Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Risk Parity Radio is a podcast about investing located at www.riskparityradio.com. RPR explores risk-parity style portfolios comprised of uncorrelated or negatively correlated asset classes -- stocks, selected bonds, gold, managed futures, and other easily accessible fund options for the DIY investor. The goal is to construct portfolios that are robust and can be drawn down on in perpetuity, and to maximize projected Safe Withdrawal Rates regardless of projected overall returns.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Welcome to the PRMA Risk Ready podcast, the show for Risk Management Professionals in the High Net Worth Space.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Independent holistic security consultancy
…
continue reading

1
Cybersecurity, Privacy, Risk Management, Cryptocurrencies, Fintech, Information Technology
Shahid Sharif
Career guidance & consulting services in Information Technology, Cybersecurity, Privacy, Risk Management, Cryptocurrencies, & Fintech #self improvement # productivity #cybersecurity #security #privacy #risk #fintech #blockchain #cryptocurrencies
…
continue reading
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
Welcome to 'Risk Grustlers,' where we celebrate the extraordinary journeys of modern-day Risk Leaders who embrace the art of 'Grustle'—a powerful fusion of Grind and Hustle. Our podcast dives into the innovative strategies and bold decisions taken by these risk-takers, shaping the future of cybersecurity and risk management. Join us as we explore their inspiring stories, insightful advice, and cutting-edge technologies that define the alternative GRC landscape.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Integrity Risk is a podcast series by The Risk Advisory Group, a leading independent global risk consultancy. Senior members of our business intelligence teams share their deep sector and regional understanding of the risk to business from bribery and corruption, corporate crime and evolving legal regimes. The Integrity Risk series aims to provide decision-makers with clarity and insight in uncertain political, regulatory and commercial conditions, and advice on how to best protect their bus ...
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
Catch up with summaries from an average of 50 new geopolitical events daily. Subscribe to better understand geopolitical risks.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
People are often described as the largest asset in most organisations. They are also the biggest single cause of risk. This podcast explores the topic of 'human risk', or "the risk of people doing things they shouldn't or not doing things they should", and examines how behavioural science can help us mitigate it. It also looks at 'human reward', or "how to get the most out of people". When we manage human risk, we often stifle human reward. Equally, when we unleash human reward, we often ina ...
…
continue reading
Your dose of tips about all things Information Security, ICT Legislation and Risk. South African podcast.
…
continue reading
We break down how events like Russia's war in Ukraine and European security shifts are shaping Germany - and the world. Whether you’re a student, journalist, or policymaker, hosts Nina Haase, Michaela Küfner, and Richard Walker deliver the insights you need to understand where Germany is headed and why it matters, with a hint of Berlin's distinct energy. Published every Friday. Find us also on YouTube: @dwnews. Subscribe to our newsletter: dw.com/berlinbriefing. Leave us a comment here: news ...
…
continue reading
Welcome to Portfolio Perspective: Managing Risk & Seizing Opportunity, a podcast focused on the asset-based lending industry. Join Andrew Pace, Chief Client Experience Officer at Asset Compliant Solutions, as he interviews experts, shares insights, and explores strategies for managing risk, optimizing portfolio performance, and seizing opportunities in an ever-evolving financial landscape. From regulatory changes to technological advances, each episode provides actionable takeaways and deep ...
…
continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
continue reading
STRAT – Strategic Risk Assessment Talk, is a forum with a preparedness mindset. Mitigating risks, creating systems of prevention and recovery to deal with potential threats, and understanding the objectives of a Business Continuity Plan. This is the podcast for leaders who are committed to being prepared. The program is hosted by retired Marine Corps intelligence officer and strategic risk assessment professional Hal Kempfer and investment banker Mark Mansfield.
…
continue reading
I am your host, Alec Crawford, Founder and CEO of Artificial Intelligence Risk, Inc. and this is AI Risk-Reward, a podcast about balancing the risk and reward of using AI personally, professionally, and as a large organization! We will discuss hot topics such as, will AI take my job or make it better? When I ask Chat-GPT work questions, is that even safe? From an ethical perspective, is it enough for big companies to anonymize private data before using it? (Probably not.) I am discussing the ...
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading
Discover stories from real people who are living out their definition of a secure retirement.
…
continue reading
In this episode, Advent IM Security Consultant, Michael Hayes, joins Mike Gillespie to explore Secure by Design, the common misconceptions around security vs. safety, and how organisations can build with security from the ground up. Watch the Full Episode Here… SourceBy Risk And Business
…
continue reading

1
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409
1:38:33
1:38:33
Play later
Play later
Lists
Like
Liked
1:38:33Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
…
continue reading

1
Phishing for Truth: Fixing the Flaws in Security Awareness
31:53
31:53
Play later
Play later
Lists
Like
Liked
31:53Jeffrey Wheatman sits down with Cary Johnson, founder of Phishbusters Audit and Consulting, to expose the failures of traditional phishing simulations. They discuss why standard metrics fall short, how self-assessment distorts results, and what it really takes to track — and influence — behavioral change in security awareness programs.…
…
continue reading

1
Securing the Future: Technology, Compliance, and Control in Asset-Based Lending
44:28
44:28
Play later
Play later
Lists
Like
Liked
44:28ACS CFO and CIO Greg Meyer joins host Andrew Pace for a deep dive into the operational backbone of modern recovery and collections. With nearly two decades of leadership at ACS, Greg discusses the growing overlap between finance, IT, and compliance—and what it means for lenders today. From securing sensitive data to building scalable frameworks for…
…
continue reading

1
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Brian Fox, Mark Lambert, Shahar Man - ASW #332
1:04:35
1:04:35
Play later
Play later
Lists
Like
Liked
1:04:35ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
…
continue reading

1
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Shahar Man, Brian Fox, Mark Lambert - ASW #332
1:04:35
1:04:35
Play later
Play later
Lists
Like
Liked
1:04:35ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
…
continue reading

1
Making sense of Governance, Risk, and Compliance (GRC) in Small Business
1:27:28
1:27:28
Play later
Play later
Lists
Like
Liked
1:27:28The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! This time, Accidental CISO is joined by guest host Dr. Gerald Auger, PhD. Gerald is the managing partner at Coastal Information Security Group, an adjunct professor of cybersecurity at…
…
continue reading

1
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
…
continue reading

1
Episode 423: ALLW (It's New!), Social Security Claiming Considerations And Dividend Delusions
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35In this episode we answer emails from Dave, Jeff and Peter. We discuss a new risk parity ETF, ALLW, a social security claiming question and considerations, and how a listener has been misled regarding so-called dividend investing by misinterpreting a misleading source. Links: Father McKenna Center Donation Page: Donate - Father McKenna Center ALLW …
…
continue reading
What do people have to do with cybersecurity? A lot. As with other fields of human risk, it’s people that are typically the root cause of problems in the cybersecurity world. Which is where my guest’s expertise in behavioural design comes into play. On this episode, I’m speaking with Sarah Aalborg, a cybersecurity and behavioural design expert who’…
…
continue reading

1
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Dr. Aleksandr Yampolskiy, Lenny Zeltser - BSW #394
1:04:40
1:04:40
Play later
Play later
Lists
Like
Liked
1:04:40In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (lik…
…
continue reading

1
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Lenny Zeltser, Dr. Aleksandr Yampolskiy - BSW #394
1:04:40
1:04:40
Play later
Play later
Lists
Like
Liked
1:04:40In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (lik…
…
continue reading
…
continue reading

1
S7E29 - A Conversation with Brian Liceaga
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37Brian Liceaga is the SVP, Cybersecurity at Qubika, where they are shaping the future of next-generation applications by seamlessly integrating high-quality UX, robust security, and AI-driven intelligence. Join us as we discuss AI in cybersecurity, starting and exiting a business, and what a "carbon analyst" is (it may be related to V'Ger).…
…
continue reading
Join us for the June 3, 2025 edition of the Geopolitical Report Daily Podcast. On Monday, we mapped 68 events, including the election of a new president in Poland.By Geopolitical Report
…
continue reading

1
AIs, MCPs, and the Acutal Work that LLMs Are Generating - ASW #333
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
…
continue reading

1
AIs, MCPs, and the Acutal Work that LLMs Are Generating - ASW #333
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
…
continue reading

1
AIs, MCPs, and the Acutal Work that LLMs Are Generating - ASW #333
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
…
continue reading

1
Daniel Goddard on Dysko and the Future of AI-Powered Networking
43:50
43:50
Play later
Play later
Lists
Like
Liked
43:50In the AI Risk Reward podcast, our host, Alec Crawford (@alec06830), Founder and CEO of Artificial Intelligence Risk, Inc. aicrisk.com interviews guests about balancing the risk and reward of Artificial Intelligence for you, your business, and society as a whole. Podcast production and sound engineering by Troutman Street Audio. You can find them o…
…
continue reading

1
S35 Ep1: Retaining Control: Empowering Innovation Without Losing Sight of Risk
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18Today, Steve Durbin and ISF Podcast Producer Tavia Gilbert are in conversation exploring the role of cybersecurity, governance and leadership in an age defined by rapid technological transformation. Artificial intelligence is now woven into daily business operations, risk models, customer engagement, and more. And while its benefits are significant…
…
continue reading

1
SANS Stormcast Tuesday, June 3rd, 2025: Windows SSH C2; Google Removes CAs from trusted list; MSFT issues Emergency Patch to fix Crash issue; Qualcom Adreno GPU 0-day
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
…
continue reading

1
Is Security Well-Positioned to Influence Decisions Around School System Funding and Arming Guards?
26:30
26:30
Play later
Play later
Lists
Like
Liked
26:30Brandon Payne, executive director for the National Council on School Facilities, joins this month’s episode of Security Management Highlights to discuss how to integrate security and safety into school facility planning and funding during both retrofits and new builds. Then, Kevin Jones, CPP, PCI, addresses key considerations for arming security pr…
…
continue reading

1
SANS Stormcast Monday, June 2nd, 2025: PNG with RAT; Cisco IOS XE WLC Exploit; vBulletin Exploit
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently p…
…
continue reading
Join us for the June 2, 2025 edition of the Geopolitical Report Daily Podcast. On Sunday, we mapped 51 events, including several major attacks deep inside Russia between Saturday and Sunday.By Geopolitical Report
…
continue reading

1
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409
1:38:33
1:38:33
Play later
Play later
Lists
Like
Liked
1:38:33Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
…
continue reading

1
Pwnagotchi: The AI Pet That Hunts Your Network Credentials
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24What happens when you cross a Tamagotchi with a Wi-Fi hacking tool? You get the Pwnagotchi—a pocket-sized device that "feeds" on Wi-Fi handshakes and learns from its environment. In this episode, Jayden Troffler and Cameron Birkland join the crew to demonstrate how this deceptively cute device can passively capture encrypted Wi-Fi credentials from …
…
continue reading

1
What is AI, ChatGPT, Claude, Gemini, Perplexity:Explained in Simple Terms
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00🚀 FINALLY UNDERSTAND AI: The Complete Beginner's Guide to ChatGPT, Claude & The Future Feeling overwhelmed by AI news? You're not alone! This comprehensive guide demystifies artificial intelligence for everyone. 📖 WHAT YOU'LL LEARN: • What ChatGPT, Claude, Gemini really are (and how they differ) • Why these aren't truly "intelligent" yet • How AI h…
…
continue reading

1
Dr Chengwei Liu on Luck & Serendipity
1:03:59
1:03:59
Play later
Play later
Lists
Like
Liked
1:03:59Have you ever wondered how much of your success is down to luck? What if the world is far less fair and predictable than we’d like to think? On this episode, I explore the complex and fascinating role of luck in our lives and decisions with Dr. Chengwei Liu, Associate Professor of Strategy and Behavioural Science at Imperial College London. Chengwe…
…
continue reading

1
Episode 428: A Cornucopia Of Listener Generosity, Intermediate Term Portfolios, Resources And Portfolio Reviews As Of May 30, 2025
44:00
44:00
Play later
Play later
Lists
Like
Liked
44:00In this episode we answer emails from Anonymous, Tim, Mark and Luc. We celebrate the overwhelming generosity of our listeners and discuss using risk parity style portfolios for intermediate savings, heavy metal, tax efficient portfolio management, and some investing and retirement resources. And THEN we our go through our weekly and monthly portfol…
…
continue reading
Join us for the June 1, 2025 edition of the Geopolitical Report Daily Podcast. On Saturday, we mapped 57 events, including Hamas responding to a new ceasfire deal brokered by the US.By Geopolitical Report
…
continue reading
Do you use any application more than your browser? No, we didn't think so. But which is the best browser for your needs, and how do you know you're browsing safely. The team discusses. #Priviso #PrivisoLive #Security #informationsecurityBy Anthony Olivier
…
continue reading
Join us for the May 31, 2025 edition of the Geopolitical Report Daily Podcast. On Friday, we mapped 55 events, including continuing protests in Tripoli.By Geopolitical Report
…
continue reading

1
The Evolution of Patch Management with Eric Schultze
24:02
24:02
Play later
Play later
Lists
Like
Liked
24:02Join us for a stroll down patch memory lane! Ivanti's Chris Goettl invites an old colleague to the show -- Eric Schultze, a former software development leader at Amazon, Microsoft, and Shavlik Technologies -- to look back on the early days of Patch Tuesday and how patch management has evolved over the decades since. Join the conversation online on …
…
continue reading

1
Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland... - SWN #481
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-481
…
continue reading

1
Why is Germany toughening its tone on Israel now?
40:03
40:03
Play later
Play later
Lists
Like
Liked
40:03When Germany's Chancellor speaks out on international law violations by Israel, it signals a shift. We explore Germany’s evolving stance on Israel, and how Staatsräson shapes the line between political criticism and accusations of antisemitism. Plus, what Merz’s backing of Ukraine’s missile program says about his global ambitions — and how he aims …
…
continue reading

1
The Digital Fourth Amendment with Orin Kerr
1:08:36
1:08:36
Play later
Play later
Lists
Like
Liked
1:08:36The Cyberlaw Podcast is back from hiatus – briefly! I’ve used the hiatus well, skiing the Canadian Ski Marathon, trekking through Patagonia, and having a heart valve repaired (all good now!). So when I saw (and disagreed with ) Orin Kerr’s new book, I figured it was time for episode 502 of the Cyberlaw Podcast. Orin and I spend the episode digging …
…
continue reading

1
Promoting Wellness Among Security Teams in the Midst of Crisis
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Danielle Weddepohl, Director of Public Safety and Emergency Management at George Brown College, discusses how to promote wellness among security teams.
…
continue reading
Join us for the May 30, 2025 edition of the Geopolitical Report Daily Podcast. On Thursday, we mapped 68 events, including protests returning to the streets of Nepal.By Geopolitical Report
…
continue reading

1
SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2;
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
…
continue reading
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
…
continue reading

1
No More Compliance Theater: Meet Real Security Compliance with Adam Brennick
1:19:31
1:19:31
Play later
Play later
Lists
Like
Liked
1:19:31Is it time to rethink SOC 2? (Spoiler: Adam thinks so—and he’s got the receipts.) In this insightful episode of Security & GRC Decoded, Adam Brennick, Director of Security Risk & Compliance at Cockroach Labs, joins Raj to challenge the status quo of SOC 2, compliance culture, and how GRC teams should operate in a modern, engineering-driven world. W…
…
continue reading
From the ISACA Middle Tennessee conference, March 2025. Dan Houser is a vCISO; 2024 Chair of the Board, ISC2; advisory strategist board member, NACD Certified Director, and more. He enables the business to take on more risk, safely, to acquire new markets, open new countries of operation and make connections that were impossible before. He helps or…
…
continue reading

1
Why Cybersecurity Professionals Lie on Their Resumes
32:19
32:19
Play later
Play later
Lists
Like
Liked
32:19All images and links can be found on CISO Series. Check out this post by Gautam ‘Gotham’ Sharma of AccessCyber for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is Krista Arndt, associate CISO, St. Luke’s University Hea…
…
continue reading

1
Live from CISO XC DFW: Unfiltered Lessons in Modern Cybersecurity
21:29
21:29
Play later
Play later
Lists
Like
Liked
21:29Sponsor: HivePro (www.hivepro.com) EP67: Threat Exposure Clarity, CISO Certification Origins & Startup Security Strategy Live from CISO XC DFW, this episode of The Professional CISO Show features two powerhouse conversations. First, David Malicoat sits down with Critt Golden of Hive Pro to demystify Continuous Threat Exposure Management (CTEM) and …
…
continue reading

1
Iran opens possibility of US inspectors for nuclear program
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36Join us for the May 29, 2025 edition of the Geopolitical Report Daily Podcast. On Wednesday, we mapped 62 events, including the possibility of Iran allowing US inspectors of their nuclear program.By Geopolitical Report
…
continue reading