The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Security Risk Podcasts
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
Risk Parity Radio is a podcast about investing located at www.riskparityradio.com. RPR explores risk-parity style portfolios comprised of uncorrelated or negatively correlated asset classes -- stocks, selected bonds, gold, managed futures, and other easily accessible fund options for the DIY investor. The goal is to construct portfolios that are robust and can be drawn down on in perpetuity, and to maximize projected Safe Withdrawal Rates regardless of projected overall returns.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Soterion’s SAP Security & GRC podcast with host Dudley Cartwright, helping you on your journey to effective access risk management in SAP.
…
continue reading
Independent holistic security consultancy
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Podcast by Marketplace Risk
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
Your dose of tips about all things Information Security, ICT Legislation and Risk. South African podcast.
…
continue reading
Guard Street is a leading holistic cybersecurity provider, specializing in world-class proactive and emergency solutions. As a boutique, we are dedicated to assisting clients with information security risk management which includes risk quantification, compliance across many frameworks, penetration tests and the ability to predict, prevent, detect and respond to security incidents in a fast-moving, distributed landscape.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
I am your host, Alec Crawford, Founder and CEO of Artificial Intelligence Risk, Inc. and this is AI Risk-Reward, a podcast about balancing the risk and reward of using AI personally, professionally, and as a large organization! We will discuss hot topics such as, will AI take my job or make it better? When I ask Chat-GPT work questions, is that even safe? From an ethical perspective, is it enough for big companies to anonymize private data before using it? (Probably not.) I am discussing the ...
…
continue reading
1
Global Security Briefing by Factal and Emergent Risk International
Factal and Emergent Risk International
Held live every two weeks on Thursdays, the Global Security Briefing is now the industry's largest virtual event of its kind. We examine security threats, supply chain impacts and geopolitical developments for global security and risk intelligence professionals. Since the earliest days of COVID, Factal and Emergent Risk International have held an essential hour-long briefing for global security and resilience professionals.
…
continue reading
Two CISOs and a security-minded friend discuss and debate topics of security and privacy, with a focus on looking at the topic from various angles, both that they support and those they don't. Sign up for our newsletter to be notified when new episodes drop, or when new projects are announced https://newsletter.greatsecuritydebate.net
…
continue reading
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Get the edge with Hidden Forces where media entrepreneur and financial analyst Demetri Kofinas gives you access to the people and ideas that matter, so you can build financial security and always stay ahead of the curve.
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Welcome to 'Risk Grustlers,' where we celebrate the extraordinary journeys of modern-day Risk Leaders who embrace the art of 'Grustle'—a powerful fusion of Grind and Hustle. Our podcast dives into the innovative strategies and bold decisions taken by these risk-takers, shaping the future of cybersecurity and risk management. Join us as we explore their inspiring stories, insightful advice, and cutting-edge technologies that define the alternative GRC landscape.
…
continue reading
Discover stories from real people who are living out their definition of a secure retirement.
…
continue reading
Security isn’t about luck—it’s about strategy. In this podcast, we break down how to protect your home, family, and business from threats most people don’t even think about. We’re not here to fuel fear—we’re here to help you prepare. Hosted by security professionals, Michael Johnson, a retired law enforcement captain with 29 years of experience and James Kerr an expert from Boss Security Screens, this podcast delivers real, no-nonsense advice. We know what truly stops burglars—not just locks ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
1
What Are The BIGGEST Cyber Security Risks In SaaS Platforms?
36:38
36:38
Play later
Play later
Lists
Like
Liked
36:38What Are The BIGGEST Cyber Security Risks In SaaS Platforms? How safe are software-as-a-service platforms? Yasir Ali is the Founder and CEO of Polymer, explores hidden cyber security risks in software as a service platforms and innovative ways to reduce risks in software messaging apps. Polymer is a data loss prevention platform for Software-as-a-s…
…
continue reading
1
Tanzania, Cameroon, Mali, Nigeria and Iraq - what the analyst needs to know
49:15
49:15
Play later
Play later
Lists
Like
Liked
49:15In this Global Security Briefing Factal editor Sarah Burke and Emergent Risk International analyst Cameron Evers dive deep into four nations in Africa's unique situations, how they got there and what the business intelligence professional needs to pay attention to next. Kieran O'Leary wrapped up with a preview for Iraq's election. As always, the Br…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
$1 Million WhatsApp Exploit Withdrawn—Researcher Silent, Meta Calls It “Low-Risk”
20:22
20:22
Play later
Play later
Lists
Like
Liked
20:22The Pwn2Own Ireland 2025 hacking competition was set to feature one of its most anticipated moments — a $1 million zero-click remote code execution exploit against WhatsApp — but the demonstration never happened. Scheduled to be showcased by researcher Eugene of Team Z3, the exploit’s abrupt withdrawal stunned attendees and quickly became the most …
…
continue reading
1
Robo Bees, side, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet - SWN #523
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
…
continue reading
1
#7 Consumer AI: How Everyday Tools Are Creating New Security Risks
39:43
39:43
Play later
Play later
Lists
Like
Liked
39:43AI has gone fully consumer, from voice recipes in the kitchen to bots that schedule your day. But when that same tech walks into the office, what happens to privacy, security and trust? In this episode, we explore the blurred line between consumer AI convenience and enterprise AI chaos. What starts as smart personalisation quickly becomes a complia…
…
continue reading
1
Rethinking Risk: Data-Driven Decisions for Modern CISOs ft Tony Martin-Vegue
1:00:29
1:00:29
Play later
Play later
Lists
Like
Liked
1:00:29In this episode, Raj Krishnamurthy speaks with Tony Martin-Vegue, seasoned risk practitioner, speaker, and co-chair of the FAIR Institute San Francisco chapter. Tony shares decades of lessons learned from leading cyber risk management at Netflix, Gap, and other major enterprises—showing how to move from qualitative heat maps to quantitative insight…
…
continue reading
1
Episode 465: Working Through The Middle Muddle, Cool Animated Videos, And Analyzing Other Retirement Portfolios
46:09
46:09
Play later
Play later
Lists
Like
Liked
46:09In this episode we answer emails from Arun, Neil, and Stephen. We discuss intermediate accumulation portfolios, when you start needing bonds and being a good family man; favorite listener episodes #436 and #441, and an analysis of Thurman portfolios and what they are missing. Links: Episode 436 Video Summary: https://drive.google.com/file/d/1WQ1hvo…
…
continue reading
1
Securing Model Context Protocol as Companies Plan to Replace Entry Roles with AI - Rahul Parwani - BSW #421
58:59
58:59
Play later
Play later
Lists
Like
Liked
58:59As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
…
continue reading
1
Securing Model Context Protocol as Companies Plan to Replace Entry Roles with AI - Rahul Parwani - BSW #421
58:59
58:59
Play later
Play later
Lists
Like
Liked
58:59As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
…
continue reading
1
EP 151 Inside the Hiring Mind: What Security Recruiters Really Look For With Kathy Lavinder
53:48
53:48
Play later
Play later
Lists
Like
Liked
53:48Send us a text In Conversation with Kathy Lavinder In this powerful and wide-ranging episode, Yolanda “YoYo” Hamblen sits down with Kathy Lavinder, one of the most respected and experienced global recruiters in the physical security sector. With 25 years at the helm of her specialist search firm, Kathy brings clarity, honesty, and deep industry ins…
…
continue reading
1
Securing Model Context Protocol as Companies Plan to Replace Entry Roles with AI - Rahul Parwani - BSW #421
58:59
58:59
Play later
Play later
Lists
Like
Liked
58:59As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
…
continue reading
1
From Statistics to Metrics: Jim McConnell's Guide to Measuring Security's Effectiveness
31:13
31:13
Play later
Play later
Lists
Like
Liked
31:13In this episode of the Connected Intelligence Podcast, Jim McConnell shares insights from more than three decades in corporate and critical infrastructure security, exploring the evolution of converged security and safety metrics. Together with Manish, he discusses how organizations can move beyond silos to create unified, data-driven security stra…
…
continue reading
1
Episode 472 - Secure and Simplify with Zero Trust Everywhere
8:46
8:46
Play later
Play later
Lists
Like
Liked
8:46We speak with Dhawal Sharma, Executive Vice President & Head of Product Strategy at Zscaler on the latest innovations in zero trust to enhance security, simplify access management, and significantly reduce legacy infrastructure costs. Dhawal Sharma is a visionary leader and expert in cloud security who currently serves as Executive Vice President a…
…
continue reading
1
Episode 471 - Harnessing Zero Trust and AI to Outpace Cyberthreats
5:50
5:50
Play later
Play later
Lists
Like
Liked
5:50We speak with Deepen Desai, Chief Security Officer & Executive Vice President of Cyber & AI Engineering at Zscaler on the latest zero trust and AI innovations empowering organisations to secure their digital transformation journeys and stay ahead of evolving threats. With nearly two decades of expertise in cybersecurity, Deepen is regarded as a pio…
…
continue reading
1
Top Factors to Consider Before Starting Your Social Security Benefits
36:05
36:05
Play later
Play later
Lists
Like
Liked
36:05Navigating Social Security can feel like running through an airport for a connecting flight—one wrong move could cost you thousands. Ready to make sure you don’t miss out on the benefits you’ve worked for all your life? In this episode, April Schoen breaks down the crucial Social Security decisions every retiree faces—and reveals the game-changing …
…
continue reading
1
Miles, 10/8 time, Lost Phones, Whisper Leak, Quantum Route, AI Galore, Rob Allen... - Rob Allen - SWN #528
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
…
continue reading
1
Miles, 10/8 time, Lost Phones, Whisper Leak, Quantum Route, AI Galore, Rob Allen... - Rob Allen - SWN #528
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
…
continue reading
1
Miles, 10/8 time, Lost Phones, Whisper Leak, Quantum Route, AI Galore, Rob Allen... - Rob Allen - SWN #528
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
…
continue reading
…
continue reading
1
S7E51 - A Conversation with Dave McKenzie
43:59
43:59
Play later
Play later
Lists
Like
Liked
43:59In this episode of The Virtual CISO Moment, host Greg Schaffer speaks with Dave McKenzie, co-founder and director of Damn Good Security and a seasoned cybersecurity leader based in Scotland. Dave shares his fascinating journey from aspiring pilot to IT support technician, to leading security operations for major organizations, and ultimately launch…
…
continue reading
1
Why you need a digital estate plan (and where to start) with Erin Bury | ONLINE LEGACY WILL PLANNING
1:17:03
1:17:03
Play later
Play later
Lists
Like
Liked
1:17:03Ever wondered what happens to your online accounts when you’re gone? 💭 This week, we’re joined by Erin Bury, Co-founder and CEO of Willful, to talk about the importance of digital estate planning — what it is, why it matters, and how to make it easier. Erin breaks down how to protect your online accounts, manage your digital legacy, and give your l…
…
continue reading
TL;DR: Patching. Your least favorite thing. Well, it turns out that most of the work we have been doing in the last 20+ years has been for nothing. Robert "RSnake" Hansen's theory, backed by a lot of data, seems to point to a much bigger problem in cyber, and it's time we talk about it. Rob's Closing Keynote that started this conversation: https://…
…
continue reading
1
Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356
1:11:26
1:11:26
Play later
Play later
Lists
Like
Liked
1:11:26Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
…
continue reading
1
Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356
1:11:26
1:11:26
Play later
Play later
Lists
Like
Liked
1:11:26Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
…
continue reading
1
Technical Series: Basic SAP Authorisation Concepts - SAP Transactions & Fiori Applications, Authorisation Objects, Fields and Values
12:24
12:24
Play later
Play later
Lists
Like
Liked
12:24Watch or listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. Introducing Our Technical Series: The Building Blocks of SAP Role Design. In the first episode of our new Technical Series, we unpack the foundations of SAP authorisations — what they are, how they function, and why they matte…
…
continue reading
1
Technical Series: Authorisation Default Values
8:29
8:29
Play later
Play later
Lists
Like
Liked
8:29Watch or listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In our latest technical podcast episode, we dive deep into a crucial piece of the SAP authorisation puzzle — authorisation default values. You’ll discover: How authorisation defaults determine which checks are performed during…
…
continue reading
1
Priviso Live Episode 60: Amertech Interview
36:36
36:36
Play later
Play later
Lists
Like
Liked
36:36In our latest episode, we unpack four stories that reveal the complex intersection of technology, accountability, and governance in today's digital landscape. **🔍 The Mamdani "Hack" That Fooled Millions** How did a simple news broadcast get misinterpreted as a cyberattack? We dive into the viral incident from NYC Mayor-elect Zohran Mamdani's victor…
…
continue reading
1
The changing face of fraud. [CISO Perspectives]
36:51
36:51
Play later
Play later
Lists
Like
Liked
36:51Fraud has always been a consistent challenge. As the world has continued to become increasingly interconnected and as new technologies have become widely available, threat actors have continued to evolve their tactics. In this episode of CISO Perspectives, host Kim Jones sits down with Mel Lanning from the Better Business Bureau to discuss fraud …
…
continue reading
1
Transitioning from service to civilian life. [T-Minus Deep Space]
30:05
30:05
Play later
Play later
Lists
Like
Liked
30:05Lieutenant Rob Sarver and Alex Gendzier are the authors of Warrior to Civilian: The Field Manual for the Hero's Journey, the definitive guide to transition to civilian life for veterans and their spouses and families. The book aims to provide actionable advice to veterans looking for work, while coaching those in hiring positions to give veterans t…
…
continue reading
1
S36 Ep11: S36 Ep11: Why Cybersecurity Should Be a Boardroom Conversation
32:25
32:25
Play later
Play later
Lists
Like
Liked
32:25Today’s special episode features Steve’s recent Business Matters broadcast interview with Juliette Foster, featuring conversation about critical cybersecurity challenges facing organizations today. Steve and Juliette discuss targeted phishing, the growing threat of Crime-as-a-Service, the increase in AI-driven cybercrime, and more. Key Takeaways: C…
…
continue reading
1
Rebooting the government, one cyber law at a time.
29:54
29:54
Play later
Play later
Lists
Like
Liked
29:54Ending the government shutdown revives an expired cybersecurity law. The DoD finalizes a new model for building U.S. military cyber forces. A North Korean APT exploits Google accounts for full device control. The EU dials back AI protections in response to pressure from Big Tech companies and the U.S. government. Researchers discover a critical vul…
…
continue reading
1
Episode 18: TRISS Highlights, Cloud Chaos & SaaS Lessons Learned
1:53:17
1:53:17
Play later
Play later
Lists
Like
Liked
1:53:17In Episode 18 of the Distilled Security Podcast, Justin Leapline, Joe Wynn, and Rick Yokum recap their time at TRISS, share lessons on storytelling and women in tech, and break down the recent AWS us-east-1 DNS/DynamoDB outage, the Microsoft Front Door global disruption, and the F5 BIG-IP incident. 🔍 We discuss: - TRISS highlights: panels, communit…
…
continue reading
1
How Vulnerable Are We? Inside America’s Cybersecurity Crisis
54:50
54:50
Play later
Play later
Lists
Like
Liked
54:50Text the ATB Team! We'd love to hear from you! In this episode of the At the Boundary podcast, Dr. Tad Schnaufer moderates a panel discussion on key insights from the 2025 Cyber Bay Conference. Joining him are Dr. Linda Nhon, Resident Fellow at GNSI; Dr. George Burress, Professor and Chair of the Department of Criminology at the University of South…
…
continue reading
1
This New Rule Can DESTROY Your Sales Overnight: CMMC's Wide Reach
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41CMMC 2.0 explained in plain English — what it means for small businesses, defense contractors, and vendors across the DoD supply chain. Learn about Level 1 vs Level 2, self-attestation risks, C3PAO shortages, compliance deadlines, and how to stay audit-ready before 2025. Don't miss out on crucial information about the CMMC 2025 deadline. The Cybers…
…
continue reading
1
🎙️ Episode 90 | GPSEC DFW: The Modern CISO, AI, and the OT Frontier
25:28
25:28
Play later
Play later
Lists
Like
Liked
25:28🎙️ Episode Summary Episode 90 of The Professional CISO Show kicks off the GPSEC DFW series, recorded live in Dallas. Host David Malicoat welcomes Andy Lux, Kendall Reese, and Patrick Gillespie for a dynamic discussion on risk leadership, AI governance, and OT security. Together, they explore how the role of the CISO is evolving — from managing cont…
…
continue reading
1
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432
1:38:17
1:38:17
Play later
Play later
Lists
Like
Liked
1:38:17Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
…
continue reading
1
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432
1:38:17
1:38:17
Play later
Play later
Lists
Like
Liked
1:38:17Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the cha…
…
continue reading
1
Investing on the Front Lines of the AI Arms Race | Nathan Benaich
53:48
53:48
Play later
Play later
Lists
Like
Liked
53:48In Episode 448 of Hidden Forces, Demetri Kofinas speaks with Nathan Benaich, founder and general partner of Air Street Capital and the creator of the annual State of AI Report, an open-access compendium that tracks advances across AI research, industry, policy, and geopolitics. Nathan Benaich and Demetri spend the first hour of their conversation e…
…
continue reading
1
Cybersecurity and AI: A Two-Edged Sword — A Conversation with Jocelyn King, Founder of Smarter Online Safety
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06In the AI Risk Reward podcast, our host, Alec Crawford (@alec06830), Founder and CEO of Artificial Intelligence Risk, Inc. aicrisk.com, interviews guests about balancing the risk and reward of Artificial Intelligence for you, your business, and society as a whole. Podcast production and sound engineering by Troutman Street Audio. You can find them …
…
continue reading
1
Episode 464: More Fun With Leverage, Bad Advisor Incentives, Working With A Substandard 401k And Portfolio Reviews As Of November 7, 2025
46:31
46:31
Play later
Play later
Lists
Like
Liked
46:31In this episode we answer emails from Dave, Isaiah, and Ian. We discuss back-testing tools, revisit UPRO and leverage from the last episode, the inherent biases and incentives for retail financial advisors to recommend underspending and using underspending plans larded with window dressings, and revisit a limited 401k and a retirement scenario from…
…
continue reading
1
Michael DeBolt: From acting to cyber. [Intelligence] [Career Notes]
7:38
7:38
Play later
Play later
Lists
Like
Liked
7:38Please enjoy this encore of Career Notes. Chief intelligence officer at Intel 471, Michael shares his story where he started as an actor and quickly changed over to intelligence and what the transition was like for him. Michael grew up wanting to be an actor and even was able to land some acting jobs, after going into the Marine Corps he decided to…
…
continue reading
1
A fine pearl gone rusty. [Research Saturday]
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59Tal Peleg, Senior Product Manager, and Coby Abrams, Cyber Security Researcher of Varonis, discussing their work and findings on Rusty Pearl - Remote Code Execution in Postgres Instances. The flaw could allow attackers to execute arbitrary commands on a database server’s operating system, leading to potential data theft, destruction, or lateral move…
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-527
…
continue reading