Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Security Risks And Solut Podcasts

show episodes
 
Artwork

1
Brutally Honest Security

Barricade Cyber Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
  continue reading
 
Artwork

1
Cyber security risks and solutions

Cyber security risks and solut

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
  continue reading
 
Where cybersecurity leaders spill their guarded secrets. Hosted by AlterAim, The Breach Room dives deep with CEOs, founders, and power players in the cybersecurity world. From breakthrough wins to high-stakes roadblocks, each episode unpacks real stories, industry insights, and battle-tested strategies driving the future of cyber defense. If you’re scaling a cybersecurity company, or just want to hear how the best do it. This is your inside access.
  continue reading
 
Welcome to Ciphered Reality – your trusted source for cybersecurity tips, tricks, and guidance. Powered by RITC Cybersecurity, this podcast is tailored for individuals and businesses looking to secure their digital assets in an increasingly connected world. We break down complex cybersecurity topics into simple, actionable insights to help you safeguard your data, identity, and online presence. Whether you’re a tech-savvy user or just getting started, Cybphered Reality helps you stay informe ...
  continue reading
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Artwork
 
Nuix creates innovative software that empowers organizations to simply and quickly find the truth from any data in a digital world. We are a passionate and talented team, delighting our customers with software that transforms data into actionable intelligence. Using Nuix software, customers can overcome the challenges of litigation, investigation, risk, compliance, and security by asking the right questions and getting complete, timely answers. Our collaborative data analytics algorithms and ...
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
Artwork

1
TechSurge: Deep Tech VC Podcast

Celesta Capital | Deep Tech Venture Capital Firm

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Send feedback and show ideas to [email protected]. Each discussion delves into the intersection of technology advancement, market dynamics, and the founder journey, offe ...
  continue reading
 
Artwork

1
Beers & Bytes Podcast

Beers & Bytes Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Beer is one of the oldest and most widely consumed alcoholic drinks in the world, and the third most popular drink overall after water and tea. Cybersecurity is required today for businesses to protect themselves from the persistent threat of malware and ransomware. Hosts Chris Jordan, CEO of Fluency Security, and Jeremy Murtishaw, CEO of Fortify 24x7 discuss cybersecurity, information technology, and hockey with their guests while enjoying some of their favorite beers. Grab your favorite be ...
  continue reading
 
Artwork

1
Day 2 Day

Jonny Crosthwaite & Glen T

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We are obsessed with success and know that it’s a journey, not a destination. We are fascinated with successful individuals in all business sectors, who are working on their goals or bettering themselves on a day 2 day basis.
  continue reading
 
Loading …
show series
 
When it comes to cybersecurity, sugarcoating is not an option. Brutally Honest Security cuts through the noise with raw, unfiltered insights from Eric Taylor — a seasoned digital forensics and incident response (DFIR) expert known for his “no-holds-barred” style. Each episode dives straight into the heart of information security: 🔥 Ransomware updat…
  continue reading
 
Summary: In this episode of The Breach Room, the host sits down with Denise Lu, graphics editor at The Washington Post, to discuss her path from musicology student to leading data visualization journalist. Denise reflects on how her academic background in music shaped her analytical approach, her transition into news graphics at The New York Times …
  continue reading
 
Join us on the latest episode of The Ciphered Reality Podcast, where your hosts Mike and Mari sit down with Steven from Newbridge Solutions to explore the impact of AI and the future of evolving IVR systems. In this episode, we unpack: How dynamically adapting IVR systems transform customer experience The direct impact on business toplines and grow…
  continue reading
 
Summary In this episode of The Breach Room, Ken Fanger, president of On Technology Partners, shares his extensive experience in cybersecurity, emphasizing the importance of humanizing security, creating a culture of psychological safety, and the need for education in cybersecurity. He discusses the challenges small businesses face in achieving comp…
  continue reading
 
Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: Ransomware Protection. How to stay safe online where malicious threat actors lurk on every corner? Identifying & Staying Safe with ever-evolving AI Landscape. Tune in for an insightful episod…
  continue reading
 
Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: University Security. How to stay safe online where malicious threat actors lurk on every corner? Identifying & understanding more about how malware is offered as a service online. Tune in for…
  continue reading
 
Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: Student & Parent Cyberawareness. How to stay safe online where malicious threat actors lurk on every corner? Identifying & Staying Safe from the latest malware expanding through copyright phi…
  continue reading
 
Summary: In this episode of The Breach Room, Lu interviews Brandie Kayser, the CTO of Rochester IT Business Solutions. They discuss Brandie's journey into cybersecurity, the importance of proactive measures for small to medium-sized businesses, and the critical role of employee training in preventing cyber threats. Brandie shares insights on market…
  continue reading
 
The PRMA Insurance Thought Leaders Insight Series with Spencer Houldin, alongside leading thought leaders in the industry, aims to examine the insurance terrain, identify solutions to navigating the bumpy roads, and provide a roadmap that guides risk management professionals in the right direction. In this episode our host, Spencer Houldin, Managin…
  continue reading
 
A recent Google survey found that many developers felt comfortable using the Rust programming language in two months or less. Yet barriers to Rust adoption remain, particularly in safety-critical systems, where features such as memory and processing power are in short supply and compliance with regulations is mandatory. In our latest podcast from t…
  continue reading
 
Summary: In this episode of The Breach Room, host Lu interviews Michael Mehlberg, CEO of DarkSky Technology, discussing the evolving landscape of cybersecurity, particularly focusing on software supply chain risks and the integration of AI in cybersecurity operations. Michael shares insights on the importance of risk management, the role of policy …
  continue reading
 
Summary: In this conversation, Will Casterlow, a cybersecurity and compliance consultant, discusses the critical importance of cybersecurity in today's digital landscape. He emphasizes the need for businesses to implement robust policies and practices to protect themselves from cyber threats. Will also explores how AI can be leveraged to enhance bu…
  continue reading
 
Summary: In this episode of The Breach Room, host Luis interviews Dennis Underwood, CEO of a cybersecurity company, discussing the evolution of cybersecurity strategies, the role of a CEO, current trends, challenges in the industry, and the future of cybersecurity with AI. Dennis emphasizes the importance of empowering clients to take responsibilit…
  continue reading
 
Summary: In this episode of The Breach Room, host Luis interviews Jereme, CEO of Axia Security Group, who shares his journey from military service to entrepreneurship in the cybersecurity field. Jereme discusses the challenges of starting a business, the importance of targeted marketing, and the need for proactive security measures. He emphasizes t…
  continue reading
 
In response to Executive Order (EO) 14028, Improving the Nation’s Cybersecurity, the National Institute of Standards and Technology (NIST) recommended 11 practices for software verification. Threat modeling is at the top of the list. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Natasha Shevchenko and Ale…
  continue reading
 
Summary In this episode of The Breach Room, host LuIs Guzman interviews Will Reed, CEO of Better Every Day Cyber, discussing his journey in cybersecurity, the importance of proactive measures for small and medium-sized businesses (SMBs), and the role of AI in enhancing cybersecurity practices. Will emphasizes the need for SMBs to recognize cybersec…
  continue reading
 
Episode Overview: Your browser isn’t just for surfing the web anymore—it’s becoming the front line of cyber warfare. And when it comes to AI in security, remember: garbage in = garbage out. In this episode of the Ciphered Reality Podcast by RITC Cybersecurity, we break down: 🔹 The Browser Battleground – Why your browser is a prime target for attack…
  continue reading
 
Summary: In this episode of The Breach Room, host Lu speaks with Isaac, CEO of Care Technology Group, about the evolving landscape of cybersecurity, the importance of proactive measures for small businesses, and the role of AI in enhancing security measures. Isaac shares his journey into entrepreneurship, the responsibilities of a CEO, and the chal…
  continue reading
 
Summary In this episode, Stephen Deal, the Vice President of Sales and Service at CYDEF, discusses the importance of human-based threat hunting in cybersecurity, leveraging AI technology, and the challenges faced in the industry. He emphasizes the significance of building relationships with customers, utilizing social media for business growth, and…
  continue reading
 
Summary: In this episode of The Breach Room, host Luis interviews Steven Ward, CEO of Polaris Risk, discussing the intersection of cybersecurity and physical security, the importance of client-focused services, and the evolving role of AI in the industry. Steven emphasizes the need for businesses to invest in cybersecurity early, the significance o…
  continue reading
 
Summary: In this episode of The Breach Room, host Luis interviews Craig Taylor, CEO of CyberHoot, discussing the evolution of cybersecurity, innovative training methods, and the importance of engaging employees in cybersecurity practices. Craig shares his journey in the industry, emphasizing the need for positive reinforcement in training to change…
  continue reading
 
Summary: In this episode of The Breach Room, host Luis interviews Asal Gibson, the president of CyRoot Academy and CEO of CyRoot LLC. They discuss the mission of CyRoot Academy to provide free technical education to veterans and underserved communities, the importance of leadership and expectation management, and the challenges of transitioning fro…
  continue reading
 
Summary In this episode, Luis Guzman interviews Massimo, a mathematician, inventor, and CEO of CryptoLab Inc. They discuss Massimo's journey in innovation, focusing on quantum technologies, brainwave interfaces, and the future of artificial intelligence. Massimo shares insights on the importance of imagination in technology and the balance between …
  continue reading
 
In this latest episode of The Ciphered Reality Podcast, we discus everything about Cybersecurity Audits and the latest industry news. Stay with us till the end as we drop insightful analysis on: Microsoft Release Emergency Patches for Sharepoint RCE MCP servers with no security leave dependent AI agents exposed Follow RITC Cybersecurity to stay upd…
  continue reading
 
In this latest Episode of Ciphered Reality, We discuss all about hiring a vCISO and the associated benefits of hiring one. Stay with us till the end as we drop some serious insights on lates cybersecurity Industry news: Hypervolumetric DDoS Attacks reach record high MITRE launches security framework for Cryptocurrency Follow RITC CyberSecurity for …
  continue reading
 
In this latest episode of Ciphered Reality Podcast - your favourite cybersecurity hosts discuss about How to say safe on social media both for individuals and organizations. Why US Govt. banned Whatsapp over Security Concerns SEO Poisoning Campaigns Targeting SMBs Tune into one of the most insightful episodes of Ciphered Reality Podcast with tons o…
  continue reading
 
In the latest Podcast of RITC CyberSecurity a part of Ciphered Reality Podcast, Mike & Mari discuss latest Cybersecurity News and one of the most critical topics that affect all of us: Device Theft & Security Tune in for an insightful and eyeopening Podcast on the latest in CyberSecurity Industry. Stay Secure!! #cybersecuritycompany #podcast #ritcc…
  continue reading
 
Summary In this conversation, Konstantinos Chatzistavrou, a 17-year-old CEO and founder of Threadwatch, shares his journey into the business world, the challenges he faces in the cybersecurity industry, and how he leverages AI to create a unique news app. He discusses the importance of personal branding on LinkedIn, strategies for growth, and his f…
  continue reading
 
Summary In this conversation, Chris shares his journey from working in the UK Ministry of Defence to founding Optimize Cyber Solutions, emphasizing the critical role of cybersecurity awareness in preventing incidents. He discusses the increasing threats posed by AI and the importance of training employees to recognize and respond to these threats. …
  continue reading
 
Summary In this conversation, Cherisa. Jerez shares her journey from an accounting background to becoming a leader in cybersecurity. She discusses the importance of cybersecurity in today's fast-paced technological landscape, emphasizing the need for small businesses to prioritize their cybersecurity measures. Jerez also highlights the challenges a…
  continue reading
 
Summary In this conversation, the speakers discuss the critical role of digital marketing for entrepreneurs, emphasizing the importance of understanding client needs and effective communication. They share insights from their backgrounds in consulting and the transition to entrepreneurship, highlighting the challenges and opportunities in finding c…
  continue reading
 
Summary In this conversation, Harminder Singh shares his journey from being an electronics engineer in India to becoming a cybersecurity consultant in the U.S. He discusses the challenges of implementing cybersecurity measures in industrial settings, particularly the cultural differences between IT and OT environments. Harminder emphasizes the impo…
  continue reading
 
Summary This conversation explores the unique journey of a community manager who transitioned from a nonprofit background into the cybersecurity field. The discussion highlights the importance of cybersecurity in today's digital landscape, the role of AI in enhancing security measures, and the integration of AI into business strategies. The speaker…
  continue reading
 
Container images are increasingly being used as the main method for software deployment, so ensuring the reproducibility of container images is becoming a critical step in protecting the software supply chain. In practice, however, builds are often not reproducible due to elements of the build environment that rely on nondeterministic factors such …
  continue reading
 
In this episode, Mike Rotondo from RITC Cybersecurity and his co-host Mari Cherry dive deep into the hidden dangers lurking in your everyday WiFi setup — and why ignoring them could cost your business big. They’re also breaking down: The latest Windows Server vulnerability that’s keeping IT teams up at night How BlackBerry is shaking up the cyberse…
  continue reading
 
All About HIPAA Compliance | RITC Cybersecurity Podcast 🎙️ Is your business truly HIPAA compliant? In this episode, we break down what HIPAA really means for healthcare providers, vendors, and SMBs. Learn how to protect patient data, avoid costly penalties, and implement smart compliance strategies — straight from the experts at RITC Cybersecurity.…
  continue reading
 
Software enables our way of life, but market forces have sidelined security concerns leaving systems vulnerable to attack. Fixing this problem will require the software industry to develop an initial standard for creating software that is secure by design. These are the findings of a recently released paper coauthored by Greg Touhill, director of t…
  continue reading
 
In this powerful and inspiring episode, Luis Guzman sits down with Cherisa Jerez, Army veteran, cybersecurity executive, published author, and co-founder of Azure Technologies. Cherisa shares her compelling journey from accounting to the Army, where she first encountered information technology, and how her military experience laid the foundation fo…
  continue reading
 
In this episode, Brad Bussie and field CISO Mark Aksel explore how AI is transforming manufacturing, from predictive maintenance to advanced supply chain strategies. They break down the real impacts of tariffs and share how companies can future-proof operations with smarter AI-driven decisions. ## Topics Covered * Using AI for predictive maintenanc…
  continue reading
 
In TechSurge’s Season 1 Finale episode, we explore an important debate: should AI development be open source or closed? AI technology leader and UN Senior Fellow Senthil Kumar joins Michael Marks for a deep dive into one of the most consequential debates in artificial intelligence, exploring the fundamental tensions between democratizing AI access …
  continue reading
 
🚨 Supply Chain Attacks Are the New Frontline in Cyber Warfare. Are You Ready? In this power-packed episode of the RITC Cybersecurity Podcast, our founder Mike Rotondo and co-host Mari Cherry dive deep into the evolving threat landscape — where AI is both a weapon and a shield. 🔍 What’s Inside: How threat actors exploit supply chain vulnerabilities …
  continue reading
 
🎙️ Cyphered Reality: Cyber Threats You Need to Know About This Week 🔐 Did you hear? The PowerSchool hacker just pled guilty. 😳 Ransomware has hit Arla Foods – again proving no one’s safe. And for SMBs, cyberawareness isn’t optional anymore – it’s survival. In this episode, Mike Rotondo and Mari Cherry break down what these headlines really mean for…
  continue reading
 
Hop on to the latest podcast by RITC CyberSecurity with Mike and Mari as they discuss latest news & developments in the Rapidly changing space of CyberSecurity and how to keep your personal company devices secure. Stay with us till the end to understand some of the key strategies you can implement today all by yourself to improve security of your v…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play