Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Security Risk Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Podcast by Marketplace Risk
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Join Senator Ted Cruz and co-host Ben Ferguson as they break down the most important news stories of the day and reveal what they mean for you. On "Verdict with Ted Cruz,” you will go behind the scenes of the political debates that define our country. "Verdict with Ted Cruz" is being brought to you by Jobs, Freedom, and Security PAC, a political action committee dedicated to supporting conservative causes, organizations, and candidates across the country. In 2022, Jobs, Freedom, and Security ...
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Bring the benefits of proactive safety and risk management to life, through insights, experiences and stories. Every week, host Christian Harris - the UK's leading slips, trips and falls specialist - presents a new episode, typically with expert guests, to discuss: - Safety - Health - Wellbeing - Insurance - Risk management - Claims defensibility
…
continue reading
Soterion’s SAP Security & GRC podcast with host Dudley Cartwright, helping you on your journey to effective access risk management in SAP.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Delve into the public sector risk management domain with PRIMA's Risk Management Podcast Series. This innovative, time-efficient, educational resource is designed to afford risk management professionals the opportunity to learn-on-the-go! Listen to PRIMA podcasts to remain cognizant of important issues affecting the public risk management community!
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
Your dose of tips about all things Information Security, ICT Legislation and Risk. South African podcast.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
…
continue reading
Control Risks is a specialist global risk consultancy that helps organisations succeed in a volatile world. Through insight, intelligence and technology, we help you seize opportunities while remaining secure, compliant and resilient. When crises and complex issues arise, we help you recover. See acast.com/privacy for privacy and opt-out information.
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading

1
Global Security Briefing by Factal and Emergent Risk International
Factal and Emergent Risk International
Held live every two weeks on Thursdays, the Global Security Briefing is now the industry's largest virtual event of its kind. We examine security threats, supply chain impacts and geopolitical developments for global security and risk intelligence professionals. Since the earliest days of COVID, Factal and Emergent Risk International have held an essential hour-long briefing for global security and resilience professionals.
…
continue reading
Get the edge with Hidden Forces where media entrepreneur and financial analyst Demetri Kofinas gives you access to the people and ideas that matter, so you can build financial security and always stay ahead of the curve.
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Discover stories from real people who are living out their definition of a secure retirement.
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading
Welcome to Church Security Talk – your go-to resource for church safety and security. Join host Simon Osamoh, an ex-UK detective, former head of counterterrorism at Mall of America, Minnesota and church security expert. As he shares tips and tool to help your church stay safe and secure! Stay protected and informed with our online training courses visit worshipsecurity.org.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Welcome to The International Risk Podcast — the premier destination for high-level insights into global risk dynamics. Hosted by Dominic Bowen, an accomplished senior advisor, each episode delivers expert analysis and actionable intelligence on today’s most pressing international risks. From geopolitical tensions and economic upheavals to cybersecurity threats and environmental challenges, we bring clarity to the complex risks shaping our world. Tailored for CEOs, Board Members, senior manag ...
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading

1
From SEAL Teams to Corporate Security: Lessons from the Frontlines of Risk Management
35:48
35:48
Play later
Play later
Lists
Like
Liked
35:48In this episode of Ontic's Connected Intelligence Podcast, Jake Williams and Robin Miller share how their Navy backgrounds shaped the founding of Fortified Risk Group and their unique approach to integrating digital and physical security. They discuss the evolution of corporate security, from intelligence-driven threat assessments to proactive risk…
…
continue reading

1
Cyber Risk Advisor – Every CEO’s Missing Batman
8:12
8:12
Play later
Play later
Lists
Like
Liked
8:12Cyber Risk Advisor – Every CEO’s Missing Batman Every CEO has their trusted advisors: A CPA for the books An attorney for legal risks An insurance broker for disasters But when it comes to the #1 risk in 2025—cyber—the seat at the table is still empty. In this episode of Bite Size Security, Mike Fitzpatrick explains why a Cyber Risk Advisor is the …
…
continue reading

1
Hybrid AD at Risk: Storm-0501 Exploits Entra ID for Cloud-Native Ransomware
40:34
40:34
Play later
Play later
Lists
Like
Liked
40:34The 2025 Purple Knight Report paints a stark picture of enterprise identity security: the average security assessment score for hybrid Active Directory (AD) and Entra ID environments has plummeted to just 61%—a failing grade and an 11-point decline since 2023. This troubling trend underscores the persistent challenges organizations face in protecti…
…
continue reading

1
AI jobs impact; realistic AI images & video; China exit detentions; five things from ERI
54:22
54:22
Play later
Play later
Lists
Like
Liked
54:22This edition of the Briefing starts with Factal Chief Product Officer talking about the employment impacts of generative AI (some job fields are down for entry level positions). He then explores the latest in generative imagery and video, focusing on how the latest advancements will challenge risk intelligence and journalism. Kieran O'Leary shares …
…
continue reading

1
From Risk Acceptance to Community Building: Inside Security With Sean Juroviesky
19:32
19:32
Play later
Play later
Lists
Like
Liked
19:32In this episode of the Security Repo Podcast, Sean Juroviesky joins us to share their journey through cybersecurity, from finding community in BurbSec to giving talks at major conferences like DEF CON and BlueTeamCon. Sean dives deep into the realities of risk management, executive sign-off processes, and the critical importance of understanding bu…
…
continue reading

1
DOGE puts critical SS data at risk? CISA warns of new exploited flaw, K-Pop stock heist attacker extradited to South Korea
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10DOGE Put Critical Social Security Data at Risk, Whistle-Blower Says CISA warns of actively exploited Git code execution flaw Alleged mastermind behind K-Pop celebrity stock heist extradited to South Korea Huge thanks to our sponsor, Prophet Security Your security analysts didn’t sign up to chase false alarms all day. With Prophet Security’s AI SOC …
…
continue reading

1
Data Privacy and Data Security — Policies and Practices
16:57
16:57
Play later
Play later
Lists
Like
Liked
16:57In this episode of Bulletproof Your Marketplace, Jeremy Gottschalk sits down with seasoned legal counsel Krishan Thakker to unpack how user contracts and robust privacy practices can act as liability shields for digital platforms.Drawing on over 15 years advising global technology, e-commerce, and social media companies, Krish shares his expertise …
…
continue reading

1
Episode 470 - The Risks and Rewards of Agentic AI
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41As we enter the era of agentic AI, we must also address its risks. At Zenith Live 2025, we speak with Ed Henry, Zscaler, Senior Data Scientist and discuss agentic AI, its potential to streamline operations, and what are some of the key security challenges. #ZL2025 #zerotrustsecurity #mysecuritytv #zscaler…
…
continue reading

1
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
1:55:35
1:55:35
Play later
Play later
Lists
Like
Liked
1:55:35Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
…
continue reading

1
EP82: Lessons from CISO XC DFW: Leadership, Risk & Real-World Security
38:04
38:04
Play later
Play later
Lists
Like
Liked
38:04Summary: Recorded live at CISO XC DFW, this episode of The Professional CISO Show features three powerful conversations from leaders shaping the future of cybersecurity. First, Sonya Wickel shares her 24-year career journey from IT generalist to CISO & CIO, offering insights on fourth-party risk, the value of empathy in leadership, and the importan…
…
continue reading

1
EP 141 Beyond Observe & Report, You Don’t Hire Journalists: Reframing the Role of Security Officers to Predict, Prevent, Protect with Amotz Brandez, CEO Chameleon Associates
1:02:43
1:02:43
Play later
Play later
Lists
Like
Liked
1:02:43Send us a text BIO AMOTZ BRANDES Amotz is the CEO of Chameleon Group, first established in 1992. The company’s reach and reputation has grown and now supports a wide range of clients seeking top rung security consulting and training across the globe. Amotz began his career in an Israeli Defense Forces Special Forces Reconnaissance Unit, leading rec…
…
continue reading

1
Security Money: The Index Dips and 20 Years of Cybersecurity Consolidation - Ross Haleliuk - BSW #411
1:04:12
1:04:12
Play later
Play later
Lists
Like
Liked
1:04:12The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
…
continue reading

1
Trump Takes Out Venezuelan Narcoterrorists in Decisive Military Attack plus Stopping DC Crime & Trump is ALIVE!
37:39
37:39
Play later
Play later
Lists
Like
Liked
37:391. Venezuelan Narco-Terrorist Strike The hosts discuss a U.S. military strike ordered by former President Trump against a Venezuelan drug-smuggling boat. They describe it as decisive action against narcoterrorists, with 11 alleged gang members killed. The narrative frames Trump as strong and proactive compared to Biden, who they accuse of weakness …
…
continue reading

1
Google: Gmail is secure, Cloudflare blocks largest DDoS attack, Amazon shutters theft campaign
6:55
6:55
Play later
Play later
Lists
Like
Liked
6:55'2.5 billion Gmail users at risk'? Entirely false, says Google Cloudflare blocks largest recorded DDoS attack peaking at 11.5 Tbps Jaguar Land Rover says cyberattack ‘severely disrupted’ production Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect bu…
…
continue reading

1
Brokewell Malware Targets Android Users via Fake TradingView Ads on Meta
29:20
29:20
Play later
Play later
Lists
Like
Liked
29:20A new and highly sophisticated Android malware campaign, dubbed Brokewell, has emerged as one of the most dangerous mobile threats of 2024–2025. First spotted in April 2024 disguised as fake browser updates, Brokewell has since evolved into a fully featured spyware and remote access trojan (RAT), delivered through deceptive Meta (Facebook) advertis…
…
continue reading

1
Von der Leyen and Shapps Flights Hit by Suspected Russian Electronic Warfare
34:15
34:15
Play later
Play later
Lists
Like
Liked
34:15Aviation safety and geopolitics collided when multiple flights carrying high-ranking European and UK officials were hit by suspected Russian GPS jamming. European Commission President Ursula von der Leyen’s flight to Bulgaria experienced a severe GPS outage, forcing a manual landing. EU officials immediately pointed the finger at Moscow, calling th…
…
continue reading

1
Rinoa Poison, Scambaiter Extraordinaire - Rinoa Poison - SWN #508
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29I talk to Rinoa Poison about scambaiting, identity, and all sorts of things. Check it out. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-508
…
continue reading

1
Blizzard warning: Amazon freezes midnight hack.
32:11
32:11
Play later
Play later
Lists
Like
Liked
32:11Researchers disrupt a cyber campaign by Russia’s Midnight Blizzard. The Salesloft Drift breach continues to ripple outward. WhatsApp patches a critical flaw in its iOS and Mac apps. A fake PDF editing tool delivers the TamperChef infostealer. A hacker finds crash data Tesla claimed not to have. Spain cancels a €10 million contract with Huawei. A fr…
…
continue reading

1
BONUS: Daily Review with Clay and Buck - Sep 2 2025
1:02:42
1:02:42
Play later
Play later
Lists
Like
Liked
1:02:42Meet my friends, Clay Travis and Buck Sexton! If you love Verdict, the Clay Travis and Buck Sexton Show might also be in your audio wheelhouse. Politics, news analysis, and some pop culture and comedy thrown in too. Here’s a sample episode recapping four Tuesday takeaways. Give the guys a listen and then follow and subscribe wherever you get your p…
…
continue reading

1
Salesforce and Google Workspace Compromised in Largest SaaS Breach
43:38
43:38
Play later
Play later
Lists
Like
Liked
43:38In August 2025, the largest SaaS breach of the year shook the enterprise world when a newly identified threat actor, UNC6395, orchestrated a supply-chain attack through compromised Salesloft Drift and Drift Email applications. By stealing OAuth tokens, the attackers gained unauthorized access to Salesforce and Google Workspace environments of more …
…
continue reading

1
Chained Zero-Days: WhatsApp and Apple Exploits Used in Sophisticated Spyware Attacks
26:10
26:10
Play later
Play later
Lists
Like
Liked
26:10A pair of newly discovered zero-day vulnerabilities—CVE-2025-43300 in Apple’s ImageIO framework and CVE-2025-55177 in WhatsApp—have been confirmed as part of a sophisticated spyware campaign targeting both iPhone and Android users. Security researchers revealed that attackers chained these flaws together in seamless zero-click exploits, requiring n…
…
continue reading

1
How Security Can Lead Operational Resilience, Plus Reimagining Office Security
24:29
24:29
Play later
Play later
Lists
Like
Liked
24:29Security professionals have to be integrated into operational resilience efforts and business continuity planning to prevent disruptions of all kinds, according to new research from the ASIS Foundation. In this episode of the SM Highlights podcast, report co-author and ResOrgs principal consultant Joanne Stevenson shares why security gets left out …
…
continue reading

1
Akansha Shukla - Modern AppSec: Securing APIs with Threat Modeling and DevSecOps
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35Our guest today is Akansha Shukla, an information security professional with over 10 years of experience in application security, DevSecOps, and API security. We’re discussing why API security remains one of the least mature areas of AppSec today and exploring the challenges developers face when securing APIs. Akansha shares her insights on incorpo…
…
continue reading

1
DtSR Episode 669 - ADR Enters the SOC Chat
43:26
43:26
Play later
Play later
Lists
Like
Liked
43:26Send the hosts a message - try it now! TL;DR: This week's pod features our favorite former analyst Anton Chuvakin, and an AppSec OG Jeff Williams as we tackle the subject of AppSec's favorite new acronym - ADR. What is it? Why is it? Should it be? We answer all these questions and more, and laugh along the way a bit too. YouTube Video: https://yout…
…
continue reading

1
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Chris Boehm, Idan Plotnik, Josh Lemos, Michael Callahan - ASW #346
1:08:11
1:08:11
Play later
Play later
Lists
Like
Liked
1:08:11In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
…
continue reading

1
BONUS POD: Cartels Look OUT! Trump sends Military to Southern Caribbean & Venezuela
13:36
13:36
Play later
Play later
Lists
Like
Liked
13:36U.S. Military Deployment: The U.S. Navy has increased its presence in the Southern Caribbean with 7–8 warships (including cruisers, amphibious assault ships, and a nuclear submarine), along with 4,000+ personnel and surveillance aircraft. The mission is presented as a crackdown on drug cartels. Targeting Maduro: The U.S. government labels Venezuela…
…
continue reading

1
LLM legalese prompts, Maryland Transit cyberattack, hacking into university
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04LegalPwn technique hides LLMs prompts inside contract legalese Maryland Transit investigating cyberattack Hacker attempts to forge his way into Spanish university Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and …
…
continue reading

1
Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join Selena Larson, Proofpoint intelligence analyst and host of their po…
…
continue reading

1
Thematic Investing in an Age of Global Entropy | Marvin Barth
50:43
50:43
Play later
Play later
Lists
Like
Liked
50:43In Episode 437 of Hidden Forces, Demetri Kofinas speaks with Marvin Barth, founder of Thematic Markets and former Chief Economist for International Affairs at the U.S. Treasury, who previously served at the Federal Reserve and the Bank for International Settlements and has led global macro and FX strategy on both the sell side and the buy side. Mar…
…
continue reading

1
Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422
1:46:21
1:46:21
Play later
Play later
Lists
Like
Liked
1:46:21Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organiza…
…
continue reading

1
Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422
1:46:21
1:46:21
Play later
Play later
Lists
Like
Liked
1:46:21Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organiza…
…
continue reading

1
Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422
1:46:21
1:46:21
Play later
Play later
Lists
Like
Liked
1:46:21Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organiza…
…
continue reading

1
On the Road in Mexico Urging the Mexican Government to get Serious about Defeating Cartels plus Dems Bemoan Trump's Fighting Violent Crime
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:481. Trip Recap & Foreign Relations El Salvador: Cruz praises President Nayib Bukele for drastically reducing homicide rates by aggressively targeting gangs like MS-13 and 18th Street. He contrasts El Salvador’s success with U.S. crime and immigration challenges. Panama: He toured the Panama Canal and highlighted U.S. concerns about China’s growing i…
…
continue reading

1
Live from Black Hat: Ransomware, Responsible Disclosure, and the Rise of AI [Microsoft Threat Intelligence Podcast]
43:56
43:56
Play later
Play later
Lists
Like
Liked
43:56While our team is observing the Labor Day holiday in the US, we hope you will enjoy this episode of The Microsoft Threat Intelligence Podcast . New episodes airs on the N2K CyberWIre network every other Wednesday. In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is live from Black Hat 2025 with a special lineup…
…
continue reading

1
Velociraptor C2 tunnel, Baltimore’s expensive con, ransomware gangs multiply
8:11
8:11
Play later
Play later
Lists
Like
Liked
8:11Velociraptor forensic tool used for C2 tunneling City of Baltimore gets socially engineered to the tune of $1.5 million Ransomware gang takedowns create more smaller groups Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day at…
…
continue reading

1
The labor behind the labor. [Special Edition]
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26This Labor Day, we’re celebrating more than just a holiday. Join us in celebrating not just the work, but the people who make it possible — the labor behind the labor.We’re honoring the people who bring their creativity, dedication, and passion to every corner of N2K. The work you hear, read, and see from us doesn’t happen by accident. It’s the res…
…
continue reading

1
Episode 262: Global Implications of the Alaskan Summit with David Dunn
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07Today Dominic Bowen hosts David Dunn back on the podcast. They discuss the recent Alaskan Summit and its global implications. Find out more about the symbolic wins for Putin, and which ones they are exactly. The American unpreparedness and what its implications are, what the result is for Ukraine, how the EU decided to respond, transatlantic relati…
…
continue reading

1
Marina Ciavatta: Going after the human error. [Social engineer] [Career Notes]
11:06
11:06
Play later
Play later
Lists
Like
Liked
11:06Please enjoy this encore of Career Notes. Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent…
…
continue reading

1
Extra: Tragedy Strikes Again - The Sean Hannity Show
30:15
30:15
Play later
Play later
Lists
Like
Liked
30:15In this episode of The Sean Hannity Show: Sean dives deep into the heartbreaking tragedy at a Minneapolis Catholic school, where two young lives were lost, and many others were injured. He expresses his justifiable anger at the predictable aftermath, where the left rushes to politicize these tragedies instead of addressing the root causes. Sean out…
…
continue reading

1
Priviso Live Episode 50: Gunfire and AI Ransomware
14:50
14:50
Play later
Play later
Lists
Like
Liked
14:50We've reached a milestone! Our 50th episode tackles the most pressing cybersecurity threats facing South African businesses today. Key Highlights: 🚨 Facebook Marketplace Violence: The shocking Midrand shootout reveals how criminals exploit trusted platforms for kidnapping and armed robbery. Police stations now offer safe trading zones - use them. 🤖…
…
continue reading

1
Trump DEI Spending Win, Cracker Barrel Pulls the Plug on Rebrand & Panama Canal at Risk by Far Reaching China Week In Review
28:59
28:59
Play later
Play later
Lists
Like
Liked
28:59Supreme Court Ruling on DEI Grants The Supreme Court ruled 5–4 in favor of the Trump administration, allowing it to terminate $783 million in NIH diversity, equity, and inclusion (DEI) related grants. The decision centered on jurisdiction — the Court found that lawsuits over federal contracts must be filed in the Court of Federal Claims, not in dis…
…
continue reading
This week, we are joined by Jamie Levy, Director of Adversary Tactics at Huntress, who is discussing their work on "Active Exploitation of SonicWall VPNs." Huntress has released an urgent threat advisory on active exploitation of SonicWall VPNs, with attackers bypassing MFA, pivoting to domain controllers, and ultimately deploying Akira ransomware.…
…
continue reading

1
Week in Review: Citrix RCE flaw, steganography revived, major telecom fiasco
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Johna Till Johnson, CEO and founder, Nemertes Thanks to our show sponsor, Prophet Security Ever feel like your security team is stuck in a loop of alert fatigue and manual investigations? Meet Prophet Security. Their Agentic AI SOC Pl…
…
continue reading

1
Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland - SWN #507
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51Porn bombing the celestial zoom room and Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-507
…
continue reading
A suspected ransomware attack disrupts hundreds of Swedish municipalities. Google warns Gmail users of emerging cyberattacks tied to the ShinyHunters group. A malicious supply chain attack hits the npm registry. Senators press AFLAC for answers following a data breach. Law enforcement takedowns splinter the ransomware ecosystem. The FBI and Dutch p…
…
continue reading

1
Top House Intel Dem Plays Hardball with Gabbard
44:34
44:34
Play later
Play later
Lists
Like
Liked
44:34DNI ignored Jim Himes until he warned her on Section 702 Renewal. Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk on Twitter: https://twitter.com/talk_spy Subscribe to SpyTalk on Substack https://www.spytalk.co/ Take our listener survey where you can give us f…
…
continue reading
In this episode, we’re digging into one of the most overlooked parts of a penetration test, when it actually makes sense to not fix a finding. Not every vulnerability deserves equal treatment, and sometimes accepting the risk is the most mature decision a business can make. We’ll cover how to recognize those situations, avoid common pitfalls, and d…
…
continue reading