Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
We Cover the Cyberspace.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
"Securing Our Place In The Industry" The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
…
continue reading
A podcast for anyone and everyone interested in leadership in the cybersecurity industry - we talk about the challenges impacting our industry & how leadership can address that and gain insights, advice and the occasional anecdote from experienced leaders who are happy to share their stories with us!
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
The Cyber Nerds - Beyond The Sofa's Podcast Reviews. Discussions. Arguments. Beyond the Sofa is the official podcast from the best YouTube reactors on the planet. Tune in to weekly episodes.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading

1
Microsoft for Startups: The benefits of the cyber startup ecosystem. [Special Edition]
1:15:15
1:15:15
Play later
Play later
Lists
Like
Liked
1:15:15Welcome to the Microsoft for Startups Spotlight, brought to you by N2K CyberWire and Microsoft. In this episode, we are shining a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. This episode is part of our exclusive RSAC series where we dive into the real world impact of the Microsoft fo…
…
continue reading

1
Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure
1:36:41
1:36:41
Play later
Play later
Lists
Like
Liked
1:36:41Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure 03:11 Vulnerabilities and Weaknesses in Critical Infrastructure 10:0…
…
continue reading

1
The AI Governance Mentors Series - Walter Haydock
8:17
8:17
Play later
Play later
Lists
Like
Liked
8:17ABOUT THIS EPISODE: The Blak Cyber podcast presents "The AI Governance Mentors Series, Episode 1 featuring Walter Haydock, owner of Stackaware, an AI Governance consulting company. Please subscribe and share to support this podcast. Be sure to tap the "SUBSCRIBE" buttonl! Walter's LinkedIn: https://linkedin.com/in/walter-haydock Walter's Website: h…
…
continue reading

1
Hackers Breach Morocco's Social Security Database in an Unprecedented Cyberattack...Ep.21
10:12
10:12
Play later
Play later
Lists
Like
Liked
10:12- Cybersecurity in South Africa: How The Cell C and SABS Attacks Could Have Been Prevented. - Hackers Breach Morocco’s Social Security Database in an Unprecedented Cyberattack. - Kaspersky Flags Surge in Cyber Threats Across Africa in The GITEX Africa April 2025 Conference. - Google Says "Fibre Optic Should Be Considered 'Critical Infrastructure' i…
…
continue reading

1
Man CONTINUES sending money to his military girlfriend!
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26Man CONTINUES sending money to his military girlfriend! [1]
…
continue reading

1
The Security Wizard's Toolkit: Versatility as a Cyber Superpower with Devrryn Jenkins
1:04:42
1:04:42
Play later
Play later
Lists
Like
Liked
1:04:42From bench tech to business owner, Devrryn Jenkins brings his multifaceted journey in offensive security to this week's episode. We explore how his experience across organizations of all sizes shaped his unique approach to red team operations and his philosophy that being a "jack of all trades is oftentimes better than a master of one." Devrryn sha…
…
continue reading

1
Week in Review: Secure by Design departure, Microsoft’s security report, LLMs outrace vulnerabilities
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bethany De Lude, CISO emeritus, The Carlyle Group Thanks to our show sponsor, Dropzone AI Alert investigation is eating up your security team’s day—30 to 40 minutes per alert adds up fast. Dropzone AI‘s SOC Analyst transforms this rea…
…
continue reading

1
Cyber Focus Presents: To the Point - Episode 1 - with Chris Inglis and George Barnes
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58To the Point is a new video series from the McCrary Institute for Cyber and Critical Infrastructure Security, found here at Threat Beat. Hosted by McCrary Institute Director Frank Cilluffo, the series delivers fast-moving, high-impact conversations with top national security and cybersecurity leaders. Each episode tackles big ideas with clarity and…
…
continue reading

1
(Replay) How To Defend Against Lateral Movement
37:48
37:48
Play later
Play later
Lists
Like
Liked
37:48In this replay, Spencer and Brad dive into lateral movement, discussing various techniques like RDP, RATs, Impacket tools, PsExec, PTH, PTT, and PowerShell Remoting. They explain how attackers use these methods to gain unauthorized access, evade detection, and enable malicious activities. They also discuss precursors to lateral movement and strateg…
…
continue reading
Show notes Follow Femi https://www.linkedin.com/in/femiogunji Watch Femi’s YouTube channel https://m.youtube.com/@TheCyberSecMigrant Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberweekly Like and Follow our X page https://twitter.com/thecyberweekly Follow Deogratius Okello https://www.linkedin.com/in/deo-okello/ https://…
…
continue reading

1
Government backdoors into the world’s social media giants and setting ethical standards online
24:41
24:41
Play later
Play later
Lists
Like
Liked
24:41In this episode of the Cyber Uncut podcast, Daniel Croft and Liam Garman sit down to unpack whether the federal government’s social media age restrictions really address the risks young Australians face online and how governments are looking to create backdoors into social media and tech giants. They begin the podcast by discussing Meta’s AI-enable…
…
continue reading

1
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues;
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
…
continue reading

1
Cyber Defense Radio – Varun Kohli – Cequence – Hotseat Podcast – 2025
11:59
11:59
Play later
Play later
Lists
Like
Liked
11:59🎙️ Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this insightful episode of Cyber Defense Radio features Varun Kohli, Chief Marketing Officer of Cequence — a leading force in API security and application protection, safeguarding billions of API calls daily from abuse, fraud, and advanced threats. In this power-packed conversation, …
…
continue reading

1
Telegram Exposed: The Super App Enabling Cyber Crime
53:28
53:28
Play later
Play later
Lists
Like
Liked
53:28In episode 36, Josh welcomes renowned intelligence systems expert Stephen Arnold to shine a light on one of the most underestimated threats in cybersecurity today—Telegram. Known to most as a simple messaging app, Telegram is quietly operating as a “super app” for cyber crime. From crypto laundering and hamster games masking gambling platforms, to …
…
continue reading

1
19. What is good security awareness training? How you can make great courses for your company (With Tue Saltofte Lund - Digital Learning Specialist at CyberPilot)
18:49
18:49
Play later
Play later
Lists
Like
Liked
18:49We have a new podcast episode live after a winter break. This time, we got digital learning specialist Tue Saltofte Lund in the studio to discuss what makes good security awareness training is. This means you can listen to a lot of gold nuggets about: - Why your courses must be practical for your employee's everyday life - How we structure courses …
…
continue reading

1
Episode 5- Navigating Cyber Threats During Healthcare Acquisitions. With Louis Wright.
35:49
35:49
Play later
Play later
Lists
Like
Liked
35:49In this episode of "Cyber Survivors," host Dan Dodson and guest Louis Wright delve into healthcare cybersecurity challenges, particularly during acquisitions. Louis shares insights as the CISO of USA Health and describes how they navigated a cyber attack on a legacy system during a transition period. They emphasize the importance of comprehensive d…
…
continue reading

1
Orit Benvenisti partner & CEO @Tigbur Group about how to build cyber culture & "raise the walls"
59:12
59:12
Play later
Play later
Lists
Like
Liked
59:12לאורך כל הריאיון היה ברור שמדובר בזן אחר של מנכ"ל עם גישה שונה, ניהול חברה המעסיקה עשרות אלפי מועסקים, כ-700 עובדי מנהלה ב-40 סניפים מחד, והרצון להבין מאידך, יוצרים תמהיל לא פשוט לכול הנהלה והעומדת בראשה. עו"ד הדס תמם בן אברהם סגנית הדיקן בקריה האקדמית אונו ונחשון פינקו אוונגליסט סייבר מארחים את אורית בנבנישתי שותפה ומנכ"ל קבוצת תיגבור בשיחה על ראי…
…
continue reading

1
The Antwerp Diamond Heist: Lessons for Cybersecurity
48:26
48:26
Play later
Play later
Lists
Like
Liked
48:26What can the largest diamond heist in history teach us about modern cybersecurity? When $100 million in diamonds vanished from Belgium's supposedly impenetrable Diamond Center vault, it wasn't cutting-edge technology that failed—it was people and processes. Join host Aaron Pritz and senior cybersecurity consultant Rebecca as they unpack the fascina…
…
continue reading

1
The Rise of Fast Flux and its Threat to National Security - Ep 146
16:56
16:56
Play later
Play later
Lists
Like
Liked
16:56In this episode of Reimagining Cyber, Tyler Moffitt, Senior Security Analyst at OpenText Cybersecurity, explores the evolution of fast flux — a once obscure spamming tactic that has now become a serious national security concern. Learn how this evasive DNS technique enables ransomware groups and nation-state actors to stay resilient, hide their inf…
…
continue reading

1
System and Information Integrity | Guide To NIST 800-171
10:52
10:52
Play later
Play later
Lists
Like
Liked
10:52Welcome to episode fifteen of our NIST 800-171 series ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/alerts/ to subscribe. ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @secd…
…
continue reading

1
Why Cybersecurity in Academia Requires Mission-Driven Leadership
38:39
38:39
Play later
Play later
Lists
Like
Liked
38:39In this episode… Shane Wilson shares what makes the IT landscape in academia so distinct—and so difficult. At Centre College, 1,400 students bring over 3,500 personal devices onto the campus network. While most businesses can control their endpoints, higher education must prioritize openness and access. Shane explains how technologies like AI-based…
…
continue reading

1
CYFIRMA Research: Cyber Espionage Among Allies- Strategic Posturing in an Era of Trade Tensions
8:44
8:44
Play later
Play later
Lists
Like
Liked
8:44The CYFIRMA research team provides a comprehensive analysis of how diplomacy, defense, and digital strategy are colliding: As trade friction intensifies especially under the 2025 U.S. tariff regime, cyberspace is becoming the frontier of quiet competition between traditional allies. While full-scale cyber warfare remains unlikely, behind-the-scenes…
…
continue reading
In this heartfelt season finale, Darnley takes a step back to reflect on the journey so far — from quiet beginnings during the COVID-19 shutdowns to building a global community of digital thinkers, privacy advocates, and cyber-curious minds. Join us as we reminisce about standout moments from Season 5, and real stories that brought cybersecurity in…
…
continue reading

1
Game Plans and Playbooks: Building and Implementing a Cybersecurity Strategy
34:16
34:16
Play later
Play later
Lists
Like
Liked
34:16Christina Morillo, Head of Information Security at the National Football League’s New York Giants joins Ann on this week's episode of Afternoon Cyber Tea. Christina discusses the ins and outs of building a resilient cybersecurity strategy, the importance of entering organizations with curiosity—not checklists—and why listening is always her first s…
…
continue reading

1
When AI Goes Rogue: API Security in the Age of AI Agents | Guest Sam Chehab
49:35
49:35
Play later
Play later
Lists
Like
Liked
49:35Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Today on Cyber Work, Sam Chehab, the head of security and IT at Postman, dives into API security and the intriguing concept of rogue AI agents. Chehab discusses the internal c…
…
continue reading
The CVE program is essential for tracking vulnerabilities all across the technology industry, but what happens when funding is cut? Let's talk about what's been going on with the CVE program. Sources: https://pastebin.com/QPVXe6kDBy Chloe Thonus
…
continue reading

1
Inside the Truck Cyber Threat – PlaxidityX Ep 21
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45With cyber attacks on trucks becoming more common and costly, fleet operators and OEMs must rethink how they protect their vehicle security and data privacy. Trucks are no longer isolated units, they're part of a larger, interconnected automotive ecosystem vulnerable to disruption. In this episode, we unpack the threats, explore real-world hacking …
…
continue reading
Shoot us a Message and It might feature on our next Podcast Episode! S1.E5 - With Interest A day in the life of Matt Murdock gets unexpectedly intense, forcing him to team up with a familiar face. S1.E6 - Excessive Force When a serial killer terrorizes the streets of New York, the city needs a savior. Support the show Watch our exclusive content an…
…
continue reading
How does Incident Response in ICS/OT/SCADA work? In this episode of Simply ICS Cyber, Don and Tom welcome Kai Thomsen, Director of Global Incident Response Services at Dragos. Join us as we answer the questions below and provide more insight into how IR works in OCS, OT, and SCADA: - Is DFIR the same on the OT side as the IT side? - What are some o…
…
continue reading

1
teissTalk: Cyber-resilience – your last line of defence
45:10
45:10
Play later
Play later
Lists
Like
Liked
45:10Preparing for ransomware - where is your data and how is it protected? Building cyber resilience for your data, across on-premises and cloud Reducing the window of damage and minimising the time to recover This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Heather Lowrie, Independent Advisor, Earthgard Ltd https://www…
…
continue reading

1
Episode 451 - Connecting & Protecting in the Age of AI
58:47
58:47
Play later
Play later
Lists
Like
Liked
58:47In today’s security world, there are numerous security solutions that can limit access to company data and IT resources and lock down access. However, when it comes to using AI apps and their back-end models, the answer is not so simple. In this session we take a deep-dive into the challenge that Cisco saw looming on the horizon years ago and has c…
…
continue reading

1
Defensive Security Podcast Episode 303
1:01:33
1:01:33
Play later
Play later
Lists
Like
Liked
1:01:33Summary In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including the rise of ransomware, the importance of backup strategies, and the implications of AI in phishing attacks. They discuss into the challenges of managing non-human identities and the need for effective communi…
…
continue reading

1
Resilient Cyber: Ravid Circus - Tackling the Prioritization Crisis in Cyber
23:02
23:02
Play later
Play later
Lists
Like
Liked
23:02In this episode, we sit down with the Co-Founder and CPO of Seemplicity, Ravid Circus, to discuss tackling the prioritization crisis in cybersecurity and how AI is changing vulnerability management. We dove into a lot of great topics, including: The massive challenge of not just finding and managing vulnerabilities but also remediation, with Seempl…
…
continue reading

1
In Conversation With Alexander Feick, VP of eSentire Labs
1:19:34
1:19:34
Play later
Play later
Lists
Like
Liked
1:19:34In today's episode of the Cyber Culture Café series, Andy and John speak to Alexander Feick, VP of our eSentire Labs team. As the VP of Labs, Alex Feick leads a team responsible for fostering innovations from security professionals on our platform and integrating new technologies into the company's services. Over the past year, his efforts have cen…
…
continue reading
Can AI act as your compliance officer and protect your privacy? On episode #74, personal.ai co-founder Suman Kanuganti talks AI personas, data security & the future of private, personal AI products.By Extra Something Media
…
continue reading

1
Cybersecurity Recruiter/Founder talks Entrepreneurship, Startups, and the state of the Job Market.
38:20
38:20
Play later
Play later
Lists
Like
Liked
38:20Josh Keeley is a Co-Founder of Trident Search, a cybersecurity recruiting agency specializing in early state cybersecurity startups. He talks about his journey as an entrepreneur, cybersecurity startups, and the current state of the job market.By RealTime Cyber
…
continue reading

1
Leading Cyber - in conversation with Heather Lowrie
58:03
58:03
Play later
Play later
Lists
Like
Liked
58:03In this episode, we talk with Heather Lowrie, experienced CISO and independent advisor about the importance of resilience as a core leadership trait, how responsbility for cyber leaders extends beyond the boundaries of our organisations and finally we touch on how we address the challenges for women in cybersecurity leadership specifically. It's a …
…
continue reading

1
Ep. 93 David Rock drops by for a chat on SME v. Large Enterprise Risk
13:24
13:24
Play later
Play later
Lists
Like
Liked
13:24Send us a text Ep. 93 of the Cyber Law Revolution is live! Thrilled to have David Rock, chief claims officer at Trium, with us to discuss SME v. large enterprise risk, biggest fear from a claims perspective for large enterprise breaches, vendor incidents, and a lot more! You won’t want to miss his insight! Keep the questions, calls, comments, etc. …
…
continue reading