Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Weekly Information Security News. Stay up to date on what’s going on in the InfoSec world in about 40 minutes. Join us for InfoSec news and stay for some friendly banter, guest interviews, gadget reviews, tech interview tips, and hilarious dad jokes! New episodes every Monday.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
"Humanizing cybersecurity with candid tales from cyberspace and beyond!" Voices of the Vigilant builds and shares knowledge by engaging with diverse voices and perspectives within the cybersecurity industry.
…
continue reading
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Hey everyone, Welcome to the Infosec Prep Podcast. We aim to bring you weekly Infosec news and bring some people on to interview! Join our discord at https://discord.gg/9xTqKTY
…
continue reading
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
…
continue reading
A podcast for anyone and everyone interested in leadership in the cybersecurity industry - we talk about the challenges impacting our industry & how leadership can address that and gain insights, advice and the occasional anecdote from experienced leaders who are happy to share their stories with us!
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
30-Day InfoSec, a monthly information security recap show for the latest news, stories, and happenings from around the cybersecurity community.
…
continue reading
Explore the minds of fascinating specialists ranging from mathematics, physics, web3, cybersecurity, HFT/MEV, startup founders, investigators and so many more. Every episode will give you a glimpse into the unknown unknowns. Enjoy your stay, anon. Keywords: mathematics, math, physics, biology, chemistry, solo auditor, public auditing platforms, private audits, scalability, freedom, Scraping Bits podcast, blockchain technology, audit industry, flashbots, reverse engineering, cybersecurity, in ...
…
continue reading
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
…
continue reading
We need to talk about InfoSec is a podcast where we get real about the current state of Information Security. Join the talk with Laura Kankaala! Powered by Disobey.
…
continue reading
This "purple team" podcast will examine a mix of offensive "red team" and defensive "blue team" security issues and strategies. Your hosts, Darryl MacLeod and Grant Boudreau, will focus on stories, news, people, and tech from the East Coast of Canada. There is an abundance of talented people on the East Coast, and we want to showcase their abilities to the InfoSec world!
…
continue reading
Independent holistic security consultancy
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
…
continue reading
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
…
continue reading
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
…
continue reading
SecTools Podcast is a series of audio podcast featuring free or opensource tool authors from Information Security industry, sharing their interesting experience on developing and maintaining amazing tools for the security community. Hosted by Sanoop Thomas (s4n7h0) https://infoseccampus.com https://twitter.com/InfoSecCampus
…
continue reading
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
…
continue reading

1
The CVE Saga - Talkin’ Bout [infosec] News 2025-04-21
58:29
58:29
Play later
Play later
Lists
Like
Liked
58:29Register for upcoming webcasts & summits - https://poweredbybhis.com 00:00 - PreShow Banter™ — A Monocle and a Glass of Wine 05:36 - The CVE Saga - Talkin’ Bout [infosec] News 2025-04-21 06:43 - Story # 1: US agency extends support for cyber vulnerability database 29:08 - Story # 1b: CVE Foundation 32:35 - Story # 2: Former cybersecurity agency chi…
…
continue reading

1
InfoSec Beat: The Golden Age of Managed Security Services Reinvention
20:10
20:10
Play later
Play later
Lists
Like
Liked
20:10Can the way Accenture delivers managed security services be reinvented? Accenture CISO Kris Burkhardt poses this question to guest Rex Thexton, chief technology officer of Accenture Security, who gives a definite yes. Rex shares several exciting opportunities possible in the next 12 to 18 months. Listen to learn more about the prospects of AI-power…
…
continue reading

1
Defensive Security Podcast Episode 303
1:01:33
1:01:33
Play later
Play later
Lists
Like
Liked
1:01:33Summary In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including the rise of ransomware, the importance of backup strategies, and the implications of AI in phishing attacks. They discuss into the challenges of managing non-human identities and the need for effective communi…
…
continue reading

1
Natali Tshuva: Impacting critical industries. [CEO] [Career Notes]
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Please enjoy this encore episode of Career Notes. CEO and co-founder of Sternum, Natali Tshuva shares how she took her interest in science and technology and made a career and company out of it. Beginning her computer science undergraduate degree at age 14 through a special program in Israel, Natali says it opened up a new world for her. Her requir…
…
continue reading

1
Microsoft for Startups: The benefits of the cyber startup ecosystem. [Special Edition]
1:15:15
1:15:15
Play later
Play later
Lists
Like
Liked
1:15:15Welcome to the Microsoft for Startups Spotlight, brought to you by N2K CyberWire and Microsoft. In this episode, we are shining a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. This episode is part of our exclusive RSAC series where we dive into the real world impact of the Microsoft fo…
…
continue reading

1
China’s new cyber arsenal revealed. [Research Saturday]
25:33
25:33
Play later
Play later
Lists
Like
Liked
25:33Today we are joined by Crystal Morin, Cybersecurity Strategist from Sysdig, as she is sharing their work on "UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell." UNC5174, a Chinese state-sponsored threat actor, has resurfaced with a stealthy cyber campaign using a new arsenal of customized and open-source tools, includin…
…
continue reading

1
Week in Review: Secure by Design departure, Microsoft’s security report, LLMs outrace vulnerabilities
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bethany De Lude, CISO emeritus, The Carlyle Group Thanks to our show sponsor, Dropzone AI Alert investigation is eating up your security team’s day—30 to 40 minutes per alert adds up fast. Dropzone AI‘s SOC Analyst transforms this rea…
…
continue reading

1
7MS #672: Tales of Pentest Pwnage – Part 70
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07Today’s a fun tale of pentest pwnage where we leveraged a WinRM service ticket in combination with the shadow credentials attack, then connected to an important system using evil-winrm and make our getaway with some privileged Kerberos TGTs! I also share an (intentionally) vague story about a personal struggle I could use your thoughts/prayers/vibe…
…
continue reading

1
Pentagon hits fast-forward on software certs.
32:44
32:44
Play later
Play later
Lists
Like
Liked
32:44The Defense Department is launching a new fast-track software approval process. A popular employee monitoring tool exposes over 21 million real-time screenshots. The U.S. opens a criminal antitrust investigation into router maker TP-Link. A pair of health data breaches affect over six million people. South Korea’s SK Telecom confirms a cyberattack.…
…
continue reading

1
Thomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware security
1:33:42
1:33:42
Play later
Play later
Lists
Like
Liked
1:33:42Three Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism. We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national s…
…
continue reading

1
Episode 213 - The So Many Technical Issues Episode
52:06
52:06
Play later
Play later
Lists
Like
Liked
52:06This week in InfoSec (10:26) With content liberated from the “today in infosec” twitter account and further afield 1st April 1998: Hackers changed the MIT home page to read "Disney to Acquire MIT for $6.9 Billion". https://x.com/todayininfosec/status/1907094503552336134 1st April 2004: The now ubiquitous Gmail service is launched as an invitation-o…
…
continue reading

1
Why Ransomware, Credential Theft and Phishing Schemes Persist
39:52
39:52
Play later
Play later
Lists
Like
Liked
39:52One of the great things about covering industrial cybersecurity is the number of reports, studies and white papers being produced right now to help provide intelligence on threats, research on new tools, and data on leading trends. The tough part is sorting through all this data and, at some point, prioritizing it in order to get the most and best …
…
continue reading

1
Russian army map malware, edge tech attack report, Commvault flaw
8:12
8:12
Play later
Play later
Lists
Like
Liked
8:12Russian army targeted by Android malware hidden in mapping app Attackers hit security device defects hard in 2024 Critical Commvault Command Center flaw warning Huge thanks to our sponsor, Dropzone AI Alert investigation is eating up your security team's day—30 to 40 minutes per alert adds up fast. Dropzone AI's SOC Analyst transforms this reality …
…
continue reading
Verizon and Mandiant call for layered defenses against evolving threats. Cisco Talos describes ToyMaker and Cactus threat actors. Researchers discover a major Linux security flaw which allows rootkits to bypass traditional detection methods. Ransomware groups are experimenting with new business models. Deputy Assistant Director Cynthia Kaiser from …
…
continue reading

1
Cyber Defense Radio – Varun Kohli – Cequence – Hotseat Podcast – 2025
11:59
11:59
Play later
Play later
Lists
Like
Liked
11:59🎙️ Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this insightful episode of Cyber Defense Radio features Varun Kohli, Chief Marketing Officer of Cequence — a leading force in API security and application protection, safeguarding billions of API calls daily from abuse, fraud, and advanced threats. In this power-packed conversation, …
…
continue reading

1
Why Are We Still Struggling to Fix Application Security?
28:14
28:14
Play later
Play later
Lists
Like
Liked
28:14All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Eric Gold, chief evangelist, BackSlash. In this episode: Start with t…
…
continue reading

1
Blue Shield of California shared private data,FBI IC3 report, Ex-Army sergeant jailed
9:43
9:43
Play later
Play later
Lists
Like
Liked
9:43Blue Shield of California shared private health data of millions with Google The FBI issues its 2024 IC3 report Ex-Army sergeant jailed for selling military secrets Huge thanks to our sponsor, Dropzone AI Security analysts need practical experience to build investigation skills, but getting expert guidance for every alert is impossible. That's why …
…
continue reading

1
Are we a trade or a profession? [CISO Perspectives]
47:03
47:03
Play later
Play later
Lists
Like
Liked
47:03We're sharing a episode from another N2K show we thought you might like. It's the first episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: Cybersecurity has an identity problem where the industry as a whole is struggling to determine whether it is a trade or a profession. In this episode of CISO Perspectives,…
…
continue reading
Send us a text Sivan Tehila, CEO and founder of Onyxia Cyber, shares her journey from Israeli military CISO to innovative startup founder and cybersecurity educator, revealing how personal resilience shaped her multi-faceted career. • Started as a cybersecurity officer in the Israeli military for 10 years, serving as CISO of the Research and Analys…
…
continue reading
The White House’s shift of cybersecurity responsibilities to the states is met with skepticism. Baltimore City Public Schools suffer a ransomware attack. Russian state-backed hackers target Dutch critical infrastructure. Microsoft resolves multiple Remote Desktop issues. A new malware campaign is targeting Docker environments for cryptojacking. A n…
…
continue reading

1
Sean Stalzer on energy, cyber war, and securing America’s power grid
1:33:03
1:33:03
Play later
Play later
Lists
Like
Liked
1:33:03Sean Stalzer, CISO, Director of Cyber Security at Dominion Energy, joins The Watchers to discuss how cyber threats from China and Russia target America’s energy grid, and what the energy sector's thankless work force is doing to combat it. We explore vulnerabilities in solar infrastructure, the growing risk of insider threats, and how utilities are…
…
continue reading

1
#43 Grind Now, Relax Later: The Harsh Reality of Breaking Into Cybersecurity ft. Matthew Younker (Zumi Yumi)
34:29
34:29
Play later
Play later
Lists
Like
Liked
34:29In this episode of The Hacker’s Cache, Matthew Younker (aka Zumi Yumi) shares the raw truth about what it really took to break into offensive security, working full time, going to college, and grinding for OSCP with almost zero rest. He opens up about the unhealthy sacrifices he made, why OSWA was harder than OSCP, and how his journey from Army haz…
…
continue reading

1
Social Media Smoke: Razzlekhan, Dutch, and the $4 Billion Heist
23:27
23:27
Play later
Play later
Lists
Like
Liked
23:27When over 100,000 Bitcoin went missing in 2016, no one suspected the culprits: a quiet, mild-mannered developer and his ostentatious entrepreneur/rapper wife with a wacky social media presence. Meet Razzlekhan and Dutch, the most unlikely thieves in the history of crime. Resources: Razzlekhan and husband guilty of $4.5bn Bitcoin launder Bitcoin Plu…
…
continue reading

1
Mark & Spencer CyberAttack, SK Telecom Hacked, Lemonade Breach, Russian Cyber Sabotage
15:50
15:50
Play later
Play later
Lists
Like
Liked
15:50🎙️ Mark & Spencer CyberAttack, SK Telecom Hacked, Lemonade Breach, Russian Cyber Sabotage 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 901: Today’s episode will discuss the latest news as Mark & Spencer CyberAttack more news below: · Baltimore public school ransomware · Cookie Bi…
…
continue reading

1
Microsoft Recall updates, Russian orgs deal with networking software updates, SSL.com certificate issuance vulnerability
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10Microsoft Recall on Copilot+ PC: testing the security and privacy implications Russian organizations targeted by backdoor masquerading as secure networking software updates SSL.com Scrambles to Patch Certificate Issuance Vulnerability Huge thanks to our sponsor, Dropzone AI Is your security team spending too much time chasing alerts instead of stop…
…
continue reading
The Russian Proton66 is tied to cybercriminal bulletproof hosting services. A new Rust-based botnet hijacks vulnerable routers. CISA budget cuts limit the use of popular analysis tools. A pair of healthcare providers confirm ransomware attacks. Researchers uncover the Scallywag ad fraud network. The UN warns of cyber-enabled fraud in Southeast Asia…
…
continue reading

1
Mastering Cyber Risk: Matthew Alderman on Cybersecurity, Leadership & Building CyberSaint
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16Send us a text Join Joe as he reconnects with Matthew Alderman, Chief Product Officer at CyberSaint, in this insightful episode of the podcast! With over 250 episodes under his belt, Joe dives deep with Matthew, a cybersecurity veteran, podcast host, and advisor, to explore: CyberSaint’s Game-Changing Approach: How CyberSaint uses historical loss d…
…
continue reading

1
Japan Trading Account Hack, Windows NTLM Vulnerability Exploited, North Korea Cyberattacks, Info Sharing Bill
18:08
18:08
Play later
Play later
Lists
Like
Liked
18:08🎙️ Japan Trading Account Hack, Windows NTLM Vulnerability Exploited, North Korea Cyberattacks, Info Sharing Bill 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 900: Today’s episode will discuss the latest news as Japan Trading Account Hack more news below: · Abilene, TX Cyberattack…
…
continue reading

1
Data Minimization Means We Don’t Tell You What We’re Collecting
41:53
41:53
Play later
Play later
Lists
Like
Liked
41:53All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series, and Andy Ellis, partner, YL Ventures. Joining us is Mandy Huth, svp, CISO, Ultra Clean Technology. In this episode: Start with good defaults Building talent bridges Don’t forget the humans Differentiating wit…
…
continue reading
In this heartfelt season finale, Darnley takes a step back to reflect on the journey so far — from quiet beginnings during the COVID-19 shutdowns to building a global community of digital thinkers, privacy advocates, and cyber-curious minds. Join us as we reminisce about standout moments from Season 5, and real stories that brought cybersecurity in…
…
continue reading

1
Google OAuth abused, Japan's trading scams, hijacking with Zoom
7:59
7:59
Play later
Play later
Lists
Like
Liked
7:59Google OAuth abused in DKIM replay attack Japan warns of sharp rise in unauthorized trading North Koreans hijacking Zoom’s Remote Control Huge thanks to our sponsor, Dropzone AI Security threats don't clock out at 5 PM, but your analysts need to sleep sometime. Dropzone AI delivers around-the-clock alert investigations with the same attention to de…
…
continue reading

1
The 4 AAAAs of the AI ECOSYSTEM: Assistants, APIs, Agents, and Augmented Reality
27:04
27:04
Play later
Play later
Lists
Like
Liked
27:04In this episode, I break down what I believe is the emerging structure of the AI-powered world we're all building—consciously or not. I call it the “Four A’s”: Assistants, APIs, Agents, and Augmented Reality. This framework helps make sense of recent developments and where it’s all headed. I talk about: 1. Digital Assistants That Understand and Opt…
…
continue reading
Adversary nations are using ClickFix in cyber espionage campaigns. Japan’s Financial Services Agency issues an urgent warning after hundreds of millions in unauthorized trades. The critical Erlang/OTP’s SSH vulnerability now has public exploits. A flawed rollout of a new Microsoft Entra app triggers widespread account lockouts. The alleged operator…
…
continue reading

1
When AI Goes Rogue: API Security in the Age of AI Agents | Guest Sam Chehab
49:35
49:35
Play later
Play later
Lists
Like
Liked
49:35Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Today on Cyber Work, Sam Chehab, the head of security and IT at Postman, dives into API security and the intriguing concept of rogue AI agents. Chehab discusses the internal c…
…
continue reading

1
What’s Hot in AI Security at RSA Conference 2025?
24:14
24:14
Play later
Play later
Lists
Like
Liked
24:14Send us a text What’s really hot at RSA Conference 2025? MLSecOps Community Manager Madi Vorbrich sits down with Protect AI Co‑Founder Daryan “D” Dehghanpisheh for a rapid rundown of must‑see sessions, booth events, and emerging AI‑security trends—from GenAI agents to zero‑trust AI and million‑model scans. Use this episode to build a bullet‑proof R…
…
continue reading

1
Cyber Defense Radio – Brian Stone – Pondurance – Hotseat Podcast – 2025
16:30
16:30
Play later
Play later
Lists
Like
Liked
16:30Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this high-impact episode of Cyber Defense Radio features Brian Stone, Chief Revenue Officer at Pondurance — a trusted leader in Risk-Based Managed Detection and Response (MDR) backed by human intelligence. In this candid conversation, Brian shares why relying solely on automation and AI…
…
continue reading

1
Hertz Cleo Data Breach, Shadow AI Usage, ClickFix Goes Nation State, Apple ZeroDays Patched
19:48
19:48
Play later
Play later
Lists
Like
Liked
19:48🎙️ Hertz Cleo Data Breach, Shadow AI Usage, ClickFix Goes Nation State, Apple ZeroDays Patch 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 899: Today’s episode will discuss the latest news as Hertz Cleo Data Breach more news below: · Ahold Delhaize USA Ransomware · China Targets R…
…
continue reading