The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Patch Security Podcasts
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
1
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
The Small Business Cyber Security Guy
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
…
continue reading
Bradley Chambers and various experts discuss the latest with Apple in the enterprise and K-12. New episodes come out bi-weekly on Tuesday.
…
continue reading
Welcome to the HR Huddle, the ultimate resource for all things HR. This podcast is comprised of two unique mini-shows where we will be: Spilling The Tea On HR Tech with Chief Research Officer and HR tech market influencer, Stacey Harris and Cliff Stevenson, Sapient Insights Group, Director of Research, AND breaking down the messy stories that everyone in human resources has in HR - HR We Have a Problem, with Teri Zipper - global HR consulting expert and Sapient Insights Group CEO featuring w ...
…
continue reading
Welcome to TiPS: Today in Public Safety! Your go-to podcast for the latest updates in Next Generation 911 (NG911) services and public safety technology. Published every Monday, Wednesday, and Friday at 8AM Eastern, you’ll find current topics on Public Safety and NG911 implementation, interoperability, and the innovations shaping emergency response into the future. This series, hosted by Mark J. Fletcher, ENP (Fletch), a leading subject matter expert in the industry with 14 U.S. patents to hi ...
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep network visibility to not only protect against sophisticated cyber- ...
…
continue reading
Host Noel Bradford teams up with cybersecurity experts to deliver essential tech insights for UK small businesses and consumers. Cutting through jargon with wit and authority, each episode tackles real-world cyber threats, updates, and digital security challenges that actually matter to your business. From patch management to data protection, get actionable advice that doesn't require a computer science degree.Where cybersecurity meets practicality.
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Master the CompTIA Server+ exam with Audio Course—your audio companion for server hardware, administration, security, and troubleshooting. Every episode simplifies exam objectives into practical insights you can apply in real-world IT environments. Produced by BareMetalCyber.com, where you’ll find more prepcasts, books, and resources to power your certification success.
…
continue reading
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
…
continue reading
5 Bytes Podcast features some of the highlights in enterprise IT for the last week as well as some useful resources for IT Pros and more!
…
continue reading
Welcome to Silent Mode Cafe, the podcast where we translate the digital realm into plain English. From data privacy and basic internet security to smart home gadgets and the latest AI developments, we serve up tech insights with a side of caffeine.
…
continue reading
The Mid-Atlantic’s Best IT services company. Helping Business Owners create, improve and scale their Technology strategy. IT services, IT Security and IT Support advice and leadership from expert professionals. Q&A with Senior Engineers, Service Managers and Business Development.
…
continue reading
Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.
…
continue reading
Welcome to the Flexera Security Vulnerability Insight Podcast, your go-to source for all things related to cybersecurity, software vulnerabilities, and threat intelligence. In this engaging podcast series, we will dive deep into the ever-evolving world of digital security, providing you with valuable insights, expert interviews, and the latest industry trends. Hosted by Jeroen Braak and leading experts in the field, each episode explores critical topics such as: Vulnerability Management: Sta ...
…
continue reading
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
1
BIND 9 Emergency Patches: ISC Fixes High-Severity Cache Poisoning and DoS Flaws
20:19
20:19
Play later
Play later
Lists
Like
Liked
20:19The Internet Systems Consortium (ISC) has released a series of critical BIND 9 updates to fix multiple high-severity vulnerabilities affecting DNS resolver systems worldwide. The flaws—tracked as CVE-2025-40780, CVE-2025-40778, and CVE-2025-8677—pose serious threats ranging from cache poisoning to denial-of-service (DoS) attacks. These vulnerabilit…
…
continue reading
1
TiPS Episode 25 1017 Pumpkin Patching Security in the PSAP
6:31
6:31
Play later
Play later
Lists
Like
Liked
6:31It’s spooky season at the PSAP, and this week we’re patching more than pumpkins. “Pumpkin Patching Security in the PSAP” explores cyber hygiene for dispatch centers with humor and a snarky Halloween flair. Learn how unpatched systems “rot,” why firmware is your overlooked ingredient, and how to keep your network from turning into a haunted house. P…
…
continue reading
1
New Patching Strategies for Old Vulnerabilities
26:12
26:12
Play later
Play later
Lists
Like
Liked
26:12Send us a text While there are plenty to pick from, one of the biggest challenges for cybersecurity professionals in the industrial realm can be getting financial support. In manufacturing there are always a number of viable spending options, and working to make cybersecurity a priority can be tough, especially when enterprises are faced with initi…
…
continue reading
1
SANS Stormcast Wednesday, October 15th, 2025: Microsoft Patchday; Ivanti Advisory; Fortinet Patches
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivanti Advisory Ivanti released an advisory with some mitigation steps users can take until the recently m…
…
continue reading
1
SANS Stormcast Wednesday, October 15th, 2025: Microsoft Patchday; Ivanti Advisory; Fortinet Patches (#)
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22SANS Stormcast Wednesday, October 15th, 2025: Microsoft Patchday; Ivanti Advisory; Fortinet Patches Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivanti…
…
continue reading
1
HR, We Have a Problem - From security patches to distributed ledgers - why HR tech vendors without Web3 strategies will become competitive liabilities.
55:42
55:42
Play later
Play later
Lists
Like
Liked
55:42In this episode of HR, We Have a Problem, Teri Zipper and guest Dennis Hill, Founder of Sagacity, LLC, and Chairman/President/CEO at IHRIM, explore Web3, blockchain, and distributed ledger technologies that promise to solve the security problems that have plagued HR systems for 60 years. The conversation covers data ownership rights, the shift towa…
…
continue reading
1
Unity vulnerability, Oracle zero-day patched, Discord user info exposed
8:31
8:31
Play later
Play later
Lists
Like
Liked
8:31
…
continue reading
1
Toys “R” Us Canada Confirms Customer Data Breach After Dark Web Leak
22:47
22:47
Play later
Play later
Lists
Like
Liked
22:47Toys “R” Us Canada has confirmed a customer data breach after records from its database appeared on the dark web on July 30, 2025, prompting a full-scale cybersecurity investigation and disclosure to privacy regulators. The company’s internal review, conducted in partnership with third-party experts, verified that an unauthorized party accessed and…
…
continue reading
1
Week in Review: AI powered cyberattacks, Chinese time hacked, the 72 hour workweek
32:19
32:19
Play later
Play later
Lists
Like
Liked
32:19Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests David Cross, CISO, Atlassian, and davidcrosstravels.com, and Montez Fitzpatrick, CISO, Navvis Thanks to our show sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everyth…
…
continue reading
1
Kyocera’s Motex Lanscope Hit by Active Attacks: Critical 9.8 Exploit Enables Remote Code Execution
18:05
18:05
Play later
Play later
Lists
Like
Liked
18:05A dangerous zero-day vulnerability in Kyocera Communications subsidiary Motex’s Lanscope Endpoint Manager has triggered a global cybersecurity alert after being actively exploited in real-world attacks. Tracked as CVE-2025-61932, this flaw carries a CVSS severity score of 9.8, allowing remote, unauthenticated attackers to execute arbitrary code sim…
…
continue reading
1
Adobe Confirms Active Exploitation of SessionReaper Vulnerability in Commerce Platforms
29:23
29:23
Play later
Play later
Lists
Like
Liked
29:23A critical new vulnerability is wreaking havoc across the global e-commerce ecosystem. Tracked as CVE-2025-54236 and dubbed SessionReaper, this flaw affects Adobe Commerce and Magento Open Source platforms, allowing attackers to bypass security features and seize control of customer accounts through the Commerce REST API. Despite Adobe releasing em…
…
continue reading
1
AI Sidebar Spoofing: How Malicious Extensions Hijack ChatGPT and Perplexity Interfaces
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40Cybersecurity firm SquareX has unveiled a new and alarming threat to users of AI-enabled browsers — a technique called AI Sidebar Spoofing. This sophisticated attack uses malicious browser extensions to create visually identical replicas of legitimate AI sidebars, tricking users into believing they are interacting with trusted AI assistants like Ch…
…
continue reading
In this episode of TiPS: Today in Public Safety, Fletch discusses why “speaking AI” is becoming an essential skill for 911 professionals, managers, and technologists. Learn how to craft queries that yield relevant, reliable answers — and understand how poor prompting can cause bias, misinformation, or even dangerous assumptions. Topics include: How…
…
continue reading
1
Weekly Cyber News Rollup, October 24th, 2025
17:03
17:03
Play later
Play later
Lists
Like
Liked
17:03This is the Friday Rollup for October twentieth through October twenty-fourth, twenty twenty-five. A turbulent week put resilience and identity under the microscope: a broad Amazon Web Services disruption rippled through logins and checkouts, while a Windows change broke authentication on cloned machines with duplicate S I Ds. We saw active exploit…
…
continue reading
1
Passwordless Security: Debunking the Biggest Myths
15:08
15:08
Play later
Play later
Lists
Like
Liked
15:08On this episode of Talos Takes, Hazel welcomes Cisco Duo experts Steven Leung and Tess Mishoe to bust the most common myths around passwordless security and multi-factor authentication (MFA). Discover why not all MFA is created equal, why passwordless doesn't mean less security, and the most seamless way to adopt passwordless solutions. Plus, learn…
…
continue reading
This is today’s cyber news for October 24th, 2025. We lead with an actively exploited flaw in a popular endpoint management tool that can hand attackers domain-level control if left unpatched. Retailers face session hijacking on Magento, while Microsoft is closing a quiet NTLM credential-leak path in File Explorer. An ill-timed agent update knocked…
…
continue reading
1
Jingle Thief exploit, Lazarus targets jobseekers, the 72 hour workweek
9:26
9:26
Play later
Play later
Lists
Like
Liked
9:26Jingle Thief hackers steal millions in gift cards by exploiting cloud infrastructure Lazarus hackers targeted European defense companies Deep Tech work culture pushes for 72 hour workweeks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. T…
…
continue reading
1
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
…
continue reading
1
Jewett-Cameron Reports Ransomware Breach Involving Encryption and Data Theft
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53Oregon-based Jewett-Cameron Company, a manufacturer of fencing, kennels, and specialty wood products, has confirmed that it was the victim of a double-extortion ransomware attack on October 15, 2025, in an incident that disrupted operations and exposed sensitive corporate data. The attackers infiltrated the company’s IT network, deploying encryptio…
…
continue reading
1
Star Blizzard’s Malware Makeover: From LostKeys to MaybeRobot
32:49
32:49
Play later
Play later
Lists
Like
Liked
32:49The Russian state-sponsored hacking group Star Blizzard — also tracked as ColdRiver, Seaborgium, and UNC4057 — has undergone a major transformation in its operations following public exposure earlier this year. After researchers at Google detailed its LostKeys malware and PowerShell-based infection chain in June 2025, the group swiftly abandoned th…
…
continue reading
1
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit (#)
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu…
…
continue reading
1
CISO IT – Dmitri Alperovitch’s Vision for Cyber Defense, E07
22:31
22:31
Play later
Play later
Lists
Like
Liked
22:31In this episode, host Jason Kikta talks with Dmitri Alperovitch – CrowdStrike co-founder and chairman of the Automox board – about how speed and precision define modern cyber defense. Alperovitch explores how the OODA loop (Observe–Orient–Decide–Act), a concept rooted in military strategy, can help IT and security teams detect, respond, and adapt t…
…
continue reading
1
Keycard Emerges from Stealth with $38M to Secure the Identity of AI Agents
19:17
19:17
Play later
Play later
Lists
Like
Liked
19:17San Francisco-based Keycard has officially emerged from stealth mode, announcing $38 million in funding across seed and Series A rounds to build what may become one of the most critical infrastructure layers of the AI era — identity and access management (IAM) for AI agents. Founded in 2025 by former senior executives from Snyk and Okta, Keycard is…
…
continue reading
1
Critical TP-Link Omada Vulnerabilities Expose Networks to Remote Takeover
22:07
22:07
Play later
Play later
Lists
Like
Liked
22:07Security researchers are urging immediate action after TP-Link disclosed multiple critical vulnerabilities in its Omada gateway line, affecting a wide range of ER, G, and FR series devices. The flaws—now patched by TP-Link—expose organizations to remote code execution, privilege escalation, and full network compromise, making them among the most se…
…
continue reading
1
TARmageddon: The Rust Library Flaw Exposing Supply Chains to Remote Code Execution
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58A critical new vulnerability known as TARmageddon (CVE-2025-62518) has sent shockwaves through the Rust developer community and the broader cybersecurity world. This high-severity desynchronization flaw, discovered in the Async-tar and Tokio-tar libraries, exposes millions of downstream applications to the risk of remote code execution and supply c…
…
continue reading
This is today’s cyber news for October 23rd, 2025. Attackers are raiding Magento stores, China-linked actors are revisiting SharePoint, and a Rust TAR parser flaw raises fresh supply-chain worries. We also cover why common AI agents can be tricked into running commands and how an MCP registry issue exposed thousands of servers and keys. The middle …
…
continue reading
1
TP-Link urges updates, MuddyWater espionage campaign, flaw hits Adobe Commerce
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26TP-Link urges updates for Omada gateways MuddyWater targets organizations in espionage campaign "SessionReaper" flaw exploited in Adobe Commerce Huge thanks to our sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in through the cracks other tools miss. That’s why organizations are turning to ThreatLocker. As a zero-trust endpoint prote…
…
continue reading
1
HR, We Have a Problem - Why traditional hiring methods fail entry-level positions and how the "One Layer Deep" approach transforms recruiting speed and candidate quality.
43:49
43:49
Play later
Play later
Lists
Like
Liked
43:49In this episode of HR, We Have a Problem, Teri Zipper and guest Libby DeLucien, Founder of WootRecruit, discuss common hiring mistakes, the role of AI in recruiting, and why companies need to rethink their approach to attract quality candidates. The conversation covers how personal development directly impacts leadership effectiveness and why treat…
…
continue reading
1
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability.
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
…
continue reading
1
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability. (#)
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability. webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans…
…
continue reading
1
Vidar 2.0: The C-Rewritten Stealer Poised to Dominate the Cybercrime Market
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42A new evolution in information-stealing malware has arrived — and it’s already drawing serious attention from researchers and defenders alike. The release of Vidar 2.0 represents a complete transformation of the long-running Vidar infostealer, which has been rewritten entirely in C and equipped with multi-threading and advanced anti-analysis mechan…
…
continue reading
1
Dataminr Acquires ThreatConnect for $290M to Create the Next Generation of Tailored Threat Intelligence
23:01
23:01
Play later
Play later
Lists
Like
Liked
23:01Dataminr, the AI powerhouse known for its real-time risk and event detection platform, has announced plans to acquire ThreatConnect, a cybersecurity firm specializing in threat intelligence aggregation and response, for $290 million in cash and equity. This strategic move marks a major milestone in the ongoing consolidation of the threat intelligen…
…
continue reading
1
Cybersecurity Defense Ecosystem Episode 6: Understanding MDR, Pen Testing, and Application Security
31:58
31:58
Play later
Play later
Lists
Like
Liked
31:58Send us a text Presenters: Julian Lee, Publisher, Community Builder, Speaker, Channel Ecosystem Developer with a focus on cybersecurity, AI and Digital Transformation Nim Nadarajah, C.CISO, Cyber Security, Compliance & Transformation Expert | Executive Board Member | Keynote Speaker Evgeniy Kharam, Publisher, Community Builder, Speaker, Channel Eco…
…
continue reading
1
Veeam Acquires Securiti AI for $1.725 Billion to Unite Data Resilience, Security, and AI
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44In one of the largest cybersecurity acquisitions of 2025, Veeam Software has announced plans to acquire Securiti AI for $1.725 billion in cash and stock, signaling a fundamental shift in how enterprises will secure, manage, and govern their data in the age of artificial intelligence. The deal, expected to close in the fourth quarter, will bring tog…
…
continue reading
1
Defakto Raises $30.75 Million to Redefine Machine Identity Security
34:01
34:01
Play later
Play later
Lists
Like
Liked
34:01California-based cybersecurity firm Defakto has raised $30.75 million in Series B funding, led by XYZ Venture Capital, bringing its total investment to roughly $50 million. The new capital will power the company’s rapid expansion in product development and global market reach for its identity and access management (IAM) platform—one specifically de…
…
continue reading
1
Dr. Allan Friedman Joins NetRise: The Father of SBOMs Goes Private to Fuse AI and Supply Chain Security
24:24
24:24
Play later
Play later
Lists
Like
Liked
24:24In a landmark move for the cybersecurity industry, Dr. Allan Friedman — often called the Father of SBOMs — has joined supply chain security firm NetRise as a strategic advisor. Friedman’s transition from his influential role at CISA marks a pivotal moment where public policy meets private innovation. His mission: to push the Software Bill of Materi…
…
continue reading
1
TiPS Episode 25 1022 Swarm Drones as First Responders in NG911
10:16
10:16
Play later
Play later
Lists
Like
Liked
10:16The next generation of first responders may not wear a uniform — they might fly. 🚁 In this episode of TiPS: Today in Public Safety, Fletch explores how swarm intelligence is taking flight in Public Safety drone operations. Coordinated drone networks are evolving beyond simple video feeds — they can now assess hazards, deliver medical supplies, and …
…
continue reading
This is today’s cyber news for October 22nd, 2025. A major AWS outage reminded everyone how fragile single-cloud strategies can be, while a Windows update snag locked out cloned PCs with duplicate SIDs. CISA pressed urgency on an exploited Oracle E-Business Suite flaw, and a critical TP-Link Omada bug exposed small-business gateways to takeover. Re…
…
continue reading
1
Episode 433: Managing iOS is easy, right?
1:26:17
1:26:17
Play later
Play later
Lists
Like
Liked
1:26:17Alexandre Morin joins the podcast to talk all about iOS Management - ADUE, ADDE, ADE, BYOD, there’s too many acronyms to mention. All of this is a known, totally easy piece of cake, right? There’s no challenges here. Oh, but what about cellular? eSIM? Different use-cases? dedicated devices locked into single app usage? It’s not so straight forward,…
…
continue reading
1
Russian hackers replace malware with new tools, Windows updates cause login issues, campaign targets high-profile servers
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03Russian state hackers replace burned malware with new tools Recent Windows updates cause login issues on some PCs Sophisticated campaign targets servers of high-profile organizations Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That’s …
…
continue reading
1
SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln;
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
…
continue reading
1
SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln; (#)
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln; What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu webs…
…
continue reading
1
Product Talk – Secure by Default: Inside Automox’s Approach to Product Security, E21
32:47
32:47
Play later
Play later
Lists
Like
Liked
32:47In this episode of Product Talk, host Peter Pflaster sits down with Automox Staff Security Engineer Henry Smith to discuss what it really means to be secure by default. Together, they explore how Automox builds security into the foundation of its products, from engineering practices to company culture. You’ll learn how Automox’s “no security tax” p…
…
continue reading
1
Episode 075 - Why “Scan, Find, Patch” Is No Longer Enough - Mark Goldenberg
25:44
25:44
Play later
Play later
Lists
Like
Liked
25:44The traditional "scan, find, patch" method is falling short against today’s threat landscape. In this episode, Mark Goldenberg, Sr. Security Solutions Architect at Defy Security, outlines a modern approach to vulnerability management. Tune in to learn how to level-up your proactive security efforts by focusing on risk prioritization, fostering coll…
…
continue reading