Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Artwork

1
Ctrl+Alt+Azure

Tobias Zimmergren, Jussi Roine

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
  continue reading
 
Artwork

1
Secure The Perimeter

Brent Canfield

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Hosted by Brent Canfield—a Christian, Marine, and successful business owner—Secure The Perimeter Podcast is your go-to resource for tackling the unique challenges of entrepreneurship. Designed for young and new entrepreneurs, this podcast provides practical solutions, actionable advice, and inspirational stories to help you build and grow your business with confidence. Drawing from his experiences as a Marine and a business leader, Brent combines discipline, faith, and a passion for service ...
  continue reading
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Artwork
 
A fascinating discussion of current national and international security issues. I interview experts on different subjects. More often than not, the discussion ends with a heated (but friendly) debate between me and my guest. So far we have covered issues ranging from the future of NATO, violence and law enforcement in Mexico, defense policy in Canada, the US and Mexico, North Korea, cybersecurity, organized crime, PUTIN, afghanistan... you name it we have covered it or will eventually do so. ...
  continue reading
 
The cybersecurity podcast about application security and those who practice it. Hosted by tech industry veterans Frank Catucci and Dan Murphy, AppSec Serialized by Invicti puts a new spin on the ”two guys talking” format by starting each episode with a security-themed fiction story in the style of old-time radio shows. Each episode focuses on a specific area of cybersecurity, with the hosts and their guests sharing their practitioners’ experiences and opinions, sprinkled liberally with a sol ...
  continue reading
 
ISNR is the only event in Europe that allows you to network and do business with high security end users and sector professionals. ISNR brings together government, public sector, police and emergency response, transport and critical national infrastructure stakeholders with commercial and private security organisations. This focused event delivers a unique opportunity to learn from a comprehensive seminar program and high-level, industry leading conference. Showcasing the complete range of t ...
  continue reading
 
Artwork

1
Enterprise AI Defenders

The AI in Enterprise Software Podcast Series

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Enterprise AI Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. The show is hosted by Evan Reiser, the CEO & founder of Abnormal AI, and Mike Britton, the CIO & CISO of Abnormal AI.
  continue reading
 
Artwork

1
PublicPowerX

American Public Power Association

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
PublicPowerX is the new podcast from the American Public Power Association where key vendors and service providers explain their role in keeping public power safe, reliable, and secure. Subscribe to this feed to get these stories from public power’s service providers as they become available. If you are a company that does business with public power utilities and would like to host an episode of Public Power X, go to publicpower.org/podcasts to learn more.
  continue reading
 
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episod ...
  continue reading
 
Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.
  continue reading
 
Interarbor Solutions' Briefings Direct: Unique B2B informational podcasts that offer the value of objective perspectives from leading industry analyst Dana Gardner. Briefings Direct delivers actionable knowledge on the latest enterprise IT subjects to those who need to know the most about the business of IT now.
  continue reading
 
Artwork

1
The Mix Zone

Infront Lab

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to the Mix Zone by Infront Lab, a podcast that is all about sports technology and innovation. Join our host Merav Savir for candid chats with tech and sports leaders from around the globe, discussing the newest technologies, products, trends, business models, the innovation process and the do's and don'ts of the business.
  continue reading
 
Expanding Your Horizon is the ultimate destination for business and technology enthusiasts who want to stay ahead of the curve. Join us as we explore the latest trends, innovations, and strategies in the world of business and technology. Our expert guests share their insights, experiences, and knowledge on a variety of topics, from digital transformation and entrepreneurship to leadership and innovation. Whether you’re an entrepreneur, executive, or simply curious about the intersection of b ...
  continue reading
 
Loading …
show series
 
Learn how 3B Protection is redefining perimeter security with its innovative smart perimeter solutions and advanced line of sight engineering technology. The speakers will walk you through real-world applications, system capabilities, and how 3B’s customizable solutions can meet your site-specific needs—without breaking your budget. You will discov…
  continue reading
 
🎙️ Episode Title: Top Strategies to Streamline Business Operations and Boost Productivity Hosted by Brent Canfield—a Christian, Marine, and seasoned business owner—Secure, The Perimeter Podcast is dedicated to helping young and aspiring entrepreneurs navigate the real-world challenges of starting and growing a business. In this episode, “Top Strate…
  continue reading
 
What if Zero Trust isn’t a framework, but the only viable cybersecurity strategy—more about people than products? In this episode, George Finney, CISO at the University of Texas System and author of Project Zero Trust, reveals the human-first truth behind the Zero Trust movement, and why it’s not something you buy but something you build. George sh…
  continue reading
 
Welcome to a special RSAC 2025 episode of the Breaking Badness Cybersecurity Podcast!Today, we delve into the critical role of domains in modern cyber attacks. From sophisticated nation-state operations to AI-powered phishing kits and malicious browser extensions, domains are the foundational infrastructure for threat actors. Host Kali Fencl is joi…
  continue reading
 
The future of generative AI might very well be agentic workloads. Fresh from Build 2025, we take a look at Agent IDs in Entra ID. What are they, and why would even need to know how they work? What's the difference from Enterprise Applications? We consider compliance, reporting, licensing and other aspects on Agent IDs. (00:00) - Intro and catching …
  continue reading
 
You won’t be replaced by AI—you’ll be replaced by someone using it better. Returning guest Marco Figueroa is back with a frontline report on the AI agent boom. This isn’t a prediction—it’s a tactical update from someone tracking every release, every benchmark battle, and every edge worth chasing. In this episode, Ron is joined by Marco as he breaks…
  continue reading
 
In this episode of Breaking Badness, we sit down with Raji Vannianathan, a cybersecurity leader at Microsoft driving the charge on AI security and safety. Raji shares her experience leading the team responsible for managing the end-to-end lifecycle of AI vulnerability disclosures, building proactive safety frameworks, and cultivating a global commu…
  continue reading
 
Today, we're taking an initial look at Azure Service Groups. We're already familiar with Resource Groups and have discussed Management Groups and governance in general in previous episodes over the years. Service Groups provide a new approach to governing and managing your resources operationally. We'll share our thoughts on governance, this new ca…
  continue reading
 
On the 28th episode of Enterprise AI Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal AI, talk with Rob Nolan, Vice President and Chief Information Security Officer at Expeditors. Expeditors is a Fortune 500 freight and logistics company, powering over 25% of all U.S. customs clearance. They enable global trade and supply …
  continue reading
 
Most people think red teaming is digital—until someone bypasses your locks, plants a Raspberry Pi in your server room, and walks out with your data. That’s not sci-fi. That’s White Knight Labs. In this episode, Ron talks with Greg Hatcher and John Stigerwalt, co-founders of White Knight Labs, a boutique offensive security firm built on real-world a…
  continue reading
 
* NOTE: It seems like Microsoft Teams recording messed up big time. This episode has an audio distortion issue around the 16-minute to 20-minute mark. Apologies! * This week, we'll have our initial reflections and thoughts from major Microsoft Build 2025 announcements. What caught our eye? It's AI all the way, but we find other aspects as well. Tob…
  continue reading
 
What if fixing cybersecurity wasn’t about more tools, but about unlocking human potential? In this episode, Ron Eddings welcomes back David Shipley, CEO and Field CSO of Beauceron Security, for a conversation on the real force behind security resilience: people. Together they expose the failure of "reactive" cybersecurity strategies, drawing parall…
  continue reading
 
In this episode of the Secure the Perimeter podcast, host Brent Canfield interviews entrepreneur Eddie Wilson, who shares his journey from military service to becoming a successful business leader. They discuss the importance of personal growth, financial awareness, and the five phases of business growth. Eddie emphasizes the significance of leader…
  continue reading
 
This week, we'll tackle the basics of Azure AI Foundry. First, we'll talk about what it is and who it aims for. We will also walk you through the options and capabilities, like reviewing models, fine-tuning, and managing your data and indexes. We'll also consider the different aspects of building your apps before wrapping up with considerations on …
  continue reading
 
In this episode of Breaking Badness, Kali Fencl sits down with Mick Baccio, Global SecurityAdvisor at Splunk and former CISO for Pete Buttigieg’s 2020 presidential campaign. Mickshares his journey from aspiring Navy nuclear engineer to leading security in some of thehighest-stakes environments, including the White House.They explore how threat inte…
  continue reading
 
Still tracking certificates in a spreadsheet? You’re not alone—and there’s a better way. In this special episode from RSA 2025, Ron sits down with Michael Klieman, Global Vice President of Product Management for Digital Security Solutions at Entrust, to discuss how leading organizations are rethinking cryptographic security. From simplifying certif…
  continue reading
 
In this episode of Breaking Badness, we sit down with John Donovan of ZEDEDA to unpack thelighter and more profound sides of cybersecurity’s biggest gatherings. From RSA’s unexpectedbaby goats and vendor booth antics to BSides San Francisco’s community-driven keynotestage, John shares personal stories, industry insights, and valuable advice on how …
  continue reading
 
In this week's episode, we ponder what to expect from Microsoft Build 2025. Is it worth traveling to Seattle for the event, that takes place May 19-22? We reflect on the possible announcements, the breakout session topics, as well as the keynotes. (00:00) - Intro and catching up. (04:56) - Show content starts. Show links - Microsoft Build 2025 - DE…
  continue reading
 
In this episode of Breaking Badness, the crew investigates two escalating threats in the cybercrime ecosystem: the cleverly named phishing-as-a-service platform Morphing Meerkat, and the bulletproof hosting provider Proton66, a favorite among amateur cybercriminals.First, they dig into how Morphing Meerkat uses DNS-over-HTTPS (DoH) and clever phish…
  continue reading
 
This week, we take a look at Azure Review Checklists. Relatively unbeknownst to us, this interesting capability allows you to really supercharge the reviews on your Azure environments! (00:00) - Intro and catching up. (03:03) - Show content starts. Show links - Azure Review Checklists - Azure Resource Inventory - Give us feedback!…
  continue reading
 
We sit down with Nur Bernhardt, Vice President at Cloverleaf Infrastructure, to explore how public utilities can collaborate with Cloverleaf to attract new large loads. We’ll dive into the surging electricity demand driven by AI-powered data centers, the challenges and opportunities for utilities, and the critical role of grid infrastructure in sha…
  continue reading
 
AI is reshaping the cybersecurity battlefield, and cyber adversaries are getting smarter. In this episode, Ron Eddings welcomes Andrey Suzdaltsev, Co-Founder and CEO of Brightside AI, for a look into the evolution of social engineering, AI’s role in personalized phishing, and how Brightside is turning the tables with automation and human-centric pr…
  continue reading
 
Success in business doesn't happen by luck—it’s built on mastering the right fundamentals. In this episode, we break down the essential factors every entrepreneur must focus on to grow, scale, and thrive in today’s competitive landscape. Whether you're just starting out or looking to level up your game, these core principles will help guide your wa…
  continue reading
 
In this powerful continuation of our DFIR series, cybersecurity experts Daniel Schwalbe, DavidBianco, Lesley Carhart, and Sarah Sabotka dissect the heart of effective incident response,containment, eradication, recovery, and lessons learned. Packed with firsthand war stories,sharp tactical advice, and honest debates, this episode is a must-listen f…
  continue reading
 
On the 27th episode of Enterprise AI Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal AI, talk with Gareth Packham, Chief Information Security Officer at Save the Children International. Save the Children is one of the world's largest nonprofit organizations focused on protecting the rights and well-being of children. Oper…
  continue reading
 
In this week's episode, we look at recent Microsoft Tech updates. By popular request, we're expanding the scope beyond just Azure to include Microsoft 365, Power Platform, and similar Microsoft platforms and capabilities. What's new? What's interesting? What's retiring? (00:00) - Intro and catching up. (03:45) - Show content starts. Show links - Wh…
  continue reading
 
In Part 1 of this special two-part panel, the Breaking Badness podcast gathers leadingcybersecurity experts to explore the foundations of DFIR - Digital Forensics and IncidentResponse. Featuring Daniel Schwalbe (DomainTools), Lesley Carhart (Dragos), David Bianco(Splunk), and Sarah Sabotka (Proofpoint), the panel dives into what makes an effective …
  continue reading
 
This week, we're revisiting GitHub Copilot. We talked about it a few years ago, when it was fresh. Has anything changed? How are we using it? Prepare to be blown away by one specific capability now in preview. (00:00) - Intro and catching up. (03:38) - Show content starts. Show links - GitHub Copilot - Visual Studio Code Insiders - Agent mode in Gi…
  continue reading
 
Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
  continue reading
 
Passwords are the original digital clutter—messy, overstuffed, and way too easy to forget. Like a junk drawer full of old keys and cables, we keep tossing more into them, hoping they’ll somehow keep working. But what if it’s time to throw the whole thing out? In this episode, Ron Eddings is joined by Collin Sweeney of ZKX Solutions and Dr. Chase Cu…
  continue reading
 
Are you feeling the heat from competitors in your industry? This video breaks down strategic ways to handle business competition and turn it into a growth opportunity. Whether you're a startup founder, small business owner, or an entrepreneur looking to sharpen your edge, these insights will help you stay ahead.…
  continue reading
 
In this episode of Breaking Badness, host Kali Fencl is joined by DomainTools' Daniel Schwabeand disinformation expert Scot Terban to uncover how modern Russian disinformationcampaigns are using domain registrars, homoglyph attacks, and generative AI to mimiclegitimate news outlets and manipulate public perception. From the eerie sophistication ofD…
  continue reading
 
This week, we'll talk about services that are being deprecated, and what to think of that. How to best prepare when you get an announcement that something is going away? What are the business perspective, and the perspectives on security? (00:00) - Intro and catching up. (03:57) - Show content starts. Show links - Entra Permissions Management retir…
  continue reading
 
What if the biggest threat to cybersecurity isn’t attackers—but the defenders themselves? Why are we still building tools for experts in a world where technical skills are fading fast? In this episode, Ron Eddings sits down with legendary hacker and investor Robert Hansen (aka RSnake) to talk about startup strategy, LLM-powered workflows, and the u…
  continue reading
 
This week, we look at Network Security Perimeter, which is currently in public preview. It's a nifty capability for controlling inbound and outbound traffic for your PaaS resources. (00:00) - Intro and catching up. (05:01) - Show content starts. Show links - Creating a network security perimeter in the Azure Portal - Tobias' device: ZTE U50, 5G Por…
  continue reading
 
On the 26th episode of Enterprise AI Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal Security, talk with Kirsten Davies, former Chief Information Security Officer at The Estée Lauder Companies and Unilever and founder of The Institute for Cyber. Kirsten's storied career has given her a front-row seat to understanding the …
  continue reading
 
In this special DNS Masterclass episode of Breaking Badness, hosts Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce take a deep dive into the Domain Name System often dubbed the backbone and battleground of the internet. From its humble beginnings with host files to its critical role in modern security, the episode unpacks DNS’s evolution, vulnera…
  continue reading
 
Is safeguarding your critical infrastructure and utility assets a top priority? In an era of increasing threats, understanding vulnerabilities and implementing robust security measures are no longer optional—they are essential. This comprehensive session will give you actionable insights into two pivotal tools in modern physical security planning: …
  continue reading
 
The internet once came this close to crashing—and Microsoft was on the front line. In this episode, cybersecurity veteran Christopher Budd takes us inside the Microsoft Security Response Center during one of the most chaotic cyber events in modern history. From the Nimda worm of 2001 to ransomware turf wars, and the weird future where threat actors…
  continue reading
 
This week, we're considering when and how to use Azure Firewall in your deployments. What are the features, SKUs, and capabilities? When should you choose Azure Firewall, and when should you choose something else? Considerations on enterprise architectures also. (00:00) - Intro and catching up. (02:59) - Show content starts. Show links - Azure Fire…
  continue reading
 
In this episode, we introduce Fence Social, the game-changing networking platform built exclusively for the fence and gate industry. Whether you’re a contractor, supplier, or manufacturer, Fence Social connects you with the people and opportunities that can grow your business. Plus, we’re talking about the platform’s FREE business card scanning too…
  continue reading
 
Brian catches up with Rowdy from NW Quikpull while he's in town for the American Rental Association (ARA) show. The conversation goes off the rails as Rowdy throws some shade and calls Susan a muppet (all in good fun, of course). The two also dive into how they managed to survive life before they got married, plus a few laughs about business, life …
  continue reading
 
Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
  continue reading
 
In this episode of Breaking Badness, host Kali Fencl welcomes Wes Young of CSIRT Gadgets and Daniel Schwalbe, CISO and head of investigations at DomainTools, dive into a recent DomainTools Investigations (DTI) analysis involving ValleyRAT and Silver Fox, and how new tools are enabling faster, more accessible analysis for junior and seasoned analyst…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play