Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Perimeter Security Podcasts

show episodes
 
Artwork

1
The security perimeter podcast

Athanasios Hristoulas

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A fascinating discussion of current national and international security issues. I interview experts on different subjects. More often than not, the discussion ends with a heated (but friendly) debate between me and my guest. So far we have covered issues ranging from the future of NATO, violence and law enforcement in Mexico, defense policy in Canada, the US and Mexico, North Korea, cybersecurity, organized crime, PUTIN, afghanistan... you name it we have covered it or will eventually do so. ...
  continue reading
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
You deserve to be hacked. Not because you’re weak. But because you’re worth attacking. These are real stories from the front lines of offensive cybersecurity. Conversations to challenge how you think about security and show why the only way to stay ahead is to stay on the attack
  continue reading
 
Artwork

1
Secure The Perimeter

Brent Canfield

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Hosted by Brent Canfield—a Christian, Marine, and successful business owner—Secure The Perimeter Podcast is your go-to resource for tackling the unique challenges of entrepreneurship. Designed for young and new entrepreneurs, this podcast provides practical solutions, actionable advice, and inspirational stories to help you build and grow your business with confidence. Drawing from his experiences as a Marine and a business leader, Brent combines discipline, faith, and a passion for service ...
  continue reading
 
Security Signal uncovers the signal from the noise for cybersecurity leaders, and helps them focus on important trends, threats and opportunities. Each episode translates cybersecurity complexities into actionable intelligence for executives at the helm. Security Signal helps leaders turn resilience into a competitive advantage. Follow us @CloudflareTV Explore our content hub for exclusive C-level conversations at cloudflare.tv/executive Read the full 2025 Cloudflare Security Signals report ...
  continue reading
 
ISNR is the only event in Europe that allows you to network and do business with high security end users and sector professionals. ISNR brings together government, public sector, police and emergency response, transport and critical national infrastructure stakeholders with commercial and private security organisations. This focused event delivers a unique opportunity to learn from a comprehensive seminar program and high-level, industry leading conference. Showcasing the complete range of t ...
  continue reading
 
Artwork

1
Enterprise AI Defenders

The AI in Enterprise Software Podcast Series

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Enterprise AI Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. The show is hosted by Evan Reiser, the CEO & founder of Abnormal AI, and Mike Britton, the CIO of Abnormal AI.
  continue reading
 
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episod ...
  continue reading
 
Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.
  continue reading
 
Artwork

1
The Mix Zone

Infront Lab

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Mix Zone by Infront Lab, a podcast that is all about sports technology and innovation. Join our host Merav Savir for candid chats with tech and sports leaders from around the globe, discussing the newest technologies, products, trends, business models, the innovation process and the do's and don'ts of the business.
  continue reading
 
Expanding Your Horizon is the ultimate destination for business and technology enthusiasts who want to stay ahead of the curve. Join us as we explore the latest trends, innovations, and strategies in the world of business and technology. Our expert guests share their insights, experiences, and knowledge on a variety of topics, from digital transformation and entrepreneurship to leadership and innovation. Whether you’re an entrepreneur, executive, or simply curious about the intersection of b ...
  continue reading
 
Loading …
show series
 
On the 31st episode of Enterprise AI Defenders, hosts Evan Reiser, CEO and co-founder of Abnormal AI, and Mike Britton, CIO at Abnormal AI, sit down with Sue Lapierre, Head of IT Governance & Information Security Officer at Prologis. With 1.3 billion square feet of logistics real estate and $3.2 trillion in goods moving through its facilities, Prol…
  continue reading
 
On the 30th episode of Enterprise AI Defenders, hosts Mike Britton and Evan Reiser talk with Martin Strasburger, Senior Vice President and Chief Security Officer at Duke Energy. Martin shares how Duke, serving over 11 million customers across the Southeast, protects vital physical and digital infrastructure in a time of accelerating energy demand a…
  continue reading
 
Nation-state attacks aren't just reserved for governments anymore. They're being repurposed, rebranded, and redirected at the private sector - and most organizations won’t see them coming. In this episode, we speak with Chris Worthy, former UK national security lead, and Billy Giles, CovertSwarm’s Head of Adversary Simulation (US), about how enterp…
  continue reading
 
On the 29th episode of Enterprise AI Defenders, host Mike Britton, Chief Information Security Officer at Abnormal AI, talks with Vaughn Hazen, Chief Information Security Officer at ​​the Canadian National Railway Company. CN is Canada’s largest rail operator and the only one that spans the Atlantic, Pacific, and Gulf coasts, running over 20,000 mil…
  continue reading
 
In this episode of YOU DESERVE TO BE HACKED, we sit down with representatives from the Bank of England and CovertSwarm to unpack the truth behind CBEST. This isn’t about pass/fail. It’s about exposing hidden assumptions, simulating real-world attacks, and stress-testing the entire financial ecosystem—starting at Tier 1 and scaling outward. We explo…
  continue reading
 
In this episode, DomainTools' Daniel Schwalbe is joined by Renee Burton (Infoblox), Raymond Dijkxhoorn (Surbl), and Peter Lowe (FIRST.org) to unpack the inaugural DomainTools Intelligence Report and what it reveals about DNS-based threats in 2024. The panel digs into evolving detection challenges, the pitfalls of domain scoring, the growing complex…
  continue reading
 
In this episode of Breaking Badness, Kali Fencl sits down with Audra Streetman, a former journalist turned threat intelligence analyst at Splunk. Audra shares her journey from local newsrooms to the frontlines of cybersecurity, detailing how her storytelling skills translate directly into threat research.Audra walks us through how ransomware attack…
  continue reading
 
In this RSA Conference 2025 special episode, we dive into the evolving world of cyberattribution, AI-powered threat tactics, and real-world incident response in AWS and GCPenvironments.Our guests include:● Tal Darsan and Etay Maor from Cato Networks, discussing stealthy attacker techniques,AI-powered evasion, and lessons from ransomware groups like…
  continue reading
 
Social engineering. SIM swapping. MFA fatigue. These aren’t just headlines from last year. They’re live tactics, straight from the Scattered Spider playbook. In this episode, we join CovertSwarm’s own operators as we explore the methods used by threat groups like Scattered Spider. From helpdesk manipulation to full identity compromise, we break dow…
  continue reading
 
The traditional corporate perimeter, once a simple fortress, is no longer a reliable defense. With vulnerabilities changing rapidly in a world of cloud computing and remote work, relying on outdated security models is no longer a viable strategy. This massive shift demands a new approach centered on identity, leaving many organizations wondering ho…
  continue reading
 
In this RSA Conference 2025 special episode, we explore two critical frontiers shaping thefuture of cybersecurity.First, Jon DiMaggio (Author of The Ransomware Diaries, Analyst1) breaks down the hiddensupply chains behind ransomware gangs, including the economics of affiliate betrayal and thechallenge of accurate attribution. He walks us through hi…
  continue reading
 
In this episode of Security Signal, host Khalid Kark, Field CIO at Cloudflare, sits down with Jeff Gatz, VP of Alliances at Kyndryl, to explore why traditional approaches to enterprise resilience are no longer enough. As organizations face growing third-party risks, regulatory shifts, and global instability, it's time to rethink what true security …
  continue reading
 
Welcome to a special RSAC 2025 episode of the Breaking Badness Cybersecurity Podcast!Today, we delve into the critical role of domains in modern cyber attacks. From sophisticated nation-state operations to AI-powered phishing kits and malicious browser extensions, domains are the foundational infrastructure for threat actors. Host Kali Fencl is joi…
  continue reading
 
The future of cybersecurity is here—and it’s driven by AI. Cybercriminals aren’t waiting — they’re already using AI to launch faster, more sophisticated attacks, including adversarial AI that can bypass traditional defenses. The threat is escalating, and C-suite security leaders need to act immediately to protect their cloud-first and hybrid enviro…
  continue reading
 
In this episode of Breaking Badness, we sit down with Raji Vannianathan, a cybersecurity leader at Microsoft driving the charge on AI security and safety. Raji shares her experience leading the team responsible for managing the end-to-end lifecycle of AI vulnerability disclosures, building proactive safety frameworks, and cultivating a global commu…
  continue reading
 
On the 28th episode of Enterprise AI Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal AI, talk with Rob Nolan, Vice President and Chief Information Security Officer at Expeditors. Expeditors is a Fortune 500 freight and logistics company, powering over 25% of all U.S. customs clearance. They enable global trade and supply …
  continue reading
 
Episode 1: In Our Post-Quantum Era Guests: Scott Francis (Security Innovation Principal Director, Accenture) and Trey Guinn (Field CTO, Cloudflare) Quantum threats are no longer theoretical — they’re already taking shape. While large-scale quantum computers are still in development, cybercriminals aren’t waiting. They're using a strategy known as “…
  continue reading
 
🎙️ Episode Title: Top Strategies to Streamline Business Operations and Boost Productivity Hosted by Brent Canfield—a Christian, Marine, and seasoned business owner—Secure, The Perimeter Podcast is dedicated to helping young and aspiring entrepreneurs navigate the real-world challenges of starting and growing a business. In this episode, “Top Strate…
  continue reading
 
Cut through the noise and stay ahead of the most pressing cybersecurity threats. Security Signal is the podcast that transforms cybersecurity complexity into clear, actionable insights for today’s business leaders. In each episode, we dive into critical trends, expert analysis, and real-world strategies to help you build resilience — and turn it in…
  continue reading
 
In this episode of the Secure the Perimeter podcast, host Brent Canfield interviews entrepreneur Eddie Wilson, who shares his journey from military service to becoming a successful business leader. They discuss the importance of personal growth, financial awareness, and the five phases of business growth. Eddie emphasizes the significance of leader…
  continue reading
 
In this episode of Breaking Badness, Kali Fencl sits down with Mick Baccio, Global SecurityAdvisor at Splunk and former CISO for Pete Buttigieg’s 2020 presidential campaign. Mickshares his journey from aspiring Navy nuclear engineer to leading security in some of thehighest-stakes environments, including the White House.They explore how threat inte…
  continue reading
 
In this episode of Breaking Badness, we sit down with John Donovan of ZEDEDA to unpack thelighter and more profound sides of cybersecurity’s biggest gatherings. From RSA’s unexpectedbaby goats and vendor booth antics to BSides San Francisco’s community-driven keynotestage, John shares personal stories, industry insights, and valuable advice on how …
  continue reading
 
In this episode of Breaking Badness, the crew investigates two escalating threats in the cybercrime ecosystem: the cleverly named phishing-as-a-service platform Morphing Meerkat, and the bulletproof hosting provider Proton66, a favorite among amateur cybercriminals.First, they dig into how Morphing Meerkat uses DNS-over-HTTPS (DoH) and clever phish…
  continue reading
 
Success in business doesn't happen by luck—it’s built on mastering the right fundamentals. In this episode, we break down the essential factors every entrepreneur must focus on to grow, scale, and thrive in today’s competitive landscape. Whether you're just starting out or looking to level up your game, these core principles will help guide your wa…
  continue reading
 
In this powerful continuation of our DFIR series, cybersecurity experts Daniel Schwalbe, DavidBianco, Lesley Carhart, and Sarah Sabotka dissect the heart of effective incident response,containment, eradication, recovery, and lessons learned. Packed with firsthand war stories,sharp tactical advice, and honest debates, this episode is a must-listen f…
  continue reading
 
On the 27th episode of Enterprise AI Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal AI, talk with Gareth Packham, Chief Information Security Officer at Save the Children International. Save the Children is one of the world's largest nonprofit organizations focused on protecting the rights and well-being of children. Oper…
  continue reading
 
In Part 1 of this special two-part panel, the Breaking Badness podcast gathers leadingcybersecurity experts to explore the foundations of DFIR - Digital Forensics and IncidentResponse. Featuring Daniel Schwalbe (DomainTools), Lesley Carhart (Dragos), David Bianco(Splunk), and Sarah Sabotka (Proofpoint), the panel dives into what makes an effective …
  continue reading
 
Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
  continue reading
 
Are you feeling the heat from competitors in your industry? This video breaks down strategic ways to handle business competition and turn it into a growth opportunity. Whether you're a startup founder, small business owner, or an entrepreneur looking to sharpen your edge, these insights will help you stay ahead.…
  continue reading
 
In this episode of Breaking Badness, host Kali Fencl is joined by DomainTools' Daniel Schwabeand disinformation expert Scot Terban to uncover how modern Russian disinformationcampaigns are using domain registrars, homoglyph attacks, and generative AI to mimiclegitimate news outlets and manipulate public perception. From the eerie sophistication ofD…
  continue reading
 
On the 26th episode of Enterprise AI Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal Security, talk with Kirsten Davies, former Chief Information Security Officer at The Estée Lauder Companies and Unilever and founder of The Institute for Cyber. Kirsten's storied career has given her a front-row seat to understanding the …
  continue reading
 
In this special DNS Masterclass episode of Breaking Badness, hosts Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce take a deep dive into the Domain Name System often dubbed the backbone and battleground of the internet. From its humble beginnings with host files to its critical role in modern security, the episode unpacks DNS’s evolution, vulnera…
  continue reading
 
In this episode, we introduce Fence Social, the game-changing networking platform built exclusively for the fence and gate industry. Whether you’re a contractor, supplier, or manufacturer, Fence Social connects you with the people and opportunities that can grow your business. Plus, we’re talking about the platform’s FREE business card scanning too…
  continue reading
 
Brian catches up with Rowdy from NW Quikpull while he's in town for the American Rental Association (ARA) show. The conversation goes off the rails as Rowdy throws some shade and calls Susan a muppet (all in good fun, of course). The two also dive into how they managed to survive life before they got married, plus a few laughs about business, life …
  continue reading
 
Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
  continue reading
 
In this episode of Breaking Badness, host Kali Fencl welcomes Wes Young of CSIRT Gadgets and Daniel Schwalbe, CISO and head of investigations at DomainTools, dive into a recent DomainTools Investigations (DTI) analysis involving ValleyRAT and Silver Fox, and how new tools are enabling faster, more accessible analysis for junior and seasoned analyst…
  continue reading
 
Who says you need fancy software to crush it in the fence biz? In this episode, Brian is joined by Susan from the Fence Workers Association and Steve from Las Vegas Fence to show you how to master building estimates straight up in Excel. Whether you’re a seasoned pro or just getting started, they break down practical, no-frills ways to price your j…
  continue reading
 
My Fence Life is coming to you live from the World of Concrete! Host Brian takes over the EZG booth with special guests Makayla, Dalton from High Pointe Companies, and Matt from EZG. They’re talking all things innovation, tools, and the latest trends shaking up both the concrete and fence industries. Expect candid shop talk, laughs, and behind-the-…
  continue reading
 
In this episode of My Fence Life, hosts Brian and Shawn sit down with Shawn's own son, Dylan King—a 21-year-old entrepreneur who’s shaking up the game. Dylan recently went all in and purchased a Superior Fence & Rail franchise with his brother, making bold moves and big sacrifices at a young age. The crew dives into what it takes to take such a lea…
  continue reading
 
On the 25th episode of Enterprise AI Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal Security, talk with Joshua Brown, former Vice President and Chief Information Security Officer at H&R Block. H&R Block is one of the largest tax preparation companies in the United States, with tens of millions of customers relying on its…
  continue reading
 
In this episode of Breaking Badness, we dive into two major cybersecurity stories: the exploitation of a VPN vulnerability by Chinese APT 41 and the newly discovered “Wall Bleed” flaw in the Great Firewall of China.APT 41 has been using a critical VPN vulnerability to infiltrate operational technology (OT) organizations, targeting industries like a…
  continue reading
 
40% higher IT costs. Unpatched security gaps. Former employees still accessing company data. These are just a few of the risks businesses face when they don’t have a structured IT lifecycle strategy. Most organizations focus on cybersecurity tools but overlook the foundational issue: lifecycle management. Without a plan for tracking, securing, and …
  continue reading
 
287 days. That’s how long it takes—on average—to detect and contain a breach. Cybercriminals aren’t waiting for you to catch up. With automated attack methods and round-the-clock threats, small to mid-sized businesses (SMBs) can’t afford slow response times. Traditional security tools detect threats - but without automation, attackers have the uppe…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play