As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
…
continue reading
Think Cyber Secure Podcasts
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
…
continue reading
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. ...
…
continue reading
Selva Kumar is SAP Career Trainer specializing in SAP Career Coaching, identifying skills for getting a Job. You can reach me @ 302 494 9476 or Email: [email protected] Download Free SAP GRC Guide. http://expressgrc.com/sap-grc-10-1-step-step-guide/
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
NorthStandard‘s podcast features thought-provoking discussions on news and topics in the maritime industry. We talk with experts from the club and special guests in the field from around the world
…
continue reading
Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.
…
continue reading
Legitimate Cybersecurity Podcast - designed to empower you with real-world cybersecurity information, stories, and advice.
…
continue reading
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
…
continue reading
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
…
continue reading
The brave new world of podcasts, let’s do it.
…
continue reading
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
…
continue reading
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
…
continue reading
Discussions over drinks with security, defense, and foreign policy insiders and experts. The original War on the Rocks podcast series.
…
continue reading
How would your life change if you reached Financial Independence and got to the point where working is optional? What actions can you take today to make that not just possible but probable. Jonathan & Brad explore the tactics that the FI community uses to reclaim decades of their lives. They discuss reducing expenses, crushing debt, tax optimization, building passive income streams through online businesses and real estate and how to travel the world for free. Every episode is packed with ac ...
…
continue reading
At AARP California, we are so much more than our membership card and ‘In Clear Terms’ is all about informing you about the great things that we do for Californians of all ages. This podcast will cover news that you can use as you think about healthcare, retirement savings, caregiving, new technology, and legislation you should be aware of that we are engaged in on your behalf. Join Thyonne Gordon for conversations that are fun and thought provoking with community leaders, thought leaders, el ...
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
Russ Branzell, President & CEO of the College of Healthcare Information Management Executives (CHIME), interviews leaders in Digital Health from around the world. These thought leaders share their knowledge, challenges, best practices, and ideas for helping to transform health and care on a global level.
…
continue reading
This is the podcast of WAR ROOM, the official online journal of the U.S. Army War College. Join us for provocative discussions about U.S. national security and defense, featuring prominent national security and military professionals.
…
continue reading
The Hack Podcast, straight-talk smart tech. Leon McQuade, Paul Longely and Dean Bulfeild bring a leader’s eye over technology drivers shaping the world back to East Yorkshire. We now live in a dazzling world of screens that continues to revolutionise how we live, work and play. The futures arriving faster than ever before, it's time to Think Different. We talk transformation and change focusing on People, Process and Technology. Originally Inspired By Pete Lindsay and Mark Bawden's Book “Pig ...
…
continue reading
Essential listening for the broadcast production, journalism and technology communities. Your guide to everything from editorial and craft skills to taking your next step in the industry. Practical advice on all aspects of TV, radio, journalism.
…
continue reading

1
Cybercrime Magazine Update: Automated Security Testing Tools. What You Need To Know.
2:51
2:51
Play later
Play later
Lists
Like
Liked
2:51Astra broke down all you need to know about automated security testing tools, including the top 3 tools, in a new blog post as part of its 10-part security testing series. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Maga…
…
continue reading

1
Cybercrime News For Jul. 14, 2025. Artivion Delays Data Breach Notice 8 Months. WCYB Digital Radio.
2:22
2:22
Play later
Play later
Lists
Like
Liked
2:22The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
Are You Over-Optimizing? | Jesse Cramer | Ep 555
57:50
57:50
Play later
Play later
Lists
Like
Liked
57:50Effective financial planning resembles both a puzzle and a spider web, where each decision impacts interconnected aspects of one's financial life. Brad is joined by Jesse Cramer and explores the importance of resilience over perfection in financial planning, how minor choices can have significant implications, and the necessity of revisiting one's …
…
continue reading

1
Risky Bulletin: Radio equipment vulnerability can bring trains to sudden stops
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12A radio equipment vulnerability can bring trains to sudden stops, researchers prevent a Lazarus crypto attack, Spain hands Huawei control over its phone wiretapping system, and CISA warns of ongoing CitrixBleed 2 attacks. Show notes
…
continue reading
In this Risky Business sponsored interview, Zero Networks Field CTO, Chris Boehm discusses the everyone-gets-an-AI future with Casey Ellis. Zero Networks makes network microsegmentation achievable without simply handing an AI control of the network. Will generative artificial intelligence ever be trusted to make hard access control decisions? Show …
…
continue reading

1
LIVE: They’re Stealing You with AI 😳 | AI Risks to Identity & How to Fight Back
1:27:24
1:27:24
Play later
Play later
Lists
Like
Liked
1:27:24If you manage care about protecting yourself, your loved ones—and your organization-- this episode offers actionable takeaways you can use today. This is part of our official Cyber Crime Junkies podcast series—subscribe wherever you listen! ✅ **Don’t forget to like, subscribe, and hit the bell 🔔.** 💬 Comment your “worst phishing attempt” below—I’ll…
…
continue reading

1
Building a Cybersecurity Mindset: AI, Culture, & Governance Explained
43:43
43:43
Play later
Play later
Lists
Like
Liked
43:43David Mauro and DeWayne Hart explore the critical aspects of building a cyber security mindset, understanding cyber security awareness, internet governance in cyber security, and importance of culture in cybersecurity. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 …
…
continue reading

1
Cybercrime Wire For Jul. 12-13, 2025. Weekend Update. WCYB Digital Radio.
1:08
1:08
Play later
Play later
Lists
Like
Liked
1:08The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
Scott Augenbaum, retired FBI Agent in the Cyber Division shares his truths framework about the FBI vs Cyber Crime and the fbi perspective of cyber crime. Topics: fbi perspective of cyber crime, fbi view of cyber crime, explaining the fbi stance on cyber crime, lessons learned from fbi on cyber crime, lessons on cyber crime from fbi, war between the…
…
continue reading

1
Ransomware Minute. Telcom Giant Telefónica, Virginia County. Scott Schober, WCYB Digital Radio.
2:34
2:34
Play later
Play later
Lists
Like
Liked
2:34The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.By Cybercrime Magazine
…
continue reading

1
Cybercrime Wire For Jul. 11, 2025. Activision Pulled Game, Players Exploited. WCYB Digital Radio.
1:18
1:18
Play later
Play later
Lists
Like
Liked
1:18The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
Top Cybersecurity Industry Associations. Texas Cybersecurity Council.
0:57
0:57
Play later
Play later
Lists
Like
Liked
0:57Looking to network in the cybersecurity world? Fortunately, there’s no shortage of industry associations to choose from. Today, we’re putting the spotlight on the Texas Cybersecurity Council. The Texas Cybersecurity Council develops enduring partnerships between private industry and public sector organizations to ensure that critical infrastructure…
…
continue reading

1
Cybercrime News For Jul. 11, 2025. Two Men Charged in $650M Global Crypto Scam. WCYB Digital Radio.
2:56
2:56
Play later
Play later
Lists
Like
Liked
2:56The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
Quantum Minute. Researchers Succeed With Qudit Quantum Computer. Sponsored by Applied Quantum.
1:41
1:41
Play later
Play later
Lists
Like
Liked
1:41Researchers from the University of Innsbruck and the University of Waterloo have successfully simulated a complete quantum field theory in more than one spatial dimension using a novel type of quantum computer. Science Daily reports that the team used a qudit quantum computer, which can store and process information using up to five values per carr…
…
continue reading

1
Risky Bulletin: Two billion eSIMs receive crucial security patch
8:20
8:20
Play later
Play later
Lists
Like
Liked
8:20Two billion eSIMs receive crucial security patches, China’s cyber militias go on the offensive, four Scattered Spider members detained over UK retail attacks, and a Russian basketball player is arrested in a ransomware case. Show notes
…
continue reading

1
Cybercrime Magazine Update: Why Europe Can No Longer Think About Its Security In Silos.
3:04
3:04
Play later
Play later
Lists
Like
Liked
3:04Maddyness has reported that Europe can no longer think about its security in silos, faced with persistent armed conflicts on the continent, a rise in cyber threats, and intensifying militarization of space. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazi…
…
continue reading

1
The Truth About Ethical Hacking (Pen Testing Myths Busted!)
41:33
41:33
Play later
Play later
Lists
Like
Liked
41:33Are you curious about penetration testing, aka legal hacking? In this episode of Legitimate Cybersecurity, Frank and Dustin tear down the myths of hacking, break down real-world pen testing, and share hilarious (and horrifying) war stories from the field. We cover: ✅ The skills you actually need to get into pen testing ✅ What certs like OSCP, CEH, …
…
continue reading

1
Preetam Joshi Breaks Down ML, LLMs, AI Agents, and Governance Challenges
58:31
58:31
Play later
Play later
Lists
Like
Liked
58:31How do you make sense of security, governance, and risk in an age of black-box AI? This week, Raj is joined by Preetam Joshi, founder of Aimon Labs and machine learning veteran with experience at DRDO, Yahoo, Netflix, and Thumbtack. Together, they break down the technical evolution behind large language models (LLMs), explore the real challenges of…
…
continue reading

1
Cybercrime Wire For Jul. 10, 2025. $43M+ Stolen From GMX Crypto Platform. WCYB Digital Radio.
1:19
1:19
Play later
Play later
Lists
Like
Liked
1:19The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
Cybercrime News For Jul. 10, 2025. OpenAI Locks Down as Espionage Concerns Grow. WCYB Digital Radio.
2:44
2:44
Play later
Play later
Lists
Like
Liked
2:44The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
Trump, Netanyahu, and the Future of the Middle East
33:35
33:35
Play later
Play later
Lists
Like
Liked
33:35New York Times columnist Thomas Friedman sits down with Ravi Agrawal to debrief this week’s meeting between U.S. President Donald Trump and Israeli Prime Minister Benjamin Netanyahu at the White House. Friedman is also the author of From Beirut to Jerusalem, among other books. Thomas L. Friedman: How Trump’s ‘Big, Beautiful Bill’ Will Make China Gr…
…
continue reading

1
CR0105: How little we still understand about GreenOps with James Hall, Green Pixie
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39GreenOps is a cultural transformation that empowers developers to turn emissions data into meaningful action, bridging the communication gap with ESG teams and exposing the critical truth that cloud cost and carbon cost are not the same, which fundamentally reshapes how we approach sustainable IT. This week, Dave, Esmee and Rob talk to James Hall, …
…
continue reading

1
Srsly Risky Biz: Four key players drive Scattered Spider
17:07
17:07
Play later
Play later
Lists
Like
Liked
17:07Tom Uren and Amberleigh Jack talk about our developing understanding of the group that people call Scattered Spider. Independent security firms agree that there are a small number of key people that are driving the group’s outrageous success. That gives us hope that targeted action might stem the bleeding. They also talk about data leaks from China…
…
continue reading

1
Emotional Firewalls: Mastering EQ to Outsmart Global Cyber Threats
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10Cybercrime Junkies Podcast interviews former NATO specialist and international intelligence expert, Nadja El Fertasi, about the role played by emotional intelligence in cyber security and Emotional Intelligence in AI. We discuss emotional firewalls, learning EQ (emotional intelligence) and how it can stop social engineering attacks, how internation…
…
continue reading

1
Cybersecurity Venture Capital Report. Q2 2025. Richard Seewald, Evolution Equity Partners.
15:22
15:22
Play later
Play later
Lists
Like
Liked
15:22The Cybersecurity VC Report tracks venture capital deal flow is updated daily by the editors at Cybersecurity Ventures: https://cybersecurityventures.com/cybersecurity-venture-capital-vc-deals/The VC Report is sponsored by Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop marke…
…
continue reading

1
Secure AF SOC Brief #5 - Chrome CVE-2025-6554
9:04
9:04
Play later
Play later
Lists
Like
Liked
9:04Got a question or comment? Message us here! In this episode of The SOC Brief, the team unpacks a critical zero-day vulnerability in Google Chrome (CVE-2025-6554) that’s being actively exploited. Learn how attackers use type confusion bugs to hijack browser memory, what makes this exploit so dangerous, and why it’s targeting high-value organizations…
…
continue reading

1
SafePay Ransomware Rises, North Korea Adopts ClickFix
24:20
24:20
Play later
Play later
Lists
Like
Liked
24:20Resources: https://linktr.ee/ReliaQuestShadowTalk Have you heard of SafePay ransomware? Join host Kim along with intelligence analysts Hayden and John as they discuss: SafePay Targets Ingram Micro (1:16) Updates on Iran-Israel (5:43) North Korea Adopts ClickFix & Attacks Web3 (8:24) Insights from ReliaQuest Customer Incidents (13:14) Kim Bromley: S…
…
continue reading

1
Cybercrime Wire For Jul. 9, 2025. Flutter Entertainment Flags Data Breaches. WCYB Digital Radio.
1:16
1:16
Play later
Play later
Lists
Like
Liked
1:16The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
How Ukraine is Adapting, Enduring, and Striking Back
27:59
27:59
Play later
Play later
Lists
Like
Liked
27:59Mike Kofman and Ryan brought out the mics to discuss the pressing issues in the war between Ukraine and Russia. They focused on drones, the state of the front, manpower, Putin's approach to Washington, and the contested policies around continued aid from the United States to Ukraine. This episode features meaty excerpts from an episode of The Insid…
…
continue reading

1
Cybercrime News For Jul. 9, 2025. Italy Arrests Chinese National Wanted by FBI. WCYB Digital Radio.
2:20
2:20
Play later
Play later
Lists
Like
Liked
2:20The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
How To Interview With a Tech Giant: Part 3
34:32
34:32
Play later
Play later
Lists
Like
Liked
34:32Send us a text Cloud network engineering interviews at tech giants require specialized knowledge beyond traditional networking – particularly when it comes to cloud-native services. In this final installment of our interview preparation series with Kam Agahian, we explore the specialized networking services that frequently appear in technical asses…
…
continue reading

1
Risky Bulletin: Chinese APT member arrested in Italy
7:20
7:20
Play later
Play later
Lists
Like
Liked
7:20Italy arrests a Chinese APT hacker, a Russian drone software group gets wiped, the SatanLock ransomware operation shuts down, and browser extensions power a web scraping botnet. Show notes
…
continue reading

1
SN 1033: Going on the Offensive - The Digital Arms Race
3:04:57
3:04:57
Play later
Play later
Lists
Like
Liked
3:04:57Another Israeli spyware vendor surfaces. Win11 to delete restore points more quickly. The EU accelerates its plans to abandon Microsoft Azure. The EU sets timelines for Post-Quantum crypto adoption. Russia to create a massive IMEI database. Canada and the UK create the "Common Good Cyber Fund". U.S. states crack down on Bitcoin ATMs amid growing sc…
…
continue reading

51
SN 1033: Going on the Offensive - The Digital Arms Race
3:04:57
3:04:57
Play later
Play later
Lists
Like
Liked
3:04:57Another Israeli spyware vendor surfaces. Win11 to delete restore points more quickly. The EU accelerates its plans to abandon Microsoft Azure. The EU sets timelines for Post-Quantum crypto adoption. Russia to create a massive IMEI database. Canada and the UK create the "Common Good Cyber Fund". U.S. states crack down on Bitcoin ATMs amid growing sc…
…
continue reading

1
Mastering Cyber. Malicious Chatbot Risks. Alissa “Dr Jay” Abdullah, Deputy CSO, Mastercard.
1:33
1:33
Play later
Play later
Lists
Like
Liked
1:33Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/…
…
continue reading

1
Ep 91: The Engineers React to Breach News
45:27
45:27
Play later
Play later
Lists
Like
Liked
45:27Got a question or comment? Message us here! In this episode, our security engineers break down the latest cybersecurity headlines, from the real scoop behind the “16 billion password” leak to the rise of hacker groups like Scattered Spider. 🕷️ We discuss how attackers bypass MFA, why exploited data keeps resurfacing, and what organizations can do t…
…
continue reading

1
Cybercrime Wire For Jul. 8, 2025. Cyberattack Disrupts Russian Drones. WCYB Digital Radio.
1:24
1:24
Play later
Play later
Lists
Like
Liked
1:24The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading