Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Web Security Podcasts
Podcasts from Akamai's Security Team.
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Hosted by Emma and Shi Khai of LongHash Ventures, we chat with the most innovative founders of Web 3.0 building more open, inclusive, and equitable financial and social infrastructure.
…
continue reading
Daniel discusses and explains various topics on computers and technology.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Listen in on brief discussions among Cisco and industry experts about the latest issues in network security and the solutions available to help address your business challenges.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
The modern web is changing fast. Front-end frameworks evolve quickly, standards are emerging and old ones are fading out of favor. There are a lot of things to learn, but knowing the right thing is more critical than learning them all. Modern Web Podcast is an interview-style show where we learn about modern web development from industry experts. We’re committed to making it easy to digest lots of useful information!
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Tired of the lies? Tired of the spin? Are you ready to hear the hard-hitting truth in comprehensive, conservative, principled fashion? The Ben Shapiro Show brings you all the news you need to know in the most fast moving daily program in America. Ben brutally breaks down the culture and never gives an inch! Monday thru Friday.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Keeping you up to speed with the latest web security news
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Learn how to get the best performance and scale your PostgreSQL database with our weekly shows. Receive the best content curated from around the web. We have a special focus on content for developers since your architecture and usage is the key to getting the most performance out of PostgreSQL.
…
continue reading
A podcast about web design and development.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Everything from security to search tools, traffic to transfers.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
State Secrets is a weekly interview podcast featuring Cipher Brief experts and national security leaders.
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
ITech Insights are short easy to understand video's meant to provide further education on many of the technologies we already use in our day to day business, as well as to introduce new and useful tools for saving time, money, and above all aggravation.
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
Every week Wayne Scott from brings together a team of technology journalists from www.ITProPortal.com to discuss, share analysis and argue about the biggest Tech News stories of the past week. From enterprise and business technology, to tech start ups, consumer gadgets, office IT and mobile you can get informed here. Plus join us live at some of the many technology shows around the world like CeBit, IFA, Infosec, The Gadget Show and much more !
…
continue reading
The Executive Insights podcast, brought to you by AWS (Amazon Web Services), features peer-to-peer conversations between business executives on innovating for growth, building resiliency, and shaping the future of their organizations. Learn more at AWS Executive Insights and follow us on LinkedIn. For video versions of these and other conversations, subscribe to our YouTube playlist.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
1
The Medcurity Podcast: HIPAA Compliance | Security | Technology | Healthcare
Medcurity: HIPAA Compliance
Healthcare is complicated. Joe Gellatly and the Medcurity team are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more. HIPAA laws continue to evolve. Go to hhs.gov for the latest information. Learn more at https://medcurity.com.
…
continue reading
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
…
continue reading
The Laravel Community getting together discussing development and life using the world's best framework, Laravel.
…
continue reading
Sharing the work we do around the open web, information security and user privacy is an important role of Mozilla Security. The Mozilla Security Bytes podcast discuss various topics and technologies implemented in Firefox and other Mozilla products and initiatives.
…
continue reading
Drupal Brief is the go-to podcast for quick and insightful AI generated summaries of the latest Drupal news, blogs, and podcasts. Stay informed and inspired in just a few minutes as we distill the most important updates and trends in the Drupal community! Drupal Brief is a podcast of Drupal Forge.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Welcome to Everyday Heroes, a podcast about the unsung heroes of the tech world. From the phone in your pocket to the world's most critical digital infrastructure, open-source software has a hand in it. These free technologies that shape our digital world wouldn't be anything without the Heroes that maintain them, promote them, and evolve them - these are their stories. Everyday Heroes is brought to you by HeroDevs.
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
Welcome to DataNext Podcast, every week our CEO Zeeshan Baig talks about latest Tools and Technologies, shares his experience, Best practices on Cloud computing, Big data, DevOps, Security. Tips on work-life balance, Professional Career and much much more. Subscribe and stay up to date with what's Next in Enterprise IT.
…
continue reading
WebInnovationX Web Innovation Center is a Global Think Tank in Digital Transformation of Businesses, the Study of the Social and Economic Impacts of the World Wide Web, and home to the World Wide Web Consortium W3C NY Metro Chapter. Join Our Thought Leaders at SymposiumX CertificationX AccelerationX. Meet the Experts and Get Inspired on Innovation Thought Leadership, Strategy, and Tactics. Powered by FortuneTimes Group.
…
continue reading
The Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the ever-evolving realm of technology and digital innovation. Each episode is a treasure trove of knowledge, focusing on critical areas such as cybersecurity, the intricacies of SEO, and the latest advances in the digital world. Greg's expertise as a technical advisor shines through as he explores the nuances of digital marketing, offering listeners an in-depth understanding of the skills needed to stay ahead in t ...
…
continue reading
A Technology Geek Podcast with an EVER so Slight Macintosh Bias!
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
…
continue reading
Uptime and performance monitoring made easy.
…
continue reading
This history podcast tells the story of Belgium's history, in a non-chronological order. Every two weeks, we'll cover Belgian history and take the bits and pieces we like, to entertain and inform the listeners. Our place on the web: rhob.be
…
continue reading
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
1
How Varlock Fixes .env Vulnerabilities and Secures Your Secrets
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46Environment variables and secrets are usually a mess: out of sync .env files, scattered API keys, painful onboarding, and brittle CI configs. In this episode of the Modern Web Podcast, Rob Ocel talks with Varlock co-creators Phil Miller and Theo Ephraim about how Varlock turns .env files into a real schema with types, validation, and documentation,…
…
continue reading
1
India orders web safety app, arrests over IP camera snooping, Albiriox shows up on dark web
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14India orders web safety app Arrests over IP camera snooping Albiriox shows up on dark web Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you can stop sweating over spreads…
…
continue reading
1
PP088: How Fortinet Delivers Web App Security in the AI Era (Sponsored)
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’re designed to take end-user inputs, which can be manipulated for malicious purposes, and they often handle sensitive data. Then the rise of public cloud and microservices architectures added new layers…
…
continue reading
Real Comedy is BACK. Gone are the days of 'clap-ter' and men-bashing masquerading as stand-up comedy. Watch Ben react to the actual funniest comedians out there who aren't afraid to say the thing. Watch Part 1 here: https://youtu.be/y4FrpFHZzpY - - - Today's Sponsor: PDS Debt - You’re 30 seconds away from being debt-free with PDS Debt. Get your fre…
…
continue reading
The labor market has swung from the Great Resignation to “job hugging,” where workers cling to their roles out of fear of AI-driven layoffs and inflation, crushing engagement and accelerating burnout. At the same time, OpenAI is accused of suppressing research showing job losses, ignoring internal warnings about chatbot mental health risks, and ble…
…
continue reading
1
Silencio Hacker Misa Negra en Vivo. En ESPAÑOL.
15:21
15:21
Play later
Play later
Lists
Like
Liked
15:21"Las fuentes contienen extractos de una discusión de audio en varias partes, aparentemente un podcast o un chat en vivo, donde los oradores exploran temas relacionados con el satanismo, el luciferismo, el ocultismo y el hacking. La conversación se centra fuertemente en las diferencias filosóficas entre estos sistemas de creencias y las religiones t…
…
continue reading
1
Narco-Cults Luciferianism and Hacking Philosophy
32:03
32:03
Play later
Play later
Lists
Like
Liked
32:03The sources contain excerpts from a multi-part audio discussion, seemingly a podcast or live chat, where the speakers explore topics related to satanism, luciferianism, occultism, and hacking. The conversation focuses heavily on philosophical differences between these belief systems and traditional religions, particularly Christianity, with an emph…
…
continue reading
1
Psychopathy, Satanism, and Culture Jamming. RAW AUDIO FILE FROM X SPACES.
5:40:13
5:40:13
Play later
Play later
Lists
Like
Liked
5:40:13The sources contain excerpts from a multi-part audio discussion, seemingly a podcast or live chat, where the speakers explore topics related to satanism, luciferianism, occultism, and hacking. The conversation focuses heavily on philosophical differences between these belief systems and traditional religions, particularly Christianity, with an emph…
…
continue reading
1
Estafas románticas de IA un ex-criminal habla
16:28
16:28
Play later
Play later
Lists
Like
Liked
16:28Estafas románticas de IA un ex-criminal habla
…
continue reading
El enigma de @spydirbyte
…
continue reading
The enigma of @spydirbyte
…
continue reading
cybermidnight random raw audio
…
continue reading
1
Chapter 1: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill.
15:30
15:30
Play later
Play later
Lists
Like
Liked
15:30Chapter 1: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill.
…
continue reading
cybermidnight random
…
continue reading
1
Question from Nicole Eggert (Baywatch) about my story and case
1:10
1:10
Play later
Play later
Lists
Like
Liked
1:10Question from Nicole Eggert (Baywatch) about my story and case. For the ep25. anniversary edition
…
continue reading
LOGIN TO HELL; the audio book Get the full ebook soon, The kindle version https://amzn.to/3P61vuY
…
continue reading
RAW AUDIO SPACES
…
continue reading
1
SILENCED: A BANNER PODCAST EPISODE: This is what they did with me at another scale.
1:48:45
1:48:45
Play later
Play later
Lists
Like
Liked
1:48:45This is what they did with me at another scale. The basis are the same. 3 Things can no long be hidden, the sun, the moon and the truth... Tommy Robinson (@TRobinsonNewEra) exposes far-left hate group 'Hope Not Hate'. Tommy produces audio/video evidence that proved that Hope Not Hate pays people to tell lies.…
…
continue reading
1
The Prophet Ignored: A Bank Goes Dark in Uruguay.
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59- The catastrophic cyberattack that validated Alberto Daniel Hill's prophecy involved the theft of 30,000 of Uruguay's national PKI certificates. This event, described as a "devastating nationaltering crisis" and a "catastrophic cyber failure," occurred a few years after ADH's initial public warning.1. Nature of the Attack: A hacker, calling themse…
…
continue reading
1
ALBERTO PRESIDENT RAW AUDIO PART 1
11:54:36
11:54:36
Play later
Play later
Lists
Like
Liked
11:54:36ALBERTO PRESIDENT RAW AUDIO PART 1
…
continue reading
1
Ep. 2333 - Gavin Newsom Wants to Trans The Kids
1:06:10
1:06:10
Play later
Play later
Lists
Like
Liked
1:06:10Gavin Newsom says he wants to see “trans kids”; Indiana Republicans buck President Trump and refuse a redistricting plan; and are Democrats setting Republicans up for a fall over Obamacare costs? Ep.2333 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/3WDjgHE - - - Facts Don’t Care About Your Feelings - - - Today's …
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/is-shadow-ai-worse-than-shadow-it. Shadow IT was just the first of the hidden threats; now shadow AI has upped the ante. But which is worse — and how can you defend against them? Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You ca…
…
continue reading
1
Authorization in the Age of AI Agents: Beyond All-or-Nothing Access Control
25:20
25:20
Play later
Play later
Lists
Like
Liked
25:20This story was originally published on HackerNoon at: https://hackernoon.com/authorization-in-the-age-of-ai-agents-beyond-all-or-nothing-access-control. Authorization is the process of determining *what* you’re allowed to do. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content…
…
continue reading
1
'DroidLock' demands ransom, Google fixes secret Chrome 0-day, UK fines LastPass over 2022 breach
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22'DroidLock' malware demands ransom Google fixes secret Chrome 0-day UK fines LastPass over 2022 breach Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Security training fails when it's generic. Adaptive's platform personalizes training and r…
…
continue reading
1
Interface is everything, and everything is an interface
24:28
24:28
Play later
Play later
Lists
Like
Liked
24:28Ryan talks with Wesley Yu, head of engineering at Metalab, about the evolution of interfaces in technology, the pressure that UI generated on the fly would put on your backend systems, and why AI is just the latest and fanciest in a long line of CRUD apps. Episode notes: Metalab designs interfaces for top brands around the world, helping them desig…
…
continue reading
The United States seizes a Venezuelan oil tanker bound for Cuba; President Trump prepares to unlock some of Russia’s frozen bank accounts; and the Federal Reserve lowers interest rates…for the last time? Ep.2332 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/3WDjgHE - - - Facts Don’t Care About Your Feelings - - - …
…
continue reading
1
Automating Incident Response: How to Reduce Malware Forensics Time by 99% with Python and VirusTotal
5:03
5:03
Play later
Play later
Lists
Like
Liked
5:03This story was originally published on HackerNoon at: https://hackernoon.com/automating-incident-response-how-to-reduce-malware-forensics-time-by-99percent-with-python-and-virustotal. Build a pipeline that aggressively removes "Safe" files using three layers. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Yo…
…
continue reading
1
The 'Sudo' Problem: Why Google is Locking Down AI Agents Before They Break the Web
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57This story was originally published on HackerNoon at: https://hackernoon.com/the-sudo-problem-why-google-is-locking-down-ai-agents-before-they-break-the-web. Google has released a whitepaper on how they are architecting security for Chrome’s new Agentic capabilities. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
…
continue reading
1
Coupang CEO resigns, hactivists target US infrastructure, Israeli cybersecurity hits record funding
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51CEO of retail giant Coupang resigns Pro-Russia hactivists target US infrastructure Israeli cybersecurity funding hits record Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. In deepfake scams, the tells aren't glitchy video anymore – it's beh…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in soci…
…
continue reading
1
What Good Documentation Actually Looks Like | Medcurity Podcast 121
7:47
7:47
Play later
Play later
Lists
Like
Liked
7:47Have you ever wondered why documentation matters so much in HIPAA and cybersecurity? In this episode, we break down exactly what auditors expect to see, where most practices may go wrong, and how to create documentation that actually protects your organization. We keep this discussion straightforward—perfect if you don’t normally manage HIPAA or st…
…
continue reading
1
The Real State of Tech Hiring: AI, Ghosting, and the Developer Drought - JSJ 698
1:04:55
1:04:55
Play later
Play later
Lists
Like
Liked
1:04:55In this episode of JavaScript Jabber, Steve Edwards and I kick things off by catching up on life — from winter weather and marathon training to health journeys, CrossFit, and some behind-the-scenes personal stories that shaped how we think about wellness and longevity. After warming up, we shift our focus to the state of the tech job market, someth…
…
continue reading
1
Ep. 2331 - Is Affordability a “Democrat Hoax”?!
1:00:13
1:00:13
Play later
Play later
Lists
Like
Liked
1:00:13President Trump continues to push the narrative that affordability is a “Democrat hoax”; Republicans lose Miami for the first time in decades; and is our entire economy reliant on the success of AI? Ep.2331 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/3WDjgHE - - - Facts Don’t Care About Your Feelings - - - Today…
…
continue reading
1
INE Earns G2 Winter 2026 Badges Across Global Markets
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35This story was originally published on HackerNoon at: https://hackernoon.com/ine-earns-g2-winter-2026-badges-across-global-markets. Awards include Leader status in the Online Course Providers Grid Report, Momentum Leader recognition in two major training categories, and regional leadership. Check more stories related to cybersecurity at: https://ha…
…
continue reading
1
The Louvre Heist: Intimidation, DNA, and the Real Story Behind the Global Headline
8:45
8:45
Play later
Play later
Lists
Like
Liked
8:45This story was originally published on HackerNoon at: https://hackernoon.com/the-louvre-heist-intimidation-dna-and-the-real-story-behind-the-global-headline. Louvre heist and how the simple password is not the story. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
…
continue reading
1
Can Identity Security Close the AI Governance Gap?
21:29
21:29
Play later
Play later
Lists
Like
Liked
21:29As AI tools proliferate inside enterprises, often faster than security teams can track or govern them, a new class of risks are emerging. In this episode of the Security Strategist Podcast, IT-Harvest Chief Research Analyst Richard Stiennon sits down with Art Gilliland, CEO of Delinea, to discuss the explosive adoption of AI, the rise of shadow AI,…
…
continue reading
1
A Conversation with Matt Garman | AWS Executive Summit Recap
41:11
41:11
Play later
Play later
Lists
Like
Liked
41:11In this fireside chat with AWS CEO Matt Garman and AWS VP of Global Services, Uwem Ukpong, hear about the latest developments at AWS and why they matter to your business. Featured at the AWS Executive Summit at re:Invent, this discussion addresses everything from navigating data sovereignty with the European Sovereign Cloud, to building custom AI m…
…
continue reading
1
Spain arrest over data records, goodbye dark Telegram, scammers poison AI search results
7:24
7:24
Play later
Play later
Lists
Like
Liked
7:24Spain arrest over data records Goodbye, dark Telegram Scammers poison AI search results Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Picture a "new hire" who interviews well… except they're synthetic: AI video, AI voice, AI backstory. Onc…
…
continue reading
1
Drupal on Azure: The Smart, Affordable Path for Nonprofits
14:36
14:36
Play later
Play later
Lists
Like
Liked
14:36Send us a text Most nonprofits assume they must choose between expensive managed hosting or complex DIY cloud setups. But Microsoft Azure offers a $2,000/year nonprofit grant that, when used correctly, allows organizations to run enterprise-grade Drupal hosting at a fraction of the cost. In this episode, we explore the four hosting paths nonprofits…
…
continue reading
1
How Nonprofits Can Run Drupal on AWS for Free Using $5,000 in Credits
17:22
17:22
Play later
Play later
Lists
Like
Liked
17:22Send us a text Nonprofits can receive up to $5,000 per year in AWS credits through the AWS Nonprofit Credit Program — but most never use them because traditional Drupal hosts can’t accept those credits. Their platforms run in their own AWS accounts, not yours. In this episode, we break down the “AWS credit dilemma,” explore the three ways nonprofit…
…
continue reading
1
Inside Russia's Secret War: A Conversation with Sean Wiswesser
36:24
36:24
Play later
Play later
Lists
Like
Liked
36:24Join Suzanne Kelly as she delves into the world of Russian intelligence with former CIA operations officer Sean Wiswesser. Discover the intricacies of Russian operations, the impact of propaganda, and the ongoing secret war led by Putin. Gain insights into the challenges faced by the Russian people and the global implications of state-sponsored act…
…
continue reading
1
PP090: Why Native Controls Aren’t Enough to Protect Your Cloud Workspaces (Sponsored)
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37Cloud-based workspaces such as Google Workspace are often the backbone of an organization. But they also face threats from spam and phishing, account takeovers, and illicit access to sensitive documents and files. On today’s Packet Protector we talk with sponsor Material Security about how it brings additional layers of protection to Google Workspa…
…
continue reading
China pursues a strategy of strategically “beggaring thy neighbor” – but what can we do to fight it? Plus, President Trump unleashes agricultural subsidies, and Jasmine Crockett for Texas Senate? Ep.2330 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/3WDjgHE - - - Facts Don’t Care About Your Feelings - - - Today's …
…
continue reading
1
I Built a Tiny Browser-Only Encryption Tool Because I Don’t Trust Your Backend
10:25
10:25
Play later
Play later
Lists
Like
Liked
10:25This story was originally published on HackerNoon at: https://hackernoon.com/i-built-a-tiny-browser-only-encryption-tool-because-i-dont-trust-your-backend. A developer builds Encrypter, a browser-only tool for encrypting text without servers, logins, or tracking—offering a simple, secure way to share secrets. Check more stories related to cybersecu…
…
continue reading
1
Securing Kafka for PCI DSS Compliance: A Practical Guide for Financial Data Pipelines
10:31
10:31
Play later
Play later
Lists
Like
Liked
10:31This story was originally published on HackerNoon at: https://hackernoon.com/securing-kafka-for-pci-dss-compliance-a-practical-guide-for-financial-data-pipelines. comprehensive guide on aligning Kafka security with PCI DSS requirements, covering topics like Encryption, authentication and access Control, Auditing and monit Check more stories related…
…
continue reading
Please enjoy this encore of Word Notes. The use of similar-looking characters in a phishing URL to spoof a legitimate site. CyberWire Glossary link: https://thecyberwire.com/glossary/homograph-phishing Audio reference link: “Mission Impossible III 2006 Masking 01,” uploaded by DISGUISE MASK, 28 July 2018.…
…
continue reading
1
Ransomware costs billions, cybercrime leads to real violence, three arrested for hacking tools
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Ransomware payments pass $4.5 billion Cybercrime networks orchestrate real-world violence Three arrested over possessing hacking tools Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Attackers don't need malware anymore; they need trust. Tip…
…
continue reading
Ryan is joined by Kayvon Beykpour, CEO and founder of Microscope, to dive into AI-powered code review’s potential for managing large codebases, the need for humans-in-the-loop for reviewing PRs so AI tools can efficiently and effectively debug, and how AI can increase visibility through summarization at the abstract syntax tree level and high signa…
…
continue reading
1
Department of Know: CISO hiring warning, critical threat actor law, Microsoft Defender outage
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Link to episode page This week's Department of Know is hosted by Sarah Lane with guests Jason Shockey, CISO, Cenlar FSB, and Mike Lockhart, CISO, Eagleview Thanks to our show sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. AI is rewriting the cybersecurity rulebook, b…
…
continue reading