ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
Incident Response Podcasts
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
The CYSA Audio Course is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Welcome to F for Forensics — the ultimate digital forensic podcast for cybersecurity professionals, investigators, and tech sleuths! Hosted by Ben and Alex, each episode explores the tools, techniques, and real-world cases behind computer forensics, file system analysis, data recovery, incident response, and more. Whether you're into NTFS carving, malware artifacts, or forensic imaging, this is your byte-sized boost of expert insight and geeky banter. Subscribe now for deep dives into digita ...
…
continue reading
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
…
continue reading
The Bare Metal Cyber CCISO Audio Course is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO ...
…
continue reading
"Tune into 'The Firehouse' on WRHU 88.7 FM, a show dedicated to the heartbeat of New York's volunteer fire departments. Experience firsthand stories of bravery, community, and unyielding spirit."
…
continue reading
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
Discussion about Incident Response topics, Malware, Blue Team, Detection, Logging, Forensics, and catching the bad actors
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Interviews, stories and lessons learned from experienced crisis leaders. Email the show at [email protected]. Being an effective leader in a corporate or public crisis situation requires knowledge, tenacity, and influencing skills. Unfortunately, most of us don't get much training or real experience dealing with crisis situations. On this podcast, we will talk with people who have lived through major crisis events and we will tap their experience and stories from the front lines of cr ...
…
continue reading
Preparing Organizations for Managing Crises
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
…
continue reading
My picks of the month for the happenings in the DFIR community
…
continue reading
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
…
continue reading
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
…
continue reading
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference.
…
continue reading
Embark on a riveting journey into the heart of the cybersecurity career with host Lesline Gilzene, as she immerses you in the exploration of data breaches, incident response, and captivating real-world cybercrime narratives, uncovering the thriving stories of those on the front line of digital defense.
…
continue reading
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
This show is a mix of exclusive episodes, plus the best of Fox Footy's AFL coverage.
…
continue reading
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
…
continue reading
An original podcast series from the Materials Technology Institute, focused on materials in the processing industry and the experts within the community.
…
continue reading

1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™
Startuprad.io – Europe’s Startup & VC Podcast Network
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
…
continue reading
Stay ahead of the curve with BBD's Tech Unboxed, the podcast that unpacks the latest trends, innovations, and transformative digital solutions driving tomorrow's world.
…
continue reading
Cybersecurity on the Front Lines is a podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Nomic Networks' CEO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
SC Media and F5 are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
…
continue reading
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
…
continue reading
The Forensic Lunch! The one hour, mostly, live digital forensics and incident response focused video cast and podcast.
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
…
continue reading
The BC Safety Briefing is an AI-generated podcast exploring the world of occupational health and safety in British Columbia. Each episode dives into real case studies, WCAT decisions, new regulations, standards, and legislative updates that impact employers, workers, and safety professionals across the province. This show is designed as an educational resource to spark discussion, raise awareness, and keep listeners up to date with the evolving OHS landscape in BC. Because it is AI-generated ...
…
continue reading
SC Media and F5 are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
The TribalHub podcast shares stories of tribal leaders who are driving their organizations, businesses that are collaborating with tribes, and leaders in the industry who are savvy about technology. Subscribe on your favorite podcast platform! TribalHub...Connections, Membership, Opportunity.
…
continue reading
The latest news and information from your MEC, the only trusted and reliable source for our membership.
…
continue reading
#critical, #incidents, #war-room, #sos. Every startup creates one at some point: a channel in which, whenever the fecal matter strikes the atmospheric propulsor, an attempt at coordination takes place. It's one of those ubiquitous inevitabilities of working in the tech scene today. Our very own Critical Channel, however, aims to highlight some different inevitabilities. From organisational culture in a high-growth situation, to personal mental health and work-life balance. From manipulating ...
…
continue reading
Has your antivirus just screamed "Threat Found!" and left you asking, "Now what?!" As a UK small business owner or sole trader, a cyber-attack can feel like a direct threat to your business livelihood, your reputation, and everything you've worked hard for. Don't panic! My Antivirus Says "Threat Found!" – Now What? is your essential Malware Alert First Aid Kit, designed specifically for UK SMEs who need practical, immediate cyber security advice to protect what matters most. This podcast cut ...
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading

1
DOP 320: Why Dashboards Alone Are Not Enough for Incident Response
52:24
52:24
Play later
Play later
Lists
Like
Liked
52:24#320: In this episode, Darin and Viktor are joined by Jim Hirschauer, Head of Product Marketing at Xurrent, for a deep dive into the realities of incident management in today's complex IT environments. While dashboards and monitoring tools have become ubiquitous in operations centers, the panel discusses why these visualizations alone often fall sh…
…
continue reading

1
Incident Response & What’s the Buzz from the TribalNet Floor — A Quick Chat with Andy Jabbour
17:32
17:32
Play later
Play later
Lists
Like
Liked
17:32By TribalHub
…
continue reading

1
Episode 154: Integration of Incident Response into DevSecOps
33:12
33:12
Play later
Play later
Lists
Like
Liked
33:12In episode 154 of Cybersecurity Where You Are, Sean Atkinson discusses incident response in DevSecOps, exploring challenges and solutions in modern software development. He emphasizes the importance of integrating security into development processes and speaks about common issues like alert fatigue and software supply chain vulnerabilities. Here ar…
…
continue reading

1
Inside the Tribal-ISAC: Cyber Insights and Conversations from TribalNet
18:05
18:05
Play later
Play later
Lists
Like
Liked
18:05In this episode, Michelle Bouschor sits down with Tribal-ISAC Steering Committee Members Toni Pepper, Adam Gruszcynski to discuss THE PULSE, The State of Cybersecurity Within Tribal Nations Cyber Report, the new tabletop exercise grant program available for ISAC members, and their session at TribalNet. They also share what they’ve been hearing from…
…
continue reading
Sarah Yoder (Manager, Mandiant Consulting) and Ashley Pearson (Senior Analyst, Advanced Practices on Google Threat Intelligence Group) join host Luke McNamara to discuss UNC5221 and their operations involving BRICKSTORM backdoor. This highly sophisticated, suspected China-nexus cyber-espionage threat group is known for aggressively targeting intern…
…
continue reading

1
DOP 321: Model Context Protocol for Standardizing AI Tool Integration
41:35
41:35
Play later
Play later
Lists
Like
Liked
41:35#321: Model Context Protocol (MCP) represents a fundamental shift in how AI agents interact with tools and systems. Rather than forcing models to guess the best approach for tasks like creating AWS resources, MCP provides structured context that guides agents toward organization-specific workflows and tools. The protocol serves as an API for agents…
…
continue reading

1
Episode 158: Scaling CMMC Compliance with Nerdio
32:27
32:27
Play later
Play later
Lists
Like
Liked
32:27In episode 158 of Cybersecurity Where You Are, Sean Atkinson is joined by Andy Weidner, Product Manager at Nerdio, and Jason Ingalls, Chief Cybersecurity Officer at C3 Integrated Solutions. Together, they explore how organizations can navigate the complexities of Cybersecurity Maturity Model Certification (CMMC) compliance using automation, scalabl…
…
continue reading
This is today’s cyber news for October 22nd, 2025. A major AWS outage reminded everyone how fragile single-cloud strategies can be, while a Windows update snag locked out cloned PCs with duplicate SIDs. CISA pressed urgency on an exploited Oracle E-Business Suite flaw, and a critical TP-Link Omada bug exposed small-business gateways to takeover. Re…
…
continue reading
First ever monlogue with CJ... I recap some of the things I found to be of interest over the past few weeks with Pax8 EMEA and ChannelCon EMEA... Tell some stories and then looking forward to MSP Global. This one is short and sweet and I hope you find some entertainement in it.
…
continue reading

1
AI in Action: Transforming Crisis Preparedness, Training, and Exercises
46:27
46:27
Play later
Play later
Lists
Like
Liked
46:27In this episode of The PreparedEx Podcast, host Rob Burton sits down with Austin Cruz, Associate Director of Crisis Management and Strategic Innovation at Witt O’Brien’s and newly elected leader of the Business Continuity Institute’s AI Special Interest Group. Together, they explore how artificial intelligence is reshaping the world of crisis manag…
…
continue reading
This is today’s cyber news for October 21st, 2025. An AWS regional outage exposed hidden single-region dependencies, while CISA’s newest KEV entries pushed Oracle E-Business Suite to the front of many patch queues. We cover a supply-chain hit on developer ecosystems via “GlassWorm,” thousands of exposed WatchGuard firewalls, and a Windows SMB flaw …
…
continue reading

1
Inside F3: Building Community And Sharing Knowledge In Digital Forensics
1:00:33
1:00:33
Play later
Play later
Lists
Like
Liked
1:00:33Gareth Davies, Chairman of F3 (First Forensic Forum), joins the Forensic Focus Podcast to explore how a grassroots, vendor-neutral community has helped shape digital forensics in the UK for three decades. He traces F3’s origins in the 1990s, when affordable training and tool-agnostic knowledge-sharing were scarce, and explains why the forum still f…
…
continue reading
This is today’s cyber news for October 20th, 2025. Social platforms and trusted clouds drive the lead stories: “ClickFix” videos walking viewers into info-stealers, and Microsoft Azure Blob Storage abused to deliver convincing Microsoft 365 phishing. We also cover a critical WatchGuard VPN flaw, certificate abuse behind fake Teams installers, and M…
…
continue reading

1
#7 Consumer AI: How Everyday Tools Are Creating New Security Risks
39:43
39:43
Play later
Play later
Lists
Like
Liked
39:43AI has gone fully consumer, from voice recipes in the kitchen to bots that schedule your day. But when that same tech walks into the office, what happens to privacy, security and trust? In this episode, we explore the blurred line between consumer AI convenience and enterprise AI chaos. What starts as smart personalisation quickly becomes a complia…
…
continue reading

1
Ekco: Cybersecurity and the Evolving Threat Landscape
39:28
39:28
Play later
Play later
Lists
Like
Liked
39:28Send us a text Guest: Pat Larkin, President, Ekco, a Dublin-based “security-first managed cloud provider” that has grown rapidly through both organic expansion and a series of strategic acquisitions across Europe. Pat outlined Ekco’s evolution from a backup service provider to a security-first cloud provider, driven by numerous mergers and acquisit…
…
continue reading

1
Weekly Cyber News Rollup, October 17th, 2025
11:21
11:21
Play later
Play later
Lists
Like
Liked
11:21The Daily Cyber News— Friday Edition is your end-of-week cybersecurity intelligence wrap, turning five days of breaking threats into one fast, actionable update. For the week ending October 17th, 2025, we unpack everything from nation-state intrusions and zero-day exploits to record-setting DDoS attacks, policy moves, and vendor fallout — all expla…
…
continue reading

1
Episode 153: How to Prove Your Security Works Before Attackers Do
33:04
33:04
Play later
Play later
Lists
Like
Liked
33:04In this episode, we dig into how to move from “we think we’re secure” to “we can prove it.” We’ll lay out a practical loop for validating controls, gathering evidence, and tracking results that leadership understands. If you’ve ever wondered how to demonstrate security value beyond dashboards and audits, this is your playbook. Blog: https://offsec.…
…
continue reading
This is today’s cyber news for October 17th, 2025. Today’s brief tracks rising pressure on edge security and third-party risk: lawmakers want clearer answers from Cisco on zero-day firewalls, while Microsoft’s certificate purge aims to blunt Teams-delivered lures. On offense, North Korea hides malware in blockchain contracts and ships Trojanized “j…
…
continue reading

1
Cyber Warriors & Digital Shadows: Insights from Canada's Cybersecurity Leader | Sami Khoury
49:22
49:22
Play later
Play later
Lists
Like
Liked
49:22In this episode of The Defender’s Log, host David Redekop sits down with Sami Khoury, the Head of the Canadian Centre for Cyber Security, for an inside look at the battle to protect national infrastructure from unseen digital threats. From his beginnings as a research engineer in 1992 to leading one of Canada’s most critical cybersecurity agencies,…
…
continue reading
This is today’s cyber news for October 16th, 2025. F5 confirmed a nation-state breach with BIG-IP source code and vulnerability research stolen, while the U.K.’s regulator fined Capita £14 million for its 2023 data breach. We covered a massive misconfigured Elasticsearch cache exposing six billion records, evolving social engineering that impersona…
…
continue reading

1
Olena Nicks- Uniondale Fire Department - on "The Firehouse"- WRHU 88.7 FM S7 EP10
47:28
47:28
Play later
Play later
Lists
Like
Liked
47:28Sitting with me in The Firehouse is Olena Nicks. Olena joined the fire department right out of high school, beginning her journey in EMS before joining Rescue and rising through the ranks to become a Captain. Her passion for service began organically after seeing a sign for volunteer firefighters — a simple moment that inspired a lifelong commitmen…
…
continue reading

1
Keeping Security Awareness Fresh: A Conversation with KC Petersen
11:16
11:16
Play later
Play later
Lists
Like
Liked
11:16Recorded live at TribalNet 2025, Michelle Bouschor chats with KC Petersen about her session on “Security Awareness—Keeping It New, Updated, and Engaging.” KC shares what’s been working for her casino property, how to make security training more effective, and creative ways to turn employee awareness into everyday action.…
…
continue reading

1
TetraNoodle: The Impact of AI on Team Dynamics and Productivity
22:37
22:37
Play later
Play later
Lists
Like
Liked
22:37Send us a text Manuj Aggarwal, Founder of TetraNoodle Technologies, talked about the integration of AI within Managed Service Providers (MSPs) and the opportunities it presents for enhancing customer engagement and productivity. He emphasized the necessity for MSPs to deepen their understanding of AI to better serve their clients. He also highlight…
…
continue reading
October 15th, 2025. This is today’s cyber news for October 15th, 2025. We lead with new research showing widespread eavesdropping risk on geostationary satellite traffic, then pivot to Microsoft’s heavy Patch Tuesday and the end of free support for Windows 10. You’ll also hear how the U.K. is grappling with a sharp rise in nationally significant in…
…
continue reading

1
Episode 157: How a Modern, Mission-Driven CIRT Operates
38:53
38:53
Play later
Play later
Lists
Like
Liked
38:53In episode 157 of Cybersecurity Where You Are, Sean Atkinson sits down with Matthew Grieco, Cyber Incident Response Team (CIRT) Principal Analyst at the Center for Internet Security® (CIS®), and Dustin Cox, CIRT Analyst at CIS. Together, they explore the unpredictable world of cyber incident response. From ransomware investigations to digital foren…
…
continue reading
Incident Response Planning and tabletop exercises have been discussed on the show several times. However, how do you get culture adoption and buy-in from all staff? I sit down with Amanda Lachapelle of Auvik to talk about IR Games, how to do them, and the importance of doing them, not just internally but also with your clients.…
…
continue reading

1
More Storage and Performance with Infinidat
16:15
16:15
Play later
Play later
Lists
Like
Liked
16:15Send us a text Julian sat down with an ECN regular, Eric Herzog, CMO of Infinidat, a data storage company that provides high-performance, enterprise-class data storage solutions The discussion centered on the advancements in Infinidat’s G4 platform, particularly the integration of an S3 object store that simplifies storage management for channel pa…
…
continue reading
In this episode of ConversingLabs, host Paul Roberts interviews Abigail Cabunoc Mayes, who is responsible for Open Source Maintainer Programs at GitHub – the world’s leading development platform – about the uncertainty of open source’s future. This uncertainty is caused by a steady decline in Gen Z maintainers, which presents a major software suppl…
…
continue reading
This is today’s cyber news for October 14th, 2025. We open with Microsoft tightening Internet Explorer mode in Edge after credible reports of real-world abuse. From there, we cover widespread SonicWall SSLVPN account compromises with stolen credentials, an emergency Oracle E-Business Suite fix following active exploitation, and a U.S.-focused botne…
…
continue reading
By Jason Edwards
…
continue reading
By Dr. Jason Edwards
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading

1
Flow State Rituals for Founders: Deep Work, Distraction Hacks & AI Focus
47:44
47:44
Play later
Play later
Lists
Like
Liked
47:44In this episode, Steven Puri, CEO of The Sukha Company and former Hollywood VFX executive (Independence Day, Godzilla, Transformers Prime), shares the rituals, behavioral frameworks, and AI-powered systems he uses to help founders reach deep work in distraction-heavy environments. Steven’s journey from blockbuster sets to startup leadership reveals…
…
continue reading

1
Security Awareness Through Trust and Influence - Jennifer Selby Long - CSP #217
35:39
35:39
Play later
Play later
Lists
Like
Liked
35:39Jennifer Selby Long reframes security awareness as more than training—it’s about earning trust and influence with executives and security teams. She shares leadership lessons on how to build stronger alignment and support for security initiatives. Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodca…
…
continue reading

1
Security Awareness Through Trust and Influence - Jennifer Selby Long - CSP #217
35:39
35:39
Play later
Play later
Lists
Like
Liked
35:39Jennifer Selby Long reframes security awareness as more than training—it’s about earning trust and influence with executives and security teams. She shares leadership lessons on how to build stronger alignment and support for security initiatives. Show Notes: https://cisostoriespodcast.com/csp-217
…
continue reading

1
The $25 Million Arup Deepfake: AI's Most Convincing Con
40:49
40:49
Play later
Play later
Lists
Like
Liked
40:49The $25 Million Arup Deepfake: AI's Most Convincing Con In a world where AI can mimic voices and faces perfectly, even the most secure companies can fall victim. The Arup Deepfake Hack shocked the corporate world when attackers used AI-generated video of the company’s CFO to trick an employee into wiring $25 million to a fraudulent account. This wa…
…
continue reading

1
Fox Footy Podcast Trade Special: Swans' Curnow risk, Dee's big challenge and draft overhaul
27:04
27:04
Play later
Play later
Lists
Like
Liked
27:04Gerard Healy joins Max Laughton, Ben Waterworth and Ben Cotton for the latest Fox Footy Podcast trade period special, breaking down the latest on Charlie Curnow, Melbourne and general player movement issues, before the boys play Fair or Farce. See omnystudio.com/listener for privacy information.By Fox Sports Australia
…
continue reading
This is today’s cyber news for October 13th, 2025. The brief leads with fresh exploitation against Oracle E-Business Suite and reports of SonicWall customer backup configurations viewed by attackers, raising concerns about blueprint-level exposure and data theft. We also cover an actively exploited Gladinet CentreStack/Triofox zero-day, a record ~3…
…
continue reading

1
F is for Footprints – Tracing User Activity Across Systems
39:43
39:43
Play later
Play later
Lists
Like
Liked
39:43On this episode, we uncover how digital footprints—from browser history and shell commands to registry hives and DNS logs—reveal a user’s activity even when they think it’s been erased. Real cases, practical tools, and expert tips for tracing every click, command, and mistake. #FforForensics #DigitalFootprints #UserActivity #DigitalForensics #DFIR …
…
continue reading

1
Weekly Cyber News Rollup, October 10th, 2025
17:19
17:19
Play later
Play later
Lists
Like
Liked
17:19This week’s wrap cuts through the noise. We break down North Korea’s multi-billion-dollar crypto theft problem, the Salesforce-adjacent extortion wave targeting customer exports, and active exploitation against Oracle E-Business Suite. We also cover a critical Redis flaw with app-wide blast radius, Cisco edge firewall abuse with public exploit code…
…
continue reading
This is today’s cyber news for October 10th, 2025. Today’s brief leads with SonicWall confirming its cloud firewall backups were accessed for all users of its backup service—turning configuration data into a roadmap for attackers. We also cover an actively exploited WordPress authentication bypass, an Android spyware family impersonating WhatsApp a…
…
continue reading

1
(replay) Common Pentest Findings That Shouldn't Exist in 2025
27:23
27:23
Play later
Play later
Lists
Like
Liked
27:23In this episode of The Cyber Threat Perspective, we highlight the pentest findings that, frankly, have no business showing up in 2025. From accounts with weak passwords and no MFA to plaintext credentials on file shares, we break down the common misconfigurations and oversights that attackers still abuse, despite years of seeing the same issues ove…
…
continue reading
This is today’s cyber news for October 9th, 2025. A new cloud-focused extortion crew targets AWS, a three-way ransomware alliance promises faster, louder campaigns, and Qilin pressures Asahi with leaked data. We cover a coordinated push against Salesforce tenants by a “Scattered Lapsus$ Hunters” collective and a Microsoft 365 outage that rippled th…
…
continue reading

1
Fox Footy Podcast Trade Special: Giant bombshell, Suns' staunch stance and latest draft whispers
28:25
28:25
Play later
Play later
Lists
Like
Liked
28:25Ben Dixon joins Ben Waterworth, Ben Cotton and Will Faulkner for the latest Fox Footy Podcast trade period special, breaking down the latest on Leek Aleer, Bailey Humphrey and Charlie Curnow, before the boys play Fair or Farce and bring you the latest draft whispers. See omnystudio.com/listener for privacy information.…
…
continue reading

1
Bob Corwin- Greenport Fire Department - on "The Firehouse"- WRHU 88.7 FM S7 EP9
53:28
53:28
Play later
Play later
Lists
Like
Liked
53:28Sitting with me in the Firehouse is Bob Corwin. Bob Corwin’s journey in the fire service began early, following in the footsteps of his family. Though he officially joined as a Junior Firefighter in 1985, he had been around the firehouse long before that with his father and grandfather. His grandfather, an Ex-Chief of the department and Chief Drive…
…
continue reading

1
Flow State for Startup Founders: Deep Work That Actually Ships
51:12
51:12
Play later
Play later
Lists
Like
Liked
51:12Steven Puri, co-founder/CEO of Sukha, shares the flow state for startup founders playbook: body doubling, the coffee-shop effect, chronotype time-blocking, demo-first standups, and outcome-based leadership. You’ll learn how to beat the 22-minute context switching tax, design deep-work rituals for remote teams, and build a best-idea-wins culture tha…
…
continue reading
This is today’s cyber news for October 8th, 2025. A Fortune-scale standoff leads the brief as Salesforce refuses to pay after a mass data-theft extortion attempt. We also cover ShinyHunters’ new leak portal, active exploitation against Oracle E-Business Suite, Medusa’s push through GoAnywhere MFT, and a critical Redis flaw dubbed “RediShell.” Round…
…
continue reading

1
DOP 319: AI-Powered Infrastructure: Beyond Hype to Reality
36:32
36:32
Play later
Play later
Lists
Like
Liked
36:32#319: The AI infrastructure landscape is evolving rapidly, but the gap between marketing hype and practical reality remains significant. While vendors promise revolutionary changes with each new model release, the true challenge lies not in accessing more powerful AI tools, but in developing the organizational workflows and individual expertise nee…
…
continue reading