Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
Brian Duff, host of the Mind 4 Survival prepping podcast, helps preparedness minded people be more safe, confident and prepared so they can better protect themselves, their families, and loved ones when it matters most.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton, Chuck Randolph, and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you sec ...
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
The Elara Edge: Expert Insights on Space Security is a thought leadership forum of military and space industry experts providing commentary and insight on the latest news developments in space security.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
The EdgeVerse Techcast goal is to increase awareness of resources available for customers developing with NXP Application Processors and Microcontrollers.
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
In a community of likeminded individuals in the firearms, and self-protection industry, Evolution Security instructors Eric Davis, Brian Schilt and Aaron Davis believe in a renaissance approach and philosophy. Focusing on teaching, educating, and informing everyday people on the path of defense and health. You will hear case studies on the judicious use of force and statistics that are far too often ignored by the mainstream media. There will be a heavy emphasis on personal accountability, f ...
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
"Light 'Em Up" takes a deep dive on the criminal justice system, crime scene investigation and leadership. We take you under and behind the crime scene investigation tape to get at the truth, the whole truth and nothing but the truth, so help us God! Justice comes to those that fight ... not those that cry!
…
continue reading
Safety. Security. Survival. What I’ve taught multi-billion dollar companies to give them peace of mind. Mindset, awareness and preparing for unexpected danger. From www.safetyman.co
…
continue reading
Empowering people to be more safe, confident, and self-reliant so that they can better protect their families and loved ones when it matters most.
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
The NIDS View is meant to give listeners inside access to the thoughts and ideas of the member-practitioners of NIDS including our Fellows, Analysts, and Interns. For each episode we pick a current deterrence topic and have a cordial, exciting and sometimes funny discussion. Each episode is a stand-alone topical and is expected to increase awareness of deterrence thinking, expand the next generation of deterrence professionals, and prepare the workforce whose mission is to ensure peace, secu ...
…
continue reading
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
…
continue reading
A skilled individual can effortlessly blend into any environment without drawing attention, effectively hiding their true capabilities and intentions. They seamlessly mingle, remain unmemorable, and forge relationships to gather vital information for their objectives. Every move they make is calculated and intended to keep them inconspicuous. Originating from espionage, the term "gray man" refers to incorporating spy tradecraft into one's daily life. This involves honing skills essential for ...
…
continue reading
Welcome to One Degree to Victory, the podcast where we help navigate life's toughest challenges while building the emotional security and freedom to live their best year yet. Each episode provides practical tools, heartfelt stories, and expert insights to guide you through day-to-day experiences and chart a path toward new possibilities. Whether you're overcoming trauma, pursuing self-care, or redefining your future, this show will empower you to turn adversity into adventure for both yourse ...
…
continue reading
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join one of our hosts, Alex Nehmy, Eric Johansen, and James McCarthy, each month as they speak with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought lea ...
…
continue reading

1
The GOHSEP Get a Game Plan Podcast
Louisiana Governor's Office of Homeland Security and Emergency Preparedness
The GOHSEP Get a Game Plan Podcast highlights key issues in emergency management, we have timely interviews with subject matter experts at all levels of government along with practical information to help you become more resilient before the next disaster strikes.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
…
continue reading
Farms. Food. Future. looks at the big issues facing farmers in the developing world and what needs to be done to wipe out global hunger while dealing with the climate crisis. It’s brought to you by the UN’s International Fund for Agricultural Development (IFAD) and presented by Brian Thomson. Through the podcast, IFAD raises awareness of the challenges smallholder farmers in developing countries are facing around food security. Farms. Food. Future. includes interviews with IFAD experts, part ...
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Security tips when your out and about instinctual behaviour to keep you and your safe
…
continue reading
Join us on the Zero Hunger Project Podcast, as we dive into the fight against hunger and explore actionable solutions to create a world where no one goes to bed hungry. Each episode highlights innovative programs, partnerships, and advocacy efforts aimed at eradicating hunger. Through inspiring interviews, powerful stories, and expert insights, we bring you closer to the grassroots efforts and larger initiatives making a real impact. Learn how you can be part of the solution, whether through ...
…
continue reading
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Looking for a new TV show, movie, book or music artist? This is the show for you. Each episode we each recommend one thing we've watched, played or otherwise consumed and why we liked it so damn much.
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
It’s the show, that bridges the requirements of regulations, compliance, and privacy with those of security. Your trusted source for complying with various mandates, building effective programs, and current compliance news. It’s time for Security and Compliance Weekly.
…
continue reading
Podcast about enterprise technology by Indonesia's trusted I.T. company, ACS Group IG @acsgroup.co.id. We interview experts to spread awareness about the latest trends and opportunities in the enterprise tech space. Email us at: [email protected]
…
continue reading
Most financial experts focus solely on numbers, but Rick Kahler, CFP®, CFT™, takes a deeper approach. With over 40 years of experience, Rick blends practical financial advice with powerful emotional insights to help you understand why you make the money decisions you do. Research shows that 90% of our financial choices are driven by emotions—not logic. Whether your habits seem irrational or confusing, Rick helps uncover the underlying beliefs and feelings influencing your behavior. It's abou ...
…
continue reading
Financial literacy is not emphasized enough for professionals during training, leaving many unprepared as they begin their careers. The topics covered in beyond MD apply to all professionals, including medical students/residents and practicing physicians. This podcast is led by radiologist Dr. Yatin Chadha and guided by expert analysis. Each episode, Yatin interviews accountants, lawyers, brokers, and advisors to heighten awareness on important topics, such as professional corporations, hold ...
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
…
continue reading
Welcome to "The Hopeful Perspective" a podcast discussing what it entails to transform from a personal position of suffering, pain, loss and HOPELESSNESS toward a renewed perspective of security, perseverance, love and HOPE. I am your host, Jason Hopkins, a long time victim and survivor who has personally been impacted by the Lord to be a victor and a thriver! In each podcast episode you can expect to find authentic dialog from a Biblical and experiential perspective—that is, BEYOND mere rel ...
…
continue reading
Whatever life after 50 looks like to you, thinking about money in retirement shouldn’t keep you up at night. We’re all dealing with the big questions about money and aging: How much you can really spend, how to invest your life savings without risking it all in the stock market, and should you sell your home and downsize? Then there’s the biggest unknown: how much health care you’ll need, and whether your savings and insurance is enough to cover the costs. This is personal. These topics may ...
…
continue reading
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
…
continue reading
Want to know more about the human side of cybersecurity? This is the show for you. Each week, Tessian's Tim Sadler meets with security experts and business leaders to discuss everything from security cultures, hackers, social engineering and insider threats.
…
continue reading
Humans are the key to solving our cybersecurity challenges…but first we need them to be Well Aware. The Well Aware Security Show is hosted by George Finney, CISO for SMU and author of the award winning book, Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future. Security is in your DNA…so be Well Aware!
…
continue reading

1
Security Awareness Training Sucks! Focus on Situational Awareness.
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30In this eye-opening episode of Unspoken Security, host AJ Nash welcomes notorious hacker and security expert Jayson E. Street to discuss why traditional security awareness training falls short. Jayson explains that most corporate security training is merely policy-driven compliance, not actual security education. Instead of focusing on checkbox exe…
…
continue reading

1
TraCSS Delivers Space Situational Awareness to Spacecraft Operators
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42In 2009, an on-orbit collision between a defunct Russian satellite and an Iridium communications satellite created more than 1,800 pieces of debris and signaled an emerging need for a space traffic system. Since then, space has only become more congested with the rise of a commercial launch market that has enabled affordable access to space for com…
…
continue reading

1
19. What is good security awareness training? How you can make great courses for your company (With Tue Saltofte Lund - Digital Learning Specialist at CyberPilot)
18:49
18:49
Play later
Play later
Lists
Like
Liked
18:49We have a new podcast episode live after a winter break. This time, we got digital learning specialist Tue Saltofte Lund in the studio to discuss what makes good security awareness training is. This means you can listen to a lot of gold nuggets about: - Why your courses must be practical for your employee's everyday life - How we structure courses …
…
continue reading

1
Ep #90 - Kids hold the secret to a happier & richer life - with Dr. Hasan Merali
47:05
47:05
Play later
Play later
Lists
Like
Liked
47:05Sometimes the answers are right in front of us. My guest today is Dr. Hasan Merali, MD MPH, author of Sleep Well, Take Risks, & Squish the Peas. We both believe kids hold the secret to a happier & richer life. Today, Hasan provides stories & evidence from the science of toddlers to back this up. He also discusses how we can incorporate certain prac…
…
continue reading

1
Surveillance Capitalism: You Are The Product
8:59
8:59
Play later
Play later
Lists
Like
Liked
8:59In this eye-opening kickoff to Season 6, Darnley dives into the hidden world of surveillance capitalism—where your clicks, swipes, and searches are turned into profit. You ARE the product. Discover how data profiling shapes your digital life, influences what you see, and quietly sells your behaviour to the highest bidder. Real-world examples, pract…
…
continue reading

1
How Hackers Think.🔥Chris Roberts🔥Latest AI Risks for Business
58:38
58:38
Play later
Play later
Lists
Like
Liked
58:38Rural Healthcare and small/midsized businesses are being tipped over the edge. Not by Tariffs or high interest rates, but by investments needed into protecting their people and systems from disruption. How can you protect yourself from something you don’t know? A risk you don’t understand. What if you could think like a hacker… and use that power t…
…
continue reading

1
A Future Without Hunger Is Possible with Stefanos Fotiou
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18Hunger persists, not because we lack food, but because we’ve accepted broken systems for far too long. In this episode of the Zero Hunger Project, you’ll hear from Stefanos Fotiou, who’s doing more than imagining that future. He calls out the system failures, food waste, skewed pricing, and harmful subsidies that keep people hungry while letting po…
…
continue reading

1
The Implications of China's New Non-Nuclear Hydrogen Bomb
38:20
38:20
Play later
Play later
Lists
Like
Liked
38:20Adam, Curtis, and Jim discuss China's development of a non-nuclear hydrogen bomb, exploring its scientific basis, implications for military strategy, and the broader context of China's advancements in military technology. They analyze the potential uses of such weapons, particularly in relation to Taiwan, and the messaging strategies employed by Ch…
…
continue reading

1
Ep. 179 - TacCon25 AAR - Master IDC - Goodbye For Now....
1:17:46
1:17:46
Play later
Play later
Lists
Like
Liked
1:17:46This show is a tough one... Eric and Aaron thank their biggest supporters and announce that they will be putting the show on hiatus indefinitely. AAR for Aaron's TacCon 2025 attendance. AAR for Eric's Rangemaster Master Instructor Development Class in FL. If you’re not signed up for the upcoming 3rd Annual Combatives Summit, what are you waiting fo…
…
continue reading

1
Embracing Change in Corporate Security: Strategies for Modernization with Ryan Schonfeld of HiveWatch
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52On this episode of the Ontic Connected Intelligence Podcast, Ryan Schoenfeld explores his transition from law enforcement to founding Hivewatch, sharing insights into modernizing corporate security operations and integrating cutting-edge technology like AI. His conversation with host Manish Mehta uncovers the challenges of transitioning from public…
…
continue reading

1
CYFIRMA Research- Hannibal Stealer: A Rebranded Threat Born from Sharp and TX Lineage
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Read CYFIRMA’s report on the Hannibal Stealer, a rebranded variant of SHARP and TX Stealers, which has re-emerged with expanded data exfiltration capabilities and an updated command-and-control infrastructure. Hannibal Stealer is built in C# on the .NET framework. It targets a wide range of data sources, including browsers, cryptocurrency wallets, …
…
continue reading

1
Accelerating Development with i.MX 9 Series Processors
16:24
16:24
Play later
Play later
Lists
Like
Liked
16:24Welcome back to the EdgeVerse TechCast! This episode dives deep into the world of NXP's i.MX Processors with guest Sanjana Kubde, Product Marketing Manager at NXP. Explore the exciting updates in the i.MX 9 series, including innovations in Artificial Intelligence, Security, and Connectivity. Discover how NXP's evaluation kits (EVK) and FRDM develop…
…
continue reading

1
CYFIRMA Research- Technical Malware Analysis Report: Python-based RAT Malware
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12A New Breed of Python-Based RATs is Abusing Discord for C2 The CYFIRMA research team has investigated an emerging class of Python malware that is turning popular platforms into weaponized control panels. One recent variant showcases just how accessible and disruptive these tools have become. This lightweight Remote Access Trojan (RAT) uses Discord …
…
continue reading

1
Artifacts of Deception (Deceptive Minds - issue #2)
12:09
12:09
Play later
Play later
Lists
Like
Liked
12:09Hey friends! Here's issue 2 of Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it. 🔥 Since starting this newsletter last week, we're already closing in on 3,000 subscribers to the print edition! 🔥 Huge thanks to everyone who's jumped in early! This week, I'm diving into what I call the “artifac…
…
continue reading

1
Deceptive Minds (the audio experience): Issue #1
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17 Hey listeners, Perry Carpenter here. Yeah, it's been a while since I've posted this feed, but I've got something exciting that I think you'll be interested in. It's the audio version of a newsletter that I recently started. The newsletter is called Deceptive Minds, and it's all about how we are fooled, how we fool ourselves, and what we can do abo…
…
continue reading

1
Situational Awareness Training: Are You Really Prepared?
27:48
27:48
Play later
Play later
Lists
Like
Liked
27:48Every day, the world around you is sending signals — some obvious, many subtle. The ability to pick up on those signals, to read the situation before it unfolds, can mean the difference between success and failure in overcoming the problems that may head your way. In today's world of uncertainty, sharpening your situational awareness… The post Situ…
…
continue reading
…
continue reading

1
Glitched: My Story of Overcoming a Traumatic Brain Injury Part 3
19:49
19:49
Play later
Play later
Lists
Like
Liked
19:49Press THIS LINK if you want to text The Hopeful Perspective to share your questions, comments, and/or blessings how the podcast is impacting you! When your brain betrays you, where do you turn? After surviving childhood abuse, 26 foster homes, and ultimately a brain tumor requiring multiple surgeries, I've discovered profound truths about dependenc…
…
continue reading

1
RCR 160: Physical Meets Digital: Security's Evolving Frontier - Vendor Focus (Haystack.com)
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14The boundary between physical and cybersecurity is rapidly disappearing, creating both challenges and opportunities for security professionals across domains. This eye-opening conversation with Casey Rash from Secure Passage explores how modern physical security devices have evolved into sophisticated IoT endpoints generating valuable security data…
…
continue reading

1
Food that packs a punch in Asia and the Pacific
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36Sometimes, to transform an entire food system we have to start small. Across Asia and the Pacific, slight changes in food and farming habits are bringing vital nutritional improvements to entire communities. On this episode, we head to Cambodia to learn more. Experts from across the region recently gathered here at an IFAD workshop on nutrition-sen…
…
continue reading

1
Are you at Risk? Personal Liability Cyber Breaches.
54:33
54:33
Play later
Play later
Lists
Like
Liked
54:33We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation …
…
continue reading

1
🚨New FBI Alert🚨Got a DM from the “FBI” on Telegram?
1:47
1:47
Play later
Play later
Lists
Like
Liked
1:47📲 Got a DM from the “FBI” on Telegram? 🚨 Did someone named “Jaimie Quin” claim they run IC3? ⚠️ It’s a scam. Full stop. The FBI just issued an alert warning the public: They are NOT direct messaging victims on Telegram or any other social media app. A scammer posing as “Jaimie Quin” is pretending to be the head of the FBI’s Internet Crime Complaint…
…
continue reading

1
Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure
1:36:41
1:36:41
Play later
Play later
Lists
Like
Liked
1:36:41Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure 03:11 Vulnerabilities and Weaknesses in Critical Infrastructure 10:0…
…
continue reading

1
New Alert 🚨 Beware of Your Next Google Search🚨
1:55
1:55
Play later
Play later
Lists
Like
Liked
1:55👀 Could your next Google search lead you into a cyber trap? 🔐 Are you sure that “HR login” link isn’t a fake? 🚨 The FBI just issued a Public Service Announcement warning EVERYONE — yes, even you — that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals). Here’s how it works: ⚠️ Fraudsters buy sea…
…
continue reading

1
New Alert. 🚨 Don't Fall For The New Google Subpoena🚨
1:39
1:39
Play later
Play later
Lists
Like
Liked
1:39📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real? 🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing. 🕵️♂️ Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google. ✅ No misspellings ✅ No suspicious …
…
continue reading

1
Part 2: Solving the Top 10 Problems with Vulnerability Management
38:32
38:32
Play later
Play later
Lists
Like
Liked
38:32Once again, we're back with all the answers. Traditional vulnerability management comes with many pitfalls, and we're counting down the solutions to all the problems you might be running into. Ivanti's Chris Goettl and Robert Waters break down the back five on our list: a periodic approach to remediation, poor prioritization, lack of business conte…
…
continue reading

1
Zero Trust, SMB & National Security. INTEL CTO Exclusive.
1:01:40
1:01:40
Play later
Play later
Lists
Like
Liked
1:01:40Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in em…
…
continue reading

1
Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.
58:15
58:15
Play later
Play later
Lists
Like
Liked
58:15David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters 00:00 The Reality of Cybercri…
…
continue reading

1
The Antwerp Diamond Heist: Lessons for Cybersecurity
48:26
48:26
Play later
Play later
Lists
Like
Liked
48:26What can the largest diamond heist in history teach us about modern cybersecurity? When $100 million in diamonds vanished from Belgium's supposedly impenetrable Diamond Center vault, it wasn't cutting-edge technology that failed—it was people and processes. Join host Aaron Pritz and senior cybersecurity consultant Rebecca as they unpack the fascina…
…
continue reading

1
CYFIRMA Research- Scamonomics: The Dark Side of Stock & Crypto Investments in India
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14Cybercriminals are impersonating trusted business executives and financial experts to trap unsuspecting investors. These scammers are creating fake investment firms with fraudulent registration details, professional-looking websites and manipulated social media engagement to appear legitimate. They are actively using Telegram channels, WhatsApp gro…
…
continue reading

1
Navigating the US-China Relationship: Myths and Realities
37:18
37:18
Play later
Play later
Lists
Like
Liked
37:18Inspired by Miles Yu's recent article, " A dangerous myth of US-China Cold War tensions," Adam, Curtis, and Jim discuss the complexities of US-China relations. Through a Cold War prism, they explore economic imbalances, trade deficits, and the implications of intellectual property theft and their impact on deterrence. The conversation delves into h…
…
continue reading

1
Identity, Access, and You: Leveling Up Your Cybersecurity Game at Yale and at Home
31:21
31:21
Play later
Play later
Lists
Like
Liked
31:21What does airport security have to do with protecting your online identity? 🛫💻 Plenty, actually. In this episode, we chat with Dan Tinari from Yale’s Information Security Office, who breaks down identity and access management (IAM) in a way that actually makes sense—and might even make you smile. 😄 Whether you're logging in at Yale or keeping your …
…
continue reading
In this episode of Friends Talk Money, we're joined by Phil Moeller, renowned journalist and co-author of Get What’s Yours: The Secrets to Maxing Out Your Social Security. Phil dives into all things Social Security—unpacking the latest changes, what they mean for you, and how to make smart decisions that can boost your retirement benefits. Topics w…
…
continue reading

1
CYFIRMA Research: Cyber Espionage Among Allies- Strategic Posturing in an Era of Trade Tensions
8:44
8:44
Play later
Play later
Lists
Like
Liked
8:44The CYFIRMA research team provides a comprehensive analysis of how diplomacy, defense, and digital strategy are colliding: As trade friction intensifies especially under the 2025 U.S. tariff regime, cyberspace is becoming the frontier of quiet competition between traditional allies. While full-scale cyber warfare remains unlikely, behind-the-scenes…
…
continue reading

1
wolfSSL and NXP: Embedded Security Simplified
14:44
14:44
Play later
Play later
Lists
Like
Liked
14:44Exploring wolfSSL: High-Performance Security for Embedded and Enterprise Systems This episode delves into the high-performance world of wolfSSL, a leading TLS/DTLS library for securing digital communications. wolfSSL experts David Garske and Zach Beckman, drop in to clearly explain how wolfSSL's lightweight design can be partnered with NXP SoCs to …
…
continue reading

1
#195 - The Money Polarizations That Shape Your Financial Choices
25:08
25:08
Play later
Play later
Lists
Like
Liked
25:08Rick continues his Internal Financial Systems™ series by exploring new dimensions of our money parts, including those tied to awareness, generosity, shame, and control. From the meticulous Accountant and the solution-focused Problem-Solver to the avoidant Ostrich and the self-sacrificing Over-Giver, these parts reveal the complexity of our financia…
…
continue reading
In this heartfelt season finale, Darnley takes a step back to reflect on the journey so far — from quiet beginnings during the COVID-19 shutdowns to building a global community of digital thinkers, privacy advocates, and cyber-curious minds. Join us as we reminisce about standout moments from Season 5, and real stories that brought cybersecurity in…
…
continue reading

1
The Painful Truth About Sustainable Development Goals (SDGs) with Stefanos Fotiou
20:49
20:49
Play later
Play later
Lists
Like
Liked
20:49Why do millions still suffer from hunger despite the Sustainable Development Goals (SDGs) and decades of promises? In this episode, Suman Roy and Stacia Neale sit down with Stefanos Fotiou, a global force in sustainable development and Director at the UN FAO, to ask the hard questions about the SDGs. He’s here to break the silence on why the world …
…
continue reading

1
CYFIRMA Research- Tik-Tok: China’s Digital Weapon System?
9:42
9:42
Play later
Play later
Lists
Like
Liked
9:42U.S. President Donald Trump, once a critic but now a supporter of TikTok, is granting the app’s China-based parent company, ByteDance, a second 75-day extension to finalize a deal that would transfer ownership of TikTok to an American entity. While the legislation allowed only one extension for a sale, the U.S. Congress has yet to push back against…
…
continue reading

1
CYFIRMA Research- Tracking Ransomware: March 2025
5:51
5:51
Play later
Play later
Lists
Like
Liked
5:51Stay ahead of evolving ransomware threats with CYFIRMA’s Monthly Ransomware Report – March 2025. The month of March saw shifting dynamics, with Safepay experiencing a huge surge of 223%, while RansomHub and Akira declined. Babuk2 has possibly leveraged fake extortion claims. Manufacturing, IT, and Consumer sectors remained prime targets as total in…
…
continue reading

1
How start a career in cybersecurity today. Josh Mason
56:21
56:21
Play later
Play later
Lists
Like
Liked
56:21Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today,…
…
continue reading