Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

GRC Podcasts

show episodes
 
Artwork

1
GRC Academy

Jacob Hill

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Governance, Risk, and Compliance Academy (GRC) Academy is a training and research platform for GRC professionals, executives, and anyone else who wants to increase their knowledge in the GRC space!
  continue reading
 
Artwork

1
Security & GRC Decoded

Raj Krishnamurthy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC). Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy. It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates. Security & GRC ...
  continue reading
 
Welcome, interstellar travelers, to the Hitchhiker’s Guide to the GRC Technology Galaxy, your improbable companion through the expanding universe of governance, risk, and compliance. In a cosmos where regulations multiply faster than Tribbles, cyber incidents drop like falling whales, and third parties sprout surprises with Vogon-level timing, this podcast is your towel, your Babel Fish, and your improbability drive rolled into one. Each episode, Michael Rasmussen and guests explore the cons ...
  continue reading
 
Artwork

1
Risk Grustlers

Scrut Automation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to 'Risk Grustlers,' where we celebrate the extraordinary journeys of modern-day Risk Leaders who embrace the art of 'Grustle'—a powerful fusion of Grind and Hustle. Our podcast dives into the innovative strategies and bold decisions taken by these risk-takers, shaping the future of cybersecurity and risk management. Join us as we explore their inspiring stories, insightful advice, and cutting-edge technologies that define the alternative GRC landscape.
  continue reading
 
Artwork

1
Daily Cyber Threat Brief

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
  continue reading
 
Artwork

1
Risk is Our Business

Michael Rasmussen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to Risk Is Our Business, where we explore the principles of Governance, Risk Management, and Compliance — to reliably achieving objectives, navigating uncertainty, and act with integrity. Here, we follow the Prime Directive of Risk Management: No decision or strategy moves forward without understanding its impact on our objectives, our resilience, and our values. Because risk isn’t the enemy, it’s the mission. After all, risk is our business. Join us as we go boldly into the world of ...
  continue reading
 
Office Hours is a work of passion to share strategies, technology ideas, and real-world stories that inspire governance, risk management, compliance, and audit professionals to live their biggest impact! Our channel is dedicated to delivering the best stories and strategies in developing GRC programs we've seen across 7,000 organizations in 140 countries around the world.
  continue reading
 
Welcome to the GRCISO podcast, where Chief Information Security Officers (CISOs) gain indispensable insights into the dynamic world of Cyber Governance, Risk, and Compliance (GRC). Each episode delves into expert analysis and industry perspectives, designed to empower CISOs with the knowledge needed to make informed decisions in today’s complex cybersecurity landscape. Tune in for in-depth discussions, practical advice, and the latest trends to stay ahead in your role. Whether you’re a seaso ...
  continue reading
 
Artwork

1
State of Play: Summer Games

Global Reporting Centre

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Olympics are meant to welcome the world, but who are they really for? Meet the people who are moved out, pushed out, and priced out in the name of sports. Host Andie Crossan brings you to Paris, Vancouver, and Los Angeles on a surprising journey into the long shadows cast by the Olympic torch. Produced by the Global Reporting Centre (GRC) and distributed by PRX. The GRC is an editorially independent journalism organization based at the UBC School of Journalism, Writing, and Media. Founde ...
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
RiskStudio Podcasts

Manoj Kulwal, Chief Architect and Co-Founder at RiskSpotlight

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is a bi-monthly podcast covering risk management related topics such as risk management news, innovation in risk management, discussion with risk management expert and learning tools for risk management.
  continue reading
 
We believe with all our hearts that every verse in the Bible can be practically applied today. God has written down history and His testimony in the Bible so we can have a guide to navigate this day in age. We have been all over the world spreading the good news of Christ’s soon second coming. What we have found out is that the tactical advantage that we have, is the 3-Angels messages of Revelation 14! Listen in to hear some amazing testimonies!
  continue reading
 
Artwork
 
The Banking on Data podcast is for community bank and credit union leaders who understand that the future of financial services is powered by data. Hosted by Ed Vincent, CEO of Lumio Solutions, this podcast offers executive-level insights into how financial institutions can leverage business intelligence, data strategy, and advanced analytics to drive performance, manage risk, and unlock growth opportunities. Each episode features conversations with industry leaders, data experts, and financ ...
  continue reading
 
Artwork

1
Greenroom Conversations

Kevin Chavez, Carol Ann Aicher, and Ryan Michael Hartman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Kevin Chavez, Dr. Carol Aicher, and Ryan Michael Hartman combine their diverse backgrounds within music to interview professionals who work in the performing arts. GRC looks to explore the successful performer's individual path in the arts to discover themes that will help listeners with their own artistic path. Interviews include Grammy winning artists, Broadway and Classical performers, as well as composers, producers, teachers, and many more from the music community.
  continue reading
 
Artwork

1
CMMC Academy

Armada Cyber Defense LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
  continue reading
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
  continue reading
 
Artwork

1
On China’s New Silk Road

Global Reporting Centre

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join host Mary Kay Magistad as she explores how China's New Silk Road may change the world. Dozens of countries have invited China to build roads, railways, ports, 5G networks, and more. How is China’s global ambition seen around the world and what impact are its investments having on the ground? Over nine episodes, Mary Kay, a former China correspondent for NPR and PRX’s “The World,” partners with local journalists on five continents to uncover the effects of the most sweeping global infras ...
  continue reading
 
Step into the fascinating world of risk and achievement with The Paramify Podcast. Join us as we engage with inspiring individuals who have accomplished extraordinary feats in various fields. From daring entrepreneurs, innovative scientists, extreme sports athletes to pioneering artists, we delve into their incredible journeys and explore the structures and strategies that guided them. We dissect the frameworks, methodologies, and mindsets they’ve employed to conquer challenges, manage risks ...
  continue reading
 
Artwork

1
K.O.’s Launchpad: An Infosec Podcast

Astro Information Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
I started out wrapping burritos at Chipotle, dreaming of something bigger but not quite sure where to go. Over time, that drive to learn and grow led me into cybersecurity—an industry where the stakes are high and the stories are endlessly fascinating. K.O.’s Launchpad is my way of opening the door for anyone curious about how to break in, level up, and find purpose in a field that’s shaping our digital future. In every episode, we’ll chat with experts, share practical strategies, and explor ...
  continue reading
 
Artwork

4
Distilled Security Podcast

Justin Leapline, Joe Wynn, and Rick Yocum

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
  continue reading
 
Artwork

1
Adopting Zero Trust

Adopting Zero Trust

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Adopting Zero Trust offers an ongoing conversation that elevates cybersecurity conversations that encourages you to rethink how you build strategies, defend against threat actors, and implement new technology. We go beyond the millions in marketing budgets fueled by VCs, and chat with practitioners like you who want to make a difference (or hack the planet, which ever happens first).
  continue reading
 
Artwork

1
Cyber Security America

Joshua R Nicholson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
  continue reading
 
Artwork

1
AI Explained

Fiddler AI

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
AI Explained is a series hosted by Fiddler AI featuring industry experts on the most pressing issues facing AI and machine learning teams. Learn more about Fiddler AI: www.fiddler.ai
  continue reading
 
Artwork

1
Cyber Work

Infosec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
A Federal Security & Compliance career is a very rewarding career - we get the honor and privilege of protecting some of the most guarded assets of our great country. However, it doesn’t come without a cost. We often take the brunt of the beating when it comes to the regulations that are impeding innovation. Join federal security professional Max Aulakh as he distills the challenges facing our career field, pulling back the curtain on culture, emerging technical knowledge, ATOs, CMMC and var ...
  continue reading
 
Artwork
 
You ever see an ad or look at a brand and think, “Come on. Get real.”? You’re not alone. I’ve seen it. And on this podcast, I say it -- directly to their leaders. My name’s Adam Conner, and I know brands are always searching for personal truth -- their version of authenticity. Frankly, they need it -- because consumers are louder and more skeptical than ever before. And in a world where people will talk about you whether you like it or not, it’s critical to stand up for something and tell re ...
  continue reading
 
Artwork

1
The Greyhound Club

RSN - The Greyhound Club

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Loaded with the biggest news of the greyhound week from around Victoria, with plenty of trainer and owner-talk, and the preview of the best of the racing action over the rest of the weekend. Simone knows the sport of greyhound racing from the inside, as a successful owner and trainer in her own right. Included – Simone’s Run Of The Week, and selections for Saturday night’s biggest events.
  continue reading
 
Artwork

1
The Gridcoin Fireside

Gridcoin Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Gridcoin Fireside is a participatory podcast hosted on the Gridcoin discord server. This means you, listener, help guide the direction of each episode! Every Friday at 3:30pm ET your dedicated hosts bring discussion topics and everyone is welcome to share their thoughts. Topics can range from Gridcoin, blockchain, and cryptocurrency news to network and game theory to the future of FOSS to interesting anecdotes... but while the hosts bring the main topics, the ultimate direction of the sh ...
  continue reading
 
Loading …
show series
 
This story was originally published on HackerNoon at: https://hackernoon.com/sais-grc-framework-establishing-trust-and-enhancing-resilience-in-ai-driven-supply-chains. The SAIS-GRC Framework is not a reactive measure but a blueprint for a new competitive advantage. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecuri…
  continue reading
 
In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen is joined by Kyle Martin of NAVEX to chart the company’s long arc, from its early days to the AI-powered, fully connected risk and compliance platform used by organizations across the world today. They explore how NAVEX has evolved alongside the market, why it…
  continue reading
 
In this episode of Security & GRC Decoded, host Raj Krishnamurthy sits down with Tom Scuderi, Senior Manager of Security & GRC at LTK and a veteran practitioner who has spent his career building governance functions at QTS, Tableau, Salesforce, and LTK. Tom shares how to scale GRC in high-growth environments by designing processes that resemble eng…
  continue reading
 
In episode 47 of Cybersecurity America, host Joshua Nicholson is joined by Richa Kaul, CEO and Founder of Complyance, to explore how agentic AI and intelligent automation are reshaping enterprise Governance, Risk, and Compliance (GRC). Richa breaks down why traditional, spreadsheet-driven GRC programs are failing at scale—and how organizations are …
  continue reading
 
Thank you for visiting our podcasts on CMMC Cybersecurity! Explore more insights, updates, and expert discussions on our blog: https://cybercomply.us/blog-list Luis G. Batista C.P.M., CPSM Founder & CEO, Armada Cyber Defense | CyberComply [email protected] Office: (305) 306-1800 Ext. 800 CAGE: 9QG33 UEI: K6UZHLE1WUA7 Schedule Introduction: https:…
  continue reading
 
"The AI age we're in is going to force startups to compete in the higher upper echelon of risk assurance." Jack Rumsey Head of GRC at Swimlane explains why startups will no longer have the luxury of maturing later and how the AI era is pushing even early-stage teams into enterprise-grade security. This episode covers why assurance needs to evolve, …
  continue reading
 
In this episode, we break down a major Cloudflare outage, explore how a nation-state used AI agents to automate a cyberattack, and discuss the growing risks around MCP integrations. We also highlight why GRC Engineering is becoming essential to modern security programs and wrap up with key regulatory updates, including CMMC changes affecting thousa…
  continue reading
 
Listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In our latest technical series episode, we unpack one of the most important building blocks in SAP authorisations: single roles. Our experts explore the different ways organisations design single roles to balance provisioning efficienc…
  continue reading
 
Given the pace we live at, it’s easy to feel like life never slows down. We search for ways to recharge—whether it’s sleeping in on weekends, planning a short getaway, or binge-watching our favorite TV shows. While these activities offer temporary relief, the exhaustion we feel often runs deeper than just physical tiredness. In the final Care Group…
  continue reading
 
Join us for a timely and insightful live discussion on the evolving role of artificial intelligence in governance, risk, and compliance. Host Dave Bittner from N2K | CyberWire is joined by Kayne McGladrey from Hyperproof, Matthew Cassidy, PMP, CISA from Grant Thornton (US), and Alam Ali from Hyperproof to explore the current state of artificial int…
  continue reading
 
While our team is out on winter break, please enjoy this episode of Research Saturday. This week, we are joined by ⁠Tom Hegel⁠, Principal Threat Researcher from ⁠SentinelLabs⁠ research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belaru…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life. RSA encryption faces quantum threat by 2030. Learn why your encrypted data has a 5-year shelf life and how to migrate to quantum-safe cryptography. Check more stories related to cybersecurity at: https:…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
  continue reading
 
While our team is out on winter break, please enjoy this Special Edition episode. Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The ⁠NightDragon Innovation Summit⁠ convened a group of industry leaders to discuss how public and private entities can work together to address emerging …
  continue reading
 
- UK Business Warned After Surge in Supply-Chain Cyber Attacks - Cybersecurity Skills Gap Widens Despite Rising Threats - Data Privacy Fines Climb as Regulators Tighten Enforcement Support the show Remember... Even with top-tier security, human negligence and/or error can compromise systems. Invest in employee training—it’s the ultimate safeguard. …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/astras-new-cloud-vulnerability-scanner-targets-the-oops-factor-behind-73percent-of-cloud-breaches. Astra’s scanner detects cloud misconfigurations causing 73% of breaches with real-time monitoring, agentless visibility, and validated risk alerts. Check more stories related…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-compliance-requirements-shape-modern-software-architecture. GDPR's "right to be forgotten" just redesigned your database. HIPAA moved your PHI to a separate infrastructure. Here’s how compliance shapes architecture. Check more stories related to cybersecurity at: https…
  continue reading
 
While our team is out on winter break, please enjoy this episode of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries. Your host is ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoin…
  continue reading
 
In today’s episode, we dig into the Electronic Frontier Foundation’s annual Breachies, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet misconfigurations, the Breachies offer a revealing look at how familiar…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
  continue reading
 
The White House bans foreign-made drones. African law enforcement agencies crackdown on cybercrime. A new phishing campaign targets Russian military personnel and defense-related organizations. A University of Phoenix data breach affects about 3.5 million people. A pair of Chrome extensions covertly hijack user traffic. Romania’s national water aut…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
  continue reading
 
In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigat…
  continue reading
 
NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump’s cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method. Researchers warn a popular open-source server monitoring tool is being abused. Cyber cri…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-markups-blacklight-tool-now-has-new-tracking-info-and-caching-options. Blacklight, The Markup’s real-time web privacy detector tool, has exposed privacy violations on COVID-19 vaccine websites and has spurred legislative action. Check more stories related to cybersecur…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/should-you-trust-your-vpn-location. IPinfo reveals how most VPNs misrepresent locations and why real IP geolocation requires active measurement, not claims. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive…
  continue reading
 
- JLR’s Employee Data Breach Confirmed - Cloud Misconfiguration Leaves African SMEs Exposed - Healthcare Still a Prime Ransomware Target - Fintech Fraud Attempts Spike Ahead of PayDay Weekend. Support the show Remember... Even with top-tier security, human negligence and/or error can compromise systems. Invest in employee training—it’s the ultimate…
  continue reading
 
Please enjoy this encore of Career Notes. Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking int…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/quantum-security-governance-building-a-framework-for-the-post-quantum-world. The convergence of quantum computing advancements and evolving cybersecurity regulations is reshaping how organizations approach security governance. Check more stories related to cybersecurity at…
  continue reading
 
Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. Using examples…
  continue reading
 
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Am…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/why-one-lock-isnt-enough-how-buburuza-designs-multi-layer-security-for-ai-banking. Why AI banking needs multi-layer security, not just encryption. Buburuza’s COO explains how to stop deepfake fraud and breaches. Check more stories related to cybersecurity at: https://hacke…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-hidden-cost-of-invalid-traffic-why-ip-data-is-the-missing-link. IPinfo stops invalid traffic by detecting bots, VPNs, and proxies with real-time IP intelligence, helping ad platforms cut waste and improve ROI. Check more stories related to cybersecurity at: https://hac…
  continue reading
 
Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accu…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-battle-for-the-borders-how-ai-and-cyber-intelligence-are-reshaping-statecraft. From Tel Aviv to Silicon Valley, a new generation of AI-driven intelligence platforms is redefining how states secure their borders. Check more stories related to cybersecurity at: https://h…
  continue reading
 
Lauren Freund has spent the last few years inside her dream company, leading social media and influencer marketing at Canva. She describes why traditional influencer playbooks—optimizing for follower counts and reach—are increasingly outdated, and why she now screens creators for deep engagement, relevance, and the ability to truly carry Canva’s me…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
  continue reading
 
The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! On this episode, Accidental CISO is joined by guest host Tanya Janca, @shehackspurple. Tanya is a hacker, software developer, author, and educator. She is passionate about application …
  continue reading
 
Researchers detail a years-long Russian state-sponsored cyber espionage campaign. Israel’s cyber chief warns against complacency. Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. MITRE expands its D3FEND cybersecurity ontology to cover operational technology. Te…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/link11-identifies-five-cybersecurity-trends-set-to-shape-european-defense-strategies-in-2026. DDoS attacks will increasingly be used as Diversion Tactics. API-First Architectures Increase Exposure to Misconfigurations and Business Logic Abuse. Check more stories related to…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/debunking-the-998percent-accurate-ip-data-claim. IPinfo explains why ‘99% accurate IP data’ is misleading and how real accuracy requires ongoing measurement, transparency, and ProbeNet validation. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyb…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
  continue reading
 
In this episode of Risk Grustlers, Aayush Ghosh Choudhury, CEO and Co-Founder of Scrut, sits down with Sounil Yu, Chief AI Officer at Knostic and author of the ‘Cyber Defense Matrix,’ to talk about what it really means to run agentic AI safely, starting from “basic” security hygiene and identity hardening, all the way to drawing hard boundaries aro…
  continue reading
 
Kenny and Mike sit down with Dixon Wright, Head of Delivery at Eden Data, for a grounded and insightful conversation on security, compliance, and building smarter systems. They cover: - Dixon’s journey from college football to leading security at Eden Data - What it takes to actually deliver cybersecurity — not just sell it - Why Eden Data joined t…
  continue reading
 
Venezuela’s state oil company blames a cyberattack on the U.S. An Iranian hacker group offers cash bounties for doxing Israelis. Germany’s lower house of parliament suffers a major email outage. South Korea’s e-commerce breach exposes personal information of nearly all of that nation’s adults. Researchers report active exploitation of two critical …
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Stop ransom…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play