A critical look at new technologies, new approaches and new ways of thinking, from politics to media to environmental sustainability.
…
  continue reading
Future Secured Podcasts
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
  continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
  continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
  continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
  continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and  ...
…
  continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
  continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
  continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
  continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
  continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
  continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
  continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
  continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
  continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
  continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
  continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
  continue reading
The Future of Life Institute (FLI) is a nonprofit working to reduce global catastrophic and existential risk from powerful technologies. In particular, FLI focuses on risks from artificial intelligence (AI), biotechnology, nuclear weapons and climate change. The Institute's work is made up of three main strands: grantmaking for risk reduction, educational outreach, and advocacy within the United Nations, US government and European Union institutions. FLI has become one of the world's leading ...
…
  continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
  continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
  continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
  continue reading
CNA's experts understand today's complex and dynamic national security environments. On CNA Talks, you'll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today's national security landscape.
…
  continue reading
Security isn’t about luck—it’s about strategy. In this podcast, we break down how to protect your home, family, and business from threats most people don’t even think about. We’re not here to fuel fear—we’re here to help you prepare. Hosted by security professionals, Michael Johnson, a retired law enforcement captain with 29 years of experience and James Kerr an expert from Boss Security Screens, this podcast delivers real, no-nonsense advice. We know what truly stops burglars—not just locks ...
…
  continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
  continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
  continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
  continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
  continue reading
Stay up to date with the Nextcloud community!
…
  continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
  continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
  continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
  continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
  continue reading
The Security Briefing is the official podcast from the organisers of The Security Event. Each episode brings together industry leaders, innovators, and frontline professionals to discuss the latest trends, technologies, and challenges shaping the future of security. From cyber to physical, strategy to innovation, this is your inside track on the issues that matter most to security professionals today.
…
  continue reading
The Security Bench offers insightful discussions on the latest cybersecurity concerns, innovations, technologies and so much more. My name is Duronke and I'm a Cloud & Enterprise Security Practitioner. I help FTSE100 companies protect themselves from IT related risk.
…
  continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
  continue reading
Interviews and Discussions With Fascinating People Who are Creating A Better Tomorrow For All Of Us - Host - Ira S. Pastor
…
  continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
  continue reading
1
Why Window Bars No Longer Work: The Future of Home Security
28:49
28:49
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
28:49Is your home actually secure? In this episode, James Kerr from Boss Security Screens breaks down the evolution of home protection — from outdated window bars and rolling shutters to the latest generation of stainless steel security mesh. You’ll learn: • Why Gen 1 & Gen 2 solutions are no longer enough • What makes Gen 3 screens hurricane-rated, ADA…
…
  continue reading
1
The Future Hides In Plain Sight: Will We See It In Time?
56:53
56:53
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
56:53Send us a text We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience. • mapping careers toward emerging security domains • zero trust for satellites and pat…
…
  continue reading
1
EP 149 Saboteurs in the Boardroom: The Hidden Forces Behind Your Decisions and The Future of Human-Centric Leadership with Jennifer Selby-Long Founder & CEO Selby LLC
49:32
49:32
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
49:32Send us a text “Predictability doesn’t make you weak — it’s what frees your brain to lead with strength. The more predictability you build, the more resilient your people become.” JSL. 🎙️ Podcast Summary: “Rewiring Resilience: From Surviving to Thriving” In this powerful episode of The Security Circle, Yolanda “YoYo” Hamblen sits down with Jennifer…
…
  continue reading
1
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring —  Episode 4 | A Musing On the Future of Cybersecurity ...
3:38
3:38
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
3:38Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself. This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity. 🔍 In this episode: A 188% surge in malicious open-source packages (Sonatype 2025) 30% of 2024 cyberattacks…
…
  continue reading
1
Identity-based Cyber: Jasson Casey on Beyond Identity and the Future of Cybersecurity
41:58
41:58
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
41:58In episode 45, we sit down with Jasson Casey, CEO and Co-Founder of Beyond Identity, to explore how identity has become the new perimeter in cybersecurity. With over two decades of experience across security, networking, and software-defined infrastructure, Jasson unpacks why traditional defenses are failing and how the next generation of identity …
…
  continue reading
1
A Day In The Life Of A CISO - What They Don't Tell You / Future Secured Ep 48
45:53
45:53
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
45:53In this episode of Future Secured, Jason Murrell and Tom Finnigan are joined by David Gee, a renowned technology executive, author and cybersecurity board advisor, to reflect on how the role of cyber leadership has evolved from firefighting to business enablement. Drawing on his experience as CISO for HSBC Asia Pacific, Global Head of Tech and Cybe…
…
  continue reading
1
Coding by Vibe: The Future of AI-Built Security with Ron Eddings
20:22
20:22
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
20:22When code meets intuition, innovation gets personal. But what happens when we let AI vibe with our ideas? In this episode, Ron Eddings covers the rise of AI-driven development from Vibe Coding, where natural language shapes real code, to the emerging Model Context Protocols (MCPs) that redefine how apps talk to AI. He breaks down the recent Figma M…
…
  continue reading
1
Is Sora 2 the Future of Video? AI, Copyright, and Privacy Issues
22:41
22:41
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
22:41OpenAI’s Sora 2 is here — and it’s not just another AI toy. This episode explores how Sora 2 works, how users can insert almost anything into generated content, and why that’s raising alarms about privacy, identity, and copyright. We walk you through the initial opt-out copyright controversy, the backlash from studios and creators, and how OpenAI i…
…
  continue reading
1
The Cyber Guild: Empowering the Future of Cybersecurity
23:10
23:10
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
23:10In an era where cybersecurity challenges demand diversity, creativity, and resilience, The Cyber Guild is more than an organization—it’s a movement. For professionals pursuing or holding security clearances, the Guild’s community-driven, inclusive approach is a powerful complement to technical expertise. Whether you're transitioning from government…
…
  continue reading
1
Privacy needs where you least expect it. [CISO Perspectives]
36:08
36:08
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
36:08When discussing privacy risks, many often look to implementing strong encryption, secure data storage practices, and data sanitization processes to help ensure sensitive information remains protected. Though these practices are good and should be prioritized, many often miss other key areas that need just as much focus. As the internet of things ha…
…
  continue reading
The FCC plans to roll back cybersecurity mandates that followed Salt Typhoon. The alleged cybercriminal MrICQ has been extradited to the U.S. Ransomware negotiators are accused of conducting ransomware attacks. Ernst & Young accidentally exposed a 4-terabyte SQL Server backup. A hacker claims responsibility for last week’s University of Pennsylvani…
…
  continue reading
1
Ariel Garten - Co-Founder, MUSE by InterAxon - Non-Invasive Neurotechnology To Advance Human Health
37:49
37:49
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
37:49Send us a text Ariel Garten is a neuroscientist, innovator, and entrepreneur whose driving purpose is to empower and help others overcome mental obstacles in order to live healthy, happy lives and reach their maximum potential, by harnessing real-time brain data to improve focus, relaxation, and meditation. Ariel is Co-Founder of InteraXon, the mak…
…
  continue reading
1
From Nixon to Bush: Why U.S. Foreign Policy Fails at Coordination
48:59
48:59
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
48:59Text the ATB Team! We'd love to hear from you! In this episode of the At the Boundary podcast, GNSI’s Senior Director, Jim Cardoso, interviewed Fabio van Loon about his latest publication on the topic of the pitfalls and challenges of U.S. foreign policy, specifically with interagency coordination. Fabio explained his paper’s focus on three differe…
…
  continue reading
1
A Career Change Guide for Intel, Military, Foreign Affairs, & NatSec Professionals
19:39
19:39
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
19:39Where do spies, diplomats, soldiers, and FBI agents turn when their official service comes to an end? For most, full retirement isn’t an immediate option. The choice to step away from government service is difficult enough—deciding what comes next can feel even harder. Author and Career Coach Alison P. Bouwmeester knows this journey firsthand. She …
…
  continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
  continue reading
Violence and Intimidation against women and girls is a societal problem that needs a whole society response. It is everyone’s business to want to see and drive the changes needed to promote safer communities that will allow them to prosper and flourish. We need to see a collective and cohesive response beyond law enforcement, driven by society, bus…
…
  continue reading
1
OpenAI’s ChatGPT Atlas: What It Means for Cybersecurity and Privacy
15:13
15:13
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
15:13In this episode, we explore OpenAI’s groundbreaking release GPT Atlas, the AI-powered browser that remembers your activities and acts on your behalf. Discover its features, implications for enterprise security, and the risks it poses to privacy. Join hosts Tom Eston and Scott Wright as they discuss everything from the browser’s memory function to v…
…
  continue reading
1
Arti Lalwani: Supporting and being the change. [Risk Management] [Career Notes]
8:28
8:28
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
8:28Risk Management and Privacy Knowledge Leader at A-LIGN, Arti Lalwani shares her story from finance to risk management and how she made the transition. Arti started her career in finance after graduating with a finance degree. Quickly learning the field was not for her, she decided to dip her toes into the tech world. She credits her mentors for hel…
…
  continue reading
1
Martin Moore and Thomas Colley, "Dictating Reality: The Global Battle to Control the News" (Columbia UP, 2025)
1:00:44
1:00:44
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:00:44From the United States to China and from Brazil to India, an authoritarian approach to news is spreading across the world. Increasingly, the media is no longer a check on power or a source of objective information but a means by which governments and leaders can propagate their versions of reality, however biased or false. In Dictating Reality: The…
…
  continue reading
1
Attack of the automated ops. [Research Saturday]
19:40
19:40
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
19:40Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vec…
…
  continue reading
1
LBMC Went to PCI Community Meeting - Here's What Everyone's Talking About
32:47
32:47
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:47What's everyone still talking about from the 2025 PCI Community Meeting? In this episode of Cybersecurity Sense, LBMC's PCI QSA team take you behind the scenes of one of the industry's most talked-about events sharing expert insights on vendor risk, AI's role in compliance, and what your org should be thinking about now. Don't miss practical tips, …
…
  continue reading
1
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen - Rob Allen - SWN #525
32:25
32:25
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:25AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
…
  continue reading
CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Lu…
…
  continue reading
1
The Future of Procurement: Real-Time Supply Chain Intelligence
53:20
53:20
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
53:20Every product a company ships depends on thousands of tiny decisions happening deep inside the supply chain. But most organizations are still making those decisions using stale spreadsheets, fragmented systems, and guesswork. In this episode, we explore how AI-driven procurement intelligence is changing the game – moving teams from reactive firefig…
…
  continue reading
Big Tech’s data centers are changing the landscape of small-town America, bringing new kinds of jobs and economic opportunity. This week, we hear from Shannon Wait, a data technician in South Carolina whose experience led to a rare labor settlement — offering a window into what life inside these facilities is really like. Learn about your ad choice…
…
  continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
  continue reading
1
Disinformation, digital tech and democracy
29:06
29:06
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
29:06In this programme we hear three thoughtful perspectives on the threat digital technologies pose for democracy. Henry Farrell from Johns Hopkins University argues disinformation must be tackled at a group level, not an individual one. Philosopher, John Tasioulas, says modern representative democracy is too easily corrupted by big tech. And AI specia…
…
  continue reading
1
Dr. Fred Grossman - President and Chief Medical Officer, Coya Therapeutics - Multi-Modality Treg Therapies For Neurodegenerative Diseases
42:43
42:43
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
42:43Send us a text Dr. Fred Grossman, D.O., FAPA is President and Chief Medical Officer of Coya Therapeutics ( https://coyatherapeutics.com/ ), a clinical-stage company focused on developing multi-modality, Regulatory T Cell (Treg) therapies for neurodegenerative diseases. Coya has already developed strong proof of concept data in Amyotrophic Lateral S…
…
  continue reading
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
…
  continue reading
Is the AI boom a bubble? What happens if it pops? Economist Jared Bernstein joined FP Live to sound the alarm on the growth and investment in the AI sector. Plus, Ravi’s One Thing on the first Trump-Xi meeting in six years. James Palmer: Trump and Xi Step Back From the Brink—for Now Rishi Iyengar, Christina Lu, and Keith Johnson: What Trump and Xi …
…
  continue reading
A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services. Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems. Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrut…
…
  continue reading
1
How to Stay Resilient When Cybercrime Becomes Your Competition | A Conversation with Author and Former FBI Agent, Eric O'Niell | Redefining CyberSecurity with Sean Martin
40:24
40:24
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
40:24⬥GUEST⬥ Eric O'Neill, Keynote Speaker, Cybersecurity Expert, Spy Hunter, Bestselling Author. Attorney | On Linkedin: https://www.linkedin.com/in/eric-m-oneill/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com …
…
  continue reading
1
How to Build Trust Between GRC and Engineering ft Tristan Ingold, Security GRC Program Manager at Meta
57:19
57:19
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
57:19How do you build real trust between GRC and engineering? In this episode of Security & GRC Decoded, host Raj Krishnamurthy welcomes Tristan Ingold, Security GRC Program Manager at Meta. Tristan shares how consulting shaped his approach, why “policing” doesn’t work, and how GRC earns influence by acting as a partner to engineering -- not a blocker. …
…
  continue reading
1
How to See Your Organization Like a Hacker with Chris Dale
25:18
25:18
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
25:18To defend like a human, you first have to think like a hacker. In this episode, Ron Eddings sits down with Chris Dale, Co-Founder and Chief Hacking Officer at River Security, to explore the human side of hacking, where curiosity, persistence, and vigilance meet defense. Chris shares how the traditional idea of penetration testing has evolved into a…
…
  continue reading
1
Cybersecurity on the ballot in California.
32:27
32:27
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:27Next week, California will hold a major election on Tuesday, November 4, amid heightened cyber risk and increased exposure to potential attacks. With the ongoing government shutdown and reduced grant funding for local counties overseeing the elections, vulnerabilities are growing. Sanny Liao, Co-Founder and CTO of Fable Security, joins to discuss t…
…
  continue reading
Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists’ email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades…
…
  continue reading
1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
  continue reading
1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
  continue reading
1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
  continue reading
1
Where Public Meets Private: How Technology Is Shaping the New Era of Protective Intelligence
31:24
31:24
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
31:24In this episode, host Fred Burton and co-host Cindy Marble sit down with Michael Evanoff, CSO at Verkada, to discuss his remarkable career spanning corporate security and diplomatic protection. Evanoff reflects on his experiences at the U.S. Department of State and in the private sector, sharing lessons on leadership, collaboration, and adapting pr…
…
  continue reading
1
Lockpick chaos, CoPhish, Atlas, Turing, ForumTroll, PKD, Kilgore Trout, Aaran Leyland - SWN #524
34:35
34:35
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
34:35Lockpicks, Microsoft, CoPhish, Atlas, Turing, ForumTroll, PKD, even Kilgore Trout, the Amazing Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-524
…
  continue reading