for demanding proof over promises, revealing critical technical red flags like claims of zero hallucinations or a lack of essentialā¦
…
continue reading
1
Cloud Modernization as the Foundation for AI
12:16
12:16
Play later
Play later
Lists
Like
Liked
12:16Send us a text When we talk about artificial intelligence transforming industries, we often focus on the algorithms, the models, and the breakthroughs in generative AI. But hereās the reality: AI cannot thrive without modernized cloud infrastructure. The cloud is the bedrock that makes AI scalable, secure, and accessible. Letās ground this episode ā¦
…
continue reading
1
Cartels, Fake Updates and One Big Budget Oops
43:52
43:52
Play later
Play later
Lists
Like
Liked
43:52š¢ Subscribe on your favourite platforms and visit https://linktr.ee/riskycreative for more of ā The Awareness Angle. š¢ This Week on The Awareness Angle A council incident affecting thousands of residents, emergency alerts taken offline, a vishing breach at Harvard, fake Windows updates, AI voice scam stories, and an industrial scale Black Friday camā¦
…
continue reading
1
So You Want to Be a CISO? With vCISO and Security Justice Alum Chris Clymer
31:09
31:09
Play later
Play later
Lists
Like
Liked
31:09In this special episode of the Shared Security Podcast, host Tom Eston reunites with former co-host and experienced fractional CISO, Chris Clymer. They reminisce about their early podcasting days and discuss the evolving role of a Chief Information Security Officer (CISO). The conversation covers the responsibilities, challenges, and skills requireā¦
…
continue reading
1
When the Cloud Falls: The Systemic Fragility of Modern Infrastructure
31:56
31:56
Play later
Play later
Lists
Like
Liked
31:56This episode explores the alarming trend of catastrophic, back-to-back outages in late 2025, including the AWS DNS failure, Microsoftās Azure Front Door configuration cascade, and the Cloudflare collapse, all caused by configuration errors in highly concentrated edge services. We analyze how a single error in one cloud region can create a dependencā¦
…
continue reading
1
Biorobotics & Neuralink: How Tech Is Rewiring the Human Body
9:30
9:30
Play later
Play later
Lists
Like
Liked
9:30In this episode of Darnleyās Cyber CafĆ©, we dive into the fascinating, and slightly unsettling, world of biorobotics, where human biology meets advanced robotics and neural technology. From groundbreaking innovations like Neuralink, next-gen prosthetics, and brain-computer interfaces, to the hidden cybersecurity risks of merging technology directlyā¦
…
continue reading
1
The Digital Lockdown: Australia's Teenagers Take the High Court
15:31
15:31
Play later
Play later
Lists
Like
Liked
15:31Australia is implementing the world's first nationwide age restrictionācommonly called a "ban"āon social media access for users under 16, with full enforcement beginning on December 10, 2025. This controversial law is facing a constitutional challenge in the High Court, led by teenagers who argue the restriction violates the implied freedom of poliā¦
…
continue reading
1
TiPS Episode 25 1128 - SBC Configuration Fiascos
9:19
9:19
Play later
Play later
Lists
Like
Liked
9:19Todayās episode digs into the scariest cybersecurity threat in NG911⦠the one sitting INSIDE your network. Session Border Controllers and Firewalls keep your ESInet safe ā until they donāt. And too often, the biggest disruptions to 9-1-1 call delivery come not from nation-state attackers or ransomware groups, but from misconfigured security rules dā¦
…
continue reading
1
The Dark Pattern Paradox: AI, Phishing, and the Convenience Trap
36:38
36:38
Play later
Play later
Lists
Like
Liked
36:38The cybersecurity landscape continues to evolve, demonstrating worrying trends as rapidly advancing Generative AI capabilities enable sophisticated attacker tactics, making phishing attempts much more targeted and customized. This episode explores how pervasive digital dark patterns leverage consumer cognitive biases, tricking users into sharing peā¦
…
continue reading
1
Ep. 196 CrowdStrike's Insider Threat Problem, $140k Student Loan Debt, and Phishing Attacks
2:20:48
2:20:48
Play later
Play later
Lists
Like
Liked
2:20:48Get into cybersecurity here : https://app.techtualconsulting.tech/bundles/57 ------------------------------------------------------------------------------------ In this episode of The TechTual Talk, HD and CyberShortieee dive into cybersecurity news and insights, focusing on topics like phishing attacks, the risks of legacy systems, insider threatā¦
…
continue reading
1
We Tested ACI Learningās Security+ Bundle ā Hereās What We Found
36:57
36:57
Play later
Play later
Lists
Like
Liked
36:57In this episode of the Cyber Security Mentals podcast, hosts Steve and John delve into effective strategies for studying cybersecurity. They discuss the importance of structured learning, hands-on labs, and consistent practice, while exploring the challenges of self-paced learning. The episode highlights the benefits of programs like ACI Learning aā¦
…
continue reading
1
ACR and Alexa: The Mandatory Surveillance of the Modern Smart Home
40:33
40:33
Play later
Play later
Lists
Like
Liked
40:33Smart devices like Amazon's Alexa and modern smart TVs are perpetually monitoring domestic life, utilizing technologies such as Automatic Content Recognition (ACR) to harvest viewing habits and inadvertently recording private conversations through frequent, long-duration misactivations. These recorded interactions are sent to the cloud for trainingā¦
…
continue reading
1
CCT 301: CISSP Questions Deep Dive - Zero Trust
26:07
26:07
Play later
Play later
Lists
Like
Liked
26:07Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Zero trust isnāt a checkbox or a buzzword; itās a mindset shift that chanā¦
…
continue reading
1
318: AI is a consensus machine (and here's why that's good for some lawyers)
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01Show Notes In this episode, Ernie discusses the impact of AI on the legal profession, emphasizing that while AI may replace surface-level tasks, the best lawyers will thrive by focusing on deeper, strategic thinking and understanding complex legal outcomes. Takeaways The best lawyers won't just survive this wave of AI. They're gonna dominate. If yoā¦
…
continue reading
ā95% Certain⦠BUT 100% Wrong: The Confidence Score Problemā What if your mapping screen showed a 95% confidence location for a 9-1-1 caller⦠ā¦but the caller wasnāt actually in that building⦠or on that block⦠or even on the right floor? Welcome to todayās episode of TiPS: Today in Public Safety, where we dig into the surprisingly misunderstood realā¦
…
continue reading
1
Deepfakes, Donations, and Deception: The Psychology of the Cyber Con
40:50
40:50
Play later
Play later
Lists
Like
Liked
40:50Threat actors are exploiting human psychology using sophisticated techniques like AI-powered deepfakes and emotional manipulation to bypass traditional security defenses. This episode explores how nonprofits and consumer organizations are increasingly targeted by highly effective scams, including CEO impersonation fraud, Business Email Compromise (ā¦
…
continue reading
1
AI Safety 101: Manipulation, Hallucinations & Defense
3:58
3:58
Play later
Play later
Lists
Like
Liked
3:58The tools we trust most can deceive us fastest. In this episode of SipCyber, Jen Lotze brings insights straight from Wild West Hackin' Festāone of the premier ethical hacking conferencesāto Wabasha Brewing in St. Paul, MN. Fresh off an AI cybersecurity course, Jen breaks down two critical vulnerabilities in the AI tools millions of us use daily: maā¦
…
continue reading
Send us a text AIās energy appetite is already staggering, and projections suggest it could reshape global electricity demand within the next decade. Data centers consumed less than 300 terawatt-hours of electricity in 2020, but forecasts from the International Energy Agency indicate this could surge to nearly 1,000 terawatt-hours by 2028, more thaā¦
…
continue reading
1
The Bad Apple Latte: How One Insider Nearly Brewed a Cyber Disaster
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17In this episode of Darnleyās Cyber CafĆ©, we dive into the real story behind CrowdStrikeās recent insider scandal, and what it teaches us about the hidden dangers brewing inside modern companies. We break down how a ābad appleā employee allegedly leaked internal information to a notorious hacking collective, why insider threats are so hard to detectā¦
…
continue reading
1
Black Friday 2025: Tech, Coffee, and Cables (EP 945)
1:02:52
1:02:52
Play later
Play later
Lists
Like
Liked
1:02:52Looking for real-world tech, home, and office upgrades for Black Friday? Marv and Dawn spotlight Roborock robot mops, Plaud AI transcription, Keds conference shoes, active noise-canceling headphones, desk and chair splurges, and smart Christmas lights that daisy-chain cleanly. They wrap it all in an MSP-friendly conversation about IT Nation, podcasā¦
…
continue reading
1
The Accidental Leak: Why You're the Biggest Threat to Your Own Data
29:01
29:01
Play later
Play later
Lists
Like
Liked
29:01We dive into the most financially devastating threats of 2025, revealing how ransomware, which accounted for 76% of incurred losses in one portfolio, and vendor breaches continue to drive significant financial damage. The discussion explores how AI is turbocharging social engineering and credential stuffing (which caused a 250% increase in Account ā¦
…
continue reading
1
Risky Business #816 -- Copilot Actions for Windows is extremely dicey
58:07
58:07
Play later
Play later
Lists
Like
Liked
58:07In this weekās show Patrick Gray and Adam Boileau discuss the weekās cybersecurity news, including: Salesforce partner Gainsight has customer data stolen Crowdstrike fires insider who gave hackers screenshots of internal systems Australian Parliament turns off wifi and bluetooth in fear of of visiting Chinese bigwigs Shai-Hulud npm/Github worm is bā¦
…
continue reading
In this Week's Show: NEO Performance Materials (NEO:TSX) Breaks Momentum ā Hereās What Happened Meet Greg Abel: The Canadian Taking Over Berkshire Hathaway Constellation Software (CSU:TSX) Drops 30% ā Opportunity or Warning Sign?By Stock Talk Podcast by KeyStone Financial
…
continue reading
1
Leadership, Tax Policy, and National Impact: A Conversation with Chief Deputy Treasurer Lance Wilkinson
23:50
23:50
Play later
Play later
Lists
Like
Liked
23:50What do billion-dollar road funding shifts, a new marihuana tax, and leadership in national tax policy have in common? Michiganās Treasury is at the center of it all. In this episode, we meet Chief Deputy Treasurer Lance Wilkinson and hear about his path into public service and tax policy. He shares insights into the role of the Chief Deputy Treasuā¦
…
continue reading
This week on WELSTech we take a deep dive into Googleās NotebookLM. Discover how this AI tool uses only your uploaded documents to create everything from video and audio overviews, flashcards, and summary documents, plus learn about other innovative AI tools like Hume Voice AI and the Plaud audio recorder that are changing the way [ā¦]ā¦
…
continue reading
1
Avoid Black Friday scams and shop safely online with Simon Miller | BLACK FRIDAY HOLIDAY SCAMS
1:03:47
1:03:47
Play later
Play later
Lists
Like
Liked
1:03:47Black Friday season is upon us! šļø This week, weāre joined by Simon Miller from Cifas, the UKās leading fraud prevention service, to unpack the latest online scams. He shares essential tips to help you stay safe online and protect your hard-earned cash while shopping online this holiday season. š³š In Watchtower Weekly, we dive into why weak passworā¦
…
continue reading
The conversation dives into the theme of corporate accountability, exploring why companies often escape consequences for their actions and the importance of learning from mistakes. It draws parallels between corporate behavior and child behavior correction, emphasizing the need for early intervention to prevent more serious issues later on.Articlesā¦
…
continue reading
1
Why Architect for Human Error When We Can Make People Feel Really Bad About It?
39:23
39:23
Play later
Play later
Lists
Like
Liked
39:23All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is Richard Rushing, CISO, Motorola Mobility. In this episode Mindset over tools When hygiene becomes risk Systems for actual humans Conversations over compliance Huge thanā¦
…
continue reading
This podcast dissects adversary tactics, techniques, and procedures (TTPs), focusing on how attackers leverage social engineering and human psychological weaknesses like fear and trust to gain unauthorized access. We explore the proactive strategies of Red Teaming and Breach and Attack Simulation (BAS), which use the MITRE ATT&CK framework to emulaā¦
…
continue reading
1
Ep. 25 Chris Mielczarski ā Networking for Introverts: Chris Mielczarski on Bravery, Vulnerability & Career Connections
34:37
34:37
Play later
Play later
Lists
Like
Liked
34:37In this episode of Techtonic, we explore one of the biggest challenges tech professionals face today: networking when you're an introvert. I'm joined by Senior Salesforce Developer and community builder, Chris Mielczarski. Chris brings a refreshingly human perspective to the art of connecting with others in the tech ecosystem. Together, we break doā¦
…
continue reading
Bruce Helmer and Peg Webb share tips to help keep holiday spending from derailing your finances this holiday season.
…
continue reading
1
TiPS Episode 25 1124 - Turkey Day Testing for NG911
8:29
8:29
Play later
Play later
Lists
Like
Liked
8:29In todayās TiPS episode, Fletch explains the annual holiday disaster affectionately called The NG911 Turkey Test ā the Thanksgiving surge that reveals every weakness in our public safety networks. We discuss why Thanksgiving consistently generates the strangest call traffic of the year, what really fails during surge conditions, and how NG911 netwoā¦
…
continue reading
1
Is Your Pump Secure? A Cybersecurity Expert Breaks It Down
44:44
44:44
Play later
Play later
Lists
Like
Liked
44:44I sit down with Josiah Dykstraāa cybersecurity expert who spent nearly two decades at the NSA and has lived with type 1 diabetes for over 30 yearsāto explore what diabetes management looks like inside some of the most locked-down buildings in the world. We talk about what happens when your phone, smartwatch, and even certain medical devices are banā¦
…
continue reading
1
CCT 300: Failing Securely, Simply, Separation of Duties, KISS and Zero Trust (CISSP)
44:36
44:36
Play later
Play later
Lists
Like
Liked
44:36Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Security programs fail when they try to do everything at once. We walk thā¦
…
continue reading
1
CISAās OT Cybersecurity: Asset Inventory Essentials
15:07
15:07
Play later
Play later
Lists
Like
Liked
15:07Send us a text When you think about protecting critical infrastructure, pipelines, power grids, or water treatment facilities, the first question isnāt how to defend them, but what exactly are we defending? Thatās the challenge The Cybersecurity & Infrastructure Security Agency or the CISA tackled in its August 13th 2025 guidance on OT cybersecuritā¦
…
continue reading
1
Episode 235 - Worldwide Crackdown On Scam Compounds, Checkout.com Hacked and Donates Ransom, European Auto Ring Busted, Car Talk
49:08
49:08
Play later
Play later
Lists
Like
Liked
49:08Welcome to this week's episode of the PEBCAK Podcast! Weāve got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Worldā¦
…
continue reading
1
WhatsApp Leak, Rail Hack and CCTV Horror Stories | Weekly Cyber News, But Human
52:19
52:19
Play later
Play later
Lists
Like
Liked
52:19š¢ Subscribe on your favourite platforms and visit https://linktr.ee/riskycreative for more of ā The Awareness Angle š¢ This Week on The Awareness Angle Rail hacks, WhatsApp risks, CCTV horror stories, teenage cyber gangs, and a staffing breach that leaked over a hundred thousand CVs. It has been a busy week. Luke and I break down the biggest cyber stā¦
…
continue reading
1
AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage
18:12
18:12
Play later
Play later
Lists
Like
Liked
18:12In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to target 30 global organizations. We explain how the attack was executed, why it matters, and its implications for cybersecurity. Join the conversation as ā¦
…
continue reading
1
Zero Trust to SCADA: Navigating the InfoSec Mandate
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25This podcast explores the comprehensive responsibilities of modern InfoSec professionals, ranging from core security operations like vulnerability management across operating systems, network devices, and containers, to ensuring physical security and managing application development standards. Dive deep into emerging and complex domains such as AI ā¦
…
continue reading
Welcome to this week's bonus episode of the PEBCAK Podcast! Weāve got some amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcastBy Chris Louie
…
continue reading
1
Episode 195 Cloudflareās Outage, DoorDash hacked, Nvidia $57B revenue, and Tech Career Crashouts
2:00:14
2:00:14
Play later
Play later
Lists
Like
Liked
2:00:14Get into cybersecurity here : https://app.techtualconsulting.tech/bundles/57 ------------------------------------------------------------------------------------ In this episode, HD and CyberShortieee dive into everything from navigating IT career moves and salary negotiation, to analyzing the recent Cloudflare outage, security breaches at DoorDashā¦
…
continue reading
1
From FBI to Cybersecurity Leader: M.K. Palmore's Career Journey | Breaking Into Cybersecurity
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18In this episode of Breaking Into Cybersecurity, M.K. Palmore, a cybersecurity leader and former FBI special agent, shares his journey from serving in the Marines and the FBI to leading his own consulting firm, Apogee Global RMS. He discusses his early interest in technology, the importance of effective communication in cybersecurity leadership, andā¦
…
continue reading
1
EiPS Episode 25 1121 - Dispatch Dopplegangers NG911 Digital Twins
10:29
10:29
Play later
Play later
Lists
Like
Liked
10:29In this episode of TiPS: Today in Public Safety, Fletch dives into a topic that sounds futuristic but is already knocking on the ECC door: AI-powered ādispatch doppelgƤngers.ā These arenāt JUST chatbots, scripts, or templates ā theyāre digital twins of your best call takers, created from real performance data to help with training, simulations, andā¦
…
continue reading
1
The Privacy Divide: State Laws, Age Limits, and the Battle for the Under-18 Consumer.
36:11
36:11
Play later
Play later
Lists
Like
Liked
36:11This episode explores the complex division in state mandates between general consumer privacy laws and specific childrenās design codes, which often function as separate acts or amendments. We break down how compliance is determined either by broad, quantitative thresholds like annual gross revenue and high data volume, or by the specific service'sā¦
…
continue reading
1
#89 ā Is The Expanding Quantum Computing Workforce Your Next Career Move?
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45Do you think Quantum Computing jobs are just for PhD's and physics geniuses? Not anymore. Your current SaaS, business, or marketing skills are desperately needed to build this new industry. Izhar Medalsy tells us how to jump careers, and why the new quantum computing industry is already exciting.By Extra Something Media
…
continue reading
1
Risky Biz Soap Box: Greynoise knows when bad bugs are coming
37:51
37:51
Play later
Play later
Lists
Like
Liked
37:51In this sponsored Soap Box edition of the podcast, Andrew Morris joins Patrick Gray to talk about how Greynoise can often get a 90 day heads up on serious vulnerabilities. Whether itās malicious actors doing reconnaissance or the affected vendors trying to understand the scope of the problem, it seems that mass scanning activity lines up pretty nicā¦
…
continue reading
1
Think Like a Spy, Hunt Like a Hacker: Former FBI Agent Eric OāNeill on Outsmarting Cybercriminals
46:47
46:47
Play later
Play later
Lists
Like
Liked
46:47In this episode of the Cybersecurity Mentors Podcast, Eric O'Neill shares his experiences as an undercover FBI agent who caught one of the most damaging spies in U.S. history, Robert Hansen. He discusses the evolution of cybercrime, the importance of understanding cyber attacks, and the intersection of espionage and cybersecurity. O'Neill emphasizeā¦
…
continue reading