Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Protection Encryption Podcasts
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Scramblex.com has released a free encryption service that will protect sensitive data from unauthorised access and the potential for identity or financial theft.
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading

1
Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.
Craig Petronella
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
…
continue reading
10 Minutes could save your wallet! In Scams, Hacks, and Frauds, we delve into true crime stories involving real scams, hacks, and frauds. Each episode seeks to uncover the methods behind scams and provide listeners with essential tips to protect themselves and their loved ones from falling victim to fraud.
…
continue reading
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
…
continue reading
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
…
continue reading
This is a podcast about innovation, game-changing, up-leveling and trailblazing business concepts and trends mostly technology focused. We discuss current events, news and provide interviews all centered on answering the crucial question, IS MY BRAND PROTECTED? Listening to this podcast is NOT to be construed as LEGAL ADVICE. Sometimes we do not discuss legal topics at all, sometimes we just chat about innovation but we are lawyers. We may help you realize that you really need to seek profes ...
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
Featuring interviews, analysis, and discussions covering leading issues of the day related to electromagnetic spectrum operations (EMSO). Topics include current events and news worldwide, US Congress and the annual defense budget, and military news from the US and allied countries. We also bring you closer to Association of Old Crow events and provide a forum to dive deeper into policy issues impacting our community.
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
…
continue reading
Pi42 is an emerging cryptocurrency exchange that has gained attention for its user-friendly interface, strong security measures, and competitive trading fees. One of the key advantages of Pi42 is its low fees, which make it attractive to both beginner and experienced traders alike. But what if you could reduce those fees even further? By using the Pi42 referral code “QKJ013”, you can enjoy a 20% discount on trading fees, giving you even more value from the platform. In this article, we will ...
…
continue reading
In the world of stock trading, finding a platform that offers both ease of use and robust features is key to success. Dhan App is one such platform designed for individuals and traders who want to experience seamless trading, from equities to futures and options. If you're a newcomer or an experienced trader, Dhan App provides a wide range of tools to meet your needs. By using the Dhan App Referral Code "ASAR14", you can unlock a 500 Rs bonus to kickstart your trading journey. This article w ...
…
continue reading
Introduction: Cryptocurrency mining can be an exciting and profitable venture, but it often comes with challenges like high initial investment, maintenance of equipment, and expensive electricity costs. Gomining has revolutionized the mining process by offering cloud mining services, which allow users to mine Bitcoin (BTC), Ethereum (ETH), and other cryptocurrencies without the need for heavy investments in mining hardware. Additionally, with Gomining Promo Code “q01MI”, you can enjoy a 10% ...
…
continue reading
The Agenda podcast explores the promises of crypto, blockchain and Web3, and how everyday people level up and improve their lives with these new technologies. It covers everything from new blockchain tech to Bitcoin mass adoption and cultural shifts in Web3. Every two weeks, Cointelegraph’s The Agenda podcast tackles a new topic by speaking with the innovators and experts building the Web3 the world actually needs. After all, crypto is for everyone, not just rocket scientists, venture capita ...
…
continue reading
Bitunix Referral Code: TOPTOP – Unlock Up to 5,500 USDT Bonus + 50% Trading Fee Discount Looking for a powerful crypto trading platform that offers real rewards? Bitunix is your gateway to smart trading in 2025. Whether you're new to crypto or already trading daily, Bitunix combines speed, security, and high-value bonuses to help you get ahead. By using the exclusive Bitunix referral code: TOPTOP, you’ll unlock up to 5,500 USDT in bonuses and receive a 50% discount on trading fees—making it ...
…
continue reading

1
Blofin Referral Code ”mNbmMf” 2025: Get $99 Bonus + 35% Cashback Instantly | Blofin Promo Code
helpwf
In the dynamic world of cryptocurrency trading, Blofin has emerged as one of the leading platforms for traders of all levels. Whether you’re a seasoned trader looking for advanced tools or a beginner wanting a user-friendly interface, Blofin has something to offer. If you’re looking to get the most out of your trading experience, using the Blofin Referral Code ”mNbmMf” will give you instant access to valuable rewards. By signing up with this referral code, new users can enjoy an immediate $9 ...
…
continue reading

1
Axiom Trade Invite Code: ”kickback” – Save 15% on Trading Fees and Maximize Your Profits
shaileshs
If you're an avid cryptocurrency trader or someone just getting started, you understand that fees can quickly eat into your profits. Fortunately, Axiom Trade offers a solution with its Axiom Trade Invite Code "kickback", which allows users to save 15% on trading fees. Whether you're making your first trade or you're a seasoned trader, using the referral code ensures that you can keep more of your profits. This article will explain how you can take advantage of this offer, why Axiom Trade is ...
…
continue reading
In today’s dynamic cryptocurrency market, selecting the right exchange is crucial for maximizing profits and ensuring a seamless trading experience. CoinW has quickly become one of the top cryptocurrency exchanges due to its low fees, high liquidity, and user-friendly interface. By signing up using the CoinW Referral Code "1300362", you can unlock up to $1,000 in bonuses, benefit from reduced trading fees, and earn lifetime commissions from your referrals. This article will provide an in-dep ...
…
continue reading
Introduction: Discover the Power of Poloniex for Crypto Trading The world of cryptocurrency is filled with opportunities, but it’s essential to choose the right exchange platform to maximize your profits and trading potential. Poloniex has firmly established itself as one of the most popular and reliable exchanges in the industry, offering an array of features that cater to both beginner and advanced traders. Poloniex offers a seamless trading experience, low fees, and a wide variety of digi ...
…
continue reading
As the world of cryptocurrency continues to grow, more traders are diving into digital assets like Bitcoin (BTC), Ethereum (ETH), and a variety of altcoins. While the opportunities for profit are vast, the high transaction fees associated with many cryptocurrency exchanges can significantly erode potential gains. Fortunately, KCEX, a leading cryptocurrency exchange, offers a solution by providing low trading fees and high security. And, with the KCEX Invite Code "DISCOUNT", you can unlock an ...
…
continue reading
Cryptocurrency trading continues to expand globally, offering new opportunities for individuals to profit from the ever-evolving market. As the demand for digital assets rises, selecting the right trading platform becomes critical for success. Phemex has rapidly emerged as a top cryptocurrency exchange known for its low fees, advanced trading features, and a wide selection of cryptocurrencies. By signing up using the Phemex Invitation Code "BVBE73", new users can unlock up to $8,800 in tradi ...
…
continue reading

1
Reading the Tea Leaves in a Chaotic Global Security Environment
38:04
38:04
Play later
Play later
Lists
Like
Liked
38:04In mid-September, in Lviv, Ukraine, the second annual Defense Tech Summit was held with representatives from over 50 countries in attendance. A policy shift from the Trump administration in support of Ukraine signals new focus on ending the Russia-Ukraine War that is now approaching four years. The two-year war continues between Israel and Hamas in…
…
continue reading

1
SN 1045: News and Listener Views - 2.3 Million Cisco Devices Exposed
2:49:39
2:49:39
Play later
Play later
Lists
Like
Liked
2:49:39Cisco's routers just exposed more than two million networks thanks to a "security optional" SNMP setup that's being actively exploited—Steve and Leo break down why this is a worst-case scenario for the industry and how easily it could have been avoided. Gmail's spam filtering false-positive spree. iOS 26's Safari randomizes its fingerprint by defau…
…
continue reading

1
SN 1045: News and Listener Views - 2.3 Million Cisco Devices Exposed
2:50:09
2:50:09
Play later
Play later
Lists
Like
Liked
2:50:09Cisco's routers just exposed more than two million networks thanks to a "security optional" SNMP setup that's being actively exploited—Steve and Leo break down why this is a worst-case scenario for the industry and how easily it could have been avoided. Gmail's spam filtering false-positive spree. iOS 26's Safari randomizes its fingerprint by defau…
…
continue reading

1
NIST Small Business Primer and Quick Start Guides
1:01:07
1:01:07
Play later
Play later
Lists
Like
Liked
1:01:07Today we’re talking about something that may sound government-heavy but is actually critical for MSPs and the SMBs they serve: the new NIST Small Business Primer for SP 800-171 Rev. 3. At its core, this guide is about protecting Controlled Unclassified Information, or CUI. And while that might sound like it only applies to defense contractors, the …
…
continue reading

1
Scam Queen Faces justice: Fraudster caught by TV producer
11:40
11:40
Play later
Play later
Lists
Like
Liked
11:40This week on Scams, Hacks, and Frauds, we unravel the web of deceit spun by Marianne Smith, a seemingly ordinary woman who became a master con artist. s we delve deeper into Marianne's life, we discover her connection with Jonathan, a television producer who unknowingly became embroiled in her schemes. Their friendship led to a series of shocking r…
…
continue reading

1
68. The ADA Website Lawsuit Trap That's Bankrupting Small Businesses
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ | Mario Zaki - https://www.mazteck.com/ Small businesses making under $500K are the #1 target for ADA website compliance lawsuits - and most business owners have never heard of this threat. In this eye-opening episode, Justin and Mario break down the "digital ambulance chasing" epidemic tha…
…
continue reading

1
How Science Fiction Informs and Inspires EMSO Innovation
55:11
55:11
Play later
Play later
Lists
Like
Liked
55:11In this episode of From the Crows’ Nest, host Ken Miller looks at innovation in EMSO and how ideas get from whiteboard to the battlefield through a new lens: science fiction. Lisa Yaszek, Regents Professor of Science Fiction Studies at Georgia Tech, tells host Ken Miller that scientists are indebted to science fiction writers, as the genre gives pe…
…
continue reading

1
SN 1044: The EU's Online Age Verification - Consumer Reports vs. Microsoft
3:01:26
3:01:26
Play later
Play later
Lists
Like
Liked
3:01:26Consumer Reports on Windows 10 updates. Waste (not fraud or abuse) within DoD Cyberoperations. China's DeepSeek produces deliberately flawed code. WebAssembly v3.0 officially released. Firefox v143 updates and new features. Firefox for Android now offers DoH. A nearly terminal flaw in Microsoft's Entra ID. Chrome hits its 6th 0-day this year. Emerg…
…
continue reading

1
SN 1044: The EU's Online Age Verification - Consumer Reports vs. Microsoft
3:01:26
3:01:26
Play later
Play later
Lists
Like
Liked
3:01:26Consumer Reports on Windows 10 updates. Waste (not fraud or abuse) within DoD Cyberoperations. China's DeepSeek produces deliberately flawed code. WebAssembly v3.0 officially released. Firefox v143 updates and new features. Firefox for Android now offers DoH. A nearly terminal flaw in Microsoft's Entra ID. Chrome hits its 6th 0-day this year. Emerg…
…
continue reading

1
Microsegmentation Demystified: What Every MSP & Client Should Know
1:03:02
1:03:02
Play later
Play later
Lists
Like
Liked
1:03:02Today we’re tackling microsegmentation—a solution that could change the game against ransomware. Ransomware thrives on lateral movement: one compromised device turns into an entire network takedown. Microsegmentation stops that by creating secure ‘neighborhoods’ inside the network, containing the damage before it spreads. The big questions: can MSP…
…
continue reading

1
67. The $10 Million Cybersecurity Mistake That Could Destroy Your Business Tomorrow
44:53
44:53
Play later
Play later
Lists
Like
Liked
44:53Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Mario Zaki - https://www.mazteck.com/ Nevada's state government has been crippled by ransomware for nearly a month with most systems still down - and it's a wake-up call every business owner needs to hear. In this eye-opening episode, Justin and Mario dissect what makes some organizations r…
…
continue reading

1
Making Sense of Russia’s Drone Incursion into Poland
33:32
33:32
Play later
Play later
Lists
Like
Liked
33:32In this episode, host Ken Miller is joined by friend and colleague Tom Withington, award-winning editor, defense journalist, and expert with Armada International. Ken and Tom discuss the latest developments in the Russo-Ukrainian War with a special focus on the recent Russian drone incursion into Poland and what it means for all of NATO. They also …
…
continue reading

1
SN 1043: Memory Integrity Enforcement - Crypto ATM Scam Epidemic
2:51:21
2:51:21
Play later
Play later
Lists
Like
Liked
2:51:21Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde schoo…
…
continue reading

1
SN 1043: Memory Integrity Enforcement - Crypto ATM Scam Epidemic
2:51:21
2:51:21
Play later
Play later
Lists
Like
Liked
2:51:21Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde schoo…
…
continue reading

1
AI’s Evolving Role in Attacks & Incident Reponse
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04Over the past couple of days, I was digging into the latest Anthropic Threat Report and one section really hit me. They wrote: ‘We’ve developed sophisticated safety and security measures to prevent misuse of our AI models. While generally effective, cybercriminals keep finding ways around them.’ And then they shared some eye-opening case studies—th…
…
continue reading
After decades of being the purview of world governments, space operations have exploded in commercial and civilian necessity in recent years. Commercial satellites have increased 7 fold over the last 15 years and now total more than 10,000. Space capabilities are central to nearly every operational concept and military mission, not to mention every…
…
continue reading

1
SN 1042: Letters of Marque - 1.1.1.1 Certificate Snafu
2:55:40
2:55:40
Play later
Play later
Lists
Like
Liked
2:55:40Is the U.S. on the verge of legalizing "hack back" missions, turning private companies into sanctioned cyber warriors? Steve and Leo unpack Google's plan for a cyber disruption unit and why the lines between defense and digital retaliation are suddenly blurring. My experience with 'X' vs email. Google TIG blackmailed to fire two security researcher…
…
continue reading

1
SN 1042: Letters of Marque - 1.1.1.1 Certificate Snafu
2:55:40
2:55:40
Play later
Play later
Lists
Like
Liked
2:55:40Is the U.S. on the verge of legalizing "hack back" missions, turning private companies into sanctioned cyber warriors? Steve and Leo unpack Google's plan for a cyber disruption unit and why the lines between defense and digital retaliation are suddenly blurring. My experience with 'X' vs email. Google TIG blackmailed to fire two security researcher…
…
continue reading

1
Encryption to Extortion, the Evolution of Cloud Based Attacks
1:02:02
1:02:02
Play later
Play later
Lists
Like
Liked
1:02:02In this session we talk about Salesloft Drift and the implications of OAuth based attacks. Companies use Drift with Salesloft to automate lead capture + sales workflows into Salesforce.com. Enter Nation State threat actor UNC6395, who was able to steal the tokens and gain a backdoor into Salesforce via these OAuth tokens. We then dive into the Evol…
…
continue reading

1
Scan or Scam? - Is that QR code setting you up to get scammed? (Scams, Hacks and Frauds)
9:17
9:17
Play later
Play later
Lists
Like
Liked
9:17This week on Scams, Hacks, and Frauds, we dive into the alarming rise of QR code scams that are turning a once-innovative technology into a tool for fraud. Remember when QR codes were heralded as the future of convenience? Unfortunately, they have now become a gateway for scammers to exploit unsuspecting victims. Join us as we recount the cautionar…
…
continue reading

1
Pi42 Referral Code “QKJ013” – Unlock 20% Discount on Trading Fees
2:36
2:36
Play later
Play later
Lists
Like
Liked
2:36Pi42 Referral Code “QKJ013” – Unlock 20% Discount on Trading FeesBy Pi42 Referral Code
…
continue reading

1
SN 1041: Covering All the Bases - SHAKEN Networks, Uncontrollable AI, and Robocall Reckoning
3:03:29
3:03:29
Play later
Play later
Lists
Like
Liked
3:03:29When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a loo…
…
continue reading

1
SN 1041: Covering All the Bases - SHAKEN Networks, Uncontrollable AI, and Robocall Reckoning
3:03:29
3:03:29
Play later
Play later
Lists
Like
Liked
3:03:29When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a loo…
…
continue reading

1
Dhan App Referral Code "ASAR14" – Get 500 Rs Bonus
2:36
2:36
Play later
Play later
Lists
Like
Liked
2:36Dhan App Referral Code "ASAR14" – Get 500 Rs BonusBy operationsa4
…
continue reading
In this episode, KJ Burke and Qaiser Habib, head of engineering, Canada at Snowflake, discuss the challenges and strategies for unlocking the power of data within organizations. They explore the evolution of data management, the changing role of IT teams, the importance of data quality, and the shift towards unstructured data. The conversation also…
…
continue reading

1
66. Turn Hackers Into Your Security Team - with Grant McCracken
42:42
42:42
Play later
Play later
Lists
Like
Liked
42:42Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ | Mario Zaki - https://www.mazteck.com/ | Bryan Lachapelle - https://www.b4networks.ca/ Guest: Grant McCracken - https://darkhorse.sh What if the best way to secure your business was to invite hackers to attack it? In this eye-opening episode, ethical hacker Grant McCracken reveals how bug …
…
continue reading

1
Love and Fraud: The Heartbreak of Romance Scams
9:15
9:15
Play later
Play later
Lists
Like
Liked
9:15This week on Scams, Hacks, and Frauds, we uncover the heart-wrenching reality of romance scams, where love can lead to devastating financial loss. Join us as we share the true story of Alison Peters, a British grandmother who fell victim to a fraudulent relationship, losing a staggering £120,000 to a man she believed was her soulmate. Alison's jour…
…
continue reading

1
"And Scene!"...Using Movies and Culture to Advance Innovation
46:54
46:54
Play later
Play later
Lists
Like
Liked
46:54Innovation is a buzzword to showcase game-changing technologies and capabilities. But how do you get the people’s attention to consider the possibilities, risks, and opportunities? How do you raise awareness to move innovative ideas from the mind to the lab and to the field, not to mention the average household? So much innovation is downstream fro…
…
continue reading

1
SN 1040: Clickjacking "Whac-A-Mole" - Inside the Password Manager Clickjacking Frenzy and What It Means
2:51:07
2:51:07
Play later
Play later
Lists
Like
Liked
2:51:07Alarm bells are ringing over a supposed browser zero-day, but is the threat as bad as it sounds? Steve reveals why "clickjacking" might be more whac-a-mole than breaking news, and what that really means for your passwords. • Germany may soon outlaw ad blockers • What's happening in the courts over AI • The U.K. drops its demands of Apple • New Micr…
…
continue reading

1
SN 1040: Clickjacking "Whac-A-Mole" - Inside the Password Manager Clickjacking Frenzy and What It Means
2:51:07
2:51:07
Play later
Play later
Lists
Like
Liked
2:51:07Alarm bells are ringing over a supposed browser zero-day, but is the threat as bad as it sounds? Steve reveals why "clickjacking" might be more whac-a-mole than breaking news, and what that really means for your passwords. • Germany may soon outlaw ad blockers • What's happening in the courts over AI • The U.K. drops its demands of Apple • New Micr…
…
continue reading

1
65. 80 Clients, 2,500 Computers, 100% Encrypted: A Survival Story Every CEO Needs to Hear - with Robert Cioffi
1:01:08
1:01:08
Play later
Play later
Lists
Like
Liked
1:01:08Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ | Mario Zaki - https://www.mazteck.com/ Guest: Robert Cioffi - https://www.patreon.com/CyberRISE and https://cyberrise.org/ In July 2021, Robert Cioffi's MSP business was completely destroyed in 90 minutes. 80 clients, 200 locations, 2,500 endpoints - 100% encrypted by ransomware through a …
…
continue reading

1
Axiom Trade Invite Code : (kickback) Save 15% Discount On Trading Fees | Axiom Trade Referral Code
2:36
2:36
Play later
Play later
Lists
Like
Liked
2:36Axiom Trade Invite Code : (kickback) Save 15% Discount On Trading Fees | Axiom Trade Referral CodeBy shaileshs
…
continue reading