Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Understanding Cyber Podcasts

show episodes
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Artwork

1
C.S. Cyber

Shawn Waldman and Chad Robinson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
  continue reading
 
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
  continue reading
 
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
  continue reading
 
Artwork

1
Cyber Sitrep

Corvus Technologies, Digital Beachhead

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Cyber Sitrep brings you all the latest cybersecurity news, commentary, and threat intelligence. Focused on small to midsize businesses who we feel have been left behind. Hosted by Eric from Corvus Technologies and Mike from Digital Beachhead who bring their unique perspective based on their military and cybersecurity experience. If you want to understand more about how cybersecurity is important to your organization, enjoy funny tales or just want to learn more about the field of cybersecuri ...
  continue reading
 
Artwork

1
CMMC Academy

Armada Cyber Defense LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
  continue reading
 
Artwork

51
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
2 Cyber Chicks

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
  continue reading
 
Artwork
 
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
  continue reading
 
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Girls Talk Cyber

girlstalkcyber

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
  continue reading
 
Artwork

1
The Next Five

FT Partner Studio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Next Five is the FT’s partner-supported podcast, exploring the future of industries through expert insights and thought-provoking discussions with host Tom Parker. Each episode brings together leading voices to analyse the trends, innovations, challenges and opportunities shaping the next five years in business, technology, health and lifestyle This content is paid for by advertisers and is produced in partnership with the Financial Times’ Commercial Department Hosted on Acast. See acast ...
  continue reading
 
Artwork

1
Lost In Cyberia

Lost In Cyberia

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
This is your guide to navigating the ever-evolving world of cybersecurity. Hosted by Annie-Mei Forster and Anika Guenov, this podcast breaks down complex topics into relatable, easy-to-understand conversations. Whether you're a tech enthusiast, a curious newcomer, or a professional looking for fresh perspectives, join us as we explore cyber threats, digital safety tips, and the human stories behind the screen. Follow us on Instagram @thecybersecuritygals
  continue reading
 
Artwork

1
TechSurge: Deep Tech VC Podcast

Celesta Capital | Deep Tech Venture Capital Firm

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Send feedback and show ideas to [email protected]. Each discussion delves into the intersection of technology advancement, market dynamics, and the founder journey, offe ...
  continue reading
 
Artwork

1
Compact Warfare

Compact Warfare

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to Compact Warfare, the podcast where we explore history's most pivotal battles, military strategies, and key moments of conflict in short bite-sized chunks. From ancient skirmishes and medieval sieges to the modern-day theatres of war, each episode delivers a concise and engaging breakdown of the tactics, innovations, and historical figures that shaped the course of warfare. Perfect for history enthusiasts and curious listeners alike, Compact Warfare makes understanding the complexi ...
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork

1
Cyber Security

SE LABS ®

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The cyber security podcast from SE LABS ® - Understand cyber security and other security issues. Practical and insightful, our experts have experience in attacking and defending in the physical and digital worlds. Peek behind the curtain with Cyber Security DE:CODED.
  continue reading
 
CyberBrief Project is an audio series that breaks down one creative cyber-attack technique in each episode. Rather than covering routine threats, each episode focuses on clever methods that repurpose tools in unexpected ways. Voiced by AI instructors, the series is designed to help listeners understand how attackers think, what they target, and how to spot threats with greater clarity. This is valuable information for anyone in cybersecurity, especially defenders, and for anyone curious abou ...
  continue reading
 
Artwork
 
Raising Tech is your guide to understanding the role technology plays in your community, where to invest to transform culture, and how to bring your team and residents along the journey. Tune in to explore the latest tech trends, dive into hot topics, and hear from industry experts, community leaders, and innovative vendors shaping the senior living tech landscape. Each episode is packed with practical insights and real-world stories to help you spark change and level up your community’s tec ...
  continue reading
 
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
  continue reading
 
Artwork
 
Cyber Security doesn't have to be a daunting task. Everyone has the right to be more secure and enjoy some privacy while surfing the web. That's where we come in. We will give you simple yet effective ways of staying safe and private online. And we'll do it in a language you'll understand. Learn how to be Cyber Smart because Privacy Matters.
  continue reading
 
Artwork
 
Bi-Weekly Cyber intellgence briefing, each episode includes update regrading some of the latest events happened in the cyber security world. This podcast is meant for people who wants to listen to a short (5 minute) overview about some of the latest events happened lately in the cyber world. The Podcast is not getting into technical details and anyone can understand.
  continue reading
 
Has your antivirus just screamed "Threat Found!" and left you asking, "Now what?!" As a UK small business owner or sole trader, a cyber-attack can feel like a direct threat to your business livelihood, your reputation, and everything you've worked hard for. Don't panic! My Antivirus Says "Threat Found!" – Now What? is your essential Malware Alert First Aid Kit, designed specifically for UK SMEs who need practical, immediate cyber security advice to protect what matters most. This podcast cut ...
  continue reading
 
Artwork
 
The A+ PrepCast is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this podcast breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most—helping you understand, retain, and apply essential IT concepts, from hardware and networking to operating systems, security, troubleshooting, and professional proc ...
  continue reading
 
Artwork

1
Cybersafe with AJ

Allison Cutts (AJ)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
In today's interconnected world, the lines between cybersecurity and safety are more crucial than ever. Join us on "Cyber Safety: The Life-Saving Distinction," where we delve into the critical differences that could protect your digital life and personal well-being. Hosted by cybersecurity enthusiast Allison Cutts (AJ), this podcast explores the nuances of staying secure in a fast-paced digital age. Each episode offers insightful discussions, expert interviews, and practical advice to help y ...
  continue reading
 
Welcome to The Bare Metal Cyber CISSP Prepcast — your essential guide to mastering the CISSP certification. Whether you're just starting your cybersecurity journey or preparing for exam day, this podcast delivers expert insights, practical strategies, and clear explanations to help you succeed. Designed by professionals who’ve walked the path, each episode helps you build confidence, sharpen your skills, and move one step closer to certification success.
  continue reading
 
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
  continue reading
 
Artwork

1
The Bid Picture with Bidemi Ologunde

CHIP STORY Media & Rainmaker Podcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
  continue reading
 
Artwork
 
Disaster Stream is a podcast series that delves into the world of disaster recovery, cybersecurity incidents, and critical problem resolution in major organizations. Hosted by Bill Alderson, the podcast features expert insights, case studies, and interviews with leaders and pioneers in the technology and cybersecurity fields. Each episode shares lessons learned and best practices for crisis management, aiming to help organizations prepare for and respond to disasters effectively. Available i ...
  continue reading
 
The Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the ever-evolving realm of technology and digital innovation. Each episode is a treasure trove of knowledge, focusing on critical areas such as cybersecurity, the intricacies of SEO, and the latest advances in the digital world. Greg's expertise as a technical advisor shines through as he explores the nuances of digital marketing, offering listeners an in-depth understanding of the skills needed to stay ahead in t ...
  continue reading
 
Artwork

1
Cybersecurity

Senthilvel Kumar

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
YASH cyber security solutions are helping global corporations address a plethora of cyber risks proactively and reactively. We help our customers to grow their business securely, we understand your world.
  continue reading
 
Artwork

1
The Cyber Tap

Purdue cyberTAP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join George and Jim from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
imanmeet13 brings you "Cyber Safar" which is an audio version of his daily experience in Hacking & Digital World. It’s FREE to learn here! You don’t have to have a coding bone in yourself to understand technology. Every single successful person out there is a practitioner & has some or the other motivational routine as well. Stay Informative every single day with Cyber Safar when it comes to Technology, Hacking & Motivation. Got doubt? Contact me⤵️ Instagram = https://www.instagram.com/imanm ...
  continue reading
 
Loading …
show series
 
✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/contact-us/ ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @secdefllc for real-time tweets. Follow our CEO Shawn Waldman for his…
  continue reading
 
Explores the critical need for robust communication and safety systems in underground mining environments. It investigates various wireless and wired communication technologies, such as RFID, ZigBee, Wi-Fi, carrier current, leaky feeder systems, and through-the-earth communication, detailing their principles, applications, and limitations within mi…
  continue reading
 
A comprehensive guide for aspiring IT security professionals interested in wireless penetration testing. It covers various wireless attack methodologies, including password attacks, man-in-the-middle attacks, and denial-of-service attacks, often utilizing tools like Kali Linux and Wireshark. The text also provides essential information on counterme…
  continue reading
 
We're now halfway through the UN-designated "Ocean Decade" — new research initiatives have been launched, and global cooperation has been strengthened as scientists work to learn more about our oceans and to harness their potential in the fight against adverse climate change. But there are still questions to be answered: How firm are the commitment…
  continue reading
 
Send us a text This week on Secure Insights, The Day Quantum Breaks Bitcoin; It’s making headlines and beginning to shape the future of technology. On this episode of the P11 Podcast, James sits down with Conor, Co-Founder & VP of Engineering at Project 11, to unpack what quantum really is, why it could disrupt cryptography, and how it presents bot…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The digital world has opened up unprecedented opportunities for scammers,…
  continue reading
 
Send Bidemi a Text Message! In this episode, host Bidemi Ologunde spoke with Melinda Nevala, a digital privacy advocate and the Marketing Director at Medcurity. The conversation touched on America’s patchwork of state privacy laws, spotlighting loopholes big tech quietly lobbied for, AI’s still-unplugged data vacuum, and the dark-pattern consent po…
  continue reading
 
Discover how we can assist you in identifying and closing gaps in your IT strategy to help keep your business safe, scalable, and secure. https://www.onestepsecureit.com/beyond-cyber-contact#beyond-cyber-contact-form In this episode, Scott Kreisberg and CISSP Tim Derrickson break down: Why many SMBs remain below the poverty line—even after buying e…
  continue reading
 
Provides comprehensive guidance on identifying, preventing, and removing malware from Windows PCs and networks. It details various types of malware, such as viruses, worms, ransomware, and rootkits, and explores their infection methods and impacts. The text also covers Microsoft's built-in security features like Windows Defender, SmartScreen, User …
  continue reading
 
A comprehensive guide for interacting with and automating tasks within the PowerShell environment. It offers practical "recipes" and solutions for a wide array of administrative challenges, ranging from "The Windows PowerShell Interactive Shell" and "Variables and Objects" to "Files and Directories," "Remoting," and "Workflows." The book covers fun…
  continue reading
 
The term polycrisis has been gaining traction in recent times as the world faces one disaster after another that are all interlinked. The far-reaching implications of a world at risk means boardrooms must remain agile to navigate their businesses past the rocks and into calmer seas. In a break away from our normal format, we've created our own boar…
  continue reading
 
The release of the 48 CFR rule transforms CMMC from policy guidance into enforceable contracting law. Once published (likely in Q4 2025), CMMC certification will be a non-negotiable requirement for DoD contracts—especially those involving FCI or CUI. Given the typical certification timelines and capacity constraints, defense contractors and subcont…
  continue reading
 
In this episode of the Disaster.Stream Podcast, host Bill Alderson takes you inside one of the most critical — and least understood — battles of the Iraq and Afghanistan wars: the fight to keep U.S. military biometric intelligence systems running in the middle of the digital war. Bill recounts how he was called by Army G2 at the Pentagon and deploy…
  continue reading
 
In this episode of the Disaster.Stream Podcast, host Bill Alderson sits down with Bill Genovese, CIO Executive Advisor at Kyndryl, to explore one of the most high-stakes failures in modern banking: a nationwide ATM outage during a holiday weekend. Drawing from decades of global experience with IBM, Kyndryl, and Big Four consulting, Genovese shares …
  continue reading
 
Disaster.Stream takes you inside the world of high-stakes cyber incidents and recovery operations, where seconds matter and lessons shape the future. Hosted by veteran network forensics expert Bill Alderson, this show unpacks the anatomy of disasters—from stock market outages to military communications failures—revealing what really happened, how t…
  continue reading
 
In this special interview, I sit down with Radia Perlman — the visionary computer scientist and inventor of the Spanning Tree Protocol (STP), often called the “Mother of the Internet.” Her groundbreaking work made modern Ethernet and switching possible, shaping the way every network operates today. Radia shares her journey as a pioneer in networkin…
  continue reading
 
On September 11, 2001, the Pentagon was left crippled by fire, water damage, and destroyed infrastructure after the terrorist attack. Days later, armed guards escorted my team and me into the still-smoldering building to restore critical communications for the U.S. Department of Defense. In this episode, I share that story firsthand — what it was l…
  continue reading
 
The Seven Years’ War was one of the most wide-reaching and consequential conflicts in history. Fought from 1756 to 1763, it spanned five continents and involved the world's greatest powers of the time. From the muddy battlefields of Europe to the dense forests of North America, and from the trade routes of West Africa to the ports of India and the …
  continue reading
 
Serves as an in-depth resource for aspiring and current System Administrators. It covers foundational Linux concepts, from its historical origins and philosophical underpinnings to practical skills like installing and configuring the operating system, managing files, and navigating the command line. The book emphasizes troubleshooting techniques an…
  continue reading
 
Provides detailed instructions and practical recipes for creating stunning visual effects in Unity projects using shaders. The book covers fundamental concepts such as diffuse and specular shading, transparency techniques (including alpha blending and cutoff shaders), and vertex manipulation for advanced effects like terrain blending and animation.…
  continue reading
 
Alarm bells are ringing over a supposed browser zero-day, but is the threat as bad as it sounds? Steve reveals why "clickjacking" might be more whac-a-mole than breaking news, and what that really means for your passwords. • Germany may soon outlaw ad blockers • What's happening in the courts over AI • The U.K. drops its demands of Apple • New Micr…
  continue reading
 
Alarm bells are ringing over a supposed browser zero-day, but is the threat as bad as it sounds? Steve reveals why "clickjacking" might be more whac-a-mole than breaking news, and what that really means for your passwords. • Germany may soon outlaw ad blockers • What's happening in the courts over AI • The U.K. drops its demands of Apple • New Micr…
  continue reading
 
A comprehensive guide to understanding and implementing generative artificial intelligence (AI). It explores key concepts and practical applications of large language models (LLMs), Stable Diffusion, and other next-generation AI technologies using Python and the PyTorch library. The text covers foundational topics such as neural networks, transform…
  continue reading
 
A comprehensive guide to building, improving, and managing conversational AI solutions, ranging from traditional intent-based chatbots to those leveraging generative AI and Retrieval-Augmented Generation (RAG). Key themes include measuring and enhancing chatbot understanding, streamlining complex dialogue flows for improved user experience, and str…
  continue reading
 
Hosts Annie-Mei and Anika unpack social engineering or “human hacking”, with insights from books by Chris Hadnagy and Kevin Mitnick. They break down the attack lifecycle, common tactics (phishing, pretexting, tailgating, quid pro quo), and how AI is supercharging scams, then share practical defences: pause-and-verify, reduce digital footprints, and…
  continue reading
 
Everyone may get elaborate revenge fantasies but few follow through due to the bad outweighing the satisfaction. One man, sensing he was to be terminated soon, however, decided if he were to go he would try to take the whole company down with him. Last week he was sentenced to 4 years in prison. Sources: https://pastebin.com/Pi0YSFUt…
  continue reading
 
Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Bobby Knost. Bobby is a proud memb…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Network security is the cornerstone of modern cybersecurity, and understa…
  continue reading
 
"Send me a quick text" Episode Description XWorm 6.0 adds a hostile twist to persistence. Delivered via obfuscated VBScript, it bypasses AMSI, runs entirely in memory, and marks itself as a “critical process” that crashes your PC if you try to kill it. In this episode, we walk through the attack from delivery to defense — and why it works so well. …
  continue reading
 
providing an in-depth guide for configuring and managing FortiGate units. It presents various configuration commands, outlining their parameters, descriptions, types, sizes, and default values for numerous features. The document covers a broad spectrum of functionalities including network settings, security policies (firewall, antivirus, DLP, IPS),…
  continue reading
 
Provides an extensive overview of file system forensics, primarily focusing on the technical aspects of analyzing various file systems common in digital investigations. It introduces Linux as a forensic platform, detailing its open-source advantages and essential commands for digital forensics. The text then explores the structure and analysis of d…
  continue reading
 
Send us a text In this episode, we delve into the transformative journey of artificial intelligence and its profound impact on job markets worldwide. From automation to innovation, AI is reshaping industries, creating new opportunities, and challenging traditional employment paradigms. Join us as we explore how AI is redefining work, the skills nee…
  continue reading
 
Serves as an official certification guide for the Cisco CCNP Enterprise Design ENSLD 300-420 exam, offering an in-depth exploration of network design principles. It covers foundational concepts like IPv4 and IPv6 addressing schemes, including subnetting, NAT, and address assignment strategies, alongside routing protocols such as EIGRP, OSPF, and BG…
  continue reading
 
A comprehensive guide to creating, maintaining, and publishing static websites for free using Publii CMS and GitHub Pages. It covers everything from initial setup, including email accounts and GitHub repositories, to advanced topics like search engine optimization (SEO), custom domain names, and plugins. Readers will learn to build different websit…
  continue reading
 
A comprehensive overview of designing large language model applications, praised for its synthesis of advanced AI methods and practical applications. It explores fundamental concepts like prompting, fine-tuning, and reasoning, emphasizing how LLMs behave in practice through hands-on exercises and numerous research paper references. The text examine…
  continue reading
 
A comprehensive guide for creating user-friendly and aesthetically pleasing websites and applications. Authored by Adrian Twarog and George Moller, the book systematically covers fundamental design principles, beginning with color theory, typography, and component design. It then progresses to visual hierarchy, explaining how elements like size, te…
  continue reading
 
Explores the multifaceted application of Large Language Models (LLMs) in data analysis. It covers analyzing various data types, including text, structured data (tables and graphs), images, and audio, often detailing how LLMs, like OpenAI's GPT models, can be used either directly on data or indirectly by generating code for external tools. The sourc…
  continue reading
 
A comprehensive guide to data structures and algorithms using C++. It begins with foundational concepts, differentiating between data structures and algorithms, and discussing their efficiency and interplay. The text then systematically explores various core data structures, including arrays, linked lists, stacks, queues, hash tables, and trees (su…
  continue reading
 
Humans have an evolutionary bias toward seeking convenience, experts say. But what happens when the desire for convenience becomes a dominant social and economic expectation? Future Tense explores the hidden costs of convenience for the environment and the economy. Making things too easy can in fact be bad for you. Guests Alison Angus — Head of Pra…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A catastrophic data loss incident involving South Yorkshire Police serves …
  continue reading
 
Send us a text This week on Secure Insights, our host Rosie sits down with David, VP of Marketing at Tuskira, to uncover the story behind the company from its founding mission to tackling alert fatigue to making AI a trusted, dependable teammate. Discover how Tuskira is transforming security operations and get a sneak peek at the future of smarter,…
  continue reading
 
In this episode of Raising Tech, host Matt Reiners talks with the legendary Kitboga, a cybersecurity crusader and content creator known for baiting and exposing online scammers. With over 3.74 million YouTube subscribers and more than a billion views across platforms, Kitboga shares how he transforms tech knowledge into entertaining education. From…
  continue reading
 
Send Bidemi a Text Message! In this episode, host Bidemi Ologunde analyzed the company Palantir Technologies, an American publicly traded company specializing in software platforms for data mining. The analysis focused on the enabling conditions that predate its founding, the company’s growth across historical and societal contexts, its financial t…
  continue reading
 
My Antivirus Says 'Threat Found'. Now What? (Part 3) - When 'Cleaned' Isn't Clean: The Red Flags That Demand a Malware Investigation Episode Summary: In the final installment of this series, host Sarah and cybersecurity expert Patrick move beyond the initial antivirus alert and first aid steps. They explore the critical red flags that indicate an A…
  continue reading
 
Provides an extensive overview of data science, encompassing its core concepts, methodologies, and practical applications within organizations. It explores the data analysis lifecycle, from problem definition and data sourcing to preparation, model selection, and evaluation. The text emphasizes the importance of understanding data properties, stati…
  continue reading
 
Designed for both beginners and seasoned professionals in the field. It covers fundamental concepts such as IP addressing, network hardware, and basic security, building a solid foundation for new learners. The text then transitions to more advanced topics, including enterprise-level security, network automation, cloud integration, and disaster rec…
  continue reading
 
What does it really take to move from a GenAI prototype to a production-ready system? In this episode, AWS AI Engineering Specialist Dennis Traub breaks down the hard truths behind scaling, securing, and monitoring AI systems — and why the future belongs to startups who learn how to productionize AI fast. What You’ll Learn in This Episode: Why most…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play