Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Pen Test Podcasts
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
Legitimate Cybersecurity Podcast - designed to empower you with real-world cybersecurity information, stories, and advice.
…
continue reading
News, views, and insights into the cybersecurity realm produced by Greg Johnson, CEO of Webcheck Security. www.webchecksecurity.com
…
continue reading
Join HOU.SEC.CON Cofounders Michael and Sam each week as they chat with conference speakers about the latest topics and trends in the cybersecurity space.
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
…
continue reading
Nerding Out With Viktor is a podcast about tech, startups, and everything in between. Hosted by Viktor, a lifelong nerd and seasoned entrepreneur, the show features real conversations with builders, hackers, and technologists. Viktor got his start in Silicon Valley with YippieMove, an early email migration tool, and later created Blotter, a top-ranked productivity app for macOS. He now runs Screenly — the first developer-friendly digital signage platform — and built its open-source sibling, ...
…
continue reading
Hi there, this podcast was made under the idea that a young adult from the Philippines can test his ability to communicate his thoughts from the pen and paper to speech through podcasts. Topics range as far as anime to culture to philosophy to science and technology and even to some extent a bit of politics. Hope you'll enjoy my random theories crafted about the why's, how's and what for's that I encounter everyday.
…
continue reading
This is the official podcast for Snakes & Saloons, a 5e genre module, bringing a Western twang to the world's most popular roleplaying games.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
aaaa
…
continue reading
Long before Christiane Amanpour, Frances Fitzgerald and Martha Gellhorn blazed a trail in courageous investigative journalism, a pioneering and intrepid writer and journalist whose pen name was Nellie Bly opened up a whole new field in what had previously been a strictly male domain. Ten Days in a Madhouse was published as a series of articles in the New York World during 1887. Nellie Bly was given the assignment by her editor to have herself committed to an insane asylum in New York with a ...
…
continue reading
Transcript message from Audio. My name is Eniola Daniel and l’m here to tell you how passionate l am in drawings. It’s all started when l was in a training. Our class teacher always gives us test saying that we should draw a first Aid box. So l took my pencil and l draw a square and l just put a cross on it. Then l submitted my note. Only for me to turn back and sees someone else drawings looking so fantastic and well done. I got angry and l knew l couldn’t go back again to take my book and ...
…
continue reading

1
The Truth About Ethical Hacking (Pen Testing Myths Busted!)
41:33
41:33
Play later
Play later
Lists
Like
Liked
41:33Are you curious about penetration testing, aka legal hacking? In this episode of Legitimate Cybersecurity, Frank and Dustin tear down the myths of hacking, break down real-world pen testing, and share hilarious (and horrifying) war stories from the field. We cover: ✅ The skills you actually need to get into pen testing ✅ What certs like OSCP, CEH, …
…
continue reading

1
You Can’t Trust Your Eyes or Ears Anymore: How AI Is Breaking Cybersecurity
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05🎙 In this episode of Legitimate Cybersecurity, we dive deep into the unsettling reality of AI in modern cybercrime. Senator Marco Rubio was impersonated by AI in a high-level cyber deception campaign, and that's just the beginning. Frank and Dustin unpack: 🧠 Deepfake threats to democracy 🔐 Signal messaging & nation-state exploitation 🧪 Data poisoni…
…
continue reading

1
Mastering the CISO Journey with Guest Christophe Foulon
24:51
24:51
Play later
Play later
Lists
Like
Liked
24:51In this episode of Life of a CISO, Dr. Eric Cole sits down with cybersecurity expert and fellow podcaster Christophe Foulon to dive deep into the evolving role of the Chief Information Security Officer. From breaking into cybersecurity to leading organizations through strategic risk decisions, Christophe shares real-world insights on how to transit…
…
continue reading
We’re chatting with another fantastic HOU.SEC.CON. author and speaker, Doug Landoll! In this episode Michael and Sam talk to Doug about his book “Security Risk Assessment Handbook”, how he transitioned from traditional IT to cybersecurity, and why others should consider a similar path before moving into a GRC role. Things Mentioned: · HSC User Grou…
…
continue reading

1
How a Hacker Became Twitter’s First CISO | Michael Coates on Cybersecurity’s Future
33:04
33:04
Play later
Play later
Lists
Like
Liked
33:04In this episode of Life of a CISO, Dr. Eric Cole welcomes Michael Coates, a seasoned cybersecurity expert with over 20 years of experience. Michael shares his journey from working as a legal hacker to becoming Twitter’s first Chief Information Security Officer (CISO), and later founding his own data security company. They discuss how core cybersecu…
…
continue reading

1
Rethinking Startups: Inside the Venture Studio Model with Thorbjørn Rønje
1:07:50
1:07:50
Play later
Play later
Lists
Like
Liked
1:07:50In this episode, Viktor Petersson sits down with Thorbjørn Rønje, founder of Bifrost Studios, to unpack the venture studio model and why he believes it’s a smarter, faster way to build startups. Thorbjørn explains how Bifrost applies a playbook-driven approach to validate product ideas quickly, reduce risk, and bring businesses to life without wast…
…
continue reading

1
PP069: A Quantum Primer: It’s More Than Cracking Crypto
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44Quantum computing is here, and it’s being used for more than cracking encryption. On today’s Packet Protector we get a primer on quantum, how it differs from classical computing, its applications for difficult computing problems, why quantum will be the death of blockchain, and how to think about quantum risks. Our guest, Johna Johnson, is... Read …
…
continue reading
Greg Linares (AKA Laughing Mantis) joins us to tell us about how he became the youngest hacker to be arrested in Arizona. Follow Greg on Twitter: https://x.com/Laughing_Mantis. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. …
…
continue reading

1
AI Can Write a Better Phishing Email Than You. Here’s Why That Should Terrify You
57:17
57:17
Play later
Play later
Lists
Like
Liked
57:17Sorry in advance for the wonk audio!! AI is everywhere—and it's not just writing poems or generating cat pics. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Burr dive deep into the impact of artificial intelligence on the world of cybersecurity. From the myth of Artificial General Intelligence (AGI) to AI-powered pentesting an…
…
continue reading

1
The Cyber War Has Already Started – Are You Ready?
30:51
30:51
Play later
Play later
Lists
Like
Liked
30:51You’re living in a time where science fiction is quickly becoming your reality. In this high-impact episode of Life of a CISO, Dr. Eric Cole breaks down the current state of cybersecurity—from nation-state attacks and massive password breaches to the hidden threats living on your mobile device. You’ll hear Dr. Cole’s unfiltered take on a breach tha…
…
continue reading

1
CISA is Shrinking: What Does it Mean for Cyber?
34:30
34:30
Play later
Play later
Lists
Like
Liked
34:30Dark Reading Confidential sits down with two cybersecurity leaders to find out what cuts at CISA mean for the business of cyber. Featuring: Tom Parker, CEO of Hubble Technology Jake Williams, aka "@malwarejake", VP of R&D at Hunter Strategy In today’s episode, we’ll cover… The impact of CISA's workforce reduction How the private sector can fill the…
…
continue reading
We’re back with another keynote speaker, Robert “RSnake” Hansen! He chats with Michael and Sam about his new book, AI’s Best Friend (and how to get a free copy!), how he started hacking, and his upcoming HOU.SEC.CON. presentation around his research on the CVSS framework. Things Mentioned: · HSC User Group on June 26, 2025 – https://www.hscusergrou…
…
continue reading

1
PP068: Common Kubernetes Risks and What to Do About Them
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access.…
…
continue reading

1
Quiet Defenders & Cyber Truths: Micah Heaton on AI, Advocacy, and Real-World Security
47:55
47:55
Play later
Play later
Lists
Like
Liked
47:55In this powerful and wide-ranging episode of Legitimate Cybersecurity, Frank and Dustin are joined by Micah Heaton, Executive Director of Product & Innovation Strategy at BlueVoyant and 2025 Microsoft Security Changemaker. 🎧 We talk: Why Micah champions the quiet defenders in cybersecurity The hidden art of communicating technical truth AI vs hype:…
…
continue reading

1
He Took Down Silk Road — Now He’s Warning About a 16 Billion Record Breach
52:09
52:09
Play later
Play later
Lists
Like
Liked
52:09What happens when the man who brought down Silk Road and Silk Road 2.0 joins us to talk about the largest credential breach in history? In this episode, Austin Berglas — former Assistant Special Agent in Charge of the FBI’s Cyber Branch in New York — shares behind-the-scenes stories from taking down some of the most infamous dark web marketplaces, …
…
continue reading

1
CISO Leadership, Trust & Non-Negotiables with Dan Lohrmann
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43In this episode of Life of a CISO, Dr. Eric Cole welcomes a true cybersecurity trailblazer: Dan Lohrmann. With a career that spans the NSA, Lockheed Martin, the State of Michigan, and now Presidio, Dan brings a rare depth of experience in both government and the private sector. As the first Chief Security Officer for an entire U.S. state and now a …
…
continue reading

1
Inside System76: Building Open Hardware and a Linux-First Future
1:09:00
1:09:00
Play later
Play later
Lists
Like
Liked
1:09:00In this episode of Nerding Out with Viktor, Viktor Petersson sits down with Carl Richell, founder and CEO of System76, to unpack how a small Linux-focused hardware company grew into a full-stack open source innovator.They explore System76's journey from shipping Ubuntu laptops to designing open firmware, building a factory, and launching their own …
…
continue reading

1
PP067: Protecting Secrets With Vault and TruffleHog
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don’t expose your privates. John discusses work he’s done to build an automated process in his organization for dev…
…
continue reading

1
Cyber Maturity Isn’t What You Think — Here’s the Real Truth (and a Few Ghost Tables)
47:52
47:52
Play later
Play later
Lists
Like
Liked
47:52🎙️ Welcome back to another episode of Legitimate Cybersecurity, where Frank and Dustin dive deep into the misunderstood world of cyber maturity. From donut shop risk models to executives clicking phishing emails (yes, really), this episode brings laughs, lessons, and legal implications. Learn: What cyber maturity really means Why frameworks like NI…
…
continue reading

1
From Pen Testing to Purpose: Jane Frankland on Cyber, Burnout, & Reinvention
35:12
35:12
Play later
Play later
Lists
Like
Liked
35:12In this special episode of Life of a CISO, I sit down with the brilliant Jane Frankland, MBE—an internationally recognized thought leader in cybersecurity with over 28 years of experience. Jane shares her unexpected journey into the field, starting not from a tech background but from art and design. Her curiosity and drive led her to co-found one o…
…
continue reading

1
The Never-Ending Cat and Mouse Game with Dmitri Alperovitch
36:12
36:12
Play later
Play later
Lists
Like
Liked
36:12Michael and Sam are back with another HOU.SEC.CON. keynote speaker – Dmitri Alperovitch! In this episode they talk about his new book, what he’s been up to since CrowdStrike, and what will be covered in his opening keynote. Things Mentioned: HSC User Group on June 26, 2025 – https://www.hscusergroup.com TAB Cyber Foundation Scholarship Closing July…
…
continue reading

1
PP066: News Roundup – NIST’s New Exploit Metric, Windows RDP Issues, Compromised Routers, and More
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electric…
…
continue reading

1
Breaking the IT Inertia with Google Cloud's Dr. Anton Chuvakin
32:19
32:19
Play later
Play later
Lists
Like
Liked
32:19In this episode of Life of a CISO, Dr. Eric Cole reconnects with longtime friend and cybersecurity legend Dr. Anton Chuvakin, whom he has known for over 25 years. The conversation opens with reflections on their decades-long professional journey and transitions into a deep dive into Anton’s current work at Google Cloud’s Office of the CISO. Anton s…
…
continue reading
This podcast welcomes Itai Tevet, CEO of revolutionary new AI SOC company, Intezer. Intezer provides Autonomous SOC. By automating the skills of experienced security analysts, Intezer helps security teams to solve their #1 challenge -- talent and resource shortages.By Gregory Johnson
…
continue reading

1
The Systems Behind Managing High-Performing Remote Teams with Jon Seager
1:06:02
1:06:02
Play later
Play later
Lists
Like
Liked
1:06:02In this episode of Nerding Out with Viktor, host Viktor Petersson welcomes back Jon Seager, VP of Engineering at Canonical, for a candid conversation about managing remote teams.They explore how Canonical structures its fully distributed engineering org, why hybrid meetings rarely work, and how to build systems that support clarity, autonomy, and a…
…
continue reading
Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and security reasons for employing microsegmentation, different methods (agents, overlays, network controls, and so on), how microsegmentation fits into a zero t…
…
continue reading
Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive it blurred the line between digital crime and psychological torture. This story might make your skin crawl. Get more from Joe linktr.ee/joetidy. Get the book Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet (https://amzn.to/3H…
…
continue reading

1
Breaking Into Cybersecurity and Future Trends with Henrik Parkkinen
35:21
35:21
Play later
Play later
Lists
Like
Liked
35:21In this episode of Life of a CISO, Dr. Eric Cole interviews Hendrik Parkkinen, a seasoned cybersecurity expert from Sweden with over 20 years of experience, mostly in consulting and security strategy. They discuss Henrik’s journey into cybersecurity, emphasizing how passion and curiosity play a crucial role in succeeding in the field. Henrik shares…
…
continue reading

1
Forcing Innovation with Jeremiah Grossman
43:19
43:19
Play later
Play later
Lists
Like
Liked
43:19HOU.SEC.CON.'s first keynote speaker is returning for our 15-year anniversary! This week Michael and Sam are talking to cybersecurity legend Jeremiah Grossman about his start in cyber at just 19 years old, what we can learn from cybersecurity insurance companies, and what to expect at HOU.SEC.CON. 2025! Things Mentioned: · What Works in Cybersecuri…
…
continue reading

1
PP064: How Aviatrix Tackles Multi-Cloud Security Challenges (Sponsored)
42:51
42:51
Play later
Play later
Lists
Like
Liked
42:51Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more …
…
continue reading
In this new episode of Life of a CISO, Dr. Eric Cole opens with one of his most powerful guiding principles: “Let data drive decisions, not emotions.” Drawing from his experiences traveling and meeting with top executives, he emphasizes the importance of making decisions based on reliable data rather than emotional impulses. He challenges listeners…
…
continue reading

1
Why Web3, Crypto, and Blockchain Still Struggle in the Real World
1:18:43
1:18:43
Play later
Play later
Lists
Like
Liked
1:18:43In this episode of Nerding Out with Viktor, host Viktor Petersson sits down with Vlad Trifa, founder of Zimt and co-founder of EVRYTHNG, to explore why Web3, crypto, and blockchain often fail to deliver on their promises in the real world.Drawing from Vlad's extensive background in IoT, supply chain traceability, and decentralized systems, they div…
…
continue reading

1
Cyber Never Sleeps (and Neither Do We): Frameworks, Failures & the Fight for Digital Resilience
45:59
45:59
Play later
Play later
Lists
Like
Liked
45:59In this conversation, Frank and Dustin explore the critical themes surrounding cybersecurity, including its impact on businesses, the vulnerabilities organizations face, the role of leadership in fostering a secure environment, the importance of frameworks and standards, and the necessity of building a culture of cybersecurity. They discuss real-wo…
…
continue reading

1
The Day I Found an APT Group In the Most Unlikely Place
25:05
25:05
Play later
Play later
Lists
Like
Liked
25:05Cyber researchers Ismael Valenzuela and Vitor Ventura share riveting stories about the creative tricks they used to track down advanced persistent threat groups, and the surprises they discovered along the way.By Dark Reading
…
continue reading

1
PP063: Wi-Fi Security and AI in the WLAN at Mobility Field Day
52:57
52:57
Play later
Play later
Lists
Like
Liked
52:57Wireless security takes center stage in this episode of Packet Protector. Jennifer Minella and guests discuss “secure by default” efforts by WLAN vendors; the current state of PSK, SAE, and WPA3; NAC and zero trust; more WLAN vendors adding AI to their products (or at least their messaging); and more. Jennifer is joined by Jonathan... Read more »…
…
continue reading
In this episode of Life of a CISO, Dr. Eric Cole shines a spotlight on a critical blind spot that many Chief Information Security Officers overlook: legal liability. While CISOs are often highly skilled and technically knowledgeable, it’s what they don’t know—particularly about their legal exposure—that can put them at serious risk. Dr. Cole explai…
…
continue reading
When we think of addressing cybercrime, we often view it from a position of defense: how to prepare for an attack, how to respond to an attack, and how to recover from an attack. I would posit that organizations should also consider addressing these issues from a position of offense. This podcast welcomes Garylene “Gage” Javier, Legal Counsel, Priv…
…
continue reading

1
OT Security with Watch Mr. Wizard Star Sean Curry
32:13
32:13
Play later
Play later
Lists
Like
Liked
32:13Michael and Sam are catching up with Principal Consultant and Co-Founder at Cavalry Solutions, Sean Curry! Sean talks about his transition from the military to the private sector, the importance of standards like IEC 62443 for OT security, and the best way to align IT and OT teams. Things Mentioned: · New study reveals 92% of industrial sites at ri…
…
continue reading

1
Cybersecurity, Dishwashers, and AI Threats: Welcome Back!
47:35
47:35
Play later
Play later
Lists
Like
Liked
47:35After a three-year hiatus, Frank Downs and Dustin Brewer are back—older, wiser, and still talking into microphones they probably shouldn’t be trusted with. In this launch of their new podcast: Legitimate Cybersecurity, the two 20-year cyber veterans tackle one of the industry’s most persistent problems: why patching is still broken in 2025. They ex…
…
continue reading

1
PP062: Hunting for Host Security and Performance Issues with Stratoshark
33:45
33:45
Play later
Play later
Lists
Like
Liked
33:45Stratoshark is a new tool from the Wireshark Foundation that analyzes system calls on a host. Network, security, and application teams can use Stratoshark to diagnose performance issues and investigate behavior that may indicate malware or other compromises of the host. On today’s Packet Protector we talk with Gerald Combs of the Wireshark Foundati…
…
continue reading
In this episode of Life of a CISO, Dr. Eric Cole dives deep into the dominating force of 2025: artificial intelligence. While AI is everywhere—embedded in nearly every conversation and technology—the real concern, he explains, isn’t just about its capabilities but the risks it brings, especially in cybersecurity and data privacy. Dr. Cole breaks AI…
…
continue reading

1
Inside the Yocto Project's Evolving Tooling: SBOMs, SPDX 3.0, and Secure Embedded Systems
50:37
50:37
Play later
Play later
Lists
Like
Liked
50:37In this episode of Nerding Out with Viktor, host Viktor Petersson speaks with Joshua Watt of Garmin and Ross Burton of ARM to explore how the Yocto Project is evolving to meet the growing demands of software supply chain security, embedded Linux customization, and long-term product maintenance.As two long-time contributors to Yocto and OpenEmbedded…
…
continue reading

1
PP061: Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read mo…
…
continue reading
MalwareTech was an anonymous security researcher, until he accidentally stopped WannaCry, one of the largest ransomware attacks in history. That single act of heroism shattered his anonymity and pulled him into a world he never expected. https://malwaretech.com Sponsors Support for the show comes from Black Hills Information Security. Black Hills h…
…
continue reading
In this powerful episode of Life of a CISO, Dr. Eric Cole opens by highlighting a key success principle: even the world’s top performers — whether in sports, business, or entertainment — rely on coaches to help them spot their blind spots. Drawing from his deep experience coaching CISOs, Dr. Cole shares that cybersecurity leaders are no different. …
…
continue reading

1
Predicting the Future of Malware with Dr. Marcus Botacin
35:21
35:21
Play later
Play later
Lists
Like
Liked
35:21In this episode Michael and Sam are talking to malware researcher Dr. Marcus Botacin. Dr. Botacin discusses his journey from early work in sandboxing to advanced malware detection through machine learning, his recent efforts combining LLMs with GANs to create an iterative malware generation system that enhances evasion capabilities, and the importa…
…
continue reading

1
PP060: Subsea Cables and the Watery Risks to Critical Infrastructure
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
…
continue reading