Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Podcast by Alex Wood & Robb Reck
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
The Security Perspectives Podcast is a show that explores the world of information security and provides valuable insights into starting and advancing a career in this exciting field. Hosted by Nikolas Behar, each episode features a guest who shares their unique perspective on the latest trends, challenges, and opportunities in information security. From red team operators to chief information security officers, guests offer valuable advice and practical tips for listeners looking to break i ...
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Daily analysis of the biggest global security developments, brought to you by military specialists and The Times' renowned foreign correspondents. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Financial Times takes you into the corridors of power to unwrap, analyse and debate British politics with a regular lineup of FT correspondents and informed commentators. New episodes available every Friday. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
"Humanizing cybersecurity with candid tales from cyberspace and beyond!" Voices of the Vigilant builds and shares knowledge by engaging with diverse voices and perspectives within the cybersecurity industry.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading

1
The Medcurity Podcast: HIPAA Compliance | Security | Technology | Healthcare
Medcurity: HIPAA Compliance
Healthcare is complicated. Joe Gellatly and Amanda Hepper are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more.
…
continue reading
Register for Free, Live webcasts & summits: https://poweredbybhis.coma 00:00 - PreShow Banter™ — Crime is bad 00:18 - dangerous trend of destroying Chromebooks 04:33 - BHIS - Talkin’ Bout [infosec] News 2025-05-12 05:40 - Story # 1: LockBit Ransomware Hacked, Insider Secrets Exposed 06:36 - Story # 1b: https://ransomch.at 09:31 - Story # 2: White H…
…
continue reading

1
274 - 5/5 - Jason Haddix, CEO/Hacker @ Arcanum Information Security
1:34:02
1:34:02
Play later
Play later
Lists
Like
Liked
1:34:02Our feature guest this week is Jason Haddix, CEO/Hacker @ Arcanum Information Security. We’re also trying something new with our interviews and Jason will be doing an Ask Me Anything in the #AMA channel on Slack. Head on over there to ask him any questions you might have! News from and a lot more!Come join us on the Colorado = Security Slack channe…
…
continue reading

1
Unsecurity Episode 238: Air Gapping w/ Sean Behan
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11This week on Unsecurity, Senior Offensive Security Engineer Sean Behan sits with Brad and Megan to dissect Air Gapping. Starting with the development of the Air Gap method, they discuss its evolution and the pros and cons of each type. Tune in for an engaging discussion on understanding systems operations, strengths, and weaknesses of air gapped ne…
…
continue reading

1
Lawfare Daily: The Trials of the Trump Administration, May 16
1:33:23
1:33:23
Play later
Play later
Lists
Like
Liked
1:33:23In a live conversation on May 16, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Senior Editors Anna Bower, Quinta Jurecic, and Roger Parloff and Lawfare Legal Fellow James Pearce to discuss legal challenges against President Trump’s executive actions, including the Friday hearing in the Abrego Garcia litigation, the Supreme Court’s …
…
continue reading

1
UK retailer update, Microsoft Defender disabler, deepfakes target officials
8:10
8:10
Play later
Play later
Lists
Like
Liked
8:10Scattered Spider facilitates UK retail hacks and is moving to the U.S. Defendnot tool can disable Microsoft Defender FBI warns government officials about new waves of deepfakes Huge thanks to our sponsor, Conveyor Are you dealing with security questionnaire chaos this week? If so, get Conveyor’s AI to knock them out for you. Connect Conveyor to any…
…
continue reading

1
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk (#)
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk xorsearch.py: Python Functions Didier’s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own c…
…
continue reading

1
Special episode: Anthony Blinken exclusive
24:18
24:18
Play later
Play later
Lists
Like
Liked
24:18In this extended edition, former US Secretary of State Antony Blinken sits down with Times Radio for an exclusive broadcast interview – his first outside the United States since leaving office in January. Blinken delves into the US-Europe relationship, the ongoing war in Ukraine, tensions in the Middle East, and offers insights into Joe Biden’s hea…
…
continue reading

1
Lawfare Archive: Human Rights Abuses in Saudi Arabia with Joey Shea
28:06
28:06
Play later
Play later
Lists
Like
Liked
28:06From September 26, 2023: On August 21, the Human Rights Watch released a report detailing systematic abuses of Ethiopian migrants and asylum seekers at the Saudi Arabia-Yemen border. Researchers interviewed dozens of Ethiopian migrants and asylum seekers and found that Saudi border guards had used explosive weapons on them and shot migrants at clos…
…
continue reading

1
Frontline special - Lord Ricketts, former national security adviser
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59In this extended Frontline conversation, Lord Ricketts - Peter Ricketts - former UK National Security Advisor and seasoned British diplomat, examines the latest developments in Ukraine's war, from stalled peace talks to Putin's strategic provocations. The World in 10 is the Times' daily podcast dedicated to global security. Expert analysis of war, …
…
continue reading

1
Lawfare Archive: Christina Koningisor on Secrecy Creep
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09From January 4, 2022: Government secrecy is pervasive when it comes to national security and foreign affairs, and it’s becoming more and more common for state and even local governments to invoke government secrecy rationales that in the past, only the president of the United States and the national intelligence community were able to claim. While …
…
continue reading

1
Week in Review: Hackers pump stocks, Microsoft stops screenshots, AI encrypts cybersecurity
29:05
29:05
Play later
Play later
Lists
Like
Liked
29:05Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Nick Espinosa, host, The Deep Dive Radio Show. Here’s where you can find him: Daily Podcast on SoundCloud | YouTube | Forbes | Twitter/X | Facebook | BlueSky | Mastodon Thanks to our show sponsor, Vanta Do you know the status of your …
…
continue reading

1
Chrome's New Vulnerability CVE-2025-4664: A Security Flaw That Can Lead to Account Takeover
9:19
9:19
Play later
Play later
Lists
Like
Liked
9:19In this episode, we take an in-depth look at the newly discovered CVE-2025-4664 vulnerability in Google Chrome’s Loader component. This high-severity security flaw is affecting not only Chrome but also other Chromium-based browsers, including Microsoft Edge, Brave, Opera, and Vivaldi. The issue lies in insufficient policy enforcement within the bro…
…
continue reading
Send us a text What happens when AI replaces the careers we've built our identities around? This question sits at the heart of my conversation with Naomi Buckwalter, Director of Product Security at Contrast Security and founder of Cybersecurity Gatebreakers Foundation. Naomi's cybersecurity journey began with a moment of clarity during a week-long …
…
continue reading

1
A Coinbase breach with bribes, rogue contractors and a $20M ransom demand
2:23:34
2:23:34
Play later
Play later
Lists
Like
Liked
2:23:34Three Buddy Problem - Episode 46: We dig into a Coinbase breach headlined by bribes, rogue contractors and a $20 million ransom demand. Plus, (another!) batch of Ivanti and Microsoft zero-days being exploited in the wild, a new 'Intrusion Logging' feature coming to Android, Apple's iOS 18.5 patches, and the EU announcing its own vulnerability datab…
…
continue reading
Hey friends! Today Joe “The Machine” Skeen and I tackled GOAD (Game of Active Directory) again – this time covering: SQL link abuse between two domains Forging inter-realm TGTs to conquer the coveted sevenkingdoms.local! Join us next month when we aim to overtake essos.local, which will make us rulers over all realms!…
…
continue reading

1
Scattered Spider Targets UK and US Retailers: The Growing Threat to Major Brands
11:52
11:52
Play later
Play later
Lists
Like
Liked
11:52In this episode, we dive deep into the recent wave of cyberattacks plaguing major UK retailers such as Marks & Spencer, Co-op, and Harrods, with a special focus on the threat group behind them: Scattered Spider (also known as UNC3944, Muddled Libra, and several other aliases). We'll explore how this loosely coordinated cybercriminal group has expan…
…
continue reading

1
Cyber Resiliency - Strategy Meets Security: How Authenticity Drives Strategic Partnerships
46:02
46:02
Play later
Play later
Lists
Like
Liked
46:02Send us a text What happens when we bring our authentic selves to work? Rachel Arnold, Director of Strategic Partnerships at Secure Nation, reveals the power of human connection in building lasting client relationships in cybersecurity. Rachel describes her unique role as "the human API" - connecting people, products, and possibilities through deep…
…
continue reading

1
Trump’s Syria shift could be a game-changer
10:36
10:36
Play later
Play later
Lists
Like
Liked
10:36Donald Trump’s decision to lift all US sanctions on Syria and meet with its new President, Ahmed al-Sharaa—a former al-Qaeda commander—has sparked debate. Calling him a "young, attractive, tough guy," Trump’s move could reshape alliances and power dynamics across the Middle East, with significant implications for Israel. Elliott Abrams, a veteran o…
…
continue reading
It’s been another turbulent week for Labour after Keir Starmer announced a crackdown on legal migration. The prime minister gave what has since become a controversial speech suggesting the UK is at risk of becoming an “island of strangers” – and home secretary Yvette Cooper announced an end to all social care visas, tighter rules for highly skilled…
…
continue reading

1
Proofpoint Acquires Hornetsecurity for $1B: A New Era in Microsoft 365 Security
10:18
10:18
Play later
Play later
Lists
Like
Liked
10:18In a major move within the cybersecurity space, Proofpoint has announced the acquisition of Hornetsecurity for over $1 billion. This deal significantly strengthens Proofpoint’s foothold in Microsoft 365 security, while expanding its reach into the small and mid-sized business (SMB) market through Hornetsecurity’s extensive network of managed servic…
…
continue reading

1
Cybersecurity Company CEO Charged for Planting Malware
3:43
3:43
Play later
Play later
Lists
Like
Liked
3:43- CEO of a Cybersecurity Company Charged for Planting Malware. - Microsoft to Expand Hotpatching. - Apple Airplay is Being Exploited. - Ransomware Cripples Hospitals. Support the show Remember... Even with top-tier security, human negligence and/or error can compromise systems. Invest in employee training—it’s the ultimate safeguard. Stay Informed,…
…
continue reading

1
Lawfare Daily: What Trump’s Middle East Trip Means for Gaza and the Israeli-Palestinian Conflict, with Joel Braunold
1:10:07
1:10:07
Play later
Play later
Lists
Like
Liked
1:10:07For today’s episode, Lawfare General Counsel and Senior Editor Scott R. Anderson sat down with Contributing Editor Joel Braunold, the Managing Director of the S. Daniel Abraham Center for Middle East Peace, for the latest in their series of podcast conversations delving into the latest developments relating to the Israeli-Palestinian conflict and r…
…
continue reading

1
Coinbase hackers bribe staff, Windows 11 hacked at Pwn2Own, Telegram purges black market group
8:08
8:08
Play later
Play later
Lists
Like
Liked
8:08Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom Windows 11 and Red Hat Linux hacked on first day of Pwn2Own The Internet’s biggest-ever black market just shut down amid a Telegram purge Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We …
…
continue reading

1
Risky Biz Soap Box: Push Security's browser-first twist on identity security
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24In this wholly sponsored Soap Box edition of the show, Patrick Gray chats with Adam Bateman and Luke Jennings from Push Security. Push has built an identity security platform that collects identity information and events from your users’ browsers. It can detect phish kits and shut down phishing attempts, protect SSO credentials, and find shadow/per…
…
continue reading

1
Risky Biz Soap Box: Push Security's browser-first twist on identity security
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24In this wholly sponsored Soap Box edition of the show, Patrick Gray chats with Adam Bateman and Luke Jennings from Push Security. Push has built an identity security platform that collects identity information and events from your users’ browsers. It can detect phish kits and shut down phishing attempts, protect SSO credentials, and find shadow/per…
…
continue reading
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
…
continue reading

1
SANS Stormcast Friday, May 16th: Increase in Sonicwall Scans; RVTools Compromised?; RountPress (#)
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27SANS Stormcast Friday, May 16th: Increase in Sonicwall Scans; RVTools Compromised?; RountPress Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from “Global Host”, a low-cost virtual hosting provider. https://isc.sans.edu/…
…
continue reading

1
Rational Security: The “Doodle Ordinance” Edition
1:17:14
1:17:14
Play later
Play later
Lists
Like
Liked
1:17:14This week, Scott sat down with his Lawfare colleagues Natalie Orpett, Tyler McBrien, and Daniel Byman to talk through the week’s big national security news, including: “Borderline Behavior.” A major flare-up over the disputed region of Kashmir took place this past week, leading to a major exchange of hostilities between the nuclear powers of India …
…
continue reading
This week, Scott sat down with his Lawfare colleagues Natalie Orpett, Tyler McBrien, and Daniel Byman to talk through the week’s big national security news, including: “Borderline Behavior.” A major flare-up over the disputed region of Kashmir took place this past week, leading to a major exchange of hostilities between the nuclear powers of India …
…
continue reading

1
Trump, Zelensky and the consequences of Putin’s no-show
10:23
10:23
Play later
Play later
Lists
Like
Liked
10:23Vladimir Putin's failure to head to Turkey for peace talks with Volodymyr Zelenskyy appears to have exposed his total lack of desire to end the war in Ukraine. Chatham House's Orysia Lutsevych analyses whether Donald Trump will finally acknowledge that and act accordingly, walk away from the situation entirely, or merely blindly continue his warm r…
…
continue reading
From the ISACA Middle Tennessee conference March 2025. Darin McCloy is the VP Security and Compliance, CISO at PolicyCo. He is also the Cyber Security, Compliance, and Risk Adviser at Clarity Cyber Assurance, providing Cyber Security and Compliance consultation for clients in a wide range of industry verticals. He helps businesses and government ad…
…
continue reading

1
Lawfare Daily: How China Might Coerce Taiwan
36:12
36:12
Play later
Play later
Lists
Like
Liked
36:12For today's episode, Lawfare Foreign Policy Editor Daniel Byman talked with Evan Braden Montgomery and Toshi Yoshihara, both Senior Fellows at the Center for Strategic and Budgetary Assessments, to discuss their recent Lawfare article, "Beijing's Changing Invasion Calculus: How China Might Put Taiwan in its Crosshairs." Together they discuss how Ch…
…
continue reading

1
Here Comes the Sludge with Kelly Shortridge and Josiah Dykstra
43:23
43:23
Play later
Play later
Lists
Like
Liked
43:23Users, threat actors, and the system design all influence—and are influenced by—one another. To design safer systems, we first need to understand the players who operate within those systems. Kelly Shortridge and Josiah Dykstra exemplify this human-centered approach in their work. In this episode we talk about: The vital role of human factors in cy…
…
continue reading

1
Attack on steel producer, EUVD online, CISA advisory overhaul
8:01
8:01
Play later
Play later
Lists
Like
Liked
8:01Steel producer disrupted by cyberattack European Vulnerability Database (EUVD) is online CISA pauses advisory overhaul Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in…
…
continue reading

1
Diving deep into critical infrastructure.
46:49
46:49
Play later
Play later
Lists
Like
Liked
46:49This week on Caveat, Dave and Ben welcome back N2K’s own Ethan Cook for our latest policy deep dive segment. As a trusted expert in law, privacy, and surveillance, Ethan is joining the show regularly to provide in-depth analysis on the latest policy developments shaping the cybersecurity and legal landscape. While this show covers legal topics, and…
…
continue reading

1
Insidious and underappreciated? The impact of gender-based violence on national security
43:38
43:38
Play later
Play later
Lists
Like
Liked
43:38What is the link between gender and extremism? What makes it a national security issue? Can domestic violence act as a ‘comorbidity’ for extremism and radicalisation? Should the Australian Government consider following the lead of other countries and classifying misogyny as a form of extremism? In this episode, Elise Stephenson and Pascale Taplin j…
…
continue reading

1
This Is What Real Readiness Looks Like | Medcurity Live 093
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48Readiness in healthcare compliance means more than checking a box once a year. This episode looks at how healthcare organizations can move beyond annual tasks and create routines that hold up under scrutiny. It’s a practical look at what regulators are expecting and how to be ready before they come knocking. Learn more about Medcurity here: https:/…
…
continue reading
Q&A225: Are there any things in privacy where you can't ease in or make mistakes? How can a typical person do traffic analysis on phones? How do we address printer privacy concerns? Is it safer to open a port in a VPN than a router? Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded or XMR Chat: https://xmrchat.co…
…
continue reading

1
SANS Stormcast Thursday, May 15th: Google Open Redirects; Adobe, Ivanti, and Samsung patches (#)
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16SANS Stormcast Thursday, May 15th: Google Open Redirects; Adobe, Ivanti, and Samsung patches Another day, another phishing campaign abusing google.com open redirects Google’s links from it’s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/di…
…
continue reading

1
Exploited in the Wild: SAP NetWeaver Zero-Days Hit Fortune 500
22:55
22:55
Play later
Play later
Lists
Like
Liked
22:55In this episode, we dive into the active exploitation of two critical zero-day vulnerabilities in SAP NetWeaver—CVE-2025-31324 and CVE-2025-42999. Threat actors have been leveraging these flaws since January 2025 to gain unauthenticated access, upload malicious web shells, and ultimately achieve remote code execution by chaining an insecure deseria…
…
continue reading

1
Reporting the Realities of Real ID with Rich Davis
30:17
30:17
Play later
Play later
Lists
Like
Liked
30:17On this episode of SecurityDNA, Steve Lasky invites International SOS Senior Security Advisor Rich Davis to the discussion table. Davis brings his extensive background in aviation security to the podium today to discuss the long-awaited REAL ID implementation and how it will impact airport security, operations, and the traveler experience. Rich Dav…
…
continue reading

1
Checkout Chaos: Inside the £3.5 Million-a-Day M&S Cyber-Shutdown
16:19
16:19
Play later
Play later
Lists
Like
Liked
16:19The recent ransomware attack on Marks & Spencer (M&S) is a sobering example of the evolving cyber threat landscape confronting the retail industry. In this episode, we unpack how one of the UK's most iconic retailers fell victim to a sophisticated cybercriminal group known as Scattered Spider. This group, recognized for its advanced social engineer…
…
continue reading
With China building warships at a rate well beyond anyone else on the planet, Donald Trump has vowed to “make US shipbuilding great again.” The World in 10 analyses what threat the US president sees from a Chinese mega-fleet, and whether his executive order, “Restoring America’s Maritime Dominance”, is too late to prevent it. The World in 10 is the…
…
continue reading

1
Targeted iOS Attacks: The Zero-Days Apple Had to Patch Fast
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09In this episode, we break down Apple’s massive May 2025 security update blitz—a sweeping patch release that spanned iOS, macOS, iPadOS, tvOS, visionOS, and watchOS. The urgency? Two zero-day vulnerabilities, CVE-2025-31200 (Core Audio) and CVE-2025-31201 (Core Media), were already under active exploitation in what experts are calling “extremely sop…
…
continue reading