Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Artwork

1
Unspoken Security

Unspoken Security

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
  continue reading
 
Artwork
 
Brian Duff, host of the Mind 4 Survival prepping podcast, helps preparedness minded people be more safe, confident and prepared so they can better protect themselves, their families, and loved ones when it matters most.
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton, Chuck Randolph, and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you sec ...
  continue reading
 
Artwork

1
8th Layer Insights

Perry Carpenter | N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Artwork

1
Evolution Security Podcast

Eric Davis, Aaron Davis, Brian Schilt

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
In a community of likeminded individuals in the firearms, and self-protection industry, Evolution Security instructors Eric Davis, Brian Schilt and Aaron Davis believe in a renaissance approach and philosophy. Focusing on teaching, educating, and informing everyday people on the path of defense and health. You will hear case studies on the judicious use of force and statistics that are far too often ignored by the mainstream media. There will be a heavy emphasis on personal accountability, f ...
  continue reading
 
Artwork

1
Simplifying Cyber

Aaron Pritz, Cody Rivers

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
  continue reading
 
Artwork

1
Light 'Em Up

Phillip Rizzo

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
"Light 'Em Up" takes a deep dive on the criminal justice system, crime scene investigation and leadership. We take you under and behind the crime scene investigation tape to get at the truth, the whole truth and nothing but the truth, so help us God! Justice comes to those that fight ... not those that cry!
  continue reading
 
Artwork
 
Safety. Security. Survival. What I’ve taught multi-billion dollar companies to give them peace of mind. Mindset, awareness and preparing for unexpected danger. From www.safetyman.co
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Artwork

1
The NIDS View

The National Institute for Deterrence Studies

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The NIDS View is meant to give listeners inside access to the thoughts and ideas of the member-practitioners of NIDS including our Fellows, Analysts, and Interns. For each episode we pick a current deterrence topic and have a cordial, exciting and sometimes funny discussion. Each episode is a stand-alone topical and is expected to increase awareness of deterrence thinking, expand the next generation of deterrence professionals, and prepare the workforce whose mission is to ensure peace, secu ...
  continue reading
 
Artwork

1
Security Masterminds

Security Masterminds

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
Artwork

1
The Grayman Concept

Bryan (Shammer)

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A skilled individual can effortlessly blend into any environment without drawing attention, effectively hiding their true capabilities and intentions. They seamlessly mingle, remain unmemorable, and forge relationships to gather vital information for their objectives. Every move they make is calculated and intended to keep them inconspicuous. Originating from espionage, the term "gray man" refers to incorporating spy tradecraft into one's daily life. This involves honing skills essential for ...
  continue reading
 
Welcome to One Degree to Victory, the podcast where we help navigate life's toughest challenges while building the emotional security and freedom to live their best year yet. Each episode provides practical tools, heartfelt stories, and expert insights to guide you through day-to-day experiences and chart a path toward new possibilities. Whether you're overcoming trauma, pursuing self-care, or redefining your future, this show will empower you to turn adversity into adventure for both yourse ...
  continue reading
 
Artwork

1
IoT Security Podcast

Phosphorus Cybersecurity

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join one of our hosts, Alex Nehmy, Eric Johansen, and James McCarthy, each month as they speak with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought lea ...
  continue reading
 
Artwork

1
The GOHSEP Get a Game Plan Podcast

Louisiana Governor's Office of Homeland Security and Emergency Preparedness

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The GOHSEP Get a Game Plan Podcast highlights key issues in emergency management, we have timely interviews with subject matter experts at all levels of government along with practical information to help you become more resilient before the next disaster strikes.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
Farms. Food. Future.

International Fund for Agricultural Development (IFAD)

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Farms. Food. Future. looks at the big issues facing farmers in the developing world and what needs to be done to wipe out global hunger while dealing with the climate crisis. It’s brought to you by the UN’s International Fund for Agricultural Development (IFAD) and presented by Brian Thomson. Through the podcast, IFAD raises awareness of the challenges smallholder farmers in developing countries are facing around food security. Farms. Food. Future. includes interviews with IFAD experts, part ...
  continue reading
 
Artwork
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
  continue reading
 
Join us on the Zero Hunger Project Podcast, as we dive into the fight against hunger and explore actionable solutions to create a world where no one goes to bed hungry. Each episode highlights innovative programs, partnerships, and advocacy efforts aimed at eradicating hunger. Through inspiring interviews, powerful stories, and expert insights, we bring you closer to the grassroots efforts and larger initiatives making a real impact. Learn how you can be part of the solution, whether through ...
  continue reading
 
Artwork

1
Cyber Defense Indonesia

Cyber Defense Indonesia

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Artwork

1
Content Aware

Content Aware

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Looking for a new TV show, movie, book or music artist? This is the show for you. Each episode we each recommend one thing we've watched, played or otherwise consumed and why we liked it so damn much.
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
It’s the show, that bridges the requirements of regulations, compliance, and privacy with those of security. Your trusted source for complying with various mandates, building effective programs, and current compliance news. It’s time for Security and Compliance Weekly.
  continue reading
 
Most financial experts focus solely on numbers, but Rick Kahler, CFP®, CFT™, takes a deeper approach. With over 40 years of experience, Rick blends practical financial advice with powerful emotional insights to help you understand why you make the money decisions you do. Research shows that 90% of our financial choices are driven by emotions—not logic. Whether your habits seem irrational or confusing, Rick helps uncover the underlying beliefs and feelings influencing your behavior. It's abou ...
  continue reading
 
Financial literacy is not emphasized enough for professionals during training, leaving many unprepared as they begin their careers. The topics covered in beyond MD apply to all professionals, including medical students/residents and practicing physicians. This podcast is led by radiologist Dr. Yatin Chadha and guided by expert analysis. Each episode, Yatin interviews accountants, lawyers, brokers, and advisors to heighten awareness on important topics, such as professional corporations, hold ...
  continue reading
 
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
  continue reading
 
Artwork

1
UAB TechKnow

University of Alabama at Birmingham

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
  continue reading
 
Welcome to "The Hopeful Perspective" a podcast discussing what it entails to transform from a personal position of suffering, pain, loss and HOPELESSNESS toward a renewed perspective of security, perseverance, love and HOPE. I am your host, Jason Hopkins, a long time victim and survivor who has personally been impacted by the Lord to be a victor and a thriver! In each podcast episode you can expect to find authentic dialog from a Biblical and experiential perspective—that is, BEYOND mere rel ...
  continue reading
 
Artwork
 
Whatever life after 50 looks like to you, thinking about money in retirement shouldn’t keep you up at night. We’re all dealing with the big questions about money and aging: How much you can really spend, how to invest your life savings without risking it all in the stock market, and should you sell your home and downsize? Then there’s the biggest unknown: how much health care you’ll need, and whether your savings and insurance is enough to cover the costs. This is personal. These topics may ...
  continue reading
 
Artwork

1
AWS Industrial Insights

Amazon Web Services

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
  continue reading
 
Want to know more about the human side of cybersecurity? This is the show for you. Each week, Tessian's Tim Sadler meets with security experts and business leaders to discuss everything from security cultures, hackers, social engineering and insider threats.
  continue reading
 
Humans are the key to solving our cybersecurity challenges…but first we need them to be Well Aware. The Well Aware Security Show is hosted by George Finney, CISO for SMU and author of the award winning book, Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future. Security is in your DNA…so be Well Aware!
  continue reading
 
Loading …
show series
 
In this eye-opening episode of Unspoken Security, host AJ Nash welcomes notorious hacker and security expert Jayson E. Street to discuss why traditional security awareness training falls short. Jayson explains that most corporate security training is merely policy-driven compliance, not actual security education. Instead of focusing on checkbox exe…
  continue reading
 
In 2009, an on-orbit collision between a defunct Russian satellite and an Iridium communications satellite created more than 1,800 pieces of debris and signaled an emerging need for a space traffic system. Since then, space has only become more congested with the rise of a commercial launch market that has enabled affordable access to space for com…
  continue reading
 
We have a new podcast episode live after a winter break. This time, we got digital learning specialist Tue Saltofte Lund in the studio to discuss what makes good security awareness training is. This means you can listen to a lot of gold nuggets about: - Why your courses must be practical for your employee's everyday life - How we structure courses …
  continue reading
 
Sometimes the answers are right in front of us. My guest today is Dr. Hasan Merali, MD MPH, author of Sleep Well, Take Risks, & Squish the Peas. We both believe kids hold the secret to a happier & richer life. Today, Hasan provides stories & evidence from the science of toddlers to back this up. He also discusses how we can incorporate certain prac…
  continue reading
 
In this eye-opening kickoff to Season 6, Darnley dives into the hidden world of surveillance capitalism—where your clicks, swipes, and searches are turned into profit. You ARE the product. Discover how data profiling shapes your digital life, influences what you see, and quietly sells your behaviour to the highest bidder. Real-world examples, pract…
  continue reading
 
Rural Healthcare and small/midsized businesses are being tipped over the edge. Not by Tariffs or high interest rates, but by investments needed into protecting their people and systems from disruption. How can you protect yourself from something you don’t know? A risk you don’t understand. What if you could think like a hacker… and use that power t…
  continue reading
 
Hunger persists, not because we lack food, but because we’ve accepted broken systems for far too long. In this episode of the Zero Hunger Project, you’ll hear from Stefanos Fotiou, who’s doing more than imagining that future. He calls out the system failures, food waste, skewed pricing, and harmful subsidies that keep people hungry while letting po…
  continue reading
 
Adam, Curtis, and Jim discuss China's development of a non-nuclear hydrogen bomb, exploring its scientific basis, implications for military strategy, and the broader context of China's advancements in military technology. They analyze the potential uses of such weapons, particularly in relation to Taiwan, and the messaging strategies employed by Ch…
  continue reading
 
This show is a tough one... Eric and Aaron thank their biggest supporters and announce that they will be putting the show on hiatus indefinitely. AAR for Aaron's TacCon 2025 attendance. AAR for Eric's Rangemaster Master Instructor Development Class in FL. If you’re not signed up for the upcoming 3rd Annual Combatives Summit, what are you waiting fo…
  continue reading
 
On this episode of the Ontic Connected Intelligence Podcast, Ryan Schoenfeld explores his transition from law enforcement to founding Hivewatch, sharing insights into modernizing corporate security operations and integrating cutting-edge technology like AI. His conversation with host Manish Mehta uncovers the challenges of transitioning from public…
  continue reading
 
Read CYFIRMA’s report on the Hannibal Stealer, a rebranded variant of SHARP and TX Stealers, which has re-emerged with expanded data exfiltration capabilities and an updated command-and-control infrastructure. Hannibal Stealer is built in C# on the .NET framework. It targets a wide range of data sources, including browsers, cryptocurrency wallets, …
  continue reading
 
Welcome back to the EdgeVerse TechCast! This episode dives deep into the world of NXP's i.MX Processors with guest Sanjana Kubde, Product Marketing Manager at NXP. Explore the exciting updates in the i.MX 9 series, including innovations in Artificial Intelligence, Security, and Connectivity. Discover how NXP's evaluation kits (EVK) and FRDM develop…
  continue reading
 
A New Breed of Python-Based RATs is Abusing Discord for C2 The CYFIRMA research team has investigated an emerging class of Python malware that is turning popular platforms into weaponized control panels. One recent variant showcases just how accessible and disruptive these tools have become. This lightweight Remote Access Trojan (RAT) uses Discord …
  continue reading
 
Hey friends! Here's issue 2 of Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it. 🔥 Since starting this newsletter last week, we're already closing in on 3,000 subscribers to the print edition! 🔥 Huge thanks to everyone who's jumped in early! This week, I'm diving into what I call the “artifac…
  continue reading
 
 Hey listeners, Perry Carpenter here. Yeah, it's been a while since I've posted this feed, but I've got something exciting that I think you'll be interested in. It's the audio version of a newsletter that I recently started. The newsletter is called Deceptive Minds, and it's all about how we are fooled, how we fool ourselves, and what we can do abo…
  continue reading
 
Every day, the world around you is sending signals — some obvious, many subtle. The ability to pick up on those signals, to read the situation before it unfolds, can mean the difference between success and failure in overcoming the problems that may head your way. In today's world of uncertainty, sharpening your situational awareness… The post Situ…
  continue reading
 
Press THIS LINK if you want to text The Hopeful Perspective to share your questions, comments, and/or blessings how the podcast is impacting you! When your brain betrays you, where do you turn? After surviving childhood abuse, 26 foster homes, and ultimately a brain tumor requiring multiple surgeries, I've discovered profound truths about dependenc…
  continue reading
 
The boundary between physical and cybersecurity is rapidly disappearing, creating both challenges and opportunities for security professionals across domains. This eye-opening conversation with Casey Rash from Secure Passage explores how modern physical security devices have evolved into sophisticated IoT endpoints generating valuable security data…
  continue reading
 
Sometimes, to transform an entire food system we have to start small. Across Asia and the Pacific, slight changes in food and farming habits are bringing vital nutritional improvements to entire communities. On this episode, we head to Cambodia to learn more. Experts from across the region recently gathered here at an IFAD workshop on nutrition-sen…
  continue reading
 
We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation …
  continue reading
 
📲 Got a DM from the “FBI” on Telegram? 🚨 Did someone named “Jaimie Quin” claim they run IC3? ⚠️ It’s a scam. Full stop. The FBI just issued an alert warning the public: They are NOT direct messaging victims on Telegram or any other social media app. A scammer posing as “Jaimie Quin” is pretending to be the head of the FBI’s Internet Crime Complaint…
  continue reading
 
Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure 03:11 Vulnerabilities and Weaknesses in Critical Infrastructure 10:0…
  continue reading
 
👀 Could your next Google search lead you into a cyber trap? 🔐 Are you sure that “HR login” link isn’t a fake? 🚨 The FBI just issued a Public Service Announcement warning EVERYONE — yes, even you — that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals). Here’s how it works: ⚠️ Fraudsters buy sea…
  continue reading
 
📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real? 🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing. 🕵️‍♂️ Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google. ✅ No misspellings ✅ No suspicious …
  continue reading
 
Once again, we're back with all the answers. Traditional vulnerability management comes with many pitfalls, and we're counting down the solutions to all the problems you might be running into. Ivanti's Chris Goettl and Robert Waters break down the back five on our list: a periodic approach to remediation, poor prioritization, lack of business conte…
  continue reading
 
Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in em…
  continue reading
 
David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters 00:00 The Reality of Cybercri…
  continue reading
 
What can the largest diamond heist in history teach us about modern cybersecurity? When $100 million in diamonds vanished from Belgium's supposedly impenetrable Diamond Center vault, it wasn't cutting-edge technology that failed—it was people and processes. Join host Aaron Pritz and senior cybersecurity consultant Rebecca as they unpack the fascina…
  continue reading
 
Cybercriminals are impersonating trusted business executives and financial experts to trap unsuspecting investors. These scammers are creating fake investment firms with fraudulent registration details, professional-looking websites and manipulated social media engagement to appear legitimate. They are actively using Telegram channels, WhatsApp gro…
  continue reading
 
Inspired by Miles Yu's recent article, " A dangerous myth of US-China Cold War tensions," Adam, Curtis, and Jim discuss the complexities of US-China relations. Through a Cold War prism, they explore economic imbalances, trade deficits, and the implications of intellectual property theft and their impact on deterrence. The conversation delves into h…
  continue reading
 
What does airport security have to do with protecting your online identity? 🛫💻 Plenty, actually. In this episode, we chat with Dan Tinari from Yale’s Information Security Office, who breaks down identity and access management (IAM) in a way that actually makes sense—and might even make you smile. 😄 Whether you're logging in at Yale or keeping your …
  continue reading
 
In this episode of Friends Talk Money, we're joined by Phil Moeller, renowned journalist and co-author of Get What’s Yours: The Secrets to Maxing Out Your Social Security. Phil dives into all things Social Security—unpacking the latest changes, what they mean for you, and how to make smart decisions that can boost your retirement benefits. Topics w…
  continue reading
 
The CYFIRMA research team provides a comprehensive analysis of how diplomacy, defense, and digital strategy are colliding: As trade friction intensifies especially under the 2025 U.S. tariff regime, cyberspace is becoming the frontier of quiet competition between traditional allies. While full-scale cyber warfare remains unlikely, behind-the-scenes…
  continue reading
 
Exploring wolfSSL: High-Performance Security for Embedded and Enterprise Systems This episode delves into the high-performance world of wolfSSL, a leading TLS/DTLS library for securing digital communications. wolfSSL experts David Garske and Zach Beckman, drop in to clearly explain how wolfSSL's lightweight design can be partnered with NXP SoCs to …
  continue reading
 
Rick continues his Internal Financial Systems™ series by exploring new dimensions of our money parts, including those tied to awareness, generosity, shame, and control. From the meticulous Accountant and the solution-focused Problem-Solver to the avoidant Ostrich and the self-sacrificing Over-Giver, these parts reveal the complexity of our financia…
  continue reading
 
In this heartfelt season finale, Darnley takes a step back to reflect on the journey so far — from quiet beginnings during the COVID-19 shutdowns to building a global community of digital thinkers, privacy advocates, and cyber-curious minds. Join us as we reminisce about standout moments from Season 5, and real stories that brought cybersecurity in…
  continue reading
 
Why do millions still suffer from hunger despite the Sustainable Development Goals (SDGs) and decades of promises? In this episode, Suman Roy and Stacia Neale sit down with Stefanos Fotiou, a global force in sustainable development and Director at the UN FAO, to ask the hard questions about the SDGs. He’s here to break the silence on why the world …
  continue reading
 
U.S. President Donald Trump, once a critic but now a supporter of TikTok, is granting the app’s China-based parent company, ByteDance, a second 75-day extension to finalize a deal that would transfer ownership of TikTok to an American entity. While the legislation allowed only one extension for a sale, the U.S. Congress has yet to push back against…
  continue reading
 
Stay ahead of evolving ransomware threats with CYFIRMA’s Monthly Ransomware Report – March 2025. The month of March saw shifting dynamics, with Safepay experiencing a huge surge of 223%, while RansomHub and Akira declined. Babuk2 has possibly leveraged fake extortion claims. Manufacturing, IT, and Consumer sectors remained prime targets as total in…
  continue reading
 
Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today,…
  continue reading
 
Loading …
Listen to this show while you explore
Play