The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Information Security Forum Podcasts
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Teaching you all about IRAs & Roth IRAs, employer retirement plans, taxes, Social Security, Medicare, portfolio withdrawal strategies, annuities, estate planning and much more!
…
continue reading
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
…
continue reading
Privacy and information security
…
continue reading
Jillian Michaels is renowned for transforming lives. Her fearless honesty, passion, and extensive knowledge on health, fitness, and nutrition have made her America’s go to motivator and wellness expert for the past two decades. This new format features an impressive lineup of guests and broadens the conversation to tackle the tough topics which matter the most in helping us better understand ourselves and the world around us. Through in-depth discussions and short form content, Jillian bring ...
…
continue reading
The Circuit is the number #1 source of information on protection matters and is the industry-leading magazine for all security professionals who want to stay ahead of the game. If you're new to the industry or an old-school veteran, the Circuit is the place for you. Through the podcast, we bring the stories and the contributors from the magazine to life. The Circuit team is: Elijah Shaw, Jon Moss, Shaun West and Phelim Rowe. For more information on all things Circuit related, visit us at: ht ...
…
continue reading
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
…
continue reading
Tune in to our podcast to hear expert speakers on the links between global environmental change, security, development, and health. The Environmental Change and Security Program is a part of the Woodrow Wilson International Center for Scholars, the living, national memorial to President Wilson established by Congress in 1968 and headquartered in the District of Columbia. It is a nonpartisan institution, supported by public and private funds, engaged in the study of national and world affairs ...
…
continue reading
Policy Forum Pod is the podcast of PolicyForum.net - Asia and the Pacific's platform for public policy debate, analysis and discussion. Policy Forum is based at Crawford School of Public Policy at The Australian National University. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Weekly podcast on the events, policies and ideas that will shape the world.World in 30 minutes is curated by Mark Leonard, Director of the European Council on Foreign Relations (ECFR), and features top-level speakers from across the EU and beyond to debate and discuss Europe’s role in the world. It was awarded “Best podcasts on EU politics” by PolicyLab in 2019.Member of the EuroPod network. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
“The Forum,” where science comes to socialize, is a biweekly audio podcast produced by a team of female scientists who specialize in contextualizing S&T advances for sci-curious novices and experts alike. The show is hosted by the Institute on Science for Global Policy (ISGP). Interested in infectious disease, food security, climate change, or synthetic biology? Curious about how scientific advancements, such as GMOs or medical interventions, are regulated? Wonder how science might help us s ...
…
continue reading
The USENIX Invited Talks Podcast brings you industry leaders covering the latest in security, system administration, systems research, and more need-to-know technology topics. USENIX, The Advanced Computing Systems Association, has been the premier forum for presenting groundbreaking technology information for over 30 years. Check out excerpts from the luminary-led invited talks programs of past USENIX Conferences.
…
continue reading
The Oceanology International 2008 Podcast is where you’ll hear the views of the conference chairman, Dr Ralph Rayner, and other key speakers and companies attending the world’s largest forum for the marine science and ocean technology community, discussing issues such as climate change, energy from the oceans, marine renewables, civil & environmental security. Visit www.oceanologyinternational.com for more information.
…
continue reading
Hosted by award winning veteran radio and television anchor, journalist, and marketing/public relations professional Sam Yates, this is a compelling show for seniors, about seniors, and featuring seniors. Yates is recognized as an expert in the senior care and urgent care business categories. The Great American Senior Show delves into topics that impact senior health and wellness; updates pandemic policies; is a forum for multi-political views; details financial and investment information; a ...
…
continue reading
I believe that business executives are a separate class of cyber targets that could be protected better. In order to do this, my company, Cyber Smartz, provides cybersecurity/information security training for business executives who do not have an IT background. As a strong advocate for privacy, my point of point of view will most likely conflict with some of the mainstream views on this subject. But that's also why its more effective. Support this podcast: https://podcasters.spotify.com/pod ...
…
continue reading
The Case from Israel is a podcast on Israeli law and democracy from the Israel Law and Liberty Forum. Together, we're going to delve deeply into Israel's political and legal ideas, meet the major figures who have shaped our society, and share perspectives on the biggest debates facing this incredible little country as it continues to shape its very democracy after 75 years. If you care about Israeli security, its Jewish and democratic character, its start-up nation, its social cohesion – thi ...
…
continue reading
The Atlanta Personal Injury Lawyer Podcast features legal information for residents of Georgia who need help with their personal injury, car wreck, workers' compensation, rape, sexual assault, shooting, wrongful death, nursing home abuse, or social security disability claims. Each video podcast is an individual segment from the hit show "Do I Need a Lawyer?" and is hosted by Atlanta's own Gary Martin Hays. Gary is an experienced personal injury lawyer who is dedicated to serving the people o ...
…
continue reading
Russia’s unprovoked invasion of Ukraine has set in motion a catastrophic war. The consequences of this war will be both tragic and far-reaching, including with respect to nuclear nonproliferation and risk reduction. Consistent with the CNS mission of promoting nonproliferation education and analysis, the Center offers a podcast about the nuclear challenges and risks that have arisen as a result of this unfolding crisis. In a fast-changing landscape with countless unknowns, this podcast aims ...
…
continue reading
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Tod Rathbone discusses trends rel…
…
continue reading

1
S36 Ep4: Kathleen Perley - Turning AI Into Business Growth
27:34
27:34
Play later
Play later
Lists
Like
Liked
27:34Today, Steve talks with Dr. Kathleen Perley, founder of DemystifAI and faculty and AI advisor to the deans at Rice Business. Dr. Perley explains why leadership matters when implementing AI in your business, and shares how to bridge the gap between tech-savvy CTOs and non-technical folks. Dr. Perley and Steve also discuss the possibilities and bound…
…
continue reading

1
The “s1ngularity” Attack: How Hackers Hijacked Nx and Leaked Thousands of Repositories
38:48
38:48
Play later
Play later
Lists
Like
Liked
38:48In late August 2025, the open-source software ecosystem was rocked by a sophisticated two-phase supply chain attack, now known as “s1ngularity.” The incident began when attackers exploited a flaw in GitHub Actions workflows for the Nx repository, stealing an NPM publishing token and using it to release malicious versions of Nx packages. These packa…
…
continue reading

1
Canadian Investment Giant Wealthsimple Hit by Vendor Compromise
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24Wealthsimple, one of Canada’s largest online investment platforms, has confirmed a data breach that exposed the sensitive information of fewer than 1% of its three million clients. The incident, detected on August 30, 2025, originated from a supply chain attack: a trusted third-party vendor’s compromised software package served as the entry point f…
…
continue reading

1
FireCompass Raises $20M to Scale AI-Powered Offensive Security
38:48
38:48
Play later
Play later
Lists
Like
Liked
38:48In a year when cybercrime is projected to cost the world over $10.5 trillion, FireCompass has emerged as one of the most closely watched AI-driven cybersecurity innovators. The startup, founded in 2019, just secured $20 million in new funding—bringing its total raised to nearly $30 million. Backed in part by EC-Council’s Cybersecurity Innovation Fu…
…
continue reading

1
CVE-2025-42957: Active Exploits Target SAP S/4HANA Systems
32:04
32:04
Play later
Play later
Lists
Like
Liked
32:04A newly uncovered critical vulnerability, tracked as CVE-2025-42957, is sending shockwaves through the enterprise technology world. Affecting all SAP S/4HANA deployments, both on-premise and in private cloud environments, this ABAP code injection flaw carries a near-maximum CVSS score of 9.9. What makes it especially dangerous is its low complexity…
…
continue reading

1
Fake Job Interviews, Real Hacks: How North Korean Spies Steal Billions in Crypto
30:21
30:21
Play later
Play later
Lists
Like
Liked
30:21North Korean cybercriminals have escalated their social engineering operations, deploying a wave of sophisticated campaigns designed to infiltrate cryptocurrency and decentralized finance (DeFi) organizations. At the center of these operations is the “Contagious Interview” campaign, where hackers impersonate recruiters and trick job seekers into do…
…
continue reading
This week Mark Leonard is joined by Balázs Orbán, Hungarian prime minister Viktor Orbán’s (no relation) political director since 2021. He is also chairman of the board at the Mathias Corvinus Collegium. Previously, Balázs was minister of state in the prime minister’s office and director general of the Migration Research Institute in Budapest. Toget…
…
continue reading

1
Cato Networks Acquires Aim Security to Bolster AI Defense in SASE
51:24
51:24
Play later
Play later
Lists
Like
Liked
51:24Cato Networks, a leader in Secure Access Service Edge (SASE), has made its first acquisition, purchasing Aim Security, an AI security startup founded in 2022. The acquisition, valued at an estimated $300–350 million, represents a major step in addressing the growing risks tied to generative AI adoption in enterprises. As organizations increasingly …
…
continue reading

1
Tidal Cyber Secures $10M to Advance Threat-Informed Defense
48:00
48:00
Play later
Play later
Lists
Like
Liked
48:00Cybersecurity startup Tidal Cyber, founded in 2022 by three former MITRE experts, has raised $10 million in Series A funding, bringing its total capital to $15 million. The funding will accelerate the company’s product innovation and expansion, advancing its mission to operationalize the MITRE ATT&CK framework and empower organizations with threat-…
…
continue reading

1
Disney Fined $10M for COPPA Violations Over Mislabeling Kids’ Content on YouTube
36:38
36:38
Play later
Play later
Lists
Like
Liked
36:38Disney has reached a $10 million settlement with the U.S. Federal Trade Commission (FTC) after being found in violation of the Children’s Online Privacy Protection Act (COPPA). At the heart of the case is Disney’s failure to properly label child-directed content on YouTube as “Made for Kids” (MFK). Instead, many videos — including clips from Frozen…
…
continue reading

1
Google Patches 111 Android Flaws in September 2025, Including Two Zero-Days Under Attack
30:17
30:17
Play later
Play later
Lists
Like
Liked
30:17Google has released its September 2025 Android security patches, addressing a staggering 111 unique vulnerabilities, including two actively exploited zero-day flaws that are already being used in targeted attacks. These zero-days — CVE-2025-38352, a Linux kernel race condition, and CVE-2025-48543, a flaw in the Android Runtime — allow attackers to …
…
continue reading

1
The Other Side of Rob Riggle: Marines, 9/11 & Forever Wars, Vax Mandates, and Taking on Woke Culture
45:19
45:19
Play later
Play later
Lists
Like
Liked
45:19You know Rob Riggle as the hilarious comedian from The Daily Show and countless films—but there’s another side you’ve never heard. In this explosive conversation, Rob opens up about his years as a U.S. Marine, his experience on 9/11, and the reality of America’s forever wars. We dig into the culture clashes reshaping the country, from COVID vaccine…
…
continue reading

1
Google Warns of Sitecore Zero-Day: ViewState Deserialization Under Fire
56:06
56:06
Play later
Play later
Lists
Like
Liked
56:06A critical zero-day vulnerability, CVE-2025-53690, is being actively exploited in the wild, targeting Sitecore Experience Manager (XM) and Experience Platform (XP) systems deployed with outdated ASP.NET machine keys. Google and Microsoft threat intelligence teams have confirmed that attackers are leveraging ViewState deserialization attacks to achi…
…
continue reading

1
#168 - Helpful tools and interesting information from the recent IRS Tax Forum
49:12
49:12
Play later
Play later
Lists
Like
Liked
49:12Andy summarizes some helpful IRS tools and interesting IRS and tax return-related information after his recent attendance at the annual IRS Tax Forum/conference Links in this episode: IRS Taxpayer Online Account - here ID.me - here IRS IP PINs - here IRS Document Upload Tool - here IRS Interactive Tax Assistant - here Tenon Financial monthly e-news…
…
continue reading

1
Follow the money. Inside the Trans Industry Machine
20:13
20:13
Play later
Play later
Lists
Like
Liked
20:13Who really profits when children are diagnosed with gender dysphoria? In this explosive episode, we uncover the billion-dollar transgender medical industry—from puberty blockers and hormone therapies to surgeries and lifelong treatments. Follow the money trail and discover how powerful institutions, pharmaceutical companies, and medical providers a…
…
continue reading

1
Brokewell Malware Targets Android Users via Fake TradingView Ads on Meta
29:20
29:20
Play later
Play later
Lists
Like
Liked
29:20A new and highly sophisticated Android malware campaign, dubbed Brokewell, has emerged as one of the most dangerous mobile threats of 2024–2025. First spotted in April 2024 disguised as fake browser updates, Brokewell has since evolved into a fully featured spyware and remote access trojan (RAT), delivered through deceptive Meta (Facebook) advertis…
…
continue reading

1
Von der Leyen and Shapps Flights Hit by Suspected Russian Electronic Warfare
34:15
34:15
Play later
Play later
Lists
Like
Liked
34:15Aviation safety and geopolitics collided when multiple flights carrying high-ranking European and UK officials were hit by suspected Russian GPS jamming. European Commission President Ursula von der Leyen’s flight to Bulgaria experienced a severe GPS outage, forcing a manual landing. EU officials immediately pointed the finger at Moscow, calling th…
…
continue reading

1
Salesforce and Google Workspace Compromised in Largest SaaS Breach
43:38
43:38
Play later
Play later
Lists
Like
Liked
43:38In August 2025, the largest SaaS breach of the year shook the enterprise world when a newly identified threat actor, UNC6395, orchestrated a supply-chain attack through compromised Salesloft Drift and Drift Email applications. By stealing OAuth tokens, the attackers gained unauthorized access to Salesforce and Google Workspace environments of more …
…
continue reading

1
Chained Zero-Days: WhatsApp and Apple Exploits Used in Sophisticated Spyware Attacks
26:10
26:10
Play later
Play later
Lists
Like
Liked
26:10A pair of newly discovered zero-day vulnerabilities—CVE-2025-43300 in Apple’s ImageIO framework and CVE-2025-55177 in WhatsApp—have been confirmed as part of a sophisticated spyware campaign targeting both iPhone and Android users. Security researchers revealed that attackers chained these flaws together in seamless zero-click exploits, requiring n…
…
continue reading

1
#230 Randy Rosin on Warfare is Informational; the Case for a New DoD Information Paradigm
1:12:41
1:12:41
Play later
Play later
Lists
Like
Liked
1:12:41The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Randy Rosin returns to the Cognit…
…
continue reading

1
S36 Ep3: Karena Man - Cultivating Trust: Engaging Boards on Cyber and AI
27:48
27:48
Play later
Play later
Lists
Like
Liked
27:48In today’s episode, Steve speaks with Karena Man, whose expertise is connecting organizations with experts in technology as a Senior Client Partner at Korn Ferry. Karena highlights the growing awareness of cyber by boards of directors — an awareness brought on by the increase in cyber intrusions. She also emphasizes the importance of storytelling a…
…
continue reading
This week Mark Leonard is joined by Hélène De Lauzun, Paris correspondent for the European Conservative and author of L'histoire de l'Autriche (The History of Austria), to discuss the historical roots and modern expressions of conservatism in France. Together, Mark and Hélène explore her intellectual journey as a historian emphasising France’s pre-…
…
continue reading

1
Miljödata Cyberattack: 80% of Swedish Municipalities Hit in Extortion Strike
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07Sweden is reeling from one of the largest public sector cyber incidents in its history. A ransomware attack on Miljödata, an IT services provider supporting nearly 80% of Sweden’s municipalities and several regions, has left critical systems inaccessible and raised fears of a massive leak of sensitive personal data. The stolen information could inc…
…
continue reading

1
PromptLock Ransomware: How AI is Lowering the Bar for Cybercrime
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37The cybersecurity world has entered a new era: AI-powered ransomware. Researchers recently uncovered PromptLock, a proof-of-concept malware that uses OpenAI’s gpt-oss:20b model and Lua scripting to autonomously generate malicious code, encrypt data, and exfiltrate files across Windows, Linux, and macOS. While still experimental, PromptLock demonstr…
…
continue reading

1
Hybrid AD at Risk: Storm-0501 Exploits Entra ID for Cloud-Native Ransomware
40:34
40:34
Play later
Play later
Lists
Like
Liked
40:34The 2025 Purple Knight Report paints a stark picture of enterprise identity security: the average security assessment score for hybrid Active Directory (AD) and Entra ID environments has plummeted to just 61%—a failing grade and an 11-point decline since 2023. This troubling trend underscores the persistent challenges organizations face in protecti…
…
continue reading

1
AI-Powered Polymorphic Phishing: The New Era of Social Engineering
1:10:14
1:10:14
Play later
Play later
Lists
Like
Liked
1:10:14Cybercrime is entering a new phase—one marked by AI-powered phishing attacks, the weaponization of legitimate remote access tools, and the rise of professionalized underground markets. Recent reports highlight the alarming growth of AI-driven polymorphic phishing, where malicious emails are automatically tailored, randomized, and adapted in real ti…
…
continue reading

1
Salesforce Breach: How OAuth Token Theft Exposed Hundreds of Organizations
40:17
40:17
Play later
Play later
Lists
Like
Liked
40:17The recent Salesforce data breach underscores a growing reality in cybersecurity: even when core SaaS platforms are secure, their third-party integrations often aren’t. Between August 8–18, 2025, attackers from the group UNC6395 exploited compromised OAuth tokens from the Salesloft Drift AI chat integration, systematically exporting data from hundr…
…
continue reading

1
#167 - Q&A edition...basis in inherited IRAs, Social Security break even analysis, coordinating RMDs and Roth conversions and MORE!
54:30
54:30
Play later
Play later
Lists
Like
Liked
54:30Listener Q&A where Andy talks about: How to account on your tax return for the basis in inherited IRAs ( 7:00 ) Is having large Required Minimum Distributions ("RMDs") really a bad thing ( 12:04 ) Is there any merit to using a break-even analysis to help decide when to start Social Security ( 15:59 ) When does it make sense for someone to consider …
…
continue reading

1
Silk Typhoon’s Fake Adobe Update: How China-Backed Hackers Target Diplomats
40:33
40:33
Play later
Play later
Lists
Like
Liked
40:33A new and highly sophisticated cyber espionage campaign attributed to Silk Typhoon—also known as Mustang Panda, TEMP.Hex, or UNC6384—has been uncovered, targeting diplomats and government entities across Southeast Asia. Researchers from Google’s Threat Intelligence Group (GTIG) revealed that the attackers deployed Adversary-in-the-Middle (AitM) tec…
…
continue reading

1
FTC Warns Tech Giants: Don’t Weaken Encryption for Foreign Governments
37:13
37:13
Play later
Play later
Lists
Like
Liked
37:13The fight over encryption has entered a new phase. The Federal Trade Commission (FTC), led by Chairman Andrew Ferguson, has issued a strong warning to major U.S. technology companies: resist foreign government demands to weaken encryption. At stake is nothing less than the security of millions of Americans’ private communications, financial data, a…
…
continue reading

1
Invisible Prompts: How Image Scaling Attacks Break AI Security
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03Researchers have uncovered a new form of indirect prompt injection that leverages a simple but powerful trick: image scaling. This novel attack involves hiding malicious instructions inside high-resolution images, invisible to the human eye. When AI systems automatically downscale these images during preprocessing, the hidden prompt becomes visible…
…
continue reading

1
Healthcare Services Group Breach Exposes 624,000 Individuals’ Sensitive Data
1:04:53
1:04:53
Play later
Play later
Lists
Like
Liked
1:04:53The healthcare sector has been rocked yet again by a massive cybersecurity incident. Healthcare Services Group (HCSG), a provider of dining and laundry services to healthcare facilities, disclosed a data breach that compromised the personal information of over 624,000 individuals. Between late September and early October 2024, hackers gained unauth…
…
continue reading

1
The Surprising TRUTH about Anti-Aging, Food as Medicine & What They’re Hiding About Alzheimer’s with Max Lugavere
1:11:13
1:11:13
Play later
Play later
Lists
Like
Liked
1:11:13Max Lugavere—NYT bestselling author of Genius Foods and brain-health crusader—joins us to reveal the secrets to living longer, sharper, and stronger. From food-as-medicine hacks that have gone viral to his provocative take on MAHA (Make America Healthy Again), Max brings the science and the controversy. We dig into shocking new twists in Alzheimer’…
…
continue reading

1
Auchan Data Breach: Hundreds of Thousands of Loyalty Accounts Compromised
40:09
40:09
Play later
Play later
Lists
Like
Liked
40:09French retail giant Auchan has confirmed a massive data breach that compromised the personal details of hundreds of thousands of customers. The stolen data includes names, addresses, phone numbers, email addresses, and loyalty card numbers—though banking details, passwords, and PINs were reportedly not affected. Despite this, the breach is serious …
…
continue reading

1
Docker Desktop Vulnerability: Why Containers Aren’t as Safe as You Think
46:31
46:31
Play later
Play later
Lists
Like
Liked
46:31A critical vulnerability in Docker Desktop, CVE-2025-9074, has shaken the container security world. Scoring 9.3 on the CVSS scale, this flaw exposed an unauthenticated Docker Engine API (192.168.65.7:2375) to any container running on Windows and macOS. With nothing more than a few HTTP requests—or even three lines of Python code—attackers could esc…
…
continue reading

1
Arch Linux Website, Forums, and AUR Targeted in Sustained Cyber Assault
40:04
40:04
Play later
Play later
Lists
Like
Liked
40:04The Arch Linux community has just endured more than a week of turbulence as a massive distributed denial-of-service (DDoS) attack disrupted its most critical services, including the main website, the Arch User Repository (AUR), and community forums. Beginning in mid-August 2025, the sustained volumetric and protocol-level assault overwhelmed hostin…
…
continue reading

1
Data I/O Ransomware Attack: Supply Chain Cybersecurity in Crisis
37:08
37:08
Play later
Play later
Lists
Like
Liked
37:08Cyberattacks against supply chains are no longer isolated disruptions—they are systemic threats with the power to cascade across industries and nations. The recent ransomware attack on Data I/O, a chip programming firm whose customers include global giants like Apple, Microsoft, Amazon, and Bosch, demonstrates how one breach can disrupt manufacturi…
…
continue reading

1
BianLian Ransomware Strikes Aspire Rural Health: 138,000 Patients Exposed
44:33
44:33
Play later
Play later
Lists
Like
Liked
44:33The U.S. healthcare sector continues to face relentless cyberattacks, and rural hospitals are increasingly at the center of this crisis. The recent Aspire Rural Health System breach in Michigan—attributed to the BianLian ransomware group—exposed the personal and medical data of nearly 140,000 patients and staff. From Social Security numbers and fin…
…
continue reading

1
OneFlip: How a Single Bit-Flip Can Hack AI Models
49:40
49:40
Play later
Play later
Lists
Like
Liked
49:40Artificial Intelligence (AI) models are shaping the future of industries from healthcare and finance to autonomous vehicles and national infrastructure. But with this rise comes a hidden battlefield: adversarial attacks designed to manipulate AI systems in subtle yet devastating ways. One of the most alarming threats is the OneFlip attack, a method…
…
continue reading