Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Understanding Cyber Podcasts
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
…
continue reading
Cyber Sitrep brings you all the latest cybersecurity news, commentary, and threat intelligence. Focused on small to midsize businesses who we feel have been left behind. Hosted by Eric from Corvus Technologies and Mike from Digital Beachhead who bring their unique perspective based on their military and cybersecurity experience. If you want to understand more about how cybersecurity is important to your organization, enjoy funny tales or just want to learn more about the field of cybersecuri ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading

51
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
A critical look at new technologies, new approaches and new ways of thinking, from politics to media to environmental sustainability.
…
continue reading
The Next Five is the FT’s partner-supported podcast, exploring the future of industries through expert insights and thought-provoking discussions with host Tom Parker. Each episode brings together leading voices to analyse the trends, innovations, challenges and opportunities shaping the next five years in business, technology, health and lifestyle This content is paid for by advertisers and is produced in partnership with the Financial Times’ Commercial Department Hosted on Acast. See acast ...
…
continue reading
This is your guide to navigating the ever-evolving world of cybersecurity. Hosted by Annie-Mei Forster and Anika Guenov, this podcast breaks down complex topics into relatable, easy-to-understand conversations. Whether you're a tech enthusiast, a curious newcomer, or a professional looking for fresh perspectives, join us as we explore cyber threats, digital safety tips, and the human stories behind the screen. Follow us on Instagram @thecybersecuritygals
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Send feedback and show ideas to [email protected]. Each discussion delves into the intersection of technology advancement, market dynamics, and the founder journey, offe ...
…
continue reading
Welcome to Compact Warfare, the podcast where we explore history's most pivotal battles, military strategies, and key moments of conflict in short bite-sized chunks. From ancient skirmishes and medieval sieges to the modern-day theatres of war, each episode delivers a concise and engaging breakdown of the tactics, innovations, and historical figures that shaped the course of warfare. Perfect for history enthusiasts and curious listeners alike, Compact Warfare makes understanding the complexi ...
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
The cyber security podcast from SE LABS ® - Understand cyber security and other security issues. Practical and insightful, our experts have experience in attacking and defending in the physical and digital worlds. Peek behind the curtain with Cyber Security DE:CODED.
…
continue reading
CyberBrief Project is an audio series that breaks down one creative cyber-attack technique in each episode. Rather than covering routine threats, each episode focuses on clever methods that repurpose tools in unexpected ways. Voiced by AI instructors, the series is designed to help listeners understand how attackers think, what they target, and how to spot threats with greater clarity. This is valuable information for anyone in cybersecurity, especially defenders, and for anyone curious abou ...
…
continue reading
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
…
continue reading
Raising Tech is your guide to understanding the role technology plays in your community, where to invest to transform culture, and how to bring your team and residents along the journey. Tune in to explore the latest tech trends, dive into hot topics, and hear from industry experts, community leaders, and innovative vendors shaping the senior living tech landscape. Each episode is packed with practical insights and real-world stories to help you spark change and level up your community’s tec ...
…
continue reading
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
…
continue reading
Discover the latest technology trends, meet technology enthusiasts, understand what’s behind talked about technological terms and get inspired by our passion for technology.
…
continue reading
Cyber Security doesn't have to be a daunting task. Everyone has the right to be more secure and enjoy some privacy while surfing the web. That's where we come in. We will give you simple yet effective ways of staying safe and private online. And we'll do it in a language you'll understand. Learn how to be Cyber Smart because Privacy Matters.
…
continue reading
Bi-Weekly Cyber intellgence briefing, each episode includes update regrading some of the latest events happened in the cyber security world. This podcast is meant for people who wants to listen to a short (5 minute) overview about some of the latest events happened lately in the cyber world. The Podcast is not getting into technical details and anyone can understand.
…
continue reading
Has your antivirus just screamed "Threat Found!" and left you asking, "Now what?!" As a UK small business owner or sole trader, a cyber-attack can feel like a direct threat to your business livelihood, your reputation, and everything you've worked hard for. Don't panic! My Antivirus Says "Threat Found!" – Now What? is your essential Malware Alert First Aid Kit, designed specifically for UK SMEs who need practical, immediate cyber security advice to protect what matters most. This podcast cut ...
…
continue reading
The A+ PrepCast is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this podcast breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most—helping you understand, retain, and apply essential IT concepts, from hardware and networking to operating systems, security, troubleshooting, and professional proc ...
…
continue reading
In today's interconnected world, the lines between cybersecurity and safety are more crucial than ever. Join us on "Cyber Safety: The Life-Saving Distinction," where we delve into the critical differences that could protect your digital life and personal well-being. Hosted by cybersecurity enthusiast Allison Cutts (AJ), this podcast explores the nuances of staying secure in a fast-paced digital age. Each episode offers insightful discussions, expert interviews, and practical advice to help y ...
…
continue reading
A podcast series aimed at helping Australians deepen their understanding of the local cyber security industry.
…
continue reading
Welcome to The Bare Metal Cyber CISSP Prepcast — your essential guide to mastering the CISSP certification. Whether you're just starting your cybersecurity journey or preparing for exam day, this podcast delivers expert insights, practical strategies, and clear explanations to help you succeed. Designed by professionals who’ve walked the path, each episode helps you build confidence, sharpen your skills, and move one step closer to certification success.
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
…
continue reading
Disaster Stream is a podcast series that delves into the world of disaster recovery, cybersecurity incidents, and critical problem resolution in major organizations. Hosted by Bill Alderson, the podcast features expert insights, case studies, and interviews with leaders and pioneers in the technology and cybersecurity fields. Each episode shares lessons learned and best practices for crisis management, aiming to help organizations prepare for and respond to disasters effectively. Available i ...
…
continue reading
The Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the ever-evolving realm of technology and digital innovation. Each episode is a treasure trove of knowledge, focusing on critical areas such as cybersecurity, the intricacies of SEO, and the latest advances in the digital world. Greg's expertise as a technical advisor shines through as he explores the nuances of digital marketing, offering listeners an in-depth understanding of the skills needed to stay ahead in t ...
…
continue reading
YASH cyber security solutions are helping global corporations address a plethora of cyber risks proactively and reactively. We help our customers to grow their business securely, we understand your world.
…
continue reading
Join George and Jim from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
imanmeet13 brings you "Cyber Safar" which is an audio version of his daily experience in Hacking & Digital World. It’s FREE to learn here! You don’t have to have a coding bone in yourself to understand technology. Every single successful person out there is a practitioner & has some or the other motivational routine as well. Stay Informative every single day with Cyber Safar when it comes to Technology, Hacking & Motivation. Got doubt? Contact me⤵️ Instagram = https://www.instagram.com/imanm ...
…
continue reading

1
Who Must Comply? Understanding 'Political Subdivisions'
4:30
4:30
Play later
Play later
Lists
Like
Liked
4:30✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/contact-us/ ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @secdefllc for real-time tweets. Follow our CEO Shawn Waldman for his…
…
continue reading

1
Wireless Communication in Underground Mines: RFID-based Sensor Networking
22:27
22:27
Play later
Play later
Lists
Like
Liked
22:27Explores the critical need for robust communication and safety systems in underground mining environments. It investigates various wireless and wired communication technologies, such as RFID, ZigBee, Wi-Fi, carrier current, leaky feeder systems, and through-the-earth communication, detailing their principles, applications, and limitations within mi…
…
continue reading

1
Wireless Hacking with Kali Linux: LEARN FAST HOW TO HACK ANY WIRELESS NETWORKS PENETRATION TESTING IMPLEMENTATION GUIDE
26:32
26:32
Play later
Play later
Lists
Like
Liked
26:32A comprehensive guide for aspiring IT security professionals interested in wireless penetration testing. It covers various wireless attack methodologies, including password attacks, man-in-the-middle attacks, and denial-of-service attacks, often utilizing tools like Kali Linux and Wireshark. The text also provides essential information on counterme…
…
continue reading

1
Cooperation, not conflict on the High Seas
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06We're now halfway through the UN-designated "Ocean Decade" — new research initiatives have been launched, and global cooperation has been strengthened as scientists work to learn more about our oceans and to harness their potential in the fight against adverse climate change. But there are still questions to be answered: How firm are the commitment…
…
continue reading
Send us a text This week on Secure Insights, The Day Quantum Breaks Bitcoin; It’s making headlines and beginning to shape the future of technology. On this episode of the P11 Podcast, James sits down with Conor, Co-Founder & VP of Engineering at Project 11, to unpack what quantum really is, why it could disrupt cryptography, and how it presents bot…
…
continue reading

1
CCT 275: CISSP Rapid Review (Domain 4) - Part 2
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The digital world has opened up unprecedented opportunities for scammers,…
…
continue reading

1
405. Melinda Nevala - U.S. State Privacy Laws and Individual Data Rights, Part 2.
1:27:21
1:27:21
Play later
Play later
Lists
Like
Liked
1:27:21Send Bidemi a Text Message! In this episode, host Bidemi Ologunde spoke with Melinda Nevala, a digital privacy advocate and the Marketing Director at Medcurity. The conversation touched on America’s patchwork of state privacy laws, spotlighting loopholes big tech quietly lobbied for, AI’s still-unplugged data vacuum, and the dark-pattern consent po…
…
continue reading

1
S3 EP06 Rethinking Risk: A Framework for Businesses Below the Poverty Line
33:22
33:22
Play later
Play later
Lists
Like
Liked
33:22Discover how we can assist you in identifying and closing gaps in your IT strategy to help keep your business safe, scalable, and secure. https://www.onestepsecureit.com/beyond-cyber-contact#beyond-cyber-contact-form In this episode, Scott Kreisberg and CISSP Tim Derrickson break down: Why many SMBs remain below the poverty line—even after buying e…
…
continue reading

1
Windows Virus and Malware Troubleshooting (Windows Troubleshooting)
33:19
33:19
Play later
Play later
Lists
Like
Liked
33:19Provides comprehensive guidance on identifying, preventing, and removing malware from Windows PCs and networks. It details various types of malware, such as viruses, worms, ransomware, and rootkits, and explores their infection methods and impacts. The text also covers Microsoft's built-in security features like Windows Defender, SmartScreen, User …
…
continue reading

1
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
18:04
18:04
Play later
Play later
Lists
Like
Liked
18:04A comprehensive guide for interacting with and automating tasks within the PowerShell environment. It offers practical "recipes" and solutions for a wide array of administrative challenges, ranging from "The Windows PowerShell Interactive Shell" and "Variables and Objects" to "Files and Directories," "Remoting," and "Workflows." The book covers fun…
…
continue reading
The term polycrisis has been gaining traction in recent times as the world faces one disaster after another that are all interlinked. The far-reaching implications of a world at risk means boardrooms must remain agile to navigate their businesses past the rocks and into calmer seas. In a break away from our normal format, we've created our own boar…
…
continue reading
The release of the 48 CFR rule transforms CMMC from policy guidance into enforceable contracting law. Once published (likely in Q4 2025), CMMC certification will be a non-negotiable requirement for DoD contracts—especially those involving FCI or CUI. Given the typical certification timelines and capacity constraints, defense contractors and subcont…
…
continue reading

1
US Military Biometric Systems: Digital War Lessons from Iraq
59:49
59:49
Play later
Play later
Lists
Like
Liked
59:49In this episode of the Disaster.Stream Podcast, host Bill Alderson takes you inside one of the most critical — and least understood — battles of the Iraq and Afghanistan wars: the fight to keep U.S. military biometric intelligence systems running in the middle of the digital war. Bill recounts how he was called by Army G2 at the Pentagon and deploy…
…
continue reading

1
When ATMs Fail: Banking Outages, Black Swans & Digital Risk
1:11:37
1:11:37
Play later
Play later
Lists
Like
Liked
1:11:37In this episode of the Disaster.Stream Podcast, host Bill Alderson sits down with Bill Genovese, CIO Executive Advisor at Kyndryl, to explore one of the most high-stakes failures in modern banking: a nationwide ATM outage during a holiday weekend. Drawing from decades of global experience with IBM, Kyndryl, and Big Four consulting, Genovese shares …
…
continue reading

1
Cyber Crises & Lessons Learned DDOS US Stock Markets
41:41
41:41
Play later
Play later
Lists
Like
Liked
41:41Disaster.Stream takes you inside the world of high-stakes cyber incidents and recovery operations, where seconds matter and lessons shape the future. Hosted by veteran network forensics expert Bill Alderson, this show unpacks the anatomy of disasters—from stock market outages to military communications failures—revealing what really happened, how t…
…
continue reading

1
Radia Perlman: Spanning Tree, Networking Lessons & SharkFest Keynote
32:18
32:18
Play later
Play later
Lists
Like
Liked
32:18In this special interview, I sit down with Radia Perlman — the visionary computer scientist and inventor of the Spanning Tree Protocol (STP), often called the “Mother of the Internet.” Her groundbreaking work made modern Ethernet and switching possible, shaping the way every network operates today. Radia shares her journey as a pioneer in networkin…
…
continue reading

1
Pentagon 9/11 Recovery: Lessons in Crisis Response & Readiness
1:04:38
1:04:38
Play later
Play later
Lists
Like
Liked
1:04:38On September 11, 2001, the Pentagon was left crippled by fire, water damage, and destroyed infrastructure after the terrorist attack. Days later, armed guards escorted my team and me into the still-smoldering building to restore critical communications for the U.S. Department of Defense. In this episode, I share that story firsthand — what it was l…
…
continue reading
The Seven Years’ War was one of the most wide-reaching and consequential conflicts in history. Fought from 1756 to 1763, it spanned five continents and involved the world's greatest powers of the time. From the muddy battlefields of Europe to the dense forests of North America, and from the trade routes of West Africa to the ports of India and the …
…
continue reading

1
Using and Administering Linux: Volume 1: Zero to SysAdmin: Getting Started
25:28
25:28
Play later
Play later
Lists
Like
Liked
25:28Serves as an in-depth resource for aspiring and current System Administrators. It covers foundational Linux concepts, from its historical origins and philosophical underpinnings to practical skills like installing and configuring the operating system, managing files, and navigating the command line. The book emphasizes troubleshooting techniques an…
…
continue reading
Provides detailed instructions and practical recipes for creating stunning visual effects in Unity projects using shaders. The book covers fundamental concepts such as diffuse and specular shading, transparency techniques (including alpha blending and cutoff shaders), and vertex manipulation for advanced effects like terrain blending and animation.…
…
continue reading

1
SN 1040: Clickjacking "Whac-A-Mole" - Inside the Password Manager Clickjacking Frenzy and What It Means
2:51:07
2:51:07
Play later
Play later
Lists
Like
Liked
2:51:07Alarm bells are ringing over a supposed browser zero-day, but is the threat as bad as it sounds? Steve reveals why "clickjacking" might be more whac-a-mole than breaking news, and what that really means for your passwords. • Germany may soon outlaw ad blockers • What's happening in the courts over AI • The U.K. drops its demands of Apple • New Micr…
…
continue reading

1
SN 1040: Clickjacking "Whac-A-Mole" - Inside the Password Manager Clickjacking Frenzy and What It Means
Alarm bells are ringing over a supposed browser zero-day, but is the threat as bad as it sounds? Steve reveals why "clickjacking" might be more whac-a-mole than breaking news, and what that really means for your passwords. • Germany may soon outlaw ad blockers • What's happening in the courts over AI • The U.K. drops its demands of Apple • New Micr…
…
continue reading

1
Generative AI with Python and PyTorch: Navigating the AI frontier with LLMs, Stable Diffusion, and next-gen AI applications
43:54
43:54
Play later
Play later
Lists
Like
Liked
43:54A comprehensive guide to understanding and implementing generative artificial intelligence (AI). It explores key concepts and practical applications of large language models (LLMs), Stable Diffusion, and other next-generation AI technologies using Python and the PyTorch library. The text covers foundational topics such as neural networks, transform…
…
continue reading

1
Effective Conversational AI: Chatbots that work
37:03
37:03
Play later
Play later
Lists
Like
Liked
37:03A comprehensive guide to building, improving, and managing conversational AI solutions, ranging from traditional intent-based chatbots to those leveraging generative AI and Retrieval-Augmented Generation (RAG). Key themes include measuring and enhancing chatbot understanding, streamlining complex dialogue flows for improved user experience, and str…
…
continue reading

1
Ep. 17 Hacking Humans: What is Social Engineering?
59:56
59:56
Play later
Play later
Lists
Like
Liked
59:56Hosts Annie-Mei and Anika unpack social engineering or “human hacking”, with insights from books by Chris Hadnagy and Kevin Mitnick. They break down the attack lifecycle, common tactics (phishing, pretexting, tailgating, quid pro quo), and how AI is supercharging scams, then share practical defences: pause-and-verify, reduce digital footprints, and…
…
continue reading

1
Former Dev Gets 4 Years for Sabotaging Workplace
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11Everyone may get elaborate revenge fantasies but few follow through due to the bad outweighing the satisfaction. One man, sensing he was to be terminated soon, however, decided if he were to go he would try to take the whole company down with him. Last week he was sentenced to 4 years in prison. Sources: https://pastebin.com/Pi0YSFUt…
…
continue reading

1
Ep. 318 - The 4th Monday Series - Finding Stable Employment in a Crazy Economy with Bobby Knost
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Bobby Knost. Bobby is a proud memb…
…
continue reading

1
CCT 274: CISSP Rapid Review (Domain 4) - Part 1
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Network security is the cornerstone of modern cybersecurity, and understa…
…
continue reading
"Send me a quick text" Episode Description XWorm 6.0 adds a hostile twist to persistence. Delivered via obfuscated VBScript, it bypasses AMSI, runs entirely in memory, and marks itself as a “critical process” that crashes your PC if you try to kill it. In this episode, we walk through the attack from delivery to defense — and why it works so well. …
…
continue reading
providing an in-depth guide for configuring and managing FortiGate units. It presents various configuration commands, outlining their parameters, descriptions, types, sizes, and default values for numerous features. The document covers a broad spectrum of functionalities including network settings, security policies (firewall, antivirus, DLP, IPS),…
…
continue reading
Provides an extensive overview of file system forensics, primarily focusing on the technical aspects of analyzing various file systems common in digital investigations. It introduces Linux as a forensic platform, detailing its open-source advantages and essential commands for digital forensics. The text then explores the structure and analysis of d…
…
continue reading
Send us a text In this episode, we delve into the transformative journey of artificial intelligence and its profound impact on job markets worldwide. From automation to innovation, AI is reshaping industries, creating new opportunities, and challenging traditional employment paradigms. Join us as we explore how AI is redefining work, the skills nee…
…
continue reading

1
CCNP Enterprise Design ENSLD 300-420 Official Cert Guide
36:23
36:23
Play later
Play later
Lists
Like
Liked
36:23Serves as an official certification guide for the Cisco CCNP Enterprise Design ENSLD 300-420 exam, offering an in-depth exploration of network design principles. It covers foundational concepts like IPv4 and IPv6 addressing schemes, including subnetting, NAT, and address assignment strategies, alongside routing protocols such as EIGRP, OSPF, and BG…
…
continue reading

1
Designing Websites with Publii and GitHub Pages
25:52
25:52
Play later
Play later
Lists
Like
Liked
25:52A comprehensive guide to creating, maintaining, and publishing static websites for free using Publii CMS and GitHub Pages. It covers everything from initial setup, including email accounts and GitHub repositories, to advanced topics like search engine optimization (SEO), custom domain names, and plugins. Readers will learn to build different websit…
…
continue reading

1
Designing Large Language Model Applications: A Holistic Approach to LLMs
24:30
24:30
Play later
Play later
Lists
Like
Liked
24:30A comprehensive overview of designing large language model applications, praised for its synthesis of advanced AI methods and practical applications. It explores fundamental concepts like prompting, fine-tuning, and reasoning, emphasizing how LLMs behave in practice through hands-on exercises and numerous research paper references. The text examine…
…
continue reading
A comprehensive guide for creating user-friendly and aesthetically pleasing websites and applications. Authored by Adrian Twarog and George Moller, the book systematically covers fundamental design principles, beginning with color theory, typography, and component design. It then progresses to visual hierarchy, explaining how elements like size, te…
…
continue reading

1
Data Analysis with LLMs: Text, tables, images and sound
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27Explores the multifaceted application of Large Language Models (LLMs) in data analysis. It covers analyzing various data types, including text, structured data (tables and graphs), images, and audio, often detailing how LLMs, like OpenAI's GPT models, can be used either directly on data or indirectly by generating code for external tools. The sourc…
…
continue reading

1
Data Structures in Depth Using C++: A Comprehensive Guide to Data Structure Implementation and Optimization in C++
25:59
25:59
Play later
Play later
Lists
Like
Liked
25:59A comprehensive guide to data structures and algorithms using C++. It begins with foundational concepts, differentiating between data structures and algorithms, and discussing their efficiency and interplay. The text then systematically explores various core data structures, including arrays, linked lists, stacks, queues, hash tables, and trees (su…
…
continue reading
Humans have an evolutionary bias toward seeking convenience, experts say. But what happens when the desire for convenience becomes a dominant social and economic expectation? Future Tense explores the hidden costs of convenience for the environment and the economy. Making things too easy can in fact be bad for you. Guests Alison Angus — Head of Pra…
…
continue reading

1
CCT 273: Mastering CISSP Exam Questions - Five Challenging Scenarios
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58Send us a text Check us out at: https://www.cisspcybertraining.com Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A catastrophic data loss incident involving South Yorkshire Police serves …
…
continue reading
Send us a text This week on Secure Insights, our host Rosie sits down with David, VP of Marketing at Tuskira, to uncover the story behind the company from its founding mission to tackling alert fatigue to making AI a trusted, dependable teammate. Discover how Tuskira is transforming security operations and get a sneak peek at the future of smarter,…
…
continue reading

1
104. Inside the Mind of a Scammer: Kitboga Fights Back
41:13
41:13
Play later
Play later
Lists
Like
Liked
41:13In this episode of Raising Tech, host Matt Reiners talks with the legendary Kitboga, a cybersecurity crusader and content creator known for baiting and exposing online scammers. With over 3.74 million YouTube subscribers and more than a billion views across platforms, Kitboga shares how he transforms tech knowledge into entertaining education. From…
…
continue reading
Send Bidemi a Text Message! In this episode, host Bidemi Ologunde analyzed the company Palantir Technologies, an American publicly traded company specializing in software platforms for data mining. The analysis focused on the enabling conditions that predate its founding, the company’s growth across historical and societal contexts, its financial t…
…
continue reading

1
When 'Cleaned' Isn't Clean: The Red Flags That Demand a Malware Investigation
9:11
9:11
Play later
Play later
Lists
Like
Liked
9:11My Antivirus Says 'Threat Found'. Now What? (Part 3) - When 'Cleaned' Isn't Clean: The Red Flags That Demand a Malware Investigation Episode Summary: In the final installment of this series, host Sarah and cybersecurity expert Patrick move beyond the initial antivirus alert and first aid steps. They explore the critical red flags that indicate an A…
…
continue reading

1
Data Science Foundations: Navigating digital insight
33:33
33:33
Play later
Play later
Lists
Like
Liked
33:33Provides an extensive overview of data science, encompassing its core concepts, methodologies, and practical applications within organizations. It explores the data analysis lifecycle, from problem definition and data sourcing to preparation, model selection, and evaluation. The text emphasizes the importance of understanding data properties, stati…
…
continue reading

1
Computer Networking Bible: Your Complete Guide to Mastering Network Fundamentals, Enhancing Security, and Designing Scalable Networks
14:42
14:42
Play later
Play later
Lists
Like
Liked
14:42Designed for both beginners and seasoned professionals in the field. It covers fundamental concepts such as IP addressing, network hardware, and basic security, building a solid foundation for new learners. The text then transitions to more advanced topics, including enterprise-level security, network automation, cloud integration, and disaster rec…
…
continue reading

1
Productionizing AI: AWS Bedrock, MCP & Agentic Workflows for Startups
57:14
57:14
Play later
Play later
Lists
Like
Liked
57:14What does it really take to move from a GenAI prototype to a production-ready system? In this episode, AWS AI Engineering Specialist Dennis Traub breaks down the hard truths behind scaling, securing, and monitoring AI systems — and why the future belongs to startups who learn how to productionize AI fast. What You’ll Learn in This Episode: Why most…
…
continue reading