show episodes
 
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
  continue reading
 
Official Website: https://psysecure.com/podcast/ Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Artwork

1
The Harvard EdCast

Harvard Graduate School of Education

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
In the complex world of education, the Harvard EdCast keeps the focus simple: what makes a difference for learners, educators, parents, and our communities. The EdCast is a weekly podcast about the ideas that shape education, from early learning through college and career. We talk to teachers, researchers, policymakers, and leaders of schools and systems in the US and around the world — looking for positive approaches to the challenges and inequities in education. Through authentic conversat ...
  continue reading
 
Artwork

1
The Hacker's Cache

Kyser Clark - Cybersecurity

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
  continue reading
 
Artwork
 
Explore the minds of fascinating specialists ranging from mathematics, physics, web3, cybersecurity, HFT/MEV, startup founders, investigators and so many more. Every episode will give you a glimpse into the unknown unknowns. Enjoy your stay, anon. Keywords: mathematics, math, physics, biology, chemistry, solo auditor, public auditing platforms, private audits, scalability, freedom, Scraping Bits podcast, blockchain technology, audit industry, flashbots, reverse engineering, cybersecurity, in ...
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Artwork

1
CyBytes

Nik Mohanlal

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
CyBytes is a podcast that features bite-sized conversations with tech and cybersecurity pros - sharing insights, stories, and actionable advice to help you navigate and thrive in the industry
  continue reading
 
Artwork

1
ITSPmagazine Podcasts

ITSPmagazine, Sean Martin, Marco Ciappelli

icon
Unsubscribe
icon
Unsubscribe
Daily
 
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
  continue reading
 
Artwork
 
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
  continue reading
 
Artwork
 
Redefining Society and Technology Podcast | Musing On Society and Technology | Hosted by Marco Ciappelli | Let's face it: the future is now. We live in a Hybrid Analog Digital Society and it's time to stop ignoring the profound impact technology has on us. The line between the physical and virtual worlds is no longer real—it's a figment of our imagination. We're constantly juggling convenience, privacy, freedom, security, and the very future of humanity in a precarious balancing act. There’s ...
  continue reading
 
Artwork

1
SpyCast

SpyCast

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
SpyCast, the official podcast of the International Spy Museum, is a journey into the shadows of international espionage. Each week, host Sasha Ingber brings you the latest insights and intriguing tales from spies, secret agents, and covert communicators, with a focus on how this secret world reaches us all in our everyday lives. Tune in to discover the critical role intelligence has played throughout history and today. Brought to you from Airwave, Goat Rodeo, and the International Spy Museum ...
  continue reading
 
Artwork

1
Kitecast

Tim Freestone and Patrick Spencer

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
The cyber weekly

Deogratius Okello, Josephine Olok and Angella Nabbanja

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
  continue reading
 
Sunday Morning Matcha is a podcast where I explore biblical topics, health, cybersecurity, and general news through the lens of a new Christian. While I often feel unqualified, I’m passionate about sharing my journey of faith, tackling deep questions, and making complex ideas accessible and relatable.
  continue reading
 
Artwork

1
STEM Everyday

Chris Woods (DailySTEM)

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The STEM Everyday podcast focuses on how easy it is to incorporate STEM (Science, Technology, Engineering, Math) into education. We explore and share great ideas that inspire students to take ownership in their learning. Episodes include short (20 minute) interviews with educators, innovators, & authors who are using creative ways to add STEM to their classrooms and communities everyday!
  continue reading
 
Artwork

1
CMMC Academy

Armada Cyber Defense LLC

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
  continue reading
 
Artwork

1
Zero Breach Zone

Andy Lombardo & Phil Hintz

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Welcome to the "Zero Breach Zone," where we delve into the vital mission of fortifying K-12 schools against breaches and phishing threats. Hosts Andy Lombardo and Phil Hintz lead insightful conversations with top experts in cybersecurity, education, and technology, uncovering strategies to protect our schools. From breaking down the latest digital threats to sharing actionable security measures, this podcast empowers educators, administrators, and parents with the tools they need to safeguar ...
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
Treasury Talk PODCAST

Treasury Talk with MI Treasurer Rachael Eubanks

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Treasury Talk, a podcast for Michigan taxpayers hosted by State Treasurer, Rachael Eubanks. Our trending topics with Subject Matter Experts will include cybersecurity, tax prep tips, education savings plans, the budget and our economy, and leadership best practices. Listen for take-aways that will support you, your family and your business!
  continue reading
 
Artwork

1
High Turnout Wide Margins

High Turnout Wide Margins

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Co-hosts Brianna Lennon, county clerk in Boone County, Missouri and Eric Fey, director of elections in St. Louis County, Missouri, talk to subject-matter elections experts and local election administrators to ask the questions that are most meaningful to their work and talk with colleagues about how to best approach issues like voter education, cybersecurity, and integrity.
  continue reading
 
Welcome to the Tactical Cyber Podcast, where we transform strategic cyber insights into actionable tactics for everyday implementation. Join your hosts, retired FBI Supervisory Special Agent Darren Mott, and Risk Advisory Practice Leader at Warren Averett, Paul Perry. Together, they bring decades of experience from the front lines of cybersecurity and risk management to help business owners and individuals take the actions that will keep their business and personal digital data safe. Each ep ...
  continue reading
 
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Artwork

1
Plugged In: ACPE Amplified

ACPE: Association for Computer Professionals in Education

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
How people connect and learn has evolved in the 50+ years since ACPE was formed. But our mission and ethos haven’t: (1) increasing collaboration and professional development opportunities and (2) fostering long-lasting relationships among our members. We’re eager to keep diversifying ways to connect, learn, and have fun together. The Plugged In podcast is a place for us to amplify the voices of our colleagues and celebrate the work we do in education technology. Join hosts Marc Elliott and R ...
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
  continue reading
 
Artwork

1
The TechTual Talk

Henri Davis, The Radcast Network

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
  continue reading
 
Artwork

1
The Inevitability Curve

theinevitabilitycurve

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Every human endeavor leaves a trail through history, revealing patterns that shape its present and hint at its future. In each episode of this captivating series, host Chris Blask dives into the story of a specific topic—unearthing its origins, exploring its current landscape, and imagining what lies ahead. Joined by insightful guests from fields as diverse as technology, arts, education, and communications, Chris brings fresh perspectives to the forces shaping our world and the possibilitie ...
  continue reading
 
Artwork

1
DECAL Download

Georgia Department of Early Care and Learning

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Your source for news and information from the Georgia Department of Early Care and Learning. You will hear from Commissioner Amy M. Jacobs and special guests to give you an update on all things DECAL.
  continue reading
 
Presenting The Big Questions in Tech, an Airwalk Reply podcast, for expert insights on crucial tech topics. Each episode offers actionable insights for IT leaders and tech enthusiasts, from AI's business impact to cybersecurity trends. Join us to unravel innovation mysteries, explore groundbreaking advancements and decode modern tech complexities. Tune in for an engaging journey into technological education. Hosted by Airwalk Reply Partner Alex Hammond. For more information, check-out ⁠airwa ...
  continue reading
 
Artwork

1
CMMC Compliance Guide

CMMC Compliance Guide

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
  continue reading
 
elliTek's Automation Know-How is a quarterly podcast that takes you beyond the buzzwords to explore how real automation solutions are applied in real manufacturing environments. Hosted by Brandon Ellis, owner of elliTek and automation expert, each episode dives into the practical side of industrial automation — from hardware and software to integration strategies and IIoT — all grounded in how these technologies work on the factory floor. Whether you're an engineer, plant manager, or just au ...
  continue reading
 
Artwork
 
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
  continue reading
 
Welcome to the ETLA The Beat! This is the official podcast of the EdTech Leader Alliance. This is an Ohio based EdTech Leadership group acting as the COSN Chapter and ISTE Chapter. There is also a yearly ETLA Conference where leaders can meet and network to learn and grow around current topics in education. The group also support DPA, SPDC, Cybersecurity, Mentorship opportunities, AI, the COSN CETL program and more. Episodes will highlight topics supporting the EdTech community. For more inf ...
  continue reading
 
Loading …
show series
 
If you're using Azure, one misconfiguration could expose your business. Do not wait for the worst to happen, and listen to our latest podcast to help you fix this.Joining us today are Bob Bracke and Jorik Van Damme - both Azure consultants at The Collective. Together, we'll dive into the Azure Achilles' heel and explore the risks of a default Azure…
  continue reading
 
At RSAC Conference 2025, the conversation with Rob Allen, Chief Product Officer at ThreatLocker, centered on something deceptively simple: making cybersecurity effective by making it manageable. During this on-location recap episode, Rob shares how ThreatLocker cut through the noise of flashy booths and AI buzzwords by focusing on meaningful, face-…
  continue reading
 
At RSAC 2025, the most urgent signals weren’t necessarily the loudest. As ISACA board member and cybersecurity veteran Rob Clyde joins Sean Martin and Marco Ciappelli for a post-conference recap, it’s clear that conversations about the future of the profession—and its people—mattered just as much as discussions on AI and cryptography. More Than a J…
  continue reading
 
We delve into the infamous Fyre Festival, exploring the truth about fyre festival and how online fraud works. The Fyre Festival became a symbol of , how online fraudsters work. We discuss the extravagant promises made by the organizers, the disastrous execution of the event, and the legal consequences faced by its founder, Billy McFarland. Takeaway…
  continue reading
 
In this post-RSAC 2025 Brand Story, Marco Ciappelli catches up with Steve Schlarman, Senior Director of Product Management at Archer, to discuss the evolving intersection of GRC, AI, and business value. From regulatory overload to AI-enhanced policy generation, this conversation explores how meaningful innovation—grounded in real customer needs—is …
  continue reading
 
Send us a text Today, we're discussing the pivotal changes and initiatives that are reshaping literacy training in Georgia. Beginning July 1, all child care providers will be required to obtain at least 2 hours of state-approved language and literacy training annually. This move underscores DECAL’s commitment to enhancing language and literacy outc…
  continue reading
 
DevSecOps practices foster collaboration among software development, security, and operations teams to build, test, and release software quickly and reliably. A high-stakes, high-security environment has challenged the implementation of these practices within the Department of Defense (DoD). The DoD Chief Information Officer (CIO) organization part…
  continue reading
 
By Adam TurteltaubUzbekistan, Kazakhstan, Tajikistan, Turkmenistan and Kyrgyzstan were all born out of the dissolution of the Soviet Union. With large energy deposits of national gas, many global companies and their suppliers are operating within these countries.To better understand the compliance risks there, we spoke with Timur Khasanov-Batirov, …
  continue reading
 
Welcome to episode 15 of the Zero Breach Zone podcast, where hosts Phil Hintz and Andy Lombardo discuss their experiences at recent conferences, focusing on cybersecurity strategies in K-12 education. They explore the importance of multi-factor authentication (MFA), the challenges of session timeouts, and the need for continuous improvement in cybe…
  continue reading
 
After Russia’s full scale invasion of Ukraine, the U.S. rushed to create a secret center that set targets for the Ukrainians to destroy. But the counteroffensive of 2023 failed to achieve its goals. So, what went wrong? New York Times reporter Adam Entous spent more than a year reporting on this story. He joins SpyCast host Sasha Ingber to talk abo…
  continue reading
 
Send us a text What happens when a former Air Force weapons loader transforms into a cybersecurity expert? Clint Stevens from Physics joins us to share his remarkable journey through military intelligence, special operations support, and cyber warfare before founding his own security consultancy. This conversation peels back the layers of cybersecu…
  continue reading
 
Guest: Guest: Jeremy Lasman Website: https://www.jeremylasman.com LinkedIn: https://www.linkedin.com/in/jeremylasman _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society & Technology Podcast Visit Marco's website 👉 https://www.marcociappelli.com _____________________________ …
  continue reading
 
Guest: Guest: Jeremy Lasman Website: https://www.jeremylasman.com LinkedIn: https://www.linkedin.com/in/jeremylasman _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society & Technology Podcast Visit Marco's website 👉 https://www.marcociappelli.com _____________________________ …
  continue reading
 
Kurt Long, founder and CEO of a privacy-based messaging app BUNKR (https://www.bunkr.life/) join David Mauro to discuss: how civil discourse helps our country, Newest Ways To Take Control Over Data Privacy, and why protecting online privacy is important. Summary The conversation explores the topics of data privacy, government surveillance, and unde…
  continue reading
 
Learn how you can work with me one on one to secure a $90K+ cybersecurity role: link: https://techtualconsulting.tech/video-training ------------------------------------------------------------------------------------ In this episode, HD and CyberShortiee break down CrowdStrike's recent layoffs, Change HealthCare's breach update, major cybersecurit…
  continue reading
 
Send us a text Cybersecurity professionals need a solid understanding of secure communication protocols, not just for exam success but for real-world implementation. This episode unpacks the essential protocols covered in CISSP Domain 4.1.3, providing clear explanations of how each works and when to use them. We begin with a timely discussion of th…
  continue reading
 
Show notes Follow Syed https://www.linkedin.com/in/syed-ali-turab Email Syed [email protected] Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberweekly Like and Follow our X page https://twitter.com/thecyberweekly Follow Deogratius Okello https://www.linkedin.com/in/deo-okello/ https://twitter.com/deookello51 Follow Jo…
  continue reading
 
Your Host, DeGatchi: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://x.com/DeGatchi⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ DeGatchi's Website: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://degatchi.com⁠⁠⁠⁠⁠⁠⁠⁠⁠ Follow Scraping Bits on Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://x.com/scrapingbits⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Guest Speaker:⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://x.com/JackJMayo1 Keywords: mathematics, math, topology, geometry, game theory, calculus, linear algeb…
  continue reading
 
The Out of Tune Instruments On the bank of a stream, where a great many colorful little fish swam, lived a small family: mamma, babbo, and their seven children — four boys and three girls. Their house was a bit far from the town of Strumentopoli, but being close to the stream and next to the Great Forest made it a wonderful place to live. Mamma lov…
  continue reading
 
Podcast Episode Summary: In this episode, I reflect on how my perspective on entertainment—like movies, music, and video games—has changed since coming to Christ. While I once enjoyed these things freely, I now struggle with feelings of guilt, not because these things are inherently sinful, but because I’ve started viewing them through the lens of …
  continue reading
 
Your Host, DeGatchi: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://x.com/DeGatchi⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ DeGatchi's Website: ⁠⁠⁠⁠⁠⁠⁠⁠https://degatchi.com⁠⁠⁠⁠⁠⁠⁠⁠ Follow Scraping Bits on Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://x.com/scrapingbits⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Guest Speaker:⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://x.com/Piovego_ Keywords: mathematics, math, topology, geometry, game theory, calculus, linear algebra, categor…
  continue reading
 
Submit any questions you would like answered on the podcast! Get the latest insider takeaways from CMMC Day 2025 straight from Washington D.C. In this episode of the CMMC Compliance Guide Podcast, Brooke and Austin break down the most critical updates small and midsized businesses (SMBs) in the defense supply chain need to know now. We cover: ✅ Why…
  continue reading
 
- CEO of a Cybersecurity Company Charged for Planting Malware. - Microsoft to Expand Hotpatching. - Apple Airplay is Being Exploited. - Ransomware Cripples Hospitals. Support the show Remember... Even with top-tier security, human negligence and/or error can compromise systems. Invest in employee training—it’s the ultimate safeguard. Stay Informed,…
  continue reading
 
🔥 “I didn't have a roadmap. I had to figure out threat intelligence by doing the job.” — Renze Jongman In this conversation, Renze Jongman shares his journey from law enforcement to the world of cybersecurity, detailing his experiences in threat intelligence and the cultural dynamics of working in the UAE. He discusses the importance of AI in enhan…
  continue reading
 
Host David Mauro interviews Jon DiMaggio, a well-respected cybercrime investigator, delving into the operations of LockBit, once the Top ransomware gang and now a Cyber Crime Gang Exposed. We discuss the Ransomware Take Down of #Lockbit, and how Jon’s research led to cyber criminals exposed on #cybercrimejunkies. #lockbit #ransomware #cybercrime Do…
  continue reading
 
At OWASP AppSec Global in Barcelona, the focus is clear: building secure software with and for the community. But it’s not just about code or compliance. As Avi Douglen, OWASP Foundation board member, describes it, this gathering is a “hot tub” experience in contrast to the overwhelming scale of mega conferences. It’s warm, immersive, and welcoming…
  continue reading
 
Did you know there are 500 million tweets per day? 3 billion monthly active Facebook users? 1 billion LinkedIn members? Are you one of them? In this webcast, Destiney Marie Plaza reveals how a hacker can use seemingly benign public information to customize an attack on a victim by showing a scenario-based attack and demo (using free and open-source…
  continue reading
 
Chris Blask and Casey Ellis, co-founder of Bugcrowd, explore the evolution of AI in cybersecurity. They discuss the generative AI hype cycle, the challenges faced, and introduce a taxonomy for AI's role in risk management. The conversation emphasizes the need for clear definitions of AI for effective policy and regulation. They highlight the import…
  continue reading
 
Small and medium-sized enterprises (SMEs) continue to be at a disadvantage when it comes to cybersecurity—not because the risks are unclear, but because the means to address them remain out of reach for many. In this episode, Professor Steven Furnell of the University of Nottingham highlights the real barriers SMEs face and shares the thinking behi…
  continue reading
 
In this episode, Steve and John dive into why securing systems is a must-know skill in cybersecurity. Learn the basics of system hardening, access control, and logging, plus practical tools and labs to get hands-on. They also explore how AI can boost your defense game — and why thinking like both an attacker and defender will set you apart. +++++++…
  continue reading
 
By Adam TurteltaubIt’s not a good time to be a manufacturer of ten-foot poles. That’s because with the growing number of sanctions regimes, there are an increasing number of companies and individuals that businesses shouldn’t touch with a poll of ten feet, or any length for that matter.Rachel Gerstein, who most recently served as Vice President, Gl…
  continue reading
 
Send us a text Security regulations are changing dramatically in response to major breaches, and the implications for cybersecurity professionals are profound. Sean Gerber kicks off this episode with a career announcement, sharing his transition to independent consulting after 13 years with his previous employer—a move that highlights the evolving …
  continue reading
 
Elizabeth Houser, Director of Cyber defense at Defense Storm, discusses her role in cybersecurity and her creation of the Security Intel Bulletin. We discuss what cyber risk means for business leaders today. She emphasizes the importance of translating cybersecurity topics into plain language to increase awareness and understanding among business l…
  continue reading
 
Send us a text Surgical robotics stands at the fascinating crossroads of cutting-edge technology and life-saving medical innovation. Dave Saunders, a seasoned technology leader with three decades of experience spanning from early internet protocols to modern surgical robotics, takes us deep into this revolutionary field. The stakes couldn't be high…
  continue reading
 
Texas and California often appear to be worlds apart when it comes to politics and culture, but the education students are getting – as far as their textbooks go, at least – may not be so different. University of Chicago Assistant Professor Anjali Adukia investigated more than 260 textbooks used in both public and religiously affiliated schools in …
  continue reading
 
In this episode, hosts Eric Fey and Brianna Lennon speak with Amanda McColley. She’s the Regional Supervisor for the Division of Elections Region III office in Alaska, which covers Fairbanks and the interior of Alaska. They spoke about some of the unique challenges Alaskan election administrations can face – think having to load election equipment …
  continue reading
 
Betta Lyon Delsordo started coding at just 13 years old and never looked back. In this episode, she shares how learning to code as a rebellious teen sparked a career that led her from freelance web development to becoming a lead application pentester specializing in web, cloud, and AI hacking. We talk about how anyone can learn to code, the importa…
  continue reading
 
Send us a text This week we’re diving into an impactful program designed for early care and education professionals called Physical Activity Learning Sessions, or PALS. This training initiative is centered on enhancing the knowledge of physical activity best practices for children from birth to five years old. Here to talk about the transformative …
  continue reading
 
Send us a text In this episode of the Cyber Savvy Podcast, host Mike Shelah chats with James Stanger, Chief Technology Evangelist at CompTIA. James shares his unique journey from a PhD in British Romantic Literature to becoming a cybersecurity expert. The conversation explores the revolution in cybersecurity, the critical importance of backups in f…
  continue reading
 
By Adam TurteltaubThe current fee-for-services model in healthcare has challenges, to say the least. Value-based care, explains, Colleen Gianatasio, Vice President of Compliance, CoventBridge, takes a different approach by asking four questions: What are the needs for both patients and providers? What are the challenges and barriers to meeting them…
  continue reading
 
Conflict has been escalating between two nuclear powers–India and Pakistan. It started in April, after India blamed Pakistan for supporting militants who carried out a massacre in Kashmir. President Trump offered to help defuse the tensions.Throughout history, India and Pakistan’s hostility has been documented in the President's Daily Brief, a high…
  continue reading
 
In this episode, I discuss what has been keeping me away from the mic, the Open Source Intelligence Defense and Security Framework (ODSF), and share updates on privacy topics including browser security, autonomous taxis, airport security cameras, and managing cryptocurrency. I also address listener questions about anonymous SIM cards and creating s…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play