Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

101
Click Here

Recorded Future News

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
“Pod Save America” cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obama’s National Security Council. On “Pod Save the World,” he and former deputy national security adviser Ben Rhodes break down the latest global developments and bring you behind the scenes with the people who were there. New episodes every Wednesday. Subscribe to Friends of the Pod! Your subscription makes Crooked’s work possible and gives ...
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
Artwork

1
Cyber Work

Infosec

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
ISACA Podcast

ISACA Podcast

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
  continue reading
 
Artwork

1
Browsing Security

LayerX Security

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
  continue reading
 
Artwork

1
Talking Geopolitics

Geopolitical Futures - Geopolitics from George Friedman and his team at GPF

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A non-partisan podcast brought to you by Geopolitical Futures, an online publication founded by internationally recognized geopolitical forecaster George Friedman. Geopolitical Futures tells you what matters in international affairs and what doesn’t. Go to https://geopoliticalfutures.com/podcast for details.
  continue reading
 
Artwork

1
Carnegie Connects

Carnegie Endowment for International Peace

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Carnegie Connects is our premier virtual event series hosted by Aaron David Miller. Every other week, he tackles the most pressing foreign policy issues of the day in conversations with journalists, policymakers, historians, and experts.
  continue reading
 
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
  continue reading
 
Artwork

1
Security & GRC Decoded

Raj Krishnamurthy

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
  continue reading
 
Artwork
 
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork

51
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Artwork
 
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
  continue reading
 
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
  continue reading
 
Artwork

51
At The Boundary

Global and National Security Institute

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
  continue reading
 
Artwork

1
Future Energy Insights

World Future Energy Summit

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Bringing together industry leaders, innovators and global thinkers, Future Energy Insights by the World Future Energy Summit takes an in-depth look at renewable energy and sustainability. Featuring lively debate and passionate discussion, the series covers six core topics: clean energy, water scarcity, smart cities, circular economies, waste management and climate change. It shines a spotlight on the critical issues and major gamechangers shaping the sector today.
  continue reading
 
Artwork

1
The Watchers

Sentinel Blue

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Artwork

1
The Realignment

The Realignment

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
The United States is in the midst of a dramatic political realignment with shifting views on national security, economics, technology, and the role of government in our lives. Saagar Enjeti and Marshall Kosloff explore this with thinkers, policymakers, and more.
  continue reading
 
Loading …
show series
 
What happens when your cybersecurity team is running during a natural disaster, with no power, no cooling, and 40°C outside? In this episode, Nigel Hedges, GM – Cyber & Risk at Chemist Warehouse, joins Tom Finnigan and Jason Murrell to talk about what cyber security really looks like inside a major retail environment. With a career shaped by enterp…
  continue reading
 
Peace Through Strength podcast with ASCF Sr. Analyst Laurence Sanford and guest Captain Peter Petrelius (U.S. Navy Retired). Captain Petrelius said there is a lack of mariners and merchant vessels. He also states that U.S. shipyards need to be updated. China is outpacing the U.S. in shipping, shipyards, and building. Please subscribe to our newslet…
  continue reading
 
In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Matt Muller, Field CISO at Tines. With over a decade of experience at companies like Material Security, Coinbase, and Inflection, Matt’s got a strong track record of scaling SecOps teams, building threat detection and mitigation programs, and driving trust and …
  continue reading
 
Navigating the intricacies of Social Security can feel like deciphering a complex puzzle... But what if you had expert guides to help secure your financial future? In this episode, John Curry and April Schoen explore the vital aspects of Social Security retirement benefits, offering insights on how to maximize them for a secure retirement amidst th…
  continue reading
 
Episode Summary Jeremy Snyder is the co-founder and CEO of FireTail, a company that enables organizations to adopt AI safely without sacrificing speed or innovation. In this conversation, Jeremy shares his deep expertise in API and AI security, highlighting the second wave of cloud adoption and his pivotal experiences at AWS during key moments in i…
  continue reading
 
Join us as we explore the transformative changes in software development and cybersecurity due to AI. We discuss new terminology like ‘vibe coding’ — a novel, behavior-focused development approach, and ‘MCP’ (Model Context Protocol) — an open standard for AI interfaces. We also address the concept of ‘slopsquatting,’ a new type of threat involving …
  continue reading
 
The U.S. decision to recuse itself from European security has created something of a crisis on the continent. America wants European countries to pick up their own defense spending and focus on their own region, following Vladimir Putin's 2022 invasion of Ukraine. So what’s the feeling in Europe about the risks countries there face from Russia? How…
  continue reading
 
The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
  continue reading
 
Abundance vs. Populism Polling: Poll: Democratic voters prefer "populism" over "abundance" REALIGNMENT NEWSLETTER: https://therealignment.substack.com/ PURCHASE BOOKS AT OUR BOOKSHOP: https://bookshop.org/shop/therealignment Email Us: [email protected] Steve Teles, Johns Hopkins University Professor and Niskanen Center Senior Fellow, returns…
  continue reading
 
An international law enforcement operation dismantles AVCheck. Trump’s 2026 budget looks to cut over one thousand positions from CISA. Cyber Command’s defensive wing gains sub-unified command status. A critical vBulletin vulnerability is actively exploited. Acreed takes over Russian markets as credential theft kingpin. Qualcomm patches three active…
  continue reading
 
Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Ed Williams, Vice President of EMEA Consulting and Professional Services (CPS) at TrustWave, shares his two decades of pentesting and red teaming experience with Cyber Work li…
  continue reading
 
Text the ATB Team! We'd love to hear from you! In this episode of At the Boundary, Dr. Andrew Whiskeyman sits down with Milo McBride of the Carnegie Endowment for International Peace to explore one of the most consequential issues in global security today: the race for critical minerals and the future of energy transition. From solar and battery in…
  continue reading
 
What happens when you cross a Tamagotchi with a Wi-Fi hacking tool? You get the Pwnagotchi—a pocket-sized device that "feeds" on Wi-Fi handshakes and learns from its environment. In this episode, Jayden Troffler and Cameron Birkland join the crew to demonstrate how this deceptively cute device can passively capture encrypted Wi-Fi credentials from …
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
Ever worried about hidden cameras in Airbnb rentals? You’re not alone! In this episode, we explore the unsettling rise of hidden cameras in personal spaces, the inadequacy of current laws, and practical tips to detect surveillance devices. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they share insights and discuss the implications of v…
  continue reading
 
Please enjoy this encore of Career Notes. Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, Brandon Karpf, knew he wanted to join the military at a young age. He achieved that through the US Naval Academy where he was a member of the men’s heavyweight rowing team. Commissioned as a cryptologic warfare officer, Brandon was sent to M…
  continue reading
 
This week, we are joined by John Hammond, Principal Security Researcher at Huntress, who is sharing his PoC and research on "CVE-2025-30406 - Critical Gladinet CentreStack & Triofox Vulnerability Exploited In The Wild." A critical 9.0 severity vulnerability (CVE-2025-30406) in Gladinet CentreStack and Triofox is being actively exploited in the wild…
  continue reading
 
Join us for a stroll down patch memory lane! Ivanti's Chris Goettl invites an old colleague to the show -- Eric Schultze, a former software development leader at Amazon, Microsoft, and Shavlik Technologies -- to look back on the early days of Patch Tuesday and how patch management has evolved over the decades since. Join the conversation online on …
  continue reading
 
SentinelOne suffers a global service outage. A major DDoS attack hits a Russian internet provider. U.S. banking groups urge the SEC to scrap cybersecurity disclosure rules. Australia mandates reporting of ransomware payments. Researchers uncover a new Browser-in-the-Middle (BitM) attack targeting Safari users. A Florida health system pays over $800…
  continue reading
 
AI Finds an 0-Day!, Postman Leaking Secrets, High Agency Mental Model, My Unified Entity Context Video, Github MCP Leaks Private Repos, Google vs. OpenAI vs. Apple on AI Vision, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclusive…
  continue reading
 
For years, North Korea has quietly dispatched an army of IT workers overseas—not to innovate, but to infiltrate. Disguised as freelancers, they apply for jobs, breach systems, and wire stolen funds back to Pyongyang. This week, a rare conversation with one of them—a defector—about the regime’s digital underworld, and the personal toll of escaping i…
  continue reading
 
This episode will explore human-centric design in smart buildings. As technology reshapes the spaces we use, the focus is shifting towards ensuring that our built spaces enhance human well-being, productivity, and connectivity. During this podcast, we will discuss how smart buildings will be increasingly expected to adapt to human needs. We’ll expl…
  continue reading
 
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
  continue reading
 
Earlier this week, thousands of Palestinians stormed an aid distribution site in Gaza, underlining the ongoing humanitarian crisis there and prompting the question: Why isn’t the world doing more? Martin Griffiths served as the undersecretary-general for humanitarian affairs and emergency relief coordinator at the United Nations from 2021 until 202…
  continue reading
 
Children’s DNA in criminal databases. ASUS routers get an unwanted houseguest. New APT41 malware uses Google Calendar for command-and-control. Interlock ransomware gang deploys new Trojan. Estonia issues arrest warrant for suspect in massive pharmacy breach. The enemy within the endpoint. New England hospitals disrupted by cyberattack. Tim Starks f…
  continue reading
 
While the Trump administration was eager to jettison the Obama-era Iran nuclear deal in its first term, it now seems serious about negotiating another agreement in its second. And Iran, though wary of that seriousness and fearful of U.S. military action, appears willing to give negotiations a chance. What are the prospects for success and the appet…
  continue reading
 
Is it time to rethink SOC 2? (Spoiler: Adam thinks so—and he’s got the receipts.) In this insightful episode of Security & GRC Decoded, Adam Brennick, Director of Security Risk & Compliance at Cockroach Labs, joins Raj to challenge the status quo of SOC 2, compliance culture, and how GRC teams should operate in a modern, engineering-driven world. W…
  continue reading
 
It’s hard to find a region facing as much widespread turmoil as the Middle East, both historically and in the modern world. As Geopolitical Futures’ contributing analyst Hilal Khashan predicts, the Middle East will continue to oscillate between established and rising regional powers, with more turbulent times ahead. Hilal joined George Friedman for…
  continue reading
 
Sponsor: HivePro (www.hivepro.com) EP67: Threat Exposure Clarity, CISO Certification Origins & Startup Security Strategy Live from CISO XC DFW, this episode of The Professional CISO Show features two powerhouse conversations. First, David Malicoat sits down with Critt Golden of Hive Pro to demystify Continuous Threat Exposure Management (CTEM) and …
  continue reading
 
How is the re-elected Labor Government expected to approach national security and foreign policy in its new term of office? Can Australia strike a sustainable balance between its alliance with the United States and its complex relationship with China? Is the future of the AUKUS agreement secure? What more can the government do to strengthen Austral…
  continue reading
 
Post-Neoliberalism Conference: Beyond Neoliberalism REALIGNMENT NEWSLETTER: https://therealignment.substack.com/ PURCHASE BOOKS AT OUR BOOKSHOP: https://bookshop.org/shop/therealignment Email Us: [email protected] Historians Gary Gerstle and Noam Maggor, organizers of the Beyond Neoliberalism conference, join The Realignment. Marshall, Noam,…
  continue reading
 
The Czech Republic accuses Chinese state-backed hackers of cyber-espionage. CISA’s leaders head for the exits. Cybercriminals are using fake AI video generator websites to spread malware. A stealthy phishing campaign delivers the Remcos RAT via DBatLoader. A fake Bitdefender website spreads malware targeting financial data. Medusa ransomware claims…
  continue reading
 
We are in the midst of an unprecedented technological boom, and the catalyst for this revolution is none other than artificial intelligence (AI). The applications of AI in security are near limitless, and several industries—from education to healthcare to city planning—are already using AI integrations to better secure their facilities. Secure Our …
  continue reading
 
In this episode of the Security Repo Podcast, Thomas Jost shares his journey from software development to becoming a Senior Application Security Engineer, offering insights into the value of diverse tech backgrounds in AppSec. He discusses the real-world friction between security practices and developer workflows, especially around static analysis …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play