The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
  continue reading
Network Security Podcasts
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
  continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
  continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
  continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
  continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and  ...
…
  continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
  continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
  continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
  continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
  continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
  continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
  continue reading
…
  continue reading
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
…
  continue reading
Story
…
  continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and  ...
…
  continue reading
Welcome to Act on Tech, the podcast that empowers you to harness technology to boost your productivity and simplify your life. Hosted by tech enthusiast and entrepreneur Alex, each episode dives into actionable tips, tools, and insights to help you stay ahead in the digital age. Discover practical advice, expert opinions, and cutting-edge trends, all while learning about Alex Custom Tech, a leading MSP dedicated to providing personalized IT solutions for business and residential customers. T ...
…
  continue reading
Mark Levin is one of the hottest talk radio hosts in America. A prominent conservative commentator, best-selling author and constitutional scholar, Mark offers fresh takes on daily news headlines and dissects important events of the day. Heard weeknights on nearly 400 radio stations, Levin is loved in every corner of America. He cuts through the noise with his passion and intellect, often saying things others won’t. Or as Mark himself would declare: “That’s right. I said it!”
…
  continue reading
The Dynamist, a podcast by the Foundation for American Innovation, brings together the most important thinkers and doers to discuss the future of technology, governance, and innovation. The Dynamist is hosted by Evan Swarztrauber, former Policy Advisor at the Federal Communications Commission. Subscribe now!
…
  continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
  continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
  continue reading
Welcome to IGEL Weekly, the podcast that explores the future of endpoint management and cloud workspaces. Hosted by XenTegra, this show dives deep into IGEL’s next-generation edge OS solutions. Discover how IGEL delivers extreme hardware cost savings, reduced operating expenses, and a more secure, streamlined platform for endpoint management across nearly any x86 device. Each week, we’ll unpack the latest industry trends, IGEL updates, and actionable insights to help you optimize your IT env ...
…
  continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
  continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
  continue reading
Level up your business with technology solutions to increase productivity, improve client service, and uncover opportunities for growth. Osaic's technology podcast offers best practices to help you learn, adapt, and implement technology to thrive as an independent financial professional. Visit http://www.osaic.com for additional information. Securities and investment advisory services are offered through the firms: Osaic Wealth, Inc., Triad Advisors, LLC, Osaic Institutions, Inc., and Woodbu ...
…
  continue reading
Periodically news, events, or interviews don't fit into our regular slate of podcasts. That's where our AVNation Specials come in.
…
  continue reading
A podcast dedicated to all firearm instructors in Military, Law Enforcement, and Civilian contexts. Content focuses on building a business as well as being a better instructor and helping more American Gun Owners become better prepared for active armed defense. Part of the ConcealedCarry.com network.
…
  continue reading
The Defence & Security Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence and security industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynami ...
…
  continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
  continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
  continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
  continue reading
Barry Bobrow partners with the Secured Finance Network to produce a series of video and audio podcasts focused on important trends and developments in secured lending. The In the Know podcasts will be a series of conversations with compelling thought leaders on important topics impacting the finance and secured lending markets. These brief and engaging discussions will give you information and perspectives critical to being more successful in your businesses by keeping you In The Know. State ...
…
  continue reading
Obituaries for the Damned
…
  continue reading
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
…
  continue reading
The CompTIA IT Fundamentals+ Audio Course is your step-by-step guide to building a rock-solid foundation in IT, covering hardware, software, networking, databases, and security in a way that’s clear and approachable. Designed for beginners and those looking to prepare for more advanced certifications, each episode turns exam objectives into practical lessons you can follow with confidence. Produced by BareMetalCyber.com, this series gives you the knowledge and momentum to pass the exam and l ...
…
  continue reading
Microsolidarity is an open research network developing patterns and practices for mutual aid communities. This is not a podcast exactly, more like an audio diary for people participating in the research. If you prefer video to audio, you can find many of these recordings on YouTube: https://www.youtube.com/playlist?list=PLOjcWjpjOqzbV9T3tSR6O7z_eic-Puqaa More info at https://www.microsolidarity.cc
…
  continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
  continue reading
Bestselling author, professor and entrepreneur Scott Galloway combines business insight and analysis with provocative life and career advice. On Mondays and Fridays, Office Hours features Scott answering your questions about business, career, and life. On Tuesdays, China Decode co-hosts Alice Han and James Kynge discuss the latest economic, political and cultural news shaping China’s role on the global stage. On Wednesdays, Raging Moderates brings Scott together with political strategist and ...
…
  continue reading

1
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability (#)
6:20
6:20
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:20SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are sup…
…
  continue reading
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
…
  continue reading

1
The Defence and Veterans' Service Commission launch and the long road ahead, with Isaac Ohlin
17:59
17:59
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
17:59In this episode of the Defence Connect Podcast, host Bethany Alvaro speaks with Isaac Ohlin, general manager of policy and services at RSL NSW, about the establishment of the Defence and Veterans' Service Commission – launched on 29 September 2025 in response to the Royal Commission into Defence and Veteran Suicide (2021). The pair discuss the comm…
…
  continue reading

1
HN802: Unifying Networking and Security with Fortinet SASE: Architecture, Reality, and Lessons Learned (Sponsored)
58:39
58:39
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
58:39The architecture and tech stack of a Secure Access Service Edge (SASE) solution will influence how the service performs, the robustness of its security controls, and the complexity of its operations. Sponsor Fortinet joins Heavy Networking to make the case that a unified offering, which integrates SD-WAN and SSE from a single vendor, provides a... …
…
  continue reading

1
TNO046: Prisma AIRS: Securing the Multi-Cloud and AI Runtime (Sponsored)
27:22
27:22
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
27:22Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsored episode with Palo Alto Networks, we dig into offerings such as CLARA (Cloud and AI Risk Assessment) that help ops teams gain more visibility into the structure and workflows of their multi-cloud net…
…
  continue reading

1
1% Better Every Day, with Founder & Managing Partner Chip Kispert
27:30
27:30
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
27:30Osaic's Mark Matheny interviews the Founder & Managing Partner of Beacon Strategies, Chip Kispert, who shares the importance of transformation, trust and technology in financial businesses. Chip also talks about the need for improving your data quality so that the integration of artificial intelligence (AI) is effective and accurate. Learn also abo…
…
  continue reading

1
The Future of Procurement: Real-Time Supply Chain Intelligence
53:20
53:20
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
53:20Every product a company ships depends on thousands of tiny decisions happening deep inside the supply chain. But most organizations are still making those decisions using stale spreadsheets, fragmented systems, and guesswork. In this episode, we explore how AI-driven procurement intelligence is changing the game – moving teams from reactive firefig…
…
  continue reading
On today’s episode, we take a break from one’s and zero’s for a discussion about starting a networking meetup. Our guest is Steinn “Steinzi” Örvar, who recently founded the ISNOG, a network operators’ group in Iceland. We quiz Steinzi about what worked and what didn’t. We also pick his brain for the nitty-gritty details about... Read more »…
…
  continue reading

1
AI’s Power Problem, Have We Passed Peak Social Media? and How to Save Democracy
21:08
21:08
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
21:08Scott Galloway answers listener questions on AI’s growing strain on the U.S. power grid, why we may have reached peak social media, and how economic boycotts can serve as a check on political power. Want to be featured in a future episode? Send a voice recording to [email protected], or drop your question in the r/ScottGalloway subreddit. …
…
  continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
  continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
  continue reading

1
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability
6:19
6:19
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:19X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
…
  continue reading

1
10/30/25 - Why Capitalism is the Path to Prosperity
1:52:34
1:52:34
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:52:34On Thursday’s Mark Levin Show, of course, Israel does not control President Trump, nor has it controlled any past president. Israel is not "ethnic" cleansing, that would be the motivations and intentions of the Islamist terrorists -- throughout the Middle East and Africa. The multiple and unprecedented steps it has taken to try to limit casualties,…
…
  continue reading
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
…
  continue reading
A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services. Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems. Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrut…
…
  continue reading

1
How to Stay Resilient When Cybercrime Becomes Your Competition | A Conversation with Author and Former FBI Agent, Eric O'Niell | Redefining CyberSecurity with Sean Martin
40:24
40:24
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
40:24⬥GUEST⬥ Eric O'Neill, Keynote Speaker, Cybersecurity Expert, Spy Hunter, Bestselling Author. Attorney | On Linkedin: https://www.linkedin.com/in/eric-m-oneill/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com …
…
  continue reading

1
PP084: Inside the CVE Process With Cisco (Sponsored)
44:50
44:50
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
44:50CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that…
…
  continue reading

1
America’s Casino Economy — with Kyla Scanlon
1:03:33
1:03:33
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:03:33Scott Galloway speaks with Kyla Scanlon, an economic commentator, educator, and author of In This Economy? How Money and Markets Really Work. Kyla explains how gambling culture has seeped into markets and everyday investing, why America has effectively become a giant bet on AI, and what the rise of “risk-aggressive” leadership means for the next ge…
…
  continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA explains how the AWS outage happened.By Enterprise Management Associates + APMdigest
…
  continue reading

1
Cybersecurity on the ballot in California.
32:27
32:27
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:27Next week, California will hold a major election on Tuesday, November 4, amid heightened cyber risk and increased exposure to potential attacks. With the ongoing government shutdown and reduced grant funding for local counties overseeing the elections, vulnerabilities are growing. Sanny Liao, Co-Founder and CTO of Fable Security, joins to discuss t…
…
  continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, …
…
  continue reading
This is today’s cyber news for October 30th, 2025. A broad Microsoft cloud outage led our coverage, reminding teams how identity and Domain Name System dependencies can stall entire workflows. Critical infrastructure risk followed, with Canada warning that hacktivists changed setpoints on exposed industrial gear. We then moved to active exploitatio…
…
  continue reading

1
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch
6:07
6:07
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:07How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
…
  continue reading
Communist Teen (you may remember them from episode #56) is back! And they ain't no teen no more, but they are still Communist to the bone. Join us as we discuss classics of modern cinema like Return of the Living Dead, Flushed Away and Elmo in Grouchland. We also go down the rabbit hole to explore unknown underground gems like the story of Seattle …
…
  continue reading

1
10/29/25 - Exposing the Fusion of Marxism and Islamism in Politics
1:50:52
1:50:52
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:50:52On Wednesday’s Mark Levin Show, Zohran Mamdani’s rise for New York City mayor was meticulously engineered by George Soros cash and socialist groups. They’ve been grooming him for 10 years. This model extends nationwide, propelling similar candidates like Dearborn Mayor Abdullah Hammoud and Virginia Lt. Governor candidate Ghazala Hashmi. This fusion…
…
  continue reading

1
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch (#)
6:07
6:07
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:07SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like "dd" do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%2…
…
  continue reading
Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists’ email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades…
…
  continue reading

1
Laptop vs. Desktop in 2025: What’s the Better Investment?
29:28
29:28
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
29:28In 2025, the line between laptops and desktops is thinner than ever—but the right choice still depends on how you work. In this episode of Act on Tech, Alex breaks down the pros and cons of each option, from performance and portability to cost, longevity, and flexibility. Whether you’re upgrading your home setup or equipping your business team, thi…
…
  continue reading

1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
  continue reading

1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
  continue reading
This is today’s cyber news for October 29th, 2025. Today’s brief tracks a hardware side-channel that weakens confidential computing on mainstream servers, real-world zero-day abuse in a major enterprise resource planning platform, and a trusted-update weakness that can turn patching into a malware pipeline. We also cover a ransomware twist that run…
…
  continue reading

1
Raging Moderates: Why Politicians are Launching Podcasts Ahead of 2028
55:25
55:25
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
55:25With just a week until Election Day, Scott and Jessica break down the races shaping the final stretch — from Andrew Cuomo’s last-minute unlikely comeback bid in New York City to Abigail Spanberger and Mikie Sherrill testing whether moderation still wins in purple America. Plus, California’s Prop 50 could shift the balance of power in Congress. Then…
…
  continue reading

1
THE PROGRESS REPORT: Leadership, mental health and life's balancing act
40:37
40:37
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
40:37Ever wondered what it takes to lead with resilience while balancing life, career and wellbeing? In this episode of The Progress Report, Tash Taylor sits down with Marisa Branscombe, head of marketing communication at Atturra, to talk about leadership, resilience, and the human side of managing teams in high-pressure environments. Marisa shares how …
…
  continue reading

1
Risky Business #812 -- Alleged Trenchant exploit mole is ex-ASD
1:06:14
1:06:14
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:06:14In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: L3Harris Trenchant boss accused of selling exploits to Russia once worked at the Australian Signals Directorate Microsoft WSUS bug being exploited in the wild Dan Kaminsky DNS cache poisoning comes back because of a bad PRNG SpaceX finally starts dis…
…
  continue reading

1
SN 1049: DNS Cache Poisoning Returns - Ransomware Payments Plummet
3:11:25
3:11:25
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
3:11:25Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting la…
…
  continue reading
 
 
 
