Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Experts Podcasts

show episodes
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
The Wargame

Sky News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Russia knows our weaknesses. But do you? A major five-part series from Sky News and Tortoise which imagines how a Russian attack on the UK could play out – and invites real-life former ministers, military chiefs and other experts to figure out how to defend the country. Written and presented by Sky News' security and defence editor, Deborah Haynes. This is Deborah's second podcast series for Sky News. In her first series, Into The Grey Zone, Deborah explores the murky evolution of warfare. W ...
  continue reading
 
Artwork

1
SpyTalk

SpyTalk, Jeff Stein

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
  continue reading
 
Artwork

4
Verdict with Ted Cruz

Premiere Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Join Senator Ted Cruz and co-host Ben Ferguson as they break down the most important news stories of the day and reveal what they mean for you. On "Verdict with Ted Cruz,” you will go behind the scenes of the political debates that define our country. "Verdict with Ted Cruz" is being brought to you by Jobs, Freedom, and Security PAC, a political action committee dedicated to supporting conservative causes, organizations, and candidates across the country. In 2022, Jobs, Freedom, and Security ...
  continue reading
 
On Mondays, Jon Stewart hosts The Daily Show, but on Thursdays, he's back in your ears with The Weekly Show -- a podcast featuring in-depth conversations with a range of special guests. From experts and advocates, to stakeholders and thought leaders, we discuss the challenges, changes, and ideas that are shaping our world.
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Artwork

1
Socializing Security

Socializing Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
  continue reading
 
Artwork

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
  continue reading
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Artwork

1
Engaging Experts

Round Table Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
After 25 years helping litigators find the right expert witnesses, Round Table Group’s network contains some of the world’s greatest experts. On this podcast, we talk to some of them about what’s new in their field of study and their experience as expert witnesses.
  continue reading
 
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Artwork

1
Unspoken Security

Unspoken Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
  continue reading
 
Artwork

1
Cloud Security Podcast

Cloud Security Podcast Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
  continue reading
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
Artwork

1
Citation Needed

Citation Needed Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we’re experts. Because this is the internet, and that’s how it works now.
  continue reading
 
Artwork
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Welcome to The Peter Zeihan Podcast Series! Geopolitical Strategist Peter Zeihan is a global energy, demographic and security expert. If you want to stay informed on the realities of geography and populations, you've come to the right place. Zeihan's worldview offers insights into how global politics impact markets and economic trends, helping industry leaders navigate today’s complex mix of geopolitical risks and opportunities. Expect a forward-looking approach to what will drive tomorrow’s ...
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 18:00 UTC.
  continue reading
 
Artwork

1
8th Layer Insights

Perry Carpenter | N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
  continue reading
 
Artwork

1
Technology and Security

Dr Miah Hammond-Errey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
  continue reading
 
Artwork

1
CyberSound™

CyberSound Podcast by Vancord

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork

1
International SOS

International SOS

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The International SOS Situation Update podcast provides the latest analysis, advice and recommendations on the health and security risks impacting you and your organisation today. With support from our global medical and security experts, we discuss the most pertinent topics impacting a workforce and provide tactical guidance on mitigating health, safety, security and wellbeing risks.
  continue reading
 
Loading …
show series
 
This extended transcript captures a dynamic online discussion, primarily featuring a central host and several participants. The conversation spans various topics, initially focusing on technical issues with the hosting platform as participants are repeatedly removed or experience audio problems. This leads to a playful, yet somewhat frustrated, inv…
  continue reading
 
From July 23, 2024: Alan Rozenshtein, Associate Professor at the University of Minnesota Law School and Senior Editor at Lawfare, and Matt Perault, the Director of the Center on Technology Policy at the University of North Carolina at Chapel Hill, sat down with Alexander Macgillivray, known to all as "amac," who was the former Principle Deputy Chie…
  continue reading
 
🏛️ Final Six Victories in the Bill: Spectrum Auction Authority – Releasing 800 MHz of government-held spectrum to the private sector, expected to generate $100 billion and create hundreds of thousands of jobs. Air Traffic Control Modernization – $12.5 billion investment to upgrade outdated systems. Space Exploration – $10 billion for NASA’s Artemis…
  continue reading
 
Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, David Moulton speaks with Sam Rubin and Kristopher Russo from Unit 42 about the resurgence of the threat group also known as Scattered Spi…
  continue reading
 
International law enforcement arrest the suspected operator of a major Russian dark web cybercrime forum. DHS is said to be among the agencies hit by the Microsoft SharePoint zero-day. The Fire Ant cyberespionage group targets global enterprise infrastructure. A Steam game is compromised to distribute info-stealing malware. Mitel Networks issues se…
  continue reading
 
📞 The Call Is Coming from Inside Your Mind Welcome to #3 of the "Cognitive Heists" series. The Voice in Your Head -- Authority, Audio Deepfakes, and the Power of a Familiar Voice In 2019, a UK energy firm received a call. The voice on the other end sounded exactly like the CEO of their German parent company. The request? Transfer €220,000 immediate…
  continue reading
 
We’re less than 1 week away from our next Live Q&A for the Analyst members on Patreon! Join us on Wed, July 30 at 12PM ET. Join the Patreon here: https://www.patreon.com/PeterZeihan Join the Analyst Tier in July and we'll donate your membership fees to MedShare. More info on MedShare here: https://www.medshare.org/disruptions-in-humanitarian-aid-ze…
  continue reading
 
Janet Egan, Senior Fellow with the Technology and National Security Program at the Center for a New American Security; Jessica Brandt, Senior Fellow for Technology and National Security at the Council on Foreign Relations; Neil Chilson, Head of AI Policy at Abundance Institute; and Tim Fist, Director of Emerging Technology Policy at the Institute f…
  continue reading
 
1. Tulsi Gabbard’s Allegations Against the Obama Administration Gabbard released a report alleging that President Obama and senior intelligence officials knowingly fabricated the Russia-Trump collusion narrative. Claims include deliberate misinformation, suppression of contrary intelligence, and coordination with media to undermine Donald Trump’s p…
  continue reading
 
Dan Moren joins Mikah Sargent for this episode of Tech News Weekly! A zero-day bug was discovered in Microsoft's SharePoint. T-Mobile's new satellite texting service, T-Satellite. Apple announces AppleCare One. And Meta's Reality Labs published new papers on the latest advancements in its wrist-based controllers. Mikah shares details about the zero…
  continue reading
 
We chat with Material Security about protecting G Suite and MS365. How else are you monitoring the most commonly used cloud environments and applications? In the security news: Google Sues Badbox operators Authenticated or Unauthenticated, big difference and my struggle to get LLMs to create exploits for me Ring cameras that were not hacked Malicou…
  continue reading
 
The White House unveils its plan for global AI dominance. Microsoft warns that recent SharePoint server exploitation may extend to ransomware. A phishing campaign targeting the U.S. Department of Education’s grants portal. The FBI issues a warning about “The Com” cybercriminal group. SonicWall urges users to patch a critical vulnerability. A new su…
  continue reading
 
Meet my friends, Clay Travis and Buck Sexton! If you love Verdict, the Clay Travis and Buck Sexton Show might also be in your audio wheelhouse. Politics, news analysis, and some pop culture and comedy thrown in too. Here’s a sample episode recapping four Thursday takeaways. Give the guys a listen and then follow and subscribe wherever you get your …
  continue reading
 
Special Agent Mike Feinberg tells how he was forced out in Kash Patel’s wholesale purge of FBI officials suspected of disloyalty to Trump. Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk on Twitter: https://twitter.com/talk_spy Subscribe to SpyTalk on Substack…
  continue reading
 
In this episode of Unspoken Security, host AJ Nash speaks with Dr. Peter Garraghan, CEO and CTO of Mindgard. They discuss the real-world security risks of artificial intelligence. Peter starts with a simple point: AI is just software, and software is easy to break. He urges businesses using AI to step back and truly understand its vulnerabilities. …
  continue reading
 
We’re excited to announce our next Live Q&A for the Analyst members on Patreon on Wed, July 30! Join the Analyst Tier in July and we'll donate your membership fees to MedShare. Join the Patreon here: https://www.patreon.com/PeterZeihan More info on MedShare here: https://www.medshare.org/disruptions-in-humanitarian-aid-zeihan/ Full Newsletter: http…
  continue reading
 
For today's episode, Senior Editor Scott R. Anderson is sharing more of the conversations he had with leading policy experts and practitioners on the margins of this year's Aspen Security Forum, which took place last week. First, he is joined by Ali Nazary, the head of foreign relations for the National Resistance Front of Afghanistan, to discuss t…
  continue reading
 
Highlights from this episode: - Bigger, Longer Research - Night Shifts - 100 Miles of New Brunswick Coastline - Florida! Intro and outro music by Doctor Turtle Sponsored by The National Association of Innovative Lighting Distributors visit https://naild.org/ Headlines and Sources can be found at https://RestoringDarkness.com…
  continue reading
 
Criminal Referral and Allegations Against Obama: Tulsi Gabbard claims that Obama has been referred to the Department of Justice for a criminal investigation. She accuses the Obama administration of manufacturing intelligence to falsely suggest Russian interference in the 2016 election to benefit Trump. Intelligence Community Assessment (ICA): Gabba…
  continue reading
 
As Trump's pressure campaigns target universities, media outlets, and private companies, Jon is joined by former US Attorney Preet Bharara, host of "Stay Tuned with Preet," and Dan Pfeiffer, co-host of "Pod Save America" and author of "Message Box." Together, they examine the tools available to presidents to coerce independent institutions, explore…
  continue reading
 
Is America retreating from global leadership? Is this just a temporary wave of tension in the bilateral relationship, or might it signal a broader, long-term shift? Are the current AUKUS debates in Australia cutting through in the US? In this episode, John Blaxland joins David Andrews to discuss Australia’s relationship with the US, and why he beli…
  continue reading
 
The National Nuclear Security Administration was among the organizations impacted by the SharePoint zero-day. Experts testify before congress that OT security still lags.The FBI warns healthcare and critical infrastructure providers about Interlock ransomware. New York proposes new cybersecurity regulations for water and wastewater systems along wi…
  continue reading
 
In this illuminating episode, we explore the hidden side of human history: the night. Dr. Nancy Gonlin, professor of anthropology at Bellevue College, joins us to discuss her pioneering work in the Archaeology of the Night. Learn how ancient cultures navigated darkness, how modern lighting is disrupting our biology and making us sick, and why night…
  continue reading
 
Does the United States need a new playbook — or just fewer plays? In this charged episode, big ideas collide over how to sequence American power across the Middle East, Europe, and the Indo-Pacific. Ryan is joined by A. Wess Mitchell (Marathon Initiative), Stacie Pettyjohn (Center for a New American Security), and Justin Logan (Cato Institute) for …
  continue reading
 
Moving Day was a tradition in New York City dating back to colonial times and lasting until after World War II. On February 1, sometimes known as "Rent Day", landlords would give notice to their tenants what the new rent would be after the end of the quarter,[1] and the tenants would spend good-weather days in the early spring searching for new hou…
  continue reading
 
We’re excited to announce our next Live Q&A for the Analyst members on Patreon on Wed, July 30! Join the Analyst Tier in July and we'll donate your membership fees to MedShare. Join the Patreon here: https://www.patreon.com/PeterZeihan More info on MedShare here: https://www.medshare.org/disruptions-in-humanitarian-aid-zeihan/ Full Newsletter: http…
  continue reading
 
Send us a text "I spent 10 years living in the shadows — now I stand in the light to lead, and to show others it’s possible." — Hayley Elvins on the journey from covert roles to visible leadership Episode Summary: In this episode of The Security Circle, we sit down with Hayley Elvins — Managing Director of Sloan Risk Group, Director at the Security…
  continue reading
 
How do we get security right? The answer varies by many factors, including industry, what you're trying to protect, and what the C Suite and Board care about. Khaja Ahmed, Advisor at CISO Forum, joins Business Security Weekly to discuss how to get consensus on your security program. CISOs, executives, and the Board need to be aligned on the risks a…
  continue reading
 
For today's episode, Lawfare Senior Editor Scott R. Anderson shares some of the conversations he had with leading policy experts and practitioners on the margins of this year's Aspen Security Forum, which took place last week. First he sat down Shashank Joshi, the Defence Editor for The Economist to discuss the new dynamics surrounding European sec…
  continue reading
 
🔥 1. Hunter Biden’s Interview and Political Commentary The episode opens with a critical discussion of a recent, controversial interview with Hunter Biden, in which he allegedly expresses anger at Democratic elites and hints at a potential presidential run. Cruz and Ferguson mock the interview, describing it as a “meltdown” and using it to criticiz…
  continue reading
 
Bypassing all passkey protections. The ransomware attacks just keep on coming. Cloudflare capitulates to the MPA and starts blocking. The need for online age verification is exploding. Microsoft really wants Exchange Servers to subscribe. Russia (further) clamps down on Internet usage. The global trend toward more Internet restrictions. China can i…
  continue reading
 
Bypassing all passkey protections. The ransomware attacks just keep on coming. Cloudflare capitulates to the MPA and starts blocking. The need for online age verification is exploding. Microsoft really wants Exchange Servers to subscribe. Russia (further) clamps down on Internet usage. The global trend toward more Internet restrictions. China can i…
  continue reading
 
Donatello, SharePoint, CrushFTP, WordPress, Replit, AllaKore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.darkreading.com/threat-intelligence/matanbuchus-loader-ransomware-infections This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Visit https://ww…
  continue reading
 
A $10 billion fraud vector is currently exploiting a common feature in many cloud-native applications: the SMS verification flow. This isn't a traditional breach. Instead of stealing data, adversaries use bots to trigger costs that are quietly absorbed into your company's operational budget, often showing up as an inflated cell phone or marketing b…
  continue reading
 
Confusion persists over the Microsoft Sharepoint zero-days. CrushFTP confirms a zero-day under active exploitation. The UK government proposes a public sector ban on ransomware payments. A new ransomware group is using an AI chatbot to handle victim negotiations. Australia’s financial regulator accuses a wealth management firm of failing to manage …
  continue reading
 
In this powerful and heartfelt episode of Simply Offensive, Phillip Wylie is joined by Joe Brinkley, better known as The Blind Hacker, Founder of the DeadPixelSec community and a seasoned offensive security professional. Joe shares his journey from sysadmin to red teamer, his philosophy on mentorship, and candid insights on burnout in cybersecurity…
  continue reading
 
We're back with a brand-new season of Random but Memorable! ✨🎉 We’re kicking things off with our highly requested productivity special — an hour jam packed with tips, tricks, and time-saving strategies to help you get the most out of 1Password. 1Password’s Allie Dusome joins the show to share her favorite keyboard shortcuts and lesser-known feature…
  continue reading
 
Send us a text What does it take to turn a post-industrial city into an AI-ready innovation hub? In this episode of CyberSound, we’re joined by Jeff Auker, Director of Development Services for the City of Hartford, to talk about how the city is reshaping its future, one workforce investment at a time. From transforming a decaying facility into a co…
  continue reading
 
Paul Mote, Vice President, Solutions Architects at Synack, discusses if we're ready to embrace AI in a world of ever-evolving threats. Who will AI help more, attackers or defenders? TIMESTAMPS: 00:35 - What is a solutions architect? 02:56 - Advancing threats 13:32 - Are we ready to embrace AI? 20:58 - What’s real, what’s not? 25:03 - Find Paul Mote…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play