The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Digital Security Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Digital certificate industry veterans Tim Callan and Jason Soroko explore the issues surrounding digital identity, PKI, and cryptographic connections in today's dynamic and evolving computing world. Best practices in digital certificates are continually under pressure from technology trends, new laws and regulations, cryptographic advances, and the evolution of our computing architectures to be more virtual, agile, ubiquitous, and cloud-based. Jason and Tim (and the occasional guest subject ...
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
Daily Tech News
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
…
continue reading
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
The MERICS China Podcast, brought to you by the Mercator Institute for China Studies, a show that analyses current affairs in China and the latest developments in EU-China relations.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Stay current with news and technology advancements in the rapidly growing digital twin market segment.
…
continue reading
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
TrendsMD Welcome to TMLT’s podcast series that explores growing issues within the health care, technology, and medical liability arenas. Hosted by Tony Passalacqua of TMLT, TrendsMD attempts to bring greater focus to issues that face the health care community in Texas and beyond. We also identify industry trends and help policyholders navigate their medical liability coverage. Our episodes are dedicated to educating medical and administrative personnel on technology-based themes, including t ...
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Welcome to the Ctrl-Alt-Secure podcast, your guide to navigating the ever-changing landscape of cybersecurity. Join us as we delve into the latest trends, threats, and innovations shaping the infosec space.
…
continue reading

1
Job Scams, Corporate Espionage, and Digital Deception: Inside the Deepfake Crisis
1:16:30
1:16:30
Play later
Play later
Lists
Like
Liked
1:16:30Deepfake technology has evolved from a fringe novelty into one of the most serious cybersecurity and national security threats of our time. In this episode, we examine how artificial intelligence–generated synthetic media is being weaponized to impersonate CEOs, manipulate elections, infiltrate corporate networks, and damage reputations worldwide. …
…
continue reading

1
Doorbells, Dystopia, and Digital Rights: The Ring Surveillance Debate
18:55
18:55
Play later
Play later
Lists
Like
Liked
18:55In this episode, we examine Amazon’s Ring doorbell camera amid rising privacy concerns and policy changes. The Electronic Frontier Foundation’s recent report criticizes Ring’s AI-first approach and the rollback of prior privacy reforms, describing it as ‘techno authoritarianism.’ We also discuss a recent scare among Ring users on May 28, related to…
…
continue reading

1
July 27th, 2025: Microsoft Shifts Course on U.S. Defense Cloud Amid Security Concerns
16:15
16:15
Play later
Play later
Lists
Like
Liked
16:15Stay ahead on tech and cyber security updates with today's top stories. • A high-risk vulnerability in Wing FTP Server exploits CVE-2025-47812. • Chaos ransomware gang emerges after BlackSuit's takedown. • Data breaches hit Allianz Life and dating app Tea. • Microsoft's major policy shift in federal support. Don't miss this episode packed with cruc…
…
continue reading

1
Episode 460 - Contactless multimodal biometric software for digital identity
6:55
6:55
Play later
Play later
Lists
Like
Liked
6:55Blue Biometrics (Blue) was founded in Australia in September 2017, to develop world class contactless biometric technology, for dual use national security and commercial applications. Blue now also operates companies in the UK and the USA. Prior to founding Blue, the co-founders were involved in pioneering contactless technology. Blue Biometrics is…
…
continue reading
Tesla’s new futuristic diner promises food and fast charging. For nearby residents, it’s a neon nightmare that never sleeps. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Hannah Kenney: Focused on people. [Risk] [Career Notes]
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16Please enjoy this encore of Career Notes. Manager in BARR Advisory's Cyber Risk Advisory Practice, Hannah Kenney, shares her journey from never considering technology as a career to having it click in an informations systems class in college. After noticing she was the only one in the room who enjoyed the lecture, Hannah knew she wanted to go down …
…
continue reading

1
August 3rd, 2025: AI's Global Talent War & Tech Giants' Billion-Dollar Gambits
19:23
19:23
Play later
Play later
Lists
Like
Liked
19:23Today's episode dives into skyrocketing cyber threats, AI's meteoric rise, and disruptive U.S. tariffs. • Cybercrime reaches alarming heights, driving a massive breach surge. • AI giants like Meta race for AGI dominance, spending billions. • New U.S. tariffs send global market tremors. Tune in for all the critical developments in tech and security.…
…
continue reading
That cherished voicemail from a loved one isn’t safe forever. Here’s how to save it properly before your phone deletes it for good. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Layoffs used to be a corporate embarrassment. Now, CEOs are proudly slashing jobs as proof they’re all-in on AI. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
nOAuth-ing to see here. [Research Saturday]
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59This week, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications". Semperis researchers identified a critical authentication flaw known as nOAuth in 9 out of 104 tested SaaS applications integrated with Microsoft Entra ID. This low-complexi…
…
continue reading

1
August 2nd, 2025: Critical AI Vulnerabilities Uncovered in Tech's Coding Giants
25:42
25:42
Play later
Play later
Lists
Like
Liked
25:42Explore a high-severity vulnerability in AI tools and a surge in global cyberattacks. • 'CurXecute' flaw in AI code editor, Cursor, causes security panic. • 800% rise in credential theft from malware in 2025. • AI coding tools face a trust crisis, worsening 'security debt'. • US-Canada trade tensions and tariff impacts intensify. Tune in for more t…
…
continue reading
A new scam tricks riders into handing over account access. Here’s how to stay safe. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
A critical vulnerability in SUSE [SOO-suh] Manager allows attackers to run commands with root privilege. A joint CISA and U.S. Coast Guard threat hunt at a critical infrastructure site reveals serious cybersecurity issues. Healthcare providers across the U.S. report recent data breaches. Cybercriminals infiltrate a bank by physically planting a Ras…
…
continue reading

1
Rethinking APT Attribution: Dakota Cary on Chinese Contractors and Espionage-as-a-Service
1:51:42
1:51:42
Play later
Play later
Lists
Like
Liked
1:51:42Three Buddy Problem - Episode 56: China-focused researcher Dakota Cary joins the buddies to dig into China’s sprawling cyber ecosystem, from the HAFNIUM indictments and MSS tasking pipelines to the murky world of APT contractors and the ransomware hustle. We break down China’s “entrepreneurial” model of intelligence collection, why public visibilit…
…
continue reading

1
China's rise to global tech leadership, with James Kynge
19:58
19:58
Play later
Play later
Lists
Like
Liked
19:58In this episode, long-time Financial Times journalist and former MERICS Senior Fellow James Kynge joins Johannes Heller-John to look at China’s technological development in the last decades and ahead into the next ones. He talks about his work as a journalist in China since the mid-1980s and China’s rise as a technological power. James argues that …
…
continue reading
75% of this year's top computer engineering grads are rejecting Big Tech, choosing purpose over prestige. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Australia wants to keep kids off social media. But to do that, it may have to crack open everyone’s digital ID. Privacy advocates say this isn’t just about protecting children– it is about rewriting the social contract for the rest of us. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
Three free ways to speed up your computer
11:01
11:01
Play later
Play later
Lists
Like
Liked
11:01Is your old PC or Mac bogged down? Before you toss it out, try these pro tricks. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Critical Honeywell Experion PKS Vulnerabilities Threaten Global Industrial Control Systems
1:16:35
1:16:35
Play later
Play later
Lists
Like
Liked
1:16:35In this episode, we analyze the multiple vulnerabilities recently disclosed in Honeywell’s Experion Process Knowledge System (PKS), a widely deployed industrial control and automation solution that underpins operations in energy, chemical plants, manufacturing, healthcare, and transportation sectors worldwide. Reported by CISA and Positive Technolo…
…
continue reading

1
August 1st, 2025: AI's Energy Demand Outpaces State's Power in Wyoming
15:26
15:26
Play later
Play later
Lists
Like
Liked
15:26Today's tech news highlights big moves in cybersecurity, AI, and market trends. • Cyber threats escalate with attackers exploiting vulnerabilities faster. • Microsoft's Secret Blizzard espionage campaign targets foreign embassies. • Google's AI energy demands surpass those of entire states. • Figma's IPO rockets to a $45 billion market cap. Stay in…
…
continue reading
A sweeping malware campaign by North Korea’s Lazarus Group targets open source ecosystems. President Trump announces a new electronic health records system. A new report reveals deep ties between Chinese state-sponsored hackers and Chinese tech companies. Researchers describe a new prompt injection threat targeting LLMs via browser extensions. Palo…
…
continue reading

1
Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference | An ITSPmagazine Webinar: On Location Coverage with Sean ...
1:00:22
1:00:22
Play later
Play later
Lists
Like
Liked
1:00:22In this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025. Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shiftin…
…
continue reading

1
Auto-Color Linux Malware Exploits SAP Zero-Day CVE-2025-31324
36:36
36:36
Play later
Play later
Lists
Like
Liked
36:36In this episode, we uncover the Auto-Color Linux malware, a stealthy and highly persistent Remote Access Trojan (RAT) that is rapidly emerging as one of the most dangerous threats of 2025. First identified by Palo Alto Networks’ Unit 42 and later analyzed by Darktrace, Auto-Color has now been linked to active exploitation of CVE-2025-31324, a criti…
…
continue reading

1
Inside the July 2025 PyPI Phishing Scam: How Hackers Stole Developer Credentials
54:17
54:17
Play later
Play later
Lists
Like
Liked
54:17In this episode, we investigate the growing cybersecurity storm targeting the Python Package Index (PyPI) — the backbone of Python’s software distribution ecosystem. A recent phishing campaign in July 2025 has developers on high alert, as attackers impersonated PyPI using a deceptive domain (pypj.org) to trick maintainers into handing over their cr…
…
continue reading

1
Nathan Reid: Inside the High-Stakes World of Digital Forensics & Incident Response
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52Nathan Reid: Inside the High-Stakes World of Digital Forensics & Incident Response When a cyber incident strikes, every second counts. In the high-stakes world of Digital Forensics and Incident Response (DFIR), elite professionals like Nathan Reed work against the clock to uncover the truth, contain the damage, and get businesses back on their feet…
…
continue reading

1
IoT Security Crisis: Dahua Smart Camera Vulnerabilities Expose Surveillance Systems
1:02:05
1:02:05
Play later
Play later
Lists
Like
Liked
1:02:05In this episode, we examine the alarming discovery of critical security vulnerabilities in Dahua smart cameras, one of the world’s most widely deployed surveillance systems. Researchers at Bitdefender uncovered two zero-click flaws — CVE-2025-31700 and CVE-2025-31701 — that allow unauthenticated remote attackers to gain root access to Dahua devices…
…
continue reading
Millions use ChatGPT for support, even confessions. But unlike a therapist, what you say could be used against you. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Transforming Manufacturing with AI-Powered 3D Digital Twins and Remote Monitoring - with Rad Desiraju of Microsoft and Mike Geyer of NVIDIA
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29For decades, manufacturers have relied on traditional dashboards that often fell short when it came to understanding the complexity of real-time operations. In this episode of the ‘AI in Business’ podcast, Microsoft’s Rad Desiraju and NVIDIA’s Mike Geyer explore how AI-powered 3D digital twins and real-time simulation are transforming the way manuf…
…
continue reading
While Ben is on vacation this week, Dave welcomes back Ethan Cook to the show. On today’s episode, Ethan breaks down former President Trump’s recently released AI action plan, highlighting key priorities and what it could mean for the future of U.S. tech policy. Dave takes a closer look at the growing bipartisan support for AI regulation in Congres…
…
continue reading

1
#80- Are you keeping up with Data Governance post-AI?
26:21
26:21
Play later
Play later
Lists
Like
Liked
26:21AI is reshaping data governance—and raising big compliance questions. David W. Schropfer and Anthony Woodward unpack risks, silos, and solutions on DIY Cyber Guy.By Extra Something Media
…
continue reading
Are you being watched? Use these two tricks to spot hidden cameras anywhere. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Dropzone AI Secures $37M to Tackle Alert Fatigue with Autonomous SOC Analysts
17:11
17:11
Play later
Play later
Lists
Like
Liked
17:11In this episode, we dive into Dropzone AI’s landmark $37 million Series B funding round, bringing the company’s total raised to over $57 million. Backed by major investors, Dropzone AI is accelerating the development of its AI-powered SOC analysts — tools designed to autonomously investigate and resolve security alerts across critical threat catego…
…
continue reading

1
July 31st, 2025: Global Cyber War Heats Up as Zero-Day and AI Threats Soar
28:09
28:09
Play later
Play later
Lists
Like
Liked
28:09Dive into the digital realm as cyber threats escalate, AI demand surges, and big tech makes bold moves. • Zero-day exploits spike, targeting WordPress and SAP. • Meta debuts a video editor to rival CapCut. • AI's energy needs challenge U.S. power grids. • Palo Alto Networks sets a $25B acquisition in motion. Stay informed, stay secure—subscribe now…
…
continue reading
Officials in St. Paul, Minnesota declare a state of emergency following a cyberattack. Hackers disrupt a major French telecom. A power outage causes widespread service disruptions for cloud provider Linode. Researchers reveal a critical authentication bypass flaw in an AI-driven app development platform. A new study shows AI training data is chock …
…
continue reading

1
Axonius Buys Cynerio for $100M+: Closing Healthcare’s Biggest Cybersecurity Blind Spot
1:36:30
1:36:30
Play later
Play later
Lists
Like
Liked
1:36:30In this episode, we explore Axonius’s landmark acquisition of Cynerio, a healthcare cybersecurity company specializing in protecting vulnerable medical devices like MRI machines, infusion pumps, and ventilators. The deal — valued at over $100 million in cash and stock — marks Axonius’s first-ever acquisition and signals a major strategic expansion …
…
continue reading

1
Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Conversation with Sean Metcalf | Redefining CyberSecurity with Sean Martin
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:48⬥GUEST⬥ Sean Metcalf, Identity Security Architect at TrustedSec | On LinkedIn: https://www.linkedin.com/in/seanmmetcalf/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ Sean Metcalf, a frequen…
…
continue reading

1
Aligning Security Objectives, Ditch the Ego, Lead for Real and Succeed - BSW #406
29:45
29:45
Play later
Play later
Lists
Like
Liked
29:45In the leadership and communications section, The CISO code of conduct: Ditch the ego, lead for real, The books shaping today’s cybersecurity leaders, How to Succeed in Your Career When Change Is a Constant, and more! Show Notes: https://securityweekly.com/bsw-406
…
continue reading

1
Full CrushFTP Attack Chain, Plus BreachForums is Back!
27:44
27:44
Play later
Play later
Lists
Like
Liked
27:44Resources: https://linktr.ee/ReliaQuestShadowTalk Curious how the latest CrushFTP exploit works? Join host Kim along with intelligence analyst Hayden and threat hunter Leo as they discuss: BreachForums Back, XSS Out (1:28) Warlock Ransomware Hits SharePoint (5:28) Fire Ant Stings ESXi (9:39) ReliaQuest Uncovers CrushFTP Attack Chain (13:35 Kim Brom…
…
continue reading

1
Critical Lenovo Firmware Flaws Expose Millions to Persistent UEFI Attacks
42:00
42:00
Play later
Play later
Lists
Like
Liked
42:00In this episode, we examine a critical firmware security crisis shaking Lenovo devices worldwide. Security researchers at Binarly have uncovered six serious vulnerabilities in the Insyde BIOS firmware used in Lenovo’s IdeaCentre and Yoga product lines. Four of these flaws, rated high severity, reside in the System Management Mode (SMM) — a privileg…
…
continue reading

1
Spilling the Tea: What Happens When Apps Launch Without Locking Down Security ☕
13:23
13:23
Play later
Play later
Lists
Like
Liked
13:23Got a question or comment? Message us here! This week’s SOC Brief unpacks how a misconfigured cloud bucket exposed 72,000+ user images from the Tea app, complete with geolocation metadata and real IDs. From national security risks to doxxing fallout, we break down what went wrong and what your security team must do to avoid the same mistakes. Suppo…
…
continue reading

1
Season 2 E10: Breach Mode – How to Survive a Cyber Crisis | Red Sentry ft Casey Boggs
21:05
21:05
Play later
Play later
Lists
Like
Liked
21:05Ctrl-Alt-Secure Podcast: Breach Mode – How to Survive a Cyber Crisis Host: Valentina Flores (Red Sentry CEO) Special Guest: Casey Boggs (President, ReputationUs) Are you a CISO or CIO preparing your organization for the reputational fallout of a cyberattack? In this episode, we dive deep into the critical, often-overlooked side of cybersecurity: re…
…
continue reading
By Prof Bill Buchanan
…
continue reading

1
Promptfoo Secures $18.4M to Combat AI Security Threats in Generative AI
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50In this episode, we dive into Promptfoo’s groundbreaking $18.4 million Series A funding round, led by Insight Partners and supported by Andreessen Horowitz, bringing the AI security startup’s total funding to $23.4 million. Founded in 2024, Promptfoo has quickly emerged as a leader in securing Large Language Models (LLMs) and generative AI applicat…
…
continue reading

1
From Hacker to Hero: Hieu Minh Ngo's Journey
49:06
49:06
Play later
Play later
Lists
Like
Liked
49:06In this episode of the Security by Default podcast, host Joe Carson interviews Hieu Minh Ngo, a former cyber-criminal turned cybersecurity advocate. Hieu shares his journey from a curious teenager in Vietnam to a successful hacker, his time in prison, and his eventual redemption as he now works to help others avoid the pitfalls he faced. He discuss…
…
continue reading
ChatGPT’s new tool explains what’s wrong with your computer without upselling or spying on you. Nice! Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Building Storage Strategies That Scale with AI Workloads - with Bryan Willett of Lexmark
17:49
17:49
Play later
Play later
Lists
Like
Liked
17:49Today’s guest is Bryan Willett, Chief Information Security Officer at Lexmark, joining Emerj Senior Editor Matthew DeMello to explore how organizations can navigate the trade-offs between cloud and on-prem AI deployments—balancing speed to market, cost efficiency, and the protection of sensitive data. Bryan also emphasizes the importance of a stron…
…
continue reading

1
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?
2:58:21
2:58:21
Play later
Play later
Lists
Like
Liked
2:58:21Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hack…
…
continue reading