Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
The opportunity to delve into the 'mindsz' of industry leaders in technology and cyber security.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
Everything seems to be accelerating: geopolitics, technology, security threats, the dispersal of information. At times, it feels like a blur. But beneath the dizzying proliferation of events, discoveries, there are deeper trends that can be grasped and understood through conversation and debate. That’s the idea behind Stop the World, the Australian Strategic Policy Institute’s podcast on international affairs and security. Each week, we cast a freeze-frame around the blur of events and bring ...
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Email feedback and show ideas to [email protected]. Join us as we examine the next major tech cycle, uncover emerging global tech hubs, and analyze where VC investment d ...
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
The Cyber-Savvy Boardroom, a Google Cloud Office of the CISO podcast, offers monthly 15-20 minute episodes featuring security leaders, board members, and thought leaders. Hosted by David Homovich and rotating Office of the CISO members, experts share insights for strategic clarity and improved organizational security. Guests include board members, Google Cloud/Google executives, Office of the CISO Board Insights team members, board advisors, and industry thought leaders.
…
continue reading
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
…
continue reading
Cyber Dogs Ai is a podcast about tips on navigating ai, how to stay safe in the digital landscape, general conversations regarding technology and how to use it for our benefit! DON’T PUT YOURSELF IN THE DIGITAL DOGHOUSE! Hit that follow button, and stay tuned for more!
…
continue reading
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading
Join us for interesting conversations about technology and the business of IT.
…
continue reading
Welcome to The Monica Talks Cyber Podcast Experience: The fastest, easiest and an engaging way to build and grow your career and business in artificial intelligence, leadership and cybersecurity. Monica Talks Cyber is a technology, career and business podcast and an engaging platform for real stories, discussions and opinions from renowned global experts in technology, leadership and cybersecurity. The podcast show is hosted by Monica Verma, Hacker, CISO, Keynote Speaker, Founder & CEO, Mult ...
…
continue reading
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
…
continue reading
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading

1
Hiring Fraud Exposed! Latest AI Threats to Business.
29:19
29:19
Play later
Play later
Lists
Like
Liked
29:19🔥🚨NEW EPISODE 🔥🚨We delve into the Latest AI Threats To Small Business. Exposing AI Hiring Fraud! Watch to the end to see live examples of how this is happening today. Topics covered: 🔥AI Fraud in Interviews, 🔥How AI Scams Effect Business, 🔥AI Fraud In Job Interviews takeaways AI-driven fraud is a growing concern for businesses. Many resumes are now…
…
continue reading

1
The Secret CISO: Navigating the Human and Technical Challenges in Cybersecurity
51:57
51:57
Play later
Play later
Lists
Like
Liked
51:57In this episode of 'Cybersecurity Today,' hosts John Pinard and Jim Love introduce their unique show, 'The Secret CISO,' which aims to dive deep into the lives and thoughts of CISOs and similar roles, beyond the usual interview-style format. The guest for this episode is Priya Ali, CISO at Sheridan College, who shares her journey from engineering t…
…
continue reading

1
Episode 89: Meet the Alias SOC - on the Battlefront of Cybersecurity
29:57
29:57
Play later
Play later
Lists
Like
Liked
29:57🔐 Inside the SOC 🔐 Go behind the scenes with the Alias Security Operations Center (SOC) team to learn how they operate, collaborate, and tackle today’s top cyber threats ⚔️. Find out why a SOC matters, and how organizations can still leverage SOC insights and support, even without one in-house 💼. 🎧 Tap in and get cyber-smart with the experts. #Cybe…
…
continue reading

1
Active Directory Security and Configuration Best Practices with Victor King: Practical 365 Podcast S04E40
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24In this episode, Steve Goodman and Bastiaan Verdonk interview Victor King from Quest on best practices for Active Directory security. They discuss identifying misconfigurations, managing privileged access, and continuous environmental monitoring. Want to stay up to date on all things Practical 365? Follow us on Twitter, Facebook, and Linkedin to st…
…
continue reading

1
Episode 137: Common Pentest Findings That Shouldn’t Exist in 2025
27:23
27:23
Play later
Play later
Lists
Like
Liked
27:23In this episode of The Cyber Threat Perspective, we highlight the pentest findings that, frankly, have no business showing up in 2025. From accounts with weak passwords and no MFA to plaintext credentials on file shares, we break down the common misconfigurations and oversights that attackers still abuse, despite years of seeing the same issues ove…
…
continue reading

1
AI Security Threats: Echo Leak, MCP Vulnerabilities, Meta's Privacy Scandal, and the 'Peep Show'
12:55
12:55
Play later
Play later
Lists
Like
Liked
12:55In this episode of Cybersecurity Today, host Jim Love discusses critical AI-related security issues, such as the Echo Leak vulnerability in Microsoft's AI, MCP's universal integration risks, and Meta's privacy violations in Europe. The episode also explores the dangers of internet-exposed cameras as discovered by BitSight, highlighting the urgent n…
…
continue reading

1
Episode 315 Deep Dive: Matt Watts | The Journey From Storage To Intelligent Data Infrastructure
49:45
49:45
Play later
Play later
Lists
Like
Liked
49:45In this episode, we sit down with Matt Watts, Global Data Expert, as he explores the journey from storage to intelligent data infrastructure. Matt walks us through the four major technology waves that have shaped the industry: modular technologies, virtualization, cloud computing, and the dawn of intelligent data infrastructure driven by AI. He sha…
…
continue reading

1
Inside the Mind: Unveiling Cyber Criminals' Motives and the Real-World Dangers of Ransomware
49:49
49:49
Play later
Play later
Lists
Like
Liked
49:49We explore the motives of cyber criminals, examples of cyber crime gang activities, risks of physical harm from ransomware, understanding cyber crime motive, and why its important to understand cyber crime MO (Modus Operandi). Overview of the MO (Modus Operandi) of REVIL, CONTI, HIVE, DARKSIDE and other ransomware gangs and how they drive their ope…
…
continue reading

1
Hacker furries, Global ransomware targets Aussie healthcare organisations, and cyber security for farmers
33:04
33:04
Play later
Play later
Lists
Like
Liked
33:04In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft talk about furry hacking collectives, a spree of ransomware attacks targeting Australian healthcare organisations, and good news for farmers. Hollingworth and Croft start their chat by catching up on a defacement campaign targeting a website administered by the US Depar…
…
continue reading

1
SANS Stormcast Friday, June 13th, 2025: Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln;
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot…
…
continue reading

1
Ep. 11 - Building Resiliency: The New Paradigm in Security Leadership
38:51
38:51
Play later
Play later
Lists
Like
Liked
38:51In this episode, we’re flipping the script on traditional security thinking. As security champions, we know that resiliency isn’t just a buzzword—it’s the backbone of modern cybersecurity strategy. Join us as we unpack: 🔐 From Security to Resiliency – Were we too confident in the early days of CISO-ship? We reflect on the evolution of security lead…
…
continue reading

1
CR102: Tattoos, Tech, and Teams, what ink means in the age of AI with Jitske Kramer, Corporate Anthropologist
56:30
56:30
Play later
Play later
Lists
Like
Liked
56:30Every organization is built on people, structures, and culture. But culture isn’t static—it evolves with every interaction, ambition, and shift in circumstance. As IT drives business transformation, new technologies reshape how people connect and collaborate. In this ever-changing landscape, a strong, adaptive culture is the key to lasting success.…
…
continue reading

1
SANS Stormcast Thursday, June 12th, 2025: Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; Connectwise Signing Keys; KDE Telnet code exec
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows…
…
continue reading

1
Teen Hacker EXPOSED! PowerSchool Breach Puts 60M Kids at Risk | Protect Your Children Online
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46Teen Hacker EXPOSED! PowerSchool Breach Puts 60M Kids at Risk | Protect Your Children Online 🚨 60 Million Students Exposed in PowerSchool Cyber Attack — What Parents Need to Know NOW A 19-year-old hacker named Matthew D. Lane pulled off one of the largest education data breaches ever, targeting PowerSchool and exposing the personal information of o…
…
continue reading

1
Chatbot Tells Addict to Take Drugs - 2025-06-09
1:00:21
1:00:21
Play later
Play later
Lists
Like
Liked
1:00:21Register for Free, Live webcasts & summits: https://poweredbybhis.com 00:00 - PreShow Banter™ — Time to Bake 05:12 - Chatbot Tells Addict to Take Drugs - Talkin’ Bout [infosec] News 2025-05-06 06:08 - Story # 1: Meta and Yandex are de-anonymizing Android users’ web browsing identifiers 12:55 - Story # 2: Therapy Chatbot Tells Recovering Addict to H…
…
continue reading
Welcome to 🎙️The SOC Brief 🎙️our byte-sized mini series bringing you weekly updates straight from the Security Operations Center. In this episode, Andrew, Dax, and Dylan break down what life in the SOC looks like, the rise of malvertising, and the emerging threat known as Recipe Lister, discussing how it’s being tracked. Tune in for a quick, expert…
…
continue reading

1
Episode 071 - The Future of HubSpot is Passwordless - Alyssa Robinson
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39The Future of HubSpot is Passwordless Learn how HubSpot’s CISO Alyssa Robinson breaks down passwordless authentication, innovative security strategies, and the art of balancing usability with protection on the latest episode. + + + Find more episodes on YouTube or wherever you listen to podcasts, as well as at netspi.com/agentofinfluence.…
…
continue reading

1
Ignore Ram Shankar Siva Kumar’s Previous Directions
38:24
38:24
Play later
Play later
Lists
Like
Liked
38:24In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumar’s dynamic keynote from BlueHat India 2025, where he explores the evolving threat landscape of AI through the lens of the Microsoft AI Red Team. From adversarial machine learning to psychosocial harms and persuasive AI, Ram highlights real-world…
…
continue reading

1
Cybersecurity Today: State-Backed ChatGPT Misuse, Dark Gaboon Attacks, and Starlink Installation Controversy
12:50
12:50
Play later
Play later
Lists
Like
Liked
12:50This episode of 'Cybersecurity Today' hosted by Jim Love covers various significant events in the cybersecurity landscape. OpenAI has banned multiple ChatGPT accounts linked to state-sponsored hackers from countries including China, Russia, North Korea, Iran, and the Philippines for developing malware, generating disinformation, and conducting scam…
…
continue reading

1
Episode 314 Deep Dive: Imran Husain | Cybersecurity Threats in the Manufacturing World
41:35
41:35
Play later
Play later
Lists
Like
Liked
41:35In this episode, we sit down with Imran Husain, Chief Information Security Officer at MillerKnoll, as he discusses the evolving landscape of cybersecurity threats in the manufacturing sector. Imran explores the challenges that arise as manufacturing increasingly integrates with online technologies and IoT, highlighting the unique vulnerabilities po…
…
continue reading

1
NHS Cybersecurity Crisis: Who is Actually Protecting Your Medical Records?
55:54
55:54
Play later
Play later
Lists
Like
Liked
55:54Welcome to Razorwire, where we examine the realities facing cybersecurity professionals on the front lines of digital defence. In this episode, I am joined by Rob Priest, a former NHS insider with 24 years of experience, and returning co-host Richard Cassidy to expose the cybersecurity crisis gripping Britain's healthcare system. From WannaCry's de…
…
continue reading

1
Leadership Gridlock in Cybersecurity - Ep 153
15:09
15:09
Play later
Play later
Lists
Like
Liked
15:09In this episode of Reimagining Cyber, we break down the key findings from the 2025 Cybersecurity Staff Compensation Benchmark Report from the Institute for Applied Network Security (IANS). Host Ben sits down with Rob Aragao (Chief Security Strategist, OpenText) to explore why over 50% of cybersecurity professionals just below the CISO level are con…
…
continue reading

1
SN 1029: The Illusion of Thinking - Meta Apps and JavaScript Collusion
2:45:36
2:45:36
Play later
Play later
Lists
Like
Liked
2:45:36In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0…
…
continue reading

1
SN 1029: The Illusion of Thinking - Meta Apps and JavaScript Collusion
2:45:36
2:45:36
Play later
Play later
Lists
Like
Liked
2:45:36In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0…
…
continue reading

1
SANS Stormcast Wednesday, June 11th, 2025: Microsoft Patch Tuesday; Acrobat Patches
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20June%202025/32032 Adobe Vulnerabilities Adobe relea…
…
continue reading

1
The Dual Role of a CISO: Security and IT with Dr. Jeff Baldwin┃Part 1
22:15
22:15
Play later
Play later
Lists
Like
Liked
22:15Send us a text In this episode of the Cyber Savvy Podcast, host Mike Shelah speaks with Dr. Jeff Baldwin, CISO of Beryllium InfoSec and QuickTrack, about the critical intersection of cybersecurity and IT. They discuss the challenges of communicating cybersecurity importance to non-technical stakeholders, the dual role of a CISO, and the balance bet…
…
continue reading

1
Inside the Mind of a CISO: What History Teaches Us About AI & Cybercrime
1:10:02
1:10:02
Play later
Play later
Lists
Like
Liked
1:10:02Do you know the first cyberattack in history happened in 1834? And what if the scariest part of AI isn't what it does - but what it makes us ignore? This isn’t science fiction. It’s real. And it’s already happening. In this keynote, I take you through the 200-year evolution of fraud - from wooden blocks to synthetic identities, how AI is making sca…
…
continue reading

1
S35 Ep2: Lauren Farina - Rest After Stress: The Psychology of High Performance
26:36
26:36
Play later
Play later
Lists
Like
Liked
26:36Today, Steve speaks with Lauren Farina, psychotherapist and founder of Invited Psychotherapy & Coaching. Lauren and Steve discuss how wellness is becoming a bigger part of the workplace and how we can stay mentally healthy during times of stress and pressure. Also an expert on “high-performance individuals,” Lauren shares what it means to be high-p…
…
continue reading

1
Hacking Big Tech. Bryan Seely Interview.
1:04:17
1:04:17
Play later
Play later
Lists
Like
Liked
1:04:17Bryan Seely joins us is a refreshing and hilariously entertaining episode. Bryan is a world-famous cyber security expert, ethical hacker and former U.S. Marine. He is known for his book (Web of Lies) and for intercepting calls to the U.S. Secret Service & FBI, as well as finding major exploits at LinkedIn and several government 3-Letter agencies. C…
…
continue reading

1
SANS Stormcast June, Tuesday, June 10th, 2025: Octosql; Mirai vs. Wazuh DNS4EU; Wordpress Fair Package Manager
6:09
6:09
Play later
Play later
Lists
Like
Liked
6:09OctoSQL & Vulnerability Data OctoSQL is a neat tool to query files in different formats using SQL. This can, for example, be used to query the JSON vulnerability files from CISA or NVD and create interesting joins between different files. https://isc.sans.edu/diary/OctoSQL+Vulnerability+Data/32026 Mirai vs. Wazuh The Mirai botnet has now been obser…
…
continue reading

1
Cybersecurity Without Borders: USA and France
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36Text the ATB Team! We'd love to hear from you! In this episode of At the Boundary, Dr. Nicolas Sabouret of the University of Paris-Saclay joins GNSI’s Dr. Tad Schnaufer to preview the upcoming Transatlantic Forum on Cybersecurity. Together, they explore how France and the U.S. approach cybersecurity—from technical expertise in cryptography and netw…
…
continue reading

1
EP229 Beyond the Hype: Debunking Cloud Breach Myths (and What DBIR Says Now)
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05Guest: Alex Pinto, Associate Director of Threat Intelligence, Verizon Business, Lead the Verizon Data Breach Report Topics: How would you define “a cloud breach”? Is that a real (and different) thing? Are cloud breaches just a result of leaked keys and creds? If customers are responsible for 99% of cloud security problems, is cloud breach really ab…
…
continue reading

1
Cybersecurity Today: Massive Smart TV Botnets and Major US Cyber Policy Overhaul
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21In this episode of Cybersecurity Today, host David Shipley delves into alarming developments in the cybersecurity landscape. The FBI has flagged a massive malware campaign named Bad Box 2.0, which has compromised 1 million consumer devices globally, turning them into residential proxies. Additionally, a new variant of the Mirai malware is targeting…
…
continue reading

1
SANS Stormcast June, June 9th, 2025: Extracting PNG Data; GlueStack Packages Backdoor; MacOS targeted by Clickfix; INETPUB restore script
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022 16 React Native Packages for GlueStack Backdoored Overnight 16 npm packages with over a million weekly downloads between them were compro…
…
continue reading
🔥 New Episode Alert 🔥 In this exciting discussion, CISSP security leader Braxton Molton and host David Mauro on why you’re not too small to be hacked, the importance of detection and we explain How Small Business Can Catch Hackers. The message is clear on why small business needs better security. Exclusive insight from the front lines. Send us a te…
…
continue reading

1
Cybersecurity Month in Review: Uncovering Digital and Physical Threats
48:37
48:37
Play later
Play later
Lists
Like
Liked
48:37In this episode of the 'Cybersecurity Today: The Month in Review' show, host Jim welcomes regular guests Laura Payne and David Shipley, along with newcomer Anton Levaja. The trio dives deep into various cybersecurity stories, analyzing trends, threats, and recent incidents. Topics include the intriguing Mystery Leaker exposing cyber criminals, the …
…
continue reading

1
21. How to Use Microsoft Defender to Strengthen Your Phishing Security (With Benjamin Pomerleau - Product Owner at CyberPilot)
29:03
29:03
Play later
Play later
Lists
Like
Liked
29:03Microsoft Defender is a hidden gem of features if you use Office365. A lot of companies don't really use it even though it's a part of there plan with Microsoft. Today we dive into how you can use it to get better security when it comes to handling phishing emails. It: Simplifies the phishing reporting for end users Make it easier for IT admins to …
…
continue reading

1
Episode 136: A day in the life of an External Penetration Tester
37:32
37:32
Play later
Play later
Lists
Like
Liked
37:32In this episode of The Cyber Threat Perspective, we dive into why a “A day in the life of an External Penetration Tester." What do we actually do, and how do the things we do affect the overall engagement? What's important? We answer all of these questions and more in this week's episode. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/…
…
continue reading

1
Cyber Extortion, Ukraine's Cyber Offensive, and Chrome Trust Shake-up
12:19
12:19
Play later
Play later
Lists
Like
Liked
12:19Cybersecurity Today, hosted by Jim Love, delves into the latest in cyber threats. Cyber criminals have breached 20 organizations via convincing fake IT support calls, targeting Salesforce data for extortion. Ukraine's intelligence claims a significant cyber operation against Russia's aircraft manufacturer, stealing sensitive data and highlighting U…
…
continue reading

1
Episode 313 Deep Dive: Rose Alvarado & Jenna Eagle | Security Data Pipeline and the Future of SOC
40:48
40:48
Play later
Play later
Lists
Like
Liked
40:48In this episode, we sit down with Rose Alvarado, Regional Sales Manager, and Jenna Eagle, Solutions Engineer Lead, from Cribl as they unpack the evolving role of the security data pipeline and the future of the SOC. Rose and Jenna discuss the increasing demand for flexibility and control over data management, highlighting how organizations are movi…
…
continue reading

1
Donald Trump's foreign policy is performance art. With Kori Schake
26:49
26:49
Play later
Play later
Lists
Like
Liked
26:49Please note, this episode was filmed as a video interview and is available on ASPI's Youtube channel here: https://youtu.be/XvR4P2Ppmok This week ASPI was delighted to host Dr Kori Schake in Canberra for our 2025 Defence Conference ‘Preparedness and Resilience’. Kori is a senior fellow and director of foreign and defence policy studies at the Ameri…
…
continue reading