Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Data Breaches Podcasts

show episodes
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Artwork

1
GDPR Now!

Karen Heaton/Data Protection 4 Business

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
  continue reading
 
Artwork

1
BarCode

Chris Glanden

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
  continue reading
 
Artwork

1
Brutally Honest Security

Barricade Cyber Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
  continue reading
 
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
  continue reading
 
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
  continue reading
 
Artwork
 
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
  continue reading
 
Artwork

1
Risk & Repeat

Robert Wright

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
Artwork
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
  continue reading
 
Artwork

1
Breaches & Brews

Rivial Data Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
  continue reading
 
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
  continue reading
 
Artwork
 
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
  continue reading
 
Artwork
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
Artwork

1
Privacy Please

Cameron Ivey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to "Privacy Please," a podcast for anyone who wants to know more about data privacy and security. Join your hosts Cam and Gabe as they talk to experts, academics, authors, and activists to break down complex privacy topics in a way that's easy to understand. In today's connected world, our personal information is constantly being collected, analyzed, and sometimes exploited. We believe everyone has a right to understand how their data is being used and what they can do to protect the ...
  continue reading
 
Artwork

1
Prepping Academy

Prepping Academy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Prepping Academy Radio Show is a live broadcast aimed at discussing various topics related to prepping, survival, and self-reliance, while also serving as a platform for preppers to unite. Our ultimate objective at The Prepping Academy Radio Show is to broaden your perspectives and inspire you to take action, as we strongly believe that preparedness is of the essence. We welcome preppers of all levels to join us on preppingacademy.com and PrepperNet.com.
  continue reading
 
In this episode, Tyler and Bob break down cybersecurity in a fun, human way—no tech jargon overload, just real tips and tricks to keep your business safe. From password tricks and phishing scams to the importance of backups and cloud security, they share easy-to-follow advice with plenty of humour and relatable insights. If you’ve ever ignored an update or used ”password123,” this one’s for you. Tune in, laugh a little, and learn how to become a cybersecurity rockstar!
  continue reading
 
Want to stay in the loop but don’t have time to scroll through endless headlines? This podcast has your back. Each week, we break down the hottest topics — from news and pop culture to tech trends and viral moments — and give you just what you need to sound informed, interesting, and maybe even a little wiser in your next conversation. No fluff, no noise, just what matters (with a few laughs along the way). Subscribe and stay in the conversation.
  continue reading
 
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
  continue reading
 
1. Gain a deep understanding of data privacy regulations and compliance requirements 2. Learn proven strategies for building a robust privacy framework tailored to your organization’s needs 3. Access practical resources and tools to streamline your data management processes 4. Connect with a community of like-minded business leaders for support and networking opportunities
  continue reading
 
Artwork

1
Software Development, Finance and AI

Krish Palaniappan and Varun Palaniappan

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We’ve been doing Software Development and Architecture work for a while at Snowpal, and currently have several B2B and B2C products in production. In this podcast, we’ll share our experiences on a regular basis to help you & your teams build great software. The topics covered in this podcast will include Product Management, Project Management, Architecture, Development, Deployment, Security, Release Management, Sales, Marketing, Advertising, and just about everything else an ambitious, fast ...
  continue reading
 
Starring Jameela Jamil and Manny Jacinto! After crash-landing on a mysterious planet with no memory and a sentient AI implant in his brain keeping him alive, a soldier searches for answers about his past. There are only four things Lucan knows with certainty: his name, his rank, that the droll AI implant speaking to him inside his mind is named Ven, and finally, that she is the only thing keeping him from dying. With no other memories or connection to their pasts, Lucan and Ven must navigate ...
  continue reading
 
Artwork

1
AHLA's Speaking of Health Law

American Health Law Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The American Health Law Association (AHLA) is the largest nonprofit, nonpartisan educational organization devoted to legal issues in the health care field. AHLA's Speaking of Health Law podcasts offer thoughtful analysis and insightful commentary on the legal and policy issues affecting the American health care system.
  continue reading
 
This Audio Course is your complete audio-first companion to the CIPP/US certification. Across structured episodes, it breaks down U.S. privacy law from federal and state frameworks to workplace rules and international overlaps, all aligned with the official IAPP Body of Knowledge. You’ll get guided walkthroughs of statutes, enforcement themes, case law, and key regulatory agencies, plus study strategies, glossary deep dives, and exam skills to build lasting confidence. Designed for on-the-go ...
  continue reading
 
A podcast that explores how advertising, technology, and the internet is shaping the world around us and impacting our daily lives. Have you ever wondered why that pair of shoes is following you around the internet? Or is my phone really listening to me to inform the advertising I see? Or maybe you want to learn more about what laws and legislation are being put in place to protect you and your data? In every You're On Mute episode we will try to answer questions, uncover truths, and provide ...
  continue reading
 
Artwork

1
Security So What!

Michael Ferguson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Australian businesses were targeted with more advanced malware and cyber intrusions in 2014 than any other. We believe its time for Australian organisations to realize that we are firmly in the cross-hairs of global cyber criminals. This blog and podcast is so we can provide a platform to share stories of cyber crime from Australia and the rest of the world, and hopefully find ways Australian businesses can protect their organisation, customers and employees data from these threats.
  continue reading
 
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
  continue reading
 
Artwork

1
AI News Daily

brief.news

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to AI News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about machine learning, robotics, automation, natural language processing, AI ethics, and more. Whether you're a tech enthusiast, AI researcher, or simply curious about the future of technology, this podcast is your go-to source for AI news. T ...
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
Loading …
show series
 
The MacVoices Live! panel touches on Microsoft’s warning about a risky experimental AI agent in Windows, raising concerns about big tech pushing features before security is understood. Chuck Joiner, Marty Jencius, Brian Flanigan-Arthurs, Eric Bolden, Jim Rea, Web Bixby, and David Ginsburg debate age-verification proposals from Roblox and Pornhub, e…
  continue reading
 
Troy Hunt, founder of Have I Been Pwned, joins Ann on this week's episode of Afternoon Cyber Tea to explore what billions of breached records reveal about attacker behavior, human weakness, and the state of breach disclosure. He explains why organizations often hesitate to notify victims, how breach fatigue shapes user responses, and why transparen…
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
🎙️ Marquis Breach Hits 74+ US Banks, Freedom Mobile Data Exposed, Arizona Sues Temu Data Theft 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1022: Today's episode will discuss the latest news: · India Drops Mandate for Sanchar Saathi App Amid Privacy and Surveillanc…
  continue reading
 
(0:10): OpenAI Data Breach: Mixpanel Incident Exposes User Info, Highlights Third-Party Vendor Risks (1:54): Baidu Announces Major Layoffs Amid AI Competition and Falling Ad Revenue (3:47): Nomura and OpenAI Partner to Revolutionize Asset Management with Generative AI (6:26): AI-Driven Turbine Duct Optimization Promises Emission Cuts and Fuel Savin…
  continue reading
 
In today's episode of Cybersecurity Today, hosted by Jim Love, several major cybersecurity incidents are discussed. US banks are assessing the impact of a security breach at SitusAMC, where the ALFV ransomware group claimed to have stolen three terabytes of data. CIOP has targeted Broadcom through Oracle's E-Business Suite vulnerabilities. A new ma…
  continue reading
 
Send us a text In Episode 248, Russell and Adam tackle one of the biggest wake-up calls the hobby has seen — a major data breach affecting collectors, marketplaces, and the way personal information is handled across the industry. We also break down: Should the Grizzlies keep Ja or their coach? Fanatics pricing on Topps Chrome Fantasy Surprises this…
  continue reading
 
🎙️ Welcome to True Cyber Crimes, the podcast where digital dangers meet real-world consequences. In today’s episode, we’re decoding the headline-making data breach at 23andMe—the genetic testing company trusted by millions to guard their most personal information. But when cybercriminals cracked the vault on your DNA, the implications exploded far …
  continue reading
 
The MacVoices Live! panel touches on Microsoft's warning about a risky experimental AI agent in Windows, raising concerns about big tech pushing features before security is understood. Chuck Joiner, Marty Jencius, Brian Flanigan-Arthurs, Eric Bolden, Jim Rea, Web Bixby, and David Ginsburg debate age-verification proposals from Roblox and Pornhub, e…
  continue reading
 
In this episode of the Contested Ground podcast, hosts Phil Tarrant and Major General (Ret'd) Dr Marcus Thompson are joined by special guest Dr Ross Babbage, chief executive officer of Strategic Forum and Non-Resident Senior Fellow at the Center for Strategic and Budgetary Assessments in Washington DC. Together, the trio dive into Australia's rapid…
  continue reading
 
This discussion dives into the debate over affordable computing for students and families, comparing Chromebooks, iPads, and the possibility of a new low-cost Mac from Apple. Chuck Joiner, Marty Jencius, Brian Flanigan-Arthurs, Eric Bolden, Jim Rea, Web Bixby, and David Ginsburg compare performance, device lifespan, security, and management tools, …
  continue reading
 
This discussion dives into the debate over affordable computing for students and families, comparing Chromebooks, iPads, and the possibility of a new low-cost Mac from Apple. Chuck Joiner, Marty Jencius, Brian Flanigan-Arthurs, Eric Bolden, Jim Rea, Web Bixby, and David Ginsburg compare performance, device lifespan, security, and management tools, …
  continue reading
 
⬥EPISODE NOTES⬥ Artificial intelligence is reshaping how public health organizations manage data, interpret trends, and support decision-making. In this episode, Sean Martin talks with Jim St. Clair, Vice President of Public Health Systems at a major public health research institute, Altarum, about what AI adoption really looks like across federal,…
  continue reading
 
NextEra and Google Cloud Forge Gigawatt Data Centers, Eyeing AI-Powered Growth by 2026 Riyadh Air Launches as World's First AI-Native Airline, Partners with IBM for Innovative Operations Automakers Race to Close AI Gap as Legacy Firms Struggle Against Tech-Driven Rivals OpenAI and Instacart Integrate Shopping into ChatGPT: A New Era of AI-Driven Co…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
🎙️ React2Shell Exploitation Surges, Ransomware Payments Hit $4.5B, Poland Arrests Ukrainian Hackers 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1024: Today's episode will discuss the latest news: · Critical Apache Tika Vulnerability Leads to XXE Injection Attacks …
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
It’s our annual festive special! 🎄✨We’re wrapping up 2025 with a holiday extravaganza packed tighter than a Christmas turkey — complete with games, AI shenanigans, and some truly unhinged cybersecurity headlines. From celebrity deepfakes to record-breaking hacks, we’re revisiting the wildest moments of the year in tech. In “Real or AI?!”, the team …
  continue reading
 
Kathy Roe, Managing Attorney, Health Law Consultancy, speaks with Dorothy DeAngelis, Senior Managing Director, Ankura Consulting, and Richelle Marting, Attorney, Marting Law, about the latest trends and developments related to prior authorization, from both the payer and provider angles. They discuss what prior authorization is and why it engenders…
  continue reading
 
The increase in Apple-themed impersonation scams, CNN’s withdrawal from Apple News and shifting news-subscription models, and new CarPlay widget capabilities in iOS 26 are discussed by Chuck Joiner, Marty Jencius, Brian Flanigan-Arthurs, Eric Bolden, Jim Rea, Web Bixby, and David Ginsburg. They share personal experiences with phishing, explore the …
  continue reading
 
The increase in Apple-themed impersonation scams, CNN's withdrawal from Apple News and shifting news-subscription models, and new CarPlay widget capabilities in iOS 26 are discussed by Chuck Joiner, Marty Jencius, Brian Flanigan-Arthurs, Eric Bolden, Jim Rea, Web Bixby, and David Ginsburg. They share personal experiences with phishing, explore the …
  continue reading
 
(0:10): AI and ML to Revolutionize India's Power Distribution: 51 Innovations Recognized, Urged to Scale Nationally (2:12): Respiree Expands 1Bio AI-Acute Toolbox Across APAC and US After Key Regulatory Approvals (4:50): Ant International Unveils AI SHIELD with 99.8% Deepfake Detection, Revolutionizing Global Security (6:56): Saudi Arabia Unveils A…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
As Keir Starmer hosts Volodymyr Zelenskyy in London, Pippa Crerar and Kiran Stacey discuss what the ‘coalition of the willing’ can achieve. Also in the spotlight is Labour’s shifting position on the EU. Plus, with pressure mounting on Nigel Farage, can the Reform UK leader handle so much scrutiny?. Help support our independent journalism at theguar…
  continue reading
 
🎙️ China Malware Long-Term Persistence US Warning, Critical React2Shell Flaw, Palo Alto VPN Attack Wave 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1023: Today's episode will discuss the latest news: · Researchers Uncover 30 Flaws in AI Code Assistants and Develop…
  continue reading
 
Canadian SMEs have an appetite for technology, 94% prioritize tech investment, but only 10% have fully integrated it. That massive gap is where profits leak away. In this episode of Cybersecurity Unmasked, we share the eight-step roadmap that helped one Toronto manufacturer turn a $28,000 investment into $220,000 in returns (697% ROI) within 12 mon…
  continue reading
 
Explosive React Vulnerability and AI Tool Flaws Uncovered: Major Implications for Cybersecurity In this episode of Cybersecurity Today, host David Shipley discusses a new significant React vulnerability, React2Shell, that has caused widespread confusion and debate in the security community. This major flaw, affecting a widely used web framework, po…
  continue reading
 
Question? Text our Studio direct. David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ, about how data brokers work and how to delete your data by discussing the intersection of privacy and personal data. They discuss the role of data brokers, the lack of transparency in data collection, and the pot…
  continue reading
 
In the second part of the fifth installment of the 2025 MacVoices Holiday Gift Guide, David Ginsburg, Wally Cherwinski, and Chuck Joiner highlight a 4K portable monitor and stand, AirPods safety straps, compression and neoprene travel socks, rechargeable motion-sensor lighting, a compact USB microphone, and smart-home hardware buttons. Practical tr…
  continue reading
 
In the final episode of “Inside the Mind of a Ransomware Operator,” Chris and Nick look ahead to the next decade of cybercrime. What happens when ransomware goes fully autonomous? AI that picks the most valuable files… then negotiates the ransom in 17 languages Malware that mimics real human behavior so perfectly that EDR can’t tell the difference …
  continue reading
 
In the second part of the fifth installment of the 2025 MacVoices Holiday Gift Guide, David Ginsburg, Wally Cherwinski, and Chuck Joiner highlights a 4K portable monitor and stand, AirPods safety straps, compression and neoprene travel socks, rechargeable motion-sensor lighting, a compact USB microphone, and smart-home hardware buttons. Practical t…
  continue reading
 
Send us a text In Episode 250, Russell and Adam dive into one of the spiciest conversations of the season — should OKC make a play for Giannis, and is the NBA heading for a team-building arms race? They also unpack the new “Silvers /8” concept and whether this kind of manufactured scarcity actually helps collectors… or just adds confusion. The lads…
  continue reading
 
In this episode, we explore the hidden human cost of major cyber incidents—the stress on IT teams, the disruption to patient care, the executives forced into impossible decisions, and the ripple effects felt by everyday people who rely on critical systems. Beyond the technical breakdown, we examine how breaches impact lives, strain organizations, a…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
Cybersecurity Today: The Rise of Living Off the Land Strategies & More In this episode of Cybersecurity Today's Month in Review, host Jim Love is joined by Laura Payne from White Tuque and David Shipley from Beauceron Security. They discuss several pressing cybersecurity issues, including the growing threat of 'living off the land' strategies where…
  continue reading
 
The 2025 MacVoices Holiday Gift Guide #5 Part 1 continues as the panel of David Ginsburg, Wally Cherwinski, and Chuck Joiner shares practical tech ideas for Apple users, from at USB hub and a USB-C charger to a MagSafe camera grip and a portable monitor. They also explain how to get great deals through Apple’s Certified Refurbished Store while trad…
  continue reading
 
The 2025 MacVoices Holiday Gift Guide #5 Part 1 continues as the panel of David Ginsburg, Wally Cherwinski, and Chuck Joiner shares practical tech ideas for Apple users, from at USB hub and a USB-C charger to a MagSafe camera grip and a portable monitor. They also explain how to get great deals through Apple's Certified Refurbished Store while trad…
  continue reading
 
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.By Cybercrime Magazine
  continue reading
 
An article from Bolde.com titled “15 Coolest Jobs You’ve Probably Never Heard Of" named ethical hacking as number one. In this episode, Taylor Fox, Media Coordinator at Cybercrime Magazine and manager of our social media accounts, joins host Amanda Glassner to discuss why we shared this article on Instagram, alongside some of the fun and interestin…
  continue reading
 
(0:10): EU Investigates Meta's WhatsApp Policy in Landmark Antitrust Probe on AI Competition (1:46): Microsoft Stock Dips Amid Concerns Over AI Sales Targets and Growth Quotas (3:48): Judge Orders OpenAI to Release ChatGPT Logs in Major Copyright Case, Sparking AI Data Debate (5:58): Nexus Closes $700M Fund to Boost AI and Startups Across US and In…
  continue reading
 
According to the New York Post, a twisted online cult, dubbed 'Greggy's Cult,' terrorized and blackmailed children on gaming platforms into performing illicit acts on camera. In this episode, host Paul John Spaulding, Kyle Haglund, VP, Audio Engineering at Cybercrime Magazine, and Sam White, Video Producer at Cybercrime Magazine, discuss this story…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
Advances in quantum computing by 2029 will weaken and break the conventional asymmetric cryptography that underpins many authentication methods, Gartner has warned, significantly reducing their credence and increasing exposure to account takeover risks. The analyst firm’s Hype Cycle for Digital Identity 2025 highlights the importance of post-quantu…
  continue reading
 
In this special two-part series, Rob Gerberry, Senior Vice President and Chief Legal Officer, Summa Health, speaks with Michael Peregrine, Partner, McDermott Will & Schulte, about the health care corporate governance oversight of artificial intelligence (AI). In Part Two, they discuss what an AI governance framework might look like, the board/manag…
  continue reading
 
In this episode of 'Cybersecurity Today,' host Jim Love discusses several significant cybersecurity issues. Highlights include a maximum severity vulnerability in React Server Components dubbed React2Shell (CVE-2025-55182), a recently patched Windows shortcut flaw by Microsoft, and new attacks using the Evilginx phishing platform in schools. Additi…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play