Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
…
continue reading
The Expert Podcast brings you firsthand narratives from experts across diverse industries, including private investigators, general contractors and builders, insurance agencies, vehicle specialists, lawyers, and many others.
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Expert payments attorneys discuss the electronic payments industry from a legal perspective.
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Sunny’s Silver Linings is a Top MSP Channel Podcast hosted by the CEO of IT By Design, Sunny Kaila. Sunny and his guests cover a wide range of MSP and Talent-based topics, including MSP services, cybersecurity, customer service, and strategies to achieve growth and success in the channel. Listen now to take your business to the next level! https://hubs.ly/Q02DrxnQ0
…
continue reading
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven atta ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Hosted by cybersecurity and anti-fraud leader Paul Benda of the American Bankers Association, the ABA Fraudcast brings you expert insights, tools and strategies to help fight fraud.
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
a unique perspective on technology
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
…
continue reading
Hosted by Brett Gallant, founder of Adaptive Office Solutions, The Adaptive Mindset is the podcast for entrepreneurs and leaders ready to embrace change, overcome limiting beliefs, and grow both personally and professionally. Through compelling stories, expert insights, and actionable strategies, each episode empowers you to adapt, lead, and thrive in a rapidly changing world. From mindset shifts to business resilience and cybersecurity, this is your go-to resource for unlocking your full po ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Welcome to F for Forensics — the ultimate digital forensic podcast for cybersecurity professionals, investigators, and tech sleuths! Hosted by Ben and Alex, each episode explores the tools, techniques, and real-world cases behind computer forensics, file system analysis, data recovery, incident response, and more. Whether you're into NTFS carving, malware artifacts, or forensic imaging, this is your byte-sized boost of expert insight and geeky banter. Subscribe now for deep dives into digita ...
…
continue reading
Techstrong Gang is your go-to weekday show on Techstrong TV and your favorite podcast platform, bringing together a rotating lineup of top thought leaders and technologists to break down the biggest stories and trends shaping the tech world. Hosted by industry veterans Alan Shimel, Mike Vizard, Mitchell Ashley, Jon Swartz, Lisa Martin, Tracy Ragan, Sulagna Saha, Anne Ahola Ward, Bonnie Schneider, and more, the show dives deep into everything from DevOps and cybersecurity to AI and cloud inno ...
…
continue reading
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Empowering Your IT Career Journey – From the first step to success! With a passion for technology and a mission to uplift others, I’m here to guide you through the dynamic IT industry. Whether you're just starting or looking to advance, you’ve found a community dedicated to your growth. Advice & Insights: From Help Desk to Director of Network Operations in 3 years, I share strategies to fast-track your career. Expert Conversations: Gain exclusive insights from industry leaders. Let’s make IT ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Welcome to "AI or Not," the podcast where digital transformation meets real-world wisdom, hosted by Pamela Isom. With over 25 years of guiding the top echelons of corporate, public and private sectors through the ever-evolving digital landscape, Pamela, CEO and Founder of IsAdvice & Consulting LLC, is your expert navigator in the exploration of artificial intelligence, innovation, cyber, data, and ethical decision-making. This show demystifies the complexities of AI, digital disruption, and ...
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
Darren Pulsipher, Chief Solution Architect for Public Sector at Intel, investigates effective change leveraging people, process, and technology. Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution. People Workers are at the heart of many of today’s biggest digital transformation projects. Learn how to transform ...
…
continue reading
Revenera experts are joined by industry leaders for discussions on all the latest talking points in the world of software.
…
continue reading
Insights from the Experts Who Power Secureworks Taegis.
…
continue reading
Welcome to PCN Podcasts! In Check with Fintech is our series which focuses on all things related to payments, fintech, blockchain, cybersecurity, and e-commerce. Our other series Work It Out focuses on the stories of leaders and experts with a wide range of insights for our audience. From start-ups to global brands, we dive into the ins and out of their industries to work out their formulas for success.
…
continue reading
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading

1
Printer Problems: Trump, Putin, and a Costly Mistake
15:51
15:51
Play later
Play later
Lists
Like
Liked
15:51On the eve of the Trump–Putin summit, sensitive U.S. State Department documents were left sitting in a hotel printer in Anchorage. Guests stumbled on pages detailing schedules, contacts, and even a gift list—sparking international headlines and White House mockery. But the real story isn’t just about geopolitics. It’s about how unmanaged printers—a…
…
continue reading

1
Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet... - SWN #506
33:44
33:44
Play later
Play later
Lists
Like
Liked
33:44Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-506
…
continue reading

1
Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet... - SWN #506
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-506
…
continue reading

1
When Change Becomes the Biggest Threat with Edward Amoroso, CEO of TAG Infosphere
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05This episode features Ed Amoroso, CEO of TAG Infosphere and former AT&T Chief Security Officer. With decades of experience securing complex infrastructures, Ed joins during a period of unprecedented change in the U.S. federal government, a moment he warns is ripe for cyberattacks. In this episode, Ed explains why rapid organizational shifts create …
…
continue reading
Got a question or comment? Message us here! Fresh off the chaos of DEF CON 33, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickman’s clutch CTF victory and Will’s bold dive into the Social Engineering Community’s Vishing Competition. No sleep, all signal. Suppor…
…
continue reading

1
🔴 Aug 26’s Top Cyber News NOW! - Ep 949
1:34:10
1:34:10
Play later
Play later
Lists
Like
Liked
1:34:10The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services at https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what…
…
continue reading

1
Embracing AI: Strategies for Entrepreneurs to Thrive in a Changing Landscape
40:45
40:45
Play later
Play later
Lists
Like
Liked
40:45In episode 34 of The Adaptive Mindset, Brett Gallant interviews Cooper Simpson, Portfolio Manager for Dan Martell at Martell Ventures, as he shares his journey from being an entrepreneur to pivoting into the AI space, discussing the challenges he faced and the mindset shifts that helped him thrive. Tune in for insights on innovation, leadership, an…
…
continue reading
In this episode of the Techstrong Gang, host Alan Shimel is joined by JP Morgenthal and Stephen Foskett to discuss the implications of the U.S. partnership with Intel, which includes a 10% government stake. The conversation raises concerns about government involvement in production and how it could reshape market competition. The gang also dives in…
…
continue reading

1
U.S. vs International and European Cybersecurity Standards | Interview with John Verry
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34In this episode, host Dejan Kosutic, CEO of Advisera, welcomes John Verry, Managing Director at CBIZ Pivot Point Security consulting company. With over 25 years of experience and managing more than a thousand clients, John shares his immense expertise in various cybersecurity frameworks, including ISO 27001, CMMC, HIPAA, and HITRUST. The discussion…
…
continue reading

1
Narco-Influencers: Mexico's Corrupted Landscape.
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33Estos materiales exploran la creciente influencia de los narcos en la cultura digital mexicana, un fenómeno que se manifiesta a través de los "narcoinfluencers". Los textos describen cómo los cárteles han evolucionado desde la propaganda tradicional de los narcocorridos hasta el marketing digital sofisticado en redes sociales como TikTok, utilizand…
…
continue reading

1
ESPAÑOL: Narco-Influencers: El Paisaje Corrupto de México.
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33La creciente influencia de los narcos en la cultura digital mexicana, un fenómeno que se extiende desde los tradicionales narcocorridos hasta las sofisticadas estrategias en redes sociales. El texto detalla cómo los cárteles utilizan plataformas como TikTok para glamorizar estilos de vida criminales, reclutar nuevos miembros y ejercer control a tra…
…
continue reading

1
Translating Security Regulations into Secure Projects - Roman Zhukov, Emily Fox - ASW #345
1:13:31
1:13:31
Play later
Play later
Lists
Like
Liked
1:13:31The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
…
continue reading

1
Translating Security Regulations into Secure Projects - Emily Fox, Roman Zhukov - ASW #345
1:13:31
1:13:31
Play later
Play later
Lists
Like
Liked
1:13:31The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
…
continue reading

1
E039 – AI or Not – Stephen Pullum and Pamela Isom
51:24
51:24
Play later
Play later
Lists
Like
Liked
51:24Welcome to "AI or Not," the podcast where we explore the intersection of digital transformation and real-world wisdom, hosted by the accomplished Pamela Isom. With over 25 years of experience guiding leaders in corporate, public, and private sectors, Pamela, the CEO and Founder of IsAdvice & Consulting LLC, is a veteran in successfully navigating t…
…
continue reading

1
ESPAÑOL: La brecha digital de Uruguay: una crisis de confianza y seguridad.
23:10
23:10
Play later
Play later
Lists
Like
Liked
23:10Este informe analiza extensas violaciones de datos que afectan a las entidades gubernamentales uruguayas, revelando una disparidad significativa entre la reputación de liderazgo digital de la nación y sus capacidades reales de ciberseguridad. Destaca la venta de millones de registros confidenciales, incluidos 30,000 certificados de infraestructura …
…
continue reading

1
The Missing Million: When Family Greed Hijacks Your Inheritance
3:15
3:15
Play later
Play later
Lists
Like
Liked
3:15Episode Description Discover the shocking truth about inheritance theft and what you can do to protect your rightful assets. This episode explores how trustees and estate executors sometimes hide, steal, or mismanage inheritances, leaving heirs empty-handed. Learn the warning signs and your legal rights as a beneficiary. Key Topics Covered: Trust a…
…
continue reading

1
The Paper Trail of Deception: Inside the Million-Dollar Title Fraud That Fooled Everyone
2:58
2:58
Play later
Play later
Lists
Like
Liked
2:58Key Warning Signs & Red Flags Fraudulent titles are increasingly common in private vehicle sales through Craigslist, Facebook Marketplace, and OfferUp Sellers may appear legitimate by providing what looks like an official title document Even when handed a physical title certificate, the document could still be fraudulent How Title Fraud Schemes Wor…
…
continue reading

1
The Credit Crunch: Why Banks Are Suddenly Pulling Back on Auto Loans
5:54
5:54
Play later
Play later
Lists
Like
Liked
5:54Key Points Covered: Major Lender Shutdown: Automotive Credit Corp has paused all loan originations indefinitely, effective August 7th, signaling serious industry-wide concerns Staggering Payment Statistics: 20% of all consumers now have car loan payments over $1,000 monthly - that's one out of every five people with extreme payment burdens Economic…
…
continue reading

1
The Great EV Flip: Why Yesterday's Electric Dreams Are Today's Hottest Deals
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33Episode Description Something interesting is happening in the electric vehicle market - new EV registrations are climbing despite significant headwinds. While Tesla sales decline and government incentives face uncertainty, more consumers are discovering EVs as practical secondary vehicles at unprecedented prices. Key Topics Covered Market Contradic…
…
continue reading

1
The VIN Code Conspiracy: Why Auto Parts Hold More Secrets Than You Think
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45Episode Description Thinking about swapping parts between vehicles or dealing with VIN-related issues? Before you make any moves, you need to understand the serious legal implications. This episode breaks down the federal laws surrounding VIN tampering and why even well-intentioned mistakes can land you in serious trouble with the Department of Jus…
…
continue reading

1
The Great Job Shift: Why AI Won't Steal Your Career (But It Will Transform It)
3:16
3:16
Play later
Play later
Lists
Like
Liked
3:16Episode Description The employment landscape is rapidly changing due to artificial intelligence, and the conversation around job displacement has reached a critical point. Tech industry figure Bill Gates recently made headlines claiming only three jobs will survive the AI revolution - a stark prediction that's already becoming reality as we see cha…
…
continue reading

1
The Human Cost: When AI Systems Fail, Who Pays the Price?
4:57
4:57
Play later
Play later
Lists
Like
Liked
4:57Episode Description Artificial intelligence promises incredible breakthroughs, from curing cancer to revolutionizing how we work. But like any powerful technology, AI comes with significant risks that could impact every aspect of our lives. In this episode, we explore the hidden costs and potential dangers of AI systems, examining real-world exampl…
…
continue reading

1
From One-Off to Streamlined: How Smart Contractors Are Scaling with Bulk Surety Bond Setups
5:36
5:36
Play later
Play later
Lists
Like
Liked
5:36Episode Description Learn how builders and contractors can eliminate the constant hassle of individual surety bond applications by setting up a comprehensive bonding facility. This episode breaks down the strategic approach to creating a line of pre-approved bonds that can be used at your discretion for bids and contracts. Key Topics Covered What i…
…
continue reading

1
Escape the Car Payment Trap: 5 Proven Strategies to Cut Your Monthly Auto Costs in Half
3:53
3:53
Play later
Play later
Lists
Like
Liked
3:53Episode Description Are you drowning in car payments that are stretching your budget to the breaking point? You're not alone. Consumer auto loan burdens are reaching crisis levels, with many people paying $1,000+ monthly for vehicles they can no longer afford or need. This episode reveals proven strategies to escape the car payment trap and regain …
…
continue reading

1
The Hidden Costs of Car Ownership: When Lenders Can (and Can't) Charge You Storage Fees on Your Title
4:56
4:56
Play later
Play later
Lists
Like
Liked
4:56Episode Description Can you legally charge storage fees on a vehicle to obtain its title? This episode breaks down the complex regulations surrounding vehicle storage fees and title ownership. Our expert explains when storage fees are legitimate, what licenses are required, and why this approach might not be your best option for acquiring a car tit…
…
continue reading

1
Uruguay's Digital Breach: A Crisis of Trust and Security
46:30
46:30
Play later
Play later
Lists
Like
Liked
46:30This report analyzes extensive data breaches affecting Uruguayan government entities, revealing a significant disparity between the nation's reputation for digital leadership and its actual cybersecurity capabilities. It highlights the sale of millions of sensitive records, including 30,000 National ID Public Key Infrastructure (PKI) certificates w…
…
continue reading

1
Rethinking Cybersecurity in the Age of AI and Digital Twins
53:29
53:29
Play later
Play later
Lists
Like
Liked
53:29Artificial intelligence is transforming nearly every industry, and cybersecurity is no exception. On the latest episode of the TechSpective Podcast, I spoke with Kevin Simzer, COO of Trend Micro, about how generative and agentic AI are reshaping development and defense […] The post Rethinking Cybersecurity in the Age of AI and Digital Twins appeare…
…
continue reading

1
X Corp.'s Content Moderation Practices and Challenges.
47:23
47:23
Play later
Play later
Lists
Like
Liked
47:23This research offers an expert analysis of X's (formerly Twitter's) account suspension and moderation practices, highlighting a significant disconnect between its stated commitment to "free speech" and the platform's often opaque and inconsistent enforcement of rules. It outlines how automated systems primarily handle suspensions, which are effecti…
…
continue reading

1
Non-Competes Non-Solicits & Merchant Payments: What’s Really Enforceable | Contracts Matter | PEP061
9:03
9:03
Play later
Play later
Lists
Like
Liked
9:03Non-Competes, Non-Solicits, and Your Bottom Line: What Every Payments Professional Must Know The fine print in your payment processing agreements could be quietly limiting your earning potential, career mobility, and business growth—and you might not even realize it. When was the last time you scrutinized the restrictive covenant language buried in…
…
continue reading

1
🔴 Aug 25’s Top Cyber News NOW! - Ep 948
1:31:00
1:31:00
Play later
Play later
Lists
Like
Liked
1:31:00The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services at https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what…
…
continue reading

1
F is for Fragments in Time – Building Forensic Timelines
34:33
34:33
Play later
Play later
Lists
Like
Liked
34:33In this episode we explore the art of turning scattered digital artifacts into clear, chronological narratives. From file system timestamps to super timelines, learn how to connect actions, detect anomalies, and tell the real story hidden in your data. Listen now! Thank you for listening! Find us on social media @FforForensics…
…
continue reading
Alan, Mike, Mitch, Jack Poller and Dr. Stacy Thayer debate the DevSecOps significance of a software understanding being led by the Cybersecurity and Infrastructure Security Agency (CISA) before diving into an effort to shift more responsibility for data privacy further left along with application security and compliance issues. Then the gang delves…
…
continue reading

1
Third-Party Risk Management in Healthcare
22:02
22:02
Play later
Play later
Lists
Like
Liked
22:02Ever wonder why healthcare organizations are such prime targets for cyberattacks? In this eye-opening conversation with Kelly White, founder of Risk Recon, we uncover the startling reality that healthcare accounts for 37% of all breach events in the last decade. Kelly's journey from soldering Timex Sinclair computers in the late 70s to founding a p…
…
continue reading

1
Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
…
continue reading

1
Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
…
continue reading

1
Public Wi-Fi Myths: Why You’re Probably Safer Than You Think
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41Public Wi-Fi has a bad reputation — but in 2025, the “you’ll get hacked instantly” fear is largely outdated. In this episode, Tom and Kevin dig into real research and modern protections that make most public Wi-Fi connections reasonably safe. We’ll explore why HTTPS, device security, and updated standards have drastically reduced the risks, what th…
…
continue reading

1
Image-Based Sexual Abuse: Global Analysis and Legal Responses.
52:39
52:39
Play later
Play later
Lists
Like
Liked
52:39This comprehensive document analyzes image-based sexual abuse (IBSA), moving beyond the misnomer of "revenge porn" to define it as the non-consensual distribution of intimate images (NDII), often driven by power and control rather than simple revenge. It explores the diverse motivations of perpetrators, ranging from financial gain to misogyny, and …
…
continue reading

1
Book overview: The Satoshi Variant: An Accidental Genesis Block.
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21This is an overview of a fictional narrative about a woman named Ana, a "Digital Thanatologist" who specializes in decommissioning AI, and her unexpected relationship with an entity calling himself Satoshi, the decentralized, multi-persona embodiment of the Bitcoin creator. This narrative explores themes of identity, technology, and connection thro…
…
continue reading

1
Email Spoofing: Deception, Detection, and Defense.
38:46
38:46
Play later
Play later
Lists
Like
Liked
38:46The provided text examines the fundamental vulnerability of email spoofing, stemming from the original design of the Simple Mail Transfer Protocol (SMTP) which separates the sender's transport address from the displayed "From" address. It illustrates how this flaw can be exploited through basic command-line tools like Telnet or automated scripts us…
…
continue reading

1
The Controversial World of Jonathan Scott's Cybersecurity Claims
33:16
33:16
Play later
Play later
Lists
Like
Liked
33:16The provided text analyzes Jonathan Scott, also known as @jonathandata1, a figure in cybersecurity known for his polarizing claims. Scott presents himself as an expert in mobile malware and digital forensics, despite facing widespread criticism from his peers who label his work as disinformation and pseudoscience. While he possesses some verifiable…
…
continue reading

1
An Alberto Birthday Roast and Celebration
25:51
25:51
Play later
Play later
Lists
Like
Liked
25:51The provided text captures an audio space conversation celebrating Alberto's birthday, with various participants sharing personal anecdotes and well-wishes. The discussion covers a wide range of topics, including Alberto's past experiences, his involvement in cybersecurity and online spaces, and his quirky personality. The speakers also engage in m…
…
continue reading

1
SIN CITY CYBERATTACK | Inside MGM Casino's $100M Hack
30:20
30:20
Play later
Play later
Lists
Like
Liked
30:20SIN CITY CYBERATTACK: INSIDE THE MGM & CAESARS CASINO BREACHES In September 2023, Las Vegas turned into ground zero for one of the most disruptive cyberattacks in U.S. history. MGM Resorts, owner of iconic casinos on the Strip, saw slot machines go dark, hotel check-ins grind to a halt, and operations paralyzed for days. At the same time, Caesars E…
…
continue reading

1
The Electric Revolution: How EVs Went from Niche to Must-Have
3:13
3:13
Play later
Play later
Lists
Like
Liked
3:13Episode Description Are electric vehicles finally hitting their stride in mainstream America? According to Auto blog, many states are seeing significant acceleration in EV purchases and registrations. But this cultural shift comes with complex considerations that every potential buyer should understand. Key Topics Covered: EV Adoption Trends - Grow…
…
continue reading

1
Underground: Hacking, Madness, and Obsession on the Electronic Frontier.
36:32
36:32
Play later
Play later
Lists
Like
Liked
36:32The provided sources analyze the extraordinary activity of Alberto Daniel Hill (adanielhill) on X Spaces, highlighting his unprecedented hosting frequency and engagement. Since 2021, he has hosted nearly 2,000 spaces, averaging over one per day, which positions him among the top 30 global hosts. Beyond hosting, Hill has also co-hosted over 200 spac…
…
continue reading

1
Free Vlady: Cybersecurity and the Law in Uruguay.
35:42
35:42
Play later
Play later
Lists
Like
Liked
35:42These sources consist of transcripts from YouTube videos by the channel "CYBERMIDNIGHT CLUB," primarily focusing on interviews and statements from a hacker known as Gob or Gob Etherium. The central topic is the arrest and imprisonment of Gob's 18-year-old friend, Vlady, who is accused of various cybercrimes in Uruguay, including the defacement of t…
…
continue reading

1
Digital Witnesses: Unlocking the Secret Data Your Car Has Been Recording About You
4:45
4:45
Play later
Play later
Lists
Like
Liked
4:45Episode Description Your car knows more about you than you think. Every modern vehicle comes equipped with a black box system that records detailed data about your driving habits, passenger activity, and vehicle operations - and this information can be extracted and analyzed by forensic experts. Key Topics Covered: Vehicle Black Box Basics - How mo…
…
continue reading

1
The Invisible Attack Surface: Why 87% of Data Breaches Start Where You're Not Looking
4:38
4:38
Play later
Play later
Lists
Like
Liked
4:38Episode Description Discover how cybercriminals are exploiting the devices you never suspected could be security risks. From apartment building intercoms to smoke detectors, learn why every connected device in your business could be an open door for hackers. Key Points Covered: Real-World Attack Example: Apartment building hacked through intercom s…
…
continue reading