Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Security Management Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Hosted by Product School Founder & CEO Carlos Gonzalez de Villaumbrosia, The Product Podcast features candid conversations with product management executives from the world's best tech companies like Google, Meta, Netflix, Airbnb, and Amazon. New episodes release weekly, unveiling actionable frameworks, unconventional best practices, and real-world examples you can implement immediately. Perfect for senior product managers, directors, and VPs hungry to build better products, stronger teams, ...
…
continue reading
Soterion’s SAP Security & GRC podcast with host Dudley Cartwright, helping you on your journey to effective access risk management in SAP.
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Teaching you all about IRAs & Roth IRAs, employer retirement plans, taxes, Social Security, Medicare, portfolio withdrawal strategies, annuities, estate planning and much more!
…
continue reading
Podcast by Alex Wood & Robb Reck
…
continue reading
Two CISOs and a security-minded friend discuss and debate topics of security and privacy, with a focus on looking at the topic from various angles, both that they support and those they don't. Sign up for our newsletter to be notified when new episodes drop, or when new projects are announced https://newsletter.greatsecuritydebate.net
…
continue reading
Helping listeners within 5 years of retirement invest wiser and retire better, as we discuss key financial topics like investing, retirement planning, behavioral finance, taxes, Social Security, Medicare, and more.
…
continue reading
Welcome to Secured Steps, the podcast where Jeff Llewellyn of Rockwood Wealth Management helps families confidently navigate the financial planning journey for individuals with special needs. Each episode features expert insights and real conversations with advocates, professionals, and families from the special needs community—because every family deserves a secure path forward. This podcast is intended for educational purposes only and should not be construed as investment, tax, or legal a ...
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading
Ctrl+Alt+Azure offers weekly conversations on Microsoft Azure, cloud strategy, security, identity, and generative AI - focused on what matters for architects, developers, CIOs, and CISOs. Hosted by industry experts Tobias Zimmergren and Jussi Roine.
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Each episode we discuss industry trends, talk about new technologies, and speak to industry experts. All so that you, The Modern Hotelier, can succeed in a new age of hospitality.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We're going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject's benefit or ju ...
…
continue reading
Guard Street is a leading holistic cybersecurity provider, specializing in world-class proactive and emergency solutions. As a boutique, we are dedicated to assisting clients with information security risk management which includes risk quantification, compliance across many frameworks, penetration tests and the ability to predict, prevent, detect and respond to security incidents in a fast-moving, distributed landscape.
…
continue reading
The LP Magazine podcast keeps loss prevention professionals, security staff, and retail management up-to-date on important information and best practices for your business and career. Each episode features insights from retail loss protection, asset protection, law enforcement and more.
…
continue reading
News, views, and insights into the cybersecurity realm produced by Greg Johnson, CEO of Webcheck Security. www.webchecksecurity.com
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Proposal Manager Podcast contains a wealth of information about all things related to the public sector bidding process. From the C-Suite to a GovCon newbie, this show has something for everyone. Each episode will discuss topics related to government business development, capture, and proposal management.
…
continue reading
Device management is complex. Security threats are constant. Apple ecosystems are evolving fast. Who's managing these challenges? What does it actually take? And most importantly, how do you stay ahead? Welcome to Jamf After Dark, where IT leaders, security professionals and Apple experts tackle the real issues facing organisations today. Join our hosts as they uncover what works, what doesn't, and how to build technology strategies that actually stick. Hear honest conversations about managi ...
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Great security solution are designed from the ground up.. Secured by Design is a podcast where Santosh shares practical insights, frameworks, and perspectives on identity security and other aspects of cybersecurity. Each episode breaks down complex concepts into actionable ideas for professionals protecting digital identities, designing secure systems, and leading security initiatives. Because true security is built and not bolted on...
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
A regular conversation with those at the convergence of data privacy, data security, data regulation, records, and governance.
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Aging isn't easy. My name is Marcy Backhus and I am your host! Make sure your complete well-being is handled with a community and information that can make it easier and FUN. Aging needs humor, which you can find in the "Aging ain't for Sissies" Podcast, along with informational guests that give us the information we need.
…
continue reading
Are you ready to explore the future of cybersecurity? Join us on Cyber Talks by Devoteam the videocast where industry experts, thought leaders, and practitioners share their insights, experiences, and strategic perspectives. Hosted by Rui Shantilal, VP of Devoteam Cyber Trust, each episode delves into key cybersecurity topics—from Offensive Security and DORA Compliance to Third-Party Risk Management and IAM. Whether you're a seasoned security leader, a CISO navigating complex challenges, or ...
…
continue reading
Produced by Products That Count, a 501(c)3 nonprofit that helps everyone build great products, this podcast is an award-winning show by and for product minds, with millions of downloads and a 5-star rating on most major platforms. Each of the 300+ episodes features a product leader interviewing another product leader and exploring what it takes to build great products. Recent ones feature the Chief Product Officers of Brex, Glassdoor, Experian and more. About Us: Products that Count is a 501 ...
…
continue reading
1
Unlocking the Future of Customer Identity Management
22:16
22:16
Play later
Play later
Lists
Like
Liked
22:16Summary In this episode of 'Secured by Design', we delve into Customer Identity and Access Management (CIAM), exploring its significance in enhancing customer experiences while ensuring security and privacy. The discussion highlights the digital experience gap, the differences between CIAM and traditional IAM, and the core concepts that underpin ef…
…
continue reading
1
EP254 Escaping 1990s Vulnerability Management: From Unauthenticated Scans to AI-Driven Mitigation
31:14
31:14
Play later
Play later
Lists
Like
Liked
31:14Guest: Caleb Hoch, Consulting Manager on Security Transformation Team, Mandiant, Google Cloud Topics: How has vulnerability management (VM) evolved beyond basic scanning and reporting, and what are the biggest gaps between modern practices and what organizations are actually doing? Why are so many organizations stuck with 1990s VM practices? Why mi…
…
continue reading
1
Catching Critical Security Blind Spots, From Biohazard Attacks to Investigation Resources
39:56
39:56
Play later
Play later
Lists
Like
Liked
39:56Chemical and biological attack attempts can be hard to detect, but that doesn’t mean they aren’t happening, including at major events and sports games, says Jeff Brodeur in this month’s Security Management Highlights podcast, sponsored by Acoem. We look at other blind spots this episode, including in multitenant building security with René Reider, …
…
continue reading
1
#180 - Q&A edition...Social Security spousal and survivor benefits, finding an advisor who doesn't require investment management, how a decedent's income is taxed and MORE!
56:05
56:05
Play later
Play later
Lists
Like
Liked
56:05Listener Q&A where Andy talks about: Starting Social Security benefits early so your minor children can claim dependent benefits, and how the earnings test can come into play if you're still working ( 5:53 ) Social Security spousal benefits, and what happens when the lower earning spouse starts their own benefit early at a reduced amount, then late…
…
continue reading
1
Humanely managing IT and security teams
1:23:24
1:23:24
Play later
Play later
Lists
Like
Liked
1:23:24The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! On this episode, Accidental CISO is joined by guest host Mike Simmons. Mike is a consultant, leadership coach, speaker, and podcaster. He combines systems thinking with a people focuse…
…
continue reading
1
SANS Stormcast Monday, November 24th, 2025: CSS Padding in Phishing; Oracle Identity Manager Scans Update;
4:59
4:59
Play later
Play later
Lists
Like
Liked
4:59Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%3F/32510 Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day Early exploit attem…
…
continue reading
1
SANS Stormcast Friday, November 21st, 2025: Oracle Idendity Manager Scans; SonicWall DoS Vuln; Adam Wilson (@sans_edu) reducing prompt injection. (#)
14:09
14:09
Play later
Play later
Lists
Like
Liked
14:09SANS Stormcast Friday, November 21st, 2025: Oracle Idendity Manager Scans; SonicWall DoS Vuln; Adam Wilson (@sans_edu) reducing prompt injection. Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, ind…
…
continue reading
On this weeks’ Debate, Brian brings a truckload of acronyms for more single panes of glass to help us consolidate our various single panes of glass, Erik may actually be Brian (or maybe Brian is Erik), and Dan confirms he still (and likely always will) spend the rest of his days living in the house he just built deep in the Trough of Disillusionmen…
…
continue reading
1
When macOS gets frostbite. [Research Saturday]
24:40
24:40
Play later
Play later
Lists
Like
Liked
24:40Jaron Bradley, Director of Jamf Threat Labs, is sharing their work on "ChillyHell: A Deep Dive into a Modular macOS Backdoor." Jamf Threat Labs uncovers a newly notarized macOS backdoor called ChillyHell, tied to past UNC4487 activity and disguised as a legitimate applet. The malware showcases robust host profiling, multiple persistence mechanisms,…
…
continue reading
1
China’s quiet crawl into critical networks.
30:13
30:13
Play later
Play later
Lists
Like
Liked
30:13Chinese threat actors deploy Brickstorm malware. The critical React2Shell vulnerability is under active exploitation. Cloudflare’s emergency patch triggered a brief global outage. Phishing kits pivot to fake e-commerce sites. The European Commission fines X(Twitter) €120 million for violating the Digital Services Act. Predator spyware has a new bag…
…
continue reading
The snow is piling up, the sun ducks between skyscrapers, and we’re choosing warmth the easy way: small sparks that actually stick. Instead of white‑knuckle resolutions, we map out 54 tiny, feel‑good changes that make 2026 brighter without draining your energy or your wallet. From the emotional comfort of a beloved movie to the joy of a shower play…
…
continue reading
1
Tenable VP of Product on Building Secure B2B SaaS Products
42:20
42:20
Play later
Play later
Lists
Like
Liked
42:20What happens when building a product means outsmarting an intelligent adversary every single day? In this podcast hosted by Cassio Sampaio, Tenable Vice President of Product and Program Management Matthew Frank will be speaking on the realities of creating secure B2B SaaS products. He explores how exposure management is evolving, why identity is be…
…
continue reading
1
How WorkBrew Solves Homebrew Security & Compliance for Mac Developers
41:14
41:14
Play later
Play later
Lists
Like
Liked
41:14John Britton, CEO of WorkBrew, joins Jamf After Dark to discuss how organizations can solve the security, compliance, and management challenges of using the open-source package manager Homebrew on macOS at scale. This episode is a must-listen for any IT or Security leader managing a fleet of Mac devices used by software engineers. Learn how WorkBre…
…
continue reading
1
Jussi Aittola: The Truth Behind Crypto Recovery, Scams, and Nation-State Attacks
42:26
42:26
Play later
Play later
Lists
Like
Liked
42:26What if stolen crypto is not gone forever? In this week's Cybernova episode, Paul Jackson speaks with Jussi Aittola, Senior Partner and Country Head at Sphere State Group in Singapore, about the real mechanics of modern crypto crime, from industrial romance-investment scams to a 20 million dollar wallet breach linked to a nation state. Jussi explai…
…
continue reading
1
SANS Stormcast Friday, December 5th, 2025: Compromised Govt System; React Vuln Update; Array Networks VPN Attacks
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Government%3F%20%5BGuest%20Diary%5D/32536 React Update Working exploits for the React vulnerability patched yesterday are n…
…
continue reading
1
SANS Stormcast Friday, December 5th, 2025: Compromised Govt System; React Vuln Update; Array Networks VPN Attacks (#)
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35SANS Stormcast Friday, December 5th, 2025: Compromised Govt System; React Vuln Update; Array Networks VPN Attacks Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Governmen…
…
continue reading
1
AI, Fraud & the CTO: Navigating Counterparty Risk
28:11
28:11
Play later
Play later
Lists
Like
Liked
28:11Host Felicia King weaves a sharp, personal narrative that ties together AI, fraud, vendor selection, and the critical role of a competent CTO. With candid anecdotes and hard-earned lessons, she explains why tightly-scoped AI — used by skilled experts with robust governance — can feel like a $150K colleague, and why poorly governed AI or flashy vend…
…
continue reading
CISA staff may see pay cuts in 2026. Threat actors advertise a full chain zero-day exploit for iOS. A US-led international coalition releases joint guidance on integrating AI into operational technology. Microsoft lowers sales growth targets for its agentic AI products. A major fintech provider suffers a ransomware-linked breach. Arizona’s Attorney…
…
continue reading
1
S18 E02 (VIDEO) Hackers are using ChatGPT
44:48
44:48
Play later
Play later
Lists
Like
Liked
44:48#SecurityConfidential #DarkRhiinoSecurityHusam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He’s the founder of Memory Forensic and the author of Captain Cyber and the Safe Surfing Adventure. Husam is also a global speaker featured at events like BlackHat MEA, …
…
continue reading
#SecurityConfidential #DarkRhiinoSecurity Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He’s the founder of Memory Forensic and the author of Captain Cyber and the Safe Surfing Adventure. Husam is also a global speaker featured at events like BlackHat MEA,…
…
continue reading
1
How To Tell When a Vendor is Selling AI Snake Oil
33:51
33:51
Play later
Play later
Lists
Like
Liked
33:51All links and images can be found on CISO Series. Check out this post by Christofer Hoff of Truist for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Caleb Sima, builder, WhiteRabbit. Joining them is Crystal Chatam, vp of cybersecurity, Speedcast. In this episod…
…
continue reading
1
#237: Marriott Terminates Sonder, Thanksgiving Travel, Future of Hotel Data Report | with Luis Segredo
17:42
17:42
Play later
Play later
Lists
Like
Liked
17:42In this episode of The Modern Hotelier, Steve Carran and David Millili is joined by Luis Segredo, CEO of Hapi, to discuss the biggest hospitality news and trends from November. They dive into the recent dissolution of the Marriott–Sonder partnership, exploring why integrations and siloed technology can make or break hotel collaborations. Steve and …
…
continue reading
1
A fish commits credit card fraud (inadvertently).
51:31
51:31
Play later
Play later
Lists
Like
Liked
51:31This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engin…
…
continue reading
1
#181 - Q&A edition...understanding Roth IRA income limits, deciding between pension payment options, when to Roth convert vs distribute from an IRA and MORE!
1:01:20
1:01:20
Play later
Play later
Lists
Like
Liked
1:01:20Listener Q&A where Andy talks about: A correction on something incorrect I said last week regarding deciding which spouse's pre-tax account to distribute or convert from ( 3:28 ) Pros and cons of using a single total global stock market fund vs multiple other funds such as just US and just international ( 8:17 ) What's in the calculation for Modifi…
…
continue reading
1
SANS Stormcast Thursday, December 4th, 2025: CDN Headers; React Vulnerabiity; PickleScan Patch
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React server components. Exploitation is likely imminent. https://react.dev/blog/2025/12/03/critical-se…
…
continue reading
1
SANS Stormcast Thursday, December 4th, 2025: CDN Headers; React Vulnerabiity; PickleScan Patch (#)
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45SANS Stormcast Thursday, December 4th, 2025: CDN Headers; React Vulnerabiity; PickleScan Patch Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React se…
…
continue reading
1
What Every Family with Special Needs Should Know About Life & Disability Insurance — with Brian Klazmer
44:05
44:05
Play later
Play later
Lists
Like
Liked
44:05In this episode of Secured Steps, Jeff Llewellyn sits down with Brian Klazmer of Klazmer Financial Group for a deep conversation on how life and disability insurance really works for families with loved ones with special needs. We unpack the essentials — from the structure of permanent vs. term coverage to advanced strategies like second-to-die pol…
…
continue reading
1
Just another day of scamming and jamming.
29:53
29:53
Play later
Play later
Lists
Like
Liked
29:53The DOJ shuts down another scam center in Myanmar. OpenAI confirms a Mixpanel data breach. A new phishing campaign targets company executives. A bipartisan bill looks to preserve the State and Local Cybersecurity Grant Program. Universities suffer Oracle EBS data breaches. India reports GPS jamming at eight major airports. Kaiser Permanente settles…
…
continue reading
1
Top Technology Trends and Predictions for 2026
41:04
41:04
Play later
Play later
Lists
Like
Liked
41:04In this episode KJ Burke discusses the technology trends of 2025 and predictions for 2026. He covers the maturation of AI, the importance of treating data as a product, innovations at the edge, managing cross-cloud environments, building business resiliency and automating the skills gap. Looking ahead, he highlights key trends for 2026, including A…
…
continue reading
1
319 - Hello there, new Microsoft Defender for Cloud!
27:09
27:09
Play later
Play later
Lists
Like
Liked
27:09In this episode, we unpack what's new with Microsoft Defender for Cloud. During Ignite 2025, Microsoft announced that the public preview of MDC would be available shortly, and it has arrived now. We'll take a look at what changed, what didn't, and why you should care. (00:00) - Intro and catching up. (03:52) - Show content starts. Show links - Defe…
…
continue reading
1
EP 154 When Sport, Strategy & Security Collide. Security Isn’t a Solo Sport — And Why That Needs to Change with Paul Harvey
1:03:15
1:03:15
Play later
Play later
Lists
Like
Liked
1:03:15Send us a text 🎧 Podcast Summary — When Sport, Strategy & Security Collide Security Isn’t a Solo Sport — And Why That Needs to Change In this powerful episode of The Security Circle, Yolanda “Yoyo” Hamblen sits down with security heavyweight Paul Harvey to explore the unexpected intersections between elite sport, leadership, crisis management, and …
…
continue reading
Enjoy this episode of Cyber things from Armis. Catch the next episode on your favorite podcast app on December 15th. Welcome to Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire that plunges into the hidden world beneath our connected reality. Inspired by Stranger Things, we explore the digital realm's own U…
…
continue reading
1
SANS Stormcast Wednesday, December 3rd, 2025: SmartTube Compromise; NPM Malware Prompt Injection Attempt; Angular XSS Vulnerability
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-3670629826 https://github.com/yuliskov/SmartTube/releases/tag/notification Two Years, 17K Downloads: The NPM Malware That Tried to Gas…
…
continue reading
1
SANS Stormcast Wednesday, December 3rd, 2025: SmartTube Compromise; NPM Malware Prompt Injection Attempt; Angular XSS Vulnerability (#)
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06SANS Stormcast Wednesday, December 3rd, 2025: SmartTube Compromise; NPM Malware Prompt Injection Attempt; Angular XSS Vulnerability SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-36…
…
continue reading
1
Risky Business #817 -- Less carnage than your usual Thanksgiving
1:01:06
1:01:06
Play later
Play later
Lists
Like
Liked
1:01:06In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news. It’s a quiet week with Thanksgiving in the US, but there’s always some cyber to talk about: Airbus rolls out software updates after a cosmic ray bitflips an A320 into a dive Krebs tracks down a Scattered Lapsus$ Hunters teen through the usual poor opsec… … as W…
…
continue reading
1
The M365 Copilot Data Readiness Checklist with Nikki Chapple
40:31
40:31
Play later
Play later
Lists
Like
Liked
40:31What does it take to be ready to deploy M365 Copilot in your organization? Richard talks to Nikki Chapple about her latest incarnation of the M365 Copilot Readiness Checklist, working step-by-step to bring M365 Copilot into the organization without causing data leak issues. Nikki discusses utilizing existing tools to accurately identify sensitive d…
…
continue reading
ShadyPanda plays the long game. India mandates tracking software on mobile devices. Korea weighs punitive damages after a massive breach. Qualcomm patches a critical boot flaw impacting millions. OpenAI patches a Codex CLI vulnerability. Google patches Android zero-days. Cybersecurity issues prompt an FDA permanent recall for an at-home ventilator …
…
continue reading
1
The Identity Crisis – IAM in the Age of Zero Trust
24:10
24:10
Play later
Play later
Lists
Like
Liked
24:10Identity is the new perimeter, are you prepared? Join Rui Shantilal, Group VP Cyber Trust and guest Aiert Azueta, Head of IAM Devoteam Cyber Trust as they uncover how Identity & Access Management (IAM) has become the front line of modern cybersecurity. In this episode, discover how Zero Trust, passwordless authentication, and AI are reshaping digit…
…
continue reading
1
Inside Scoop on Sensormatic's 4th Annual Smart Exit Workshop | Ep. 103
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37Stefanie Hoover and Jamie Kress, RFID expert with Sensormatic, discuss this year's gathering of retailers at the 4th Annual Smart Exit Workshop in Bentonville, Arkansas. Sensormatic pulled out all the stops at its new facility: more than a meeting space, with mock-ups of the sales floor, stockrooms, and transition space that help retailers truly ex…
…
continue reading
1
Controls Are Promises: Rethinking GRC for Modern Security ft Sergio Alonso @ Rapid7
56:11
56:11
Play later
Play later
Lists
Like
Liked
56:11In this episode of Security & GRC Decoded, host Raj Krishnamurthy sits down with Sergio Alonso, a seasoned GRC and information security leader at Rapid7, whose 17–year career spans auditing, high-regulation banking, blockchain innovation at Akamai, privacy GRC at Twitter, and now trust and governance in cybersecurity. Sergio breaks down how to tran…
…
continue reading
In this episode, host Greg Schaffer interviews Thomas Sweet, an award-winning CIO/CTO and 2023 Tech Titan Emerging CTO, who shares his unconventional journey from civil engineering to enterprise IT and cybersecurity leadership. Tom reflects on his early days at NEC, Microsoft, GM Financial, and more, offering key lessons learned while leading globa…
…
continue reading
1
Data Science, Operations, Requirements, Exploitation, And Enhanced Engineering (DORE3) - Department of Defense
10:59
10:59
Play later
Play later
Lists
Like
Liked
10:59In this episode, we break down the latest DORE3 RFI—a major Defense Intelligence Agency initiative focused on Data Science, Operations, Requirements, Exploitation, and Enhanced Engineering. From multi-domain intelligence support to rapid-response engineering, we simplify what this presolicitation means for contractors preparing for the anticipated …
…
continue reading
1
Elysian Aircraft Co-Founder on Decarbonizing Aviation with EV Batteries
45:37
45:37
Play later
Play later
Lists
Like
Liked
45:37How do you build products that can keep pace with the climate crisis without compromising on speed, innovation, or customer insight? The scale and urgency of the transformation required to fight climate change has never been more clear. Building hardware and software products, acquiring the funding and creating a diverse community to enhance talent…
…
continue reading
1
#236: Meet the Chief Development Officer of a Hospitality Management Company | with Brittney Jones
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20Join Steve Carran and David Millili on The Modern Hotelier as they sit down with Brittney Jones, Chief Development Officer at Brittain Resorts & Hotels, to explore her inspiring journey from working on-property at a hotel to becoming a C-level executive. In this episode, Brittney shares insights on: The career lessons that shaped her path in hospit…
…
continue reading
1
Technical Series: How to Build SAP Single Roles
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28Listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In our latest technical series episode, we unpack one of the most important building blocks in SAP authorisations: single roles. Our experts explore the different ways organisations design single roles to balance provisioning efficienc…
…
continue reading
1
Technical Series: How to Make use of SAP SU24 Variants
24:14
24:14
Play later
Play later
Lists
Like
Liked
24:14Listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In this session, we walk through a practical, real-world demonstration of how SU24 authorization defaults and SU24 variants can significantly reduce manual maintenance when building SAP roles. Using the widely-used MIGO transaction as …
…
continue reading