Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cybersecurity Expert Podcasts

show episodes
 
The Expert Podcast brings you firsthand narratives from experts across diverse industries, including private investigators, general contractors and builders, insurance agencies, vehicle specialists, lawyers, and many others.
  continue reading
 
Artwork

1
Practical AI

Practical AI LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven atta ...
  continue reading
 
Sunny’s Silver Linings is a Top MSP Channel Podcast hosted by the CEO of IT By Design, Sunny Kaila. Sunny and his guests cover a wide range of MSP and Talent-based topics, including MSP services, cybersecurity, customer service, and strategies to achieve growth and success in the channel. Listen now to take your business to the next level! https://hubs.ly/Q02DrxnQ0
  continue reading
 
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
  continue reading
 
Artwork

1
Cyber Defense Radio

Cyber Defense Magazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
Artwork

1
CMMC Academy

Armada Cyber Defense LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Hosted by Brett Gallant, founder of Adaptive Office Solutions, The Adaptive Mindset is the podcast for entrepreneurs and leaders ready to embrace change, overcome limiting beliefs, and grow both personally and professionally. Through compelling stories, expert insights, and actionable strategies, each episode empowers you to adapt, lead, and thrive in a rapidly changing world. From mindset shifts to business resilience and cybersecurity, this is your go-to resource for unlocking your full po ...
  continue reading
 
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Artwork
 
Disaster Stream is a podcast series that delves into the world of disaster recovery, cybersecurity incidents, and critical problem resolution in major organizations. Hosted by Bill Alderson, the podcast features expert insights, case studies, and interviews with leaders and pioneers in the technology and cybersecurity fields. Each episode shares lessons learned and best practices for crisis management, aiming to help organizations prepare for and respond to disasters effectively. Available i ...
  continue reading
 
Artwork
 
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Artwork
 
Dive into the pulse of the Internet with This Week in NET. A weekly roundup of Cloudflare's latest news, innovations and the most impactful developments shaping the Internet. From security updates to performance breakthroughs, we deliver insights that matter to developers, businesses, and Internet enthusiasts alike. Each episode features expert analysis with special guests offering unique perspectives on today's digital challenges and evolving landscape. Follow us @CloudflareTV Read the blog ...
  continue reading
 
Artwork

1
The AI Security Edge

theaisecurityedge

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
  continue reading
 
Artwork

1
ABA Fraudcast

American Bankers Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted by cybersecurity and anti-fraud leader Paul Benda of the American Bankers Association, the ABA Fraudcast brings you expert insights, tools and strategies to help fight fraud.
  continue reading
 
Artwork

1
Security Cocktail Hour

Joe Patti and Adam Roth

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security veterans Joe Patti and Adam Roth share cyber security insights from their virtual bar stools. Join Joe and Adam, along with a diverse lineup of industry insiders, for a view into how the professionals see the security issues that impact all of us. Tune in for engaging discussions, expert analyses, and a behind-the-scenes look into the cybersecurity world. Reach us at [email protected] or @SecCocktailHour on Twitter.
  continue reading
 
Artwork

1
Daily Cyber Threat Brief

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
  continue reading
 
Artwork

4
Techstrong Gang

Techstrong Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Techstrong Gang is your go-to weekday show on Techstrong TV and your favorite podcast platform, bringing together a rotating lineup of top thought leaders and technologists to break down the biggest stories and trends shaping the tech world. Hosted by industry veterans Alan Shimel, Mike Vizard, Mitchell Ashley, Jon Swartz, Lisa Martin, Tracy Ragan, Sulagna Saha, Anne Ahola Ward, Bonnie Schneider, and more, the show dives deep into everything from DevOps and cybersecurity to AI and cloud inno ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork
 
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
  continue reading
 
Welcome to Cyber Insights, the podcast that bridges the worlds of networking and cybersecurity. From cutting-edge innovations in enterprise connectivity to the latest in digital defense, we break down the buzzwords and bring you actionable insights to secure and scale your systems. Whether you're an IT professional, business leader, or tech enthusiast, join us as we explore the critical intersection of networks and security, featuring expert conversations, industry trends, and real world str ...
  continue reading
 
Artwork

1
Intel on AI

Intel Corporation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Tune in as we dissect recent AI news, explore cutting-edge innovations, and sit down with influential voices shaping the future of AI. Whether you're a seasoned expert or just dipping your toes into the AI waters, our podcast is your go-to resource for staying informed and inspired. #IntelAI @IntelAI
  continue reading
 
Artwork

1
The I.T. Career Podcast

The Bearded I.T. Dad - Dakota Snow

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Empowering Your IT Career Journey – From the first step to success! With a passion for technology and a mission to uplift others, I’m here to guide you through the dynamic IT industry. Whether you're just starting or looking to advance, you’ve found a community dedicated to your growth. Advice & Insights: From Help Desk to Director of Network Operations in 3 years, I share strategies to fast-track your career. Expert Conversations: Gain exclusive insights from industry leaders. Let’s make IT ...
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Artwork
 
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
  continue reading
 
Artwork

1
Socializing Security

Socializing Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
  continue reading
 
Artwork

1
Dirty South Security Podcast

VerSprite Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Ready to earn your AWS Certified Cloud Practitioner credential? Our Audio Course is your ultimate guide to mastering the fundamentals of AWS Cloud, including security, cost management, core services, and cloud economics. Whether you're new to IT or looking to expand your cloud knowledge, this series will help you confidently prepare for the exam and take the next step in your career. Produced by BareMetalCyber.com, your trusted resource for expert-driven cybersecurity education.
  continue reading
 
Artwork

1
Talk to Th3 Doc with Steve Meek

Steve "The Doctor" Meek

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Talk to Th3 Doc with Steve Meek is designed for executives seeking to learn from a balance of business and technology experts, focused on helping SMBs through practical, high-level insights. Hosted by Steve 'The Doctor' Meek, an experienced business owner and technology strategist, episodes break down complex topics in General Business, Cybersecurity, Artificial Intelligence and Technical Support, into clear, actionable conversations tailored for leadership decision-making. These include top ...
  continue reading
 
Artwork
 
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
  continue reading
 
Artwork

1
AI or Not

Pamela Isom

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to "AI or Not," the podcast where digital transformation meets real-world wisdom, hosted by Pamela Isom. With over 25 years of guiding the top echelons of corporate, public and private sectors through the ever-evolving digital landscape, Pamela, CEO and Founder of IsAdvice & Consulting LLC, is your expert navigator in the exploration of artificial intelligence, innovation, cyber, data, and ethical decision-making. This show demystifies the complexities of AI, digital disruption, and ...
  continue reading
 
Loading …
show series
 
What happens when the same AI tools that make coding easier also give cybercriminals new powers? In this episode of Cyberside Chats Live, we explore the rise of “vibe coding” and its darker twin, “vibe hacking.” You’ll learn how AI is reshaping software development, how attackers are turning those vibes into cybercrime, and what it means for the fu…
  continue reading
 
Episode Description Join David from Active Intel Investigations as he explores the strategic implementation of artificial intelligence in corporate security environments. This episode breaks down the practical applications, limitations, and best practices for integrating AI technology into your security operations while maintaining human oversight …
  continue reading
 
Tavi Gallego, founder of a new crypto exchange:the Global Investment Crypto Exchange based here in US Midwest joins us. We discuss how to bring social responsibility to crypto. Don't Miss The Video Episode here: https://youtu.be/0xxn7jAdSRw Topics: non profit approaches to crypto currency, benefits of charity through crypto currency, charity throug…
  continue reading
 
* **Beak's Case (Institutional Cover-up):** * Beak's misconduct (sexual misconduct, covering up for colleagues, landing him on the Brady List) was a catalyst that exposed a **massive systemic crisis** in the IPD (2003–2009), marked by excessive force and constitutional rights violations. * The destruction of records was an attempt to **erase histor…
  continue reading
 
🚨 New Episode of Cyber Defense Radio is LIVE! 🎙️ Hosted by Annabelle Thomas, Cybersecurity Champion of @CyberDefenseMag In this must-hear episode, Venu Rao, CEO & Co-Founder of Strobes Security (@StrobesHQ), steps into the Hotseat Podcast to reveal how their AI-Driven CTEM Platform to minimize threat exposure is transforming how enterprises tackle …
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
Informative Report: The Fragmented Accountability of Brandon BeakBrandon Beak’s history presents a complex picture of professional misconduct followed by allegations of institutional protection and recent personal legal turmoil. Due to documented efforts by the Inglewood Police Department (IPD) to destroy records, obtaining a unified, "whole" view …
  continue reading
 
Informative Report: The Fragmented Accountability of Brandon Beak Brandon Beak’s history presents a complex picture of professional misconduct followed by allegations of institutional protection and recent personal legal turmoil. Due to documented efforts by the Inglewood Police Department (IPD) to destroy records, obtaining a unified, "whole" view…
  continue reading
 
Brandon Beak: Firing and Professional CollapseBrandon Beak was a former Inglewood Police Department (IPD) officer whose professional career was terminated in March 2007. This firing was part of a larger administrative "purge" involving six other officers. The termination stemmed from a "massive internal affairs investigation" into sexual misconduct…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
Mike, Jon, Tom Hollingsworth, Robert Reeves and Garima Bajpai dive into details of a joint open letter published by multiple open source projects that warns the current economic model for funding many of these initiatives is unsustainable. Then the gang takes a look at the progress being made advancing WebAssembly (Wasm) to foster application portf…
  continue reading
 
.5. Conclusion: The "Privacy Placebo" and the High Stakes of Conversational DataThis live dialogue serves as a stark microcosm of the modern conflict between user privacy, platform power, and the voracious appetite of AI development. The conversation powerfully illustrates the concept of a "privacy placebo": the host's act of turning off the record…
  continue reading
 
It has been eight years since the NIST Special Publication 800-190: Application Container Security Guide was published, and its recommendations remain central to container security today. As cloud-native applications have become the foundation of modern enterprise IT, securing containers has shifted from an afterthought to a critical priority. In t…
  continue reading
 
Cybersecurity isn’t just about firewalls and passwords anymore. It’s an all-out battle where hackers run businesses with customer support desks, insider threats can be disguised as your newest hire, and artificial intelligence is both the weapon and the shield. In this special episode of IT Visionaries, host Chris Brandt switches roles and sits in …
  continue reading
 
The Department of Defense is making one of the most significant changes to cybersecurity compliance in over a decade: a move from the Risk Management Framework (RMF) to the Cybersecurity Risk Management Construct (CSRMC). For defense contractors, integrators, and managed service providers, this shift will redefine how compliance is achieved and mea…
  continue reading
 
Punto de Debate 1: El Problema con la Terminología.Host: Absolutamente. Las fuentes dejan claro que la terminología es crucial. Expertos legales y defensores están presionando por términos como NDII o IBSA porque "pornografía de venganza" es a menudo un nombre inapropiado y controvertido. ¿Por qué? Porque enfocarse en el motivo del perpetrador—la v…
  continue reading
 
Debate Point 1: The Problem with the Name. Host: Absolutely. The sources make it clear: terminology matters. Legal experts and advocates are pushing hard for terms like NDII or IBSA because "revenge porn" is often a gross misnomer. Why? Because focusing on the perpetrator's motive—revenge—is misleading and problematic. Not every abuser is motivated…
  continue reading
 
The rise of the narco-influencer in Mexico marks a strategic evolution in cartel operations, shifting from traditional propaganda like narcocorridos (drug ballads) to sophisticated, digital "narco-marketing". This phenomenon is rooted in narcocultura, which grew in areas where poverty and state neglect positioned traffickers as anti-heroes.Digital …
  continue reading
 
La aparición del narco-influencer en México representa una evolución estratégica de la propaganda criminal, pasando de los narcocorridos analógicos a una guerra de información sofisticada en plataformas digitales como TikTok. Este fenómeno se basa en la narcocultura, que se originó en regiones con pobreza y falta de oportunidades, donde los trafica…
  continue reading
 
New Episode! Tell us your feedback! Is Your Company Safe From AI Attacks? This episode covers the intersection of artificial intelligence and cybersecurity, exploring how AI can be used for both protection and malicious purposes. We examine how AI is used to create advanced ai cybercrime and deep fakes, and the rising threat of social engineering a…
  continue reading
 
In this episode, the Connection Security Center of Excellence team takes us on a journey—both literal and technical—sharing insights gained from a recent reconnaissance road trip across the United States. Their firsthand experiences offer a front-line perspective on the evolving landscape of post-quantum insecurity. Listeners will hear from our sec…
  continue reading
 
AI isn’t just transforming the software stack — it’s reshaping the very machines powering modern business. Jennifer Larson, General Manager of Commercial Client Segments at Intel, breaks down why the distinction between workstations and high-end desktops matters more than ever, and how Intel is engineering platforms designed for creators, engineers…
  continue reading
 
Got a question or comment? Message us here! In this episode of The #SOCBrief, we break down the rising FileFix attack, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proacti…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
Mike, Chris Blask and Jeff Reich dive into the implications of a $100 billion investment commitment that NVIDIA is making to OpenAI. Then the gang looks at the rise of cyberattacks involving artificial intelligence (AI) technologies before delving into the reasons why systems remain vulnerable to ransomware attacks following a massive disruption in…
  continue reading
 
Alan, Mike. Mitch, JP Morgenthal and Wikey Wang dive into the controversy surrounding the imposing of $100,000 annual H-1B visa fees by the Trump administration to reduce the number of foreign IT workers allowed to work in the U.S. Then the gang takes a look at Google’s artificial intelligence (AI) plans for its Chrome browser before delving into a…
  continue reading
 
In this episode of the Security by Default podcast, host Joe Carson interviews Christian Herrmann, also known as Iceman, who shares his journey into the world of RFID hacking. The conversation covers Christian's origin story, his passion for technology, and the challenges he faced while learning and developing his skills. They discuss the importanc…
  continue reading
 
As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
  continue reading
 
The recording of this twitter space features a multifaceted, multilingual discussion (primarily Spanish and English) spanning personal trauma, professional ethics, and controversial social issues. The conversation begins on a serious, empathetic note as participant Big Crazy reports a factory explosion near his location (Suacha, Colombia), where he…
  continue reading
 
Consumer Reports on Windows 10 updates. Waste (not fraud or abuse) within DoD Cyberoperations. China's DeepSeek produces deliberately flawed code. WebAssembly v3.0 officially released. Firefox v143 updates and new features. Firefox for Android now offers DoH. A nearly terminal flaw in Microsoft's Entra ID. Chrome hits its 6th 0-day this year. Emerg…
  continue reading
 
Consumer Reports on Windows 10 updates. Waste (not fraud or abuse) within DoD Cyberoperations. China's DeepSeek produces deliberately flawed code. WebAssembly v3.0 officially released. Firefox v143 updates and new features. Firefox for Android now offers DoH. A nearly terminal flaw in Microsoft's Entra ID. Chrome hits its 6th 0-day this year. Emerg…
  continue reading
 
The source provides an extensive transcript of an online audio space conversation involving several participants, primarily a speaker identified as Alberto and another called Silan, along with a DJ named Rori and brief appearances by Silan's grandmother and an Italian guest. The discussion rapidly shifts between personal anecdotes, cyber security c…
  continue reading
 
The analysis of the X Spaces discussions from September 22nd and 23rd reveals a fundamental conflict between pervasive digital surveillance and deep human vulnerability, explored through technical exposé and intimate conversation. **I. The Architecture of Surveillance (Sept 22nd Analysis)** The core finding is the **"paradox of digital trust,"** th…
  continue reading
 
In this episode, Daniel and Chris are joined by Chris Aquino, software engineer at Thunderbird to hear the story of how they developed a privacy-preserving AI executive assistant. They discuss various design decisions including remote (but confidential) inference, local encryption, and model selection. Chris A. does an amazing job describing the jo…
  continue reading
 
AI is rapidly changing how cybercriminals operate. Social engineering, once easy to spot, has entered a new era. Phishing emails that used to be riddled with spelling mistakes and clumsy language are now polished, persuasive, and tailored using data scraped from social media and other online sources. The result? Messages that look legitimate enough…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
In episode 38 of The Adaptive Mindset, Brett Gallant explores the power of community, personal growth, and leveraging AI in business and life. Drawing on conversations with 100+ entrepreneurs worldwide, he shares insights on authentic content, company culture, and values. Tune in to discover how these lessons can help you thrive in both your busine…
  continue reading
 
Everyone's using AI, including ransomware gangs. Podcast guest Karin Lagziel, Director Cybersecurity at consulting firm Sygnia, gives us the news and her cyber defense strategies for fighting back: With more AI, as well as a focus on fundamentals. In this episode: 🔹 The first AI-powered ransomware "Prompt Lock" discovered in the wild 🔹 How Chinese …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play