A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
OWASP Podcasts
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
Podcasts from the MiSec, OWASP Detroit, and BSides Detroit communities.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
This podcast contains security topics discussed by the Secure Ideas LLC. team.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
Welcome to The Mixcast Podcast — a show where every episode is a new journey. From real stories, inspiring interviews, deep conversations, to fun and casual talks — this podcast brings together a mix of everything that matters.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2025, National Security Corporation. All Rights Reserved
…
continue reading
Your anything goes security podcast presented to you by Black Lantern Security
…
continue reading
Security teams have their hands full. Building relationships across the entire organization is vital for success. In Champions of Security, I interview passionate individuals with unique stories. Each guest shares their honest opinions about what’s working (and what isn’t) in the security world. Tune in to learn valuable insights about keeping your customers safe.
…
continue reading
Welcome to the Women in Security Podcast! This podcast is devoted to the world of information & cyber security and the great women who make it turn. In each episode, I sit down with a guest speaker to discuss their experiences and touch on some of the lesser known aspects of the industry. We'll shed light on the routes to the various technical and non-technical roles in this space, as well as exploring the skillsets required to be successful.
…
continue reading
Welcome to The Craft of Open Source, hosted by Ben Rometsch, Co-Founder and CEO of Flagsmith. This bi-weekly show is focused on the ins and outs of the Open Source Software Community. Join Ben as he speaks with the brightest minds that have brought us some of the most adopted technologies on earth. Each episode is an interview with creators, maintainers, entrepreneurs, and key contributors to the open source community. We will cover critical topics for open source developers, contributors an ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2005 was held July 27-28 in Las Vegas at Caesars Palace. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-05/bh-usa-05-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washi ...
…
continue reading

1
Ep: 28 Understanding the Principles of OWASP in Cybersecurity _ Google Cybersecurity Certificate
13:07
13:07
Play later
Play later
Lists
Like
Liked
13:07Welcome back! We’re here with fresh insights, personal stories, and a conversation that matters.By tufan745447
…
continue reading

1
Sean Varga -- OWASP Top 10 for AppSec Sales
47:13
47:13
Play later
Play later
Lists
Like
Liked
47:13We’re discussing the intersections of application security (AppSec) and sales strategy with our guest, Sean Varga. Sean shares the unique challenges and best practices in AppSec sales, like the importance of empathy, understanding customer needs, and community participation. Learn about the OWASP top 10 for AppSec Sales and discover how to achieve …
…
continue reading

1
#241 - The OWASP Threat and Safeguard Matrix (with Ross Young)
25:53
25:53
Play later
Play later
Lists
Like
Liked
25:53Join G Mark Hardy in this special episode of CISO Tradecraft as he interviews Ross Young, the creator of the OWASP Threat and Safeguard Matrix (TaSM). Ross shares his extensive cybersecurity background and discusses the development and utility of the TaSM, including its applications in threat modeling and risk management. Additionally, Ross introdu…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some …
…
continue reading

1
Ep: 30 Best Resume and Cover Letter Tips From Recruiters _ Google Career Certificates
8:23
8:23
Play later
Play later
Lists
Like
Liked
8:23This episode is all about asking the right questions and embracing real answers.By tufan745447
…
continue reading

1
Ep: 29 What Are the Advantages of Agile_ _ Google Project Management Certificate
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04Another week, another topic that hits close to home. Let’s talk about it.By tufan745447
…
continue reading

1
Ep: 27 Cybersecurity Asset Management _ Google Cybersecurity Certificate
15:05
15:05
Play later
Play later
Lists
Like
Liked
15:05Real stories. Real people. Real talk. That’s what today’s episode is all about.By tufan745447
…
continue reading

1
Ep : 26 What Is IT_ _ Google IT Support Certificate
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17As always, we’re here to bring clarity, comfort, and curiosity into your life. Let’s begin.By tufan745447
…
continue reading

1
Ep: 25 Best Interview Tips for a Job in Cybersecurity _ Google Cybersecurity Certificate
14:13
14:13
Play later
Play later
Lists
Like
Liked
14:13In this episode, we reflect on what matters, challenge what doesn’t, and hold space for what’s in between.By tufan745447
…
continue reading

1
Ep: 24 What Is Computer Programming_ _ Google IT Support Certificate
10:02
10:02
Play later
Play later
Lists
Like
Liked
10:02Turn the volume up — today’s conversation is worth every minute.By tufan745447
…
continue reading

1
Ep:23 What Jobs Can a Google Career Certificate Lead To_ _ Google Career Certificates
11:06
11:06
Play later
Play later
Lists
Like
Liked
11:06Another powerful episode awaits. Let’s explore, reflect, and grow — together.By tufan745447
…
continue reading

1
Marisa Fagan - Measuring Security Culture
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05Marisa Fagan, Head of Product at Katilyst and veteran security culture expert joins us today to share practical strategies for building and scaling security champions programs that actually work, from designing effective pilots to avoiding common pitfalls that can derail your initiatives. Learn how to motivate developers using the SAPs model (Statu…
…
continue reading

1
Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:"Global Cyber Alliance's Phil Reitinger talks DMARC adoptio…
…
continue reading

1
Work from home, malware included. [OMITB]
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena…
…
continue reading

1
Domain-based Message Authentication Reporting Conformance (DMARC) (noun)
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:"Global Cyber Alliance's Phil Reitinger talks DMARC adoptio…
…
continue reading

1
#244 - Breaking into Cybersecurity (with Christophe Foulon)
44:34
44:34
Play later
Play later
Lists
Like
Liked
44:34Join host G Mark Hardy in another enlightening episode of CISO Tradecraft as he speaks with special guest Christophe Foulon, a seasoned cybersecurity professional and podcast host. In this episode, Christophe delves into his journey from the help desk to cybersecurity expert, the challenges faced by newcomers, and the keys to successfully building …
…
continue reading

1
Ep: 22 Intro to Using AI for Data Analytics _ Google Data Analytics Certificate
22:52
22:52
Play later
Play later
Lists
Like
Liked
22:52As always, we’re here to bring clarity, comfort, and curiosity into your life. Let’s begin.By tufan745447
…
continue reading
In this special episode of Hacking Humans, while Joe and Maria take a well-earned summer break, we’re joined by a special guest host: Rob Allen, Chief Product Officer at ThreatLocker. Rob dives into the tactics and profile of the cybercriminal group known as Scattered Spider—a crew that’s gained notoriety for its cunning use of social engineering o…
…
continue reading

1
Ep : 21 Use AI Tools to Boost Productivity _ Google AI Essentials
22:11
22:11
Play later
Play later
Lists
Like
Liked
22:11We’re back with another episode designed to inspire, challenge, and connect. Press play and enjoy.By tufan745447
…
continue reading

1
Ep : 20 What are the 5 Core Concepts of Analytical Thinking_ _ Google Data Analytics Certificate
9:54
9:54
Play later
Play later
Lists
Like
Liked
9:54Each episode is crafted with curiosity and care. Today is no different. Let’s dive in.By tufan745447
…
continue reading

1
Ep : 19 What Do Digital Marketers _ E-commerce Professionals Do_ _ Google Career Certificates
8:09
8:09
Play later
Play later
Lists
Like
Liked
8:09Join us as we bring you honest conversations, new perspectives, and thoughtful stories.By tufan745447
…
continue reading

1
Ep : 18 Practice Using AI Responsibly _ Google AI Essentials
17:20
17:20
Play later
Play later
Lists
Like
Liked
17:20You’re listening to a space where real talk happens. Today, we unpack experiences that shape us.By tufan745447
…
continue reading

1
Ep : 17 How to Find Project Management Jobs _ Google Project Management Certificate
10:23
10:23
Play later
Play later
Lists
Like
Liked
10:23Another episode, another opportunity to think differently. Let’s take a closer look at life’s layers together.By tufan745447
…
continue reading

1
Ep : 16 How to Stay Ahead of the AI Curve _ Google AI Essentials
13:32
13:32
Play later
Play later
Lists
Like
Liked
13:32Every episode is a new beginning. Today, we reflect, we question, and we grow. Thanks for being here.By tufan745447
…
continue reading

1
Ep: 15 What Makes Digital Marketing and E-Commerce So Exciting_ _ Google Career Certificates
11:43
11:43
Play later
Play later
Lists
Like
Liked
11:43This episode brings you another conversation that opens minds and connects hearts. Tune in and be part of the journey.By tufan745447
…
continue reading

1
Ep : 14 What is the Agile Manifesto_ _ Google Project Management Certificate
12:57
12:57
Play later
Play later
Lists
Like
Liked
12:57In today’s episode, we dive deep into a topic that matters. Thought-provoking, engaging, and real — just how you like it.By tufan745447
…
continue reading

1
Ep : 13 Introduction to Agile Methodologies _ Google Project Management Certificate
13:17
13:17
Play later
Play later
Lists
Like
Liked
13:17Welcome to another episode filled with stories, insights, and a touch of inspiration. Let’s explore something meaningful together.By tufan745447
…
continue reading
Spurred by a recent article from Venture in Security, this episode delves deep into the practical application of security into an organization's SDLC. Covering a range of issues from gaps in contextual understanding to disingenuous vendor claims, Seth and Ken share their experiences dealing with small and large organizations with varying levels of …
…
continue reading
Please enjoy this encore of Word Notes. A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor. CyberWir…
…
continue reading
Please enjoy this encore of Word Notes. A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor. CyberWir…
…
continue reading

1
#243 - Navigating Hacker Summer Camp in 2025
26:31
26:31
Play later
Play later
Lists
Like
Liked
26:31Navigating Hacker Summer Camp: A Comprehensive Guide Join host G Mark Hardy on this episode of CSO Tradecraft as he provides a detailed guide on what to expect at Hacker Summer Camp, a series of significant cybersecurity events including DEFCON, Black Hat, and BSides Las Vegas. G Mark shares historical insights, tips for first-timers, and personal …
…
continue reading

1
Ep : 12 How To Best Prepare for a Job Interview _ Google Digital Marketing _ E-commerce Certificate
18:19
18:19
Play later
Play later
Lists
Like
Liked
18:19Welcome back! We’re here with fresh insights, personal stories, and a conversation that matters.By tufan745447
…
continue reading

1
Ep : 11 How Cybersecurity Analysts Secure Networks _ Google Cybersecurity Certificate
13:32
13:32
Play later
Play later
Lists
Like
Liked
13:32Real stories. Real people. Real talk. That’s what today’s episode is all about.By tufan745447
…
continue reading

1
Ep : 10 How Cybersecurity Teams Manage Incidents _ Google Cybersecurity Certificate
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10As always, we’re here to bring clarity, comfort, and curiosity into your life. Let’s begin.By tufan745447
…
continue reading

1
Ep : 9 Intro to Binary_ Computer Languages_ _ Character Encoding _ Google IT Support Certificate
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44In this episode, we reflect on what matters, challenge what doesn’t, and hold space for what’s in between.By tufan745447
…
continue reading

1
Ep: 8 Intro to Using AI in Cybersecurity _ Google Cybersecurity Certificate
27:26
27:26
Play later
Play later
Lists
Like
Liked
27:26Turn the volume up — today’s conversation is worth every minute.By tufan
…
continue reading

1
Ep: 7 How to Create Images with Gen AI _ Use Them in Prompts _ Google Prompting Essentials
8:31
8:31
Play later
Play later
Lists
Like
Liked
8:31Another powerful episode awaits. Let’s explore, reflect, and grow — together.By tufan745447
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We've got some follow-up from…
…
continue reading

1
Ep:6 How Project Managers Can Build Customer Satisfaction _ Google Project Management Certificate
10:56
10:56
Play later
Play later
Lists
Like
Liked
10:56In today’s episode, we dive deep into a topic that matters. Thought-provoking, engaging, and real — just how you like it.By tufan745447
…
continue reading

1
Ep: 5 What are the Different Types of Firewalls_ _ Google Cybersecurity Certificate(
9:31
9:31
Play later
Play later
Lists
Like
Liked
9:31Welcome to another episode filled with stories, insights, and a touch of inspiration. Let’s explore something meaningful together.By tufan745447
…
continue reading

1
Aram Hovsepyan -- Your Security Dashboard is Lying to You: The Science of Metrics
40:52
40:52
Play later
Play later
Lists
Like
Liked
40:52Aram Hovsepyan joins the podcast today to chat about the misconceptions behind common security metrics. Aram tells us how total vulnerability counts and CVSS scores can be misleading and he introduces us to the Goal Question Metric framework, this framework is a better approach to building truly effective security dashboards. Learn about the critic…
…
continue reading

1
Ep: 4 Working with Strings in Python _ Google Cybersecurity Certificate
27:00
27:00
Play later
Play later
Lists
Like
Liked
27:00Behind every laugh is a story. Behind every silence, a thought. This episode explores the in-between — where emotion and expression mix freely.By tufan745447
…
continue reading

1
Ep:3 How To Use Python to Work With Files and Debug Code _ Google Cybersecurity Certificate
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55If podcasts had a heart, this episode might be it. A mix of meaning, music, and moments that matter. You won’t just listen — you’ll feel it.By tufan745447
…
continue reading

1
Ep:2 How To Secure Networks in Cybersecurity _ Google Cybersecurity Certificate
14:03
14:03
Play later
Play later
Lists
Like
Liked
14:03Today’s episode is a story. Not a big one, but a real one. The kind that makes you pause, smile, or maybe even feel seen. We’re not here to preach — just to share what’s real.By tufan745447
…
continue reading

1
Ep:1 How to Save Time with AI (Real Business Examples) _ Make AI Work for You _
20:39
20:39
Play later
Play later
Lists
Like
Liked
20:39Every story matters. Listen to another powerful episode from The Mixcast Podcast.By tufan745447
…
continue reading

1
Software Assurance Maturity Model (SAMM) (noun) [Word Notes]
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Please enjoy this encore of Word Notes. A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks. Audio reference link: "OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)." by Pravir Chandra, OWASP MSP, 2009.…
…
continue reading