Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Digital Security Podcasts

show episodes
 
Artwork

1
Click Here

Recorded Future News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork

1
Caveat

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
Artwork

1
Cybersecurity Sense

LBMC Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
  continue reading
 
Artwork

4
Tech Talks Daily

Neil C. Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
  continue reading
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
Artwork

1
Cloud Realities

Capgemini

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Artwork
 
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Artwork
 
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj research staff and journalists interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
  continue reading
 
Artwork

1
Unspoken Security

Unspoken Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork

4
Root Causes: A PKI and Security Podcast

Tim Callan and Jason Soroko

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Digital certificate industry veterans Tim Callan and Jason Soroko explore the issues surrounding digital identity, PKI, and cryptographic connections in today's dynamic and evolving computing world. Best practices in digital certificates are continually under pressure from technology trends, new laws and regulations, cryptographic advances, and the evolution of our computing architectures to be more virtual, agile, ubiquitous, and cloud-based. Jason and Tim (and the occasional guest subject ...
  continue reading
 
Russ Branzell, President & CEO of the College of Healthcare Information Management Executives (CHIME), interviews leaders in Digital Health from around the world. These thought leaders share their knowledge, challenges, best practices, and ideas for helping to transform health and care on a global level.
  continue reading
 
Artwork
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Artwork

1
DTX Unplugged

Digital Transformation EXPO (DTX)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DTX Unplugged delves into the major challenges and innovations shaping business transformation, embodying our event's focus on the critical intersection of people, process, and technology. While rooted in the DTX ethos, this will be an industry-focused platform, tackling key issues, spotlighting groundbreaking innovations, and raising awareness for important topics across the sector.
  continue reading
 
Artwork

1
ASecuritySite Podcast

Professor Bill Buchanan OBE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
Digital Detectives

Legal Talk Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
  continue reading
 
Artwork

1
BarCode

Chris Glanden

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
  continue reading
 
Artwork

1
The Privacy Advisor Podcast

Jedidiah Bracy, IAPP Editorial Director

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
Surveillance Report

Techlore & The New Oil

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Technology and Security

Dr Miah Hammond-Errey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
  continue reading
 
Artwork
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Welcome to "Cyber Security", the podcast that dives deep into the ever-evolving world of digital protection. Each episode explores the latest cyber threats, data breaches, hacking techniques, and the tools and strategies used to defend against them. Whether you're a tech enthusiast, IT professional, or just curious about how to stay safe online, this show offers expert insights, real-world case studies, and practical advice to help you navigate the complex digital landscape. Tune in and stay ...
  continue reading
 
Artwork

1
Data Revolution

Kate Carruthers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to a podcast that dives deep into the fascinating crossroads of data, AI, privacy, and cybersecurity. Hosted by data and AI expert Kate Carruthers, this series explores the cutting-edge frontiers of our digital world, where data is forging an entirely new economy. Tune in to stay ahead of the curve and uncover the opportunities, challenges, and innovations shaping our future.
  continue reading
 
Artwork

1
Reality 2.0

Katherine Druckman and Doc Searls

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
  continue reading
 
Loading …
show series
 
The source provides an extensive analysis of Uruguay's efforts to regulate large digital platforms, identifying two distinct legislative tracks that characterize the nation's digital governance landscape. The first track successfully established Law 20.396, which focuses on labor regulation by setting minimum protections for gig economy workers and…
  continue reading
 
In this episode of Future Secured, Sam Fariborz, Chief Information Security Officer at David Jones, joins Tom Finnigan and Jason Murrell and shares her journey from IT service management to leading cybersecurity for one of Australia’s most trusted retail brands. Sam shares her view of the evolving role of the modern CISO, balancing protection with …
  continue reading
 
Lawfare Fellow in Technology Policy and Law Eugenia Lostri sits down with Esteban Carisimo, a Postdoctoral Researcher at Northwestern University to talk about the digital repression in Venezuela after the recent elections. Carisimo co-authored a recent report on the effects of the Venezuelan crisis on internet infrastructure. They discuss how inter…
  continue reading
 
Ahead of the Fourth Plenum of the 20th Central Committee of the Chinese Communist Party (CCP), this episode of the MERICS China Podcast looks at three issues that are high on the priority list for Chinese decisionmakers, namely urban development, social welfare and global trade tensions. Alexander Davey, Analyst in the Politics and Society Program …
  continue reading
 
Análisis de la Regulación de Plataformas Digitales en UruguayResumen EjecutivoEl panorama regulatorio de las grandes plataformas digitales en Uruguay se caracteriza por una marcada bifurcación de políticas, avanzando en dos vías paralelas y distintas. La primera vía, la Regulación Laboral (Ley 20.396), ya ha sido promulgada y reglamentada. Esta ley…
  continue reading
 
La regulación de las plataformas digitales en Uruguay se desarrolla a través de dos trayectorias legislativas distintas y paralelas. Este camino legislativo, impulsado por el Poder Ejecutivo, se centra en establecer protecciones mínimas para los trabajadores de la economía gig, específicamente en los servicios de transporte urbano y entrega. Estado…
  continue reading
 
Mosharaf Chowdhury, Associate Professor at the University of Michigan and Director of the ML Energy lab, and Dan Zhou, former Senior Research Scientist at the MIT Lincoln Lab, MIT Supercomputing Center, and MIT CSAIL, join Kevin Frazier, AI Innovation and Law Fellow at the University of Texas School of Law and a Senior Editor at Lawfare, to discuss…
  continue reading
 
These sources consist of transcripts from YouTube videos by the channel “CYBERMIDNIGHT CLUB,” primarily focusing on interviews and statements from a hacker known as Gob or Gob Etherium. The central topic is the arrest and imprisonment of Gob’s 18-year-old friend, Vlady, who is accused of various cybercrimes in Uruguay, including the defacement of t…
  continue reading
 
A Beginner's Guide to Spotting Red Flags in Online DatingIntroduction: Trusting Your Gut in the Digital Dating World Online dating offers exciting possibilities, but your safety must be your first priority. This guide is not meant to scare you; it is meant to equip you. It will teach you to recognize the warning signs and manipulative tactics used …
  continue reading
 
The provided excerpts, primarily sourced from Suelette Dreyfus and Julian Assange's work "Underground," examine the early culture, motives, and legal challenges faced by the international computer underground, particularly focusing on Australian hackers. They illustrate that early hacking communities formed on BBSes (Bulletin Board Systems), where …
  continue reading
 
Case Study: Russian State-Sponsored Cyber Operations and their Geopolitical ImpactIntroduction: The Threat Doctrine of the "Bears" Russian state-sponsored cyber units, colloquially known as the "Bears," operate as direct instruments of national policy. Their actions extend far beyond traditional espionage, representing a strategic capability for de…
  continue reading
 
What if the next generation of computing was not something you held or wore, but something you looked through? In this special episode recorded live from GITEX Global in Dubai, I speak with Roman Axelrod, founder of EXPANCEO, a deep tech company creating AI-powered smart contact lenses designed to merge augmented reality, biosensing, and what he ca…
  continue reading
 
De la Crisis al Ciberdelito: La Historia del Hacking en Argentina1. Introducción: El Nacimiento de una Cultura Única La cultura hacker en Argentina no surgió en un laboratorio tecnológico ni en un próspero entorno corporativo. Fue forjada en el crisol de una de las peores crisis socioeconómicas de su historia. La debacle de 2001 dio origen a una me…
  continue reading
 
Estudio de Caso: Anatomía de una Estafa Cripto con Deepfakes de Elon Musk1.0 Introducción: El Advenimiento de las Estafas Potenciadas por IA Las estafas en línea han evolucionado significativamente desde sus primeras iteraciones. Tácticas que alguna vez fueron prevalentes, como el conocido engaño del "Príncipe Nigeriano", han dado paso a operacione…
  continue reading
 
La Trampa de Tinder The sources present a composite study of the dangers of online dating and the emergence of an unconventional media platform dedicated to cybersecurity and digital advocacy. One set of transcripts details several chilling dating app accounts, ranging from stories of near-abduction and ambushes in isolated locations to three separ…
  continue reading
 
Un Análisis Exhaustivo de la Catástrofe Cibernética del Gobierno Uruguayo: Fallos Sistémicos, el Compromiso Fatal de 30.000 Certificados PKI de Identidad Nacional, y la Peligrosa Brecha entre la Ambición Digital y la Ineptitud Operacional.Fallo Sistémico (Systemic Failure): Se reporta un "fallo sistémico en la protección de la infraestructura críti…
  continue reading
 
Analysis of Systemic Cybersecurity Failures in the Uruguayan GovernmentExecutive Summary This briefing analyzes a series of large-scale data breaches targeting Uruguayan government entities, which starkly contradict the nation's reputation as a digital leader in Latin America. Key findings reveal a systemic failure to protect citizen data and criti…
  continue reading
 
Anonymous: We Are Legion. Expect Us. Dive into the chaotic world of Anonymous, the decentralized computer hacker group and serious political movement that became known as the "final boss of the internet". Anonymous is a collective of nameless, faceless folks who have achieved significant geopolitical impact worldwide. They are characterized as the …
  continue reading
 
Title: The Strategic Paradox: Inside Peru's Escalating Cyber Crisis—From Hacktivism to RaaS Extortion Description: In this episode, we dive deep into the dramatic escalation of cyber threats gripping Peru, a nation where rapid digital integration has consistently outpaced the development of national institutional capacity and legal enforcement, cre…
  continue reading
 
The Prophet and the Storm Cybersecurity expert Alberto Daniel Hill delivers an unflinching analysis of the moment Uruguay’s celebrated reputation as a digital pioneer collapsed, arguing that the catastrophic 2025 BHU ransomware attack was not an isolated event, but the inevitable payment for years of accumulated "national cyber debt". This episode …
  continue reading
 
The BHU Data Breach: How Uruguay’s Digital Star Fell Victim to the Crypto24 Ransomware and 95% Weak Passwords In September 2025, the state-owned Banco Hipotecario del Uruguay (BHU) suffered a catastrophic systems failure. While the institution quickly minimized the event as a manageable "incidente informático" or "problema técnico", cybersecurity e…
  continue reading
 
Truth Inside BHU Cyberattack In this explosive episode, cybersecurity expert and renowned critic Alberto Daniel Hill rips apart the official narrative surrounding the catastrophic double-extortion ransomware attack on the Banco Hipotecario del Uruguay (BHU) that began in late September 2025. When the state-owned bank shut down its systems, official…
  continue reading
 
Hipotceario del Uruguay (BHU), where authorities characterized a massive 700GB data theft and extortion bythe group Crypto24 The source provides a forensic and geopolitical analysis of two major cyber incidents in Uruguay, contrasting the official institutional narratives with the detailed technical perspectives of security expert Alberto Hill. The…
  continue reading
 
⬥GUEST⬥ Walter Haydock, Founder, StackAware | On Linkedin: https://www.linkedin.com/in/walter-haydock/ ⬥HOST⬥ Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ No-Code Meets AI: Who’s Really in Control? As A…
  continue reading
 
In this episode of Unspoken Security, host A.J. Nash sits down with Lauren Zabierek, Senior Vice President for the Future of Digital Security at the Institute for Security and Technology. Together, they examine how the traditional view of national security often overlooks the people it seeks to protect. Lauren shares why national security must move…
  continue reading
 
Lawfare Public Service Fellow Michael Feinberg sits down with Jake Tapper, the lead Washington anchor for CNN, to discuss his new book, “Race Against Terror: Chasing an Al Qaeda Killer at the Dawn of the Forever War.” The book chronicles the investigation, prosecution, and ultimate conviction of Spin Ghul, an Al Qaeda operative who became the first…
  continue reading
 
This episode features Chidi Alams, CIO of Just Born — the company behind candy classics like Peeps, Mike and Ike, and Hot Tamales. Chidi shares how his team is using AI, automation, and smarter data systems to modernize operations, strengthen supply chain resilience, and double the business impact of technology. It’s a conversation about what it re…
  continue reading
 
This week, while Dave is on vacation, Ben Yelin, and Ethan Cook, N2K's Lead Analyst and editor of the Caveat newsletter, take the lead and share their stories. Ben's story is on the legal and ethical issues surrounding Sora, the tool being used to make AI-powered videos of deceased celebrities. Ethan covers the story about Taiwan’s security bureau …
  continue reading
 
In 'Access All Areas' shows we go behind the scenes with the crew and their friends as they dive into complex challenges that organisations face—sometimes getting a little messy along the way. We’re launching a special AI mini-series exploring how artificial intelligence is reshaping industries. Each episode dives into key themes like scaling AI, s…
  continue reading
 
What does it really take to be a CISO the business can rely on? In this episode, Sean Martin shares insights from a recent conversation with Tim Brown, CISO at SolarWinds, following his keynote at AISA CyberCon and his role in leading a CISO Bootcamp for current and future security leaders. The article at the heart of this episode focuses not on te…
  continue reading
 
What if the real breakthrough in AI isn’t the model itself, but the data that gives it knowledge? In this episode of Tech Talks Daily, I sit down with Edo Liberty, founder and Chief Scientist of Pinecone, to unpack how vector databases have quietly become the backbone of modern AI infrastructure. We explore why retrieval-augmented generation (RAG) …
  continue reading
 
Got a question or comment? Message us here! In this week’s #SOCBrief, Hickman and Peters break down Obscura ... a new ransomware variant making waves with aggressive evasion tactics, process terminations, and domain controller targeting. We cover what’s known so far, the risks it poses to businesses, and the key defenses every SOC should prioritize…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk How long could Flax Typhoon nestle silently in your networks? Join host Kim along with intelligence analysts John & Joey as they discuss: Velociraptor Abused in Ransomware Attacks (1:13) New Oracle E-business Suite Flaw (5:19) GitHub CamoLeak AI Attack (7:46) Year-Long Flax Typhoon ArcGIS Campaign (…
  continue reading
 
First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli AISA CyberCon Melbourne | October 15-17, 2025 Tim Brown's job changed overnight. December 11th, he was the CISO at SolarWinds managing security opera…
  continue reading
 
This week, Scott sat down with his Lawfare colleagues Benjamin Wittes, Kate Klonick, and newly-minted Senior Editor Molly Roberts to talk through the week’s big national security news stories, including: “Peace by Piece.” The first phase of the Trump administration’s peace plan for Gaza went into effect on Monday, resulting in the return of the las…
  continue reading
 
Introduction: The Whistleblower’s Paradox For most nations, the line between a state-sponsored cybersecurity expert and a state-prosecuted criminal is clear. In Uruguay, that line runs through one man: Alberto Daniel Hill. He is a figure first imprisoned by the state for ethically reporting a critical vulnerability, only to emerge as the nation’s m…
  continue reading
 
Preparado para: Supervisión del Sector Público e Iniciativas de Ciberresiliencia Analista: Alberto Daniel Hill (Analista de Ciberseguridad y Defensor de la Ciberjusticia) Fecha: Octubre de 2025 (Revisión Post-Incidente) El incidente de ciberseguridad dirigido a la Plataforma GURI (Gestión Unificada de Registros e Información) en octubre de 2025 rep…
  continue reading
 
1. Introducción: Contexto de la Crisis y la Declaración Oficial El 30 de septiembre de 2025, el Banco Hipotecario del Uruguay (BHU) fue el epicentro de un ciberataque de alto perfil que culminó con el apagón total de su red el 1 de octubre, paralizando operaciones y exponiendo una cantidad masiva de datos sensibles. Casi dos semanas después, en med…
  continue reading
 
Lawfare Contributor Mykhailo Soldatenko sits down with Serhii Plokhii, Harvard History Professor and a leading authority on the history of the Cold War and Ukraine, to discuss his new book, "The Nuclear Age: An Epic Race for Arms, Power and Survival," that tells a history of nuclear proliferation and international efforts to tame it. They discuss t…
  continue reading
 
Today’s guest is Mathias Cousin, Managing Director at Deloitte. With extensive experience in R&D transformation and regulated industry data strategy, Mathias joins Emerj Editorial Director Matthew DeMello to unpack what it really takes for enterprise leaders to deliver ROI from AI and data initiatives. Mathias also shares actionable guidance on bui…
  continue reading
 
What happens when an AI strategy meets the real-world complexity of healthcare, law, and finance? That’s the challenge at the heart of my conversation with Mark Sherwood, CIO of Wolters Kluwer, a global leader in professional information services. With over three decades in technology leadership across Microsoft, Symantec, and Nuance, Mark brings a…
  continue reading
 
It's time to retire NTLM - but how? Richard chats with Steve Syfuhs about the need and challenge of retiring an ubiquitous authentication protocol first used in the 1990s. While guidance to move away from NTLM has been available since 2010, it has only become feasible in the past couple of years, and Microsoft is now providing tooling to make the t…
  continue reading
 
How is the transition to passkeys going in 2025? 🔑 This week, we’re joined by Nick Steele from the Product team at 1Password to talk all things passwordless. He walks us through the current state of adoption and a brand-new standard that will change the way we move and share passkeys. In Crash Course, we break down public-key encryption — the power…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play