Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
…
continue reading
The Critical Assets Podcast covers important OT and ICS security topics with an eye toward standards and regulation to keep you ahead of your adversaries... and your auditors. Ampyx Cyber. Securing your world. See our other content such as blogs, cybersecurity news and more at www.ampyxcyber.com
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
…
continue reading
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
…
continue reading
Join HOU.SEC.CON Cofounders Michael and Sam each week as they chat with conference speakers about the latest topics and trends in the cybersecurity space.
…
continue reading
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
In this podcast, we delve into various aspects of cybersecurity, inviting global security leads to discuss trends, the impact of new concepts and regulations, talent retention, and more through one-on-one discussions.
…
continue reading
Love Pokemon? Enjoy a little ridiculousness now and then? Looking for a community in the world of Pokemon GO? Well, you've come to the right place! Your One-Stop Shop for tips, tricks, news, and fun in Pokemon GO! Where everyone has a seat at the table!
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Welcome to The OT Life: A careers podcast from the OTs of Cygnet Health Care. We created The OT Life for OTs around the country who are interested in hearing from people who share the same passion for Occupational Therapy.We chat all things OT from our opinions about the profession, our role in health and social care, stories and experiences, and career advice.This is the place to help you make the most of the profession you love.https://join.cygnethealth.co.uk/ot-life/
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Tune in to hear thought leaders discuss the latest trends and best practices for IT/OT convergence and industrial connectivity.
…
continue reading
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
…
continue reading
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
A bi-weekly podcast that helps you curb cybersecurity risk and tackle technology challenges
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Follow Phillip Wylie at https://www.linkedin.com/in/phillipwylie https://youtube.com/@phillipwylie The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we l ...
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
We know it can be challenging to secure your business, especially when you have limited time. The Get Cyber Resilient Show, brought to you by Mimecast, is the perfect way to stay up-to-date with the latest cyber developments across Australia and New Zealand. From cyber security to cyber awareness, your hosts Daniel McDermott, Garrett O'Hara and Vinh Nguyen will bring you insights and real stories from IT and Security Leaders, just like you. Don’t get angry at downtime and data breaches, Get ...
…
continue reading
In just 25 minutes, I deliver concise and thought-provoking conversations with top minds in technology, cybersecurity, business, culture and enterpreneurship. Whether you’re a technologist, executive, culture-enthusiast or someone passionate about growth, each episode explores trends, strategies and ideas that shape success. For those with limited time but unlimited ambition, 25Minutes offers actionable insights and fresh perspectives where they matter most. Your time is valuable. Your 25 mi ...
…
continue reading
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
…
continue reading
A Broad array of topics in the technology space Informative, relevant, and engaging. Without the self-serving narrative. We aim to share industry best practices, drive awareness, and discuss what thought leaders share. Companies or manufacturers often only focus on their area of interest, which is short-sighted, limiting, and siloed. Our diversity and partner network offers substantial, informative value. Similar challenges and growth aspirations exist in the b2b and b2c space. This podcast ...
…
continue reading
Brent Gunning and former Toronto Maple Leafs GM Gord Stellick provide the most insightful Maple Leafs pre- and post-game show with Leafs Nation.
…
continue reading
Welcome to the Methods podcast! Methods are the UK’s leading independent transformation partner for public services. We apply our skills in innovation and collaboration from across the Methods Group, to deliver end-to-end business and technical solutions that are people-centered, safe, and designed for the future. You can find out more about the Methods group at www.methods.co.uk.
…
continue reading
Royal College of Occupational Therapists is the professional membership body for occupational therapy staff in the UK. This is the home for our podcast series. www.rcot.co.uk/podcasts
…
continue reading
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
…
continue reading
Dave Kittle, DPT of www.CashBasedPhysicalTherapy.org discuss Physical Therapy and Technology in this podcast. Full VIDEO versions of each episode can be found at https://www.youtube.com/PTTechTalk Dave Kittle also owns www.ConciergePainRelief.com (Home Physical Therapy) serving New York City, Long Island, NJ, and CT.
…
continue reading
The ALL NBA Podcast, hosted by ESPN’s Tim Legler and DNVR’s Adam Mares, brings you the most insightful and in-depth NBA analysis four times a week. Stay updated with expert breakdowns, exclusive interviews, and discussions about NBA stars like LeBron James, Nikola Jokic, Steph Curry, and emerging talents around the league. Featuring notable NBA personalities, special guests, and reporters from across the ALLCITY Network, this is your premier destination for comprehensive NBA coverage.
…
continue reading
Introducing Left to Our Own Devices - the podcast dedicated to everything product security. Every other week, we will be talking with a different cybersecurity policymaker, engineer, or industry leader to hear their war stories and get their insider tips for surviving the product security jungle. From Medical SBOMs, to WP. 29 and the latest industrial security threats, this is your place to catch up and learn from the pros. Hosted & produced by: *David Leichner, CMO at Cybellum - https://www ...
…
continue reading

1
Converging Worlds: Securing IoT, OT, and Critical Infrastructure
27:32
27:32
Play later
Play later
Lists
Like
Liked
27:32The digital transformation journey in critical infrastructure organizations and other sectors like healthcare is increasingly connecting operational technology (OT) and integrating Internet of Things (IoT) devices. While this convergence of OT and IT creates efficiencies, it also introduces new vulnerabilities and expands the attack surface for cyb…
…
continue reading
Don and Tom jump into the TSA Directives in this episode with their special guest Mike Holcomb, the Fellow of Cybersecurity and the ICS/OT Cybersecurity Global Lead for Fluor, one of the world’s largest engineering, procurement, and construction companies. He also founded the BSides ICS/OT and BSides Greenville cons. In this episode, our expert gue…
…
continue reading

1
OT Security with Watch Mr. Wizard Star Sean Curry
32:13
32:13
Play later
Play later
Lists
Like
Liked
32:13Michael and Sam are catching up with Principal Consultant and Co-Founder at Cavalry Solutions, Sean Curry! Sean talks about his transition from the military to the private sector, the importance of standards like IEC 62443 for OT security, and the best way to align IT and OT teams. Things Mentioned: · New study reveals 92% of industrial sites at ri…
…
continue reading

1
EP 62: Defending the Unknown in OT Security
31:38
31:38
Play later
Play later
Lists
Like
Liked
31:38ROI is always a tricky subject in cybersecurity. If you’re paying millions of dollars in securing your OT networks, you’d want to be able to show that it was worth it. Andrew Hural of UnderDefense talks about the need for continuous vigilance, risk management, and proactive defense, acknowledging both the human and technological elements in cyberse…
…
continue reading

1
Bridging IT/OT & Securing ICS: Kevin Kumpf, Chief OT / ICS Security Strategist, Cyolo
31:51
31:51
Play later
Play later
Lists
Like
Liked
31:51Dino welcomes Kevin Kumpf, Chief OT/ICS Security Strategist at Cyolo to this episode. They discuss the growing challenges and evolving strategies around cybersecurity in industrial environments. Kevin shares a seasoned perspective on bridging the gap between IT and OT, busting myths about Zero Trust certifications, and the dangers of underutilized …
…
continue reading

1
The Resilient CISO: Navigating Stress and Sustaining Security Leadership
12:47
12:47
Play later
Play later
Lists
Like
Liked
12:47The role of the Chief Information Security Officer (CISO) is more critical and demanding than ever, placing leaders in a persistent high-stress environment. This podcast delves into the unique pressures faced by CISOs and cybersecurity professionals, including the immense responsibility and potential for blame, resource constraints, excessive workl…
…
continue reading

1
Joe Slowik on Identifying Truly 'Critical' Infrastructure
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47Security researcher Joe Slowik joins the Nexus Podcast to discuss the broad interpretation of what critical infrastructure entities are truly "critical," and how that creates an ethical wedge between protecting the well-resourced and those that are resource-strapped. Slowik acknowledges that while calling everything "critical" ensures that nothing …
…
continue reading

1
Who's Heading to the Conference Finals? Celtics, Knicks, Nuggets, Thunder? | ALL NBA PODCAST
1:04:21
1:04:21
Play later
Play later
Lists
Like
Liked
1:04:21Tim Legler and Adam Mares break down a crucial night in the NBA Playoffs, starting with the Denver Nuggets’ big win over the Oklahoma City Thunder. They dive into how Shai Gilgeous-Alexander’s foul trouble shifted the momentum, Julian Strawther’s unexpected heroics, and whether Denver has cracked OKC’s defense. The impact of Aaron Gordon’s injury l…
…
continue reading

1
HN781: CCIE Service Provider Free Workbook & Track Update
59:13
59:13
Play later
Play later
Lists
Like
Liked
59:13While studying for the CCIE Service Provider certification, Andrew Ohanian assembled a workbook to help him prepare. It’s packed with lab exercises, and Andrew has turned it into a free Web resource that anyone can access. On today’s Heavy Networking, we talk with Andrew about what’s in the guide, the state of the CCIE SP,... Read more »…
…
continue reading

1
Zero Trust for Critical Infrastructure: Securing the OT/ICS Backbone
35:28
35:28
Play later
Play later
Lists
Like
Liked
35:28Delve into the essential and intricate application of Zero Trust (ZT) principles within Operational Technology (OT) and Industrial Control Systems (ICS) environments. This episode explores the unique challenges of securing critical infrastructure, where safety, reliability, and availability are primary objectives, and legacy systems, unique protoco…
…
continue reading
In many instances the biggest challenge facing OT cybersecurity practitioners is knowing where to focus resources, especially their time. In other words, what are the priorities for the enterprise, facility and people? I recently sat down with Securin's Lead Threat Intelligence Analyst - Aviral Verma. And while I anticipated a conversation focused …
…
continue reading

1
Celtics Survive, Wolves Bury Warriors PLUS Draft Chaos Begins! | ALL NBA PODCAST
1:06:02
1:06:02
Play later
Play later
Lists
Like
Liked
1:06:02Tim Legler and Adam Mares break down the NBA Playoffs, starting with the Boston Celtics’ series-extending win over the New York Knicks. Can the Celtics continue winning without Jayson Tatum? Next, the guys analyze the Minnesota Timberwolves’ closeout victory against the Golden State Warriors. How will Anthony Edwards and the Wolves fare in the next…
…
continue reading

1
Cyber Resilience Through Bundling: The Regulatory Challenge
17:53
17:53
Play later
Play later
Lists
Like
Liked
17:53Explore the emerging practice of bundling cyber insurance with security products and services, a strategy aimed at enhancing cyber resilience by incentivizing policyholders to adopt proactive security measures from the outset. This episode delves into the potential benefits, such as encouraging better cyber hygiene, aligning the long-term goals of …
…
continue reading
And....we're back! This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are all back to share the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. The team shares three bits of follow-up and then breaks into their stories. Joe star…
…
continue reading

1
Thunder Strike! Nuggets Fall in Game 5, 💥 Pacers Advance, Are the Celtics Sunk? | ALL NBA PODCAST
54:23
54:23
Play later
Play later
Lists
Like
Liked
54:23Tim Legler and Adam Mares break down a pivotal night in the NBA Playoffs, starting with the Oklahoma City Thunder’s Game 5 win over the Denver Nuggets, fueled by clutch shooting from Lu Dort. They discuss Chet Holmgren’s future potential and whether Denver can bounce back in Game 6. Then it’s on to the Pacers’ series-clinching win over the Cavalier…
…
continue reading

1
Beyond the URL: Decoding Domain Intelligence Threats in 2024
14:40
14:40
Play later
Play later
Lists
Like
Liked
14:40In the ever-evolving digital landscape, security teams face the immense challenge of evaluating over a hundred million newly observed domains registered each year. This episode dives into how analytical methods are providing crucial insights into domain intelligence threats. We explore techniques like domain attribute analysis to identify patterns …
…
continue reading
Bryson Bort sits down with Adam Robbie, Head of OT Threat Research at Palo Alto Networks, to pull back the curtain on OT threat research. With a background in electrical engineering, Adam’s first job in cybersecurity was at an IT help desk. He now leads a team dedicated to identifying, analyzing, and mitigating cyber threats targeting Operational T…
…
continue reading

1
US State Privacy Laws: Navigating the Expanding Consumer Rights Patchwork
45:55
45:55
Play later
Play later
Lists
Like
Liked
45:55Explore the complex and rapidly evolving landscape of US state data privacy laws, drawing on insights from recent legislative developments across states like California, Colorado, Connecticut, Delaware, Florida, Indiana, Iowa, Montana, Nebraska, New Hampshire, New Jersey, Oregon, Tennessee, and Texas, plus Washington's focused health data act. We b…
…
continue reading

1
Visibility Revisited: Trends Shaping the Future of OT Cybersecurity
35:09
35:09
Play later
Play later
Lists
Like
Liked
35:09In this special rewind episode we highlight outside influences shaping control system integrity, the impact of AI, emerging technologies, and the dynamics of building a career in OT cybersecurity. Drawing from frontline experiences and industry events like the S4 Conference, the discussion explores the growing organizational shift toward dedicated …
…
continue reading

1
Securing the Foundation: Cyber Strategy in the Age of Smart Infrastructure
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12Cybersecurity is redefined as a discipline for the curious and adaptable, with a focus on continuous learning, imagination, and embracing change. On location at the RSA Conference, host Phillip Wylie and Anand Singh discusses the evolving challenges of IoT and OT security, the rapid integration of AI, and how organizations must address overlooked e…
…
continue reading
Please enjoy this encore of Word Notes. An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. CyberWire Glossary link: https://thecyberwire.com/glossary/log4j Audio reference link: “CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her …
…
continue reading

1
Conference Finals Bound? Thunder, Celtics, Wolves & Pacers get BIG Wins | ALL NBA PODCAST
1:05:33
1:05:33
Play later
Play later
Lists
Like
Liked
1:05:33Tim Legler and Adam Mares break down all the biggest NBA Playoff storylines, including how unforced errors and missed opportunities cost the Denver Nuggets in Game 4 against the Thunder—and whether Nikola Jokic deserves the blame. They analyze Anthony Edwards’ second-half takeover for the Timberwolves and Julius Randle’s triple-double against the W…
…
continue reading

1
Beyond Encryption: Ransomware's New Game & Top Exploits of 2024
18:22
18:22
Play later
Play later
Lists
Like
Liked
18:22Tune in to explore the rapidly evolving cyber threat landscape of 2024 from Huntress 2025 global Cyber Threat Report, where attackers standardized sophisticated techniques across businesses of all sizes. We dissect the significant shifts in ransomware strategies, including the fragmentation of major groups following takedowns like LockBit, Dharma, …
…
continue reading

1
S3 E6: From Submarines to Cybersecurity - Navigating Small Business Security
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37Welcome to another episode of Simply Defensive! In this installment, hosts Josh Mason and Wade Wells are joined by cybersecurity expert James Bierly. James shares his unique journey from a submarine sonar technician in the Navy to founding his own security firm, Secure Point Solutions, which specializes in helping small businesses tackle cybersecur…
…
continue reading

1
RCR 161: AI and Financial Security: The New Frontier - Vendor Focus (NextPeak.net)
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18The digital landscape for financial institutions has forever changed with the rapid advancement of artificial intelligence and machine learning technologies. What started as simple robotic process automation has evolved into sophisticated AI systems capable of transforming everything from fraud detection to customer service - but at what security c…
…
continue reading

1
Contenders or Pretenders? Second Round NBA Playoff Power Rankings w/ Marc Stein | ALL NBA PODCAST
32:28
32:28
Play later
Play later
Lists
Like
Liked
32:28NBA Insider Marc Stein (former ESPN Power Rankings lead) and Adam Mares are LIVE immediately after the Cavaliers vs. Pacers game to deliver a full Power Ranking of the 8 remaining teams in the second round of the NBA Playoffs. From Jayson Tatum and the Celtics to Nikola Jokic and the Nuggets, they’ll debate who looks like a true contender — and who…
…
continue reading

1
The Accelerating Threat Landscape: Inside Modern Cybercrime
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39Delve into the complex and rapidly transforming world of cyber threats. This episode examines notorious ransomware groups like Black Basta, LockBit, BlackCat/ALPHV, Phobos/8Base, Medusa, and Clop, exploring their Ransomware-as-a-Service (RaaS) models and distinctive tactics, techniques, and procedures (TTPs). We also discuss state-sponsored cyber w…
…
continue reading

1
Danielle Jablanski on Critical Infrastructure Protection
41:26
41:26
Play later
Play later
Lists
Like
Liked
41:26Danielle Jablanski, Industrial Control Systems Strategist & Subject Matter Expert at CISA, joins the Nexus podcast to discuss her perspectives on critical infrastructure protection and government's role as a cybersecurity partner on implementation guidance and enablement. Danielle touches on a number of areas of CI security and protection, ranging …
…
continue reading

1
Cybersecurity Unpacked: Breaches, Billions, and AI's Double Edge
10:34
10:34
Play later
Play later
Lists
Like
Liked
10:34In this episode, we dive into the recent developments shaping the cybersecurity landscape as of May 2025. We discuss major incidents like the significant breach of the LockBit ransomware gang, which exposed sensitive data including negotiation messages and user credentials. We'll also explore the growing sophistication of financial cyberattacks, hi…
…
continue reading

1
The Accelerating Adversary: Inside the 2025 Threat Landscape
13:52
13:52
Play later
Play later
Lists
Like
Liked
13:52Join us for a deep dive into the Global Threat Landscape Report 2025 by FortiGuard Labs. This episode explores the dramatic escalation in cyberattacks, revealing how adversaries are moving faster than ever, leveraging automation, commoditized tools, and AI to gain advantage. We'll shed light on the surge in automated reconnaissance, the evolving da…
…
continue reading

1
HN780: The Whys and Hows of Automated Network Testing
1:03:53
1:03:53
Play later
Play later
Lists
Like
Liked
1:03:53On today’s Heavy Networking we talk with Dan Wade about testing the network, inspired by Dan’s talk at AutoCon 2: “Step 0: Test the Network.” We discuss why testing is a good idea, and then explore four types of network testing, including unit tests and integration tests. We dig into Yang, RESTCONF, NETCONF and gNMI... Read more »…
…
continue reading

1
2025 Cyber Attack Playbooks: Navigating the Future Threat Landscape
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13This podcast delves into the critical insights found within the 2025 Cybersecurity Attacks Playbooks, exploring the diverse and evolving threat landscape organizations face. We examine playbooks covering threats from AI-enhanced phishing and advanced ransomware to the complexities of supply chain compromises, zero-day exploits, and AI-powered malwa…
…
continue reading

1
Knicks Rally AGAIN, Thunder Clobber Nuggets & Will Ant Show Up? | ALL NBA PODCAST
1:02:49
1:02:49
Play later
Play later
Lists
Like
Liked
1:02:49Tim Legler and Adam Mares break down the biggest NBA Playoff stories, starting with how the Celtics blew another fourth quarter lead against the Knicks, Jayson Tatum’s struggles, and questions around Joe Mazzulla’s late-game decisions. They highlight Jalen Brunson’s clutch performance and the elite wing defense from OG Anunoby and Mikal Bridges. Th…
…
continue reading

1
Beyond the Scan: Unmasking Hidden Risks and Unfixed Flaws in the Age of AI
20:13
20:13
Play later
Play later
Lists
Like
Liked
20:13In this episode, we dive deep into the findings of the State of Pentesting Report 2025 to explore the real state of cybersecurity. Organizations may feel confident, but pentesting consistently reveals hidden, exploitable vulnerabilities that automated scanners miss. We'll uncover the most significant risks identified through human-led pentests, fro…
…
continue reading

1
What’s inside the mystery box? Spoiler: It’s a scam!
46:13
46:13
Play later
Play later
Lists
Like
Liked
46:13As Dave Bittner is at the RSA Conference this week, our hosts Maria Varmazis and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from José on episode 335, sharing how UK banking features like Faster Payments and the “Check Payee” …
…
continue reading
*Infinity Gauntlet Snapping Noises*
…
continue reading