Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

InfoSec Podcasts

show episodes
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Talkin' Bout [Infosec] News

Black Hills Information Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. Join us live on YouTube, Monday's at 4:30PM ET https://www.youtube.com/@BlackHillsInformationSecurity Brought to you by Black Hills Information Security. https://www.blackhillsinfosec.com
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
  continue reading
 
Artwork

1
Security Breach

Eric Sorensen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
The New CISO

Steve Moore

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
  continue reading
 
Artwork

1
ThinkstScapes

Jacob Torrey, [email protected], haroon meer, marco slaviero

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
  continue reading
 
Artwork

1
The Hacker's Cache

Kyser Clark - Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Artwork

1
Ctrl - Alt - Secure Podcast

Red Sentry CEO Valentina Flores

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Ctrl-Alt-Secure podcast, your guide to navigating the ever-changing landscape of cybersecurity. Join us as we delve into the latest trends, threats, and innovations shaping the infosec space.
  continue reading
 
Artwork

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
  continue reading
 
Artwork

1
Brutally Honest Security

Barricade Cyber Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
  continue reading
 
Artwork

1
The Watchers

Sentinel Blue

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
  continue reading
 
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Artwork
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Artwork

1
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
  continue reading
 
Artwork

1
Cyber Journeys

Dr Jason Edwards

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Cybersecurity is more than tools and threats — it’s the people who choose this path, and I’d love to hear how you found yours. Suppose you’re a student, early-career professional, veteran, career changer, or seasoned practitioner. In that case, you’re invited to share your story for a short, relaxed conversation that will be featured across Bare Metal Cyber channels. Use the form below to tell me a bit about your background, where you are in your journey, and what you’d like to talk about, a ...
  continue reading
 
Artwork

1
CYBR.HAK.CAST

CYBR.SEC.Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
CYBR.HAK.CAST is the official podcast of CYBR.HAK.CON., where cybersecurity professionals, hackers, and thought leaders come together to share their stories, insights, and lessons from the front lines of the infosec world. Hosted by Michael Farnum and Phillip Wylie, the show dives deep into topics shaping the modern cybersecurity landscape - from red teaming and ethical hacking to threat intelligence, blue team tactics, and the human side of security. Each episode brings candid conversations ...
  continue reading
 
Artwork

1
Dear Infosec

ISF Analyst Insight Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
  continue reading
 
Artwork

1
Humans of InfoSec

Humans of InfoSec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
  continue reading
 
Artwork
 
Wait Just an Infosec is a weekly hour-long cybersecurity-focused broadcast produced by SANS Institute, streamed live on LinkedIn and YouTube, Tuesdays at 10am ET and available to listen to in podcast format on Wednesdays. Our hosts and invited guests are a rotating lineup of SANS faculty members and experts across all infosec domains – some of the brightest minds in cybersecurity, with decades of experience as practitioners. Each week will offer thought-provoking, rich content for a full ran ...
  continue reading
 
Artwork

1
Redefining Society and Technology Podcast

Marco Ciappelli, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Let’s face it: the future is now. We live in a hybrid analog-digital society, and it’s time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? It’s no longer real — just a figment of our imagination. We’re constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. There’s no better place ...
  continue reading
 
Artwork

1
7 Minute Security

Brian Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Artwork
 
This "purple team" podcast will examine a mix of offensive "red team" and defensive "blue team" security issues and strategies. Your hosts, Darryl MacLeod and Grant Boudreau, will focus on stories, news, people, and tech from the East Coast of Canada. There is an abundance of talented people on the East Coast, and we want to showcase their abilities to the InfoSec world!
  continue reading
 
Voices of the Vigilant is where bold conversations meet unflinching purpose. Hosted by Jess Vachon, cybersecurity leader, Buddhist minister, and founder of Vigilant Violet LLC, this podcast explores the front lines of digital resilience, ethical leadership, and equitable transformation in tech. Through authentic dialogue with boundary-pushers, disruptors, and unsung heroes, each episode dives deep into the human side of cybersecurity—where strategy meets values, and innovation is grounded in ...
  continue reading
 
Artwork

1
Cyber Defense Radio

Cyber Defense Magazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
Artwork

1
Getting Into Infosec

Ayman Elsawah

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
Loading …
show series
 
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — The Problem With Extensions 03:10 - Lawmakers Want to Ban VPNs – BHIS - Talkin’ Bout [infosec] News 2025-12-01 03:47 - Story # 1: Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem) https://labs.watchtowr…
  continue reading
 
Reposting Episode 331 due to the wrong mp3 attached to the original. Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://cloud.google.com/blog/topics/threat-intelligence/unc6040-proactive-hardening-recommendations https://www.theregister.com/2025/11/13/chinese_spies_claude_attacks/…
  continue reading
 
Jaron Bradley, Director of Jamf Threat Labs, is sharing their work on "ChillyHell: A Deep Dive into a Modular macOS Backdoor." Jamf Threat Labs uncovers a newly notarized macOS backdoor called ChillyHell, tied to past UNC4487 activity and disguised as a legitimate applet. The malware showcases robust host profiling, multiple persistence mechanisms,…
  continue reading
 
A live panel from Hacks & Hops featuring FRSecure's CFO, Vanae Pearson, Information Security Consultant, Greg Cloon, and Director of IT at Miner's Inc., Tyree Johnson. Veterans in the field discuss consulting, translating security needs to executive teams, and advocating for the best budget practices. Like, subscribe, and share with your network to…
  continue reading
 
Chinese threat actors deploy Brickstorm malware. The critical React2Shell vulnerability is under active exploitation. Cloudflare’s emergency patch triggered a brief global outage. Phishing kits pivot to fake e-commerce sites. The European Commission fines X(Twitter) €120 million for violating the Digital Services Act. Predator spyware has a new bag…
  continue reading
 
Hola friends! My week has very much been about trying to turnaround pentest dropboxes as quickly as possible. In that adventure, I came across two time-saving discoveries: Using a Proxmox LXC as a persistent remote access method Writing a Proxmox post-deployment script that installs Splashtop on the Windows VM, and resets the admin passwords on bot…
  continue reading
 
In this episode of Ctrl-Alt-Secure, Valentina Flores sits down with Madison Morrow, Director of Business Development at Blue Sages, and Farshad Esnaashari, a medical device full–lifecycle consultant, to break down one of the most urgent topics in the med-tech industry: cybersecurity requirements for FDA medical device submissions. The conversation …
  continue reading
 
In this episode, we're discussing the pros and mostly the cons of notifying your SOC/MSSP before your penetration test. Spencer and Brad delve into the details of why it matters and share their experience from hundreds of penetration tests. Get your 2025 External Pentest done before time runs out! https://www.securit360.com/external-penetration-tes…
  continue reading
 
Predator spyware spotted across several countries Russia blocks FaceTime Draft US cyber strategy set for January release Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you…
  continue reading
 
CISA staff may see pay cuts in 2026. Threat actors advertise a full chain zero-day exploit for iOS. A US-led international coalition releases joint guidance on integrating AI into operational technology. Microsoft lowers sales growth targets for its agentic AI products. A major fintech provider suffers a ransomware-linked breach. Arizona’s Attorney…
  continue reading
 
Send us a text Perhaps you’re familiar with the quote, “The greatest trick the Devil ever pulled was convincing the world he didn’t exist.” While its use in the movie The Usual Suspects might resonate with most, the original attribution goes to French poet Charles Baudelaire. The quote came to mind in preparing for my conversation with Tim Chase, P…
  continue reading
 
In this episode of The New CISO, host Steve Moore speaks with Iain Paterson, Chief Information Security Officer at Well Health Technologies, about his unconventional path into cybersecurity and the lessons learned from building programs across industries—from banking and healthcare to breach response and beyond. From skipping college to take an eig…
  continue reading
 
🎙️ Marquis Breach Hits 74+ US Banks, Freedom Mobile Data Exposed, Arizona Sues Temu Data Theft 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1022: Today's episode will discuss the latest news: · India Drops Mandate for Sanchar Saathi App Amid Privacy and Surveillanc…
  continue reading
 
All links and images can be found on CISO Series. Check out this post by Christofer Hoff of Truist for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Caleb Sima, builder, WhiteRabbit. Joining them is Crystal Chatam, vp of cybersecurity, Speedcast. In this episod…
  continue reading
 
This week's Surveillance Report covers India’s attempt to mandate a potentially invasive app on everyone’s phone, Chat Control updates in the EU with concerns still evolving, half of US states now being age verified, more AI Slop, butt to cloud encryption, and more! Correction: One of you caught my mistake! The poopinator device is $600 *with* a mo…
  continue reading
 
Record-breaking DDoS attack React bug puts servers at risk RansomHouse attack Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasi…
  continue reading
 
The DOJ shuts down another scam center in Myanmar. OpenAI confirms a Mixpanel data breach. A new phishing campaign targets company executives. A bipartisan bill looks to preserve the State and Local Cybersecurity Grant Program. Universities suffer Oracle EBS data breaches. India reports GPS jamming at eight major airports. Kaiser Permanente settles…
  continue reading
 
If you’ve ever felt like the odd one out in tech, this conversation will feel like oxygen. Akira joins us to share how a shy kid, bullied for being different, found sanctuary in two unlikely rooms—the choir room and the computer lab—and turned that mix of voice and logic into a career leading application security. We map the path from opera trainin…
  continue reading
 
Got a question or comment? Message us here! In this episode of the #SOCBrief, we dig into how world events can trigger cyber fallout that lands directly on the desks of security teams. From ransomware crews capitalizing on instability to hacktivists launching DDoS attacks and opportunistic actors going after vulnerable sectors, we talk through why …
  continue reading
 
North Korea Hacks Crypto, Android Under Attack, 400K Dev Secrets Exposed 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1021: Today's episode will discuss the latest news: · Android December patches two zero-days as CISA warns active exploitation · Iran targets Israe…
  continue reading
 
A major breach hits SmartTube, the popular third-party YouTube app for smart TVs and suddenly millions of living rooms may have quietly become surveillance hubs. In this episode, we break down how the malicious update happened, what the hidden malware was doing behind the scenes, and why smart TVs are quickly becoming one of the biggest cybersecuri…
  continue reading
 
Microsoft Defender outage disrupts threats Apple resists India's state-run app order MuddyWater strikes Israel with MuddyViper Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, …
  continue reading
 
Enjoy this episode of Cyber things from Armis. Catch the next episode on your favorite podcast app on December 15th. Welcome to Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire that plunges into the hidden world beneath our connected reality. Inspired by Stranger Things, we explore the digital realm's own U…
  continue reading
 
If Facebook has seemed scammy for the past few years, it's not your imagination. A leaked internal document shows that Facebook, and its parent company Meta, are well aware that many of their ads and posts are scams, but they make too much money off of them to do anything about it. Get all the details on this scathing report from Reuters that has r…
  continue reading
 
What Security Congress Reveals About the State of Cybersecurity This discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioner…
  continue reading
 
ShadyPanda plays the long game. India mandates tracking software on mobile devices. Korea weighs punitive damages after a massive breach. Qualcomm patches a critical boot flaw impacting millions. OpenAI patches a Codex CLI vulnerability. Google patches Android zero-days. Cybersecurity issues prompt an FDA permanent recall for an at-home ventilator …
  continue reading
 
Got a question or comment? Message us here! 📱 This #SecureAF episode covers the everyday questions and concerns people have when they think something unusual is happening with their devices or accounts. Hickman and Peters talk through typical scenarios, common misunderstandings, and the foundational steps that help people regain control of their ac…
  continue reading
 
🎙️ Coupang 33.7M Data Breach, AI Malware Returns, Crypto Seized & China Exposed 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1020: Today's episode will discuss the latest news: · $29 million Bitcoin seized in crypto-mixer operation · India launches national cyberse…
  continue reading
 
All links and images can be found on CISO Series. This week's episode is hosted by me, David Spark, producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining us is John Barrow, CISO, JB Poindexter & Co. In this episode: Building unicorns, not hunting them Cold War frameworks for modern threats Trading dollars for stories Mirror, mirror on th…
  continue reading
 
TL;DR: This week's pod features a conversation with the Jay Jacobs, whom had previously been on the show talking about this very topic (vulnerability ranking/scoring) many, many years ago. If you missed Episode 297 check it out, it's crazy how far (or not) we've come since that conversation. YouTube Video: https://youtube.com/live/cpL9ZYbwkes Have …
  continue reading
 
India orders web safety app Arrests over IP camera snooping Albiriox shows up on dark web Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you can stop sweating over spreads…
  continue reading
 
Maxie Reynolds loves an adventure, especially the kind where she’s breaking into buildings (legally). In this episode, she shares stories from her time as a professional penetration tester, including high-stakes physical intrusions, red team chaos, and the unique adrenaline of hacking the real world. Her book: The Art of Attack: Attacker Mindset fo…
  continue reading
 
In this episode, Kim Jones sits down with Eric Nagel, a former CISO with a rare blend of engineering, legal, and patent expertise, to unpack what responsible AI really looks like inside a modern enterprise. Eric breaks down the difference between traditional machine learning and generative AI, why nondeterministic outputs can be both powerful and r…
  continue reading
 
Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Mathew Biby, director, cybersecurity, TixTrack, and Derek Fisher, Director of the Cyber Defense and Information Assurance Program, Temple University Thanks to our show sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do…
  continue reading
 
This week on Brutally Honest Security, host Eric Taylor flags a timely and critical risk: the surge in holiday-season scams. As festive shopping, deliveries, and goodwill ramp up, so do scams targeting unsuspecting shoppers, families, and well-meaning gift-givers. Topics covered: 🎯 The most common holiday scams - from fake retail sites and spoofed …
  continue reading
 
European authorities take down an illegal cryptomixer. An Australian man is sentenced for running an airport evil twin WiFi campaign. Researchers unmask a Scattered LAPSUS$ Hunters impresario. CISA flags a cross-site scripting flaw in OpenPLC ScadaBR. A major South Korean retailer suffers a data breach affecting over 33 million customers. Threat ac…
  continue reading
 
AI Platforms Hacked, French Soccer & Asahi Breaches, Comcast Fined $15M 💥 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1019: Today's episode will discuss the latest news: · Gainsight warns of exposed Salesforce application data · Weaponized Google Meet campaign spr…
  continue reading
 
Japanese brewer Asahi provides details regarding October ransomware attack California law regulating web browsers might impact national data privacy Microsoft to speed up Teams Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors s…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play