Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
  continue reading
Zero Trust Security Strategies Podcasts
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
  continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
  continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
  continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
  continue reading

1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™
Startuprad.io – Europe’s Startup & VC Podcast Network
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
…
  continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
  continue reading
Welcome to Cyber Insights, the podcast that bridges the worlds of networking and cybersecurity. From cutting-edge innovations in enterprise connectivity to the latest in digital defense, we break down the buzzwords and bring you actionable insights to secure and scale your systems. Whether you're an IT professional, business leader, or tech enthusiast, join us as we explore the critical intersection of networks and security, featuring expert conversations, industry trends, and real world str ...
…
  continue reading
Adopting Zero Trust offers an ongoing conversation that elevates cybersecurity conversations that encourages you to rethink how you build strategies, defend against threat actors, and implement new technology. We go beyond the millions in marketing budgets fueled by VCs, and chat with practitioners like you who want to make a difference (or hack the planet, which ever happens first).
…
  continue reading
A podcast for digital transformation leaders. Network security experts Pam Kubiatowski and Lisa Lorenzin discuss the latest cyber-attack issues, enterprise security strategies, and current security events so that you can successfully accelerate network and security transformation. You can subscribe to the podcast feed on Apple Podcasts and Spotify.
…
  continue reading
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
…
  continue reading
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
…
  continue reading
Join hosts Christina Ellwood and David Yakobovitch as they dive deep into the cutting-edge world of enterprise AI deployment. Drawing inspiration from the annual AI Realized Summit, this podcast brings you the insights, strategies, and real-world experiences of Fortune 2000 leaders who are reshaping their organizations through AI. Each episode of AI Realized tackles the most pressing challenges and opportunities in AI implementation: Discover how industry giants like Bank of America, GitHub, ...
…
  continue reading
The Cyber Resilience Brief is your 15-minute pulse on how organizations can build stronger defenses and achieve true cyber resilience. Each episode dives into the practical realities of Breach and Attack Simulation (BAS), adversarial exposure validation, and the evolving strategies that keep modern enterprises secure. Hosted by Tova Dvorin and brought to you by SafeBreach — the leader in Adversarial Exposure Validation — this podcast features insights from cybersecurity leaders, integration  ...
…
  continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
  continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
  continue reading
For many of us, the workplace is more than a single building or facility. That’s what makes workforce IAM so powerful. By managing security through something we all take wherever we go — our identities — it gives users the flexibility they need to stay productive and enables administrators to quickly detect and address risks. HID’s robust, flexible workforce identity and access management solutions provide your workforce with seamless access to the resources they need — no matter where they are.
…
  continue reading
20MinuteLeaders features the world's prominent leaders for short conversations about their journeys and insights.
…
  continue reading
Convergence by Cato Networks is a show for IT professionals made by IT professionals. We'll talk about the most burning questions, hear bolder opinions and mostly learn about what is happening in the IT world today
…
  continue reading
A bi-weekly podcast that helps you curb cybersecurity risk and tackle technology challenges
…
  continue reading
Welcome to Compliance Therapy™. This informative podcast bridges the gap between regulatory compliance, risk assessment, and cybersecurity best practices, making complex topics accessible for technology, business, and legal leaders. Join us and our renowned guests as they offer valuable insights and actionable strategies to strengthen your organization’s security posture and maintain compliance with key regulations such as NIST, FedRAMP, CMMC, and FISMA. Stay ahead in the rapidly evolving la ...
…
  continue reading
The Federal Executive Forum teams leaders in the government market to provide best-of-breed thought leadership media programs that deliver access to the government market, develop a high level of mindshare, and strengthen brands.
…
  continue reading
The podcast making sense of cyber and technology issues impacting business.
…
  continue reading
CyberCast offers a different and thoughtful perspective on the cybersecurity issues facing industry and government today. 213656
…
  continue reading
Expanding Your Horizon is the ultimate destination for business and technology enthusiasts who want to stay ahead of the curve. Join us as we explore the latest trends, innovations, and strategies in the world of business and technology. Our expert guests share their insights, experiences, and knowledge on a variety of topics, from digital transformation and entrepreneurship to leadership and innovation. Whether you’re an entrepreneur, executive, or simply curious about the intersection of b ...
…
  continue reading
The Gem of all Mechanisms podcast is an interview series, where we talk to people in the know from many different disciplines: academics, computer scientists, policy makers, philosophers and more about the complexities of 21st century tech and how it affects us all. It is produced by BCS, the Chartered Institute for IT. BCS is on a mission to ensure everyone’s experience with technology is positive. We support the people who work in the industry and aim to make IT good for society. Our membe ...
…
  continue reading
Welcome to "Powering SMB," the ultimate podcast dedicated to empowering small to medium-sized businesses (SMBs) with the knowledge, tools, and inspiration they need to thrive in today's competitive landscape. Hosted by XenTegra One, a leader in SMB-focused technology solutions, this podcast brings you insightful conversations with industry experts, thought leaders, and successful entrepreneurs who have mastered the art of powering SMBs to new heights. In each episode, we dive deep into the c ...
…
  continue reading

1
LIU003: A Chat With ‘The Cloud Therapist’
44:24
44:24
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
44:24Your background and experiences outside of tech can become a significant factor in your tech career. Guest Chris Williams is a good example; he talks about how his undergraduate and graduate studies in psychology influenced his work as a Developer Relations Manger at Hashicorp. Hosts Alexis Bertholf and Kevin Nanns chat with him about how... Read m…
…
  continue reading

1
PP084: Inside the CVE Process With Cisco (Sponsored)
44:50
44:50
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
44:50CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that…
…
  continue reading

1
Europe’s AI Supercluster: How DACH Startups Are Outpacing Silicon Valley
26:35
26:35
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
26:35What if Europe — not Silicon Valley — defined the future of AI? In this October 2025 episode of Startuprad.io Startup News, hosts Jörn “Joe” Menninger and Chris Fahrenbach break down the latest stories shaping Europe’s AI Supercluster, led by DeepL, Black Forest Labs, and N8N. From record climate tech funding to biotech breakthroughs and industrial…
…
  continue reading

1
Episode 30: Unleash Agents, Keep the Keys w/Shomit Ghose
45:17
45:17
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
45:17Venture partner Shomit Ghose reveals how to scale agentic AI without losing control. Learn where to start, how to guardrail automation, and which KPIs prove real value while your humans stay in charge.
…
  continue reading

1
Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx
29:34
29:34
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
29:34Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx In this episode of the Security Repo Podcast, François Proulx, VP of Security Research at Boost Security, discusses the evolving threats in software supply chain security, particularly focusing on attacks targeting CI/CD pipelines. He explains how open source tools li…
…
  continue reading
Join William Collins and Evyonne Sharp as they catch up on all things AI. They discuss the AI bubble and how it relates to venture capital, stock, and company evaluations. They talk about the AI experience for the average person, the adoption rate of AI tools, and how the AI infrastructure buildout might affect the... Read more »…
…
  continue reading

1
NAN104: The Art and Science of Writing a Network Automation Book
57:53
57:53
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
57:53Host Eric Chou talks with Jeff Kala, co-author of the newly released “Network Automation Cookbook 2nd Edition,” to discuss his book and the experiences that led him from networking to network automation author. They discuss Jeff’s learning style and why it was helpful when working on his book. Lastly, they dig into Jeff’s predictions on... Read mor…
…
  continue reading

1
Ep. 27 - The Evolution of ShinyHunters: From Data Theft to Weaponized Trust
17:19
17:19
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
17:19The ShinyHunters threat group has transformed from a dark-web data broker into one of the most dangerous alliances in modern cybercrime. In this episode of The Cyber Resilience Brief, host Tova Dvorin and Adrian Culley, Offensive Security Engineer at SafeBreach, break down how the group’s merger with Scattered Spider marks a new era of as-a-service…
…
  continue reading

1
HS115: Cyber-Risk Assessment and Cybersecurity Budgeting: You’re (Probably) Doing It Wrong
36:15
36:15
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
36:15To understand how much to spend on cybersecurity, you have to accurately assess or quantify your risks. Too many people still peg their cybersecurity spend to their IT budget; that is, they’ll look at what they’re spending on IT, and then allocate a percentage of that to cybersecurity. That may have made some sense when... Read more »…
…
  continue reading
In the finale of our Cybersecurity Awareness Month series, SafeBreach’s Cyber Resilience Brief delivers its most powerful episode yet — The Cyber Resilience Playbook. Join hosts Tova Dvorin and Adrian Culley as they connect the dots between Breach and Attack Simulation (BAS), Adversarial Exposure Validation (AEV), and Continuous Automated Red Teami…
…
  continue reading

1
NB549: Startups Take on Switch, ASIC Incumbents; Google Claims Quantum Advantage
49:32
49:32
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
49:32Take a Network Break! Companies spying on…I mean, monitoring…their employees via software called WorkExaminer should be aware of a login bypass that needs to be locked down. On the news front, we opine on whether it’s worth trying to design your way around AWS outages, and speculate on the prospects of a new Ethernet switch... Read more »…
…
  continue reading

1
Tech Bytes: Why Equinix Should Be Part of Your AI Network Strategy (Sponsored)
18:40
18:40
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
18:40AI infrastructure conversations tend to be dominated by GPUs, data center buildouts, and power and water consumption. But networks also play a crucial role, whether to support huge file transfers to a compute cluster, stream telemetry from edge locations to feed AI pipelines, or provide high-speed, low latency connectivity for AI agents. On today’s…
…
  continue reading

1
The $610 Million Poly Network Hack: The Greatest Heist That Never Was
32:52
32:52
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:52The $610 Million Poly Network Hack: The Greatest Heist That Never Was In one of the most shocking moments in crypto history, a lone hacker exploited a vulnerability in Poly Network’s cross-chain protocol—draining over $610 million in digital assets across Ethereum, Binance Smart Chain, and Polygon. Then, in a twist no one saw coming… they gave it a…
…
  continue reading

1
HN802: Unifying Networking and Security with Fortinet SASE: Architecture, Reality, and Lessons Learned (Sponsored)
58:39
58:39
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
58:39The architecture and tech stack of a Secure Access Service Edge (SASE) solution will influence how the service performs, the robustness of its security controls, and the complexity of its operations. Sponsor Fortinet joins Heavy Networking to make the case that a unified offering, which integrates SD-WAN and SSE from a single vendor, provides a... …
…
  continue reading

1
TNO047: Advice From Both Sides of the Network Aisle
49:35
49:35
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
49:35Senad Palislamovic has held many roles in his time, from engineer to network operator to sales engineer and back again. He’s been around long enough to see trends come and go. Senad visits Total Network Operations to share some of his observations on network automation, AI for NetOps, and the quality of network data. Senad... Read more »…
…
  continue reading

1
IPB186: An Inside Look at RFC 9872 for Discovering v6 Prefixes
20:10
20:10
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
20:10RFC 9872 makes recommendations for NAT64 prefix discovery for hosts supporting v4-to-v6 translation. Co-host Nick Buralgio is a co-author of this RFC, so we’re taking the opportunity to talk about it in detail. We discuss the problems RFC 9872 is addressing and why a new RFC was needed for operational guidance, not necessarily defining a... Read mo…
…
  continue reading

1
N4N041: Switched Virtual Interface (SVI) and Integrated Routing and Bridging (IRB)
49:58
49:58
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
49:58If you’ve ever wondered what the difference is between a Switched Virtual Interface (SVI) and Integrated Routing and Bridging (IRB), today’s show is for you! Ethan Banks and Holly Metlitzky start with some history and the basics of communication between layer 2 and layer 3 and then explain how the concepts of SVI and IRB... Read more »…
…
  continue reading

1
Episode 29: Vision to Value in CPG w/Nitin Gupta
21:33
21:33
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
21:33Nitin Gupta, Global Product Manager of AI at Mondelēz International, shows how computer vision, agent based workflows, and firm governance turn pilots into real gains on the shelf. Hear how his teams personalize store execution in near real time, automate smart handoffs with human in the loop controls, and hit KPIs like on shelf availability, forec…
…
  continue reading

1
Detective Chief Superintendent Barry Walsh: Inside Ireland's Fight Against Cybercrime
34:57
34:57
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
34:57When ransomware hits, you have hours- not days- to respond. But should you prioritise survival or evidence preservation? And why are small businesses now the primary targets? In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray and Ian Finlayson sit down with Detective Chief Superintendent Barry Walsh, head …
…
  continue reading

1
How Xaver Lehmann Recovered from Burnout After a $60 M Startup Exit
58:52
58:52
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
58:52He sold his AI startup for $60 million — and fell apart. In this raw and powerful conversation, Xaver Lehmann, co-founder and former CEO of e-bot7, opens up about burnout, loss, and recovery after one of Europe’s biggest AI exits. What happens when you achieve everything you ever wanted — and it breaks you? 💡 What you’ll learn in this episode: – Ho…
…
  continue reading

1
Fighting Tool Squatting And Prompt Injection & The Security Gaps In MCP – Srajan Gupta
23:41
23:41
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
23:41In this episode of the Security Repo Podcast, we welcome Srajan Gupta, a security engineer exploring the evolving security implications of Model Context Protocol (MCP) servers. Shrojan breaks down how MCPs act as AI connectors to external systems and the alarming rise in attack surfaces, including tool squatting and indirect prompt injections. The …
…
  continue reading

1
D2DO285: The Death of IaC Has Been Greatly Exaggerated
39:52
39:52
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
39:52While declaring the death of Infrastructure as Code (IaC) or Terraform may get you clicks on LinkedIn, IaC is alive and kicking. On today’s Day Two DevOps we talk about why IaC still matters. Guest Malcolm Matalka argues that IaC provides the tools and a model for managing infrastructure across its lifecycle in a structured... Read more »…
…
  continue reading

1
Ep. 25: Beyond the Drill: The Power of Continuous Automated Red Teaming (CART)
10:40
10:40
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
10:40How can security teams stay truly proactive in a world where adversaries never stop? In this episode of The Cyber Resilience Brief, hosts Tova Dvorin and Adrian Culley explore Continuous Automated Red Teaming (CART) — the next evolution in proactive security validation. They break down how CART extends beyond traditional red teaming and breach simu…
…
  continue reading

1
PP083: A CISO’s Perspective on Model Context Protocol (MCP)
44:03
44:03
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
44:03Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understan…
…
  continue reading
A wireless-first office is a sensible goal these days when most laptops don’t have an Ethernet port and lots of devices use Wi-Fi. Wireless and network architect Phil Sosaya led the transition to wireless-first offices at sites across the globe. He details his design approach, including why he doesn’t bother with site survey software. He... Read mo…
…
  continue reading

1
NB548: Broadcom Brings Chips to Wi-Fi 8 Party; Attorneys General Scrutinize HPE/Juniper Settlement
29:16
29:16
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
29:16Take a Network Break! On today’s coverage, F5 releases an emergency security update after state-backed threat actors breach internal systems, and North Korean attackers use the blockchain to host and hide malware. Broadcom is shipping an 800G NIC aimed at AI workloads, and Broadcom joins the Wi-Fi 8 party early with a sampling of pre-standard... Re…
…
  continue reading

1
Ep. 24 - BrickStorm: From LoTL to "Living Off the Blind Spot"
12:52
12:52
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
12:52In this episode of The Cyber Resilience Brief, host Tova Dvorin and SafeBreach offensive security expert Adrian Culley unpack BrickStorm — a highly sophisticated espionage operation attributed to China-nexus group UNC5221. With an average dwell time of 393 days, this campaign redefines stealth and persistence in cyber warfare. Discover how attacker…
…
  continue reading

1
Teaching Cyber Without Fear: Lindsey Mote on Making Security Click for Everyone
43:05
43:05
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
43:05Meeting People Where They Are: A Cybersecurity Journey with Lindsay Join us in this insightful episode of the Off the Wire podcast as we welcome Lindsay, a cybersecurity professional who transitioned from a decade in real estate to making impactful strides in the world of cybersecurity. Lindsay shares her unique journey, beginning with multinationa…
…
  continue reading

1
HN801: Will a Natural Language Interface (NLI) Replace Your CLI?
59:51
59:51
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
59:51Could an LLM or some kind of an AI-driven language model, such as a natural language interface, someday replace our beloved CLI? That is, instead of needing to understand the syntax of a specific vendor’s CLI, could a language model allow network operators to use plain language to get the information they need or the... Read more »…
…
  continue reading

1
TNO046: Prisma AIRS: Securing the Multi-Cloud and AI Runtime (Sponsored)
27:22
27:22
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
27:22Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsored episode with Palo Alto Networks, we dig into offerings such as CLARA (Cloud and AI Risk Assessment) that help ops teams gain more visibility into the structure and workflows of their multi-cloud net…
…
  continue reading

1
LIU002: Do You Need a College Degree to Succeed in IT?
1:02:29
1:02:29
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:02:29A college degree can be a useful stepping stone into a tech career, and it certainly doesn’t hurt to have it on your resume. But do you really need that college degree to succeed in IT? Maybe, maybe not. Today’s guest is Wes Noonan, whose non-traditional path into and through a career in IT has... Read more »…
…
  continue reading

1
Episode 28: AI That Moves the P&L w/Tallulah Le Merle
27:36
27:36
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
27:36Investor and fractional executive Tallulah Le Merle shows leaders how to cut through the AI hype, pick winning use cases, and deploy agent based systems that lift KPIs without breaking trust. Strategy first, champions engaged, results you can measure.
…
  continue reading

1
Cyber Warriors & Digital Shadows: Insights from Canada's Cybersecurity Leader | Sami Khoury
49:22
49:22
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
49:22In this episode of The Defender’s Log, host David Redekop sits down with Sami Khoury, the Head of the Canadian Centre for Cyber Security, for an inside look at the battle to protect national infrastructure from unseen digital threats. From his beginnings as a research engineer in 1992 to leading one of Canada’s most critical cybersecurity agencies,…
…
  continue reading

1
Fixing Hiring, Fostering Diversity, and Finding Your Place in Security – Matt Torbin
19:15
19:15
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
19:15In this episode of the Security Repo Podcast, we sit down with Matt Torbin to explore his inspiring journey from jazz musician to cybersecurity advocate and leader. We dive deep into the origins and impact of Day of Shecurity, a one-day conference aimed at increasing representation and mentorship for women and non-binary individuals in infosec. Mat…
…
  continue reading

1
TCG060: Rockets, Networks, and Markets With Michael Reid
1:00:45
1:00:45
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:00:45Michael Reid went from studying aerospace engineering to becoming CEO at Megaport, a global network-as-a-service platform. How did he get there, and what can we learn from his journey? We walk his career path, including a pivotal role scaling ThousandEyes from 74 million to over 2.4x ARR post-acquisition, and how those experiences shaped his approa…
…
  continue reading

1
NAN103: The Evolution of Multi-Cloud Networking
47:47
47:47
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
47:47We’re thrilled to welcome Tim McConnaughy back to the podcast. Tim is a hybrid cloud network architect, author, and co-host of the Cables to Cloud podcast. He recently wrote a 5-part blog series titled ‘Goodbye, Yellow Brick Road’ that reflects on his career path, including his decision to leave a startup. We discuss the impetus... Read more »…
…
  continue reading

1
Ep. 23 - Zeroing In on Adversary Exposure Validation (AEV): Moving Beyond Vulnerability Management
9:54
9:54
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
9:54In episode 2 of our special 4-part Cybersecurity Awareness Month series, The Cyber Resilience Brief hosts Tova Dvorin and Adrian Culley dive deep into Adversary Exposure Validation (AEV) — the next evolution of Breach and Attack Simulation (BAS) and Continuous Threat Exposure Management (CTEM). Learn how AEV helps organizations move beyond endless …
…
  continue reading

1
Paul Guckian: Why CISOs Can't Fix Cybersecurity (And What Actually Works)
36:40
36:40
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
36:40"Just defend better and you won't need resilience." It's the logic trap that's burning out CISOs worldwide - but what if the entire premise is wrong? In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray and Ian Finlayson sit down with Dr. Paul Guckian, author of "Systematic Cyber Risk: Why CISOs Can't Fix Cy…
…
  continue reading

1
Episode 20 - ECC, Smart Grids, and Physical Sabotage
38:09
38:09
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
38:09This episode is a deep dive into the mathematics, implementation, and vulnerabilities of modern digital security, focusing on the powerful role of Elliptic Curve Cryptography (ECC). ECC has largely superseded older algorithms like RSA because of its superior efficiency, providing equivalent security strength with significantly shorter keys, a cruci…
…
  continue reading

1
Episode 19 - Systemic Security Failures and the Cyber-Physical War
42:15
42:15
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
42:15This episode explores the core mechanisms, failures, and threats related to modern digital security, moving from mathematical foundations to real-world cyber warfare. The foundation of secure communication relies on cryptography, which is broadly split into symmetric ciphers (like AES) for high-speed confidentiality, and asymmetric ciphers (like RS…
…
  continue reading

1
Episode 18 - Code Flaws, Metadata Wars, and Nation-State Cyber Warfare
43:34
43:34
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
43:34This episode dives into the true state of digital security by examining the fundamental building blocks of cryptography, their inherent vulnerabilities, and the systemic threats that compromise them. The foundation of secure communication relies on ciphers like the symmetric Triple DES (3DES), which bought time by increasing the effective key size …
…
  continue reading

1
PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps
1:02:01
1:02:01
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:02:01Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read …
…
  continue reading

1
HS114: In or Out? Deciding Which IT Functions to Bring In or Push Out
39:41
39:41
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
39:41In times of major change–whether in IT or the economy–organizations should take a fresh look at their sourcing strategy. Companies outsourcing key functions need to re-examine the reasoning and scrutinize the results. The same goes for in-house functions. IT leaders need to ask: is our sourcing strategy in line with our current corporate and IT... …
…
  continue reading

1
NB547: New Cisco Router Targets AI DCI; Salesforce Launches ServiceNow Competitor
30:55
30:55
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
30:55Take a Network Break! We start with listener follow-up on security browsers, and then dive into a deep pool of Juniper vulnerabilities to pick two critical ones affecting Juniper Space. We also get an update from SonicWall that the breach of its cloud storage service affected all users of the service. Cisco announces a new... Read more »…
…
  continue reading

1
Flow State Rituals for Founders: Deep Work, Distraction Hacks & AI Focus
47:44
47:44
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
47:44In this episode, Steven Puri, CEO of The Sukha Company and former Hollywood VFX executive (Independence Day, Godzilla, Transformers Prime), shares the rituals, behavioral frameworks, and AI-powered systems he uses to help founders reach deep work in distraction-heavy environments. Steven’s journey from blockbuster sets to startup leadership reveals…
…
  continue reading

1
The $25 Million Arup Deepfake: AI's Most Convincing Con
40:49
40:49
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
40:49The $25 Million Arup Deepfake: AI's Most Convincing Con In a world where AI can mimic voices and faces perfectly, even the most secure companies can fall victim. The Arup Deepfake Hack shocked the corporate world when attackers used AI-generated video of the company’s CFO to trick an employee into wiring $25 million to a fraudulent account. This wa…
…
  continue reading

1
Ep. 22 - Scattered Spider's Declaration of War: Deconstructing the Threat
12:00
12:00
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
12:00In this urgent episode of The Cyber Resilience Brief, host Tova Dvorin and Adrian Culley, Offensive Security Engineer at SafeBreach, break down the shocking manifesto released by Scattered Spider — also known as Lapsus$ and ShinyHunters — the same threat group now linked to the Jaguar Land Rover cyberattack that’s suspected to have Russian ties. As…
…
  continue reading

1
Episode 17 - Beyond the Math: Dissecting Crypto's Achilles' Heel
35:34
35:34
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
35:34This episode investigates the most common causes of cryptographic system failure, highlighting that the true vulnerability lies not in broken math, but in flawed engineering and implementation errors. Modern cryptographic algorithms like AES and RSA are mathematically robust, but they are often undermined by common software bugs, such as buffer ove…
…
  continue reading

1
Episode 16 - The Irony of Crypto: Why Key Management Causes Massive Data Breaches
27:54
27:54
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
27:54This episode explores the central irony of cryptography: while the underlying mathematical algorithms are incredibly strong, most real-world data breaches occur due to poor key management and implementation flaws. The consensus among security experts is that the theoretical strength of modern ciphers like AES or RSA is sound, but this technical rob…
…
  continue reading

1
Episode 15 - The Math, The Mallory, and the Mode Misuse
40:58
40:58
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
40:58This episode examines why even mathematically strong cryptographic systems often fail in the real world, concluding that the primary vulnerabilities stem not from broken math, but from implementation flaws, misuse of modes, and flawed protocol design. The security of any system must be viewed as a chain, where the core cryptographic algorithm is on…
…
  continue reading
 
 
 
