Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Security Engineers Podcasts
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Technical interviews about software topics.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading

1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Host Russ Altman, a professor of bioengineering, genetics, and medicine at Stanford, is your guide to the latest science and engineering breakthroughs. Join Russ and his guests as they explore cutting-edge advances that are shaping the future of everything from AI to health and renewable energy. Along the way, “The Future of Everything” delves into ethical implications to give listeners a well-rounded understanding of how new technologies and discoveries will impact society. Whether you’re a ...
…
continue reading
News and interviews covering all corners of infrastructure, from rail to roads to energy to tunnels and much more, with guests from all around the wide world of civil engineering chatting with NCE news editor Rob Hakimian and the rest of the NCE team
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
From the law enforcement and security organization you’ve never heard of comes a podcast revealing some of the greatest stories in America’s history. Hear from special agents, engineers, technicians, and others who belong to the Diplomatic Security Service as they give Americans insight into what really happened. From the terrorist bombings in East Africa to discovering bugs buried in U.S. embassy walls to dismantling a major sex trafficking network in New York City, listen along as we peel ...
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Your exploration inside Lawrence Livermore National Laboratory. Hear untold stories, meet boundary-pushing pioneers and get unparalleled access to groundbreaking science and technology. From national security challenges to computing revolutions, discover the innovations that are shaping tomorrow, today.
…
continue reading
A podcast that helps us understand human vulnerability and how we can defend against the attacks that exploit us.
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Associate Editor, and Rich Nass, EVP, of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology marketplaces in a light ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
We created Enginears as a place to share Engineering stories and to aid knowledge sharing and discovery into how companies build their products. Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Engineering Influence: The Podcast of America's Engineering and Design Industry
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
We will discuss all things Cloud with an emphasis on Cloud Security.
…
continue reading
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
…
continue reading
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
…
continue reading
Welcome to Shut the Backdoor, brought to you by Redox. Shut The Backdoor is a healthcare security podcast dedicated to keeping health data safe, one episode at a time. Hosted by Jody Maberry and Meghan Mcleod and featuring special guests to discuss the most critical topics for healthcare security.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
The New Stack Podcast is all about the developers, software engineers and operations people who build at-scale architectures that change the way we develop and deploy software. For more content from The New Stack, subscribe on YouTube at: https://www.youtube.com/c/TheNewStack
…
continue reading
Embedded edge with Maurizio is a podcast show hosted by Maurizio Di Paolo Emilio, who talks to both engineers and executives in the embedded systems design and development industry to gain insights into the embedded systems, technologies and products featured in embedded.com.
…
continue reading
This is the official podcast of the Space & Satellite Professionals International. On this channel, we release podcasts in two series: Making Leaders and Better Satellite World. Find out more about SSPI at www.sspi.org
…
continue reading
Join hosts Ned Bellavance and Kyler Middleton as they dive deep into the challenges of DevOps from the perspective of seasoned practitioners. You'll hear from expert guests—technical leaders, trainers, and consultants with years of hands-on experience—discussing the nuances of DevOps. From AWS to Azure, networking to security, automation to modern cloud environments, each weekly episode equips you with the insights to confidently address tech and business challenges such as resilience, cost ...
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
An application technology podcast series with industry engineers that promises to keep you up to speed on some of the embedded semiconductor industry’s newest, fastest-growing and most exciting technologies, applications, and design techniques used by renowned industry engineers. Experience endless episodes packed with entertaining discussion topics that cover the latest ins and outs of embedded systems as well as how to thrive in trending markets while avoiding common design pitfalls and st ...
…
continue reading
Heavy Wireless is a deep dive into Wi-Fi, IoT, wireless security, and more. Host Keith Parsons, CWNE#3, draws on his decades of experience to educate, entertain, and inspire those working in the WLAN industry. Each twice-monthly episode explores an aspect of wireless technology with guests including Wi-Fi engineers, industry experts, and vendors. Whether you're already a WLAN specialist or looking to expand your skills in this high-demand sector of IT, Heavy Wireless gives you the technical ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Explore the cutting-edge world of platform engineering, the backbone of modern software development. The Platform Engineering Show podcast dives into how internal developer platforms (IDPs) are revolutionizing the way teams build, deploy, and manage applications at scale. From streamlining workflows and reducing cognitive load for developers to fostering innovation and enabling seamless collaboration across development, operations, and IT service management (ITSM), we break down the key conc ...
…
continue reading
Welcome to The DevOps Toolchain Show – your go-to podcast for mastering the evolving world of DevOps! Previously known as The TestGuild Performance and SRE Podcast, we dive deep into the latest trends, must-know tools, and cutting-edge techniques shaping modern software delivery. Join industry experts, engineers, and thought leaders as we uncover insights on automation, performance testing, security, CI/CD, AI in DevOps, and everything in between. Whether you're a DevOps practitioner, SRE, o ...
…
continue reading

1
SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln;
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44 Bluetooth Vulnerability Could Allow Eavesdropping A vulnerability i…
…
continue reading

1
SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln; (#)
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln; Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-coul…
…
continue reading

1
Inside the 16 Billion Credential Leak: The Infostealer Engine Behind the Biggest Breach Yet
54:27
54:27
Play later
Play later
Lists
Like
Liked
54:27In this episode, we break down the true scale and mechanics behind the largest credential leak ever recorded—over 16 billion login credentials, most of them exfiltrated by infostealer malware. We dive into how this happened: from the malware-as-a-service (MaaS) model enabling even low-skill threat actors to deploy powerful stealers, to how credenti…
…
continue reading

1
Ep. 279 - Security Awareness Series - Dodging Turkeys and Security Awareness with Stacey Edmonds REPLAY
36:52
36:52
Play later
Play later
Lists
Like
Liked
36:52REPLAY (Original Air Date Oct 21, 2024) Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Stacey Edmonds. Stacey is a multi-disciplinary EdTech innovator and Digital Safety Pioneer, driven by a commitment to democratizing knowledge. Stacey's expertise, encompassing social science, education, EdTech, and multi-p…
…
continue reading

1
Engineering in the Age of AI: Navigating Infrastructure and Security
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44Join us on this episode of Engineering Influence, brought to you by the American Council of Engineering Companies, as we explore the rapidly evolving landscape of the engineering industry. Coming to you from our annual convention in Washington, D.C., we sat down with Nick Decker, Director of Engineering for Egnyte, to discuss transformative trends …
…
continue reading

1
Infinity Systems Engineering: Mission Operations & Space Systems
19:29
19:29
Play later
Play later
Lists
Like
Liked
19:29Amanda Woollard Lujan, Technical Recruiter at Infinity Systems Engineering, shares that going the extra mile—like writing handwritten thank-you notes—can really set you apart in the cleared job hunt. She highlights Infinity’s work in mission operations and space systems and their global opportunities. Amanda also emphasized the importance of networ…
…
continue reading

1
ByteDance’s Container Networking Stack with Chen Tang
47:57
47:57
Play later
Play later
Lists
Like
Liked
47:57ByteDance is a global technology company operating a wide range of content platforms around the world, and is best known for creating TikTok. The company operates at a massive scale, which naturally presents challenges in ensuring performance and stability across its data centers. It has over a million servers running containerized applications, an…
…
continue reading
Please enjoy this encore of Word Notes. A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. CyberWire Glossary link: https://thecyberwire.com/glossary/bsimm Audio reference link: “OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Dec…
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike.
41:25
41:25
Play later
Play later
Lists
Like
Liked
41:25Please enjoy this encore of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a buil…
…
continue reading

1
Russia’s 16KB Curtain: Cloudflare Throttling and the Future of the RuNet
1:45:31
1:45:31
Play later
Play later
Lists
Like
Liked
1:45:31Russia has entered a new phase of digital authoritarianism. In a sweeping move, Russian Internet Service Providers (ISPs) have begun systematically throttling access to Cloudflare and other Western-backed services, including infrastructure giants Hetzner and DigitalOcean. This throttling is so severe that it restricts downloads to just 16 kilobytes…
…
continue reading
David Singleton says coding agents have crossed a chasm, Anton Zaides explains how SWEs should approach the “squeeze”, Matt Duggan has ideas for Kubernetes 2.0, Sean Goedecke does a nice job elucidating the coding agent commoditization, and one more good reason to write, even though it’s hard. View the newsletter Join the discussion Changelog++ mem…
…
continue reading

1
Ahold Delhaize Data Breach: 2.2 Million Employee Records Exposed
37:44
37:44
Play later
Play later
Lists
Like
Liked
37:44Ahold Delhaize, one of the world’s largest food retailers, is now the subject of one of the most significant ransomware breaches in recent U.S. history. Affecting over 2.2 million current and former employees, this incident—claimed by the cybercrime group INC Ransom—highlights the rising threat posed by ransomware-as-a-service operations targeting …
…
continue reading

1
Why Canada Banned Hikvision: National Security vs. Geopolitics
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07Canada has taken a definitive stance in the escalating global scrutiny of Chinese technology, ordering surveillance giant Hikvision to cease all operations within its borders. Citing national security concerns and acting on the advice of intelligence agencies, the Canadian government has banned the use of Hikvision products across its public sector…
…
continue reading

1
Scattered Spider Takes Flight: Inside the Cybercrime Group’s Move into Aviation
43:38
43:38
Play later
Play later
Lists
Like
Liked
43:38As the aviation industry becomes more digitally interconnected, its exposure to sophisticated cyber threats continues to grow. One of the most dangerous actors in this space—Scattered Spider, a financially motivated and technically skilled cybercrime group—has recently shifted its focus to target the aviation sector. With recent incidents involving…
…
continue reading

1
Tabletop Exercises 2.0: How OpsBook Is Changing the Game
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36What happens when your carefully crafted incident response playbook becomes worthless? Cody Sullivan from OpsBook reveals the brutal truth about tabletop exercises: most organizations are practicing with medieval armor for a drone war. From 70-participant, 6-hour exercises spanning three continents to the harsh reality of insider threats, this conv…
…
continue reading

1
83-Talking Cloud Podcast-with Boaz Barzel, Field CTO at Ox.Security
49:32
49:32
Play later
Play later
Lists
Like
Liked
49:32Summary In this episode of Talking Cloud, I catch up with Boaz Barzel, the field CTO at Ox Security. We discuss the complexities of application security, the evolution of security practices in the age of AI, and the challenges organizations face with alert fatigue. We explore the importance of integrating security into the development process and t…
…
continue reading

1
Ep. 250 - Human Element Series - Rationalize Minimalize and Project with Agent Brad Beeler REPLAY
43:45
43:45
Play later
Play later
Lists
Like
Liked
43:45REPLAY (Original Air Date March 11, 2024) Today we are joined by Agent Brad Beeler. Assistant to the Special Agent in Charge Brad Beeler has been with the United States Secret Service for the past 25 years. He currently serves as instructor and Secret Service liaison at the National Center for Credibility Assessment (NCCA) at Fort Jackson, South Ca…
…
continue reading

1
SANS Stormcast Monday June 30th, 2025: Scattered Spider; AMI BIOS Exploited; Secure Boot Certs Expiring; Microsoft Resliliency Initiative
7:29
7:29
Play later
Play later
Lists
Like
Liked
7:29Scattered Spider Update The threat actor known as Scattered Spider is in the news again, this time focusing on airlines. But the techniques used by Scattered Spider, social engineering, are still some of the most dangerous techniques used by various threat actors. https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-…
…
continue reading

1
SANS Stormcast Monday June 30th, 2025: Scattered Spider; AMI BIOS Exploited; Secure Boot Certs Expiring; Microsoft Resliliency Initiative (#)
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30SANS Stormcast Monday June 30th, 2025: Scattered Spider; AMI BIOS Exploited; Secure Boot Certs Expiring; Microsoft Resliliency Initiative Scattered Spider Update The threat actor known as Scattered Spider is in the news again, this time focusing on airlines. But the techniques used by Scattered Spider, social engineering, are still some of the most…
…
continue reading

1
Pedro Umbelino on Exploiting ATG Devices in Fuel Storage
27:14
27:14
Play later
Play later
Lists
Like
Liked
27:14Pedro Umbelino, Principal Research Scientist at Bitsight Technologies, joins the Nexus Podcast to discuss his team's research into Automatic Tank Gauge (ATG) systems and how they uncovered 11 vulnerabilities in ATGs manufactured by five different vendors. ATG systems are an industrial control system that monitors fuel levels inside storage tanks, i…
…
continue reading

1
Fortnite and the FTC: How Epic Games Misled Players into Unwanted Purchases
54:56
54:56
Play later
Play later
Lists
Like
Liked
54:56In a landmark case that reshapes the conversation around digital ethics, the Federal Trade Commission’s $520 million settlement with Epic Games over its Fortnite monetization tactics highlights a critical issue facing the modern digital economy: the weaponization of interface design to manipulate users. Central to the case is the use of “dark patte…
…
continue reading

1
Let's build something phoenix.new (Friends)
1:35:31
1:35:31
Play later
Play later
Lists
Like
Liked
1:35:31Our old friend Chris McCord, creator of Elixir’s Phoenix framework, tells us all about his new remote AI runtime for building Phoenix apps. Along the way, we vibe code one of my silly app ideas, calculate all the money we’re going to spend on these tools, and get existential about what it all means. Join the discussion Changelog++ members save 4 mi…
…
continue reading

1
Microsoft 365 Direct Send Exploited: How Phishing Emails Masquerade as Internal Messages
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44Phishing has long been a favored weapon of cybercriminals, but a recent revelation about Microsoft 365’s Direct Send feature has elevated the threat to a new level—from inside the firewall. Designed for internal systems to send notifications without authentication, Direct Send can be abused by malicious actors to spoof emails that appear to origina…
…
continue reading
DevSecOps generates a lot of data valuable for better decision making. However, decision makers may not see all they need to in order to make best use of the data for continuous improvement. The SEI open source Polar tool unlocks the data, giving DevSecOps teams greater capability to automate, which in turn means they can innovate rapidly – without…
…
continue reading

1
AI: The Unexpected Collaboration Catalyst
16:26
16:26
Play later
Play later
Lists
Like
Liked
16:26Welcome to the latest episode of the Engineering Influence podcast, where we delve into the transformative role of artificial intelligence in the AEC industry. Hosted by Allison Schneider, this episode features insightful discussions with Rachelle Ray and Jeff Visnic, who explore how AI is reshaping communication, workflow, and collaboration. Disco…
…
continue reading

1
Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Risk
47:26
47:26
Play later
Play later
Lists
Like
Liked
47:26A critical flaw in the Open VSX Registry—an open-source alternative to the Visual Studio Code Marketplace—recently put over 8 million developers at risk of mass compromise. This vulnerability, discovered in the platform’s GitHub Actions workflow, exposed a super-admin publishing token that could have enabled malicious actors to overwrite or inject …
…
continue reading

1
When vibe coding goes viral (Interview)
1:11:06
1:11:06
Play later
Play later
Lists
Like
Liked
1:11:06Chris Anderson joins the show. You may recognize Chris from the early days of CouchDB and Couchbase. Back when the world was just waking up to NoSQL, Chris was at the center of it all, shaping how developers think about data distribution and offline-first architecture. These days, Chris is working on Vibes.diy and Fireproof — tools that make one-sh…
…
continue reading
Summer is in full swing and we hope you are enjoying it with family and friends. As we spend more time outdoors, it’s an opportune moment to revisit a conversation we had with Zakia Rahman, a dermatologist who shared a number of helpful measures we can take to care for our skin. She reminds us that skincare is about more than vanity — it’s about vi…
…
continue reading

1
CitrixBleed 2: Critical NetScaler Vulnerability Enables Session Hijacking and MFA Bypass
18:41
18:41
Play later
Play later
Lists
Like
Liked
18:41A new critical vulnerability in Citrix NetScaler ADC and Gateway systems, dubbed CitrixBleed 2 (CVE-2025-5777), has emerged as a serious threat to remote access infrastructure. This memory exposure flaw allows unauthenticated attackers to extract session tokens directly from device memory — enabling session hijacking and even bypassing multi-factor…
…
continue reading

1
OneClik Cyberattack Campaign Targets Energy Sector Using Microsoft ClickOnce and AWS
1:18:25
1:18:25
Play later
Play later
Lists
Like
Liked
1:18:25A sophisticated cyber-espionage campaign named OneClik is actively targeting energy, oil, and gas organizations using a combination of legitimate cloud infrastructure and novel attack techniques. The campaign, attributed to an unknown but likely state-affiliated actor, leverages Microsoft's ClickOnce deployment technology to deliver custom Golang-b…
…
continue reading

1
Better Satellite World: The Road Less Traveled, Season 2, Episode 3 - Joining Spirituality with Space Exploration
22:39
22:39
Play later
Play later
Lists
Like
Liked
22:39In the second season of The Road Less Traveled series, guest host Lou Zacharilla speaks with people whose lives and work inspire us because they walk “the road less traveled,” the one leading us to a wider view of space, satellites and our quest for the dwelling of light we call “The Truth.” This episode features a conversation with Justin Park, en…
…
continue reading

1
Central Kentucky Radiology’s 2024 Data Breach Affects 167,000
51:40
51:40
Play later
Play later
Lists
Like
Liked
51:40In October 2024, Central Kentucky Radiology (CKR), a Lexington-based imaging provider, became the latest victim of a growing trend in healthcare cyberattacks. An unauthorized actor accessed CKR’s systems over a two-day period, compromising sensitive data for approximately 167,000 individuals. The stolen information includes names, Social Security n…
…
continue reading

1
RGC, Not GRC: Why Risk Comes First ft Ricky Waldron
1:19:19
1:19:19
Play later
Play later
Lists
Like
Liked
1:19:19What if compliance wasn't just about passing audits—but about building trust from the ground up? In this powerful episode of Security & GRC Decoded, Raj sits down with Ricky Waldron, Director of Security Audit & GRC at Navan, whose GRC experience spans tech giants like Microsoft, Disney, Oracle, and Smartsheet. Ricky shares how GRC is evolving into…
…
continue reading

1
Bonfy.AI Launches $9.5M Adaptive Content Security Platform to Govern AI and Human Data
1:09:30
1:09:30
Play later
Play later
Lists
Like
Liked
1:09:30In a major development at the intersection of cybersecurity and AI governance, Israeli startup Bonfy.AI has officially launched its adaptive content security platform, backed by $9.5 million in seed funding. The company’s mission is bold and timely: to secure content generated by both humans and AI across modern SaaS ecosystems — including high-ris…
…
continue reading

1
Zero-Day Level Cisco ISE Flaws: Urgent Patch Required for Enterprise Security
54:30
54:30
Play later
Play later
Lists
Like
Liked
54:30Cisco has disclosed two critical security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products, both earning a maximum CVSS severity score of 10.0. These flaws—CVE-2025-20281 and CVE-2025-20282—allow unauthenticated remote attackers to execute arbitrary commands on the underlying operating syst…
…
continue reading

1
OpenAI for Government & 5G Smart Manufacturing
38:17
38:17
Play later
Play later
Lists
Like
Liked
38:17Send us a text In this episode of Embedded Insiders, Editor-in-Chief Ken Briodagh dives into the transformative role of AI in Smart Manufacturing and the impact of 5G connectivity on enterprise operations with Telit Cinterion’s Bill Dykas, Senior Product Line Manager, and Stan Gray, SVP of IoT Broadband and High Cat Vertical Sales. But first, Rich,…
…
continue reading

1
WayForward Games with Tomm Hulett and Voldi Way
46:03
46:03
Play later
Play later
Lists
Like
Liked
46:03WayForward is a renowned video game studio that was founded in 1990. The company has developed games for publishers such as Capcom, Konami, and Nintendo and has released their games across major hardware platforms from the last 35 years. They are also the creators of the Shantae series of 2D platformers. WayForward recently developed the latest gam…
…
continue reading

1
What IT Leaders Can Learn from How the Government Buys Tech
44:04
44:04
Play later
Play later
Lists
Like
Liked
44:04IT leaders in regulated industries know the pain of navigating outdated, slow procurement systems – especially when critical missions depend on modern tools. In this episode, Bryana Tucci, Lead of the AWS Marketplace for the US Intelligence Community, shares how government agencies are overcoming legacy procurement bottlenecks to access cutting-edg…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from listener Abdussobur, who wonders if…
…
continue reading

1
SANS Stormcast Thursday, June 26th, 2025: Another Netscaler Vuln; CentOS Web Panel Vuln; IP Based Certs
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 Remote code execution in CentOS Web Panel - CVE-2025-48703 An arbitrary file upload vulnerab…
…
continue reading