Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Information Security Forum Podcasts

show episodes
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Artwork

1
The Cognitive Crucible

Information Professionals Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
  continue reading
 
Artwork

1
Keeping It Real: Conversations with Jillian Michaels

Jillian Michaels | Crossover Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Jillian Michaels is renowned for transforming lives. Her fearless honesty, passion, and extensive knowledge on health, fitness, and nutrition have made her America’s go to motivator and wellness expert for the past two decades. This new format features an impressive lineup of guests and broadens the conversation to tackle the tough topics which matter the most in helping us better understand ourselves and the world around us. Through in-depth discussions and short form content, Jillian bring ...
  continue reading
 
Artwork
 
The Circuit is the number #1 source of information on protection matters and is the industry-leading magazine for all security professionals who want to stay ahead of the game. If you're new to the industry or an old-school veteran, the Circuit is the place for you. Through the podcast, we bring the stories and the contributors from the magazine to life. The Circuit team is: Elijah Shaw, Jon Moss, Shaun West and Phelim Rowe. For more information on all things Circuit related, visit us at: ht ...
  continue reading
 
Artwork

1
Dear Infosec

ISF Analyst Insight Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
  continue reading
 
Artwork

1
New Security Broadcast

Environmental Change and Security Program

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Tune in to our podcast to hear expert speakers on the links between global environmental change, security, development, and health. The Environmental Change and Security Program is a part of the Woodrow Wilson International Center for Scholars, the living, national memorial to President Wilson established by Congress in 1968 and headquartered in the District of Columbia. It is a nonpartisan institution, supported by public and private funds, engaged in the study of national and world affairs ...
  continue reading
 
Artwork

1
Policy Forum Pod

Policy Forum Pod

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Policy Forum Pod is the podcast of PolicyForum.net - Asia and the Pacific's platform for public policy debate, analysis and discussion. Policy Forum is based at Crawford School of Public Policy at The Australian National University. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Weekly podcast on the events, policies and ideas that will shape the world.World in 30 minutes is curated by Mark Leonard, Director of the European Council on Foreign Relations (ECFR), and features top-level speakers from across the EU and beyond to debate and discuss Europe’s role in the world. It was awarded “Best podcasts on EU politics” by PolicyLab in 2019.Member of the EuroPod network. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
ISGP's "The Forum"

Institute on Science for Global Policy (ISGP)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
“The Forum,” where science comes to socialize, is a biweekly audio podcast produced by a team of female scientists who specialize in contextualizing S&T advances for sci-curious novices and experts alike. The show is hosted by the Institute on Science for Global Policy (ISGP). Interested in infectious disease, food security, climate change, or synthetic biology? Curious about how scientific advancements, such as GMOs or medical interventions, are regulated? Wonder how science might help us s ...
  continue reading
 
Artwork

1
USENIX Invited Talks Podcast

USENIX Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The USENIX Invited Talks Podcast brings you industry leaders covering the latest in security, system administration, systems research, and more need-to-know technology topics. USENIX, The Advanced Computing Systems Association, has been the premier forum for presenting groundbreaking technology information for over 30 years. Check out excerpts from the luminary-led invited talks programs of past USENIX Conferences.
  continue reading
 
Artwork

1
Oceanology International Podcast

Oceanology International

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
The Oceanology International 2008 Podcast is where you’ll hear the views of the conference chairman, Dr Ralph Rayner, and other key speakers and companies attending the world’s largest forum for the marine science and ocean technology community, discussing issues such as climate change, energy from the oceans, marine renewables, civil & environmental security. Visit www.oceanologyinternational.com for more information.
  continue reading
 
Hosted by award winning veteran radio and television anchor, journalist, and marketing/public relations professional Sam Yates, this is a compelling show for seniors, about seniors, and featuring seniors. Yates is recognized as an expert in the senior care and urgent care business categories. The Great American Senior Show delves into topics that impact senior health and wellness; updates pandemic policies; is a forum for multi-political views; details financial and investment information; a ...
  continue reading
 
Artwork

4
Cyber Smartz

Robert White

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
I believe that business executives are a separate class of cyber targets that could be protected better. In order to do this, my company, Cyber Smartz, provides cybersecurity/information security training for business executives who do not have an IT background. As a strong advocate for privacy, my point of point of view will most likely conflict with some of the mainstream views on this subject. But that's also why its more effective. Support this podcast: https://podcasters.spotify.com/pod ...
  continue reading
 
Artwork

1
The Case From Israel

Israel Law & Liberty Forum

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
The Case from Israel is a podcast on Israeli law and democracy from the Israel Law and Liberty Forum. Together, we're going to delve deeply into Israel's political and legal ideas, meet the major figures who have shaped our society, and share perspectives on the biggest debates facing this incredible little country as it continues to shape its very democracy after 75 years. If you care about Israeli security, its Jewish and democratic character, its start-up nation, its social cohesion – thi ...
  continue reading
 
The Atlanta Personal Injury Lawyer Podcast features legal information for residents of Georgia who need help with their personal injury, car wreck, workers' compensation, rape, sexual assault, shooting, wrongful death, nursing home abuse, or social security disability claims. Each video podcast is an individual segment from the hit show "Do I Need a Lawyer?" and is hosted by Atlanta's own Gary Martin Hays. Gary is an experienced personal injury lawyer who is dedicated to serving the people o ...
  continue reading
 
Artwork

1
Nuclear Threats and the War in Ukraine

James Martin Center for Nonproliferation Studies

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Russia’s unprovoked invasion of Ukraine has set in motion a catastrophic war. The consequences of this war will be both tragic and far-reaching, including with respect to nuclear nonproliferation and risk reduction. Consistent with the CNS mission of promoting nonproliferation education and analysis, the Center offers a podcast about the nuclear challenges and risks that have arisen as a result of this unfolding crisis. In a fast-changing landscape with countless unknowns, this podcast aims ...
  continue reading
 
Loading …
show series
 
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Tod Rathbone discusses trends rel…
  continue reading
 
Today, Steve talks with Dr. Kathleen Perley, founder of DemystifAI and faculty and AI advisor to the deans at Rice Business. Dr. Perley explains why leadership matters when implementing AI in your business, and shares how to bridge the gap between tech-savvy CTOs and non-technical folks. Dr. Perley and Steve also discuss the possibilities and bound…
  continue reading
 
In late August 2025, the open-source software ecosystem was rocked by a sophisticated two-phase supply chain attack, now known as “s1ngularity.” The incident began when attackers exploited a flaw in GitHub Actions workflows for the Nx repository, stealing an NPM publishing token and using it to release malicious versions of Nx packages. These packa…
  continue reading
 
Wealthsimple, one of Canada’s largest online investment platforms, has confirmed a data breach that exposed the sensitive information of fewer than 1% of its three million clients. The incident, detected on August 30, 2025, originated from a supply chain attack: a trusted third-party vendor’s compromised software package served as the entry point f…
  continue reading
 
In a year when cybercrime is projected to cost the world over $10.5 trillion, FireCompass has emerged as one of the most closely watched AI-driven cybersecurity innovators. The startup, founded in 2019, just secured $20 million in new funding—bringing its total raised to nearly $30 million. Backed in part by EC-Council’s Cybersecurity Innovation Fu…
  continue reading
 
A newly uncovered critical vulnerability, tracked as CVE-2025-42957, is sending shockwaves through the enterprise technology world. Affecting all SAP S/4HANA deployments, both on-premise and in private cloud environments, this ABAP code injection flaw carries a near-maximum CVSS score of 9.9. What makes it especially dangerous is its low complexity…
  continue reading
 
North Korean cybercriminals have escalated their social engineering operations, deploying a wave of sophisticated campaigns designed to infiltrate cryptocurrency and decentralized finance (DeFi) organizations. At the center of these operations is the “Contagious Interview” campaign, where hackers impersonate recruiters and trick job seekers into do…
  continue reading
 
This week Mark Leonard is joined by Balázs Orbán, Hungarian prime minister Viktor Orbán’s (no relation) political director since 2021. He is also chairman of the board at the Mathias Corvinus Collegium. Previously, Balázs was minister of state in the prime minister’s office and director general of the Migration Research Institute in Budapest. Toget…
  continue reading
 
Cato Networks, a leader in Secure Access Service Edge (SASE), has made its first acquisition, purchasing Aim Security, an AI security startup founded in 2022. The acquisition, valued at an estimated $300–350 million, represents a major step in addressing the growing risks tied to generative AI adoption in enterprises. As organizations increasingly …
  continue reading
 
Cybersecurity startup Tidal Cyber, founded in 2022 by three former MITRE experts, has raised $10 million in Series A funding, bringing its total capital to $15 million. The funding will accelerate the company’s product innovation and expansion, advancing its mission to operationalize the MITRE ATT&CK framework and empower organizations with threat-…
  continue reading
 
Disney has reached a $10 million settlement with the U.S. Federal Trade Commission (FTC) after being found in violation of the Children’s Online Privacy Protection Act (COPPA). At the heart of the case is Disney’s failure to properly label child-directed content on YouTube as “Made for Kids” (MFK). Instead, many videos — including clips from Frozen…
  continue reading
 
Google has released its September 2025 Android security patches, addressing a staggering 111 unique vulnerabilities, including two actively exploited zero-day flaws that are already being used in targeted attacks. These zero-days — CVE-2025-38352, a Linux kernel race condition, and CVE-2025-48543, a flaw in the Android Runtime — allow attackers to …
  continue reading
 
You know Rob Riggle as the hilarious comedian from The Daily Show and countless films—but there’s another side you’ve never heard. In this explosive conversation, Rob opens up about his years as a U.S. Marine, his experience on 9/11, and the reality of America’s forever wars. We dig into the culture clashes reshaping the country, from COVID vaccine…
  continue reading
 
A critical zero-day vulnerability, CVE-2025-53690, is being actively exploited in the wild, targeting Sitecore Experience Manager (XM) and Experience Platform (XP) systems deployed with outdated ASP.NET machine keys. Google and Microsoft threat intelligence teams have confirmed that attackers are leveraging ViewState deserialization attacks to achi…
  continue reading
 
Andy summarizes some helpful IRS tools and interesting IRS and tax return-related information after his recent attendance at the annual IRS Tax Forum/conference Links in this episode: IRS Taxpayer Online Account - here ID.me - here IRS IP PINs - here IRS Document Upload Tool - here IRS Interactive Tax Assistant - here Tenon Financial monthly e-news…
  continue reading
 
Who really profits when children are diagnosed with gender dysphoria? In this explosive episode, we uncover the billion-dollar transgender medical industry—from puberty blockers and hormone therapies to surgeries and lifelong treatments. Follow the money trail and discover how powerful institutions, pharmaceutical companies, and medical providers a…
  continue reading
 
A new and highly sophisticated Android malware campaign, dubbed Brokewell, has emerged as one of the most dangerous mobile threats of 2024–2025. First spotted in April 2024 disguised as fake browser updates, Brokewell has since evolved into a fully featured spyware and remote access trojan (RAT), delivered through deceptive Meta (Facebook) advertis…
  continue reading
 
Aviation safety and geopolitics collided when multiple flights carrying high-ranking European and UK officials were hit by suspected Russian GPS jamming. European Commission President Ursula von der Leyen’s flight to Bulgaria experienced a severe GPS outage, forcing a manual landing. EU officials immediately pointed the finger at Moscow, calling th…
  continue reading
 
In August 2025, the largest SaaS breach of the year shook the enterprise world when a newly identified threat actor, UNC6395, orchestrated a supply-chain attack through compromised Salesloft Drift and Drift Email applications. By stealing OAuth tokens, the attackers gained unauthorized access to Salesforce and Google Workspace environments of more …
  continue reading
 
A pair of newly discovered zero-day vulnerabilities—CVE-2025-43300 in Apple’s ImageIO framework and CVE-2025-55177 in WhatsApp—have been confirmed as part of a sophisticated spyware campaign targeting both iPhone and Android users. Security researchers revealed that attackers chained these flaws together in seamless zero-click exploits, requiring n…
  continue reading
 
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Randy Rosin returns to the Cognit…
  continue reading
 
In today’s episode, Steve speaks with Karena Man, whose expertise is connecting organizations with experts in technology as a Senior Client Partner at Korn Ferry. Karena highlights the growing awareness of cyber by boards of directors — an awareness brought on by the increase in cyber intrusions. She also emphasizes the importance of storytelling a…
  continue reading
 
This week Mark Leonard is joined by Hélène De Lauzun, Paris correspondent for the European Conservative and author of L'histoire de l'Autriche (The History of Austria), to discuss the historical roots and modern expressions of conservatism in France. Together, Mark and Hélène explore her intellectual journey as a historian emphasising France’s pre-…
  continue reading
 
Sweden is reeling from one of the largest public sector cyber incidents in its history. A ransomware attack on Miljödata, an IT services provider supporting nearly 80% of Sweden’s municipalities and several regions, has left critical systems inaccessible and raised fears of a massive leak of sensitive personal data. The stolen information could inc…
  continue reading
 
The cybersecurity world has entered a new era: AI-powered ransomware. Researchers recently uncovered PromptLock, a proof-of-concept malware that uses OpenAI’s gpt-oss:20b model and Lua scripting to autonomously generate malicious code, encrypt data, and exfiltrate files across Windows, Linux, and macOS. While still experimental, PromptLock demonstr…
  continue reading
 
The 2025 Purple Knight Report paints a stark picture of enterprise identity security: the average security assessment score for hybrid Active Directory (AD) and Entra ID environments has plummeted to just 61%—a failing grade and an 11-point decline since 2023. This troubling trend underscores the persistent challenges organizations face in protecti…
  continue reading
 
Cybercrime is entering a new phase—one marked by AI-powered phishing attacks, the weaponization of legitimate remote access tools, and the rise of professionalized underground markets. Recent reports highlight the alarming growth of AI-driven polymorphic phishing, where malicious emails are automatically tailored, randomized, and adapted in real ti…
  continue reading
 
The recent Salesforce data breach underscores a growing reality in cybersecurity: even when core SaaS platforms are secure, their third-party integrations often aren’t. Between August 8–18, 2025, attackers from the group UNC6395 exploited compromised OAuth tokens from the Salesloft Drift AI chat integration, systematically exporting data from hundr…
  continue reading
 
Listener Q&A where Andy talks about: How to account on your tax return for the basis in inherited IRAs ( 7:00 ) Is having large Required Minimum Distributions ("RMDs") really a bad thing ( 12:04 ) Is there any merit to using a break-even analysis to help decide when to start Social Security ( 15:59 ) When does it make sense for someone to consider …
  continue reading
 
A new and highly sophisticated cyber espionage campaign attributed to Silk Typhoon—also known as Mustang Panda, TEMP.Hex, or UNC6384—has been uncovered, targeting diplomats and government entities across Southeast Asia. Researchers from Google’s Threat Intelligence Group (GTIG) revealed that the attackers deployed Adversary-in-the-Middle (AitM) tec…
  continue reading
 
The fight over encryption has entered a new phase. The Federal Trade Commission (FTC), led by Chairman Andrew Ferguson, has issued a strong warning to major U.S. technology companies: resist foreign government demands to weaken encryption. At stake is nothing less than the security of millions of Americans’ private communications, financial data, a…
  continue reading
 
Researchers have uncovered a new form of indirect prompt injection that leverages a simple but powerful trick: image scaling. This novel attack involves hiding malicious instructions inside high-resolution images, invisible to the human eye. When AI systems automatically downscale these images during preprocessing, the hidden prompt becomes visible…
  continue reading
 
The healthcare sector has been rocked yet again by a massive cybersecurity incident. Healthcare Services Group (HCSG), a provider of dining and laundry services to healthcare facilities, disclosed a data breach that compromised the personal information of over 624,000 individuals. Between late September and early October 2024, hackers gained unauth…
  continue reading
 
Max Lugavere—NYT bestselling author of Genius Foods and brain-health crusader—joins us to reveal the secrets to living longer, sharper, and stronger. From food-as-medicine hacks that have gone viral to his provocative take on MAHA (Make America Healthy Again), Max brings the science and the controversy. We dig into shocking new twists in Alzheimer’…
  continue reading
 
French retail giant Auchan has confirmed a massive data breach that compromised the personal details of hundreds of thousands of customers. The stolen data includes names, addresses, phone numbers, email addresses, and loyalty card numbers—though banking details, passwords, and PINs were reportedly not affected. Despite this, the breach is serious …
  continue reading
 
A critical vulnerability in Docker Desktop, CVE-2025-9074, has shaken the container security world. Scoring 9.3 on the CVSS scale, this flaw exposed an unauthenticated Docker Engine API (192.168.65.7:2375) to any container running on Windows and macOS. With nothing more than a few HTTP requests—or even three lines of Python code—attackers could esc…
  continue reading
 
The Arch Linux community has just endured more than a week of turbulence as a massive distributed denial-of-service (DDoS) attack disrupted its most critical services, including the main website, the Arch User Repository (AUR), and community forums. Beginning in mid-August 2025, the sustained volumetric and protocol-level assault overwhelmed hostin…
  continue reading
 
Cyberattacks against supply chains are no longer isolated disruptions—they are systemic threats with the power to cascade across industries and nations. The recent ransomware attack on Data I/O, a chip programming firm whose customers include global giants like Apple, Microsoft, Amazon, and Bosch, demonstrates how one breach can disrupt manufacturi…
  continue reading
 
The U.S. healthcare sector continues to face relentless cyberattacks, and rural hospitals are increasingly at the center of this crisis. The recent Aspire Rural Health System breach in Michigan—attributed to the BianLian ransomware group—exposed the personal and medical data of nearly 140,000 patients and staff. From Social Security numbers and fin…
  continue reading
 
Artificial Intelligence (AI) models are shaping the future of industries from healthcare and finance to autonomous vehicles and national infrastructure. But with this rise comes a hidden battlefield: adversarial attacks designed to manipulate AI systems in subtle yet devastating ways. One of the most alarming threats is the OneFlip attack, a method…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play