Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
A podcast where security meets sparkle, looking at all matters security and cleaning with Adept Corporate Services. Insightful and enlightening chat, entertaining guests and everything in between.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Helping people build practical emergency preparedness, situational awareness, and survival skills—so they can confidently protect their families and thrive in any crisis.
…
continue reading
Brian Duff, host of the Mind 4 Survival prepping podcast, helps preparedness minded people be more safe, confident and prepared so they can better protect themselves, their families, and loved ones when it matters most.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
Red Dot Mindset is the official podcast of Grey Matter Ops, your tactical guide to surviving — and thriving — in a world where hesitation can cost you everything. Hosted using advanced AI narration and written by a decorated U.S. Air Force Security Forces veteran, each episode blends military-grade strategy with real-world self-defense, situational awareness, and survival psychology. Whether you're facing a street-level threat, a digital stalker, or just the daily grind of modern life, we’ll ...
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Join Jason Poblete, international law, policy and national security expert, as he breaks down the legal, policy, and geopolitical battles shaping our world. From defending political prisoners to confronting authoritarian regimes, Poblete Dispatches delivers sharp analysis on human rights, economic security, and the rule of law. Whether you're a policymaker, legal professional, or someone who cares about freedom, this podcast offers insightful conversations and actionable intelligence on the ...
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
"Light 'Em Up" takes a deep dive on the criminal justice system, crime scene investigation and leadership. We take you under and behind the crime scene investigation tape to get at the truth, the whole truth and nothing but the truth, so help us God! Justice comes to those that fight ... not those that cry!
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
Welcome to Financially Fluent with Ray Godleski from Southeast Wealth Partners, LLC. Whether you're already retired or planning for the future, navigating financial advice can be overwhelming. This podcast cuts through the noise, bringing real insights from experts who specialize in every aspect of a successful financial plan—including how to adapt when things don’t go as expected. Join us as Ray Godleski answers audience questions and shares actionable strategies—not just empty clichés.
…
continue reading
The NIDS View is meant to give listeners inside access to the thoughts and ideas of the member-practitioners of NIDS including our Fellows, Analysts, and Interns. For each episode we pick a current deterrence topic and have a cordial, exciting and sometimes funny discussion. Each episode is a stand-alone topical and is expected to increase awareness of deterrence thinking, expand the next generation of deterrence professionals, and prepare the workforce whose mission is to ensure peace, secu ...
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
Podcast about enterprise technology by Indonesia's trusted I.T. company, ACS Group IG @acsgroup.co.id. We interview experts to spread awareness about the latest trends and opportunities in the enterprise tech space. Email us at: [email protected]
…
continue reading
Digital certificate industry veterans Tim Callan and Jason Soroko explore the issues surrounding digital identity, PKI, and cryptographic connections in today's dynamic and evolving computing world. Best practices in digital certificates are continually under pressure from technology trends, new laws and regulations, cryptographic advances, and the evolution of our computing architectures to be more virtual, agile, ubiquitous, and cloud-based. Jason and Tim (and the occasional guest subject ...
…
continue reading
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
…
continue reading
Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecurity author and educa ...
…
continue reading
Forrest Hanson is joined by clinical psychologist Dr. Rick Hanson and a world-class group of experts to explore the practical science of lasting well-being. Conversations focus on the key insights from psychology, science, and contemplative practice that you need to build reliable inner strengths, overcome your challenges, and get the most out of life. New episodes every Monday.
…
continue reading

1
From Destruction to Dignity: Clinical Perspectives; Spiritual Truths with Janice Ponds
Janice Ponds
Janice shares her wisdom to enlighten, educate, and advance the culture in America today. Her mission is to provoke thought, bring awareness, and point people towards intervention when needed.
…
continue reading
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
…
continue reading
…
continue reading
Broken Brains with Bruce Parkman is presented by The Mac Parkman Foundation The mission of this show and the foundation is To serve as a source of information, resources, and communications to the community of parents, coaches/Athletic trainers, medical staff, and athletes that are affected by sports-related concussions and to raise awareness of the long-term implications of concussive and sub-concussive trauma to our children. Broken Brains will also explore how Concussive Trauma impacts ou ...
…
continue reading
Welcome to One Degree to Victory, the podcast where we help navigate life's toughest challenges while building the emotional security and freedom to live their best year yet. Each episode provides practical tools, heartfelt stories, and expert insights to guide you through day-to-day experiences and chart a path toward new possibilities. Whether you're overcoming trauma, pursuing self-care, or redefining your future, this show will empower you to turn adversity into adventure for both yourse ...
…
continue reading
Farms. Food. Future. looks at the big issues facing farmers in the developing world and what needs to be done to wipe out global hunger while dealing with the climate crisis. It’s brought to you by the UN’s International Fund for Agricultural Development (IFAD) and presented by Brian Thomson. Through the podcast, IFAD raises awareness of the challenges smallholder farmers in developing countries are facing around food security. Farms. Food. Future. includes interviews with IFAD experts, part ...
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Security tips when your out and about instinctual behaviour to keep you and your safe
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Safety. Security. Survival. What I’ve taught multi-billion dollar companies to give them peace of mind. Mindset, awareness and preparing for unexpected danger. From www.safetyman.co
…
continue reading
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
…
continue reading
A skilled individual can effortlessly blend into any environment without drawing attention, effectively hiding their true capabilities and intentions. They seamlessly mingle, remain unmemorable, and forge relationships to gather vital information for their objectives. Every move they make is calculated and intended to keep them inconspicuous. Originating from espionage, the term "gray man" refers to incorporating spy tradecraft into one's daily life. This involves honing skills essential for ...
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Looking for a new TV show, movie, book or music artist? This is the show for you. Each episode we each recommend one thing we've watched, played or otherwise consumed and why we liked it so damn much.
…
continue reading
It’s the show, that bridges the requirements of regulations, compliance, and privacy with those of security. Your trusted source for complying with various mandates, building effective programs, and current compliance news. It’s time for Security and Compliance Weekly.
…
continue reading
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
The purpose of this podcast is to provide unclassified information about current trends in homeland security for the state of New Jersey, as well as educational information and resources for your awareness.
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading

1
Root Causes 515: What Is Entropy-aware Governance?
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51Jason coins the term "entropy-aware governance" to describe the idea of using the degree of entropy it contains to measure the strength of any given secret. This could be an objective, consistent metric that could be applied to standard practices and requirements.By Tim Callan and Jason Soroko
…
continue reading

1
Episode 95: Episode 95 - Security Awareness - What works?
22:42
22:42
Play later
Play later
Lists
Like
Liked
22:42In this episode, Richard has a deep dive into Security Awareness. What works? What doesn't?
…
continue reading

1
Special Episode: The Secure Talk Security Awareness Training 2025 (With HIPAA!)
1:11:17
1:11:17
Play later
Play later
Lists
Like
Liked
1:11:17SecureTalk 2025 Security Awareness Training | Complete Compliance Guide Welcome to SecureTalk's comprehensive 2025 Security Awareness Training video! This annually updated training is designed to help organizations meet their security compliance requirements while building a strong security culture. 🎯 What You'll Learn: Social Engineering & AI-Enha…
…
continue reading

1
Building Trust in Executive Protection: Strategies for Success with Nina Hobson
25:43
25:43
Play later
Play later
Lists
Like
Liked
25:43Fred Burton sits down with Nina Hobson, a seasoned executive protection leader, to explore the evolving landscape of security for high-profile individuals. They discuss the critical role of intelligence, the impact of social media on modern protection strategies, and the importance of authenticity and trust in building client relationships. With ov…
…
continue reading

1
135 Nuclear Weapons Unveiled: Myths and Realities
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14In this episode, Adam and Jim delve into the world of nuclear weapons, discussing their effects, common myths, and misconceptions. They explore the science behind nuclear detonations, the historical context of Hiroshima and Nagasaki, and the reality of nuclear warfare. The conversation also touches on tactical nuclear weapons, the political implica…
…
continue reading

1
Episode 073 - Chief Persuasion Officer: The New CISO Mindset - Rick McElroy
28:33
28:33
Play later
Play later
Lists
Like
Liked
28:33Chief Persuasion Officer: The New CISO Mindset NetSPI Field CISO and host of Agent of Influence podcast Nabil Hannan sat down with Rick McElroy to talk about the role of the CISO, leveraging AI in the cybersecurity space, vendor collaboration, and career advice. + + + Find more episodes on YouTube or wherever you listen to podcasts, as well as at n…
…
continue reading
Ever wonder how to protect sensitive data when you don't have an IT department? In this revealing conversation, two pharmaceutical industry veterans who recently launched their own consulting businesses share the cybersecurity challenges they never anticipated after leaving corporate America. Katie Hewitt, founder of BioVenture Advisors, and Laura …
…
continue reading

1
TurboDocx: AI Power for MSP Proposals (EP 881)
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37What if you could move from a client call to an executive proposal in five minutes? In this eye-opening episode, Nicolas Fry explains how TurboDocx leverages AI, cryptography, and creative automation to streamline every step of the MSP sales process. Learn how you can stand toe-to-toe with the big IT firms, all while saving money and time. Plus, di…
…
continue reading

1
Ep: 210: The Supreme Court, Parents & Children; Clinical Perspectives: That’s Enough
27:49
27:49
Play later
Play later
Lists
Like
Liked
27:49Thank you for joining us on “From Destruction to Dignity” with Janice Ponds. She is a mother, author, and free thinker, and as your host, Janice shares her wisdom to enlighten, educate, and advance the culture in America today. Her mission is to provoke thought, bring awareness, and point people towards intervention when needed. As a reminder, this…
…
continue reading

1
CYFIRMA Research: CVE-2025-5777– Pre-Auth Memory Leak in Citrix NetScaler (CitrixBleed 2)
5:00
5:00
Play later
Play later
Lists
Like
Liked
5:00Critical Alert: CVE-2025-5777 – Pre-Auth Memory Leak in Citrix NetScaler (CitrixBleed 2)! Organizations relying on Citrix NetScaler ADC and Gateway for secure remote access must act immediately. This newly uncovered vulnerability allows unauthenticated attackers to leak sensitive memory—including session tokens—by sending malformed authentication r…
…
continue reading

1
Coffee Is Your Top Supply Chain Risk: A Conversation with Kyle Kelly
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56SOC analysts, detection engineers, and pentesters—you’re not imagining it: software supply chain security is a dumpster fire 🔥. In this episode of Simply Defensive, we sit down with Kyle Kelly, engineering manager at GitHub and author of Crime Hacks, to unpack the chaos. We cover: - Why malicious packages are sneaking past defenders - The truth abo…
…
continue reading

1
Winning Clients with Automated Pen Testing (EP 880)
21:53
21:53
Play later
Play later
Lists
Like
Liked
21:53Discover how security can actually win you new clients! In this can’t-miss episode, Anup Ghosh of ThreatMate reveals exactly how automated pen testing and attack simulations not only close deals but also create ongoing revenue for MSPs. Learn the difference between a basic scan and a “real” pen test, what MSPs must do to stay ahead in compliance, a…
…
continue reading
Forrest and Dr. Rick discuss what's really wrong with the self-help industry, going beyond the obvious pseudoscience and snake oil to examine deeper structural issues. They explore the industry's mixed-bag focus on individual responsibility, the risks of turning healing into a never-ending project, performative personal growth, narcissism, social m…
…
continue reading

1
Dr. Michael Lewis on Omega-3s, Brain Trauma & TBI Recovery
1:07:03
1:07:03
Play later
Play later
Lists
Like
Liked
1:07:03Send us a text In this compelling episode of Broken Brains with Bruce Parkman, host Bruce sits down with Dr. Michael Lewis—renowned brain health expert and founder of the Brain Health Education and Research Institute—to unpack the devastating impact of repetitive brain trauma, especially among veterans, athletes, and youth in contact sports. Dr. Le…
…
continue reading

1
Why Was an Elevator Held Hostage by Windows?
1:14:36
1:14:36
Play later
Play later
Lists
Like
Liked
1:14:36This week on The Awareness Angle, Anthony Davis and Luke Pettigrew dive into some of the most unexpected and revealing cyber stories of the week. From job offers to gym selfies to your dog’s microchip, this week’s stories prove no part of daily life is off-limits to cyber risk. 📸 Fitness App Photo Leak – A design flaw exposed thousands of users’ ne…
…
continue reading
Microsoft has finally announced that it will offer an update to Active Directory Certificate Services (ADCS, formerly MSCA) to support post quantum cryptography. We discuss Microsoft's checkered support for ADCS and offer some questions users should be asking.By Tim Callan and Jason Soroko
…
continue reading

1
First Year, First Defense: Staying Safe on Urban Campuses
25:32
25:32
Play later
Play later
Lists
Like
Liked
25:32First Year, First Defense isn’t your typical campus orientation talk. In this episode, we go beyond packing lists and dorm check-ins to uncover what really matters—personal safety, mindset, and tactical readiness. Using SCAD in Savannah, Georgia, as our case study, we break down the real-world threats facing students—especially introverts—and teach…
…
continue reading

1
Adepting To Change Bitesize – Episode #1: Fundraising & Adept Socials
16:36
16:36
Play later
Play later
Lists
Like
Liked
16:36Alex & Paul launch a series of quick-fire episodes of the Adepting To Change Bitesize - and this time we’re talking all things charity, community and dragon boat racing! From sponsored step counts to tough mudders, we reflect on what giving back really means at Adept - and how we try to make it fun.By Adept Corporate Services
…
continue reading

1
Making Compliance Simple for MSPs (EP 879)
20:37
20:37
Play later
Play later
Lists
Like
Liked
20:37Are you tired of customers dreading compliance and security talk? In this episode, I chat with Jared Casner of Blacksmith InfoSec, who’s making compliance accessible for every MSP and SMB. Discover their “paint-by-numbers” approach to policy management, seamless ConnectWise integrations, and how their flexible platform creates new revenue streams f…
…
continue reading
CYFIRMA exposes Octalyn Forensic Toolkit, a malicious GitHub-hosted tool masquerading as a legitimate forensic utility. In reality, it functions as a credential stealer with Telegram-based C2, targeting browser data, crypto wallets, Discord, and VPN configs. Built with Delphi and C++, Octalyn enables even low-skilled actors to exfiltrate sensitive …
…
continue reading
Welcome to part 2 of the Cognitive Heist miniseries: The Bait Man 🗝️ He doesn’t pick the lock. 🚪 He doesn’t sneak in the back. 🪝 He just leaves something shiny on the ground and waits for you to pick it up. Enter "The Bait Man": the scammer who lets your own curiosity or greed do all the work. Part 2 of Cognitive Heist explores: 👉 Why bait-based sc…
…
continue reading

1
AP2T Labs: Rethinking Cybersecurity Awareness (EP 878)
23:28
23:28
Play later
Play later
Lists
Like
Liked
23:28In this episode, I get the inside scoop from Reese Tuttle, whose passion for stopping cybercrime is rooted in family and real-world experience. We discuss AP2T Labs’ patent-pending training platform: from social media and business-based attacks to text, voice, and even physical mail scams. Reese details how their “edu moments” and instant feedback …
…
continue reading

1
398. Luck, Loss, and the Long Game.
1:14:07
1:14:07
Play later
Play later
Lists
Like
Liked
1:14:07Send Bidemi a Text Message! In this episode, host Bidemi Ologunde explored a series of aphorisms—nuggets of wisdom about money, status, emptiness, and luck—to see how they play out in the contemporary world. Support the showBy CHIP STORY Media & Rainmaker Podcasts
…
continue reading

1
What Does Your Digital Footprint Say About You?
6:40
6:40
Play later
Play later
Lists
Like
Liked
6:40Before you even walk in the door, people are Googling you. Clients, employers, even potential partners—your digital footprint is your first impression. In this episode of Ask Socialprofiler, we break down what your public social media activity really says about you—and how it’s used to make decisions that affect your life. From deleted posts to wha…
…
continue reading

1
Marketing Muscle Memory In Cybersecurity
1:09:17
1:09:17
Play later
Play later
Lists
Like
Liked
1:09:17This week on The Awareness Angle Interviews, Anthony chats with Lori Steuart—a cybersecurity marketer with a passion for storytelling, content that resonates, and turning awareness from a box-tick into something people actually care about. From synthesisers to password managers, from yoga habits to ransomware planning, Lori brings a refreshingly hu…
…
continue reading

1
7 Cognitive Biases That Destroy Your Situational Awareness
40:24
40:24
Play later
Play later
Lists
Like
Liked
40:24Most people don’t realize how much bias shapes their awareness—until it’s too late. Here’s how to stay sharp, think clearly, and act with purpose. The post 7 Cognitive Biases That Destroy Your Situational Awareness appeared first on Mind4Survival.By Brian Duff
…
continue reading
…
continue reading
Join me and Kip Fanta as we reveal how MSPs can break free from the “vendor” label and become true business partners. Learn why strategic management, AI-powered insights, and a collaborative approach are the keys to thriving in today’s IT landscape. Kip shares how their two-sided platform enables both MSPs and clients to collaborate, capture ideas,…
…
continue reading

1
CYFIRMA Research- Tracking Ransomware- June 2025
4:54
4:54
Play later
Play later
Lists
Like
Liked
4:54Stay ahead with CYFIRMA’s Monthly Ransomware Report – June 2025. June saw 463 ransomware victims globally, a 15% decline from May. Qilin led the threat landscape, exploiting Fortinet flaws and adding legal pressure tactics. New players like Fog and Anubis adopted stealthy, modular toolkits and file-wipers for maximum damage. Emerging groups Teamxxx…
…
continue reading

1
134 Is America Prepared for a Strike Against its Nuclear Command and Control?
41:03
41:03
Play later
Play later
Lists
Like
Liked
41:03In this episode, Adam, Curtis, and Jim review an article suggesting that, following America's successful attack on Iran's nuclear facilities, the U.S. might be unprepared for a strike against its own nuclear arsenal. They discuss the complexities of nuclear deterrence, emphasizing the importance of airborne alert systems, the historical context of …
…
continue reading

1
Root Causes 514: Diary of an Online Firestorm
12:45
12:45
Play later
Play later
Lists
Like
Liked
12:45Tim describes how the addition of an item to the CABF face-to-face meeting agenda blew up into a panicked and outraged online thread. We discuss what a more functional response would have looked like.By Tim Callan and Jason Soroko
…
continue reading

1
Top 10 Situational Awareness Questions Civilians Are Asking in 2025
22:29
22:29
Play later
Play later
Lists
Like
Liked
22:29In this empowering episode of Red Dot Mindset, we tackle the Top 10 Situational Awareness Questions Civilians Are Asking in 2025 — everything from how to detect if you're being followed, to the best legal self-defense tools, to training your brain for high-stress moments. Drawing from the expertise of Mickey Middaugh, a 24-year U.S. Air Force Secur…
…
continue reading

1
Machines Running Amok: We've Created More Than We Can Secure with Oded Hareven
45:12
45:12
Play later
Play later
Lists
Like
Liked
45:12Machines Running Amok: We've Created More Than We Can Secure Twenty years ago, you could count the servers in your data center. Today, we've unleashed an army of digital entities that's spiraling beyond our control. For every human employee, there are 50-100 machine identities operating in your environment—containers, serverless functions, and auto…
…
continue reading

1
AI Powered QBRs with Strategy Overview (EP 876)
19:55
19:55
Play later
Play later
Lists
Like
Liked
19:55Curious how today’s top MSPs are saving hours on QBRs and strategic planning? Alex Markov of Strategy Overview shares the inside scoop on their AI-powered platform, IT Glue integration, and how real-world feedback drives innovation. Alex reveals the major updates since last year—including automated QBRs with Arya, expanded reporting for Office 365,…
…
continue reading
Summary In this episode of Financially Fluent, Ray Godleski, Cindi Walters, and intern Gavin Truong delve into the intricacies of Roth IRAs. They discuss the fundamental differences between Roth and traditional IRAs, the benefits of Roth IRAs for various age groups, income limits, contribution rules, and withdrawal regulations. The conversation als…
…
continue reading

1
CYFIRMA Research- RENDERSHOCK- Weaponizing Trust in File Rendering Pipelines
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58New Threat Model: Zero-Click Compromise via File Rendering Automation RenderShock introduces a powerful new attack framework that leverages trusted file previewing, indexing, and sync mechanisms to trigger payloads — without exploits, macros, or even opening the file. Key Highlights: Zero-click execution using passive system features. Payloads deli…
…
continue reading

1
Ep: 209: Cleaning Up a Debacle; Clinical Perspectives: Incompetence
39:20
39:20
Play later
Play later
Lists
Like
Liked
39:20Thank you for joining us on “From Destruction to Dignity” with Janice Ponds. She is a mother, author, and free thinker, and as your host, Janice shares her wisdom to enlighten, educate, and advance the culture in America today. Her mission is to provoke thought, bring awareness, and point people towards intervention when needed. As a reminder, this…
…
continue reading

1
CYFIRMA Research- GitHub Abused to Spread Malware Disguised as Free VPN
5:19
5:19
Play later
Play later
Lists
Like
Liked
5:19CYFIRMA Research's latest report explores a fake "Free VPN for PC" app hosted on GitHub, delivering a packed DLL payload using obfuscated Base64 hidden in junk strings. It uses P/Invoke to load a hidden DLL, executes GetGameData, and injects into legit processes like MSBuild.exe. Packed, evasive, and anti-debug. Link to the Research Report: https:/…
…
continue reading

1
Matchmaking for MSPs: Find My IT Partner (EP 875)
23:26
23:26
Play later
Play later
Lists
Like
Liked
23:26Are you tired of chasing cold leads and competing with dozens of MSPs for the same customer? In this episode, I chat with Skofi, the mastermind behind Find My IT Partner, who’s on a mission to reinvent how IT providers and SMBs connect. We talk about the power of curated matches, the importance of trust, and why his platform is more “cyber matchmak…
…
continue reading

1
Life stories from Bangladesh and Colombia
25:48
25:48
Play later
Play later
Lists
Like
Liked
25:48Sometimes, building the future of farming means drawing on centuries-old traditions. Indigenous small-scale farmers can help rural communities around the world forge a new, sustainable path forward. In the second episode of our “Life stories” mini-series, we meet Pallab Chakma from Bangladesh’s Chittagong Hill Tracts and Dayana Domicó from Colombia…
…
continue reading

1
The Freeze Response, Gifted Kid Syndrome, and BPD: July Mailbag
1:19:57
1:19:57
Play later
Play later
Lists
Like
Liked
1:19:57Dr. Rick and Forrest answer listener questions about perfectionism, performance anxiety, trauma, and relationships. They explore how early praise for being “gifted” can create a fear of failure and contribute to “failure to launch,” and share ways to shift from focusing on an idealized future to appreciating your actual self right now. They discuss…
…
continue reading

1
Would You Sell Your Password for $920?
1:14:39
1:14:39
Play later
Play later
Lists
Like
Liked
1:14:39This week on The Awareness Angle, Anthony Davis and Luke Pettigrew dive into a week full of sharp turns—from a teen hacker forcing Microsoft to rethink its bounty program, to hackers hijacking a decades-old video game to take control of PCs. Also in the mix: 64 million job seekers exposed by a single password, suspicious Google Ads requests, Instag…
…
continue reading

1
TBI Recovery & HBOT with Green Beret Wren Murray
46:50
46:50
Play later
Play later
Lists
Like
Liked
46:50Send us a text In this compelling episode of Broken Brains with Bruce Parkman, we’re joined by former U.S. Army Green Beret and co-founder of Revival Hyperbarics, Wren Murray, for a powerful discussion on traumatic brain injury (TBI), PTSD, and the groundbreaking role of hyperbaric oxygen therapy (HBOT) in veteran recovery. Wren shares his deeply p…
…
continue reading

1
Root Causes 513: Is Revocation the Best Remedy for CPS Misalignment?
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21We continue our discussion of CPS misalignment by discussing the reasons for revocation as a remedy, its disadvantages, and the possibility of another solution that provides the same benefits at less cost.By Tim Callan and Jason Soroko
…
continue reading

1
Detained & Damaged: Kids, Cash & the Trump Immigration Machine. A dumpster fire of greed, cruelty & cowardice: The human cost of the relentless, xenophobic attacks on immigrants. Do Trump's policies actually ...
59:59
59:59
Play later
Play later
Lists
Like
Liked
59:59As we rapidly approach another enormous milestone — our 100th episode (currently #98) we’ve e-x-p-a-n-d-e-d our global footprint to 131 countries. ONLY through your unyielding support could this achievement have been realized. Thank you! Immigration is a “3rd rail” hot topic in the U.S. The issues of immigration decided the ’24 presidential electio…
…
continue reading

1
Cognitive Heists series #1: The Insider -- Trust by Proximity, not Proof
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08🕵️♂️ New Deceptive Minds mini-series: Behind the Scams (Cognitive Heists) 🕵️♂️ They didn’t pick the lock. They didn’t sneak in through the vents. You held the door open for them. This week’s issue kicks off a new 10-part series: Cognitive Heist—a deep dive into the psychological exploits behind the world’s most effective social engineering attack…
…
continue reading

1
Smarter Support: HitWit’s AI Advantage (EP 874)
21:13
21:13
Play later
Play later
Lists
Like
Liked
21:13Get ready for an insightful conversation with Bhadri Varadarajan of HitWit, a PitchIT finalist at IT Nation Connect 2025. We dive into the nuts and bolts of AI-powered knowledge sharing, from onboarding and interactive learning to customer engagement and support. Bhadri explains how HitWit’s platform helps MSPs deliver fast, knowledgeable responses…
…
continue reading

1
[WARTEK] FortiWeb: Cara Cegah Website Kamu Jadi Target Hacker | ACS Group
9:20
9:20
Play later
Play later
Lists
Like
Liked
9:20Podcast ACS Group: Kupas Tuntas FortiWeb Bersama Pak Ken Lohoo & Pak Akhmad Ruslan Khariri – Cyber Security Engineer Di episode kali ini, Podcast ACS Group menghadirkan pembahasan mendalam tentang FortiWeb, solusi Web Application Firewall (WAF) dari Fortinet, yang dirancang untuk melindungi aplikasi web dari berbagai jenis serangan siber.Fungsi dan…
…
continue reading

1
Root Causes 512: CPS Versus Practices Misalignment
12:41
12:41
Play later
Play later
Lists
Like
Liked
12:41We examine the circumstance where otherwise allowed practices are out of alignment with the stated practices in the relevant CPS. We discuss CA transparency and accountability, increased scrutiny of the CPS, and mass revocation.By Tim Callan and Jason Soroko
…
continue reading