Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
The GovCIO Media & Research podcast network comprises GovCast, CyberCast and HealthCast featuring conversations with key leaders on timely issues impacting the federal IT landscape. Topics include cybersecurity, artificial intelligence, cloud computing, IT modernization, data analytics, workforce development and more. New episodes release each Tuesday.
…
continue reading
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
…
continue reading
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
…
continue reading
Audio Briefs brings you CSIS publications in audio form. Listen to short, spoken-word summaries from CSIS experts about their latest reports, or hear a full audio version of any CSIS commentary.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
Industry experts break down the latest news & trends in employee benefits, healthcare reform, regulations and compliance, designed to empower executive decisions.
…
continue reading
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
…
continue reading
This Podcast is Hosted by Raghu Krishna. He wants to bring in interesting people who he has meet and feel that they have intresting story to tell to the world. Not all of the interviews have to be from celebrities to give some advice or for people to watch/hear. Every person has a story to tell and a lesson that we all can learn from.
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
U.S. Army Garrison Bavaria's Better in Bavaria podcast, where we share stories and highlight the people behind them - the Soldiers and Army civilians who support our readiness mission all while making our community a great place to work, live and raise a family. - Hosted by Linda A. Read and Andreas Kreuzer - Produced by Kayla Overton, Natalie Simmel, and Ella Händel
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
“WHERE ARE THE WOMEN IN CYBER?” The Landscape In 2022 the cyber security field still consists of 24% women and only 2.2% LGBTQ+ minorities. Long-perpetuated gender, age, and demographic biases held by the ‘Baby Boomer’ and Gen-X groups have led to a severe gap in the representation and advancement of women and minorities in this field. Millennials entered the workforce and attempted to forge a new way by asking for small changes; but definitely conceding others. Currently the Boomers/Gen-X a ...
…
continue reading
🎙️ Dive into the world of cybersecurity with Cubic Lighthouse Podcast - your expert companion in navigating the latest developments and crucial topics in the field. We dissect complexities, provide strategic insights, and ensure you stay abreast of cutting-edge trends. Whether you're a seasoned professional or a cybersecurity enthusiast, join us for concise expertise and actionable intelligence to enhance your security posture. 🌐🔐
…
continue reading
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
…
continue reading

1
Federal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
John Gilroy
The federal government spends $90 billion on technology every year. If you are a tech innovator and want to expand your share of the market, this is the podcast for you to find new opportunities for growth. Every week, Federal Tech Podcast sits down with successful innovators who have solved complex computer system problems for federal agencies. They cover topics like Artificial Intelligence, Zero Trust, and the Hybrid Cloud. You can listen to the technical issues that concern federal agenci ...
…
continue reading
Bite-sized information about cybersecurity for not-for-profit boards and leaders. In each episode we help leaders of not-for-profits to understand the information security risks to their organisations and they leave with at least one actionable insight that they can put into practice. It also features interviews with not-for-profit leaders sharing their cybersecurity journey, insights and lessons learned.
…
continue reading
Designed to challenge old-school business practices and the traditional business suit culture, on unsuitable on Rea Radio you'll hear industry professionals speak about meaningful, modern solutions to help you enhance your company’s growth. Hosted by Doug Houser.
…
continue reading
The BCI Podcast features conversations with business continuity & resilience professionals from around the world offering insight and guidance on current affairs topics affecting businesses around the globe, as well as tips and insight into career development within the industry.
…
continue reading
The purpose of this podcast is to provide unclassified information about current trends in homeland security for the state of New Jersey, as well as educational information and resources for your awareness.
…
continue reading
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
…
continue reading
Unhackable - a virtually impossible state of being only made plausible through consistent cybersecurity best practices by everyone simultaneously. This is Unhackable, the authoritative Security podcast about deception and personal security. Can you ever be truly Unhackable? No, nobody can. But every episode is designed to help you move forward using actionable cybersecurity best practices that are within reach of everyone. We help you take the steps needed to solve your most important Cybers ...
…
continue reading
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
…
continue reading
Closing The Gender Pay Gap is the podcast for thoughtful HR leaders in technology and cybersecurity companies who want to do more to develop and retain their female talent. Sharing tips, techniques and talent pipeline strategies to help technology companies do more to attract, develop and retain female talent to strengthen the female talent pipeline and close the gender pay gap. From promotions to pay cheques, latest figures reveal men are still out-earning women at work in the technology se ...
…
continue reading
An audio version of “Criteria for Cyber Situational Awareness,” a new commentary by CSIS's Julia Brock and James Andrew Lewis. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
…
continue reading

1
S3 E7: Cybersecurity Chat with Chuck Sapp | From Military Service to Cyber Awareness
38:06
38:06
Play later
Play later
Lists
Like
Liked
38:06Join hosts Josh and Wade as they sit down with Charles (Chuck) Sapp, a seasoned cybersecurity expert and security awareness specialist. In this episode, Chuck shares his unique journey from serving in the Marine Corps to becoming an influencer in the cybersecurity community. Gain insights into his military background, his passion for educating othe…
…
continue reading

1
20. Why you should do Security Awareness Training and how to get started (With Fredrik Nielsen - Partner and Product Owner at CyberPilot)
27:47
27:47
Play later
Play later
Lists
Like
Liked
27:47Fredrik Nielsen who is partner in CyberPilot joins the podcast. He talks about why you should do Security Awareness Training. He comes across: Why Security Awareness training shouldn't just be for compliance Why culture and behavioral change should be the goal Why you should care about your employees when doing training 3 principles to implement in…
…
continue reading

1
Ep. 238 How Federal Agencies Can Achieve Cyber-Resilient Data Protection and Recovery
26:33
26:33
Play later
Play later
Lists
Like
Liked
26:33AFCEA’S TechNet Cyber conference held in Baltimore, Maryland was the perfect opportunity to sit down with Greg Carl, Principal Technologist from Pure Storage. Pure Storage is used by 175 federal agencies. Time to sit down from a subject matter expert and explain their value proposition. Today’s federal government is attempting to accomplish digital…
…
continue reading

1
Caught: The Williams Woods Identity Theft Story - A Shocking Twist.
42:29
42:29
Play later
Play later
Lists
Like
Liked
42:29The Williams Woods Story. What Happens when Your Identity is Stolen. Video Episode: https://youtu.be/mBU3J-4vKww Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our …
…
continue reading
Think your clever password is hacker-proof? Think again. In this episode, Darnley dives into why our very human brains—full of favorite pets, TV shows, and birthdates—are no match for modern password-cracking tools. With AI now guessing passwords better than ever, it's time to rethink how we protect our digital lives. Tune in to learn what’s really…
…
continue reading

1
Ep. 241 The Role of Augmented AI in Modernizing Federal Agencies
26:45
26:45
Play later
Play later
Lists
Like
Liked
26:45Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com GitLab has been around for ten years and has garnered a reputation for helping federal agencies ensure compliance with stringent government standards. Today, we sat down with Joel Krooswick from GitLab to discuss …
…
continue reading

1
What the Court’s Ruling on Trump’s Tariffs Means for U.S. Trade Policy and the Economy
12:12
12:12
Play later
Play later
Lists
Like
Liked
12:12An audio version of “What the Court’s Ruling on Trump’s Tariffs Means for U.S. Trade Policy and the Economy,” a new Critical Questions by CSIS’s Philip Luck. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
…
continue reading

1
CYFIRMA Research- While Trump Disrupts World Order China Prepares for War Over Taiwan
11:29
11:29
Play later
Play later
Lists
Like
Liked
11:29Read CYFIRMA’s latest geo-political analysis, regarding Trump’s continued disruption of the world order, calling U.S. alliances into question while an emboldened China prepares for war over Taiwan. Link to the Research Report: https://www.cyfirma.com/research/while-trump-disrupts-the-world-order-china-prepares-for-war-over-taiwan/ #Geopolitics #CYF…
…
continue reading

1
Educational Exchange as a Strategic Priority in U.S.-Mexico Relations
20:49
20:49
Play later
Play later
Lists
Like
Liked
20:49An audio version of “Educational Exchange as a Strategic Priority in U.S.-Mexico Relations,” a new commentary by Juliana Rubio, Julie Baer, Eitan Casaverde. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
…
continue reading

1
Russia Conducts Largest Air Attack on Ukraine to Date
8:23
8:23
Play later
Play later
Lists
Like
Liked
8:23An audio version of “Russia Conducts Largest Air Attack on Ukraine to Date,” a new Critical Questions by CSIS’s Yasir Atalan and Benjamin Jensen. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
…
continue reading

1
What’s Missing from the U.S. Debate on Electric Vehicles?
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56An audio version of “What’s Missing from the U.S. Debate on Electric Vehicles?,” a new commentary by Ilaria Mazzocco. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
…
continue reading

1
The Role of Social Media in Cartel Recruitment
18:08
18:08
Play later
Play later
Lists
Like
Liked
18:08An audio version of “The Role of Social Media in Cartel Recruitment,” a new Commentary by CSIS’s Rubi Bledsoe. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
…
continue reading

1
Phishing for Truth: Fixing the Flaws in Security Awareness
31:53
31:53
Play later
Play later
Lists
Like
Liked
31:53Jeffrey Wheatman sits down with Cary Johnson, founder of Phishbusters Audit and Consulting, to expose the failures of traditional phishing simulations. They discuss why standard metrics fall short, how self-assessment distorts results, and what it really takes to track — and influence — behavioral change in security awareness programs.…
…
continue reading

1
Shark in the Water! Quantifying Your Chances of Getting Hacked 🔥
58:25
58:25
Play later
Play later
Lists
Like
Liked
58:25🔥New Episode🔥 Former Intelligence Officer, Dan Elliott, current head of Zurich Resilience, joins us and we discuss: 🎯new ways to fight cyber crime, 🎯how to get prepared for a breach, and 🎯how to manage risk in small business. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-77…
…
continue reading

1
Episode 070 - Advancing Exposure Management - Jorge Orchilles
38:19
38:19
Play later
Play later
Lists
Like
Liked
38:19Advancing Exposure Management Hear from Jorge Orchilles, Senior Director at Verizon, on the shift from traditional vulnerability management to modern exposure management and the critical role proactive security plays in staying ahead of threats. + + + Find more episodes on YouTube or wherever you listen to podcasts, as well as at netspi.com/agentof…
…
continue reading

1
Overcoming Bias in Tech and Cybersecurity.
43:22
43:22
Play later
Play later
Lists
Like
Liked
43:22Lynn Dohm, head of Women in Cyber Security (WiCyS) and one of the top women in cyber security, joins us. Come learn benefits of attending security conferences, best ways to keep up to date on security news, and ways to stop bias in cyber security. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact N…
…
continue reading

1
GovCast: How Integrated Analytics Can Break Federal Data Silos
10:47
10:47
Play later
Play later
Lists
Like
Liked
10:47Government agencies collect vast amounts of data, but accessing and using that data effectively has long been a challenge. Ahu Yildirmaz and the team at the Coleridge Initiative are working to change that. By providing secure data-sharing platforms, advanced analytics training and tools for cross-agency collaboration, the organization is helping po…
…
continue reading

1
Real-World Cyber Threats in Healthcare: Balancing Tech, Training, and Human Safety
29:59
29:59
Play later
Play later
Lists
Like
Liked
29:59Cybersecurity in healthcare is facing heightened challenges as regulations shift, IoT devices proliferate, and ransomware attacks become increasingly devastating. Josh Spencer, Founder, and CIO at FortaTech Security and with over fifteen years in the field including time as CISO/CTO at UT Southwestern, explores why HIPAA changes are necessary, the …
…
continue reading

1
The Maduro Regime Held Another Sham Election—What Happens Now?
18:24
18:24
Play later
Play later
Lists
Like
Liked
18:24An audio version of “The Maduro Regime Held Another Sham Election—What Happens Now?,” a new Critical Questions by CSIS’s Ryan C. Berg, Christopher Hernandez-Roy, Juliana Rubio, Henry Ziemer, Rubi Bledsoe, and Natalia Hidalgo. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
…
continue reading

1
FBI Most Wanted. Ruja Ignatova. Story of OneCoin.
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39This is the True Cyber Crime Story of Ruja Ignatova A/K/A The Crypto Queen, on the FBI’s Top 10 MOST WANTED. She is wanted and remains at large. It's alleged to be the single largest Crypto currency Ponzi scheme in history. Three main players, Ruja Ignatova (The Crypto Queen), her brother Konstantin and Sebastian Greenwood (the public face of ONECO…
…
continue reading

1
CRIMINAL MINDS, Entitlement & Accountability. Godfather Brett Johnson.
51:15
51:15
Play later
Play later
Lists
Like
Liked
51:15🚨 NEW EPISODE ALERT 🚨Joined by Brett Johnson, who EXPOSES the MIND of Cyber Crime. Once known as the "Original Internet Godfather" and US Most Wanted cybercriminal, Brett is now a cybersecurity consultant aiding law enforcement. Brett shares his remarkable journey of redemption, and we explore the mind of cyber crime and what drives criminals to co…
…
continue reading

1
New Alert 🚨 Beware of Your Next Google Search🚨
1:55
1:55
Play later
Play later
Lists
Like
Liked
1:55👀 Could your next Google search lead you into a cyber trap? 🔐 Are you sure that “HR login” link isn’t a fake? 🚨 The FBI just issued a Public Service Announcement warning EVERYONE — yes, even you — that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals). Here’s how it works: ⚠️ Fraudsters buy sea…
…
continue reading

1
Ep. 306 - The 4th Monday Series - Changing The Game - New Sport Tech with Seth Daniels
28:19
28:19
Play later
Play later
Lists
Like
Liked
28:19Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Seth Daniels. Seth is the Director…
…
continue reading

1
How Ransomware Can Kill. Ways To Build Security Resilience.
56:21
56:21
Play later
Play later
Lists
Like
Liked
56:21We discuss How ransomware can kill and ways to build security resilience with Chris Loehr, SVP of Solis Security. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our…
…
continue reading
🚨 NEW EPISODE ALERT! 🚨 🔒 Are you prepared for the risks of AI-powered deception? Got AI? What to watch for in Fake Videos and Social Engineering. 🤖 Are you ready to confront the dark side of AI? 🤖 Unmasking AI Deepfakes & Cyber Threats. Send us a text 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! F…
…
continue reading

1
Why Citizens Should Shape the Future of the Democratic Republic of Congo
9:36
9:36
Play later
Play later
Lists
Like
Liked
9:36An audio version of “Why Citizens Should Shape the Future of the Democratic Republic of Congo,” a new Commentary by CSIS’s Albert Zeufack, Ruxandra Burdescu, Mvemba Phezo Dizolele, James Robinson, and Jonathan Weigel. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
…
continue reading
What happens when a former black hat hacker lifts the veil on the dark web after 30 years in the shadows? In this chilling and eye-opening episode, Darnley dives into exclusive audio from a VICE interview that reveals the darkest corners of the internet—from ransomware targeting hospitals to million-dollar cyber heists. Join Darnley as he breaks it…
…
continue reading

1
CYFIRMA Research: GhostSpy- Web-Based Android RAT
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08A high-risk Android malware poses a serious threat by targeting banking apps, bypassing screenshot protections through UI reconstruction to steal sensitive financial data. It records live screen activity, captures video, and audio in real time, SMS, Contacts, Call logs, files and silently auto-grants all permissions. Once installed, it takes full c…
…
continue reading

1
What’s Normal—and What’s Not—About ODNI’s Request to Revise the NIC's Intelligence Assessment
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20An audio version of “What’s Normal—and What’s Not—About ODNI’s Request to Revise the NIC's Intelligence Assessment,” a new Critical Questions by Emily Harding. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
…
continue reading

1
Opportunity Amid Austerity: Three Principles for Resilient Agricultural Growth
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23An audio version of “Opportunity Amid Austerity: Three Principles for Resilient Agricultural Growth,” a new commentary by CSIS's Colin Christensen. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
…
continue reading

1
Ep. 240 Unlocking Federal Efficiency: How Process Intelligence Drives Faster, Smarter Government
23:43
23:43
Play later
Play later
Lists
Like
Liked
23:43Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Everyone who has listened to a podcast about technology has heard the phrase, “People, Process, Technology.” This is a model derived from a management consultant in the 1960’s. We have seen a lot of focus on techn…
…
continue reading

1
Your Hardware Refresh Is a Quantum Deadline with Mamta Gupta
39:38
39:38
Play later
Play later
Lists
Like
Liked
39:38Quantum threats are no longer theoretical, and waiting could cost you. In this episode of Shielded: The Last Line of Cyber Defense, Johannes Lintzen is joined by Mamta Gupta, a quantum physicist turned cybersecurity strategist at Lattice Semiconductor. Together, they break down how crypto agility, hardware-based trust anchors, and PQC readiness are…
…
continue reading
An audio version of “Is Food Security National Security?,” a new commentary by CSIS's Caitlin Welsh. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
…
continue reading

1
🔥 Truth About FYRE Festival🔥 How Online Fraud Works
32:32
32:32
Play later
Play later
Lists
Like
Liked
32:32We delve into the infamous Fyre Festival, exploring the truth about fyre festival and how online fraud works. The Fyre Festival became a symbol of , how online fraudsters work. We discuss the extravagant promises made by the organizers, the disastrous execution of the event, and the legal consequences faced by its founder, Billy McFarland. Takeaway…
…
continue reading
In this episode of Risk & Reels, Jeffrey Wheatman sits down with RJ Friedman, CEO of Dayone Cyber, to talk frameworks, risk, and leadership. RJ shares how his start in sales shaped his approach as a CISO, why CIS 18 remains his go-to, and how mapping frameworks to business goals makes all the difference. It's a sharp, honest look at what makes cybe…
…
continue reading

1
Moody’s Downgrade Signals Deeper Risk: Is U.S. Debt Undermining Global Leadership?
16:35
16:35
Play later
Play later
Lists
Like
Liked
16:35An audio version of “Moody’s Downgrade Signals Deeper Risk: Is U.S. Debt Undermining Global Leadership?,” a new commentary by CSIS's Philip Luck. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
…
continue reading

1
“Improving Cooperation with Allies and Partners in Asia”: Audio Brief with Dan Byman
2:51
2:51
Play later
Play later
Lists
Like
Liked
2:51A short, spoken-word summary from CSIS’s Dan Byman on his brief, “Improving Cooperation with Allies and Partners in Asia.”By Center for Strategic and International Studies
…
continue reading

1
GovCast: DISA Harnesses AI to Fortify Cyber Resilience
11:07
11:07
Play later
Play later
Lists
Like
Liked
11:07Defense Information Systems Agency networks are leveraging AI and sensors to boost real-time monitoring and synthetic traffic, as well as improve user experience and incident resolution. At AFCEA TechNet 2025 in Baltimore, DISA J6 Global Services Directorate Vice Director Brig. Gen. Michael Cornell discussed the impact of emerging technology on dat…
…
continue reading
In this episode of What's in the SOSS, host CRob interviews Clyde Seepersad from the LF Education Department. They discuss Clyde's journey into open source, the role of LF Education in supporting the community, and the importance of cybersecurity education. They also delve into the development of the Global IT Cyber Skills Framework, emphasizing th…
…
continue reading

1
Ep. 239 Boosting Federal Cybersecurity with Agentless Observability
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com AFCEA’S TechNet Cyber conference held in Baltimore, Maryland was the perfect opportunity to sit down with Bryan Rosensteel, Head of Public Sector Marketing at Wiz. Wiz is the “new kid on the block,” and it has had…
…
continue reading