Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Data Breaches Podcasts

show episodes
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Artwork

1
BarCode

Chris Glanden

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
  continue reading
 
Artwork

1
Cyber Law Revolution

Spencer Pollock

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
  continue reading
 
Artwork

1
Brutally Honest Security

Barricade Cyber Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
  continue reading
 
Artwork
 
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
  continue reading
 
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
GDPR Now!

Karen Heaton/Data Protection 4 Business

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
  continue reading
 
Artwork

1
Risk & Repeat

Robert Wright

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Artwork

1
China Insider

Hudson Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
China Insider is a weekly podcast project from Hudson Institute's China Center, hosted by Miles Yu, who provides weekly news that mainstream American outlets often miss, as well as in-depth commentary and analysis on the China challenge and the free world’s future.
  continue reading
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
Artwork
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
  continue reading
 
Artwork

1
Breaches & Brews

Rivial Data Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
  continue reading
 
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
  continue reading
 
This Audio Course is your complete audio-first companion to the CIPP/US certification. Across structured episodes, it breaks down U.S. privacy law from federal and state frameworks to workplace rules and international overlaps, all aligned with the official IAPP Body of Knowledge. You’ll get guided walkthroughs of statutes, enforcement themes, case law, and key regulatory agencies, plus study strategies, glossary deep dives, and exam skills to build lasting confidence. Designed for on-the-go ...
  continue reading
 
Artwork

1
Prepping Academy

Prepping Academy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Prepping Academy Radio Show is a live broadcast aimed at discussing various topics related to prepping, survival, and self-reliance, while also serving as a platform for preppers to unite. Our ultimate objective at The Prepping Academy Radio Show is to broaden your perspectives and inspire you to take action, as we strongly believe that preparedness is of the essence. We welcome preppers of all levels to join us on preppingacademy.com and PrepperNet.com.
  continue reading
 
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
Starring Jameela Jamil and Manny Jacinto! After crash-landing on a mysterious planet with no memory and a sentient AI implant in his brain keeping him alive, a soldier searches for answers about his past. There are only four things Lucan knows with certainty: his name, his rank, that the droll AI implant speaking to him inside his mind is named Ven, and finally, that she is the only thing keeping him from dying. With no other memories or connection to their pasts, Lucan and Ven must navigate ...
  continue reading
 
Artwork

601
Privacy Please

Cameron Ivey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to "Privacy Please," a podcast for anyone who wants to know more about data privacy and security. Join your hosts Cam and Gabe as they talk to experts, academics, authors, and activists to break down complex privacy topics in a way that's easy to understand. In today's connected world, our personal information is constantly being collected, analyzed, and sometimes exploited. We believe everyone has a right to understand how their data is being used and what they can do to protect the ...
  continue reading
 
In this episode, Tyler and Bob break down cybersecurity in a fun, human way—no tech jargon overload, just real tips and tricks to keep your business safe. From password tricks and phishing scams to the importance of backups and cloud security, they share easy-to-follow advice with plenty of humour and relatable insights. If you’ve ever ignored an update or used ”password123,” this one’s for you. Tune in, laugh a little, and learn how to become a cybersecurity rockstar!
  continue reading
 
Artwork

1
Software Development, Finance and AI

Krish Palaniappan and Varun Palaniappan

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We’ve been doing Software Development and Architecture work for a while at Snowpal, and currently have several B2B and B2C products in production. In this podcast, we’ll share our experiences on a regular basis to help you & your teams build great software. The topics covered in this podcast will include Product Management, Project Management, Architecture, Development, Deployment, Security, Release Management, Sales, Marketing, Advertising, and just about everything else an ambitious, fast ...
  continue reading
 
1. Gain a deep understanding of data privacy regulations and compliance requirements 2. Learn proven strategies for building a robust privacy framework tailored to your organization’s needs 3. Access practical resources and tools to streamline your data management processes 4. Connect with a community of like-minded business leaders for support and networking opportunities
  continue reading
 
A podcast that explores how advertising, technology, and the internet is shaping the world around us and impacting our daily lives. Have you ever wondered why that pair of shoes is following you around the internet? Or is my phone really listening to me to inform the advertising I see? Or maybe you want to learn more about what laws and legislation are being put in place to protect you and your data? In every You're On Mute episode we will try to answer questions, uncover truths, and provide ...
  continue reading
 
Artwork

1
AHLA's Speaking of Health Law

American Health Law Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The American Health Law Association (AHLA) is the largest nonprofit, nonpartisan educational organization devoted to legal issues in the health care field. AHLA's Speaking of Health Law podcasts offer thoughtful analysis and insightful commentary on the legal and policy issues affecting the American health care system.
  continue reading
 
Digital Coffee: Gaming Brew is a podcast hosted by Brett Deister that covers the latest news and reviews in the world of video games. With a focus on PC gaming, the show delves deep into discussions about new hardware releases, hardware surveys, gameplay mechanics, game design, and innovations in the industry. With each episode, Brett provides insightful commentary and analysis on the trends and changes shaping the gaming industry, as well as engaging discussions with guests and listeners on ...
  continue reading
 
Artwork

1
Security So What!

Michael Ferguson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Australian businesses were targeted with more advanced malware and cyber intrusions in 2014 than any other. We believe its time for Australian organisations to realize that we are firmly in the cross-hairs of global cyber criminals. This blog and podcast is so we can provide a platform to share stories of cyber crime from Australia and the rest of the world, and hopefully find ways Australian businesses can protect their organisation, customers and employees data from these threats.
  continue reading
 
Artwork
 
Cybersecurity, compliance, security policy enforcement, and data privacy remain constant concerns, and a breach could irrevocably impact the profitability and sustainability of your company. Join Maurice Hamilton, CEO of Infinavate, each week as he interviews CEOs and CIOs to discuss real-life solutions to cybersecurity, data management, and advanced digital solutions. If you have concerns about cybersecurity, compliance, security policy enforcement, and data privacy, this podcast is for you ...
  continue reading
 
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
  continue reading
 
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
  continue reading
 
Cybercriminals are evolving—are you keeping up? Don’t Be A Sitting Duck is the podcast for business leaders and professionals who want to stay one step ahead of the latest cyber threats. In each bite-sized episode, we dive into real-world cyber breaches, phishing scams, and ransomware attacks, sharing actionable advice to help you protect your business. Looking for more insights and resources? Visit sittingduck.com.au to explore educational content designed to help you navigate today’s compl ...
  continue reading
 
Want to stay in the loop but don’t have time to scroll through endless headlines? This podcast has your back. Each week, we break down the hottest topics — from news and pop culture to tech trends and viral moments — and give you just what you need to sound informed, interesting, and maybe even a little wiser in your next conversation. No fluff, no noise, just what matters (with a few laughs along the way). Subscribe and stay in the conversation.
  continue reading
 
Loading …
show series
 
Vendor relationships and data breaches are usually found very high on the risk heat map for anyone working in health care and technology. Andrew Mahler, Vice President of Privacy, Compliance, and Audit Services, Clearwater, speaks with Shalyn Watkins, Associate, Holland & Knight, about how health care organizations can better manage third-party ven…
  continue reading
 
One click. One password. That's all it took to put an entire North York nonprofit minutes away from disaster. In this episode of Cybersecurity Unmasked, we share a real case study from our own clients—how a single moment of awareness stopped what could have been a catastrophic $200K+ data breach. This phishing attack wasn't some poorly written scam…
  continue reading
 
In this conversation, ⁠Richa Kaul⁠, CEO of ⁠Complyance⁠, discusses the importance of data privacy and compliance in today’s business landscape. She emphasizes the necessity of investing in proactive compliance to prevent future costs associated with data breaches and regulatory fines. The discussion also touches on the evolving perceptions of trust…
  continue reading
 
Scattered Spider, LAPSUS$, and ShinyHunters join forces Nikkei reports data breach impacting 17,000 people React Native NPM flaw leads to attacks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero…
  continue reading
 
In Episode 4 of Brutally Honest Security, host Eric Taylor takes aim at one of the most revealing cyber-incidents of the year: the Information Commissioner’s Office’s £14 million penalty against Capita plc and subsidiary CPSL following a breach that exposed 6.6 million individuals and almost one terabyte of data. You’ll hear: • 📉 How an infected fi…
  continue reading
 
Today’s episode unpacks two alarming cybersecurity incidents in Australia that should act as red alerts for every business. First, we look at how a contractor for a government flood-recovery program uploaded thousands of applicant records into ChatGPT without authorisation—revealing vulnerabilities in AI tool usage. Then we dive into a breach at te…
  continue reading
 
A therapy breach worse than fiction. Smart homes that spy on you. A ransomware attack that crippled hospitals. Dom Bettinelli and Thomas Sanjurjo unpack chilling tech horror stories—and how to defend yourself. The post Tech Horror Stories: Ransomware, Smart Home Hacks & Data Breaches appeared first on StarQuest Media.…
  continue reading
 
Podcast Summary – Prepping Academy Podcast: “Data Breaches & Hacks Update – Protecting Your Digital Life” In this week’s episode of The Prepping Academy Podcast, we dive deep into the world of data breaches, cyberattacks, and online privacy — and what you can do right now to protect yourself. From the latest major corporate hacks to the quiet data …
  continue reading
 
This episode explores the central irony of cryptography: while the underlying mathematical algorithms are incredibly strong, most real-world data breaches occur due to poor key management and implementation flaws. The consensus among security experts is that the theoretical strength of modern ciphers like AES or RSA is sound, but this technical rob…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley covers the latest threats in the cybersecurity landscape. Highlights include the emergence of the quantum root redirect (QRR) phishing kit, a sophisticated automated phishing platform targeting Microsoft 365 credentials across 90 countries. The hospitality industry is also being hit with a …
  continue reading
 
In this week’s episode of China Insider, Miles Yu covers NVIDIA CEO Jensen Huang's recent trip to Beijing amidst the US government investigation into the company's potentially illicit sales to China in violation of US export regulations. Next, Miles provides detailed analysis on the PLA Navy's CNS Fujian - China's latest aircraft carrier to enter f…
  continue reading
 
Ever wondered what happens to your online accounts when you’re gone? 💭 This week, we’re joined by Erin Bury, Co-founder and CEO of Willful, to talk about the importance of digital estate planning — what it is, why it matters, and how to make it easier. Erin breaks down how to protect your online accounts, manage your digital legacy, and give your l…
  continue reading
 
This is today’s cyber news for November 11th, 2025. We open with a federal push to patch a Samsung zero-day powering stealth phone spyware, then move to a North Korea–linked abuse of Google’s device-finding features as a remote kill switch. Developer ecosystems are in focus as booby-trapped Visual Studio Code extensions siphon secrets, while a brea…
  continue reading
 
CISA reauthorization Denmark and Norway investigating electric bus "kill switches" European Commission looking to simplify privacy laws for AI Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ....or the really scary one: "how do I get out from under these o…
  continue reading
 
Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Jacob Coombs, CISO, Tandem Diabetes Care, and Ross Young, Co-host, CISO Tradecraft Thanks to our show sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ….or the really scary one: "how…
  continue reading
 
Clive Dsouza brings over 16 years of experience in IT, including significant contributions at major retail companies like Target and Lowe’s. He introduces the concept of real-time server-driven web components, highlighting the current landscape where most e-commerce sites, such as Amazon, utilize static components to display product recommendations…
  continue reading
 
CMMC 2.0 explained in plain English — what it means for small businesses, defense contractors, and vendors across the DoD supply chain. Learn about Level 1 vs Level 2, self-attestation risks, C3PAO shortages, compliance deadlines, and how to stay audit-ready before 2025. Don't miss out on crucial information about the CMMC 2025 deadline. The Cybers…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play