Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecurity author and educa ...
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Welcome to AI News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about machine learning, robotics, automation, natural language processing, AI ethics, and more. Whether you're a tech enthusiast, AI researcher, or simply curious about the future of technology, this podcast is your go-to source for AI news. T ...
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
In our age of digital transformation, everything is moving to the cloud, including the management of devices, users and applications. The Infoblox ThreatTalk podcast brings you the latest thinking on how to tap the full potential of the cloud while making the most of your existing network security solutions. In each episode, leading cybersecurity experts share insights and practical advice on how to raise network security and automation to the next level across diverse on-premises, virtual a ...
…
continue reading
Join HOU.SEC.CON Cofounders Michael and Sam each week as they chat with conference speakers about the latest topics and trends in the cybersecurity space.
…
continue reading
A relaxed coffee always brings an insightful conversation. And when it comes to mobile app performance, coffee is always a useful tool. Join us at the App Performance Café, where Rui Costa, CEO at Codavel, brings the most knowledgable individuals for an informal conversation around the vast world of mobile app performance. Our guests will share the challenges and obstacles, strategies, and lessons learned when building top-performing mobile apps. Across multiple episodes, we'll cover the con ...
…
continue reading
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
…
continue reading
You can grab your weekly technology without having to geek out on TechTime with Nathan Mumm. The Technology Show for your commute, exercise, or drinking fun. Listen to the best 60 minutes of Technology News and Information in a segmented format while sipping a little Whiskey on the side. We cover Top Tech Stories with a funny spin, with information that will make you go Hmmm. Listen once a week and stay up-to-date on technology in the world without getting into the weeds. This Broadcast styl ...
…
continue reading
Watch Nationally Syndicated Car Concerns USA Radio Show Every Week-day Morning Starting at 9:00 A.M. (EST). USA TOLL-FREE: 1-855-CAR-CONCERNS (855-227-2662) @ http://bit.ly/cwAyD7 Car Concerns Is The Fastest Growing Car Talk Radio Show In The USA! Car Concerns is Nationally Syndicated Radio Talk Show That is Heard In Great USA Radio Markets Like Boston, Chicago, Las Vegas, Pittsburgh, Winter Springs, Botell, Hagatna and Other Great Cities Around The Nation. Is Car Concerns Heard In Your Town ...
…
continue reading
Inspirational stories of black women in tech. Support this podcast: https://podcasters.spotify.com/pod/show/frauvis/support
…
continue reading
We are two brothers focusing 100% on Amazon Web Services (AWS). Every other week, one of us prepares the topic of the podcast. The topic is not known to the other one, which results in surprising conversations about all things AWS. Typically, we are covering the following topics: DevOps, Serverless, Container, Security, Infrastructure as Code, Container, Continuous Deployment, S3, EC2, RDS, VPC, IAM, VPC, and many more.
…
continue reading

1
Spying on your kids, Bank Robberies, Qantas, LOTL, sudo, Hunters, Aaran Leyland... - SWN #492
33:26
33:26
Play later
Play later
Lists
Like
Liked
33:26Spying on your kids, Bank Robberies, Qantas, LOTL, sudo, Hunters, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-492
…
continue reading

1
The Ingram Micro Cyber Incident & Building Security Maturity - F12’s ISO 27001Journey
1:03:30
1:03:30
Play later
Play later
Lists
Like
Liked
1:03:30Supply chain attacks doubled according to the 2025 Verizon DBIR. This week the channel awakens to Ingram Micro being attacked by the SafePay Ransomware group. Incident Response (IR) expert, Chris Loehr, EVP of Solis joins The CyberCall, to share perspective on the GlobalProtect VPN compromise. That’s why today on today's CyberCall, we’re talking ab…
…
continue reading

1
CoreWeave Acquires Core Scientific, Avant Technologies Offers Free AI Scans, AI Transforms Diamond Mining, Minister Promotes Ethical AI Guidelines, and more...
11:07
11:07
Play later
Play later
Lists
Like
Liked
11:07(0:10): CoreWeave Acquires Core Scientific in $9B Deal, Aims to Boost AI Capabilities Amid High Risks (2:28): Avant Technologies Nears FDA Milestone, Launches Free AI Scans for Diabetes Early Detection (4:49): Revolutionizing Diamond Mining: AI, IoT, and Sustainability Transform Industry by 2025 (7:13): Minister Stresses Ethical AI Communication Gu…
…
continue reading

1
Checking in on the State of Appsec in 2025 - Janet Worthington, Sandy Carielli - ASW #338
1:07:15
1:07:15
Play later
Play later
Lists
Like
Liked
1:07:15Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this new code means for appsec practices. On a positive note, the prevalence of those ancient vulns seems to be diminishing, but the rising use of LLMs is e…
…
continue reading

1
OpenAI Tests Collaborative Study Mode, Huawei Denies Plagiarism Claims, NetDragon Clinches EdTech Awards, Yum China Boosts Profits with AI, and more...
11:51
11:51
Play later
Play later
Lists
Like
Liked
11:51(0:10): OpenAI Tests 'Study Together' Mode in ChatGPT: Revolutionizing Collaborative Learning for Students (2:06): Huawei's Noah Ark Lab Denies Plagiarism Claims, Open-Sources Pangu Pro Amidst AI Rivalry (4:15): NetDragon Wins Top EdTech Awards for Global Impact in Sustainable Digital Education (6:16): Yum China's AI Revolution: Boosting Profits an…
…
continue reading

1
CCT 260: CISSP Rapid Review Exam Prep - Domain 1 - Part I
37:12
37:12
Play later
Play later
Lists
Like
Liked
37:12Send us a text Ready to conquer CISSP Domain 1? This rapid review episode delivers essential knowledge on security and risk management fundamentals that form the cornerstone of information security practice. We begin with a timely discussion on preventing ransomware through exfiltration controls, noting the alarming shift where 90% of ransomware at…
…
continue reading

1
Identity, AI & Access: Highlights from Identiverse 2025 - Sagi Rodin, Ajay Amlani, Treb Ryan, Ajay Gupta, Artyom Poghosyan, Amir Ofek - ESW #414
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
…
continue reading

1
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-491
…
continue reading

1
Ilya Sutskever Leads Safe Superintelligence, AI Revolution Threatens White Collar Jobs, CoreWeave Deploys Nvidia Blackwell Chips, Nvidia Revolutionizes Logistics with AI, and more...
11:41
11:41
Play later
Play later
Lists
Like
Liked
11:41(0:10): Ilya Sutskever Takes Helm at Safe Superintelligence Amid Talent War with Meta (2:05): AI Revolution Sparks Fear of Massive White-Collar Job Losses, CEOs Urge Workforce Adaptation (4:28): CoreWeave Leads AI Revolution with First Deployment of Nvidia Blackwell Ultra Chips (6:41): Nvidia's Trillion-Dollar Robot: Revolutionizing Logistics with …
…
continue reading

1
Exploring Meshtastic and LoRa Mesh Networks - Rob Allen - PSW #881
1:08:14
1:08:14
Play later
Play later
Lists
Like
Liked
1:08:14This week, we dive into the world of Meshtastic and LoRa—two technologies empowering secure, long-range, and infrastructure-free communication. We'll talk about the origins of Meshtastic, how LoRa radio works, and why mesh networking is revolutionizing off-grid messaging for adventurers, hackers, emergency responders, and privacy advocates alike. W…
…
continue reading

1
Episode 072 - Cybersecurity Lessons on the Path to Private Equity - Paul Harragan
31:40
31:40
Play later
Play later
Lists
Like
Liked
31:40Cybersecurity Lessons on the Path to Private Equity Dive into the world of private equity and cybersecurity with Paul Harragan, Global Cybersecurity Lead at KKR. In this episode, we cover strategies for managing risks, navigating M&A diligence, and aligning security with business growth. + + + Find more episodes on YouTube or wherever you listen to…
…
continue reading

1
The Intersection of AI, RPA & Cyber - What Your MSP Needs to Know
59:50
59:50
Play later
Play later
Lists
Like
Liked
59:50In this must-listen episode of The CyberCall, hosts Andrew Morgan, Phyllis Lee & Gary Pica are joined by Aharon Chernin, Founder & CEO of Rewst — to explore how Artificial Intelligence (AI), Robotic Process Automation (RPA), and Cybersecurity are colliding in today’s MSP landscape. Tune in to learn what your MSP needs to know now to stay ahead! Con…
…
continue reading

1
CCT 259: CISSP Practice Questions - Data Classification (Domain 2.1)
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Ready to master data classification for your CISSP exam? This episode delivers exactly what you need through fifteen practical questions that mirror real exam scenarios, all focused …
…
continue reading

1
Baidu Launches AI Video Tool, HGS Wins Behavioral AI Award, X Introduces AI Note Writers, Lovable Achieves $2 Billion Valuation, and more...
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50(0:10): Baidu Unveils MuseSteamer: AI Image-to-Video Revolution Amid Ad Revenue Slump (1:58): HGS Wins 'Behavioral AI Solution of the Year' for Cutting-Edge Financial Crimes Detection Tool (4:03): X Unveils AI 'Note Writers' to Enhance Community Notes, Combat Misinformation on Social Media (6:14): AI Startup Lovable Soars to $2 Billion Valuation wi…
…
continue reading

1
Auto Tech at a Crossroads: Navigating the U.S. Ban on Foreign Vehicle Systems – PlaxidityX Ep 24
14:42
14:42
Play later
Play later
Lists
Like
Liked
14:42As today’s vehicles evolve into software-defined data hubs, concerns over national security have extended deep into automotive supply chains. In this episode of Cars, Hackers, and Cyber Security, we unpack the U.S. government’s sweeping new ban on connected vehicle systems originating from China and Russia-and what it means for automakers, supplier…
…
continue reading
Ready for a great explanation of Agentic AI? For the last show at Build, Carl and Richard sit down with Seth Juarez to dig into what agentic AI really is - and how you can take advantage of it! Seth discusses the potential of MCP and NLWeb to enable agents to work with each other, as well as the challenges of managing these tools effectively. The c…
…
continue reading

1
259: Avoid Wearing Smart Watches to Summer Concerts, and a new trend has emerged. "Rotary Phones". A Dating App that matches users based on search history. Next, Say What? as we Explore Bizarre Technologies ...
58:26
58:26
Play later
Play later
Lists
Like
Liked
58:26What happens when technology takes a step backward to move forward? This week's episode explores the strange territory where nostalgia, practicality, and innovation collide in unexpected ways. Microsoft is killing off the iconic Blue Screen of Death after four decades, replacing the familiar blue error screen with a simplified black version. While …
…
continue reading

1
The Value of Zero Trust - Rob Allen - BSW #402
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
…
continue reading

1
Genesis AI Secures 105M for Robotics, Sony and AMD Revolutionize PS5 Pro, Alibaba Revolutionizes AI Video Creation, Siemens Appoints Amazon Exec for AI, and more...
11:51
11:51
Play later
Play later
Lists
Like
Liked
11:51(0:10): Genesis AI Secures $105M to Transform Robotics with Universal AI Model for Physical Labor Automation (2:33): Sony and AMD Collaborate to Revolutionize PS5 Pro with AI-Powered Gaming Advancements (4:49): Alibaba's Wan2.1 VACE Revolutionizes AI Video Creation, Offers Affordable Access for Creatives Worldwide (6:45): Siemens Taps Former Amazon…
…
continue reading

1
Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet.. - SWN #490
31:11
31:11
Play later
Play later
Lists
Like
Liked
31:11Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-490
…
continue reading

1
PP069: A Quantum Primer: It’s More Than Cracking Crypto
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44Quantum computing is here, and it’s being used for more than cracking encryption. On today’s Packet Protector we get a primer on quantum, how it differs from classical computing, its applications for difficult computing problems, why quantum will be the death of blockchain, and how to think about quantum risks. Our guest, Johna Johnson, is... Read …
…
continue reading

1
Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
…
continue reading

1
Apple Partners for Siri AI Boost, Microsoft AI Outperforms Doctors, Senate Debates AI Moratorium, Palantir and Accenture Transform Federal Ops, and more...
11:27
11:27
Play later
Play later
Lists
Like
Liked
11:27(0:10): Apple Eyes AI Boost for Siri with Anthropic, OpenAI Partnership: A Strategic Shift Amidst AI Race (2:12): Microsoft AI Outperforms Doctors in Diagnosing Complex Cases, Sparks Debate on AI in Healthcare (4:12): Senate Debates AI Moratorium: Five-Year Compromise Sparks Controversy Over State Authority and Innovation (6:34): Palantir and Accen…
…
continue reading

1
AI Robots Compete in Soccer, Experts Demand AI Transparency, Meta Poaches AI Talent from OpenAI, Germany Demands AI App Ban, and more...
12:25
12:25
Play later
Play later
Lists
Like
Liked
12:25(0:10): Beijing Showcases AI Soccer Showdown: Humanoid Robots Compete in Autonomous Matches (2:25): AI Deception Alarms Experts: Urgent Call for Transparency and Global Regulatory Action (4:42): Meta Poaches Top AI Talent from OpenAI, Sparking Concerns Over Market Concentration and Ethical Implications (7:01): Germany Urges Apple, Google to Ban Chi…
…
continue reading

1
CCT 258: Data Classification and Protection in the CISSP Exam (Domain 2.1.1)
38:38
38:38
Play later
Play later
Lists
Like
Liked
38:38Send us a text Effective data classification isn't just about regulatory compliance—it's the foundation of your entire security program. Whether you're preparing for the CISSP exam or leading security initiatives at your organization, understanding how to identify, categorize, and protect sensitive information is critical to your success. This epis…
…
continue reading

1
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413
1:52:05
1:52:05
Play later
Play later
Lists
Like
Liked
1:52:05Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
…
continue reading

1
Broadcom, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and more... - SWN #489
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Broadcom is coming for you, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-489
…
continue reading

1
Pearson and Google Partner on AI Tools, Meta Explores PlayAI Acquisition, Ant Group Launches AQ App, Azure AI Services Surge 130%, and more...
11:06
11:06
Play later
Play later
Lists
Like
Liked
11:06(0:10): Pearson and Google Cloud Partner to Revolutionize Education with AI-Powered Learning Tools (1:27): Meta Platforms Eyes PlayAI Acquisition to Boost AI Voice Tech, Stock Rises Amid Negotiations (3:39): Ant Group Launches AQ App: Revolutionizing China's Healthcare with AI-Powered Services (6:01): Microsoft Azure AI Services Skyrocket with 130%…
…
continue reading

1
Is Vuln Management Dead? - HD Moore - PSW #880
2:16:08
2:16:08
Play later
Play later
Lists
Like
Liked
2:16:08This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
…
continue reading

1
CCT 257: Practice CISSP Questions - Understanding, Adhering To, and Promoting Professional Ethics (Domain 1.1)
37:14
37:14
Play later
Play later
Lists
Like
Liked
37:14Send us a text Check us out at: https://www.cisspcybertraining.com/ Ethical dilemmas lurk around every corner in cybersecurity, ready to challenge even the most technically competent professionals. Sean Gerber tackles these moral minefields head-on in this thought-provoking episode focused on CISSP Domain 1.1, presenting fifteen real-world ethical …
…
continue reading

1
Gemini AI Raises Privacy Concerns, Microsoft Launches AI Lab in Wisconsin, Sanders Advocates 32-Hour Workweek, DeepMind Unveils AlphaGenome AI, and more...
11:45
11:45
Play later
Play later
Lists
Like
Liked
11:45(0:10): Google's Gemini AI Sparks Privacy Concerns: Accessing Texts Without Consent (2:12): Microsoft Opens First AI Co-Innovation Lab at UWM to Transform Wisconsin Manufacturing (4:25): Bernie Sanders Urges 32-Hour Workweek Amid AI Advancements, Citing Work-Life Balance Benefits (6:35): Google DeepMind Unveils AlphaGenome: AI Revolutionizing Genom…
…
continue reading