Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Cybersecurity Expert Podcasts
The Expert Podcast brings you firsthand narratives from experts across diverse industries, including private investigators, general contractors and builders, insurance agencies, vehicle specialists, lawyers, and many others.
…
continue reading
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven atta ...
…
continue reading
Sunny’s Silver Linings is a Top MSP Channel Podcast hosted by the CEO of IT By Design, Sunny Kaila. Sunny and his guests cover a wide range of MSP and Talent-based topics, including MSP services, cybersecurity, customer service, and strategies to achieve growth and success in the channel. Listen now to take your business to the next level! https://hubs.ly/Q02DrxnQ0
…
continue reading
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Hosted by Brett Gallant, founder of Adaptive Office Solutions, The Adaptive Mindset is the podcast for entrepreneurs and leaders ready to embrace change, overcome limiting beliefs, and grow both personally and professionally. Through compelling stories, expert insights, and actionable strategies, each episode empowers you to adapt, lead, and thrive in a rapidly changing world. From mindset shifts to business resilience and cybersecurity, this is your go-to resource for unlocking your full po ...
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Disaster Stream is a podcast series that delves into the world of disaster recovery, cybersecurity incidents, and critical problem resolution in major organizations. Hosted by Bill Alderson, the podcast features expert insights, case studies, and interviews with leaders and pioneers in the technology and cybersecurity fields. Each episode shares lessons learned and best practices for crisis management, aiming to help organizations prepare for and respond to disasters effectively. Available i ...
…
continue reading
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
a unique perspective on technology
…
continue reading
Dive into the pulse of the Internet with This Week in NET. A weekly roundup of Cloudflare's latest news, innovations and the most impactful developments shaping the Internet. From security updates to performance breakthroughs, we deliver insights that matter to developers, businesses, and Internet enthusiasts alike. Each episode features expert analysis with special guests offering unique perspectives on today's digital challenges and evolving landscape. Follow us @CloudflareTV Read the blog ...
…
continue reading
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
…
continue reading
Hosted by cybersecurity and anti-fraud leader Paul Benda of the American Bankers Association, the ABA Fraudcast brings you expert insights, tools and strategies to help fight fraud.
…
continue reading
Security veterans Joe Patti and Adam Roth share cyber security insights from their virtual bar stools. Join Joe and Adam, along with a diverse lineup of industry insiders, for a view into how the professionals see the security issues that impact all of us. Tune in for engaging discussions, expert analyses, and a behind-the-scenes look into the cybersecurity world. Reach us at [email protected] or @SecCocktailHour on Twitter.
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
…
continue reading
Techstrong Gang is your go-to weekday show on Techstrong TV and your favorite podcast platform, bringing together a rotating lineup of top thought leaders and technologists to break down the biggest stories and trends shaping the tech world. Hosted by industry veterans Alan Shimel, Mike Vizard, Mitchell Ashley, Jon Swartz, Lisa Martin, Tracy Ragan, Sulagna Saha, Anne Ahola Ward, Bonnie Schneider, and more, the show dives deep into everything from DevOps and cybersecurity to AI and cloud inno ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
Welcome to Cyber Insights, the podcast that bridges the worlds of networking and cybersecurity. From cutting-edge innovations in enterprise connectivity to the latest in digital defense, we break down the buzzwords and bring you actionable insights to secure and scale your systems. Whether you're an IT professional, business leader, or tech enthusiast, join us as we explore the critical intersection of networks and security, featuring expert conversations, industry trends, and real world str ...
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
Tune in as we dissect recent AI news, explore cutting-edge innovations, and sit down with influential voices shaping the future of AI. Whether you're a seasoned expert or just dipping your toes into the AI waters, our podcast is your go-to resource for staying informed and inspired. #IntelAI @IntelAI
…
continue reading
Empowering Your IT Career Journey – From the first step to success! With a passion for technology and a mission to uplift others, I’m here to guide you through the dynamic IT industry. Whether you're just starting or looking to advance, you’ve found a community dedicated to your growth. Advice & Insights: From Help Desk to Director of Network Operations in 3 years, I share strategies to fast-track your career. Expert Conversations: Gain exclusive insights from industry leaders. Let’s make IT ...
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Ready to earn your AWS Certified Cloud Practitioner credential? Our Audio Course is your ultimate guide to mastering the fundamentals of AWS Cloud, including security, cost management, core services, and cloud economics. Whether you're new to IT or looking to expand your cloud knowledge, this series will help you confidently prepare for the exam and take the next step in your career. Produced by BareMetalCyber.com, your trusted resource for expert-driven cybersecurity education.
…
continue reading
Talk to Th3 Doc with Steve Meek is designed for executives seeking to learn from a balance of business and technology experts, focused on helping SMBs through practical, high-level insights. Hosted by Steve 'The Doctor' Meek, an experienced business owner and technology strategist, episodes break down complex topics in General Business, Cybersecurity, Artificial Intelligence and Technical Support, into clear, actionable conversations tailored for leadership decision-making. These include top ...
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
Welcome to "AI or Not," the podcast where digital transformation meets real-world wisdom, hosted by Pamela Isom. With over 25 years of guiding the top echelons of corporate, public and private sectors through the ever-evolving digital landscape, Pamela, CEO and Founder of IsAdvice & Consulting LLC, is your expert navigator in the exploration of artificial intelligence, innovation, cyber, data, and ethical decision-making. This show demystifies the complexities of AI, digital disruption, and ...
…
continue reading
What happens when the same AI tools that make coding easier also give cybercriminals new powers? In this episode of Cyberside Chats Live, we explore the rise of “vibe coding” and its darker twin, “vibe hacking.” You’ll learn how AI is reshaping software development, how attackers are turning those vibes into cybercrime, and what it means for the fu…
…
continue reading

1
AI Fortress: How Artificial Intelligence is Revolutionizing Corporate Cybersecurity
2:56
2:56
Play later
Play later
Lists
Like
Liked
2:56Episode Description Join David from Active Intel Investigations as he explores the strategic implementation of artificial intelligence in corporate security environments. This episode breaks down the practical applications, limitations, and best practices for integrating AI technology into your security operations while maintaining human oversight …
…
continue reading

1
How To Bring Social Responsibility To Crypto
41:30
41:30
Play later
Play later
Lists
Like
Liked
41:30Tavi Gallego, founder of a new crypto exchange:the Global Investment Crypto Exchange based here in US Midwest joins us. We discuss how to bring social responsibility to crypto. Don't Miss The Video Episode here: https://youtu.be/0xxn7jAdSRw Topics: non profit approaches to crypto currency, benefits of charity through crypto currency, charity throug…
…
continue reading

1
Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More. - SWN #515
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-515
…
continue reading

51
The cases of Alberto Hill and Brandon Beak involve the vanishing or obscuring of official records.
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13* **Beak's Case (Institutional Cover-up):** * Beak's misconduct (sexual misconduct, covering up for colleagues, landing him on the Brady List) was a catalyst that exposed a **massive systemic crisis** in the IPD (2003–2009), marked by excessive force and constitutional rights violations. * The destruction of records was an attempt to **erase histor…
…
continue reading

1
Cyber Defense Radio – Venu Rao – Strobes Security – Hotseat Podcast – 2025
19:55
19:55
Play later
Play later
Lists
Like
Liked
19:55🚨 New Episode of Cyber Defense Radio is LIVE! 🎙️ Hosted by Annabelle Thomas, Cybersecurity Champion of @CyberDefenseMag In this must-hear episode, Venu Rao, CEO & Co-Founder of Strobes Security (@StrobesHQ), steps into the Hotseat Podcast to reveal how their AI-Driven CTEM Platform to minimize threat exposure is transforming how enterprises tackle …
…
continue reading

1
🔴 Sep 26’s Top Cyber News NOW! - Ep 971
2:00:36
2:00:36
Play later
Play later
Lists
Like
Liked
2:00:36The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
…
continue reading
Guest host Jon Swartz is joined by Stephen Foskett, Gina Rosenthal, and Ira Winkler to examine the urgent need for global frameworks in AI diplomacy and governance. Concerns grow around superficial leadership in AI regulation, while advocacy contradictions raise questions about accountability.By Techstrong Group
…
continue reading

1
Brandon Beak and the 2007 Inglewood Police Scandal.
24:13
24:13
Play later
Play later
Lists
Like
Liked
24:13Informative Report: The Fragmented Accountability of Brandon BeakBrandon Beak’s history presents a complex picture of professional misconduct followed by allegations of institutional protection and recent personal legal turmoil. Due to documented efforts by the Inglewood Police Department (IPD) to destroy records, obtaining a unified, "whole" view …
…
continue reading

1
Brandon Beak Part 2: The Two Lives of Brandon Beak.
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26Informative Report: The Fragmented Accountability of Brandon Beak Brandon Beak’s history presents a complex picture of professional misconduct followed by allegations of institutional protection and recent personal legal turmoil. Due to documented efforts by the Inglewood Police Department (IPD) to destroy records, obtaining a unified, "whole" view…
…
continue reading

1
Brandon Beak Part 1: The Erased Case of Brandon Beak.
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Brandon Beak: Firing and Professional CollapseBrandon Beak was a former Inglewood Police Department (IPD) officer whose professional career was terminated in March 2007. This firing was part of a larger administrative "purge" involving six other officers. The termination stemmed from a "massive internal affairs investigation" into sexual misconduct…
…
continue reading

1
Cybersecurity Awesomeness Podcast - Episode 127
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20Chris Steffen and Ken Buckler from EMA discuss the government's investment in developing the cybersecurity workforce.By Enterprise Management Associates + DEVOPSdigest
…
continue reading

1
Broadcom, LastPass, SEO Poisoning, QR codes, H1B visas, Distributed Computing... - PSW #893
1:03:06
1:03:06
Play later
Play later
Lists
Like
Liked
1:03:06Broadcom, LastPass, Brickstone, SEO Poisoning, QR codes, H1B visas, Distributed Computing, and More... Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-893
…
continue reading

1
🔴 Sep 25’s Top Cyber News NOW! - Ep 970
1:30:35
1:30:35
Play later
Play later
Lists
Like
Liked
1:30:35The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
…
continue reading
Mike, Jon, Tom Hollingsworth, Robert Reeves and Garima Bajpai dive into details of a joint open letter published by multiple open source projects that warns the current economic model for funding many of these initiatives is unsustainable. Then the gang takes a look at the progress being made advancing WebAssembly (Wasm) to foster application portf…
…
continue reading

1
"The AI Is a Liar": An Analysis of a Live Dialogue on X Spaces Privacy and Pervasive Recording
27:37
27:37
Play later
Play later
Lists
Like
Liked
27:37.5. Conclusion: The "Privacy Placebo" and the High Stakes of Conversational DataThis live dialogue serves as a stark microcosm of the modern conflict between user privacy, platform power, and the voracious appetite of AI development. The conversation powerfully illustrates the concept of a "privacy placebo": the host's act of turning off the record…
…
continue reading

1
Container Security Uncovered: Lessons from NIST SP 800-190
23:10
23:10
Play later
Play later
Lists
Like
Liked
23:10It has been eight years since the NIST Special Publication 800-190: Application Container Security Guide was published, and its recommendations remain central to container security today. As cloud-native applications have become the foundation of modern enterprise IT, securing containers has shifted from an afterthought to a critical priority. In t…
…
continue reading

1
3 Biggest Cybersecurity Threats & What IT Leaders Need To Know
36:04
36:04
Play later
Play later
Lists
Like
Liked
36:04Cybersecurity isn’t just about firewalls and passwords anymore. It’s an all-out battle where hackers run businesses with customer support desks, insider threats can be disguised as your newest hire, and artificial intelligence is both the weapon and the shield. In this special episode of IT Visionaries, host Chris Brandt switches roles and sits in …
…
continue reading

1
Stay Ahead of DoD's Shift from RMF to CSRMC
16:36
16:36
Play later
Play later
Lists
Like
Liked
16:36The Department of Defense is making one of the most significant changes to cybersecurity compliance in over a decade: a move from the Risk Management Framework (RMF) to the Cybersecurity Risk Management Construct (CSRMC). For defense contractors, integrators, and managed service providers, this shift will redefine how compliance is achieved and mea…
…
continue reading

1
Ciberseguridad Sin Filtro: El Campo de Batalla Legal de la NDII
16:06
16:06
Play later
Play later
Lists
Like
Liked
16:06Punto de Debate 1: El Problema con la Terminología.Host: Absolutamente. Las fuentes dejan claro que la terminología es crucial. Expertos legales y defensores están presionando por términos como NDII o IBSA porque "pornografía de venganza" es a menudo un nombre inapropiado y controvertido. ¿Por qué? Porque enfocarse en el motivo del perpetrador—la v…
…
continue reading

1
Image-Based Sexual Abuse: Global Analysis and Legal Responses
15:24
15:24
Play later
Play later
Lists
Like
Liked
15:24Debate Point 1: The Problem with the Name. Host: Absolutely. The sources make it clear: terminology matters. Legal experts and advocates are pushing hard for terms like NDII or IBSA because "revenge porn" is often a gross misnomer. Why? Because focusing on the perpetrator's motive—revenge—is misleading and problematic. Not every abuser is motivated…
…
continue reading

1
Narco-Influencers: Mexico's Corrupted Landscape.
14:54
14:54
Play later
Play later
Lists
Like
Liked
14:54The rise of the narco-influencer in Mexico marks a strategic evolution in cartel operations, shifting from traditional propaganda like narcocorridos (drug ballads) to sophisticated, digital "narco-marketing". This phenomenon is rooted in narcocultura, which grew in areas where poverty and state neglect positioned traffickers as anti-heroes.Digital …
…
continue reading

1
Este tema de los narco-influencers y la corrupción en México es una intersección compleja de guerra digital, violencia de la vida real y fallas sistémicas del estado.
22:27
22:27
Play later
Play later
Lists
Like
Liked
22:27La aparición del narco-influencer en México representa una evolución estratégica de la propaganda criminal, pasando de los narcocorridos analógicos a una guerra de información sofisticada en plataformas digitales como TikTok. Este fenómeno se basa en la narcocultura, que se originó en regiones con pobreza y falta de oportunidades, donde los trafica…
…
continue reading

1
Shadow AI & Ransomware--Agentic AI EXPOSED
1:00:57
1:00:57
Play later
Play later
Lists
Like
Liked
1:00:57New Episode! Tell us your feedback! Is Your Company Safe From AI Attacks? This episode covers the intersection of artificial intelligence and cybersecurity, exploring how AI can be used for both protection and malicious purposes. We examine how AI is used to create advanced ai cybercrime and deep fakes, and the rising threat of social engineering a…
…
continue reading

1
Episode 140: Signals of Post-Quantum Insecurity
19:04
19:04
Play later
Play later
Lists
Like
Liked
19:04In this episode, the Connection Security Center of Excellence team takes us on a journey—both literal and technical—sharing insights gained from a recent reconnaissance road trip across the United States. Their firsthand experiences offer a front-line perspective on the evolving landscape of post-quantum insecurity. Listeners will hear from our sec…
…
continue reading

1
Inside the AI-Powered Workplace: How Intel Sees the Future of PCs and Workstations
20:12
20:12
Play later
Play later
Lists
Like
Liked
20:12AI isn’t just transforming the software stack — it’s reshaping the very machines powering modern business. Jennifer Larson, General Manager of Commercial Client Segments at Intel, breaks down why the distinction between workstations and high-end desktops matters more than ever, and how Intel is engineering platforms designed for creators, engineers…
…
continue reading

1
💢 FileFix Fiasco 💢 Steganography's Stealthy StealC Drop
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53Got a question or comment? Message us here! In this episode of The #SOCBrief, we break down the rising FileFix attack, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proacti…
…
continue reading

1
🔴 Sep 24’s Top Cyber News NOW! - Ep 969
1:34:14
1:34:14
Play later
Play later
Lists
Like
Liked
1:34:14The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
…
continue reading
Mike, Chris Blask and Jeff Reich dive into the implications of a $100 billion investment commitment that NVIDIA is making to OpenAI. Then the gang looks at the rise of cyberattacks involving artificial intelligence (AI) technologies before delving into the reasons why systems remain vulnerable to ransomware attacks following a massive disruption in…
…
continue reading
Alan, Mike. Mitch, JP Morgenthal and Wikey Wang dive into the controversy surrounding the imposing of $100,000 annual H-1B visa fees by the Trump administration to reduce the number of foreign IT workers allowed to work in the U.S. Then the gang takes a look at Google’s artificial intelligence (AI) plans for its Chrome browser before delving into a…
…
continue reading

1
Unlocking the Secrets of RFID Hacking with Iceman
1:06:15
1:06:15
Play later
Play later
Lists
Like
Liked
1:06:15In this episode of the Security by Default podcast, host Joe Carson interviews Christian Herrmann, also known as Iceman, who shares his journey into the world of RFID hacking. The conversation covers Christian's origin story, his passion for technology, and the challenges he faced while learning and developing his skills. They discuss the importanc…
…
continue reading

1
Rearchitecting Systems for Privacy as AI Agents Force You to Rethink Security - Guillaume Jaulerry - BSW #414
1:02:20
1:02:20
Play later
Play later
Lists
Like
Liked
1:02:20As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
…
continue reading

1
"Human Factor:" the psychological and ethical focus, as participants analyze human behavior, relationships, and mental health (PTSD, depression).
12:58
12:58
Play later
Play later
Lists
Like
Liked
12:58The recording of this twitter space features a multifaceted, multilingual discussion (primarily Spanish and English) spanning personal trauma, professional ethics, and controversial social issues. The conversation begins on a serious, empathetic note as participant Big Crazy reports a factory explosion near his location (Suacha, Colombia), where he…
…
continue reading
Consumer Reports on Windows 10 updates. Waste (not fraud or abuse) within DoD Cyberoperations. China's DeepSeek produces deliberately flawed code. WebAssembly v3.0 officially released. Firefox v143 updates and new features. Firefox for Android now offers DoH. A nearly terminal flaw in Microsoft's Entra ID. Chrome hits its 6th 0-day this year. Emerg…
…
continue reading

1
SN 1044: The EU's Online Age Verification - Consumer Reports vs. Microsoft
3:01:56
3:01:56
Play later
Play later
Lists
Like
Liked
3:01:56Consumer Reports on Windows 10 updates. Waste (not fraud or abuse) within DoD Cyberoperations. China's DeepSeek produces deliberately flawed code. WebAssembly v3.0 officially released. Firefox v143 updates and new features. Firefox for Android now offers DoH. A nearly terminal flaw in Microsoft's Entra ID. Chrome hits its 6th 0-day this year. Emerg…
…
continue reading

1
Digital Discussions and Cybersecurity and Italian big brother
22:56
22:56
Play later
Play later
Lists
Like
Liked
22:56The source provides an extensive transcript of an online audio space conversation involving several participants, primarily a speaker identified as Alberto and another called Silan, along with a DJ named Rori and brief appearances by Silan's grandmother and an Italian guest. The discussion rapidly shifts between personal anecdotes, cyber security c…
…
continue reading

1
x (Twitter) spaces recording (I'm not speaking in this in a recorded space") - The_Privacy_Placebo.
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07The analysis of the X Spaces discussions from September 22nd and 23rd reveals a fundamental conflict between pervasive digital surveillance and deep human vulnerability, explored through technical exposé and intimate conversation. **I. The Architecture of Surveillance (Sept 22nd Analysis)** The core finding is the **"paradox of digital trust,"** th…
…
continue reading

1
Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, Aaran Leyland.. - SWN #514
29:42
29:42
Play later
Play later
Lists
Like
Liked
29:42Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, ShadowV2, H1B, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-514
…
continue reading

1
Creating a private AI assistant in Thunderbird
53:08
53:08
Play later
Play later
Lists
Like
Liked
53:08In this episode, Daniel and Chris are joined by Chris Aquino, software engineer at Thunderbird to hear the story of how they developed a privacy-preserving AI executive assistant. They discuss various design decisions including remote (but confidential) inference, local encryption, and model selection. Chris A. does an amazing job describing the jo…
…
continue reading
AI is rapidly changing how cybercriminals operate. Social engineering, once easy to spot, has entered a new era. Phishing emails that used to be riddled with spelling mistakes and clumsy language are now polished, persuasive, and tailored using data scraped from social media and other online sources. The result? Messages that look legitimate enough…
…
continue reading

1
🔴 Sep 23’s Top Cyber News NOW! - Ep 968
1:25:13
1:25:13
Play later
Play later
Lists
Like
Liked
1:25:13The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
…
continue reading

1
Embracing AI: Strategies for Personal and Professional Growth
17:05
17:05
Play later
Play later
Lists
Like
Liked
17:05In episode 38 of The Adaptive Mindset, Brett Gallant explores the power of community, personal growth, and leveraging AI in business and life. Drawing on conversations with 100+ entrepreneurs worldwide, he shares insights on authentic content, company culture, and values. Tune in to discover how these lessons can help you thrive in both your busine…
…
continue reading

1
AI cyber attacks need AI cyber defense: Ransomware's new danger and how a top expert is fighting back
57:32
57:32
Play later
Play later
Lists
Like
Liked
57:32Everyone's using AI, including ransomware gangs. Podcast guest Karin Lagziel, Director Cybersecurity at consulting firm Sygnia, gives us the news and her cyber defense strategies for fighting back: With more AI, as well as a focus on fundamentals. In this episode: 🔹 The first AI-powered ransomware "Prompt Lock" discovered in the wild 🔹 How Chinese …
…
continue reading