Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
…
continue reading
Wanna see a trick? Give us any topic and we can tie it back to the economy. At Planet Money, we explore the forces that shape our lives and bring you along for the ride. Don't just understand the economy – understand the world. Wanna go deeper? Subscribe to Planet Money+ and get sponsor-free episodes of Planet Money, The Indicator, and Planet Money Summer School. Plus access to bonus content. It's a new way to support the show you love. Learn more at plus.npr.org/planetmoney
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
…
continue reading
The Debbie Reynolds "The Data Diva" Talks podcast features thought-provoking discussions with global leaders on data privacy challenges affecting businesses. This podcast delves into emerging technologies, international laws and regulations, data ethics, individual privacy rights, and future trends. With listeners in over 123 countries, we offer valuable insights for anyone interested in navigating the evolving data privacy landscape. Did you know that "The Data Diva" Talks Privacy podcast h ...
…
continue reading
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
…
continue reading
On Masters of Scale, iconic business leaders share lessons and strategies that have helped them grow the world's most fascinating companies. Founders, CEOs, and dynamic innovators join candid conversations about their triumphs and challenges with a set of luminary hosts, including founding host Reid Hoffman (LinkedIn co-founder and Greylock partner). From navigating early prototypes to expanding brands globally, Masters of Scale provides priceless insights to help anyone grow their dream ent ...
…
continue reading
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
…
continue reading
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
…
continue reading
Official Website: https://psysecure.com/podcast/ Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Each episode of the What It Means podcast features Forrester analysts providing their unique perspective on the latest news and trends impacting marketing, CX, and technology leaders.
…
continue reading
5 Bytes Podcast features some of the highlights in enterprise IT for the last week as well as some useful resources for IT Pros and more!
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
Cybersecurity and Hacking related news like Hacks, Bugs, Vulnerabilities, Data Breaches of the last 7 days on every Wednesday.
…
continue reading
Stay on the cutting edge of technology with in-depth discussions and the latest news. From emerging trends to industry secrets, Tech Pulse brings you the heartbeat of the tech world.
…
continue reading
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
…
continue reading
Twice per month, Peter House and Mike Chmielewski discuss current cyberthreats and issues. Internet Weather Report is recorded at the studios of Big Cabbage Radio in Palmer, Alaska.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
…
continue reading
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
San Francisco / Bay Area international superstar with over 10 countries listening daily to the best Eurobeat and Italo Disco since 1985. I started being a deejay in the Air Force in Japan in 1985 and still love it!
…
continue reading
Labor Radio is news by, for, and about working people in Madison, Wisconsin and around the world. It originates out of the studios of WORT 89.9 FM Madison.
…
continue reading
Welcome to Silent Mode Cafe, the podcast where we translate the digital realm into plain English. From data privacy and basic internet security to smart home gadgets and the latest AI developments, we serve up tech insights with a side of caffeine.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
We Cover the Cyberspace.
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
Nastygram is an actual play RPG podcast that is all about the game! We might take our RPG nerdage seriously but not ourselves. Our goal is for you to feel like you are at the table with us as we build stories collaboratively across a variety of game worlds and systems while keeping the authentic feel of tabletop roleplaying amongst friends. Join us weekly to listen and let's get Nasty!
…
continue reading
What do we know about criminal justice reforms or bail reform? How do we evaluate whether reforms are helping or making the situation worse? How can we take politics out of criminal justice and focus on public safety? The Bail Post seeks to be a place where legislators and the public can educate themselves on a host of criminal justice/bail reform issues. With various attempts at criminal justice reform from New York to Texas to California, many people are confused as to what is working and ...
…
continue reading
1. Gain a deep understanding of data privacy regulations and compliance requirements 2. Learn proven strategies for building a robust privacy framework tailored to your organization’s needs 3. Access practical resources and tools to streamline your data management processes 4. Connect with a community of like-minded business leaders for support and networking opportunities
…
continue reading
No business likes litigation. Lawsuits and trials can be stressful, unpredictable, and often confounding—even for battle-scarred business leaders. But they’re something almost every business must confront. Speaking of Litigation® pulls back the curtain for an inside look at the various stages of litigation and the key strategic issues businesses face along the way. Knowledge is power, and this show empowers executives and in-house counsel to make better decisions before, during, and after di ...
…
continue reading
Podcasts summarising important cases in privacy and data law in the UK and Europe.
…
continue reading

1
Exposing a Government Data Breach: Whistleblower Tells All - Cybersecurity Today Special Report
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02In this gripping episode of Cybersecurity Today, host Jim Love interviews Daniel Berulis, a self-described whistleblower who recently made a significant disclosure to the U.S. Congress. Berulis reveals the shocking details of tenant admin abuse within a governmental cloud environment, which allowed unauthorized data copying and wiping of audit trai…
…
continue reading

1
Cybercrime Wire For May 9, 2025. Ransomware Group Lockbit Suffers Data Breach. WCYB Digital Radio.
1:15
1:15
Play later
Play later
Lists
Like
Liked
1:15The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
EP-251 : Whistleblower Lawsuit Shakes Brookfield ⚖️, Microsoft Bans Controversial App 🔒, Sk Telecom Faces Major Data Breach 📉
2:45
2:45
Play later
Play later
Lists
Like
Liked
2:45welcome to echo-pod's tech briefing for friday, may 9th! let's dive into today's top tech stories: legal battle in silicon valley: josh raffaelli sues brookfield asset management over wrongful termination after whistleblowing on pandemic-related fraud and bribery allegations, highlighting internal strife in the tech sector. microsoft's stance on da…
…
continue reading

1
Reviewing the Verizon 2025 Data Breach Investigations Report - ESW #404
40:42
40:42
Play later
Play later
Lists
Like
Liked
40:42In this topic segment, we discuss the most interesting insights from the 2025 edition of Verizon's DBIR. You can grab your own copy of the report at https://verizon.com/dbir Show Notes: https://securityweekly.com/esw-404
…
continue reading

1
Did DOGE "breach" Americans' data? (feat. Sydney Saubestre)
36:30
36:30
Play later
Play later
Lists
Like
Liked
36:30If you don’t know about the newly created US Department of Government Efficiency (DOGE), there’s a strong chance they already know about you. Created on January 20 by US President Donald Trump through Executive Order, DOGE’s broad mandate is “modernizing Federal technology and software to maximize governmental efficiency and productivity.” To fulfi…
…
continue reading

1
Rally for higher ed | Strike in Oshkosh | Child care rally | IRS resignations | Data breach | Bread & Roses
28:20
28:20
Play later
Play later
Lists
Like
Liked
28:20Madison holds rallies for a union-sponsored call to support higher education and another for child care providers on Child Care Advocacy Day, UAW Local 291 holds a rally and march in Oshkosh as its strike against Cummins continues into its second month, about a third of Internal Revenue Service workers may be gone by the end of this year, a whistle…
…
continue reading

1
Oracle’s Data Breach Silence, Tariff Impacts, Homegrown Social Influencers
27:33
27:33
Play later
Play later
Lists
Like
Liked
27:33In this episode, we look at the ongoing fallout from two healthcare data breaches involving Oracle servers and what the on-again, off-again tariffs could mean for CIOs. Then we discuss the rising prominence of social media influencers in the B2B space — and why tapping your own employees could be a smart move.…
…
continue reading
Here is my remix of "Data Breach" from Lady Gaga In Space, for free!
…
continue reading

1
Analysis and Lessons from Kiteworks Top 11 Data Breaches in 2024 Report
51:45
51:45
Play later
Play later
Lists
Like
Liked
51:45In this insightful episode, cybersecurity experts Mike Crandall and Arun DeSouza join host Patrick Spencer to analyze Kiteworks' Top 11 Data Breaches in 2024 Report. Rather than just focusing on the number of records breached, the report introduces a sophisticated algorithm with seven key factors to score breaches on a scale of 1-10. This method pr…
…
continue reading

1
Episode 11: Encrypted Messaging, Data Breaches, and Vulnerability Management
1:30:02
1:30:02
Play later
Play later
Lists
Like
Liked
1:30:02Episode 11 of the Distilled Security Podcast is here! Join us as we cover: Signal, Encrypted Messaging, and Corporate Policy: A deep dive into the use of Signal in sensitive discussions—including a political mishap—and the implications for corporate communication policies, discovery, and compliance. Oracle Cloud Breach Allegations: Evaluating breac…
…
continue reading

1
Cyber Threats Target HR, AI Tools, and Critical Infrastructure: A Comprehensive Update
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07In this episode of Cybersecurity Today, host David Shipley covers a range of cyber threats including the Venom Spider malware targeting HR professionals, the emergence of the Noodlofile info stealer disguised as an AI video generator, and misinformation campaigns amid the India-Pakistan conflict. Additionally, the episode discusses warnings from U.…
…
continue reading

1
CONTESTED GROUND: A sit down with Tim Knight, author of Gallipoli Soup
43:14
43:14
Play later
Play later
Lists
Like
Liked
43:14In this episode of the Contested Ground podcast, host Liam Garman is joined by Tim Knight, author of the recently released book Gallipoli Soup, to discuss the Gallipoli campaign and how Knight used narrative to bring to life the challenges faced by both Australian and Turkish soldiers in World War I. The pair begin the podcast unpacking Knight’s re…
…
continue reading

1
End Compliance Theatre: How Automation Can Save Your Business
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38In this eye-opening episode of Cybersecurity Chronicles, we tackle a critical challenge facing executives today: the devastating impact of cyberattack downtime. Join Netswitch's VP Sean Mahoney, CFO Bernard Mendoza, and cyber resilience expert Steve Piggott as they move beyond "compliance theatre" to discuss why automated disaster recovery (DR) isn…
…
continue reading

1
Replay: Banishing burnout, with Arianna Huffington
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10To scale sustainably, founders must not neglect their mental health. Arianna Huffington learned this the hard way after collapsing from burnout while leading The Huffington Post. She talked with host Reid Hoffman about how that wake-up call sparked her next venture, Thrive Global, which helps companies build cultures that prioritize well-being. Wit…
…
continue reading

1
EP-252 : U.s. Treasury Scrutinizes Benchmark’s Ai Investment 💼, Google I/o 2025 Sneak Peek 📅, Epic Games & Spotify Test Apple’s App Store Rules 🍏
2:49
2:49
Play later
Play later
Lists
Like
Liked
2:49welcome to echo-pod's tech briefing for saturday, may 10th! today, we cover crucial developments in the tech industry: benchmark's investment in manus ai: the u.s. treasury department reviews the implications of benchmark's $75 million investment in the chinese ai startup, amidst compliance concerns with 2023 restrictions. google i/o 2025 preview: …
…
continue reading

1
Cybercrime Wire For May 10-11, 2025. Weekend Update. WCYB Digital Radio.
1:01
1:01
Play later
Play later
Lists
Like
Liked
1:01The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
Americorps and Trump | Public broadcasting | Labor Department | New Social Security head | Ozturk ordered released | New postmaster | Walter Reuther | Job offer
28:54
28:54
Play later
Play later
Lists
Like
Liked
28:54Labor Radio speaks to workers affected by federal cuts in the Americorps program and in public broadcasting, how US Labor Department cuts will affect workers, there are new directors of the Social Security system and of the postal service, a federal judge orders the release from ICE captivity of graduate student and SEIU member Rumeysa Ozturk and h…
…
continue reading
For decades, dollars have been the world's common financial language. Central banks everywhere hold dollars as a way to safely store their wealth. Countries, businesses, and people use it to trade; around 90% of all foreign exchange transactions involve dollars. It's the world's money, the world's "reserve currency." But what if that is changing? W…
…
continue reading

1
Cybercrime News For May 9, 2025: FBI Investigates Predatory Network '764' Targeting Teens
2:38
2:38
Play later
Play later
Lists
Like
Liked
2:38The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
Ransomware Minute. Attackers Target Food & Agriculture Industry. Scott Schober, WCYB Digital Radio.
3:19
3:19
Play later
Play later
Lists
Like
Liked
3:19The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.By Cybercrime Magazine
…
continue reading

1
Life Of A Cybersecurity Czar. Key Skills For Security Professionals. Dr. Eric Cole, Secure Anchor.
12:30
12:30
Play later
Play later
Lists
Like
Liked
12:30A world renowned cybersecurity expert with more than 30 years of network security experience, Dr. Eric Cole – founder and CEO of Secure Anchor – helps organizations curtail the risk of cyber threats. He has worked with a variety of clients ranging from Fortune 50 companies, to top international banks, to the CIA, for which he was a professional hac…
…
continue reading

1
Quantum Minute. Post-Quantum Cryptography Guidance From UK's NCSC. Sponsored by Applied Quantum.
1:55
1:55
Play later
Play later
Lists
Like
Liked
1:55The UK’s National Cyber Security Centre (NCSC) has provided formal guidance to system and risk owners in various industry sectors about how to prepare for the migration to post-quantum cryptography. While symmetric cryptography is not significantly impacted by quantum technology, the NCSC said PQC will eventually replace vulnerable PKC algorithms, …
…
continue reading

1
Critical Cybersecurity Breaches: OneDrive Default Settings, PowerSchool Ransom, and DOGE Staffer Compromises
11:50
11:50
Play later
Play later
Lists
Like
Liked
11:50In this episode of Cybersecurity Today, host Jim Love discusses recent cybersecurity breaches and vulnerabilities. Key topics include a security flaw in the new default setting of Microsoft OneDrive, a ransom incident involving PowerSchool that compromised student data, and the breach of a DOGE staffer's computer by info-stealing malware. The episo…
…
continue reading

1
Meta fuels its new AI with Facebook content, UK retailers suffer ransomware spree, and LockBit gets hacked
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft discuss Meta’s newly launched AI that will be powered by Facebook, DeepSeek is back in the news, a horror week of hacks for some massive UK retail chains, LockBit, and the wonderful day and night that was last week’s Australian Cyber Summit and Australian Cyber Awards. …
…
continue reading

1
Episode 19: Tokyo Take Me There -Lady Gaga In Space 2025- DJ EUROBEAT VERSION
3:46
3:46
Play later
Play later
Lists
Like
Liked
3:46Here is my version of "Tokyo Take Me There" for Lady Gaga In Space.
…
continue reading

1
Cybercrime Magazine Update: Ransomware Attacks. More Than Half Bypass Traditional Detection Tools.
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29According to Morphisec, industry research estimates 60 percent of ransomware attacks bypass traditional detection tools, leaving businesses vulnerable. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Magazine Update airs wee…
…
continue reading

1
Husband Hacks Scammers Targeting Wife. Smishing Scheme Revealed. Grant Smith, Phantom Security Group
12:52
12:52
Play later
Play later
Lists
Like
Liked
12:52Grant Smith is the founder of Phantom Security Group. In this episode, he joins host Charlie Osborne to discuss his experience uncovering a large-scale USPS smishing scheme that targeted his wife, including what challenges he encountered, the steps of his investigation, and more. • For more on cybersecurity, visit us at https://cybersecurityventure…
…
continue reading

1
Dashcam Security Risks. Vulnerabilities & Impact On Drivers Revealed. George Chen & Alina Tan, Dyson
12:42
12:42
Play later
Play later
Lists
Like
Liked
12:42George Chen heads the Cloud and Application Security functions at Dyson. In this episode, he joins host Melissa O'Leary and Alina Tan, senior program manager at Dyson, to discuss recent findings regarding dashcam security risks, which Chen and Tan recently shared at Black Hat Asia, as well as sharing a breakdown of the vulnerabilities and their imp…
…
continue reading

1
Cybercrime Wire For May 8, 2025. Cyber Incident Hits U.K.'s Legal Aid Agency. WCYB Digital Radio.
1:22
1:22
Play later
Play later
Lists
Like
Liked
1:22The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
Cybercrime News For May 8, 2025: Scattered Spider Suspected in U.K. Retail Cyberattacks
2:26
2:26
Play later
Play later
Lists
Like
Liked
2:26The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
How this first-time founder landed a $630 million exit
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25When Ju Rhyu moved to South Korea for a corporate job, she noticed people unapologetically wearing hydrocolloid pimple patches on their faces — on the street, at the office, anywhere. She soon realized no one had cornered the US market yet on this skincare secret, and Hero Cosmetics was born. Rhyu joins host Jeff Berman this week to reveal the less…
…
continue reading

1
EP-250 : Stripe’s Ai Payment Revolution 💳 | Openai’s Drug Evaluation Push 💊 | Tesla’s Robotaxi Trademark Troubles 🚗
2:38
2:38
Play later
Play later
Lists
Like
Liked
2:38welcome to echo-pod's tech briefing for thursday, may 8th! today, we delve into the latest breakthroughs and challenges in the tech and finance industries: stripe's ai foundation model: unveiling an innovative model designed to enhance payment processing and fraud detection, achieving a remarkable 64% increase in fraud detection rates for large bus…
…
continue reading

1
Replay: Bill Gates is ending his foundation — here’s how it began
41:33
41:33
Play later
Play later
Lists
Like
Liked
41:33Bill Gates announced this week that he will shutter his philanthropic foundation in 20 years – but not before using it to give away $200 billion to fight global diseases. In this archival episode from 2019, he tells host Reid Hoffman the story of how it all started – and how he learned to scale his impact as a philanthropist. In Part 2 of this spec…
…
continue reading

1
Cyber Challenges in Medicine: A Conversation with Kathie Philippou
33:00
33:00
Play later
Play later
Lists
Like
Liked
33:00In this episode of Cyber Survivor, host Dan Dodson speaks with Kathie Philippou, who has 40 years of experience in practice management. Kathie shares her journey from humble beginnings in healthcare administration to navigating the digital transformation of medical practices. She discusses the challenges of implementing electronic medical records a…
…
continue reading
Virtually every product brought into the United States must have a so-called "country of origin." Think of it as the official place it comes from. And this is the country that counts for calculating tariffs. But what does it really mean when something is a "Product of China"? How much of it actually comes from China? And how do customs officials dr…
…
continue reading

1
Cyberwar 2022. Documentary On The Ukrainian War's Cyber Aspects. Pavlo Cherepin, Producer & Director
13:53
13:53
Play later
Play later
Lists
Like
Liked
13:53Pavlo Cherepin is an award-winning Ukrainian producer and the director of "Cyberwar 2022: a documentary on the cyber aspects of the Ukrainian war. In this episode, he joins host Charlie Osborne to discuss the inspiration behind the film, some of the techniques and ramifications unpacked within it, and more. • For more on cybersecurity, visit us at …
…
continue reading
Peter and Mike continue their cyber security discussion.By Big Cabbage Radio
…
continue reading

1
Cybercrime Wire For May 7, 2025. Cyberattack Strikes Medical Technology Firm. WCYB Digital Radio.
1:12
1:12
Play later
Play later
Lists
Like
Liked
1:12The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
50. Security Is a Team Sport: Turning Employees from Liabilities to Cyber Defenders
45:33
45:33
Play later
Play later
Lists
Like
Liked
45:33This episode focuses on the critical role people play in cybersecurity. The hosts discuss how most breaches (95-97%) involve human error, emphasizing that while technology defenses are important, humans remain the weakest link. They explore how hackers exploit human psychology through social engineering and why creating a positive security culture …
…
continue reading

1
Cybercrime News For May 7, 2025: Suspected Hacker Behind $190M Nomad DeFi Heist Arrested in Israel
2:47
2:47
Play later
Play later
Lists
Like
Liked
2:47The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
In this conversation, Dr. Fred Heiding discusses theintersection of cybersecurity and AI threats, sharing insights from his research at Harvard's Belfer Center. He emphasizes the importance of collaboration in cybersecurity, the risks of isolationism, and the need for more technical talent in policy-making. The discussion also covers national cyber…
…
continue reading
In this episode of Risk & Reels, Jeffrey Wheatman sits down with Craig Taylor, CEO of CyberHoot, to talk about how small businesses are navigating the evolving world of cybersecurity compliance—especially the demanding standards of CMMC. From Apollo 13-style ingenuity to the unintended consequences of regulation, Craig shares a 30-year perspective …
…
continue reading

1
EP-249 : Hugging Face’s Open Ai Agent 🖥️, Rivian’s Ev Forecast Revision 🚗, Nso’s $167m Legal Blow 💰
2:28
2:28
Play later
Play later
Lists
Like
Liked
2:28welcome to echo-pod's tech briefing for wednesday, may 7! today’s episode covers the latest in tech developments and industry updates: hugging face's new open computer agent: introduction of a free ai tool for executing tasks on a cloud-hosted linux vm, along with insights on its performance limitations. rivian delivery forecast revision: the elect…
…
continue reading

1
6 Year Old Sleeper Attack Uncovered, Fake Bank Draft Scam, and Signal Tool Breach
8:56
8:56
Play later
Play later
Lists
Like
Liked
8:56In this episode of Cybersecurity Today, host Jim Love delves into a range of alarming cyber incidents. A six-year sleeper supply chain attack has compromised thousands of e-commerce websites, exploiting vulnerabilities in Magento extensions from vendors Tigren, Meetanshi, and Magesolution. Russian-controlled open-source tool Easy JSON raises scruti…
…
continue reading

1
Inside Job: The Ubiquiti Hacker Who Tried to Save the Day—From Himself | Cypher Tech Hacks
8:23
8:23
Play later
Play later
Lists
Like
Liked
8:23What if the hacker wasn’t on the outside—but right inside your team meetings? In this episode of Cypher Tech Hacks, Alex Cipher unpacks the jaw-dropping Ubiquiti breach where a trusted DevOps engineer hacked his own company, stole sensitive data, demanded a ransom, then tried to help investigate the very breach he caused. From exploiting cloud acce…
…
continue reading

1
Mastering Cyber. Move From Incognito Mode To VPNs. Alissa “Dr Jay” Abdullah, Deputy CSO, Mastercard.
1:31
1:31
Play later
Play later
Lists
Like
Liked
1:31Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/…
…
continue reading

1
Ep 11: Patrick Gorman, Former US Intelligence Community CIO, CISO Bank of America
21:13
21:13
Play later
Play later
Lists
Like
Liked
21:13Nation-states don’t steal data, they wage war. In this episode of Code and Country, former US Intelligence Community CIO, CISO at Bank of America, and Chief Security Officer at Bridgewater Associates, Patrick Gorman exposes how cyber warfare threatens North America’s federal systems, higher education, BFSI, healthcare, and manufacturing sectors. Go…
…
continue reading