Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Operations Podcasts

show episodes
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Ubuntu Security Podcast

Ubuntu Security Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
  continue reading
 
Artwork
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Artwork

1
Mac Admins Podcast

Mac Admins Podcast LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
  continue reading
 
Artwork

1
Android Developers Backstage

Android Developers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
  continue reading
 
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
  continue reading
 
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
  continue reading
 
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
  continue reading
 
Artwork

1
SpyTalk

SpyTalk, Jeff Stein

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
Entry & Exit is a podcast about building, scaling, and exiting security and fire businesses. Hosts Stephen Olmon and Collin Trimble share their journey growing Alarm Masters through acquisitions and organic growth, along with the lessons they’ve learned along the way. From recurring revenue strategies to sales, operations, and M&A, Entry & Exit gives business owners and entrepreneurs an inside look at what it takes to succeed in the security industry. Whether you’re starting your first compa ...
  continue reading
 
Artwork

1
Cyber Security America

Joshua R Nicholson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
  continue reading
 
Artwork

151
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
Now in Android

Now in Android

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android's a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
  continue reading
 
Artwork

1
At The Boundary

Global and National Security Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
  continue reading
 
Artwork

1
War Studies

Department of War Studies

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the War Studies podcast. We bring you world-leading research from the School of Security Studies at King’s College London, the largest community of scholars in the world dedicated to the study of all aspects of security, defence and international relations. We aim to explore the complex realm of conflict and uncover the challenges at the heart of navigating world affairs and diplomatic relations, because we believe the study of war is fundamental to understanding the world we live ...
  continue reading
 
Artwork

1
The Guardian Way

Garrett Thomas

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Guardian Way is a weekly podcast from Guardian Protection Force that turns real-world security experience into practical guidance you can use today. Hosted by Garrett Thomas with co-host Terry MacAdam, each episode breaks down an operations-level topic like executive protection, protective intelligence, workplace violence prevention, campus security, remote guarding, and patrol program design. We focus on what works in the field, why it works, and how to implement it with clear steps, po ...
  continue reading
 
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Artwork

1
IT Ops Query

Informa TechTarget

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
This podcast distills the signal from the noise about enterprise IT digital transformation and operations in the era of Agile, DevOps and distributed applications. Interviews feature expert guests in conversation with IT journalism veteran Beth Pariseau, Senior News Writer at Informa TechTarget.
  continue reading
 
Artwork

1
Purpose & Protection

Commissionaires Nova Scotia

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Commissionaires Nova Scotia proudly presents Purpose & Protection, a podcast dedicated to the people behind Canada’s security: veterans, their families, civilians and all those dedicated to keeping our communities safe. Each episode explores the lived experiences of those who’ve served, those who support them, and those shaping the future of Canada’s security landscape. From the frontlines to the home front, you’ll hear stories of resilience, leadership and purpose. As the largest private em ...
  continue reading
 
Artwork

4
The Elara Edge

Regia Multimedia Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
  continue reading
 
Artwork
 
America’s military operations are constantly evolving. From boot camp to boots on the ground, anchor Ryan Robertson provides in-depth coverage of international armed conflicts and the latest technological developments in weaponry worldwide.
  continue reading
 
If you wish to know what it's really like to make the life and death decisions portrayed in the movies by James Bond or on TV by Homeland's, Cary Matherson, then Black Spy Podcast is the show for you. If you're interested in the clandestine world of secret intelligence, espionage, counter-terrorism and national security, then this definitely your must listen Podcast! Every week, along with a different successful or famous guest who's always been interested in the secret services, ex officer, ...
  continue reading
 
Artwork

1
Reality 2.0

Katherine Druckman and Doc Searls

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
  continue reading
 
Artwork

1
Tales From The SOC

Tales From The SOC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
From going undercover on the dark web to hunting down ransomware that doesn’t want to be found, our co-hosts Duck and David bring a unique perspective to real-world cybersecurity. ”Tales from the SOC” is your go-to podcast for exploring the weird and wonderful world of the Security Operations Center. Join us on this journey, because understanding is the first step to securing your world. For more information about our human-led cybersecurity services, head to: https://solcyber.com/
  continue reading
 
Loading …
show series
 
In this 50th episode of Future Secured, Sandro Bucchianeri, Chief Security Officer at National Australia Bank, takes us inside the uncomfortable reality of modern cybercrime: attackers operate with no boundaries, no legislation, and no regulators. They move fast, change partners instantly, and treat targets as simple commercial opportunities. On th…
  continue reading
 
Enjoying the content? Let us know your feedback! Today we're talking about the future of security operations, specifically three technologies that have dominated the conversation for the past few years: SIEM, XDR, and SOAR. And I'm going to make a case that might surprise some people: these tools are converging. They're merging into unified platfor…
  continue reading
 
Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names./32472 FortiWeb Multiple OS command injection in API and CLI A second silently patched vulnerability in FortiW…
  continue reading
 
News of a U.S. attack on a boat off the coast of Venezuela—which included a second strike on survivors of the first—has raised new concerns about the administration’s operations against alleged drug traffickers. Legal analysts, including some at Lawfare, call the second strike clearly unlawful. So why did the U.S. military agree to follow the order…
  continue reading
 
Rob Hirschfeld is the CEO and co-founder of RackN, founded in 2014, focused on "addressing the messy challenge of operating at scale in physical data centers," according to his LinkedIn profile. Hirschfeld has had a front-row seat to the last decade of conversations in enterprise IT ops about bare-metal server operations and cloud repatriation, top…
  continue reading
 
Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on. https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Comma…
  continue reading
 
Forget what you think you know about reality. The Rest Is Science is a mind-bending new show from Goalhanger that tears down familiar ideas… time, randomness, beauty, it will reveal just how bizarre the world truly is. Join Professor Hannah Fry and science creator Michael Stevens (aka Vsauce) twice a week to explore big, small and surprising questi…
  continue reading
 
In this episode Tor and Chet chat with Raluca Saucic and Eugene Yakavets about the new "Bring Your Own Model" feature in Android Studio which allows using other models than Gemini for agent mode, including models from Anthropic, OpenAI, and more. We also discuss using local models via Ollama and LM Studio. Resources: Use a remote model → https://go…
  continue reading
 
Patch Tuesday. Federal prosecutors charge a Houston man with smuggling Nvidia chips to China, a Ukrainian woman for targeting critical infrastructure, and an Atlanta activist for wiping his phone. The power sector sees cyber threats doubling. The new Spiderman phishing kit slings its way across the dark web. Our guest is Dick O'Brien, Principal Int…
  continue reading
 
This week, Scott sat down with Lawfare Managing Editor Tyler McBrien and Contributing Editor Alex Zerden to talk through a few of the week’s big national security news stories, including: “Finding the Road to Damascus.” Former dictator Bashar al-Assad fled Syria one year ago this week, bringing a precipitous end to the country’s more than decade-lo…
  continue reading
 
Welcome to the inaugural episode of "The Elara Edge: International Insights Edition," where the leaders of the international space community join Elara Nova partners to share their insights and perspectives on the increasing strategic importance of space in joint force and alliance operations. In today's episode, Brad Head, Managing Director of Int…
  continue reading
 
🔥 Episode Summary Guests: Steve Lupo (Chevron, Retired FBI) & Orlan Streams (RA Infrastructure) Sponsor: CyberOne Security (www.cyberonesecurity.com) Recorded live at HOU.SEC.CON, this episode brings together two unique perspectives shaping the cybersecurity landscape. First, David speaks with Steve Lupo, Event Security Advisor at Chevron and a ret…
  continue reading
 
Susannah Glickman, an assistant professor of history at Stony Brook University who specializes in the political economy of computation and information, sat down with Lawfare Associate Editor Olivia Manes to discuss the role of defense tech in the second Trump administration. Susannah unpacked her recent article in the New York Review of Books traci…
  continue reading
 
Hosts Stephen Olmon and Collin Trimble go deep on recurring monthly revenue (RMR) in the security and fire-alarm industry—why it’s the heartbeat of the business, the biggest driver of valuation confidence, and the single most stabilizing force for operators trying to scale without cash-flow whiplash. They unpack how RMR smooths payroll, fuels growt…
  continue reading
 
Host Fred Burton reunites with longtime colleague Scott Stewart, Vice President of Protective Intelligence at Torchstone Global, to unpack the evolving landscape of executive protection. Drawing on recent high-profile attacks and their own book, The Protective Intelligence Advantage, they explore how threat actors operate, what today’s organization…
  continue reading
 
In this episode of Purpose & Protection, host Barry Pitcher, CEO of Commissionaires Nova Scotia, speaks with Corinne MacLellan, a communications strategist and Honorary Lieutenant Colonel of the Halifax Rifles, about the essential role of civilian leadership in Canada’s defence and security landscape. Corinne shares her journey of service, includin…
  continue reading
 
In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: There’s a CVSS 10/10 remote code exec in the React javascript server. JS server? U wot mate? China is out popping shells with it Linux adds support for PCIe bus encryption Amnesty International says Intellexa can just TeamViewer into its customers’ s…
  continue reading
 
In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: There’s a CVSS 10/10 remote code exec in the React javascript server. JS server? U wot mate? China is out popping shells with it Linux adds support for PCIe bus encryption Amnesty International says Intellexa can just TeamViewer into its customers’ s…
  continue reading
 
Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution in ColdFusion, as well as the code execution issue in Acrobat, will very likely see exploits soon. h…
  continue reading
 
In the years following 9/11, the US launched the War on Terror to root out the most dangerous Al Qaeda operatives across the Middle East. Their determination to avenge those who lost their lives in the 2001 attacks was unrelenting, and they were willing to go to any lengths to win, even if that meant putting their trust into a jihadist turned Jorda…
  continue reading
 
Organizations worldwide scramble to address the critical React2Shell vulnerability. Major insurers look to exclude artificial intelligence risks from corporate policies. Three Chinese hacking groups converge on the same Sharepoint flaws. Ransomware crews target hypervisors. A UK hospital asks the High Court to block publication of data stolen by th…
  continue reading
 
Uptime used to mean reliability. But in the LLM era, five nines just means your liar is always available. Real reliability now includes correctness and that means probing models in real time with prompts that have known answers. When those slip, your delivery fabric has to reroute before customers find out. In this episode F5's Lori MacVittie, Joel…
  continue reading
 
The Ultimate Geek Gift Guide for 2025 is here! Don't buy that RAM yet—we explain the massive AI-driven price spikes. Also, testing the powerful VDO Ninja for streaming and our reaction to Linus Tech Tips' latest Linux takes. 00:00:00 Intro 00:01:54 Community Feedback 00:07:34 Testing Out VDO Ninja: Open Source or Bust 00:09:15 Sandfly Security 00:1…
  continue reading
 
Neil Johnson's been building some incredible tools for Mac Admins of late, and we wanted to sit down with him and talking through Apple Policy Explorer and some others. What's it like building tools these days, where do you start? Who is the right audience to design for? We'll dive deep on his process here this week, as well as talk about what's go…
  continue reading
 
Wikipedia is more than an encyclopedia. It’s a key part of the internet’s information infrastructure—shaping what people know, what AI models learn, and what the public sees as true. But in an era of geopolitical conflict, AI disruption, and fracturing trust, Wikipedia has come under attack. In this episode, Renée DiResta talks with Wikipedia found…
  continue reading
 
In this episode, host Kim Jones examines the rapid rise of enterprise AI and the tension between innovation and protection, sharing an RSA anecdote that highlights both excitement and concern. He outlines the benefits organizations hope to gain from AI while calling out often-overlooked risks like data quality, governance, and accountability. Kim i…
  continue reading
 
nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as undocumented may actually be documented in the underlying hardware description. https://www.tomshardware.com/tech-industry/cyber-security/researcher-finds-undocumented-microphone-and-major-security-flaws-in…
  continue reading
 
How might Trump’s new National Security Strategy impact cyber? The UK’s NCSC warns LLMs may never get over prompt injection. At least 18 U.S. universities were hit by a months-long phishing campaign. Russia blocks FaceTime. A bipartisan group of senators reviving efforts to strengthen protections across the health sector. Portugal provides legal sa…
  continue reading
 
Text the ATB Team! We'd love to hear from you! In this episode of At the Boundary, GNSI Research Fellow Dr. Guido Rossi sits down with Terry Guild, a former senior U.S. Army intelligence officer with a 30–year military career and five years of experience in the defense industry at CAE and Intrinsic Ventures. Together, they unpack one of the most co…
  continue reading
 
🔥 Episode Summary In this St. Louis tour-stop episode, David Malicoat sits down with cybersecurity leader Moses Bulus to explore what it truly means to evolve into a professional CISO. Moses shares his journey from early developer to building security programs from scratch, and ultimately into executive leadership — showing how business acumen, net…
  continue reading
 
In a live conversation on YouTube, Lawfare Executive Editor Natalie Orpett sat down with Lawfare Senior Editors Anna Bower, Michael Feinberg, Molly Roberts, Roger Parloff and Eric Columbus and Lawfare Contributing Editor James Pearce to discuss the arrest of a suspect in the attempted bombing on Jan. 6, 2021, a hearing in NPR’s lawsuit over the Tru…
  continue reading
 
AutoIT3 Compiled Scripts Dropping Shellcodes Malicious AutoIT3 scripts are usign the FileInstall function to include additional scripts at compile time that are dropped as temporary files during execution. https://isc.sans.edu/diary/AutoIT3%20Compiled%20Scripts%20Dropping%20Shellcodes/32542 React2Shell Update The race is on to patch vulnerable syst…
  continue reading
 
The Myth of Anxiety with Neuroscientist Dr. Rachel Taylor (Part 1) The Black Spy Podcast 222, Season 23, Episode 0002 Episode 1 – The Anxiety Myth: What If Everything We Think We Know Is Wrong? Is anxiety really a mental health crisis—or have we misunderstood the entire phenomenon? In this week's Black Spy Podcast, Carlton King and Neuroscientist D…
  continue reading
 
On 30 December 2009, an Al Qaeda terrorist detonated a bomb inside a CIA station in Afghanistan. This is the story of how a quiet doctor from Jordan became responsible for one of the deadliest days in CIA history. Listen as David and Gordon chart the rise of Humam Khalil Abu-Mulal al-Balawi from a doctor working in a Palestinian refugee camp to one…
  continue reading
 
In the final episode of “Inside the Mind of a Ransomware Operator,” Chris and Nick look ahead to the next decade of cybercrime. What happens when ransomware goes fully autonomous? AI that picks the most valuable files… then negotiates the ransom in 17 languages Malware that mimics real human behavior so perfectly that EDR can’t tell the difference …
  continue reading
 
From January 24, 2023: In 2019, investigative journalist and photographer Lynzy Billing went to Afghanistan to investigate a very personal story: her own past. In the process, she discovered what she came to call a classified war, one with lines of accountability so obscured that no one had to answer publicly for operations that went wrong. Lawfare…
  continue reading
 
Please enjoy this encore of Career Notes. Chief security strategist from Analyst1, Jon DiMaggio shares his story on how he grew to become a part of the cybersecurity world. He describes different jobs that paved the way to the knowledge he has in the industry right now, and he even shares about an experience that led him to a path that split and wh…
  continue reading
 
The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin) When attackers breached HubSpot in March 2022, they weren’t after HubSpot at all. They were after the customers of its customers. Crypto firms like Trezor, BlockFi, and Swan Bitcoin suddenly saw their users targeted by near-perfect phishing emails designed to st…
  continue reading
 
In late 2023, the world’s most trusted identity provider experienced the kind of breach it was designed to prevent. Attackers quietly infiltrated Okta’s customer support system, stole session tokens hidden inside HAR files and used them to impersonate users across some of the most secure organizations on earth. For two full weeks, the intruders ope…
  continue reading
 
In this episode, we explore the hidden human cost of major cyber incidents—the stress on IT teams, the disruption to patient care, the executives forced into impossible decisions, and the ripple effects felt by everyday people who rely on critical systems. Beyond the technical breakdown, we examine how breaches impact lives, strain organizations, a…
  continue reading
 
Ace investigative reporter Carol Leonnig talks about her latest scoop and new book on Trump’s DoJ, “Injustice: How Politics and Fear Vanquished America's Justice Department.” Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Karen Greenberg on Twitter https://x.com/KarenGreenberg3 Follow Michael Isikoff on Twitter: https://twitter.…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play