Cyber Strategy public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Cloud Realities

Capgemini

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Artwork

1
Cyber Focus

McCrary Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
  continue reading
 
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
  continue reading
 
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
Artwork
 
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
  continue reading
 
Artwork

1
Razorwire Cyber Security

Razorthorn Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
  continue reading
 
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Artwork

1
Breaching the Boardroom

NetGain Technologies, LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Breaching the Boardroom is a high-level podcast designed to explore the intersection of leadership, growth, and technology. Each episode brings industry leaders, experts, and innovators together for candid conversations on how to navigate the evolving tech landscape while driving business success. We’re on a mission to simplify complex topics like AI, cyber threats, and IT strategy, making them accessible and actionable for executives in mid-market businesses.
  continue reading
 
The Innovator’s Impact explores how today’s business leaders are using technology to drive growth, solve complex challenges, and future-proof their companies. Hosted by Darnell Perkins, founder of 81 West Cyber, each episode features real conversations with innovators who are transforming the way we think about leadership, strategy, and tech adoption. Whether you're scaling a company or navigating digital change, this podcast will inspire, inform, and challenge the way you lead.
  continue reading
 
Artwork

1
TechSurge: Deep Tech VC Podcast

Celesta Capital | Deep Tech Venture Capital Firm

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Send feedback and show ideas to [email protected]. Each discussion delves into the intersection of technology advancement, market dynamics, and the founder journey, offe ...
  continue reading
 
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
First Cheque is dedicated to open-sourcing conversations with experienced investors globally. Our aim? To enhance the craft of early-stage investors, from those writing their first cheques to the veterans in the game. First Cheque is supported by our wonderful sponsors: Galah Cyber: Galah Cyber are perfect for founder-lead and SAAS businesses. Galah provides advice, education, and training. Get in touch with Galah Cyber for a complimentary call to make sure you’re secured. https://dayone.fm/ ...
  continue reading
 
What do Iran’s shadow proxy networks, China’s ideological & cyber warfare, and NATO’s expanding footprint in Europe all have in common? They’re shaping the future of U.S. foreign policy, whether we like it or not. Host Samuel Waitt examines some of our 21st Century Adversaries: Iran, China, Russia, and ourselves—and how their ambitions are colliding with American interests. From behind-the-scenes diplomacy to cyber threats and military alliances, we’ll unpack how power really works in the mo ...
  continue reading
 
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
  continue reading
 
Artwork
 
Raising Tech is your guide to understanding the role technology plays in your community, where to invest to transform culture, and how to bring your team and residents along the journey. Tune in to explore the latest tech trends, dive into hot topics, and hear from industry experts, community leaders, and innovative vendors shaping the senior living tech landscape. Each episode is packed with practical insights and real-world stories to help you spark change and level up your community’s tec ...
  continue reading
 
Artwork

1
ThreatCast

Threatscape

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
  continue reading
 
Artwork

1
The So What from BCG

Boston Consulting Group BCG

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
This podcast from Boston Consulting Group looks around the corner of today’s big business and social issues. The goal–the so what–is to make sense of today and prepare busy leaders and executives for the day after tomorrow. Award-winning British journalist Georgie Frost interviews the leading thinkers and doers at BCG on the trends, developments, and ideas that will shape and disrupt the future. This is not your typical business strategy podcast. This podcast uses the following third-party s ...
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
Safe Nation

Nikki Renfroe

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Safe Nation is an inaugural podcast curated to share insight and discussion about law enforcement, security and crime prevention with a focus on current events and honest data. Offering a fresh perspective on safety through interviews, opinions and great practical advice, join your host, retired, female state trooper Captain Nikki Renfroe. Listen as she interviews industry professionals, sharing information on how to protect yourself from danger and crimes while also bringing attention to un ...
  continue reading
 
Artwork

1
The iTnews Podcast

iTnews Australia

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Australia’s leading source of enterprise technology news is now in podcast form. Join the editorial team at iTnews.com.au each week as we talk to technology executives from across the sector, digging deep into IT strategy, architecture and delivery. This podcast will be home to several shows, including the CXO Challenge, which profiles the work of top executives and their teams.
  continue reading
 
Artwork

1
Soulful CXO Podcast

Soulful CXO, ITSPmagazine Soulful CXO, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
  continue reading
 
Artwork

1
Thriving Business

Dr Kate De Jong & Sam Morris

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
THRIVING BUSINESS Business Insights to Help You Grow Your Business with Ease We’re two seasoned business owners — Sam Morris and Kate De Jong — sharing our nearly thirty-year combined experience of starting and growing service-based businesses from the ground up. We so many small businesses struggling or falling prey to expensive promises of quick fixes or silver bullets. Both of us know what it REALLY takes to start and grow a business, we've done it many times over and we've got the bliste ...
  continue reading
 
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
  continue reading
 
Artwork

1
Serverless Craic from The Serverless Edge

Serverless Craic from the Serverless Edge

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Serverless Craic from The Serverless Edge with Dave Anderson, Mark McCann and Mike O'Reilly. We want to share our tools and techniques so that you can use them to communicate your Technical Strategy with your C-Suite and business owners. We want to help you to build a serverless first organisation. We will show you how to use Wardley Mapping to gain situational awareness of where your cloud applications and business are. And then how to develop your technical capability in away th ...
  continue reading
 
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
  continue reading
 
Artwork

1
Think Cyber Secure

Think Cyber Secure

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
  continue reading
 
Breaking Cyber Barriers dives deep into the world of Cybersecurity, uncovering trends and exploring its limitless potential. Join host Liz Vagenas as she speaks with top leaders about the current challenges and opportunities within the industry, as well as strategies for success.
  continue reading
 
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
  continue reading
 
Artwork

1
The Backup Wrap-Up

W. Curtis Preston (Mr. Backup)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
  continue reading
 
Artwork

1
Be It Resolved

The Institute of Corporate Directors

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Be It Resolved is where bold ideas meet courageous leadership. Hosted by Rahul Bhardwaj, President and CEO of the Institute of Corporate Directors in Canada, this podcast delves into the key corporate governance issues shaping boardroom decisions today. With the governance landscape facing emerging risks, changes, trends, and shifts, Canadian boards and directors must leverage governance leadership strategies to navigate unprecedented times successfully. If you're eager to deepen your boardr ...
  continue reading
 
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and sta ...
  continue reading
 
Artwork

1
AI or Not

Pamela Isom

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to "AI or Not," the podcast where digital transformation meets real-world wisdom, hosted by Pamela Isom. With over 25 years of guiding the top echelons of corporate, public and private sectors through the ever-evolving digital landscape, Pamela, CEO and Founder of IsAdvice & Consulting LLC, is your expert navigator in the exploration of artificial intelligence, innovation, cyber, data, and ethical decision-making. This show demystifies the complexities of AI, digital disruption, and ...
  continue reading
 
Enterprise Security Tech presents The Cyber Jack Podcast. The Cyber Jack Podcast brings together critical news, expert insights, and product information to help CISOs, CIOs, and CEOs make informed IT technology and cybersecurity decisions.
  continue reading
 
Welcome to Cyber Career Chat, the podcast supporting innovation in the fast-paced world of cyber security. Join us as we explore the exciting career paths and opportunities available and keep up with industry developments in Australia and around the world. Cyber Career Chat is brought to you by the Workforce Development team at the New South Wales Cyber Cyber Security Innovation Node and proudly produced and supported by the Experts On Air Podcast Network.
  continue reading
 
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
  continue reading
 
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
  continue reading
 
Loading …
show series
 
We speak with Associate Professor Lyndel Bates, School of Criminology and Criminal Justice and the Griffith Criminology Institute at Griffith University at the World Police Summit 2025, held at the Dubai World Trade Centre 13-15 May. Associate Professor Lyndel Bates has research and teaching interests predominantly in road policing, road safety and…
  continue reading
 
Guest Introduction Kyle Draisey serves as the Chief Information Security Officer and Head of Cybersecurity at Sagent, a leading fintech company specializing in mortgage servicing technology. With a military and intelligence background, Kyle has navigated high-stakes environments from tactical SIGINT missions in Iraq to cybersecurity leadership role…
  continue reading
 
Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats Meeting API compliance and data protection challenges with emerging technologies Moving towards a mature posture for API security Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Tiago Rosado, Chief Information Security Officer, A…
  continue reading
 
Richard Horne, CEO of the United Kingdom’s National Cyber Security Centre (NCSC), joins host Frank Cilluffo to explore how the UK is strengthening cyber resilience across critical infrastructure, private industry, and international partnerships. Drawing from his experience in both government and the private sector, Horne outlines NCSC’s approach to…
  continue reading
 
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 268 ~ Watch Now ~ In this special AMA edition of the DailyCyber Podcast, I go live solo to answer your biggest questions about cybersecurity, incident response, and what it really takes to succeed as a Fractional vCISO in 2025. Whether you’re building a security program, managin…
  continue reading
 
This episode examines cybersecurity in the workplace through the lens of Mr. Robot's "Exploits" episode, where social engineering takes center stage. Curtis Preston and Prasanna break down how Elliot infiltrates Steel Mountain data center using badge cloning, psychological manipulation, and fake identities. The hosts analyze real-world implications…
  continue reading
 
Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor ~ Watch Now ~ In this episode of DailyCyber, I’m joined by Craig M. Taylor, Co-Founder & CISO at CyberHoot, who has spent nearly three decades building and leading security programs for organizations of all sizes. Craig believes cybersecurity awareness should be short, engaging, …
  continue reading
 
Guest Introduction Jim Rutt serves as the Chief Information Officer and Chief Information Security Officer of The Dana Foundation, a nonprofit focused on advancing neuroscience and neuroethics. With a career spanning healthcare, finance, and pharmaceuticals, Jim has built a reputation for driving digital transformation and bridging enterprise IT wi…
  continue reading
 
The CISO Signal | INSIDE CNA's $40M BITCOIN RANSOM | The Hack That Changed Cybersecurity - EP 4 In this episode of The CISO Signal, we go deep inside the cyberattack that shook the financial world. Join us as we unravel the haunting details of the 2021 ransomware attack on CNA Financial, which resulted in a record-breaking $40 million ransom paymen…
  continue reading
 
Bob Rudis, VP Data Science from GreyNoise, is sharing some insights into their work on "Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities." New research reveals a striking trend: in 80% of cases, spikes in malicious activity against enterprise edge technologies like VPNs and firewalls occurred weeks before related CVEs were…
  continue reading
 
Please enjoy this encore of Career Notes. Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pa…
  continue reading
 
Plex urges users to immediately update their Media Server due to an undisclosed security flaw. Cisco warns of a critical remote code execution flaw in their Secure Firewall Management Center software.Rockwell Automation discloses multiple critical and high-severity flaws. Hackers breached a Canadian House of Commons database. Active law enforcement…
  continue reading
 
Send us a text In this episode Dave Anderson, Mark McCann, and Michael O’Reilly continue their deep dive tackling Chapter 14: The Frictionless Developer Experience. The crew explore whether the principles of engineering excellence, developer enablement, and team topologies still stand strong in a world increasingly powered by AI and agentic systems…
  continue reading
 
Microsoft has issued an urgent security advisory addressing two critical vulnerabilities in SharePoint Server, identified as CVE-2025-53770 and CVE-2025-53771, which have been actively exploited since July 7, 2025. These zero-day flaws allow attackers to bypass authentication and execute remote code, posing a severe risk to organizations relying on…
  continue reading
 
A ransomware attack exposes personal medical records of VA patients. New joint guidance from CISA and the NSA emphasizes asset inventory and OT taxonomy. The UK government reportedly spent millions to cover up a data breach. Researchers identified two critical flaws in a widely used print orchestration platform. Phishing attacks increasingly rely o…
  continue reading
 
In this engaging conversation, Stephanie Johnson, CEO of Ackland Avenue, shares her inspiring journey from overcoming personal challenges to leading a successful software development company. She emphasizes the importance of mentorship, education, and creating a supportive work environment. Stephanie discusses her transition from COO to CEO, the si…
  continue reading
 
In a bold move to counter North Korea’s illicit financial operations, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned Korea Sobaeksu Trading Company and three individuals—Kim Se Un, Jo Kyong Hun, and Myong Chol Min—for orchestrating a fraudulent IT worker scheme. This operation, designed to bypass U.S. a…
  continue reading
 
One year ago, NIST released its long‑awaited post‑quantum cryptography standards, marking the official start of the migration to quantum‑safe security. It was the moment everyone had been “waiting for” but did it really kickstart the shift? In this anniversary episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen brings back so…
  continue reading
 
Patch Tuesday. The Matrix Foundation patches high-severity vulnerabilities in its open-source communications protocol. The “Curly COMrades” Russian-aligned APT targets critical infrastructure. Microsoft tells users to ignore new CertificateServicesClient (CertEnroll) errors. Researchers uncover a malware campaign hiding the NjRat Remote Access Troj…
  continue reading
 
Here's a Glimpse of What You'll Learn How Jedi helps financial advisors and RIAs clean, manage, and secure their databases Why optimizing tech stacks and eliminating redundancy is critical for business growth The role of automation and AI in scaling operations and improving workflows Key differences between working with small firms and large enterp…
  continue reading
 
In July 2025, McDonald’s faced a significant data breach involving its AI-powered hiring platform, McHire, developed by Paradox.ai. Security researchers Ian Carroll and Sam Curry discovered critical vulnerabilities that exposed the personal information of approximately 64 million job applicants. The breach stemmed from shockingly basic security fla…
  continue reading
 
We speak with Vince Hawkes, former Commissioner, Ontario Provincial Police of the International Association of Chiefs of Police (IACP) in his role as Director of International Engagement and Partnerships, speaking at the 2025 World Police Summit in Dubai, UAE. The International Association of Chiefs of Police (IACP) is the world’s largest and most …
  continue reading
 
We speak with John Kilburn, Regional Industry Leader of SAS, Silver Sponsor at the World Police Summit 2025, held at the Dubai World Trade Centre 13-15 May. As the Regional Industry Leader – Law Enforcement and Public Safety at SAS, John leads the development and strengthening of partnerships with Law Enforcement and Public Safety agencies across e…
  continue reading
 
What happens when people live decades longer than before—but not necessarily healthier? Iana Kouris, customer experience leader at BCG X, explores how companies can help people live healthier and longer. Businesses can jumpstart the longevity economy by designing new products aimed at the growing elderly population and supporting their older but st…
  continue reading
 
Hackers leak backend data from the North Korean state-sponsored hacking group Kimsuky. A ransomware attack on a Dutch clinical diagnostics lab exposes medical data of nearly half a million women. One of the world’s largest staffing firms suffers a data breach. Saint Paul, Minnesota, confirms the Interlock ransomware gang was behind a July cyberatta…
  continue reading
 
In this special Cyber Focus episode recorded at Black Hat 2025, host Frank Cilluffo sits down with two senior leaders from the Cybersecurity and Infrastructure Security Agency (CISA): Chris Butera, a more than decade-long CISA veteran currently serving as Acting Director of the Cybersecurity Division, and Bob Costello, the agency’s Chief Informatio…
  continue reading
 
Over the past few decades, there has been a significant transformation in how and where business value is created. In this episode of Be It Resolved, host Rahul Bhardwaj speaks with Drew Schardt, Co-Head of Direct Equity Investments at Hamilton Lane. This episode explores the rise of private markets and the shifting role of the public company model…
  continue reading
 
In July 2025, a sophisticated cyberattack campaign has emerged, leveraging Microsoft Teams to deploy Matanbuchus 3.0, a potent malware loader. This evolved version of Matanbuchus, available as a Malware-as-a-Service for as little as $2,500 on crime forums, boasts advanced stealth features like improved communication protocols, in-memory execution, …
  continue reading
 
Welcome to "AI or Not," the podcast where we explore the intersection of digital transformation and real-world wisdom, hosted by the accomplished Pamela Isom. With over 25 years of experience guiding leaders in corporate, public, and private sectors, Pamela, the CEO and Founder of IsAdvice & Consulting LLC, is a veteran in successfully navigating t…
  continue reading
 
One mis-typed contact detonates Signal Gate, turning “secure” messaging into a classified-data leak.Host Lieuwe Jan Koning (Co-founder, ON2IT) and Thomas Manolis (Security Officer, AMS-IX) lay out the breach blow-by-blow—then drop the Zero Trust, Shadow IT and information-governance tactics every CISO needs before the next incident hits.High stakes…
  continue reading
 
What happens when you combine crocodile encounters, buffalo hunting, and a submerged 4WD on a broken bridge in the middle of an outback river - with business ambition? You get Angus Dicker's incredible journey. Sam and I had so much fun in this episode! Angus Dicker is not your typical business owner. He’s managed to carve a life for himself in whi…
  continue reading
 
CISA issues an Emergency Directive to urgently patch a critical vulnerability in Microsoft Exchange hybrid configurations. SoupDealer malware proves highly evasive. Google patches a Gemini calendar flaw. A North Korean espionage group pivots to financial crime. Russia’s RomCom exploits a WinRAR zero-day. Researchers turn Linux-based webcams into pe…
  continue reading
 
What happens when there are 100 machine identities for every human one in your organisation? This is not a prediction for the future. It is the world we are already operating in, and the implications are profound. In this episode of Business of Cybersecurity, I speak with David Higgins, Senior Director at CyberArk, about how AI agents, autonomous s…
  continue reading
 
Company Stats Guest: Josh Asbury, Founder of BrokerPro Industry: Freight Tech / SaaS / AI Automation Company: BrokerPro Focus: TMS & workflow solutions for freight brokers and carriers Tech Stack: AI, TMS platforms, automation tools, email triage, PDF parsing, content optimization Episode Highlights ✅ Josh shares a powerful story of a small busines…
  continue reading
 
Guest Introduction Marc Ashworth is the Chief Information Security Officer at First Bank, a fourth-generation, family-owned bank headquartered in Creve Coeur, Missouri, with operations across six states. In his role, Marc oversees networking, physical security, financial crimes, and cybersecurity teams, providing a comprehensive approach to protect…
  continue reading
 
Social engineering attacks are becoming more sophisticated, and this episode of The Backup Wrap-up explores real-world tactics through our Mr. Robot series analysis. Curtis and Prasanna examine how social engineering works, from Instagram stalking to phone compromise, and discuss actual ransomware groups like Scattered Spider who use social enginee…
  continue reading
 
In May 2025, AT&T disclosed a massive data breach affecting approximately 86 million customer records, making it one of the largest cybersecurity incidents of the year. The breach involved sensitive personal information, including names, dates of birth, phone numbers, email addresses, physical addresses, and Social Security numbers. The compromised…
  continue reading
 
In this episode I address listener feedback and questions, from clarifying my stance on the “Tea” controversy to sharing practical tips from the community about Privacy.com workarounds. This episode covers some loose ends before I take a brief hiatus. I also discuss why I won’t be at Black Hat this year, share thoughts on minimalism versus practica…
  continue reading
 
Sponsored by Ericsson — In this episode, we explore how 5G connectivity is transforming the way Australian businesses innovate, compete, and grow. Drawing on insights from Ericsson’s Australia’s Enterprise State of Connectivity 2025 survey, we uncover why over 87% of enterprises see 5G as key to positioning Australia as a global technology leader —…
  continue reading
 
Episode Summary In this crossover episode of First Cheque and In The Blink of AI, Cheryl Mack (Aussie Angels) and Maxine Minter (Co Ventures) team up with host Georgie Healy to unpack how investors are thinking about AI, beyond the hype. From pitch decks to product demos, they reveal the frameworks and gut checks they use to spot real value in AI s…
  continue reading
 
Please enjoy this encore of Career Notes. Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new ex…
  continue reading
 
THE UBER BREACH: HOW A 17-YEAR-OLD HACKED A FORTUNE 500 COMPANY A 17-year-old hacker. A simple social engineering tactic. A taunting message posted to Uber’s internal Slack channel. In one of the most audacious breaches in recent memory, a teenager allegedly affiliated with the Lapsus$ group compromised a Fortune 500 company, exposing critical vuln…
  continue reading
 
Nicolás Chiaraviglio, Chief Scientist from Zimperium's zLabs, joins to discuss their work on "Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed." Zimperium’s zLabs team has been tracking an evolving banker trojan dubbed DoubleTrouble, which has grown more sophisticated in both its distribution and capabilities. Initially spread via …
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play