As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
…
continue reading
Think Cyber Secure Podcasts
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Selva Kumar is SAP Career Trainer specializing in SAP Career Coaching, identifying skills for getting a Job. You can reach me @ 302 494 9476 or Email: [email protected] Download Free SAP GRC Guide. http://expressgrc.com/sap-grc-10-1-step-step-guide/
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Award-winning info about Canadian privacy and tech law from Canadian privacy lawyer David Fraser. Seriously, I won a Canadian Law Blog Award (Clawbie!) in 2023 for the YouTube version of this channel.
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
…
continue reading
Welcome to Smarter Online Safety: Protect, Empower, Transform—your go-to channel for digital security, AI productivity, and digital transformation. As cyber fraud, identity theft, and AI-driven risks grow, Jocelyn King, “The Queen of Online Safety,” is here to help you stay secure and thrive. A Top 10 Woman in Cybersecurity, speaker, and educator, she has been featured on Dr. Phil, prime-time news, international radio, and top podcasts. 💡 What You’ll Learn: ✔️ Protect yourself & your family ...
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. ...
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.
…
continue reading
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
…
continue reading
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
…
continue reading
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
…
continue reading
The brave new world of podcasts, let’s do it.
…
continue reading
A podcast for new programmers and developers. Join CodeNoobs co-creators Danny, Randall, and Russell weekly to explore topics that anyone interested in programming and learning to code will find valuable.
…
continue reading
Author, feminist, gay rights activist and political commentator Margaret Hoover leads a rigorous exchange of ideas with America’s political and cultural newsmakers. In the spirit of William F. Buckley Jr.’s iconic “Firing Line,” Hoover engages with thought leaders on the pivotal issues moving the nation forward. New podcast episodes drop weekly, and sometimes more, featuring bonus content you won’t hear on TV.
…
continue reading
A critical look at new technologies, new approaches and new ways of thinking, from politics to media to environmental sustainability.
…
continue reading
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
…
continue reading
NorthStandard‘s podcast features thought-provoking discussions on news and topics in the maritime industry. We talk with experts from the club and special guests in the field from around the world
…
continue reading
Intel 471's podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, all over a cocktail ...
…
continue reading
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
The Bare Metal Cyber CCISO Audio Course is your complete, executive-level training companion for mastering the Certified Chief Information Security Officer (CCISO) certification. Built for experienced cybersecurity professionals and strategic leaders, this Audio Course delivers over seventy focused episodes covering every domain, concept, and competency area tested on the official EC-Council exam. From governance, risk, and compliance to strategic planning, vendor oversight, and technical co ...
…
continue reading
Discussions over drinks with security, defense, and foreign policy insiders and experts. The original War on the Rocks podcast series.
…
continue reading
For those who are interested in the hottest field in a technology world. Whether you are a professional who wants to learn more about privacy, data protection, or cyber law or someone who just finds this fascinating, we have topics for you from data management to cybersecurity to social justice and data ethics and AI. In-depth information on serious privacy topics. This podcast, hosted by Dr. K Royal, Paul Breitbarth and Ralph O'Brien, features open, unscripted discussions with global privac ...
…
continue reading
The Hack Podcast, straight-talk smart tech. Leon McQuade, Paul Longely and Dean Bulfeild bring a leader’s eye over technology drivers shaping the world back to East Yorkshire. We now live in a dazzling world of screens that continues to revolutionise how we live, work and play. The futures arriving faster than ever before, it's time to Think Different. We talk transformation and change focusing on People, Process and Technology. Originally Inspired By Pete Lindsay and Mark Bawden's Book “Pig ...
…
continue reading
The Tech Leaders Podcast brings you candid conversations with established technology leaders, at some of the world's most incredible organisations. From the challenges of sustainable growth, through to continuous innovation and everything in-between. These are the behind-the-scenes stories and personal anecdotes of inspirational leaders at the forefront of the digital revolution.
…
continue reading
Joshua J Sheats, MSFS, CFP, CLU, ChFC, CASL, CAP, RHU, REBC is a financial planner who teaches people how to live a rich life now while building a plan for financial freedom in 10 years or less. He mixes creative approaches to lifestyle design, deep-dive financial planning techniques, and hard-core business strategy to equip you with the knowledge and inspiration you need to build financial independence.
…
continue reading
Just Lookin’ Out is the first podcast from online safety advocate Kalie Nitzsche who was inspired to create this show after being spectacularly duped by a guy she met on the dating apps. It’s a safe place to share, relate, commiserate, and get practical tips about how to survive this fast-paced digital first world. How do we protect ourselves from a scam? What good or bad traits should we be on the lookout for if we're meeting people for the first time online? How can Kalie and her guests he ...
…
continue reading
When the threats are real and the stakes are high — what actually works? Right now, as you're reading this, someone's watching your family, your business rivals are digging through your digital history, and a disgruntled employee knows exactly where your vulnerabilities are. While you're focused on your day job, they're building a plan. This podcast exists because ignoring threats doesn't make them disappear. I'm Philip Grindell — former Scotland Yard detective, behavioural threat specialist ...
…
continue reading
Wait Just an Infosec is a weekly hour-long cybersecurity-focused broadcast produced by SANS Institute, streamed live on LinkedIn and YouTube, Tuesdays at 10am ET and available to listen to in podcast format on Wednesdays. Our hosts and invited guests are a rotating lineup of SANS faculty members and experts across all infosec domains – some of the brightest minds in cybersecurity, with decades of experience as practitioners. Each week will offer thought-provoking, rich content for a full ran ...
…
continue reading
Army Chief Technology Officer Alex Miller joined Ryan at a live event to talk about what countering improvised explosive devices taught him about defeating drones, what the Army is learning from the southern border about emerging threats, and what he wants to see from industry. He makes the case for deeper collaboration between companies, sharper f…
…
continue reading
1
From GenAI Prompts to OAuth Phishing: The Hidden Browser Risks - with Tommy Perniciaro
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20Episode Summary Recorded live at HOU.SEC.CON, The Professional CISO Show welcomes Tommy Perniciaro, Director of Solutions Architecture at LayerX, to explore why the browser has become the least-instrumented layer in the modern security stack — and how CISOs can finally gain visibility and control over it. David and Tommy discuss everything from mal…
…
continue reading
A comprehensive overview of fundamental networking concepts. It introduces various network components like RAM, NICs, hubs, switches, and routers, explaining their functions and interactions within a network. The material also details network topologies, including bus, ring, and star, alongside logical and physical implementations. A significant po…
…
continue reading
1
Inside Offensive AI: From MCP Servers To Real Security Risks
1:06:01
1:06:01
Play later
Play later
Lists
Like
Liked
1:06:01Send us a text Security gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defenders are using language models today, where they fall apart, and how to build guardrails that hold up under pressure. From MCP servers that look a lot …
…
continue reading
1
From GSM to LTE-Advanced Pro and 5G: An Introduction to Mobile Networks and Mobile Broadband
19:26
19:26
Play later
Play later
Lists
Like
Liked
19:26A comprehensive exploration of mobile network technologies, detailing the evolution from GSM and UMTS to LTE and 5G New Radio. It outlines the intricate architecture, protocols, and operational procedures that underpin these wireless communication systems, including channel structures, mobility management, and call establishment. Furthermore, the t…
…
continue reading
1
Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders
26:38
26:38
Play later
Play later
Lists
Like
Liked
26:38Provides an extensive overview of modern cybersecurity strategies, emphasizing the evolving role of the Chief Information Security Officer (CISO) from a technical expert to a strategic business leader. It covers critical aspects such as building a culture of security, managing diverse threat actors (nation-states, cybercriminals, hacktivists, and i…
…
continue reading
1
Andrew Cuomo on his mayoral run, Mamdani’s ideas, and taking on Trump
45:52
45:52
Play later
Play later
Lists
Like
Liked
45:52Former New York Governor Andrew Cuomo discusses the New York City mayoral race, his policy proposals, and the danger he sees in electing his opponent, democratic socialist Zohran Mamdani. With Election Day approaching, Cuomo lays out his potential path to victory and challenges Mamdani’s plans to address affordability concerns. He also comments on …
…
continue reading
1
1113-Friday Q&A: Lower Tax Bill For This Year, Why Do Family Planning Before Financial Planning
1:21:09
1:21:09
Play later
Play later
Lists
Like
Liked
1:21:09On today's live Q&A we discuss: 1:00 I made a bunch more money this year; how do I lower my tax bill? 28:07 Why should I do family planning before I do financial planning? If you'd like to join me on next week's Q&A show, join here: https://patreon.com/radicalpersonalfinance Enjoy! Joshua
…
continue reading
We open with a sobering follow-up: the future is less about AI toast (though Red Dwarf predicted it) and more about a soul-stripping "infrastructure of meaningless" after an AWS outage proved how fragile the internet is. Corporate overlords, like Elon Musk, are taking note: he finally addressed Starlink's use by Asian scam syndicates, but his atten…
…
continue reading
1
The Safer Habit: That Protects You Online
16:54
16:54
Play later
Play later
Lists
Like
Liked
16:54Ever clicked a link or answered a text without thinking twice? 🛑 This episode dives deep into how a simple method — SAFER (Stop, Assess, Fact-check, Execute, Reinforce) — can protect you from scams, phishing, and costly online mistakes. Just like “Stop, Drop, and Roll” helps you stay safe in a fire, SAFER is your digital safety reflex every time yo…
…
continue reading
1
What’s Behind Trump’s Expansionist Instincts?
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35How can history help make sense of U.S. President Donald Trump’s foreign policy? Pulitzer Prize-winning author and historian Greg Grandin shares how Trump’s imperialist impulses may be inspired by the country’s Founding Fathers, and that he “rummages around the trash bag of history to find what’s useful at any given moment.” Plus, Ravi’s One Thing …
…
continue reading
1
Secure Access Service Edge (SASE) For Dummies
14:40
14:40
Play later
Play later
Lists
Like
Liked
14:40Serves as an in-depth guide to Secure Access Service Edge (SASE). It explores the evolution of network security from traditional WANs to modern, cloud-centric architectures, emphasizing the need for SASE in today's distributed and dynamic enterprise environments. The source details SASE's foundational components, including SD-WAN, various security …
…
continue reading
1
Getting up to speed with autonomous vehicles
29:07
29:07
Play later
Play later
Lists
Like
Liked
29:07Long before AI dominated the media hype-cycle, self-driving cars surfed the hyperbolic wave. But fully automated vehicles have now been a long time in development, long enough that we've decided it's time for an update. So, how advanced is the technology and where is the demand? We also find out about consumer attitudes toward the "driver-assist" t…
…
continue reading
1
The Tash Dash: a mini marathon on data protection
42:34
42:34
Play later
Play later
Lists
Like
Liked
42:34Send us a text On this week of Serious Privacy, Dr. K Royal connects with Tash Whitaker to cover all things top of mind in data protection. Paul Breitbarth and Ralph O'Brien were out, so Tash and K hit the microphone unfettered! Join us as we discuss DSARs, AI, and more - in the run up to the Privacy Space in London in less than a month away. If yo…
…
continue reading
1
Machine Learning for High-Risk Applications: Approaches to Responsible AI
30:48
30:48
Play later
Play later
Lists
Like
Liked
30:48A field guide for designing, building, and assessing machine learning and AI systems. The book addresses the risks of AI failures, such as algorithmic discrimination and data privacy violations, which have become more common with wider adoption of ML technologies. It outlines a holistic approach to risk mitigation, combining technical practices, bu…
…
continue reading
1
CR113: Bridging the digital skills gap in a complex world with Mike Nayler, AWS
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14The skills we teach today will decide the world we live in tomorrow but the digital skills gap is something we've been dealing with for decades, but it’s growing faster than ever, it starts with kids and stretches all the way into late IT careers, and now we're finally taking a more connected, lifelong approach to closing it. This week, Dave, Esmee…
…
continue reading
1
RondoDox Botnet Expansion: The Shotgun Approach to IoT Exploitation
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19Got a question or comment? Message us here! This week on the #SOCBrief, Andrew breaks down RondoDox, a rapidly growing botnet campaign taking aim at routers, DVRs, and IoT devices worldwide. With over 50 vulnerabilities across 30+ vendors, this “shotgun” exploitation strategy is fueling massive DDoS and crypto-mining attacks. Support the show Watch…
…
continue reading
1
Automate to Defend: A Former FBI Agent's Ransomware Guide for CISOs
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08Resources: https://linktr.ee/ReliaQuestShadowTalk Wondering what makes ransomware operations successful? Join host Kim along with intelligence analyst John & former FBI Special Agent Keith Mularski as they discuss: Year-Long F5 Breach (2:42) North Korean Attacker Adopts EtherHiding (7:53) Phishing Attacks Target LastPass (12:11) Fighting Ransomware…
…
continue reading
*Threat Hunting Management Workshop: The Business Value of Threat Hunting October 29, 2025 | 12:00 - 12:30 PM ET Sign Up: https://www.intel471.com/resources/webinars/threat-hunting-management-workshop-the-business-value-of-threat-hunting *[LIVE] Out of the Woods: The Threat Hunting Podcast – Guess Who Edition November 19, 2025 | 12:00 - 1:30 PM ET …
…
continue reading
1
Reinventing ITIL in the Age of DevOps: Innovative Techniques to Make Processes Agile and Relevant
25:06
25:06
Play later
Play later
Lists
Like
Liked
25:06Explores the integration of ITIL (Information Technology Infrastructure Library) principles with DevOps methodologies, offering innovative techniques for their combined application. It provides an in-depth look at ITIL's foundational concepts, including service lifecycle phases like strategy, design, transition, and operation, alongside essential p…
…
continue reading
1
1112-Building Joshua's Great House, Step by Step: Interview with Gregory Treat
1:14:56
1:14:56
Play later
Play later
Lists
Like
Liked
1:14:56On today's show, listen in as attorney Gregory Treat coaches Joshua in the building blocks of a Great House. Greg Treat's website: https://avaloncircle.com
…
continue reading
1
Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34An introductory guide to cybersecurity and ethical hacking using Python. It covers fundamental concepts such as network basics, the CIA triad (Confidentiality, Integrity, and Availability), and different types of hackers, including black hat, white hat, and script kiddies. The book outlines the phases and methodologies of hacking, from reconnaissan…
…
continue reading
1
The pattern is full with this week in privacy
41:17
41:17
Play later
Play later
Lists
Like
Liked
41:17Send us a text On this episode of Serious Privacy, hosts Paul Breitbarth, Ralph O'Brien, and Dr. K Royal bring you a full week in privacy and data protection featuring new laws, new decisions, and new enforcement. We span from Pay to Play, to children's privacy, to California's Frontie AI - tune in... it's a hot one! If you have comments or questio…
…
continue reading
1
From Fan to Influencer with Special Guest, NYM News’s, Jaron Kiviat
1:06:09
1:06:09
Play later
Play later
Lists
Like
Liked
1:06:09Send us a text In this week’s episode, Jaron walks Kalie through how he built a sports media brand from the roots of his teenage Mets fan account. How he went from a kid looking for a place to cheer on his favorite players and react to team decisions to becoming a creator going viral for his new media takes on a storied franchise. Follow his ups an…
…
continue reading
1
Opportunistic Networks: Fundamentals, Applications and Emerging Trends
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20Explores various facets of opportunistic networks (OppNets), which are dynamic, infrastructure-less wireless networks leveraging mobile device interactions for data transfer, often via a "store-carry-forward" mechanism. It details different routing protocols, categorizing them by approaches like replication-based (e.g., Epidemic, Spray and Wait), s…
…
continue reading
1
What If AI Took Over Your Data Security Tomorrow?
50:37
50:37
Play later
Play later
Lists
Like
Liked
50:37Send us a text In this episode, Joe sits down with Gidi Cohen, a cybersecurity expert with a rich background in the Israeli 8200 unit, to explore the evolving landscape of data security. They delve into the challenges of managing large data sets, the impact of AI on cybersecurity, and the innovative solutions offered by Bonfy AI. Whether you're a s…
…
continue reading
1
Canada’s Privacy Regulators vs. TikTok: A critical overview
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54In this episode, Canadian privacy lawyer David Fraser breaks down the joint investigation by Canada’s federal and provincial privacy commissioners into TikTok — an interesting, complex and consequential privacy finding. The report tackles three major issues: whether TikTok’s data practices (especially with respect to young users who circumvent age-…
…
continue reading
1
Open Source Security: Your Network More Secure With Open Source Tools
16:37
16:37
Play later
Play later
Lists
Like
Liked
16:37A comprehensive guide to enhancing network security using open-source tools. It begins by emphasizing the importance of strong password management and multi-factor authentication, before moving into detailed discussions of firewall configuration for network perimeter defense. The text then explores Host Intrusion Detection Systems (HIDS) for server…
…
continue reading
Explores the multifaceted field of network science, detailing various network types such as social, biological, and technological systems like the Internet and telephone networks. It examines fundamental network properties including paths, connectivity, and the small-world effect, alongside different mathematical representations of networks. The so…
…
continue reading
This week, Guest Host Donovan Adkisson joins Jason DeFilippo to wade through the usual tech chaos; California is attempting to regulate the inevitable AI companion chatbots, which is timely, considering ChatGPT is about to launch erotica (with age verification, natch). Turns out, most of the world is less stoked about our algorithmic future than Si…
…
continue reading
1
Anthony Kennedy: Democracy would be in danger if a president defies the Supreme Court
48:57
48:57
Play later
Play later
Lists
Like
Liked
48:57Justice Anthony Kennedy talks to Margaret Hoover about his three decades on the Supreme Court and the threats he sees to American democracy today. As the court begins a new term, Kennedy, who took senior status in 2018, discusses the relationship between the Supreme Court and the executive branch and the prospect of a president defying the court’s …
…
continue reading
With the cease-fire more than a week old, Palestinians now turn to what comes next: rebuilding and governing. Former spokesperson for the Palestine Liberation Organization Diana Buttu sits down with Ravi Agrawal to share her perspective. Plus, Ravi’s One Thing on the Trump administration’s moves on Venezuela. Diana Buttu: A ‘magic pill’ made Israel…
…
continue reading
1
5 Biggest Lies You Believe About Cybersecurity (That Hackers Love!)
13:25
13:25
Play later
Play later
Lists
Like
Liked
13:25Think you’re not important enough to be hacked? Or that good security is too expensive? In this episode of The Smarter Online Safety Podcast, host Jocelyn King breaks down the 5 biggest lies people tell themselves about cybersecurity — and how those lies are leaving millions vulnerable to AI-powered hackers. From “I have nothing worth stealing” to …
…
continue reading
1
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
32:30
32:30
Play later
Play later
Lists
Like
Liked
32:30Explores various facets of network security and performance, providing practical guidance for hardening systems and optimizing network elements. It covers topics such as client and server security configurations, including detailed steps for Windows and Linux environments, and the benefits of virtualization for disaster recovery and elastic perform…
…
continue reading
51
Technology and language — a dynamic relationship
29:07
29:07
Play later
Play later
Lists
Like
Liked
29:07While technology platforms increasingly dictate the way we write and converse, language is being modified to fight back, to subvert the platforms. In this show we examine the growth of "algospeak". And if you want to know how we'll all be communicating in the future, just listen to the way teenage girls speak, because young women lead the ongoing d…
…
continue reading
1
Mastering Tableau 2021: Implement advanced business intelligence techniques and analytics with Tableau
16:45
16:45
Play later
Play later
Lists
Like
Liked
16:45An extensive guide to Mastering Tableau, a prominent business intelligence tool, focusing on its advanced features for data analysis and visualization. It covers best practices for visual design, including formatting, color usage, and reducing clutter to create impactful data stories. Readers will learn about data preparation and handling using Tab…
…
continue reading
1
CRSP06: State of AI 2025 pt.1 - Evolving role of AI across industries with Craig Suckling [AAA]
53:26
53:26
Play later
Play later
Lists
Like
Liked
53:26In 'Access All Areas' shows we go behind the scenes with the crew and their friends as they dive into complex challenges that organisations face—sometimes getting a little messy along the way. We’re launching a special AI mini-series exploring how artificial intelligence is reshaping industries. Each episode dives into key themes like scaling AI, s…
…
continue reading
1
Obscura Ransomware: Unmasking a Stealthy New Threat ⚠️
12:25
12:25
Play later
Play later
Lists
Like
Liked
12:25Got a question or comment? Message us here! In this week’s #SOCBrief, Hickman and Peters break down Obscura ... a new ransomware variant making waves with aggressive evasion tactics, process terminations, and domain controller targeting. We cover what’s known so far, the risks it poses to businesses, and the key defenses every SOC should prioritize…
…
continue reading
1
Is Your Software a Secret Backdoor? Flax Typhoon's Latest Campaign Unwrapped
22:21
22:21
Play later
Play later
Lists
Like
Liked
22:21Resources: https://linktr.ee/ReliaQuestShadowTalk How long could Flax Typhoon nestle silently in your networks? Join host Kim along with intelligence analysts John & Joey as they discuss: Velociraptor Abused in Ransomware Attacks (1:13) New Oracle E-business Suite Flaw (5:19) GitHub CamoLeak AI Attack (7:46) Year-Long Flax Typhoon ArcGIS Campaign (…
…
continue reading
1
Holding Ground: Ukraine, Russia, and the Politics of Persistence
37:33
37:33
Play later
Play later
Lists
Like
Liked
37:33Michael Kofman and Dara Massicot join Ryan to discuss the state of the front, how Ukraine and Russia are staying in the fight, the possible provision of Tomahawk Land Attack Missiles, contingencies expected and unexpected, the failures of Russian diplomacy, and what the most important developments of the year so far have been.…
…
continue reading
1
Magic, Mentalism, and the Modern CISO – with Gary Chan
44:22
44:22
Play later
Play later
Lists
Like
Liked
44:22Episode Summary In this episode, host David Malicoat sits down in St. Louis, Missouri with Gary Chan, Chief Information Security Officer at SSM Health — and a professional Security Mentalist. Gary blends his background in cybersecurity, engineering, and mentalism to bring a refreshingly human and creative approach to leadership, awareness, and infl…
…
continue reading
1
MCSA Guide to Installation, Storage, and Compute with Microsoft Windows Server 2016, Exam 70-740 (Networking)
27:15
27:15
Play later
Play later
Lists
Like
Liked
27:15Detailing its installation, configuration, and management for various IT infrastructure needs. It covers fundamental concepts like server roles, disk management, networking protocols, and PowerShell cmdlets for administration. The text also thoroughly explores advanced topics such as virtualization with Hyper-V, including virtual disks, networks, a…
…
continue reading
*Threat Hunting Management Workshop: The Business Value of Threat Hunting October 29, 2025 | 12:00 - 12:30 PM ET Sign Up: https://www.intel471.com/resources/webinars/threat-hunting-management-workshop-the-business-value-of-threat-hunting ---------- Top Headlines: Cisco Talos | Velociraptor Leveraged in Ransomware Attacks: https://blog.talosintellig…
…
continue reading
1
Mastering Power BI: Build Business Intelligence Applications Powered with DAX Calculations, Insightful Visualizations, Advanced BI Technique
37:00
37:00
Play later
Play later
Lists
Like
Liked
37:00An introduction to Power BI, outlining its use in business intelligence applications. It covers fundamental concepts like data modeling, DAX calculations, and various visualization types such as bar, line, waterfall, scatter, donut, treemap, and map charts. The text also explains how to connect and shape data from diverse sources using Power Query …
…
continue reading
1
Top SAP Security Threat Hunting Strategies Used by Elite Researchers
52:48
52:48
Play later
Play later
Lists
Like
Liked
52:48Send us a text A curiosity-fueled career moves from Atari and BBS days to leading research on a live SAP zero-day, with candid lessons on people skills, breaking into security, and holding the line when pressure spikes. We unpack how a benign SAP endpoint became an RCE chain and what it takes to defend complex systems at scale. • early path from Co…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
1
The Human Operating System: A New Way to Think About Cyber Risk with Kate Goldman
40:42
40:42
Play later
Play later
Lists
Like
Liked
40:42Episode Summary In this episode, David Malicoat sits down with Kate Goldman, founder and CEO of Cybermaniacs, to challenge one of cybersecurity’s oldest assumptions — that humans are the weakest link. Kate argues it’s time for CISOs to rethink human risk, culture, and resilience in the modern organization. Together, David and Kate explore the emerg…
…
continue reading
1
Mastering Azure Kubernetes Service (AKS): Rapidly Build and Scale Your Containerized Applications with Microsoft Azure Kubernetes Service
24:50
24:50
Play later
Play later
Lists
Like
Liked
24:50A practical resource for developing, deploying, and scaling containerized applications. It covers fundamental concepts like containerization versus virtual machines, Kubernetes architecture, and various Azure container services, alongside advanced topics such as serverless Kubernetes, Windows containers, and integrating with Azure DevOps for contin…
…
continue reading
1
Malware Analysis Using Artificial Intelligence and Deep Learning
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38Discuss artificial intelligence and deep learning techniques applied to malware analysis and detection, as well as other cybersecurity challenges. They cover various neural network architectures like MLPs, CNNs, RNNs, LSTMs, and GANs, and their effectiveness in tasks such as classifying malware families, identifying malicious URLs, and detecting an…
…
continue reading