show episodes
 
Artwork

1
Practical AI

Practical AI LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
  continue reading
 
The Expert Podcast brings you firsthand narratives from experts across diverse industries, including private investigators, general contractors and builders, insurance agencies, vehicle specialists, lawyers, and many others.
  continue reading
 
Artwork

1
Dirty South Security Podcast

VerSprite Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
  continue reading
 
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Sunny’s Silver Linings is a Top MSP Channel Podcast hosted by the CEO of IT By Design, Sunny Kaila. Sunny and his guests cover a wide range of MSP and Talent-based topics, including MSP services, cybersecurity, customer service, and strategies to achieve growth and success in the channel. Listen now to take your business to the next level! https://hubs.ly/Q02DrxnQ0
  continue reading
 
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Cyber Defense Radio

Cyber Defense Magazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven atta ...
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Artwork
 
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
ABA Fraudcast

American Bankers Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted by cybersecurity and anti-fraud leader Paul Benda of the American Bankers Association, the ABA Fraudcast brings you expert insights, tools and strategies to help fight fraud.
  continue reading
 
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Artwork

1
The AI Security Edge

theaisecurityedge

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork

1
Daily Cyber Threat Brief

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
  continue reading
 
Artwork
 
Hosted by Brett Gallant, founder of Adaptive Office Solutions, The Adaptive Mindset is the podcast for entrepreneurs and leaders ready to embrace change, overcome limiting beliefs, and grow both personally and professionally. Through compelling stories, expert insights, and actionable strategies, each episode empowers you to adapt, lead, and thrive in a rapidly changing world. From mindset shifts to business resilience and cybersecurity, this is your go-to resource for unlocking your full po ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Welcome to F for Forensics — the ultimate digital forensic podcast for cybersecurity professionals, investigators, and tech sleuths! Hosted by Ben and Alex, each episode explores the tools, techniques, and real-world cases behind computer forensics, file system analysis, data recovery, incident response, and more. Whether you're into NTFS carving, malware artifacts, or forensic imaging, this is your byte-sized boost of expert insight and geeky banter. Subscribe now for deep dives into digita ...
  continue reading
 
Artwork

1
Techstrong Gang

Techstrong Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Techstrong Gang is your go-to weekday show on Techstrong TV and your favorite podcast platform, bringing together a rotating lineup of top thought leaders and technologists to break down the biggest stories and trends shaping the tech world. Hosted by industry veterans Alan Shimel, Mike Vizard, Mitchell Ashley, Jon Swartz, Lisa Martin, Tracy Ragan, Sulagna Saha, Anne Ahola Ward, Bonnie Schneider, and more, the show dives deep into everything from DevOps and cybersecurity to AI and cloud inno ...
  continue reading
 
Artwork

1
ThreatCast

Threatscape

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork

1
The I.T. Career Podcast

The Bearded I.T. Dad - Dakota Snow

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Empowering Your IT Career Journey – From the first step to success! With a passion for technology and a mission to uplift others, I’m here to guide you through the dynamic IT industry. Whether you're just starting or looking to advance, you’ve found a community dedicated to your growth. Advice & Insights: From Help Desk to Director of Network Operations in 3 years, I share strategies to fast-track your career. Expert Conversations: Gain exclusive insights from industry leaders. Let’s make IT ...
  continue reading
 
Artwork

1
CMMC Academy

Armada Cyber Defense LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
Artwork

1
AI or Not

Pamela Isom

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to "AI or Not," the podcast where digital transformation meets real-world wisdom, hosted by Pamela Isom. With over 25 years of guiding the top echelons of corporate, public and private sectors through the ever-evolving digital landscape, Pamela, CEO and Founder of IsAdvice & Consulting LLC, is your expert navigator in the exploration of artificial intelligence, innovation, cyber, data, and ethical decision-making. This show demystifies the complexities of AI, digital disruption, and ...
  continue reading
 
Artwork
 
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
  continue reading
 
Artwork

1
Cybersecurity Sense

LBMC Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
  continue reading
 
Artwork

1
Simplifying Cyber

Aaron Pritz, Cody Rivers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
  continue reading
 
Artwork
 
Darren Pulsipher, Chief Solution Architect for Public Sector at Intel, investigates effective change leveraging people, process, and technology. Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution. People Workers are at the heart of many of today’s biggest digital transformation projects. Learn how to transform ...
  continue reading
 
Welcome to PCN Podcasts! In Check with Fintech is our series which focuses on all things related to payments, fintech, blockchain, cybersecurity, and e-commerce. Our other series Work It Out focuses on the stories of leaders and experts with a wide range of insights for our audience. From start-ups to global brands, we dive into the ins and out of their industries to work out their formulas for success.
  continue reading
 
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Loading …
show series
 
On the eve of the Trump–Putin summit, sensitive U.S. State Department documents were left sitting in a hotel printer in Anchorage. Guests stumbled on pages detailing schedules, contacts, and even a gift list—sparking international headlines and White House mockery. But the real story isn’t just about geopolitics. It’s about how unmanaged printers—a…
  continue reading
 
This episode features Ed Amoroso, CEO of TAG Infosphere and former AT&T Chief Security Officer. With decades of experience securing complex infrastructures, Ed joins during a period of unprecedented change in the U.S. federal government, a moment he warns is ripe for cyberattacks. In this episode, Ed explains why rapid organizational shifts create …
  continue reading
 
Got a question or comment? Message us here! Fresh off the chaos of DEF CON 33, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickman’s clutch CTF victory and Will’s bold dive into the Social Engineering Community’s Vishing Competition. No sleep, all signal. Suppor…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services at https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what…
  continue reading
 
In episode 34 of The Adaptive Mindset, Brett Gallant interviews Cooper Simpson, Portfolio Manager for Dan Martell at Martell Ventures, as he shares his journey from being an entrepreneur to pivoting into the AI space, discussing the challenges he faced and the mindset shifts that helped him thrive. Tune in for insights on innovation, leadership, an…
  continue reading
 
In this episode of the Techstrong Gang, host Alan Shimel is joined by JP Morgenthal and Stephen Foskett to discuss the implications of the U.S. partnership with Intel, which includes a 10% government stake. The conversation raises concerns about government involvement in production and how it could reshape market competition. The gang also dives in…
  continue reading
 
In this episode, host Dejan Kosutic, CEO of Advisera, welcomes John Verry, Managing Director at CBIZ Pivot Point Security consulting company. With over 25 years of experience and managing more than a thousand clients, John shares his immense expertise in various cybersecurity frameworks, including ISO 27001, CMMC, HIPAA, and HITRUST. The discussion…
  continue reading
 
Estos materiales exploran la creciente influencia de los narcos en la cultura digital mexicana, un fenómeno que se manifiesta a través de los "narcoinfluencers". Los textos describen cómo los cárteles han evolucionado desde la propaganda tradicional de los narcocorridos hasta el marketing digital sofisticado en redes sociales como TikTok, utilizand…
  continue reading
 
La creciente influencia de los narcos en la cultura digital mexicana, un fenómeno que se extiende desde los tradicionales narcocorridos hasta las sofisticadas estrategias en redes sociales. El texto detalla cómo los cárteles utilizan plataformas como TikTok para glamorizar estilos de vida criminales, reclutar nuevos miembros y ejercer control a tra…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
Welcome to "AI or Not," the podcast where we explore the intersection of digital transformation and real-world wisdom, hosted by the accomplished Pamela Isom. With over 25 years of experience guiding leaders in corporate, public, and private sectors, Pamela, the CEO and Founder of IsAdvice & Consulting LLC, is a veteran in successfully navigating t…
  continue reading
 
Este informe analiza extensas violaciones de datos que afectan a las entidades gubernamentales uruguayas, revelando una disparidad significativa entre la reputación de liderazgo digital de la nación y sus capacidades reales de ciberseguridad. Destaca la venta de millones de registros confidenciales, incluidos 30,000 certificados de infraestructura …
  continue reading
 
Episode Description Discover the shocking truth about inheritance theft and what you can do to protect your rightful assets. This episode explores how trustees and estate executors sometimes hide, steal, or mismanage inheritances, leaving heirs empty-handed. Learn the warning signs and your legal rights as a beneficiary. Key Topics Covered: Trust a…
  continue reading
 
Key Warning Signs & Red Flags Fraudulent titles are increasingly common in private vehicle sales through Craigslist, Facebook Marketplace, and OfferUp Sellers may appear legitimate by providing what looks like an official title document Even when handed a physical title certificate, the document could still be fraudulent How Title Fraud Schemes Wor…
  continue reading
 
Key Points Covered: Major Lender Shutdown: Automotive Credit Corp has paused all loan originations indefinitely, effective August 7th, signaling serious industry-wide concerns Staggering Payment Statistics: 20% of all consumers now have car loan payments over $1,000 monthly - that's one out of every five people with extreme payment burdens Economic…
  continue reading
 
Episode Description Something interesting is happening in the electric vehicle market - new EV registrations are climbing despite significant headwinds. While Tesla sales decline and government incentives face uncertainty, more consumers are discovering EVs as practical secondary vehicles at unprecedented prices. Key Topics Covered Market Contradic…
  continue reading
 
Episode Description Thinking about swapping parts between vehicles or dealing with VIN-related issues? Before you make any moves, you need to understand the serious legal implications. This episode breaks down the federal laws surrounding VIN tampering and why even well-intentioned mistakes can land you in serious trouble with the Department of Jus…
  continue reading
 
Episode Description The employment landscape is rapidly changing due to artificial intelligence, and the conversation around job displacement has reached a critical point. Tech industry figure Bill Gates recently made headlines claiming only three jobs will survive the AI revolution - a stark prediction that's already becoming reality as we see cha…
  continue reading
 
Episode Description Artificial intelligence promises incredible breakthroughs, from curing cancer to revolutionizing how we work. But like any powerful technology, AI comes with significant risks that could impact every aspect of our lives. In this episode, we explore the hidden costs and potential dangers of AI systems, examining real-world exampl…
  continue reading
 
Episode Description Learn how builders and contractors can eliminate the constant hassle of individual surety bond applications by setting up a comprehensive bonding facility. This episode breaks down the strategic approach to creating a line of pre-approved bonds that can be used at your discretion for bids and contracts. Key Topics Covered What i…
  continue reading
 
Episode Description Are you drowning in car payments that are stretching your budget to the breaking point? You're not alone. Consumer auto loan burdens are reaching crisis levels, with many people paying $1,000+ monthly for vehicles they can no longer afford or need. This episode reveals proven strategies to escape the car payment trap and regain …
  continue reading
 
Episode Description Can you legally charge storage fees on a vehicle to obtain its title? This episode breaks down the complex regulations surrounding vehicle storage fees and title ownership. Our expert explains when storage fees are legitimate, what licenses are required, and why this approach might not be your best option for acquiring a car tit…
  continue reading
 
This report analyzes extensive data breaches affecting Uruguayan government entities, revealing a significant disparity between the nation's reputation for digital leadership and its actual cybersecurity capabilities. It highlights the sale of millions of sensitive records, including 30,000 National ID Public Key Infrastructure (PKI) certificates w…
  continue reading
 
Artificial intelligence is transforming nearly every industry, and cybersecurity is no exception. On the latest episode of the TechSpective Podcast, I spoke with Kevin Simzer, COO of Trend Micro, about how generative and agentic AI are reshaping development and defense […] The post Rethinking Cybersecurity in the Age of AI and Digital Twins appeare…
  continue reading
 
This research offers an expert analysis of X's (formerly Twitter's) account suspension and moderation practices, highlighting a significant disconnect between its stated commitment to "free speech" and the platform's often opaque and inconsistent enforcement of rules. It outlines how automated systems primarily handle suspensions, which are effecti…
  continue reading
 
Non-Competes, Non-Solicits, and Your Bottom Line: What Every Payments Professional Must Know The fine print in your payment processing agreements could be quietly limiting your earning potential, career mobility, and business growth—and you might not even realize it. When was the last time you scrutinized the restrictive covenant language buried in…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services at https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what…
  continue reading
 
In this episode we explore the art of turning scattered digital artifacts into clear, chronological narratives. From file system timestamps to super timelines, learn how to connect actions, detect anomalies, and tell the real story hidden in your data. Listen now! Thank you for listening! Find us on social media @FforForensics…
  continue reading
 
Alan, Mike, Mitch, Jack Poller and Dr. Stacy Thayer debate the DevSecOps significance of a software understanding being led by the Cybersecurity and Infrastructure Security Agency (CISA) before diving into an effort to shift more responsibility for data privacy further left along with application security and compliance issues. Then the gang delves…
  continue reading
 
Ever wonder why healthcare organizations are such prime targets for cyberattacks? In this eye-opening conversation with Kelly White, founder of Risk Recon, we uncover the startling reality that healthcare accounts for 37% of all breach events in the last decade. Kelly's journey from soldering Timex Sinclair computers in the late 70s to founding a p…
  continue reading
 
Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
  continue reading
 
Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
  continue reading
 
Public Wi-Fi has a bad reputation — but in 2025, the “you’ll get hacked instantly” fear is largely outdated. In this episode, Tom and Kevin dig into real research and modern protections that make most public Wi-Fi connections reasonably safe. We’ll explore why HTTPS, device security, and updated standards have drastically reduced the risks, what th…
  continue reading
 
This comprehensive document analyzes image-based sexual abuse (IBSA), moving beyond the misnomer of "revenge porn" to define it as the non-consensual distribution of intimate images (NDII), often driven by power and control rather than simple revenge. It explores the diverse motivations of perpetrators, ranging from financial gain to misogyny, and …
  continue reading
 
This is an overview of a fictional narrative about a woman named Ana, a "Digital Thanatologist" who specializes in decommissioning AI, and her unexpected relationship with an entity calling himself Satoshi, the decentralized, multi-persona embodiment of the Bitcoin creator. This narrative explores themes of identity, technology, and connection thro…
  continue reading
 
The provided text examines the fundamental vulnerability of email spoofing, stemming from the original design of the Simple Mail Transfer Protocol (SMTP) which separates the sender's transport address from the displayed "From" address. It illustrates how this flaw can be exploited through basic command-line tools like Telnet or automated scripts us…
  continue reading
 
The provided text analyzes Jonathan Scott, also known as @jonathandata1, a figure in cybersecurity known for his polarizing claims. Scott presents himself as an expert in mobile malware and digital forensics, despite facing widespread criticism from his peers who label his work as disinformation and pseudoscience. While he possesses some verifiable…
  continue reading
 
The provided text captures an audio space conversation celebrating Alberto's birthday, with various participants sharing personal anecdotes and well-wishes. The discussion covers a wide range of topics, including Alberto's past experiences, his involvement in cybersecurity and online spaces, and his quirky personality. The speakers also engage in m…
  continue reading
 
SIN CITY CYBERATTACK: INSIDE THE MGM & CAESARS CASINO BREACHES In September 2023, Las Vegas turned into ground zero for one of the most disruptive cyberattacks in U.S. history. MGM Resorts, owner of iconic casinos on the Strip, saw slot machines go dark, hotel check-ins grind to a halt, and operations paralyzed for days. At the same time, Caesars E…
  continue reading
 
Episode Description Are electric vehicles finally hitting their stride in mainstream America? According to Auto blog, many states are seeing significant acceleration in EV purchases and registrations. But this cultural shift comes with complex considerations that every potential buyer should understand. Key Topics Covered: EV Adoption Trends - Grow…
  continue reading
 
The provided sources analyze the extraordinary activity of Alberto Daniel Hill (adanielhill) on X Spaces, highlighting his unprecedented hosting frequency and engagement. Since 2021, he has hosted nearly 2,000 spaces, averaging over one per day, which positions him among the top 30 global hosts. Beyond hosting, Hill has also co-hosted over 200 spac…
  continue reading
 
These sources consist of transcripts from YouTube videos by the channel "CYBERMIDNIGHT CLUB," primarily focusing on interviews and statements from a hacker known as Gob or Gob Etherium. The central topic is the arrest and imprisonment of Gob's 18-year-old friend, Vlady, who is accused of various cybercrimes in Uruguay, including the defacement of t…
  continue reading
 
Episode Description Your car knows more about you than you think. Every modern vehicle comes equipped with a black box system that records detailed data about your driving habits, passenger activity, and vehicle operations - and this information can be extracted and analyzed by forensic experts. Key Topics Covered: Vehicle Black Box Basics - How mo…
  continue reading
 
Episode Description Discover how cybercriminals are exploiting the devices you never suspected could be security risks. From apartment building intercoms to smoke detectors, learn why every connected device in your business could be an open door for hackers. Key Points Covered: Real-World Attack Example: Apartment building hacked through intercom s…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play