show episodes
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Artwork

1
Simply Defensive

Simply Cyber Media Group

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Artwork

1
GovCIO Media & Research Podcasts

GovCIO Media & Research

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
The GovCIO Media & Research podcast network comprises GovCast, CyberCast and HealthCast featuring conversations with key leaders on timely issues impacting the federal IT landscape. Topics include cybersecurity, artificial intelligence, cloud computing, IT modernization, data analytics, workforce development and more. New episodes release each Tuesday.
  continue reading
 
Artwork

1
TopCyberPro

TopCyberPro

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
  continue reading
 
Artwork
 
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
  continue reading
 
Artwork

1
Audio Briefs

Center for Strategic and International Studies

icon
Unsubscribe
icon
Unsubscribe
Daily
 
Audio Briefs brings you CSIS publications in audio form. Listen to short, spoken-word summaries from CSIS experts about their latest reports, or hear a full audio version of any CSIS commentary.
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
  continue reading
 
Artwork

1
The CyberDap Podcast

Daniel Agyemang Prempeh - TheCyberDap

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
  continue reading
 
Artwork

1
Simplifying Cyber

Aaron Pritz, Cody Rivers

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
  continue reading
 
Artwork

1
UAB TechKnow

University of Alabama at Birmingham

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
  continue reading
 
This Podcast is Hosted by Raghu Krishna. He wants to bring in interesting people who he has meet and feel that they have intresting story to tell to the world. Not all of the interviews have to be from celebrities to give some advice or for people to watch/hear. Every person has a story to tell and a lesson that we all can learn from.
  continue reading
 
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
  continue reading
 
Artwork

1
Better in Bavaria

U.S. Army Garrison Bavaria

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
U.S. Army Garrison Bavaria's Better in Bavaria podcast, where we share stories and highlight the people behind them - the Soldiers and Army civilians who support our readiness mission all while making our community a great place to work, live and raise a family. - Hosted by Linda A. Read and Andreas Kreuzer - Produced by Kayla Overton, Natalie Simmel, and Ella Händel
  continue reading
 
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
Artwork

1
The Cyber Queens Podcast

Maril Vernon, Erika Eakins, and Amber Devilbiss

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
“WHERE ARE THE WOMEN IN CYBER?” The Landscape In 2022 the cyber security field still consists of 24% women and only 2.2% LGBTQ+ minorities. Long-perpetuated gender, age, and demographic biases held by the ‘Baby Boomer’ and Gen-X groups have led to a severe gap in the representation and advancement of women and minorities in this field. Millennials entered the workforce and attempted to forge a new way by asking for small changes; but definitely conceding others. Currently the Boomers/Gen-X a ...
  continue reading
 
Artwork
 
🎙️ Dive into the world of cybersecurity with Cubic Lighthouse Podcast - your expert companion in navigating the latest developments and crucial topics in the field. We dissect complexities, provide strategic insights, and ensure you stay abreast of cutting-edge trends. Whether you're a seasoned professional or a cybersecurity enthusiast, join us for concise expertise and actionable intelligence to enhance your security posture. 🌐🔐
  continue reading
 
The federal government spends $90 billion on technology every year. If you are a tech innovator and want to expand your share of the market, this is the podcast for you to find new opportunities for growth. Every week, Federal Tech Podcast sits down with successful innovators who have solved complex computer system problems for federal agencies. They cover topics like Artificial Intelligence, Zero Trust, and the Hybrid Cloud. You can listen to the technical issues that concern federal agenci ...
  continue reading
 
Artwork

1
Cybility Savvy

Michala Liavaag

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Bite-sized information about cybersecurity for not-for-profit boards and leaders. In each episode we help leaders of not-for-profits to understand the information security risks to their organisations and they leave with at least one actionable insight that they can put into practice. It also features interviews with not-for-profit leaders sharing their cybersecurity journey, insights and lessons learned.
  continue reading
 
Artwork

1
unsuitable on Rea Radio

Rea & Associates

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Designed to challenge old-school business practices and the traditional business suit culture, on unsuitable on Rea Radio you'll hear industry professionals speak about meaningful, modern solutions to help you enhance your company’s growth. Hosted by Doug Houser.
  continue reading
 
Artwork
 
The BCI Podcast features conversations with business continuity & resilience professionals from around the world offering insight and guidance on current affairs topics affecting businesses around the globe, as well as tips and insight into career development within the industry.
  continue reading
 
Artwork

1
The CyberCast

Andrew Morgan

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
  continue reading
 
Unhackable - a virtually impossible state of being only made plausible through consistent cybersecurity best practices by everyone simultaneously. This is Unhackable, the authoritative Security podcast about deception and personal security. Can you ever be truly Unhackable? No, nobody can. But every episode is designed to help you move forward using actionable cybersecurity best practices that are within reach of everyone. We help you take the steps needed to solve your most important Cybers ...
  continue reading
 
Artwork

1
IoT Security Podcast

Phosphorus Cybersecurity

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
  continue reading
 
Closing The Gender Pay Gap is the podcast for thoughtful HR leaders in technology and cybersecurity companies who want to do more to develop and retain their female talent. Sharing tips, techniques and talent pipeline strategies to help technology companies do more to attract, develop and retain female talent to strengthen the female talent pipeline and close the gender pay gap. From promotions to pay cheques, latest figures reveal men are still out-earning women at work in the technology se ...
  continue reading
 
Loading …
show series
 
Join hosts Josh and Wade as they sit down with Charles (Chuck) Sapp, a seasoned cybersecurity expert and security awareness specialist. In this episode, Chuck shares his unique journey from serving in the Marine Corps to becoming an influencer in the cybersecurity community. Gain insights into his military background, his passion for educating othe…
  continue reading
 
Fredrik Nielsen who is partner in CyberPilot joins the podcast. He talks about why you should do Security Awareness Training. He comes across: Why Security Awareness training shouldn't just be for compliance Why culture and behavioral change should be the goal Why you should care about your employees when doing training 3 principles to implement in…
  continue reading
 
AFCEA’S TechNet Cyber conference held in Baltimore, Maryland was the perfect opportunity to sit down with Greg Carl, Principal Technologist from Pure Storage. Pure Storage is used by 175 federal agencies. Time to sit down from a subject matter expert and explain their value proposition. Today’s federal government is attempting to accomplish digital…
  continue reading
 
The Williams Woods Story. What Happens when Your Identity is Stolen. Video Episode: https://youtu.be/mBU3J-4vKww Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our …
  continue reading
 
Think your clever password is hacker-proof? Think again. In this episode, Darnley dives into why our very human brains—full of favorite pets, TV shows, and birthdates—are no match for modern password-cracking tools. With AI now guessing passwords better than ever, it's time to rethink how we protect our digital lives. Tune in to learn what’s really…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com GitLab has been around for ten years and has garnered a reputation for helping federal agencies ensure compliance with stringent government standards. Today, we sat down with Joel Krooswick from GitLab to discuss …
  continue reading
 
An audio version of “What the Court’s Ruling on Trump’s Tariffs Means for U.S. Trade Policy and the Economy,” a new Critical Questions by CSIS’s Philip Luck. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
  continue reading
 
Read CYFIRMA’s latest geo-political analysis, regarding Trump’s continued disruption of the world order, calling U.S. alliances into question while an emboldened China prepares for war over Taiwan. Link to the Research Report: https://www.cyfirma.com/research/while-trump-disrupts-the-world-order-china-prepares-for-war-over-taiwan/ #Geopolitics #CYF…
  continue reading
 
Jeffrey Wheatman sits down with Cary Johnson, founder of Phishbusters Audit and Consulting, to expose the failures of traditional phishing simulations. They discuss why standard metrics fall short, how self-assessment distorts results, and what it really takes to track — and influence — behavioral change in security awareness programs.…
  continue reading
 
🔥New Episode🔥 Former Intelligence Officer, Dan Elliott, current head of Zurich Resilience, joins us and we discuss: 🎯new ways to fight cyber crime, 🎯how to get prepared for a breach, and 🎯how to manage risk in small business. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-77…
  continue reading
 
Advancing Exposure Management Hear from Jorge Orchilles, Senior Director at Verizon, on the shift from traditional vulnerability management to modern exposure management and the critical role proactive security plays in staying ahead of threats. + + + Find more episodes on YouTube or wherever you listen to podcasts, as well as at netspi.com/agentof…
  continue reading
 
Lynn Dohm, head of Women in Cyber Security (WiCyS) and one of the top women in cyber security, joins us. Come learn benefits of attending security conferences, best ways to keep up to date on security news, and ways to stop bias in cyber security. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact N…
  continue reading
 
Government agencies collect vast amounts of data, but accessing and using that data effectively has long been a challenge. Ahu Yildirmaz and the team at the Coleridge Initiative are working to change that. By providing secure data-sharing platforms, advanced analytics training and tools for cross-agency collaboration, the organization is helping po…
  continue reading
 
Cybersecurity in healthcare is facing heightened challenges as regulations shift, IoT devices proliferate, and ransomware attacks become increasingly devastating. Josh Spencer, Founder, and CIO at FortaTech Security and with over fifteen years in the field including time as CISO/CTO at UT Southwestern, explores why HIPAA changes are necessary, the …
  continue reading
 
An audio version of “The Maduro Regime Held Another Sham Election—What Happens Now?,” a new Critical Questions by CSIS’s Ryan C. Berg, Christopher Hernandez-Roy, Juliana Rubio, Henry Ziemer, Rubi Bledsoe, and Natalia Hidalgo. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
  continue reading
 
This is the True Cyber Crime Story of Ruja Ignatova A/K/A The Crypto Queen, on the FBI’s Top 10 MOST WANTED. She is wanted and remains at large. It's alleged to be the single largest Crypto currency Ponzi scheme in history. Three main players, Ruja Ignatova (The Crypto Queen), her brother Konstantin and Sebastian Greenwood (the public face of ONECO…
  continue reading
 
🚨 NEW EPISODE ALERT 🚨Joined by Brett Johnson, who EXPOSES the MIND of Cyber Crime. Once known as the "Original Internet Godfather" and US Most Wanted cybercriminal, Brett is now a cybersecurity consultant aiding law enforcement. Brett shares his remarkable journey of redemption, and we explore the mind of cyber crime and what drives criminals to co…
  continue reading
 
👀 Could your next Google search lead you into a cyber trap? 🔐 Are you sure that “HR login” link isn’t a fake? 🚨 The FBI just issued a Public Service Announcement warning EVERYONE — yes, even you — that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals). Here’s how it works: ⚠️ Fraudsters buy sea…
  continue reading
 
Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Seth Daniels. Seth is the Director…
  continue reading
 
We discuss How ransomware can kill and ways to build security resilience with Chris Loehr, SVP of Solis Security. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our…
  continue reading
 
🚨 NEW EPISODE ALERT! 🚨 🔒 Are you prepared for the risks of AI-powered deception? Got AI? What to watch for in Fake Videos and Social Engineering. 🤖 Are you ready to confront the dark side of AI? 🤖 Unmasking AI Deepfakes & Cyber Threats. Send us a text 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! F…
  continue reading
 
An audio version of “Why Citizens Should Shape the Future of the Democratic Republic of Congo,” a new Commentary by CSIS’s Albert Zeufack, Ruxandra Burdescu, Mvemba Phezo Dizolele, James Robinson, and Jonathan Weigel. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
  continue reading
 
What happens when a former black hat hacker lifts the veil on the dark web after 30 years in the shadows? In this chilling and eye-opening episode, Darnley dives into exclusive audio from a VICE interview that reveals the darkest corners of the internet—from ransomware targeting hospitals to million-dollar cyber heists. Join Darnley as he breaks it…
  continue reading
 
A high-risk Android malware poses a serious threat by targeting banking apps, bypassing screenshot protections through UI reconstruction to steal sensitive financial data. It records live screen activity, captures video, and audio in real time, SMS, Contacts, Call logs, files and silently auto-grants all permissions. Once installed, it takes full c…
  continue reading
 
An audio version of “What’s Normal—and What’s Not—About ODNI’s Request to Revise the NIC's Intelligence Assessment,” a new Critical Questions by Emily Harding. This audio was generated with text-to-speech by Eleven Labs.By Center for Strategic and International Studies
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Everyone who has listened to a podcast about technology has heard the phrase, “People, Process, Technology.” This is a model derived from a management consultant in the 1960’s. We have seen a lot of focus on techn…
  continue reading
 
Quantum threats are no longer theoretical, and waiting could cost you. In this episode of Shielded: The Last Line of Cyber Defense, Johannes Lintzen is joined by Mamta Gupta, a quantum physicist turned cybersecurity strategist at Lattice Semiconductor. Together, they break down how crypto agility, hardware-based trust anchors, and PQC readiness are…
  continue reading
 
We delve into the infamous Fyre Festival, exploring the truth about fyre festival and how online fraud works. The Fyre Festival became a symbol of , how online fraudsters work. We discuss the extravagant promises made by the organizers, the disastrous execution of the event, and the legal consequences faced by its founder, Billy McFarland. Takeaway…
  continue reading
 
In this episode of Risk & Reels, Jeffrey Wheatman sits down with RJ Friedman, CEO of Dayone Cyber, to talk frameworks, risk, and leadership. RJ shares how his start in sales shaped his approach as a CISO, why CIS 18 remains his go-to, and how mapping frameworks to business goals makes all the difference. It's a sharp, honest look at what makes cybe…
  continue reading
 
Defense Information Systems Agency networks are leveraging AI and sensors to boost real-time monitoring and synthetic traffic, as well as improve user experience and incident resolution. At AFCEA TechNet 2025 in Baltimore, DISA J6 Global Services Directorate Vice Director Brig. Gen. Michael Cornell discussed the impact of emerging technology on dat…
  continue reading
 
In this episode of What's in the SOSS, host CRob interviews Clyde Seepersad from the LF Education Department. They discuss Clyde's journey into open source, the role of LF Education in supporting the community, and the importance of cybersecurity education. They also delve into the development of the Global IT Cyber Skills Framework, emphasizing th…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com AFCEA’S TechNet Cyber conference held in Baltimore, Maryland was the perfect opportunity to sit down with Bryan Rosensteel, Head of Public Sector Marketing at Wiz. Wiz is the “new kid on the block,” and it has had…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play