Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Protection Encryption Podcasts

show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
  continue reading
 
Artwork

1
Scams, Hacks and Frauds

Cee | Host of Scams, Hacks and Frauds.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
10 Minutes could save your wallet! In Scams, Hacks, and Frauds, we delve into true crime stories involving real scams, hacks, and frauds. Each episode seeks to uncover the methods behind scams and provide listeners with essential tips to protect themselves and their loved ones from falling victim to fraud.
  continue reading
 
Artwork

1
The Cyber Cookie

CommSec Communications and Security Limited

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
  continue reading
 
Artwork

1
govtech.com Security News Podcast

Ira Victor with Samantha Stone

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
  continue reading
 
Artwork

1
Trail of Bits

Trail of Bits

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
  continue reading
 
Artwork

1
The Is My Brand Protected? Podcast

AMD LAW Group: Brand Protection Lawyers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is a podcast about innovation, game-changing, up-leveling and trailblazing business concepts and trends mostly technology focused. We discuss current events, news and provide interviews all centered on answering the crucial question, IS MY BRAND PROTECTED? Listening to this podcast is NOT to be construed as LEGAL ADVICE. Sometimes we do not discuss legal topics at all, sometimes we just chat about innovation but we are lawyers. We may help you realize that you really need to seek profes ...
  continue reading
 
Artwork

1
From the Crows' Nest

Association of Old Crows

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Featuring interviews, analysis, and discussions covering leading issues of the day related to electromagnetic spectrum operations (EMSO). Topics include current events and news worldwide, US Congress and the annual defense budget, and military news from the US and allied countries. We also bring you closer to Association of Old Crow events and provide a forum to dive deeper into policy issues impacting our community.
  continue reading
 
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
  continue reading
 
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
  continue reading
 
Pi42 is an emerging cryptocurrency exchange that has gained attention for its user-friendly interface, strong security measures, and competitive trading fees. One of the key advantages of Pi42 is its low fees, which make it attractive to both beginner and experienced traders alike. But what if you could reduce those fees even further? By using the Pi42 referral code “QKJ013”, you can enjoy a 20% discount on trading fees, giving you even more value from the platform. In this article, we will ...
  continue reading
 
In the world of stock trading, finding a platform that offers both ease of use and robust features is key to success. Dhan App is one such platform designed for individuals and traders who want to experience seamless trading, from equities to futures and options. If you're a newcomer or an experienced trader, Dhan App provides a wide range of tools to meet your needs. By using the Dhan App Referral Code "ASAR14", you can unlock a 500 Rs bonus to kickstart your trading journey. This article w ...
  continue reading
 
Introduction: Cryptocurrency mining can be an exciting and profitable venture, but it often comes with challenges like high initial investment, maintenance of equipment, and expensive electricity costs. Gomining has revolutionized the mining process by offering cloud mining services, which allow users to mine Bitcoin (BTC), Ethereum (ETH), and other cryptocurrencies without the need for heavy investments in mining hardware. Additionally, with Gomining Promo Code “q01MI”, you can enjoy a 10% ...
  continue reading
 
The Agenda podcast explores the promises of crypto, blockchain and Web3, and how everyday people level up and improve their lives with these new technologies. It covers everything from new blockchain tech to Bitcoin mass adoption and cultural shifts in Web3. Every two weeks, Cointelegraph’s The Agenda podcast tackles a new topic by speaking with the innovators and experts building the Web3 the world actually needs. After all, crypto is for everyone, not just rocket scientists, venture capita ...
  continue reading
 
Bitunix Referral Code: TOPTOP – Unlock Up to 5,500 USDT Bonus + 50% Trading Fee Discount Looking for a powerful crypto trading platform that offers real rewards? Bitunix is your gateway to smart trading in 2025. Whether you're new to crypto or already trading daily, Bitunix combines speed, security, and high-value bonuses to help you get ahead. By using the exclusive Bitunix referral code: TOPTOP, you’ll unlock up to 5,500 USDT in bonuses and receive a 50% discount on trading fees—making it ...
  continue reading
 
In the dynamic world of cryptocurrency trading, Blofin has emerged as one of the leading platforms for traders of all levels. Whether you’re a seasoned trader looking for advanced tools or a beginner wanting a user-friendly interface, Blofin has something to offer. If you’re looking to get the most out of your trading experience, using the Blofin Referral Code ”mNbmMf” will give you instant access to valuable rewards. By signing up with this referral code, new users can enjoy an immediate $9 ...
  continue reading
 
If you're an avid cryptocurrency trader or someone just getting started, you understand that fees can quickly eat into your profits. Fortunately, Axiom Trade offers a solution with its Axiom Trade Invite Code "kickback", which allows users to save 15% on trading fees. Whether you're making your first trade or you're a seasoned trader, using the referral code ensures that you can keep more of your profits. This article will explain how you can take advantage of this offer, why Axiom Trade is ...
  continue reading
 
In today’s dynamic cryptocurrency market, selecting the right exchange is crucial for maximizing profits and ensuring a seamless trading experience. CoinW has quickly become one of the top cryptocurrency exchanges due to its low fees, high liquidity, and user-friendly interface. By signing up using the CoinW Referral Code "1300362", you can unlock up to $1,000 in bonuses, benefit from reduced trading fees, and earn lifetime commissions from your referrals. This article will provide an in-dep ...
  continue reading
 
Introduction: Discover the Power of Poloniex for Crypto Trading The world of cryptocurrency is filled with opportunities, but it’s essential to choose the right exchange platform to maximize your profits and trading potential. Poloniex has firmly established itself as one of the most popular and reliable exchanges in the industry, offering an array of features that cater to both beginner and advanced traders. Poloniex offers a seamless trading experience, low fees, and a wide variety of digi ...
  continue reading
 
As the world of cryptocurrency continues to grow, more traders are diving into digital assets like Bitcoin (BTC), Ethereum (ETH), and a variety of altcoins. While the opportunities for profit are vast, the high transaction fees associated with many cryptocurrency exchanges can significantly erode potential gains. Fortunately, KCEX, a leading cryptocurrency exchange, offers a solution by providing low trading fees and high security. And, with the KCEX Invite Code "DISCOUNT", you can unlock an ...
  continue reading
 
Cryptocurrency trading continues to expand globally, offering new opportunities for individuals to profit from the ever-evolving market. As the demand for digital assets rises, selecting the right trading platform becomes critical for success. Phemex has rapidly emerged as a top cryptocurrency exchange known for its low fees, advanced trading features, and a wide selection of cryptocurrencies. By signing up using the Phemex Invitation Code "BVBE73", new users can unlock up to $8,800 in tradi ...
  continue reading
 
Loading …
show series
 
In mid-September, in Lviv, Ukraine, the second annual Defense Tech Summit was held with representatives from over 50 countries in attendance. A policy shift from the Trump administration in support of Ukraine signals new focus on ending the Russia-Ukraine War that is now approaching four years. The two-year war continues between Israel and Hamas in…
  continue reading
 
Cisco's routers just exposed more than two million networks thanks to a "security optional" SNMP setup that's being actively exploited—Steve and Leo break down why this is a worst-case scenario for the industry and how easily it could have been avoided. Gmail's spam filtering false-positive spree. iOS 26's Safari randomizes its fingerprint by defau…
  continue reading
 
Cisco's routers just exposed more than two million networks thanks to a "security optional" SNMP setup that's being actively exploited—Steve and Leo break down why this is a worst-case scenario for the industry and how easily it could have been avoided. Gmail's spam filtering false-positive spree. iOS 26's Safari randomizes its fingerprint by defau…
  continue reading
 
Today we’re talking about something that may sound government-heavy but is actually critical for MSPs and the SMBs they serve: the new NIST Small Business Primer for SP 800-171 Rev. 3. At its core, this guide is about protecting Controlled Unclassified Information, or CUI. And while that might sound like it only applies to defense contractors, the …
  continue reading
 
This week on Scams, Hacks, and Frauds, we unravel the web of deceit spun by Marianne Smith, a seemingly ordinary woman who became a master con artist. s we delve deeper into Marianne's life, we discover her connection with Jonathan, a television producer who unknowingly became embroiled in her schemes. Their friendship led to a series of shocking r…
  continue reading
 
Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ | Mario Zaki - https://www.mazteck.com/ Small businesses making under $500K are the #1 target for ADA website compliance lawsuits - and most business owners have never heard of this threat. In this eye-opening episode, Justin and Mario break down the "digital ambulance chasing" epidemic tha…
  continue reading
 
In this episode of From the Crows’ Nest, host Ken Miller looks at innovation in EMSO and how ideas get from whiteboard to the battlefield through a new lens: science fiction. Lisa Yaszek, Regents Professor of Science Fiction Studies at Georgia Tech, tells host Ken Miller that scientists are indebted to science fiction writers, as the genre gives pe…
  continue reading
 
Consumer Reports on Windows 10 updates. Waste (not fraud or abuse) within DoD Cyberoperations. China's DeepSeek produces deliberately flawed code. WebAssembly v3.0 officially released. Firefox v143 updates and new features. Firefox for Android now offers DoH. A nearly terminal flaw in Microsoft's Entra ID. Chrome hits its 6th 0-day this year. Emerg…
  continue reading
 
Consumer Reports on Windows 10 updates. Waste (not fraud or abuse) within DoD Cyberoperations. China's DeepSeek produces deliberately flawed code. WebAssembly v3.0 officially released. Firefox v143 updates and new features. Firefox for Android now offers DoH. A nearly terminal flaw in Microsoft's Entra ID. Chrome hits its 6th 0-day this year. Emerg…
  continue reading
 
Today we’re tackling microsegmentation—a solution that could change the game against ransomware. Ransomware thrives on lateral movement: one compromised device turns into an entire network takedown. Microsegmentation stops that by creating secure ‘neighborhoods’ inside the network, containing the damage before it spreads. The big questions: can MSP…
  continue reading
 
Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Mario Zaki - https://www.mazteck.com/ Nevada's state government has been crippled by ransomware for nearly a month with most systems still down - and it's a wake-up call every business owner needs to hear. In this eye-opening episode, Justin and Mario dissect what makes some organizations r…
  continue reading
 
In this episode, host Ken Miller is joined by friend and colleague Tom Withington, award-winning editor, defense journalist, and expert with Armada International. Ken and Tom discuss the latest developments in the Russo-Ukrainian War with a special focus on the recent Russian drone incursion into Poland and what it means for all of NATO. They also …
  continue reading
 
Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde schoo…
  continue reading
 
Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde schoo…
  continue reading
 
Over the past couple of days, I was digging into the latest Anthropic Threat Report and one section really hit me. They wrote: ‘We’ve developed sophisticated safety and security measures to prevent misuse of our AI models. While generally effective, cybercriminals keep finding ways around them.’ And then they shared some eye-opening case studies—th…
  continue reading
 
After decades of being the purview of world governments, space operations have exploded in commercial and civilian necessity in recent years. Commercial satellites have increased 7 fold over the last 15 years and now total more than 10,000. Space capabilities are central to nearly every operational concept and military mission, not to mention every…
  continue reading
 
Is the U.S. on the verge of legalizing "hack back" missions, turning private companies into sanctioned cyber warriors? Steve and Leo unpack Google's plan for a cyber disruption unit and why the lines between defense and digital retaliation are suddenly blurring. My experience with 'X' vs email. Google TIG blackmailed to fire two security researcher…
  continue reading
 
Is the U.S. on the verge of legalizing "hack back" missions, turning private companies into sanctioned cyber warriors? Steve and Leo unpack Google's plan for a cyber disruption unit and why the lines between defense and digital retaliation are suddenly blurring. My experience with 'X' vs email. Google TIG blackmailed to fire two security researcher…
  continue reading
 
In this session we talk about Salesloft Drift and the implications of OAuth based attacks. Companies use Drift with Salesloft to automate lead capture + sales workflows into Salesforce.com. Enter Nation State threat actor UNC6395, who was able to steal the tokens and gain a backdoor into Salesforce via these OAuth tokens. We then dive into the Evol…
  continue reading
 
This week on Scams, Hacks, and Frauds, we dive into the alarming rise of QR code scams that are turning a once-innovative technology into a tool for fraud. Remember when QR codes were heralded as the future of convenience? Unfortunately, they have now become a gateway for scammers to exploit unsuspecting victims. Join us as we recount the cautionar…
  continue reading
 
When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a loo…
  continue reading
 
When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a loo…
  continue reading
 
In this episode, KJ Burke and Qaiser Habib, head of engineering, Canada at Snowflake, discuss the challenges and strategies for unlocking the power of data within organizations. They explore the evolution of data management, the changing role of IT teams, the importance of data quality, and the shift towards unstructured data. The conversation also…
  continue reading
 
Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ | Mario Zaki - https://www.mazteck.com/ | Bryan Lachapelle - https://www.b4networks.ca/ Guest: Grant McCracken - https://darkhorse.sh What if the best way to secure your business was to invite hackers to attack it? In this eye-opening episode, ethical hacker Grant McCracken reveals how bug …
  continue reading
 
This week on Scams, Hacks, and Frauds, we uncover the heart-wrenching reality of romance scams, where love can lead to devastating financial loss. Join us as we share the true story of Alison Peters, a British grandmother who fell victim to a fraudulent relationship, losing a staggering £120,000 to a man she believed was her soulmate. Alison's jour…
  continue reading
 
Innovation is a buzzword to showcase game-changing technologies and capabilities. But how do you get the people’s attention to consider the possibilities, risks, and opportunities? How do you raise awareness to move innovative ideas from the mind to the lab and to the field, not to mention the average household? So much innovation is downstream fro…
  continue reading
 
Alarm bells are ringing over a supposed browser zero-day, but is the threat as bad as it sounds? Steve reveals why "clickjacking" might be more whac-a-mole than breaking news, and what that really means for your passwords. • Germany may soon outlaw ad blockers • What's happening in the courts over AI • The U.K. drops its demands of Apple • New Micr…
  continue reading
 
Alarm bells are ringing over a supposed browser zero-day, but is the threat as bad as it sounds? Steve reveals why "clickjacking" might be more whac-a-mole than breaking news, and what that really means for your passwords. • Germany may soon outlaw ad blockers • What's happening in the courts over AI • The U.K. drops its demands of Apple • New Micr…
  continue reading
 
Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ | Mario Zaki - https://www.mazteck.com/ Guest: Robert Cioffi - https://www.patreon.com/CyberRISE and https://cyberrise.org/ In July 2021, Robert Cioffi's MSP business was completely destroyed in 90 minutes. 80 clients, 200 locations, 2,500 endpoints - 100% encrypted by ransomware through a …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play