A critical look at new technologies, new approaches and new ways of thinking, from politics to media to environmental sustainability.
…
continue reading
Future Secured Podcasts
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Shared Security is the the longest-running cybersecurity and privacy podcast where industry veterans Tom Eston, Scott Wright, and Kevin Johnson break down the week’s security WTF moments, privacy fails, human mistakes, and “why is this still a problem?” stories — with humor, honesty, and hard-earned real-world experience. Whether you’re a security pro, a privacy advocate, or just here to hear Kevin yell about vendor nonsense, this podcast delivers insights you’ll actually use — and laughs yo ...
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Sea Control is CIMSEC's Flagship podcast. We focus on maritime security, naval affairs, and defense and foreign policy.
…
continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
continue reading
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
…
continue reading
The best in maritime security, technology, history, and international affairs from CIMSEC - your moment of power point rehab.
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Security isn’t about luck—it’s about strategy. In this podcast, we break down how to protect your home, family, and business from threats most people don’t even think about. We’re not here to fuel fear—we’re here to help you prepare. Hosted by security professionals, Michael Johnson, a retired law enforcement captain with 29 years of experience and James Kerr an expert from Boss Security Screens, this podcast delivers real, no-nonsense advice. We know what truly stops burglars—not just locks ...
…
continue reading
U.S. foreign policy for the future. Security Dilemma brings you conversations with the experts, policymakers, and thinkers charting new paths forward from the wreckage of recent decades and toward a national security and defense policy guided by prudence and restraint. Cohosts John Allen Gay and A.J. Manuzzi bring you the information you need to shape a wiser approach. Security Dilemma is a podcast of the John Quincy Adams Society, an independent nonprofit organization dedicated to advancing ...
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Discover stories from real people who are living out their definition of a secure retirement.
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Interviews and Discussions With Fascinating People Who are Creating A Better Tomorrow For All Of Us - Host - Ira S. Pastor
…
continue reading
1
The future will thank us: an intergenerational approach to security
46:50
46:50
Play later
Play later
Lists
Like
Liked
46:50What is intergenerational security and how does it intersect with traditional concepts of national security? How do intergenerational dynamics and differing interactions with technology, social media and AI impact security and resilience? What are the security issues that young Australians care about and how do these differ from the concerns of old…
…
continue reading
1
How Do Cyber Criminals Really Operate Against Banks? Future Secured Ep 50 with Sandro Bucchianeri.
50:13
50:13
Play later
Play later
Lists
Like
Liked
50:13In this 50th episode of Future Secured, Sandro Bucchianeri, Chief Security Officer at National Australia Bank, takes us inside the uncomfortable reality of modern cybercrime: attackers operate with no boundaries, no legislation, and no regulators. They move fast, change partners instantly, and treat targets as simple commercial opportunities. On th…
…
continue reading
What is the future of MDR? In this episode of the mnemonic security podcast, Robby is joined by Migjen Hakaj from mnemonic's Innovation & Emerging Technologies Department and Amine Besson, wearing many hats including Detection Engineering & Threat Hunting SIG Chair at FIRST, Detection Engineering Tech Lead at the European Commission, and Threat Det…
…
continue reading
In this episode of Unspoken Security, host AJ Nash sits down with Charlotte Guiney, Cyber Threat Intelligence Manager at Toyota Financial Services. They explore what it takes to build threat intelligence programs that work for both security teams and the wider business. Charlotte cuts through the noise, stressing that buy-in is step one—and that it…
…
continue reading
1
251 - The Future of Security Operations- Are SIEM, XDR, and SOAR Are Converging or moving apart?
22:24
22:24
Play later
Play later
Lists
Like
Liked
22:24Enjoying the content? Let us know your feedback! Today we're talking about the future of security operations, specifically three technologies that have dominated the conversation for the past few years: SIEM, XDR, and SOAR. And I'm going to make a case that might surprise some people: these tools are converging. They're merging into unified platfor…
…
continue reading
1
The FUTURE of Device Authentication is Here NOW
45:11
45:11
Play later
Play later
Lists
Like
Liked
45:11Send us a text We explore why most breaches are identity failures and how to flip the model with hardware-backed, device-bound credentials that never move. Jason shares global threat trends, startup lessons, and a blueprint for preventing credential theft across people, agents, and machines. • life on the road, burnout signals and recovery • global…
…
continue reading
1
Building a Real Security Culture: Why Most AppSec Champion Programs Fall Short | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 5 | A Musing On the Future of Cybersecurity with Sean Martin ...
2:24
2:24
Play later
Play later
Lists
Like
Liked
2:24Most organizations have security champions. Few have a real security culture. In this episode of AppSec Contradictions, Sean Martin explores why AppSec awareness efforts stall, why champion programs struggle to gain traction, and what leaders can do to turn intent into impact. 🔍 In this episode: Why compliance training doesn’t build culture The dat…
…
continue reading
For years, North Korea has quietly dispatched an army of IT workers overseas—not to innovate, but to infiltrate. Disguised as freelancers, they apply for jobs, breach systems, and wire stolen funds back to Pyongyang. We return to a rare conversation with one of them—a defector—about the regime’s digital underworld, and the personal toll of escaping…
…
continue reading
1
Jussi Aittola: The Truth Behind Crypto Recovery, Scams, and Nation-State Attacks
42:26
42:26
Play later
Play later
Lists
Like
Liked
42:26What if stolen crypto is not gone forever? In this week's Cybernova episode, Paul Jackson speaks with Jussi Aittola, Senior Partner and Country Head at Sphere State Group in Singapore, about the real mechanics of modern crypto crime, from industrial romance-investment scams to a 20 million dollar wallet breach linked to a nation state. Jussi explai…
…
continue reading
How many of the articles you see on the internet are actually written by AI, not by humans? We'll give you a figure based on the latest research. Also, why is Google moving away from its well-established search-engine algorithm in favour of AI-generated summaries; The importance of remembering that urban planning isn't just about buildings, it's ab…
…
continue reading
1
Responsible Disclosure and Bug Bounty Programs: Webinar
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38Adam Logue, Independent Security Researcher and Synack Red Teamer, discusses his experiences with responsible disclosure and bug bounty programs, and provides a fascinating technical deep dive into a vulnerability he found in Microsoft 365 Copilot during a client-facing engagement. Timestamps: 00:49 - Adam's background with responsible disclosure a…
…
continue reading
1
Thriving Beyond Human Labor with Context-Powered AI with Daniel Miessler
29:40
29:40
Play later
Play later
Lists
Like
Liked
29:40The real disruption isn’t AI replacing humans, it’s the shocking possibility that human labor was the economic bubble all along. In this episode, Ron Eddings sits down with Daniel Miessler, founder of Unsupervised Learning and longtime security leader, to break open why companies are hitting record profits with shrinking workforces, and what that m…
…
continue reading
1
The AI Security Blind Spots Every Company Should Fix Now
1:02:44
1:02:44
Play later
Play later
Lists
Like
Liked
1:02:44Security used to be a headache. Now it is a growth engine. In this episode of IT Visionaries, host Chris Brandt sits down with Taylor Hersom, Founder and CEO of Eden Data and former CISO, to break down how fast growing companies can turn cybersecurity and compliance into a true competitive advantage. Taylor explains why frameworks like SOC 2, ISO 2…
…
continue reading
1
How Critical Minerals Explain Trump’s Policy
43:49
43:49
Play later
Play later
Lists
Like
Liked
43:49Name a consistent throughline in the Trump administration’s foreign policy. The answer could very well be the global scramble for critical minerals. What are they and why are they so important? Why is China so far ahead and how can the United States catch up? Mining expert Gracelin Baskaran sits down with host Ravi Agrawal to discuss. Plus Ravi’s O…
…
continue reading
1
EP 154 When Sport, Strategy & Security Collide. Security Isn’t a Solo Sport — And Why That Needs to Change with Paul Harvey
1:03:15
1:03:15
Play later
Play later
Lists
Like
Liked
1:03:15Send us a text 🎧 Podcast Summary — When Sport, Strategy & Security Collide Security Isn’t a Solo Sport — And Why That Needs to Change In this powerful episode of The Security Circle, Yolanda “Yoyo” Hamblen sits down with security heavyweight Paul Harvey to explore the unexpected intersections between elite sport, leadership, crisis management, and …
…
continue reading
Host Brian Kerg talks with Steve Brock and Hunter Stires to discuss their CIMSEC article, “Maritime Statecraft and Its Future.” Steven V. Brock was appointed by the White House as the Senior Advisor to the 78th Secretary of the Navy, where from 2022 to 2025 he served as a chief strategist and key implementor of … Continue reading Sea Control 591: M…
…
continue reading
1
Shadow Risks in SaaS, Cybersecurity Market Has Lost Its Mind, and Rise of the CTrO - Mike Puglia - BSW #424
1:06:01
1:06:01
Play later
Play later
Lists
Like
Liked
1:06:01While many businesses rely on Microsoft 365, Salesforce and Google Workspace security features, critical blind spots remain—the recent series of high profile SaaS breaches demonstrate this. So what should you do? Mike Puglia, General Manager of Kaseya Labs, joins Business Security Weekly to discuss the risks in SaaS applications. In this segment, M…
…
continue reading
1
Shadow Risks in SaaS, Cybersecurity Market Has Lost Its Mind, and Rise of the CTrO - Mike Puglia - BSW #424
1:06:01
1:06:01
Play later
Play later
Lists
Like
Liked
1:06:01While many businesses rely on Microsoft 365, Salesforce and Google Workspace security features, critical blind spots remain—the recent series of high profile SaaS breaches demonstrate this. So what should you do? Mike Puglia, General Manager of Kaseya Labs, joins Business Security Weekly to discuss the risks in SaaS applications. In this segment, M…
…
continue reading
1
AI, Quantum, and the Changing Role of Cybersecurity | ISC2 Security Congress 2025 Coverage with Jon France, Chief Information Security Officer at ISC2 | On Location with Sean Martin and Marco Ciappelli ...
26:22
26:22
Play later
Play later
Lists
Like
Liked
26:22What Security Congress Reveals About the State of Cybersecurity This discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioner…
…
continue reading
1
Dr. Marc Hedrick, MD - CEO, Plus Therapeutics - Radiotherapeutics For Difficult-To-Treat CNS Cancers
53:45
53:45
Play later
Play later
Lists
Like
Liked
53:45Send us a text Dr. Marc Hedrick, MD is President and CEO of Plus Therapeutics, Inc. ( https://plustherapeutics.com/ ), a U.S. clinical-stage pharmaceutical company, focused on developing innovative, targeted radiotherapeutics for adults and children with difficult-to-treat cancers of the central nervous system. The company’s lead programs focus on …
…
continue reading
1
Data Integrity, AI Risk, Cyber Realities and tech leadership with Kate Carruthers
44:21
44:21
Play later
Play later
Lists
Like
Liked
44:21In this episode of the Technology & Security podcast, host Dr. Miah Hammond-Errey is joined by Kate Carruthers. Kate is currently the head of data analytics and AI at the Australian Institute of Company Directors. She shares her journey from defending Westfield against state and non-state cyber attacks to leading UNSW's enterprise data, AI, and cyb…
…
continue reading
1
Building EDR for AI: Controlling Autonomous Agents Before They Go Rogue with Ron Eddings
19:36
19:36
Play later
Play later
Lists
Like
Liked
19:36AI agents aren't just reacting anymore, they're thinking, learning, and sometimes deleting your entire production database without asking. The real question isn't if your AI agent will be hacked, it's when, and whether you'll have the right hooks in place to stop it before it happens. In this episode, Ron breaks down the ChatGPT Atlas vulnerability…
…
continue reading
1
Vulnerabilities In Enterprise AI Workflows With Nicolas Dupont
34:34
34:34
Play later
Play later
Lists
Like
Liked
34:34Episode Summary As AI systems become increasingly integrated into enterprise workflows, a new security frontier is emerging. In this episode of The Secure Developer, host Danny Allan speaks with Nicolas Dupont about the often-overlooked vulnerabilities hiding in vector databases and how they can be exploited to expose sensitive data. Show Notes As …
…
continue reading
1
Controls Are Promises: Rethinking GRC for Modern Security ft Sergio Alonso @ Rapid7
56:11
56:11
Play later
Play later
Lists
Like
Liked
56:11In this episode of Security & GRC Decoded, host Raj Krishnamurthy sits down with Sergio Alonso, a seasoned GRC and information security leader at Rapid7, whose 17–year career spans auditing, high-regulation banking, blockchain innovation at Akamai, privacy GRC at Twitter, and now trust and governance in cybersecurity. Sergio breaks down how to tran…
…
continue reading
1
These Screens Stop Crowbars! And They Look Good Too
5:39
5:39
Play later
Play later
Lists
Like
Liked
5:39Would you feel safe leaving your front door open right now? In this episode, I get real about home security — not theory, not fear tactics, but real solutions that work. I’ve got three kids, and I travel for work, so I installed Boss Security Screens on my own home. Why? Because I don’t mess around when it comes to safety. Here’s what we cover: • W…
…
continue reading
1
Sea Control 591: Maritime Statecraft and Its Future with Steve Brock and Hunter Stires
1:27:36
1:27:36
Play later
Play later
Lists
Like
Liked
1:27:36Links 1. "Maritime Statecraft and its Future," by Steve Brock and Hunter Stires, CIMSEC, October 21, 2025. 2. "SECNAV Del Toro Calls for a New, Bold Maritime Statecraft in Era of Intense Strategic Competition," Department of the Navy, September 23, 2023.By Steven Brock, Hunter Stires, Brian Kerg
…
continue reading
1
Logging On: Real Talk Between Cyber Leaders, featuring special guest Greg Schaffer
30:51
30:51
Play later
Play later
Lists
Like
Liked
30:51In this special episode of Cybersecurity Sense, host Mark Burnette is joined by Greg Schaffer, Senior vCISO and Project Manager for a boutique information security risk management firm specializing in virtual CISO and information security consulting services. Together, they explore how today's cybersecurity leaders are shifting the conversation — f…
…
continue reading
Host Walker D. Mills interviews Marine Corps Captain Colton Byers about his article for the War Quants substack, “Carrier 2.0: The Drone Carrier Revolution.” Their discussion covers salvo equations and modeling, the utility of drone carriers, and how they might integrate with a modern naval fleet. Download Sea Control 590: Drone Carriers and Salvo …
…
continue reading
We return to a story on the Akira ransomware group. For 150 years Knights of Old, a U.K. logistics company, survived everything from two world wars to Brexit. Then Akira stormed the company's networks. In just a blink of an eye, everything changed. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading
1
A CISO's Field Guide to Securing AI Agents
34:48
34:48
Play later
Play later
Lists
Like
Liked
34:48AI agents are rapidly moving into production, creating a fundamentally new and complex attack surface for enterprises. While the promise of "digital teammates" is immense, the security risks they introduce, from prompt injection, hijacked tool use to multi-agent collusion, are unprecedented. How can security leaders move beyond traditional framewor…
…
continue reading
1
America’s “Golden Dome”: Can the U.S. Actually Stop a Nuclear Strike?
27:23
27:23
Play later
Play later
Lists
Like
Liked
27:23Text the ATB Team! We'd love to hear from you! In this episode of At the Boundary, retired four-star General Frank McKenzie joins USF’s Dr. Tad Schnaufer to break down one of the most pressing national security questions today: Can the United States build a true “Golden Dome” to defend the homeland from nuclear missile attack? Together, they explor…
…
continue reading
1
5. Data Security. "Ctrl + Alt + Secure". Pulling your security together.
20:56
20:56
Play later
Play later
Lists
Like
Liked
20:56Welcome!...to 'Getting to Grips with Data Security' our podcast for anyone interested in learning more about how to 'beat the hackers' using the best types of information security controls. This new 5 part series covers all aspects of data security for businesses where we discuss: Ep 1: Strategy; Ep 2: Cloud Controls; Ep 3: People Risk; Ep 4: Using…
…
continue reading
1
Secure BYOD in a World with Increasing Threats
22:22
22:22
Play later
Play later
Lists
Like
Liked
22:22In today’s mobile-first world, organizations juggle a tough balancing act: enabling employees to use personal devices while safeguarding sensitive data. BYOD, which stands for Bring Your Own Device, is a policy that allows employees to use their personal devices (like smartphones, laptops, and tablets) for work-related tasks. This practice has beco…
…
continue reading
1
Unlocking Data Protection: Vishnu Varma on Cybersecurity Challenges
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55Send us a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how Bo…
…
continue reading
1
So You Want to Be a CISO? With vCISO and Security Justice Alum Chris Clymer
31:09
31:09
Play later
Play later
Lists
Like
Liked
31:09In this special episode of the Shared Security Podcast, host Tom Eston reunites with former co-host and experienced fractional CISO, Chris Clymer. They reminisce about their early podcasting days and discuss the evolving role of a Chief Information Security Officer (CISO). The conversation covers the responsibilities, challenges, and skills require…
…
continue reading
Despite headlines suggesting otherwise, this week’s guest says women’s rights around the world are making real gains. Lyric Thompson, the founder and CEO of the Feminist Foreign Policy Collaborative, sits down with host Ravi Agrawal to share more. Transcript: The Good News on Women’s Rights Lyric Thompson: Women’s Rights Are Winning Rebecca Turking…
…
continue reading
1
Former Deputy DNI Sue Gordon: ‘it is conceivable that the world order has already been broken’
26:16
26:16
Play later
Play later
Lists
Like
Liked
26:16Washington is trimming budgets… and bleeding digital expertise. So what happens when national security is run by agencies living in the past? Sue Gordon, former Principal Deputy Director of National Intelligence, helps us break it down. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading