Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Zero Trust Security Strategies Podcasts

show episodes
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
  continue reading
 
For many of us, the workplace is more than a single building or facility. That’s what makes workforce IAM so powerful. By managing security through something we all take wherever we go — our identities — it gives users the flexibility they need to stay productive and enables administrators to quickly detect and address risks. HID’s robust, flexible workforce identity and access management solutions provide your workforce with seamless access to the resources they need — no matter where they are.
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
  continue reading
 
Artwork

1
Adopting Zero Trust

Adopting Zero Trust

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Adopting Zero Trust offers an ongoing conversation that elevates cybersecurity conversations that encourages you to rethink how you build strategies, defend against threat actors, and implement new technology. We go beyond the millions in marketing budgets fueled by VCs, and chat with practitioners like you who want to make a difference (or hack the planet, which ever happens first).
  continue reading
 
A podcast for digital transformation leaders. Network security experts Pam Kubiatowski and Lisa Lorenzin discuss the latest cyber-attack issues, enterprise security strategies, and current security events so that you can successfully accelerate network and security transformation. You can subscribe to the podcast feed on Apple Podcasts and Spotify.
  continue reading
 
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
  continue reading
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Welcome to Cyber Insights, the podcast that bridges the worlds of networking and cybersecurity. From cutting-edge innovations in enterprise connectivity to the latest in digital defense, we break down the buzzwords and bring you actionable insights to secure and scale your systems. Whether you're an IT professional, business leader, or tech enthusiast, join us as we explore the critical intersection of networks and security, featuring expert conversations, industry trends, and real world str ...
  continue reading
 
Artwork

1
Convergence

Cato Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Convergence by Cato Networks is a show for IT professionals made by IT professionals. We'll talk about the most burning questions, hear bolder opinions and mostly learn about what is happening in the IT world today
  continue reading
 
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
  continue reading
 
Artwork

1
Compliance Therapy™

Risk. Security. Compliance. Get It Together.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Compliance Therapy™. This informative podcast bridges the gap between regulatory compliance, risk assessment, and cybersecurity best practices, making complex topics accessible for technology, business, and legal leaders. Join us and our renowned guests as they offer valuable insights and actionable strategies to strengthen your organization’s security posture and maintain compliance with key regulations such as NIST, FedRAMP, CMMC, and FISMA. Stay ahead in the rapidly evolving la ...
  continue reading
 
Artwork

1
Federal Executive Forum

Federal News Network | Hubbard Radio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Federal Executive Forum teams leaders in the government market to provide best-of-breed thought leadership media programs that deliver access to the government market, develop a high level of mindshare, and strengthen brands.
  continue reading
 
Expanding Your Horizon is the ultimate destination for business and technology enthusiasts who want to stay ahead of the curve. Join us as we explore the latest trends, innovations, and strategies in the world of business and technology. Our expert guests share their insights, experiences, and knowledge on a variety of topics, from digital transformation and entrepreneurship to leadership and innovation. Whether you’re an entrepreneur, executive, or simply curious about the intersection of b ...
  continue reading
 
Artwork

1
The Gem of all Mechanisms

BCS, the Chartered Institute for IT

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Gem of all Mechanisms podcast is an interview series, where we talk to people in the know from many different disciplines: academics, computer scientists, policy makers, philosophers and more about the complexities of 21st century tech and how it affects us all. It is produced by BCS, the Chartered Institute for IT. BCS is on a mission to ensure everyone’s experience with technology is positive. We support the people who work in the industry and aim to make IT good for society. Our membe ...
  continue reading
 
Artwork

1
Powering SMB

XenTegra ONE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to "Powering SMB," the ultimate podcast dedicated to empowering small to medium-sized businesses (SMBs) with the knowledge, tools, and inspiration they need to thrive in today's competitive landscape. Hosted by XenTegra One, a leader in SMB-focused technology solutions, this podcast brings you insightful conversations with industry experts, thought leaders, and successful entrepreneurs who have mastered the art of powering SMBs to new heights. In each episode, we dive deep into the c ...
  continue reading
 
Loading …
show series
 
In this episode of the Defenders Log, we have Aditi Patange from Microsoft alongside our hosts, David Redekop and Francois from Adam Networks, for an in-depth discussion on Zero Trust DNS, a new enterprise security feature within Windows 11. Aditi shares his background in computer engineering and product management and how his work contributes to c…
  continue reading
 
By Michael Matias, CEO of Clarity and Forbes 30 Under 30 alumWe’re not easing into the AI era—we’ve been thrown into it. That’s how Ron Peled, founder of Sola and former CISO at LivePerson, described the current moment: “The Big Bang already happened. Now we’re just trying to contain the blast.”Ron’s clarity around AI’s impact on cybersecurity is j…
  continue reading
 
What if the next billion-dollar startup was brewing in Berlin, Munich, or Vienna right now? In this episode, we cover the game-changing deals, deep tech breakthroughs, and green innovation stories shaping the DACH startup scene in September 2025. Whether you’re a founder, VC, or ecosystem insider, this is your shortcut to staying ahead in Europe’s …
  continue reading
 
In the age of AI agents, cybersecurity is shifting from focusing on identity to addressing agency. Autonomous agents, which act and reason like humans but operate at machine speed, are being created on the fly. Traditional identity management tools—like user directories and group policies—are ill-equipped to handle these ephemeral, unpredictable en…
  continue reading
 
By Michael Matias, CEO of Clarity and Forbes 30 Under 30 alum For decades, cybersecurity vendors have armed defenders with dashboards filled with red alerts. But they rarely delivered solutions. As Tsion (TJ) Gonen put it in our recent conversation: “97% of tools just showed you a red screen that said, basically, ‘you suck.’” No remediation. No act…
  continue reading
 
The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
  continue reading
 
The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
  continue reading
 
In this episode of The Power of Zero Show, host David McKnight discusses why it may make sense to replace the bonds in your retirement portfolio with a Fixed Index Annuity, and how doing so could lead to a much better outcome for your retirement. For decades, financial advisors have followed the conventional wisdom of the 60-40, 60% stocks, 40% bon…
  continue reading
 
THE SONY HACK: HOLLYWOOD, NORTH KOREA & THE CYBER WAR THAT CHANGED EVERYTHING In 2014, Sony Pictures became ground zero for the first major nation-state cyberattack on a global corporation. The “Guardians of Peace,” linked to North Korea, crippled Sony’s networks, leaked unreleased films, and exposed troves of executive emails that forced high-leve…
  continue reading
 
Shirin Anlen traces her path from interactive storytelling to safeguarding human‑rights evidence at WITNESS. She explains how today’s scale, personalization, and ease of manipulation fuel “reality apathy,” empowering leaders to dismiss inconvenient truths as “AI.” Beyond any single tool, she argues for equitable standards, privacy‑aware provenance,…
  continue reading
 
In this episode, we discuss if the convenience of modern technology compromises our privacy. Inspired by a thought-provoking Reddit post, we explore how everyday actions like saving passwords, enabling location tracking, and using cloud backups put our personal data at risk. Learn about the trade-offs between convenience and privacy, and get tips o…
  continue reading
 
Berlin’s AI just rocketed from $350M to $2.3B. At the same time, Switzerland locked in €825M hydrogen funding, and N26 faced its toughest governance test yet. This is not Silicon Valley news. This is the DACH region (Germany, Austria, Switzerland) reshaping startup dynamics — and it’s moving fast. In this Startuprad.io Summer Wrap-Up 2025, we unpac…
  continue reading
 
What does it really take to move from a GenAI prototype to a production-ready system? In this episode, AWS AI Engineering Specialist Dennis Traub breaks down the hard truths behind scaling, securing, and monitoring AI systems — and why the future belongs to startups who learn how to productionize AI fast. What You’ll Learn in This Episode: Why most…
  continue reading
 
How are government leaders are transforming legacy systems, streamlining operations and harnessing cutting-edge technologies to deliver better services? See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
  continue reading
 
Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
  continue reading
 
Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
  continue reading
 
With decades in cybersecurity, Benjamin Corll has seen threat landscapes evolve from simple antivirus battles to AI-driven social engineering. For Corll, every breach traces back to people—both as the strongest defense and the weakest link. In this conversation, he unpacks the persistence of ransomware and business email compromise, the rise of AI-…
  continue reading
 
David sits down with John Manganaro to unpack the advice of financial gurus like Dave Ramsey and Suze Orman. While their guidance has helped countless Americans get out of debt, David explains why their cookie-cutter approach to retirement income planning can fall short. Why “hope over math” is a dangerous foundation for retirement planning—David e…
  continue reading
 
In this episode, host Matthew Lewis, Director of Product Marketing, is joined by Don Campbell, Senior Director of Product Management, and Scott Galvin, Pre-Sales Senior Solutions Architect, for a deep dive into the evolving landscape of physical security in financial services. Together, the trio explores: Insider threat types and how to detect them…
  continue reading
 
Public Wi-Fi has a bad reputation — but in 2025, the “you’ll get hacked instantly” fear is largely outdated. In this episode, Tom and Kevin dig into real research and modern protections that make most public Wi-Fi connections reasonably safe. We’ll explore why HTTPS, device security, and updated standards have drastically reduced the risks, what th…
  continue reading
 
SIN CITY CYBERATTACK: INSIDE THE MGM & CAESARS CASINO BREACHES In September 2023, Las Vegas turned into ground zero for one of the most disruptive cyberattacks in U.S. history. MGM Resorts, owner of iconic casinos on the Strip, saw slot machines go dark, hotel check-ins grind to a halt, and operations paralyzed for days. At the same time, Caesars E…
  continue reading
 
In today's episode of the Defender's Log, we welcome special guest Tommy Jensen, an internet technologist with expertise in IPv6, Zero Trust, and standards. The episode covers Jensen's career journey from an AppleCare contractor to a pivotal role in advancing internet technologies. The discussion delves into the importance and challenges of migrati…
  continue reading
 
From disappearing people in videos in the late 1990s to shaping AI and vision systems at Intel, Tal Hassner, Chief Scientist for Computer Vision, has watched synthetic media evolve from lab curiosities to global challenges. In this conversation, he dismantles the idea that “is it fake?” is the central question for security. Instead, he lays out a t…
  continue reading
 
The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
  continue reading
 
The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
  continue reading
 
David explains why A.I. could make Universal Basic Income (UBI) a reality sooner than you think. As machines take over more jobs—especially white-collar ones—we may need a new safety net just to keep society stable. Why UBI is no longer a fringe idea but a serious policy being considered in Washington. It promises monthly cash payments to every adu…
  continue reading
 
When is it really time to replace IT tools? In this episode of Ticket Volume – IT Podcast, we dive into the warning signs, triggers, and challenges that push organizations to switch IT software. Host Matt Beran sits down with Ignacio Harriague (Director of Product Marketing at InvGate), Linda Lenox (Program Delivery Director at Hall's Culligan Wate…
  continue reading
 
In this episode we're discussing the alarming breach of the Tea app, a platform intended for women to share dating experiences. The hack resulted in the exposure of over 13,000 government ID photos, 72,000 user images, and over a million private messages due to poor security practices. We'll discuss the role of sloppy coding, an exposed database, a…
  continue reading
 
The CISO Signal | INSIDE CNA's $40M BITCOIN RANSOM | The Hack That Changed Cybersecurity - EP 4 In this episode of The CISO Signal, we go deep inside the cyberattack that shook the financial world. Join us as we unravel the haunting details of the 2021 ransomware attack on CNA Financial, which resulted in a record-breaking $40 million ransom paymen…
  continue reading
 
From phishing tests to AI-driven impersonation scams, Joshua Scarpino has seen firsthand how the human element remains the most critical factor in cybersecurity. Drawing on his experience across organizations from NIST to Trust Engine, he explains why technology alone can’t safeguard an enterprise. Instead, effective defense comes from a culture wh…
  continue reading
 
Startups love GenAI. But most founders are using it unsafely — and exposing their team, their customers, and their legal risk without even realizing it. In this episode of Startuprad.io, we sat down with Dennis Traub, AI Engineering Specialist at AWS, to unpack what safe adoption of Generative AI really means for founders, CTOs, and product leads. …
  continue reading
 
How do you protect an organization when every link in the chain can—and will—fail? Ira Winkler, NSA veteran and author of You Can Stop Stupid, unpacks why human error isn’t the root of security breaches—it’s the visible tip of deeper systemic gaps. From smashing the myth of awareness-as-strategy to advocating for consequence-driven behavior change,…
  continue reading
 
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
  continue reading
 
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
  continue reading
 
David starts by talking about the apocalyptic headwinds facing Social Security and Medicare and what it means for your retirement plan. The Social Security and Medicare trust funds are projected to be insolvent by 2033, with the combined Social Security trust fund gone by 2034. David explains why this isn’t just a distant problem: Without intervent…
  continue reading
 
In this episode, we discuss a rising scam involving random smishing text messages. Learn how these messages work, why they're effective, and what you can do to protect yourself. Discover the dangers of replying to vague text messages from unknown numbers and get practical tips on how to block and report spam texts. Stay safe by not engaging with th…
  continue reading
 
THE UBER BREACH: HOW A 17-YEAR-OLD HACKED A FORTUNE 500 COMPANY A 17-year-old hacker. A simple social engineering tactic. A taunting message posted to Uber’s internal Slack channel. In one of the most audacious breaches in recent memory, a teenager allegedly affiliated with the Lapsus$ group compromised a Fortune 500 company, exposing critical vuln…
  continue reading
 
What happens when your “meatspace” identity can no longer keep up with your digital life? Daniel Flowe, Head of Digital Identity at the London Stock Exchange Group, takes us inside the tectonic shift reshaping how we verify who we are online. From the flaws of content-based systems to the promise—and risks—of government-issued e-IDs, he unpacks wha…
  continue reading
 
In this episode of 'The Defender's Log,' host David engages in a comprehensive discussion with John Todd, an influential figure in the defense technology space and a key player at Quad9. The conversation covers John's career journey, starting from the early days of commercial internet services to his current role at Quad9. They delve into the impor…
  continue reading
 
Beni Beeri Issembert’s journey from aspiring philosopher to Head of AI Research and Ethics at Metaphysic is anything but linear. With a deep reverence for Nietzsche and an early curiosity about ethics in technology—long before it became a buzzword—Beni brings a rare perspective to synthetic media and AI. In this thought-provoking conversation, he e…
  continue reading
 
Recent findings of AI ecosystem insecurities and attacks show the importance of needing AI governance in the supply chain. And this supply chain is rapidly expanding to include not only open-source software but also collaborative platforms where custom models, agents, prompts, and other AI resources are used. And with this expansion of third-party …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play