Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Digital Security Insights Podcasts
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Podcasts from The National Bureau of Asian Research (NBR) covering the critical issues that leaders need to understand – because the decisions they make matter and the stakes are high.
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
continue reading
Welcome to Cyber Insights, the podcast that bridges the worlds of networking and cybersecurity. From cutting-edge innovations in enterprise connectivity to the latest in digital defense, we break down the buzzwords and bring you actionable insights to secure and scale your systems. Whether you're an IT professional, business leader, or tech enthusiast, join us as we explore the critical intersection of networks and security, featuring expert conversations, industry trends, and real world str ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Insightful audio from the global tech advisory firm.
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Supply Shock, hosted by Pete Rizzo, The Bitcoin Historian, explores the latest Bitcoin news with a deep historical perspective. Featuring in-depth interviews with industry experts, each episode connects current events to key moments in Bitcoin history, revealing patterns, lessons, and insights shaping the future of digital assets.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
…
continue reading
SpyCast, the official podcast of the International Spy Museum, is a journey into the shadows of international espionage. Each week, host Sasha Ingber brings you the latest insights and intriguing tales from spies, secret agents, and covert communicators, with a focus on how this secret world reaches us all in our everyday lives. Tune in to discover the critical role intelligence has played throughout history and today. Brought to you from Airwave, Goat Rodeo, and the International Spy Museum ...
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Welcome to Smarter Online Safety: Protect, Empower, Transform—your go-to channel for digital security, AI productivity, and digital transformation. As cyber fraud, identity theft, and AI-driven risks grow, Jocelyn King, “The Queen of Online Safety,” is here to help you stay secure and thrive. A Top 10 Woman in Cybersecurity, speaker, and educator, she has been featured on Dr. Phil, prime-time news, international radio, and top podcasts. 💡 What You’ll Learn: ✔️ Protect yourself & your family ...
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
The Union is about the intersection between people, technology, and artificial intelligence. Get ready to be inspired and challenged as we ask questions, uncover insights, and share inspiring stories about digital ecosystems and automation.
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
👋 Welcome to Bizionic Technology Pvt Ltd! We specialize in providing top-notch Hire Talent, Marketing, Technologies, Cloud Consulting Services, and Security Solutions. Don't forget to check out our podcast for valuable insights. Visit our website at https://www.bizionictech.com for more information. Let's innovate together! 💡 #BizionicTech #InnovateWithUs
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Welcome to Silent Mode Cafe, the podcast where we translate the digital realm into plain English. From data privacy and basic internet security to smart home gadgets and the latest AI developments, we serve up tech insights with a side of caffeine.
…
continue reading
Red Dot Mindset is the official podcast of Grey Matter Ops, your tactical guide to surviving — and thriving — in a world where hesitation can cost you everything. Hosted using advanced AI narration and written by a decorated U.S. Air Force Security Forces veteran, each episode blends military-grade strategy with real-world self-defense, situational awareness, and survival psychology. Whether you're facing a street-level threat, a digital stalker, or just the daily grind of modern life, we’ll ...
…
continue reading
The Ciena Network Insights Podcast brings together thought leaders, subject matter experts, and tech influencers to discuss the innovations and trends shaping our digital world. Join us every month for engaging conversations on telecom networks, digital transformation, sustainability, and more.
…
continue reading
The Executive Insights podcast, brought to you by AWS (Amazon Web Services), features peer-to-peer conversations between business executives on innovating for growth, building resiliency, and shaping the future of their organizations. Learn more at AWS Executive Insights and follow us on LinkedIn. For video versions of these and other conversations, subscribe to our YouTube playlist.
…
continue reading
The Cloud and Clear podcast explores the journey of SADA at the tip of the spear in helping organizations transform the way their people work, and the way their industry goes to market in the context of Google Cloud. It features experts from SADA, partners, and our customers discussing and debating what digital transformation means in the real world.
…
continue reading

1
AI meltdowns, Gigabyte, NCSC, Rowhammer, Gravity Form, Grok, AsyncRat, Josh Marpet... - SWN #494
30:02
30:02
Play later
Play later
Lists
Like
Liked
30:02AI meltdowns, Gigabyte, NCSC, Rowhammer, Gravity Form, Grok, AsyncRat, Josh Marpet and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-494
…
continue reading

1
Top 10 Situational Awareness Questions Civilians Are Asking in 2025
22:29
22:29
Play later
Play later
Lists
Like
Liked
22:29In this empowering episode of Red Dot Mindset, we tackle the Top 10 Situational Awareness Questions Civilians Are Asking in 2025 — everything from how to detect if you're being followed, to the best legal self-defense tools, to training your brain for high-stress moments. Drawing from the expertise of Mickey Middaugh, a 24-year U.S. Air Force Secur…
…
continue reading

1
Mastering Automotive Cybersecurity Compliance: Integrated Strategies - PlaxidityX Ep 25
27:57
27:57
Play later
Play later
Lists
Like
Liked
27:57As cybersecurity regulations tighten across the automotive industry, OEMs and suppliers are under growing pressure to not only build secure vehicles but also prove compliance across their entire software and hardware stack. In this episode of Cars, Hackers, and Cyber Security, we explore the key strategies for mastering compliance with global autom…
…
continue reading

1
PP070: News Roundup – Scattered Spider Bites MSPs, Microsoft Rethinks Kernel Access, North Koreans Seem Good at Their Illicit Jobs
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03There’s lots of juicy stories in our monthly security news roundup. The Scattered Spider hacking group makes effective use of social engineering to target MSPs, Microsoft pushes for better Windows resiliency by rethinking kernel access policies for third-party endpoint security software, and the US Justice Department files indictments against alleg…
…
continue reading

1
Network Managed Services: What They Are & Why More Businesses Are Switching
19:53
19:53
Play later
Play later
Lists
Like
Liked
19:53In this episode of the Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray, Rory Higgins, and Ian Finlayson shine a light on one of the unsung heroes of modern IT - Network Managed Services. It’s not flashy. It’s not trending. But it is the foundation that keeps your business running. The team reflects on why more organisations -…
…
continue reading

1
AI in the Enterprise: Reshaping How Developers Work | EP 203
22:46
22:46
Play later
Play later
Lists
Like
Liked
22:46Is generative AI just another tool in the belt, or is it a fundamental transformation of the developer profession? We kick off a two-part special to get to the bottom of how AI is impacting the enterprise. SADA's Associate CTO of AI & ML, Simon Margolis, sits down with Ameer Abbas, Senior Product Manager at Google Cloud, for an insider's look at th…
…
continue reading

1
Canada Cyber Readiness: A Cross-Sector Imperative
17:29
17:29
Play later
Play later
Lists
Like
Liked
17:29This podcast dives into the Cyber Security Readiness Goals Cross-Sector Toolkit, providing essential insights for Canadian critical infrastructure owners and operators. We explore how organizations can prioritize investments and elevate their cyber security posture by understanding the 36 readiness goals. Each episode unpacks recommended actions, a…
…
continue reading

1
Bringing Humanity to Cybersecurity with Lea Kissner, CISO of LinkedIn
18:43
18:43
Play later
Play later
Lists
Like
Liked
18:43Lea Kissner, CISO of LinkedIn, describes the dangers of perverse metrics, the importance of phishing-resistant technologies, and the ongoing challenge of recruiting and retaining top talent in the field. Lea also explains how she deals with complex privacy issues at scale every day. Lea and Blake also touch on LinkedIn's efforts to balance security…
…
continue reading

1
Real Estate Digital Marketing Agency in Detroit
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21Real Estate Digital Marketing Agency in Detroit reveals 7 ways to grow your real estate business with SEO, social media, ads & more. Learn how now!
…
continue reading

1
Aggregate, Curate, Extend: How To Build an Enterprise Data Foundation
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37In this episode, we catch up with Mai-Lan Tomsen Bukovec, VP of Technology at AWS, as she reveals three transformative approaches to enterprise data management: aggregate, curate, and extend. Drawing from her extensive experience leading AWS data services, Mai-Lan shares how organizations can build flexible, scalable data foundations that enable bo…
…
continue reading

1
From Intel Officer to White House Adviser: A Chat with The Museum’s Executive Director
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03This week we spoke with the International Spy Museum's Executive Director, Colonel Chris Costa. His decades-long career in the intelligence community spanned multiple continents, running sensitive operations in Panama, Bosnia, Iraq, and Afghanistan, where he earned two Bronze stars for his human intelligence contributions. Later, Costa advised Navy…
…
continue reading
The annual Kagan Media and Telecom Summit in New York is in the books and it not only covered a lot of market activity, but it was also surrounded by a number of media and sports rights headlines. Justin Nielson, Eric Keith, Scott Robson and Seth Shafer joined host Eric Hanselman to look at what was covered in the expansive event and the time aroun…
…
continue reading

1
Getting Started with Security Basics on the Way to Finding a Specialization - ASW #339
1:07:50
1:07:50
Play later
Play later
Lists
Like
Liked
1:07:50What are some appsec basics? There's no monolithic appsec role. Broadly speaking, appsec tends to branch into engineering or compliance paths, each with different areas of focus despite having shared vocabularies and the (hopefully!) shared goal of protecting software, data, and users. The better question is, "What do you want to secure?" We discus…
…
continue reading

1
Why Immutable Snapshots Matter for Compliance and AI - with Neil Bhandar of Generac
30:33
30:33
Play later
Play later
Lists
Like
Liked
30:33Neil Bhandar, Chief Data Analytics Officer for Generac. Generac is a U.S.-based industrial manufacturer that designs and produces a wide range of power solutions—including portable, residential standby, commercial, and industrial generators, along with automatic transfer switches and related accessories. Neil joins Emerj Editorial Director Matthew …
…
continue reading

1
Securities Laws Are Broken & The Market Structure Bill Will Fail | Patrick Murck
1:10:43
1:10:43
Play later
Play later
Lists
Like
Liked
1:10:43In this episode, Founder & CEO of Surus.io Patrick Murck joins the show to reflect on Bitcoin’s rise to a fresh all-time high, its original mission of financial autonomy, and the tension between price appreciation and real-world use. He discusses stablecoins as dollar-compatible tools, why market structure reforms are stalled, and how his new compa…
…
continue reading

1
AI for Driving Quality Customer Interactions in Distributor Models - with Joshua Haddock of Herbalife
27:13
27:13
Play later
Play later
Lists
Like
Liked
27:13Today’s guest is Josh Haddock, Director of Contact Center Technology at Herbalife. Herbalife is a global health and wellness company that develops and sells nutritional products, personal care items, and weight management solutions through a network of independent distributors. With operations in over 90 countries, Herbalife combines direct selling…
…
continue reading

1
Breaking the Doom Loop in IT Service Management - with Phil Christianson of Xurrent
30:33
30:33
Play later
Play later
Lists
Like
Liked
30:33Today’s guest is Phil Christianson, Chief Product Officer at Xurrent. Xurrent is an IT service management platform that helps large organizations coordinate incident response and improve system reliability. They serve clients across healthcare, government, and financial services and are known for their focus on post-incident accountability and auto…
…
continue reading

51
Argentina's Shifting Cyber Landscape: From Hacktivism to Financial Crime
54:37
54:37
Play later
Play later
Lists
Like
Liked
54:37The provided text offers a comprehensive analysis of Argentina's evolving cybersecurity landscape, tracing its origins from the resourceful "life hacker" culture born out of the 2001 economic crisis to the present day. It highlights a significant shift from ideologically driven hacktivism to financially motivated cybercrime, exemplified by major da…
…
continue reading

51
Latin American Cyber Threats Groups, Individuals, and Trends
51:16
51:16
Play later
Play later
Lists
Like
Liked
51:16Latin American Cyber Threats Groups, Individuals, and Trends. The provided sources collectively offer a comprehensive overview of the escalating cyber threat landscape in Latin America, highlighting its emergence as a critical region for malicious cyber activity. They explain that this surge in cyber incidents is driven by a combination of rapid di…
…
continue reading

1
3347: Bitsight on the Hidden Risks Inside Global Supply Chains
37:56
37:56
Play later
Play later
Lists
Like
Liked
37:56When we talk about cybersecurity, it’s often easy to think in terms of firewalls, passwords, and high-profile breaches. But what happens when the vulnerability isn’t within your own systems but somewhere deep in your third or fourth-tier supply chain? In this episode, I spoke with Ben Edwards from Bitsight about the unseen infrastructure propping u…
…
continue reading

1
Healthline hit with largest CCPA penalty to date | NY tightens teen privacy rules | Microsoft faces EU lawsuit
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35Send us a text 📢 In Privacy News This Week: 🔹 Healthline fined $1.55M under CCPA – for failing to honor opt-outs, misconfigured cookie banners, and sharing sensitive health data without proper contracts or purpose limitation. 🔹 NY cracks down on teen tracking – AG guidance confirms NY Child Data Protection Act bans behavioral ads unless strictly ne…
…
continue reading
This podcast provides an insightful look into the Security Information Service (BIS) of the Czech Republic, detailing its crucial efforts in safeguarding the nation's security during 2024. We explore the persistent threats posed by Russia through "Telegram agents," cyberattacks, and influence operations, and the challenges from China concerning esp…
…
continue reading

1
Monzy Merza, How Much AI is Too Much, and the Weekly News - Monzy Merza - ESW #415
1:43:41
1:43:41
Play later
Play later
Lists
Like
Liked
1:43:41Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' p…
…
continue reading

1
Turning Healthcare Innovation into Real Patient Impact - with Brad Kennedy of Orlando Health
24:17
24:17
Play later
Play later
Lists
Like
Liked
24:17Today’s guest is Brad Kennedy, Senior Director of Business Solutions Strategy at Orlando Health — a not-for-profit healthcare organization headquartered in Florida. With years of experience leading innovation and patient experience programs in hospital systems, Brad joins Emerj Managing Editor Matthew DeMello on the show today to explore how health…
…
continue reading

151
LulzSec: Laughing at Your Security Since 2011
23:38
23:38
Play later
Play later
Lists
Like
Liked
23:38The provided text examines the hacking group LulzSec, detailing their brief but impactful existence in 2011. It highlights their shift from Anonymous due to differing ideologies and their self-proclaimed "gray hat" status, aiming to expose security vulnerabilities and prompt public questioning of data reliance. The source chronicles a series of hig…
…
continue reading

151
Putin's Bears: Russia's Cyber Warfare Tactics
44:24
44:24
Play later
Play later
Lists
Like
Liked
44:24This source recounts the history of cyberattacks attributed to Russian intelligence agencies, metaphorically referred to as "Putin's bears," detailing their methods and targets. It begins by describing the 2015 Bundestag hack by "Fancy Bear," which stole a significant amount of data from the German Parliament, including Angela Merkel's office. The …
…
continue reading

1
Urgent Cyber Threats: Citrix Exploit, Fortinet RCE, and AI Vulnerabilities
17:48
17:48
Play later
Play later
Lists
Like
Liked
17:48In this episode of 'Cybersecurity Today,' hosted by David Shipley from the Exchange Security 2025 conference, urgent updates are provided on critical cybersecurity vulnerabilities and threats. CISA mandates a 24-hour patch for Citrix NetScaler due to a severe vulnerability actively being exploited, dubbed 'Citrix Bleed.' Fortinet’s FortiWeb also fa…
…
continue reading

201
From Imprisonment to Influence_ How One Hacker Built a Media Empire from Injustice
5:12
5:12
Play later
Play later
Lists
Like
Liked
5:12podscan_qozfrBrgLDE4DVEV6kyvlO5grsYmJahr In the sprawling digital landscape, where authenticity is the most coveted currency, few stories are as compelling or as instructive as that of Alberto Daniel Hill. A cybersecurity expert from Uruguay, Hill’s trajectory from a respected professional to an imprisoned hacker, and his subsequent rebirth as a me…
…
continue reading

1
The Human Element Still Matters in a Quantum AI World
50:26
50:26
Play later
Play later
Lists
Like
Liked
50:26Send us a text Aksa Taylor shares her journey from electrical engineering to cybersecurity, highlighting how curiosity and focused passion can open unexpected career doors in the security industry. • Finding specific interests within cybersecurity rather than trying to "get into security" broadly • Building a personal brand through knowledge sharin…
…
continue reading

1
The Google Workspace Security Gap: Why Traditional Tools Fall Short
16:14
16:14
Play later
Play later
Lists
Like
Liked
16:14In this episode, we discuss the often overlooked security issues within Google Workspace. Rajan Kapoor, Field CISO at Material Security, joins us to talk about how Material Security is redefining the protection of documents, email accounts, and data in Google Workspace. We explore the unique challenges Workspace presents compared to traditional too…
…
continue reading

1
The Google Workspace Security Gap: Why Traditional Tools Fall Short
16:15
16:15
Play later
Play later
Lists
Like
Liked
16:15In this episode, we discuss the often overlooked security issues within Google Workspace. Rajan Kapoor, Field CISO at Material Security, joins us to talk about how Material Security is redefining the protection of documents, email accounts, and data in Google Workspace. We explore the unique challenges Workspace presents compared to traditional too…
…
continue reading

201
Cybersecurity: Vulnerability, Disclosure, and Responsibility
29:57
29:57
Play later
Play later
Lists
Like
Liked
29:57This conversation revolves around cybersecurity and the vulnerability of various systems, including medical devices and large corporate networks. The speakers discuss the challenges faced by cybersecurity researchers when reporting vulnerabilities to companies, often encountering dismissive responses and a lack of accountability. They highlight the…
…
continue reading
CYBERSECURITY - gatekeepers? Speakers Summary I'll proceed based on assuming that all statements without a clear speaker are being acknowledged by the moderator. - - Key contributions: Speaker 1: - The importance of taking calculated risks to achieve success. - Encouraging people to step out of their comfort zones and try new things. - Sharing expe…
…
continue reading

201
No Money, No Power, No Fame, Just Belief
32:10
32:10
Play later
Play later
Lists
Like
Liked
32:10This extensive audio transcript captures a lively and often chaotic Twitter Space discussion, revealing a dynamic conversation among several participants, notably Alberto, Charles, K, and Brittany. The core of their discussion revolves around personal anecdotes and challenges, ranging from technological issues like Wi-Fi problems and two-factor aut…
…
continue reading

201
El Burrito Rey: A Digital Odyssey of Connection and Creation
43:12
43:12
Play later
Play later
Lists
Like
Liked
43:12El "CYBERMIDNIGHT CLUB" de YouTube presenta un análisis profundo de una conversación de audio social llamada "king burrito.mpp3". Este análisis examina las complejidades de la interacción digital, incluyendo cómo las fallas técnicas afectan la experiencia del usuario y cómo las fallas de comunicación a menudo generan humor. La conversación también …
…
continue reading
Extractivismo colonial , LATAM 1
…
continue reading

201
Operation Bitcoins: Crypto Extortion and Cybercrime- Second part.
45:04
45:04
Play later
Play later
Lists
Like
Liked
45:04Operation Bitcoins: Crypto Extortion and Cybercrime- Second part.
…
continue reading

201
Alissa Knight: The World's First Cybersecurity TV Network
31:13
31:13
Play later
Play later
Lists
Like
Liked
31:13The source provides an interview transcript with Alissa Knight, a cybersecurity expert and entrepreneur, where she discusses her various ventures, primarily the upcoming launch of Knight TV Plus. This new streaming service, launching January 1st, will focus on cybersecurity content, including original series, documentaries, movies, and live broadca…
…
continue reading

201
Operation Bitcoins: Crypto Extortion and Cybercrime
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12The YouTube channel "CYBERMIDNIGHT CLUB" features an excerpt from the transcript of a police press release describing "Operation Bitcoins" in Uruguay. The operation was initiated after improper entry into a government system, where sensitive information was extracted. The investigation identified a systems engineer linked to one of the IPs, who was…
…
continue reading

1
3346: How Nexthink Is Rethinking IT Support with Proactive, AI-Driven DEX
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17IT support is changing fast, and the old service desk model is starting to feel like a relic from another era. In this episode, I spoke with Samuele Gantner, Chief Product Officer at Nexthink, about what comes next and what companies need to do now to prepare for it. With Nexthink sitting at the forefront of Digital Employee Experience (DEX) techno…
…
continue reading

201
Ultimate Guide to Cybersecurity and Hacking Podcasts
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09El texto ofrece una guía exhaustiva sobre el ecosistema de podcasts de ciberseguridad y hacking, describiendo su evolución desde transmisiones técnicas a narrativas sofisticadas. Organiza el contenido en cinco categorías principales: inmersiones narrativas, noticias y análisis semanales, programas técnicos, el elemento humano del engaño y briefings…
…
continue reading

1
El Desafío del CISO: Navegando los Primeros 101 Días y Estableciendo un Legado de Seguridad
7:53
7:53
Play later
Play later
Lists
Like
Liked
7:53El papel de un CISO se ha vuelto excepcionalmente complejo en los últimos diez años, especialmente con el auge del trabajo remoto y la creciente migración de datos a la nube, haciendo que los primeros 90 a 101 días en un nuevo puesto sean cruciales para establecer una base de seguridad sólida. Los nuevos CISOs enfrentan desafíos significativos como…
…
continue reading

251
Jonathan Scott - Full Episode - We are speaking about YOUR privacy and YOUR #HumanRightsViolated tonight. I will disclose the tools that @Apple has, and show you the truth...
3:13:25
3:13:25
Play later
Play later
Lists
Like
Liked
3:13:25We are speaking about YOUR privacy and YOUR #HumanRightsViolated tonight. I will disclose the tools that @Apple has, and show you the truth about what has been going on for a long time. VPN logs, Contacts, Emails, SMS logs, and much more. @jonathandata1 @adanielhill
…
continue reading

251
Data Analysis: Cybermidnight Club Podcast
26:41
26:41
Play later
Play later
Lists
Like
Liked
26:41The paper presents an analysis of the performance of a podcast titled "Cybermidnight Club" on Spotify, using Python code and the pandas library to process and clean data from a CSV file. Initially, the characteristics of the data are examined, including the type and number of non-null values in columns such as "Time (UTC)", "Plays", "Streams", "Hou…
…
continue reading

1
Dangerously Unprepared: Navigating Global Vulnerabilities
14:06
14:06
Play later
Play later
Lists
Like
Liked
14:06Based on the 2024 UN Global Risk Report, this episode explores how global stakeholders perceive critical risks and the international community's readiness to address them. It reveals that humanity remains "dangerously unprepared" for the most important global vulnerabilities, particularly mis- and disinformation, and clusters of environmental, soci…
…
continue reading