Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Security Awareness Podcasts
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
A podcast where security meets sparkle, looking at all matters security and cleaning with Adept Corporate Services. Insightful and enlightening chat, entertaining guests and everything in between.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
Helping people build practical emergency preparedness, situational awareness, and survival skills—so they can confidently protect their families and thrive in any crisis.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Brian Duff, host of the Mind 4 Survival prepping podcast, helps preparedness minded people be more safe, confident and prepared so they can better protect themselves, their families, and loved ones when it matters most.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
Red Dot Mindset is the official podcast of Grey Matter Ops, your tactical guide to surviving — and thriving — in a world where hesitation can cost you everything. Hosted using advanced AI narration and written by a decorated U.S. Air Force Security Forces veteran, each episode blends military-grade strategy with real-world self-defense, situational awareness, and survival psychology. Whether you're facing a street-level threat, a digital stalker, or just the daily grind of modern life, we’ll ...
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Join Jason Poblete, international law, policy and national security expert, as he breaks down the legal, policy, and geopolitical battles shaping our world. From defending political prisoners to confronting authoritarian regimes, Poblete Dispatches delivers sharp analysis on human rights, economic security, and the rule of law. Whether you're a policymaker, legal professional, or someone who cares about freedom, this podcast offers insightful conversations and actionable intelligence on the ...
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
…
continue reading
"Light 'Em Up" takes a deep dive on the criminal justice system, crime scene investigation and leadership. We take you under and behind the crime scene investigation tape to get at the truth, the whole truth and nothing but the truth, so help us God! Justice comes to those that fight ... not those that cry!
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Welcome to Financially Fluent with Ray Godleski from Southeast Wealth Partners, LLC. Whether you're already retired or planning for the future, navigating financial advice can be overwhelming. This podcast cuts through the noise, bringing real insights from experts who specialize in every aspect of a successful financial plan—including how to adapt when things don’t go as expected. Join us as Ray Godleski answers audience questions and shares actionable strategies—not just empty clichés.
…
continue reading
The NIDS View is meant to give listeners inside access to the thoughts and ideas of the member-practitioners of NIDS including our Fellows, Analysts, and Interns. For each episode we pick a current deterrence topic and have a cordial, exciting and sometimes funny discussion. Each episode is a stand-alone topical and is expected to increase awareness of deterrence thinking, expand the next generation of deterrence professionals, and prepare the workforce whose mission is to ensure peace, secu ...
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
Podcast about enterprise technology by Indonesia's trusted I.T. company, ACS Group IG @acsgroup.co.id. We interview experts to spread awareness about the latest trends and opportunities in the enterprise tech space. Email us at: [email protected]
…
continue reading
Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecurity author and educa ...
…
continue reading
Digital certificate industry veterans Tim Callan and Jason Soroko explore the issues surrounding digital identity, PKI, and cryptographic connections in today's dynamic and evolving computing world. Best practices in digital certificates are continually under pressure from technology trends, new laws and regulations, cryptographic advances, and the evolution of our computing architectures to be more virtual, agile, ubiquitous, and cloud-based. Jason and Tim (and the occasional guest subject ...
…
continue reading
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
…
continue reading

1
From Destruction to Dignity: Clinical Perspectives; Spiritual Truths with Janice Ponds
Janice Ponds
Janice shares her wisdom to enlighten, educate, and advance the culture in America today. Her mission is to provoke thought, bring awareness, and point people towards intervention when needed.
…
continue reading
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
…
continue reading
Welcome to One Degree to Victory, the podcast where we help navigate life's toughest challenges while building the emotional security and freedom to live their best year yet. Each episode provides practical tools, heartfelt stories, and expert insights to guide you through day-to-day experiences and chart a path toward new possibilities. Whether you're overcoming trauma, pursuing self-care, or redefining your future, this show will empower you to turn adversity into adventure for both yourse ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
…
continue reading
Broken Brains with Bruce Parkman is presented by The Mac Parkman Foundation The mission of this show and the foundation is To serve as a source of information, resources, and communications to the community of parents, coaches/Athletic trainers, medical staff, and athletes that are affected by sports-related concussions and to raise awareness of the long-term implications of concussive and sub-concussive trauma to our children. Broken Brains will also explore how Concussive Trauma impacts ou ...
…
continue reading
Farms. Food. Future. looks at the big issues facing farmers in the developing world and what needs to be done to wipe out global hunger while dealing with the climate crisis. It’s brought to you by the UN’s International Fund for Agricultural Development (IFAD) and presented by Brian Thomson. Through the podcast, IFAD raises awareness of the challenges smallholder farmers in developing countries are facing around food security. Farms. Food. Future. includes interviews with IFAD experts, part ...
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Security tips when your out and about instinctual behaviour to keep you and your safe
…
continue reading
Safety. Security. Survival. What I’ve taught multi-billion dollar companies to give them peace of mind. Mindset, awareness and preparing for unexpected danger. From www.safetyman.co
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
…
continue reading
A skilled individual can effortlessly blend into any environment without drawing attention, effectively hiding their true capabilities and intentions. They seamlessly mingle, remain unmemorable, and forge relationships to gather vital information for their objectives. Every move they make is calculated and intended to keep them inconspicuous. Originating from espionage, the term "gray man" refers to incorporating spy tradecraft into one's daily life. This involves honing skills essential for ...
…
continue reading
Looking for a new TV show, movie, book or music artist? This is the show for you. Each episode we each recommend one thing we've watched, played or otherwise consumed and why we liked it so damn much.
…
continue reading
It’s the show, that bridges the requirements of regulations, compliance, and privacy with those of security. Your trusted source for complying with various mandates, building effective programs, and current compliance news. It’s time for Security and Compliance Weekly.
…
continue reading
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
The purpose of this podcast is to provide unclassified information about current trends in homeland security for the state of New Jersey, as well as educational information and resources for your awareness.
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading

1
Root Causes 515: What Is Entropy-aware Governance?
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51Jason coins the term "entropy-aware governance" to describe the idea of using the degree of entropy it contains to measure the strength of any given secret. This could be an objective, consistent metric that could be applied to standard practices and requirements.By Tim Callan and Jason Soroko
…
continue reading

1
Episode 95: Episode 95 - Security Awareness - What works?
22:42
22:42
Play later
Play later
Lists
Like
Liked
22:42In this episode, Richard has a deep dive into Security Awareness. What works? What doesn't?
…
continue reading

1
Special Episode: The Secure Talk Security Awareness Training 2025 (With HIPAA!)
1:11:17
1:11:17
Play later
Play later
Lists
Like
Liked
1:11:17SecureTalk 2025 Security Awareness Training | Complete Compliance Guide Welcome to SecureTalk's comprehensive 2025 Security Awareness Training video! This annually updated training is designed to help organizations meet their security compliance requirements while building a strong security culture. 🎯 What You'll Learn: Social Engineering & AI-Enha…
…
continue reading

1
Is Your Security Awareness Program Just Ticking Boxes?
49:50
49:50
Play later
Play later
Lists
Like
Liked
49:50This week on The Awareness Angle, Anthony Davis and Luke Pettigrew explore a special episode on what it really takes to build meaningful cybersecurity awareness, as part of preparing for Cybersecurity Awareness Month. 📢 Beyond the Poster Campaign – Open communication channels and positive reinforcement are key to building trust and encouraging peop…
…
continue reading

1
Dr. Michael Lewis on Omega-3s, Brain Trauma & TBI Recovery
1:07:03
1:07:03
Play later
Play later
Lists
Like
Liked
1:07:03Send us a text In this compelling episode of Broken Brains with Bruce Parkman, host Bruce sits down with Dr. Michael Lewis—renowned brain health expert and founder of the Brain Health Education and Research Institute—to unpack the devastating impact of repetitive brain trauma, especially among veterans, athletes, and youth in contact sports. Dr. Le…
…
continue reading

1
Why Was an Elevator Held Hostage by Windows?
1:14:36
1:14:36
Play later
Play later
Lists
Like
Liked
1:14:36This week on The Awareness Angle, Anthony Davis and Luke Pettigrew dive into some of the most unexpected and revealing cyber stories of the week. From job offers to gym selfies to your dog’s microchip, this week’s stories prove no part of daily life is off-limits to cyber risk. 📸 Fitness App Photo Leak – A design flaw exposed thousands of users’ ne…
…
continue reading

1
First Year, First Defense: Staying Safe on Urban Campuses
25:32
25:32
Play later
Play later
Lists
Like
Liked
25:32First Year, First Defense isn’t your typical campus orientation talk. In this episode, we go beyond packing lists and dorm check-ins to uncover what really matters—personal safety, mindset, and tactical readiness. Using SCAD in Savannah, Georgia, as our case study, we break down the real-world threats facing students—especially introverts—and teach…
…
continue reading

1
Who Do Hackers Target The Most? Real Truth About Cyber Crime. FBI vs Cyber Crime.
30:09
30:09
Play later
Play later
Lists
Like
Liked
30:09In this episode of Cyber Crime Junkies, host Dean Mauro explores listener question of who do hackers target the most. He explains the real truth about cyber crime, recent examples of Cyber crime This year, Small business cyber attacks, and he evaluates FBI IC3 Report 2025 Send us a text Growth without Interruption. Get peace of mind. Stay Competiti…
…
continue reading

1
You Can Stop Breaches. Exclusive CISO Insight.
58:37
58:37
Play later
Play later
Lists
Like
Liked
58:37Joining us is Matthew Rosenquist, a massively followed thought leader and Top Voice. A renowned CISO, Cybersecurity leader and strategist, we discuss the role of security leadership, cultural differences on data privacy, importance of choosing trustworthy vendors, and how to stop zero day attacks. Send us a text Growth without Interruption. Get pea…
…
continue reading

1
Adepting To Change Bitesize – Episode #1: Fundraising & Adept Socials
16:36
16:36
Play later
Play later
Lists
Like
Liked
16:36Alex & Paul launch a series of quick-fire episodes of the Adepting To Change Bitesize - and this time we’re talking all things charity, community and dragon boat racing! From sponsored step counts to tough mudders, we reflect on what giving back really means at Adept - and how we try to make it fun.By Adept Corporate Services
…
continue reading

1
Making Compliance Simple for MSPs (EP 879)
20:37
20:37
Play later
Play later
Lists
Like
Liked
20:37Are you tired of customers dreading compliance and security talk? In this episode, I chat with Jared Casner of Blacksmith InfoSec, who’s making compliance accessible for every MSP and SMB. Discover their “paint-by-numbers” approach to policy management, seamless ConnectWise integrations, and how their flexible platform creates new revenue streams f…
…
continue reading
CYFIRMA exposes Octalyn Forensic Toolkit, a malicious GitHub-hosted tool masquerading as a legitimate forensic utility. In reality, it functions as a credential stealer with Telegram-based C2, targeting browser data, crypto wallets, Discord, and VPN configs. Built with Delphi and C++, Octalyn enables even low-skilled actors to exfiltrate sensitive …
…
continue reading
Welcome to part 2 of the Cognitive Heist miniseries: The Bait Man 🗝️ He doesn’t pick the lock. 🚪 He doesn’t sneak in the back. 🪝 He just leaves something shiny on the ground and waits for you to pick it up. Enter "The Bait Man": the scammer who lets your own curiosity or greed do all the work. Part 2 of Cognitive Heist explores: 👉 Why bait-based sc…
…
continue reading

1
AP2T Labs: Rethinking Cybersecurity Awareness (EP 878)
23:28
23:28
Play later
Play later
Lists
Like
Liked
23:28In this episode, I get the inside scoop from Reese Tuttle, whose passion for stopping cybercrime is rooted in family and real-world experience. We discuss AP2T Labs’ patent-pending training platform: from social media and business-based attacks to text, voice, and even physical mail scams. Reese details how their “edu moments” and instant feedback …
…
continue reading

1
398. Luck, Loss, and the Long Game.
1:14:07
1:14:07
Play later
Play later
Lists
Like
Liked
1:14:07Send Bidemi a Text Message! In this episode, host Bidemi Ologunde explored a series of aphorisms—nuggets of wisdom about money, status, emptiness, and luck—to see how they play out in the contemporary world. Support the showBy CHIP STORY Media & Rainmaker Podcasts
…
continue reading

1
What Does Your Digital Footprint Say About You?
6:40
6:40
Play later
Play later
Lists
Like
Liked
6:40Before you even walk in the door, people are Googling you. Clients, employers, even potential partners—your digital footprint is your first impression. In this episode of Ask Socialprofiler, we break down what your public social media activity really says about you—and how it’s used to make decisions that affect your life. From deleted posts to wha…
…
continue reading

1
Marketing Muscle Memory In Cybersecurity
1:09:17
1:09:17
Play later
Play later
Lists
Like
Liked
1:09:17This week on The Awareness Angle Interviews, Anthony chats with Lori Steuart—a cybersecurity marketer with a passion for storytelling, content that resonates, and turning awareness from a box-tick into something people actually care about. From synthesisers to password managers, from yoga habits to ransomware planning, Lori brings a refreshingly hu…
…
continue reading

1
7 Cognitive Biases That Destroy Your Situational Awareness
40:24
40:24
Play later
Play later
Lists
Like
Liked
40:24Most people don’t realize how much bias shapes their awareness—until it’s too late. Here’s how to stay sharp, think clearly, and act with purpose. The post 7 Cognitive Biases That Destroy Your Situational Awareness appeared first on Mind4Survival.By Brian Duff
…
continue reading
…
continue reading
Join me and Kip Fanta as we reveal how MSPs can break free from the “vendor” label and become true business partners. Learn why strategic management, AI-powered insights, and a collaborative approach are the keys to thriving in today’s IT landscape. Kip shares how their two-sided platform enables both MSPs and clients to collaborate, capture ideas,…
…
continue reading

1
CYFIRMA Research- Tracking Ransomware- June 2025
4:54
4:54
Play later
Play later
Lists
Like
Liked
4:54Stay ahead with CYFIRMA’s Monthly Ransomware Report – June 2025. June saw 463 ransomware victims globally, a 15% decline from May. Qilin led the threat landscape, exploiting Fortinet flaws and adding legal pressure tactics. New players like Fog and Anubis adopted stealthy, modular toolkits and file-wipers for maximum damage. Emerging groups Teamxxx…
…
continue reading

1
134 Is America Prepared for a Strike Against its Nuclear Command and Control?
41:03
41:03
Play later
Play later
Lists
Like
Liked
41:03In this episode, Adam, Curtis, and Jim review an article suggesting that, following America's successful attack on Iran's nuclear facilities, the U.S. might be unprepared for a strike against its own nuclear arsenal. They discuss the complexities of nuclear deterrence, emphasizing the importance of airborne alert systems, the historical context of …
…
continue reading

1
Root Causes 514: Diary of an Online Firestorm
12:45
12:45
Play later
Play later
Lists
Like
Liked
12:45Tim describes how the addition of an item to the CABF face-to-face meeting agenda blew up into a panicked and outraged online thread. We discuss what a more functional response would have looked like.By Tim Callan and Jason Soroko
…
continue reading

1
AI Is Attacking Healthcare—Social Engineering EXPOSED. (Dr Sergio Sanchez)
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Dr. Sergio Sanchez—former leader and advisor at Apple, The Vatican, Activision and medical doctor—exposes how cybercriminals are using AI in healthcare and AI Social Engineering to clone voices, fake identities, and empty your savings without a trace. But that’s just the beginning… In this mind-blowing episode, we dive into: · The dark side of AI (…
…
continue reading

1
Top 10 Situational Awareness Questions Civilians Are Asking in 2025
22:29
22:29
Play later
Play later
Lists
Like
Liked
22:29In this empowering episode of Red Dot Mindset, we tackle the Top 10 Situational Awareness Questions Civilians Are Asking in 2025 — everything from how to detect if you're being followed, to the best legal self-defense tools, to training your brain for high-stress moments. Drawing from the expertise of Mickey Middaugh, a 24-year U.S. Air Force Secur…
…
continue reading

1
Machines Running Amok: We've Created More Than We Can Secure with Oded Hareven
45:12
45:12
Play later
Play later
Lists
Like
Liked
45:12Machines Running Amok: We've Created More Than We Can Secure Twenty years ago, you could count the servers in your data center. Today, we've unleashed an army of digital entities that's spiraling beyond our control. For every human employee, there are 50-100 machine identities operating in your environment—containers, serverless functions, and auto…
…
continue reading

1
PP070: News Roundup – Scattered Spider Bites MSPs, Microsoft Rethinks Kernel Access, North Koreans Seem Good at Their Illicit Jobs
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03There’s lots of juicy stories in our monthly security news roundup. The Scattered Spider hacking group makes effective use of social engineering to target MSPs, Microsoft pushes for better Windows resiliency by rethinking kernel access policies for third-party endpoint security software, and the US Justice Department files indictments against alleg…
…
continue reading

1
AI Powered QBRs with Strategy Overview (EP 876)
19:55
19:55
Play later
Play later
Lists
Like
Liked
19:55Curious how today’s top MSPs are saving hours on QBRs and strategic planning? Alex Markov of Strategy Overview shares the inside scoop on their AI-powered platform, IT Glue integration, and how real-world feedback drives innovation. Alex reveals the major updates since last year—including automated QBRs with Arya, expanded reporting for Office 365,…
…
continue reading
Summary In this episode of Financially Fluent, Ray Godleski, Cindi Walters, and intern Gavin Truong delve into the intricacies of Roth IRAs. They discuss the fundamental differences between Roth and traditional IRAs, the benefits of Roth IRAs for various age groups, income limits, contribution rules, and withdrawal regulations. The conversation als…
…
continue reading

1
CYFIRMA Research- RENDERSHOCK- Weaponizing Trust in File Rendering Pipelines
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58New Threat Model: Zero-Click Compromise via File Rendering Automation RenderShock introduces a powerful new attack framework that leverages trusted file previewing, indexing, and sync mechanisms to trigger payloads — without exploits, macros, or even opening the file. Key Highlights: Zero-click execution using passive system features. Payloads deli…
…
continue reading

1
Ep: 209: Cleaning Up a Debacle; Clinical Perspectives: Incompetence
39:20
39:20
Play later
Play later
Lists
Like
Liked
39:20Thank you for joining us on “From Destruction to Dignity” with Janice Ponds. She is a mother, author, and free thinker, and as your host, Janice shares her wisdom to enlighten, educate, and advance the culture in America today. Her mission is to provoke thought, bring awareness, and point people towards intervention when needed. As a reminder, this…
…
continue reading

1
Matchmaking for MSPs: Find My IT Partner (EP 875)
23:26
23:26
Play later
Play later
Lists
Like
Liked
23:26Are you tired of chasing cold leads and competing with dozens of MSPs for the same customer? In this episode, I chat with Skofi, the mastermind behind Find My IT Partner, who’s on a mission to reinvent how IT providers and SMBs connect. We talk about the power of curated matches, the importance of trust, and why his platform is more “cyber matchmak…
…
continue reading

1
CYFIRMA Research- GitHub Abused to Spread Malware Disguised as Free VPN
5:19
5:19
Play later
Play later
Lists
Like
Liked
5:19CYFIRMA Research's latest report explores a fake "Free VPN for PC" app hosted on GitHub, delivering a packed DLL payload using obfuscated Base64 hidden in junk strings. It uses P/Invoke to load a hidden DLL, executes GetGameData, and injects into legit processes like MSBuild.exe. Packed, evasive, and anti-debug. Link to the Research Report: https:/…
…
continue reading

1
Life stories from Bangladesh and Colombia
25:48
25:48
Play later
Play later
Lists
Like
Liked
25:48Sometimes, building the future of farming means drawing on centuries-old traditions. Indigenous small-scale farmers can help rural communities around the world forge a new, sustainable path forward. In the second episode of our “Life stories” mini-series, we meet Pallab Chakma from Bangladesh’s Chittagong Hill Tracts and Dayana Domicó from Colombia…
…
continue reading

1
Would You Sell Your Password for $920?
1:14:39
1:14:39
Play later
Play later
Lists
Like
Liked
1:14:39This week on The Awareness Angle, Anthony Davis and Luke Pettigrew dive into a week full of sharp turns—from a teen hacker forcing Microsoft to rethink its bounty program, to hackers hijacking a decades-old video game to take control of PCs. Also in the mix: 64 million job seekers exposed by a single password, suspicious Google Ads requests, Instag…
…
continue reading

1
TBI Recovery & HBOT with Green Beret Wren Murray
46:50
46:50
Play later
Play later
Lists
Like
Liked
46:50Send us a text In this compelling episode of Broken Brains with Bruce Parkman, we’re joined by former U.S. Army Green Beret and co-founder of Revival Hyperbarics, Wren Murray, for a powerful discussion on traumatic brain injury (TBI), PTSD, and the groundbreaking role of hyperbaric oxygen therapy (HBOT) in veteran recovery. Wren shares his deeply p…
…
continue reading

1
Root Causes 513: Is Revocation the Best Remedy for CPS Misalignment?
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21We continue our discussion of CPS misalignment by discussing the reasons for revocation as a remedy, its disadvantages, and the possibility of another solution that provides the same benefits at less cost.By Tim Callan and Jason Soroko
…
continue reading

1
LIVE: They’re Stealing You with AI 😳 | AI Risks to Identity & How to Fight Back
1:27:24
1:27:24
Play later
Play later
Lists
Like
Liked
1:27:24If you manage care about protecting yourself, your loved ones—and your organization-- this episode offers actionable takeaways you can use today. This is part of our official Cyber Crime Junkies podcast series—subscribe wherever you listen! ✅ **Don’t forget to like, subscribe, and hit the bell 🔔.** 💬 Comment your “worst phishing attempt” below—I’ll…
…
continue reading

1
Building a Cybersecurity Mindset: AI, Culture, & Governance Explained
43:43
43:43
Play later
Play later
Lists
Like
Liked
43:43David Mauro and DeWayne Hart explore the critical aspects of building a cyber security mindset, understanding cyber security awareness, internet governance in cyber security, and importance of culture in cybersecurity. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 …
…
continue reading

1
Detained & Damaged: Kids, Cash & the Trump Immigration Machine. A dumpster fire of greed, cruelty & cowardice: The human cost of the relentless, xenophobic attacks on immigrants. Do Trump's policies actually ...
59:59
59:59
Play later
Play later
Lists
Like
Liked
59:59As we rapidly approach another enormous milestone — our 100th episode (currently #98) we’ve e-x-p-a-n-d-e-d our global footprint to 131 countries. ONLY through your unyielding support could this achievement have been realized. Thank you! Immigration is a “3rd rail” hot topic in the U.S. The issues of immigration decided the ’24 presidential electio…
…
continue reading

1
Cognitive Heists series #1: The Insider -- Trust by Proximity, not Proof
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08🕵️♂️ New Deceptive Minds mini-series: Behind the Scams (Cognitive Heists) 🕵️♂️ They didn’t pick the lock. They didn’t sneak in through the vents. You held the door open for them. This week’s issue kicks off a new 10-part series: Cognitive Heist—a deep dive into the psychological exploits behind the world’s most effective social engineering attack…
…
continue reading
Scott Augenbaum, retired FBI Agent in the Cyber Division shares his truths framework about the FBI vs Cyber Crime and the fbi perspective of cyber crime. Topics: fbi perspective of cyber crime, fbi view of cyber crime, explaining the fbi stance on cyber crime, lessons learned from fbi on cyber crime, lessons on cyber crime from fbi, war between the…
…
continue reading

1
Smarter Support: HitWit’s AI Advantage (EP 874)
21:13
21:13
Play later
Play later
Lists
Like
Liked
21:13Get ready for an insightful conversation with Bhadri Varadarajan of HitWit, a PitchIT finalist at IT Nation Connect 2025. We dive into the nuts and bolts of AI-powered knowledge sharing, from onboarding and interactive learning to customer engagement and support. Bhadri explains how HitWit’s platform helps MSPs deliver fast, knowledgeable responses…
…
continue reading