Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Databreach Podcasts
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Tripwire's cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire's VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
Hosted by commercial + insurance mediator and arbitrator, Jean Lawler, this podcast draws on Jean's years of experience as a private practice attorney and neutral to provide insights and information relevant to resolving legal disputes outside of a courtroom, and features interviews with legal and dispute resolution industry leaders--attorneys, mediators, and arbitrators.
…
continue reading
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
1
Cybercrime and the Future: An In-Depth Discussion with Tammy Harper, Flare.io
1:08:42
1:08:42
Play later
Play later
Lists
Like
Liked
1:08:42In this episode of Cybersecurity Today, host Jim Love is joined by Tammy Harper, a senior threat intelligence researcher at Flare, to explore the future landscape of cybercrime. The conversation delves into various aspects like the evolution of underground markets, state-backed cyber sanctuaries, and decentralized escrow systems. Harper presents in…
…
continue reading
Want to shop like a holiday ninja? Here's your guide to being silent, swift, and saving big. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Think your picky-eater requests are forgotten? Not so fast. Hear how restaurants are building a permanent profile on you with every reservation. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
Cybersecurity Today: Oracle Breach, CrowdStrike Report, and New iPhone Scam
13:36
13:36
Play later
Play later
Lists
Like
Liked
13:36In this episode, host Jim Love discusses several significant cybersecurity events and updates. The Washington Post confirmed a security breach affecting nearly 10,000 individuals due to an exploited Oracle E-Business Suite vulnerability. CrowdStrike's 2025 Global Threat Report highlights the rise of 'enterprising adversaries' and a surge in malware…
…
continue reading
The leaks you don’t see are the ones that cost you. These low-cost tools give you a heads-up before the damage hits. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
A totally fake group just beat real artists on the charts. Nashville did not have this on its bingo card. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
Your survival guide to this week’s flight chaos
8:21
8:21
Play later
Play later
Lists
Like
Liked
8:21A massive wave of flight cuts is hitting travelers this week. If you’re flying soon, don’t panic. Do this instead to keep your trip on track. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Feeling rushed at the doctor's office? New studies show why patients think AI has a better bedside manner. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
Industrial Phishing Kit QRR Discovered: New Cyber Threats Unveiled | Cybersecurity Today
16:30
16:30
Play later
Play later
Lists
Like
Liked
16:30In this episode of Cybersecurity Today, host David Shipley covers the latest threats in the cybersecurity landscape. Highlights include the emergence of the quantum root redirect (QRR) phishing kit, a sophisticated automated phishing platform targeting Microsoft 365 credentials across 90 countries. The hospitality industry is also being hit with a …
…
continue reading
How can you truly honor those who served? I have one powerful way you can turn your gratitude into a permanent, national treasure. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
As we honor America’s veterans, another global battle is taking shape over artificial intelligence. The question isn’t who builds it first but whose values it will follow. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Attention car owners: Thieves have a new high-tech way to steal your ride, no lockpick required. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Thinking of letting your kids, especially young teens, use ChatGPT? Hold on. There’s a major issue you need to know. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
US Congressional Budget Office Breach, AI in Cyber Attacks & Veterans Defend Canada
9:01
9:01
Play later
Play later
Lists
Like
Liked
9:01Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst In today's episode, we cover the breach at the US Congressional Budget Office and…
…
continue reading
1
The #1 giveaway you're watching a deepfake
14:12
14:12
Play later
Play later
Lists
Like
Liked
14:12When a social media video makes you go "Wow," pause. That shock factor is a big clue it could be an AI fake. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
Kim Kardashian blames ChatGPT for failing her law exams
7:09
7:09
Play later
Play later
Lists
Like
Liked
7:09The world's most famous student lawyer learned the hard way that you can't trust AI for everything. Get the scoop in this short podcast. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Did you change your security cam's default password? If you're like most, maybe not. Here's why you should and other great tips you need to know about. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Skip the swiping. The new move is checking someone’s Facebook history before you even say hi. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
A Former Black Hat Hacker Advises Us On Security Weaknesses
55:44
55:44
Play later
Play later
Lists
Like
Liked
55:44Unveiling the Double-Edged Sword of AI in Cybersecurity with Brian Black In this episode of Cybersecurity Today, host Jim Love interviews Brian Black, the head of security engineering at Deep Instinct and a former black hat hacker. Brian shares his journey into hacking from a young age, his transition to ethical hacking, and his experiences working…
…
continue reading
1
Find the neighborhood cameras tracking your car
7:35
7:35
Play later
Play later
Lists
Like
Liked
7:35Want to know who’s watching your driveway? I’ll walk you through the easy ways to map nearby cameras. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
AI voice cloning is fooling parents, grandparents, everyone. I’ll tell you how to make sure you never fall for it. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
Innovative Tools and Tactics in Cybersecurity
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15In this episode of 'Cybersecurity Today,' hosted by Jim Love, the focus is on recent developments and tactics in cybersecurity. The episode discusses Meter's networking solutions, the innovative tactics of the ransomware group Killen using common Windows tools, and three new open-source offerings aimed at improving security: Heisenberg for software…
…
continue reading
This goes way beyond stealing pens or notepads at work. There’s a new way to cheat the system. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading