Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
Cyber Security Risks And Solut Podcasts
Welcome to the PRMA Risk Ready podcast, the show for Risk Management Professionals in the High Net Worth Space.
…
continue reading
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
…
continue reading
Where cybersecurity leaders spill their guarded secrets. Hosted by AlterAim, The Breach Room dives deep with CEOs, founders, and power players in the cybersecurity world. From breakthrough wins to high-stakes roadblocks, each episode unpacks real stories, industry insights, and battle-tested strategies driving the future of cyber defense. If you’re scaling a cybersecurity company, or just want to hear how the best do it. This is your inside access.
…
continue reading
Welcome to Ciphered Reality – your trusted source for cybersecurity tips, tricks, and guidance. Powered by RITC Cybersecurity, this podcast is tailored for individuals and businesses looking to secure their digital assets in an increasingly connected world. We break down complex cybersecurity topics into simple, actionable insights to help you safeguard your data, identity, and online presence. Whether you’re a tech-savvy user or just getting started, Cybphered Reality helps you stay informe ...
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Nuix creates innovative software that empowers organizations to simply and quickly find the truth from any data in a digital world. We are a passionate and talented team, delighting our customers with software that transforms data into actionable intelligence. Using Nuix software, customers can overcome the challenges of litigation, investigation, risk, compliance, and security by asking the right questions and getting complete, timely answers. Our collaborative data analytics algorithms and ...
…
continue reading

1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Send feedback and show ideas to [email protected]. Each discussion delves into the intersection of technology advancement, market dynamics, and the founder journey, offe ...
…
continue reading
Beer is one of the oldest and most widely consumed alcoholic drinks in the world, and the third most popular drink overall after water and tea. Cybersecurity is required today for businesses to protect themselves from the persistent threat of malware and ransomware. Hosts Chris Jordan, CEO of Fluency Security, and Jeremy Murtishaw, CEO of Fortify 24x7 discuss cybersecurity, information technology, and hockey with their guests while enjoying some of their favorite beers. Grab your favorite be ...
…
continue reading
We are obsessed with success and know that it’s a journey, not a destination. We are fascinated with successful individuals in all business sectors, who are working on their goals or bettering themselves on a day 2 day basis.
…
continue reading

1
Brutally Honest Security | Episode 1: September 22, 2025
2:25:01
2:25:01
Play later
Play later
Lists
Like
Liked
2:25:01When it comes to cybersecurity, sugarcoating is not an option. Brutally Honest Security cuts through the noise with raw, unfiltered insights from Eric Taylor — a seasoned digital forensics and incident response (DFIR) expert known for his “no-holds-barred” style. Each episode dives straight into the heart of information security: 🔥 Ransomware updat…
…
continue reading

1
The Art of Data Storytelling: Denise Lu on Music, Journalism & Visualizing the News
33:18
33:18
Play later
Play later
Lists
Like
Liked
33:18Summary: In this episode of The Breach Room, the host sits down with Denise Lu, graphics editor at The Washington Post, to discuss her path from musicology student to leading data visualization journalist. Denise reflects on how her academic background in music shaped her analytical approach, her transition into news graphics at The New York Times …
…
continue reading

1
IVR Systems & Impact of AI: The Ciphered Reality Podcast welcomes Steven from Newbridge Solutions
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42Join us on the latest episode of The Ciphered Reality Podcast, where your hosts Mike and Mari sit down with Steven from Newbridge Solutions to explore the impact of AI and the future of evolving IVR systems. In this episode, we unpack: How dynamically adapting IVR systems transform customer experience The direct impact on business toplines and grow…
…
continue reading

1
Humanizing Security: Ken Fanger on Culture, CMMC, and AI
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41Summary In this episode of The Breach Room, Ken Fanger, president of On Technology Partners, shares his extensive experience in cybersecurity, emphasizing the importance of humanizing security, creating a culture of psychological safety, and the need for education in cybersecurity. He discusses the challenges small businesses face in achieving comp…
…
continue reading

1
Ransomware Protection & Latest Cybersecurity News: The Ciphered Reality Podcast
43:04
43:04
Play later
Play later
Lists
Like
Liked
43:04Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: Ransomware Protection. How to stay safe online where malicious threat actors lurk on every corner? Identifying & Staying Safe with ever-evolving AI Landscape. Tune in for an insightful episod…
…
continue reading

1
University Security & Latest Cybersecurity News: The Ciphered Reality Podcast
35:39
35:39
Play later
Play later
Lists
Like
Liked
35:39Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: University Security. How to stay safe online where malicious threat actors lurk on every corner? Identifying & understanding more about how malware is offered as a service online. Tune in for…
…
continue reading

1
Student & Parent Cyberawareness | Copyright Phishing Lures - The Ciphered Reality Podcast
33:25
33:25
Play later
Play later
Lists
Like
Liked
33:25Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: Student & Parent Cyberawareness. How to stay safe online where malicious threat actors lurk on every corner? Identifying & Staying Safe from the latest malware expanding through copyright phi…
…
continue reading

1
The Fractional CTO Revolution: Brandie Kayser on Cybersecurity, Marketing & SMB Survival
26:23
26:23
Play later
Play later
Lists
Like
Liked
26:23Summary: In this episode of The Breach Room, Lu interviews Brandie Kayser, the CTO of Rochester IT Business Solutions. They discuss Brandie's journey into cybersecurity, the importance of proactive measures for small to medium-sized businesses, and the critical role of employee training in preventing cyber threats. Brandie shares insights on market…
…
continue reading

1
PRMA Insurance Thought Leaders Insight Series- Scott McCollum, Founder & Chief Solutions Officer at McRoof
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41The PRMA Insurance Thought Leaders Insight Series with Spencer Houldin, alongside leading thought leaders in the industry, aims to examine the insurance terrain, identify solutions to navigating the bumpy roads, and provide a roadmap that guides risk management professionals in the right direction. In this episode our host, Spencer Houldin, Managin…
…
continue reading

1
The Benefits of Rust Adoption for Mission-and-Safety-Critical Systems
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38A recent Google survey found that many developers felt comfortable using the Rust programming language in two months or less. Yet barriers to Rust adoption remain, particularly in safety-critical systems, where features such as memory and processing power are in short supply and compliance with regulations is mandatory. In our latest podcast from t…
…
continue reading

1
Inside the Supply Chain Threat: Michael Mehlberg on AI, Risk & the Cyber Arms Race
29:44
29:44
Play later
Play later
Lists
Like
Liked
29:44Summary: In this episode of The Breach Room, host Lu interviews Michael Mehlberg, CEO of DarkSky Technology, discussing the evolving landscape of cybersecurity, particularly focusing on software supply chain risks and the integration of AI in cybersecurity operations. Michael shares insights on the importance of risk management, the role of policy …
…
continue reading

1
The Breach Room with Will Casterlow, CSIO @ Triad Cyber Solutions
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30Summary: In this conversation, Will Casterlow, a cybersecurity and compliance consultant, discusses the critical importance of cybersecurity in today's digital landscape. He emphasizes the need for businesses to implement robust policies and practices to protect themselves from cyber threats. Will also explores how AI can be leveraged to enhance bu…
…
continue reading

1
Empowering Clients, Leading Cyber: Dennis Underwood on the Future of Security
22:06
22:06
Play later
Play later
Lists
Like
Liked
22:06Summary: In this episode of The Breach Room, host Luis interviews Dennis Underwood, CEO of a cybersecurity company, discussing the evolution of cybersecurity strategies, the role of a CEO, current trends, challenges in the industry, and the future of cybersecurity with AI. Dennis emphasizes the importance of empowering clients to take responsibilit…
…
continue reading

1
From Service to Security: Jereme on Cyber, Business, and Veteran Entrepreneurship
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59Summary: In this episode of The Breach Room, host Luis interviews Jereme, CEO of Axia Security Group, who shares his journey from military service to entrepreneurship in the cybersecurity field. Jereme discusses the challenges of starting a business, the importance of targeted marketing, and the need for proactive security measures. He emphasizes t…
…
continue reading

1
Threat Modeling: Protecting Our Nation’s Complex Software-Intensive Systems
35:02
35:02
Play later
Play later
Lists
Like
Liked
35:02In response to Executive Order (EO) 14028, Improving the Nation’s Cybersecurity, the National Institute of Standards and Technology (NIST) recommended 11 practices for software verification. Threat modeling is at the top of the list. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Natasha Shevchenko and Ale…
…
continue reading

1
Proactive Protection: Will Reed on Cybersecurity as a Business Imperative
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11Summary In this episode of The Breach Room, host LuIs Guzman interviews Will Reed, CEO of Better Every Day Cyber, discussing his journey in cybersecurity, the importance of proactive measures for small and medium-sized businesses (SMBs), and the role of AI in enhancing cybersecurity practices. Will emphasizes the need for SMBs to recognize cybersec…
…
continue reading

1
Incident Response Plans | Browsers as Cyber Battlegrounds & AI Security Risks – Ciphered Reality
52:55
52:55
Play later
Play later
Lists
Like
Liked
52:55Episode Overview: Your browser isn’t just for surfing the web anymore—it’s becoming the front line of cyber warfare. And when it comes to AI in security, remember: garbage in = garbage out. In this episode of the Ciphered Reality Podcast by RITC Cybersecurity, we break down: 🔹 The Browser Battleground – Why your browser is a prime target for attack…
…
continue reading

1
From CEO to Cyber Advocate: Lessons from Isaac Koenig
36:48
36:48
Play later
Play later
Lists
Like
Liked
36:48Summary: In this episode of The Breach Room, host Lu speaks with Isaac, CEO of Care Technology Group, about the evolving landscape of cybersecurity, the importance of proactive measures for small businesses, and the role of AI in enhancing security measures. Isaac shares his journey into entrepreneurship, the responsibilities of a CEO, and the chal…
…
continue reading

1
The People Behind the Protection: Insights from Stephen Deal
55:15
55:15
Play later
Play later
Lists
Like
Liked
55:15Summary In this episode, Stephen Deal, the Vice President of Sales and Service at CYDEF, discusses the importance of human-based threat hunting in cybersecurity, leveraging AI technology, and the challenges faced in the industry. He emphasizes the significance of building relationships with customers, utilizing social media for business growth, and…
…
continue reading

1
Securing the Future: Client-Focused Strategies with Steven Ward
38:30
38:30
Play later
Play later
Lists
Like
Liked
38:30Summary: In this episode of The Breach Room, host Luis interviews Steven Ward, CEO of Polaris Risk, discussing the intersection of cybersecurity and physical security, the importance of client-focused services, and the evolving role of AI in the industry. Steven emphasizes the need for businesses to invest in cybersecurity early, the significance o…
…
continue reading

1
From Awareness to Action: Cybersecurity Training that Works with Craig Taylor
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10Summary: In this episode of The Breach Room, host Luis interviews Craig Taylor, CEO of CyberHoot, discussing the evolution of cybersecurity, innovative training methods, and the importance of engaging employees in cybersecurity practices. Craig shares his journey in the industry, emphasizing the need for positive reinforcement in training to change…
…
continue reading

1
The Importance of Process and Ownership in Business with Asal Gibson
33:09
33:09
Play later
Play later
Lists
Like
Liked
33:09Summary: In this episode of The Breach Room, host Luis interviews Asal Gibson, the president of CyRoot Academy and CEO of CyRoot LLC. They discuss the mission of CyRoot Academy to provide free technical education to veterans and underserved communities, the importance of leadership and expectation management, and the challenges of transitioning fro…
…
continue reading

1
Balancing Human Experience and Technology Insights from Massimo of CryptoLab Inc
28:36
28:36
Play later
Play later
Lists
Like
Liked
28:36Summary In this episode, Luis Guzman interviews Massimo, a mathematician, inventor, and CEO of CryptoLab Inc. They discuss Massimo's journey in innovation, focusing on quantum technologies, brainwave interfaces, and the future of artificial intelligence. Massimo shares insights on the importance of imagination in technology and the balance between …
…
continue reading

1
Cybersecurity Audit & Latest Cybersecurity News
45:05
45:05
Play later
Play later
Lists
Like
Liked
45:05In this latest episode of The Ciphered Reality Podcast, we discus everything about Cybersecurity Audits and the latest industry news. Stay with us till the end as we drop insightful analysis on: Microsoft Release Emergency Patches for Sharepoint RCE MCP servers with no security leave dependent AI agents exposed Follow RITC Cybersecurity to stay upd…
…
continue reading
In this latest Episode of Ciphered Reality, We discuss all about hiring a vCISO and the associated benefits of hiring one. Stay with us till the end as we drop some serious insights on lates cybersecurity Industry news: Hypervolumetric DDoS Attacks reach record high MITRE launches security framework for Cryptocurrency Follow RITC CyberSecurity for …
…
continue reading

1
Social Media Privacy & Latest CyberSecurity News
40:24
40:24
Play later
Play later
Lists
Like
Liked
40:24In this latest episode of Ciphered Reality Podcast - your favourite cybersecurity hosts discuss about How to say safe on social media both for individuals and organizations. Why US Govt. banned Whatsapp over Security Concerns SEO Poisoning Campaigns Targeting SMBs Tune into one of the most insightful episodes of Ciphered Reality Podcast with tons o…
…
continue reading

1
Device Theft and Security & Latest CyberSecurity News
47:30
47:30
Play later
Play later
Lists
Like
Liked
47:30In the latest Podcast of RITC CyberSecurity a part of Ciphered Reality Podcast, Mike & Mari discuss latest Cybersecurity News and one of the most critical topics that affect all of us: Device Theft & Security Tune in for an insightful and eyeopening Podcast on the latest in CyberSecurity Industry. Stay Secure!! #cybersecuritycompany #podcast #ritcc…
…
continue reading

1
Building a Cybersecurity Startup at Age 17: A Conversation with Konstantinos Chatzistavrou
17:17
17:17
Play later
Play later
Lists
Like
Liked
17:17Summary In this conversation, Konstantinos Chatzistavrou, a 17-year-old CEO and founder of Threadwatch, shares his journey into the business world, the challenges he faces in the cybersecurity industry, and how he leverages AI to create a unique news app. He discusses the importance of personal branding on LinkedIn, strategies for growth, and his f…
…
continue reading

1
Prioritizing People Over Technology in Cybersecurity Strategies with Chris Annetts
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46Summary In this conversation, Chris shares his journey from working in the UK Ministry of Defence to founding Optimize Cyber Solutions, emphasizing the critical role of cybersecurity awareness in preventing incidents. He discusses the increasing threats posed by AI and the importance of training employees to recognize and respond to these threats. …
…
continue reading

1
Defending the Digital Battlefield: A Conversation with Cherisa Jerez
34:15
34:15
Play later
Play later
Lists
Like
Liked
34:15Summary In this conversation, Cherisa. Jerez shares her journey from an accounting background to becoming a leader in cybersecurity. She discusses the importance of cybersecurity in today's fast-paced technological landscape, emphasizing the need for small businesses to prioritize their cybersecurity measures. Jerez also highlights the challenges a…
…
continue reading

1
Bridging Consulting, Cybersecurity, and Client Needs with Joe Crist
28:37
28:37
Play later
Play later
Lists
Like
Liked
28:37Summary In this conversation, the speakers discuss the critical role of digital marketing for entrepreneurs, emphasizing the importance of understanding client needs and effective communication. They share insights from their backgrounds in consulting and the transition to entrepreneurship, highlighting the challenges and opportunities in finding c…
…
continue reading

1
Navigating Cybersecurity Challenges with Harminder Singh
28:20
28:20
Play later
Play later
Lists
Like
Liked
28:20Summary In this conversation, Harminder Singh shares his journey from being an electronics engineer in India to becoming a cybersecurity consultant in the U.S. He discusses the challenges of implementing cybersecurity measures in industrial settings, particularly the cultural differences between IT and OT environments. Harminder emphasizes the impo…
…
continue reading

1
Unlocking The Future of Cybersecurity With Ashley Mcurry
19:23
19:23
Play later
Play later
Lists
Like
Liked
19:23Summary This conversation explores the unique journey of a community manager who transitioned from a nonprofit background into the cybersecurity field. The discussion highlights the importance of cybersecurity in today's digital landscape, the role of AI in enhancing security measures, and the integration of AI into business strategies. The speaker…
…
continue reading

51
Understanding Container Reproducibility Challenges: Stopping the Next Solar Winds
25:10
25:10
Play later
Play later
Lists
Like
Liked
25:10Container images are increasingly being used as the main method for software deployment, so ensuring the reproducibility of container images is becoming a critical step in protecting the software supply chain. In practice, however, builds are often not reproducible due to elements of the build environment that rely on nondeterministic factors such …
…
continue reading

1
Is Your WiFi Putting Your Business at Risk? | Must-Know Cybersecurity Updates for SMBs!
51:28
51:28
Play later
Play later
Lists
Like
Liked
51:28In this episode, Mike Rotondo from RITC Cybersecurity and his co-host Mari Cherry dive deep into the hidden dangers lurking in your everyday WiFi setup — and why ignoring them could cost your business big. They’re also breaking down: The latest Windows Server vulnerability that’s keeping IT teams up at night How BlackBerry is shaking up the cyberse…
…
continue reading

1
All you need to know about HIPAA Compliance
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44All About HIPAA Compliance | RITC Cybersecurity Podcast 🎙️ Is your business truly HIPAA compliant? In this episode, we break down what HIPAA really means for healthcare providers, vendors, and SMBs. Learn how to protect patient data, avoid costly penalties, and implement smart compliance strategies — straight from the experts at RITC Cybersecurity.…
…
continue reading

1
Mitigating Cyber Risk with Secure by Design
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29Software enables our way of life, but market forces have sidelined security concerns leaving systems vulnerable to attack. Fixing this problem will require the software industry to develop an initial standard for creating software that is secure by design. These are the findings of a recently released paper coauthored by Greg Touhill, director of t…
…
continue reading

1
Cherisa Jerez, Ashire Technologies | Cybersecurity, Leadership & Latina Representation
39:33
39:33
Play later
Play later
Lists
Like
Liked
39:33In this powerful and inspiring episode, Luis Guzman sits down with Cherisa Jerez, Army veteran, cybersecurity executive, published author, and co-founder of Azure Technologies. Cherisa shares her compelling journey from accounting to the Army, where she first encountered information technology, and how her military experience laid the foundation fo…
…
continue reading

1
EP. 31 - AI in Manufacturing, Tariff Impacts, and Smarter Supply Chains
29:13
29:13
Play later
Play later
Lists
Like
Liked
29:13In this episode, Brad Bussie and field CISO Mark Aksel explore how AI is transforming manufacturing, from predictive maintenance to advanced supply chain strategies. They break down the real impacts of tariffs and share how companies can future-proof operations with smarter AI-driven decisions. ## Topics Covered * Using AI for predictive maintenanc…
…
continue reading

1
Season 1 Finale: Risks, Rewards, and Realities of Open vs. Closed AI
26:16
26:16
Play later
Play later
Lists
Like
Liked
26:16In TechSurge’s Season 1 Finale episode, we explore an important debate: should AI development be open source or closed? AI technology leader and UN Senior Fellow Senthil Kumar joins Michael Marks for a deep dive into one of the most consequential debates in artificial intelligence, exploring the fundamental tensions between democratizing AI access …
…
continue reading

1
How AI is Reshaping Cyber Defense | Supply Chain Security Explained | RITC Cybersecurity Podcast
32:20
32:20
Play later
Play later
Lists
Like
Liked
32:20🚨 Supply Chain Attacks Are the New Frontline in Cyber Warfare. Are You Ready? In this power-packed episode of the RITC Cybersecurity Podcast, our founder Mike Rotondo and co-host Mari Cherry dive deep into the evolving threat landscape — where AI is both a weapon and a shield. 🔍 What’s Inside: How threat actors exploit supply chain vulnerabilities …
…
continue reading

1
Latest News in Cybersecurity Space & Cyberawareness for Small and Medium Companies
21:00
21:00
Play later
Play later
Lists
Like
Liked
21:00🎙️ Cyphered Reality: Cyber Threats You Need to Know About This Week 🔐 Did you hear? The PowerSchool hacker just pled guilty. 😳 Ransomware has hit Arla Foods – again proving no one’s safe. And for SMBs, cyberawareness isn’t optional anymore – it’s survival. In this episode, Mike Rotondo and Mari Cherry break down what these headlines really mean for…
…
continue reading

1
Tips on securing personal & company devices
32:24
32:24
Play later
Play later
Lists
Like
Liked
32:24Hop on to the latest podcast by RITC CyberSecurity with Mike and Mari as they discuss latest news & developments in the Rapidly changing space of CyberSecurity and how to keep your personal company devices secure. Stay with us till the end to understand some of the key strategies you can implement today all by yourself to improve security of your v…
…
continue reading