In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
You already know the monthly OUCH! Newsletter brings you the latest cybersecurity tips—but now, we’re taking it even further. Tune in to the new OUCH! Podcast, where we go deeper on cybersecurity topics and give you extra insights to stay ahead of the threats.
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
In this episode, Tyler and Bob break down cybersecurity in a fun, human way—no tech jargon overload, just real tips and tricks to keep your business safe. From password tricks and phishing scams to the importance of backups and cloud security, they share easy-to-follow advice with plenty of humour and relatable insights. If you’ve ever ignored an update or used ”password123,” this one’s for you. Tune in, laugh a little, and learn how to become a cybersecurity rockstar!
…
continue reading
A bi-weekly podcast that helps you curb cybersecurity risk and tackle technology challenges
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
…
continue reading
Cybersecurity, Startups & Artificial Intelligence... but fun. Welcome to a place where hacking meets humor, AI meets absurdity, and your online safety might just be saved by a bad meme. We live in a world where your fridge can spy on you, your toaster has a firmware update, and a Nigerian prince still wants your money – but now through ChatGPT. It’s wild out there. This podcast arms you with the knowledge to survive and thrive in today’s tech jungle. You’ll get practical tips, real-world sto ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Welcome to Treasury Talk, a podcast for Michigan taxpayers hosted by State Treasurer, Rachael Eubanks. Our trending topics with Subject Matter Experts will include cybersecurity, tax prep tips, education savings plans, the budget and our economy, and leadership best practices. Listen for take-aways that will support you, your family and your business!
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
This is your guide to navigating the ever-evolving world of cybersecurity. Hosted by Annie-Mei Forster and Anika Guenov, this podcast breaks down complex topics into relatable, easy-to-understand conversations. Whether you're a tech enthusiast, a curious newcomer, or a professional looking for fresh perspectives, join us as we explore cyber threats, digital safety tips, and the human stories behind the screen. Follow us on Instagram @thecybersecuritygals
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Welcome to The Defender's Journal (our next step up from The Tech Stack), where we delve into the lives and minds of leading professionals in the cybersecurity space. Discover their unique stories, motivations, perspectives on the industry, and tips for long-term success! *Interested in joining us on the show? Please connect with Cameron Wenham or Jeff Harrod!
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
An instructional technology podcast featuring all the ed tech happenings in the Redlands Unified School District, with a side of chips and salsa.
…
continue reading
Concrete advice on how to simplify technology to streamline work and gain more freedom. Running a law practice today means navigating a sea of tech options. Success with tech demands you focus on a few key tools in six areas: (1) automation, (2) outsourcing, (3) marketing, (4) cybersecurity, (5) remote work, and (6) artificial intelligence. That's what this podcast will help you with: strategically focusing on a few key tech options and explaining why they matter and how to get the most from ...
…
continue reading
Welcome to The Bare Metal Cyber CISSP Prepcast — your essential guide to mastering the CISSP certification. Whether you're just starting your cybersecurity journey or preparing for exam day, this podcast delivers expert insights, practical strategies, and clear explanations to help you succeed. Designed by professionals who’ve walked the path, each episode helps you build confidence, sharpen your skills, and move one step closer to certification success.
…
continue reading

1
KeyStone’s Stock Talk – Canadian & US Small-Cap Growth & Dividend Stocks, Tips & Portfolio Building Strategies
Stock Talk Podcast by KeyStone Financial
Hosted by Ryan Irvine & Aaron Dunn, the podcast is highly interactive taking listener questions each week on individual Canadian & U.S. stocks as well as stock portfolio building strategies. The podcast focuses on high quality Canadian Dividend growth stocks, unknown & profitable Canadian Small-Cap stocks, U.S. tech leaders and high growth small-cap stocks. We also provide simple portfolio building tips for DIY investors. Weekly show highlights include: - Case For & Against Any Stock: our Ry ...
…
continue reading
Security certificates are a great way to show you know your stuff, but now what? You want to get into the field, and it seems impossible at times to even get to the prescreening phase of an interview when you've never had a security role you're chasing. In this podcast, local professionals in the industry spill all to the tips and shortcuts they've used in securing their roles. https://isc2la.org/joinus The ISC2 Los Angeles chapter wants to see you succeed as the security professional you we ...
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
All Things Internal Audit is a new video podcast sharing news and practical knowledge for internal auditors. Produced by The Institute of Internal Auditors, each episode features insightful interviews with knowledgeable pros, timely tips and the latest news about the profession. All Things Internal Audit is available everywhere you get podcasts. IIA Members get more podcast content in each episode. Visit www.theiia.org for more information.
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
…
continue reading
Cybersecurity career, technology, and success tips.
…
continue reading
Sell Me This Podcast is a deep dive into the intricate world of enterprise technology sales and procurement. Hosted by Keith Daser, each episode unravels the strategies, tactics, and human psychology behind how business-oriented technology solutions are bought and sold. Designed for corporate buyers, technology sales professionals, and business leaders, the podcast provides actionable insights to help maximize the value of tech investments. Expect engaging interviews with industry experts, r ...
…
continue reading
"The Digital Revolution with Jim Kunkle", is an engaging podcast that delves into the dynamic world of digital transformation. Hosted by Jim Kunkle, this show explores how businesses, industries, and individuals are navigating the ever evolving landscape of technology. On this series, Jim covers: Strategies for Digital Transformation: Learn practical approaches to adopting digital technologies, optimizing processes, and staying competitive. Real-Life Case Studies: Dive into inspiring success ...
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
Cyber Snacks, by Buckingham, is a podcast dedicated to providing useful data privacy and cybersecurity tips in bite-sized pieces. The goal is to keep each episode short, simple, actionable, and reasonable.
…
continue reading
Welcome to the Tactical Cyber Podcast, where we transform strategic cyber insights into actionable tactics for everyday implementation. Join your hosts, retired FBI Supervisory Special Agent Darren Mott, and Risk Advisory Practice Leader at Warren Averett, Paul Perry. Together, they bring decades of experience from the front lines of cybersecurity and risk management to help business owners and individuals take the actions that will keep their business and personal digital data safe. Each ep ...
…
continue reading
Listen to cybersecurity and technology topics from industry experts. Don't worry; we'll keep it fun and light.
…
continue reading
FiredUp! is the show for marketers working in early and late-stage startups. Each week, we walk through fresh strategies and tactics to build brand and drive demand for your startup. Featuring interviews with marketing leaders, our take on the latest trends, and practical tips about PR, content marketing and growth marketing, we promise plenty of signal with some noisy fun along the way. FiredUp! is hosted by the team at startup marketing agency, Firebrand. Learn more at firebrand.marketing ...
…
continue reading

1
Episode 140: Threat-Informed Travel Safety Tips
34:28
34:28
Play later
Play later
Lists
Like
Liked
34:28In episode 140 of Cybersecurity Where You Are, Sean Atkinson is joined by John Cohen, Executive Director of the Program for Countering Hybrid Threats at the Center for Internet Security®(CIS®). Together, they discuss travel safety tips informed by today's evolving multidimensional threat environment. Here are some highlights from our episode: 01:30…
…
continue reading

1
Cyber Shield: Navigating NIS2 with ENISA
1:24:00
1:24:00
Play later
Play later
Lists
Like
Liked
1:24:00This podcast is your essential guide to building a robust cybersecurity risk management strategy for network and information systems across Europe, as mandated by the NIS2 Directive. We delve into ENISA's Technical Implementation Guidance, breaking down its core components, such as risk management frameworks, incident handling, and supply chain sec…
…
continue reading

1
CISO Under Fire: Navigating Personal Liability in the Cyber Age
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25The evolving landscape of cybersecurity now places Chief Information Security Officers (CISOs) at significant personal legal risk, evidenced by landmark cases such as Uber's Joe Sullivan conviction for covering up a data breach and the SEC's charges against SolarWinds' CISO Tim Brown for misrepresenting security practices. This heightened accountab…
…
continue reading
In this episode of 'The Other Side of the Firewall' podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a variety of topics ranging from personal updates and reflections on aging, to cultural sensitivity in media, and reviews of recent films like 'Ballerina' and '28 Years Later'. They also touch on the impact of AI in film, the legacy of act…
…
continue reading

1
The 5 Paradigm Shifts of Exposure Management
34:58
34:58
Play later
Play later
Lists
Like
Liked
34:58Exposure management is fundamentally changing the way we view cybersecurity. Ivanti's Chris Goettl and Robert Waters introduce five paradigm shifts brought on by this emerging technology and how your organization's security strategy might shift as a result. For more, check out our Exposure Management Strategy Guide: (https://ivanti.com/resources/ex…
…
continue reading
Live from PAX 8 Beyond, Uncle Marv chats with Leonard from Rythmz, the MSP-first company bringing portable internet to events and emergencies. Their rugged Pelican cases house bonded SIM cards for unlimited, high-priority data, perfect for powering small chamber events or a 100,000-person concert. Leonard shares how MSPs are cashing in by charging …
…
continue reading

1
Voices of Deception: Navigating the Deepfake Era
16:37
16:37
Play later
Play later
Lists
Like
Liked
16:37Deepfake attacks are transforming the cybersecurity landscape by exploiting fundamental human vulnerabilities, creating hyper-realistic, AI-generated audio and video that mimics real individuals, making it increasingly difficult to distinguish between authentic and fabricated content. In the corporate realm, these sophisticated threats enable imper…
…
continue reading

1
Controlling the Uncontrollable in IT (EP 855)
31:54
31:54
Play later
Play later
Lists
Like
Liked
31:54Live from Pax8 Beyond, Uncle Marv catches up with Brian Weiss, the Tech Stoic, who’s revolutionizing IT with Stoic philosophy. Running iTech Solutions, Brian focuses on people, process, and technology—helping clients navigate outages with practical solutions like backup internet or power redundancies. His Stoic mindset keeps his team grounded, emph…
…
continue reading

1
The CROWN Act: What It Means, How It Helps
24:52
24:52
Play later
Play later
Lists
Like
Liked
24:52Join MI State Treasurer Rachael Eubanks and her guests, Ashley Kuykendoll and State Senator Sarah Anthony, for a special edition of the podcast to acknowledge the second anniversary of the “Creating a Respectful and Open World for Natural Hair” (CROWN) Act legislation. The CROWN Act expanded the state’s Elliott-Larsen Civil Rights Act and banned ra…
…
continue reading

1
Zensai: Training Made Simple for MSPs (EP 854)
16:51
16:51
Play later
Play later
Lists
Like
Liked
16:51Uncle Marv welcomes Kathleen Lord, Chief Revenue Officer at Zensai, to the show live from Pax8 Beyond in Denver. They dive into why compliance is broken and how MSPs can bridge the gap between technology implementation and user adoption. Kathleen explains how Zensai’s learning management system, built natively into Microsoft Teams, makes training s…
…
continue reading

1
Multi-Cloud Fortress: Securing Your Distributed Digital Frontier
21:09
21:09
Play later
Play later
Lists
Like
Liked
21:09Multi-cloud environments offer immense flexibility but introduce complex security challenges, from fragmented identities and inconsistent policies to critical visibility gaps across diverse platforms. This podcast delves into the most impactful practices, including unified identity and access management, advanced AI-driven automation, and centraliz…
…
continue reading

1
CCT 257: Practice CISSP Questions - Understanding, Adhering To, and Promoting Professional Ethics (Domain 1.1)
37:14
37:14
Play later
Play later
Lists
Like
Liked
37:14Send us a text Check us out at: https://www.cisspcybertraining.com/ Ethical dilemmas lurk around every corner in cybersecurity, ready to challenge even the most technically competent professionals. Sean Gerber tackles these moral minefields head-on in this thought-provoking episode focused on CISSP Domain 1.1, presenting fifteen real-world ethical …
…
continue reading

1
S3 EP 04 Cybersecurity & Compliance for Auto Dealers: A Conversation with ComplyAuto
35:23
35:23
Play later
Play later
Lists
Like
Liked
35:23Built for dealerships. Backed by experts. IT and Cybersecurity for Car Dealers https://www.onestepsecureit.com/beyond-cyber-contact#beyond-cyber-contact-form In this episode, Scott Kreisberg sits down with Nick Moyes, Regulatory Compliance Manager at ComplyAuto, for a must-hear conversation on what auto dealerships need to know now about data priva…
…
continue reading
Last year, over $700 billion was spent on digital marketing. Of that, $140 billion was stolen by fraudsters. Let’s face it: it’s no longer a question of whether you have fraud, but a question of how much fraud is affecting your business. To address these massive concerns, Rich Kahn, co-founder and CEO of Anura.io, an ad fraud solution, joins us on …
…
continue reading

1
How to Know You’re Not Charging Enough (EP 853)
47:32
47:32
Play later
Play later
Lists
Like
Liked
47:32Ever wondered what it’s like to face a client who suddenly wants to pay less—while secretly discovering they’ve already shopped around and found your rates are actually half the competition? Uncle Marv shares a jaw-dropping story about pricing, client loyalty, and the emotional rollercoaster of running an IT business. Should you run DHCP on a serve…
…
continue reading
🔐 New SOC Brief Episode: Tracing the Breadcrumbs Cybercriminals always leave a trail, if you know where to look. In this episode, we break down Indicators of Compromise (IOCs) and how they help security teams detect and respond to threats faster. 🎯 What we cover: • Real-world incident reports & proof of concept examples • Threat actor aliases & ran…
…
continue reading
Ever wonder why some MSPs struggle with Macs while others thrive? Justin Esgar, founder of an Apple-focused MSP and host of All Things MSP, pulls back the curtain on what it really takes to manage Macs at scale. From hilarious conference stories to the secrets of Mac deployment and security, this episode is packed with actionable insights for MSPs …
…
continue reading
In this episode of The Other Side of the Firewall podcast, Ryan Williams Sr. and Shannon Tynes discuss the rising threat of cyberattacks on retail, particularly in the UK, and how these incidents are affecting supply chains and consumer access to essential goods. They explore the implications of these attacks for businesses, the potential for incre…
…
continue reading

1
The CISO Crucible: Navigating Cyber's New Frontier
17:05
17:05
Play later
Play later
Lists
Like
Liked
17:05Today's cybersecurity leaders face immense pressure from a persistent talent shortage, escalating cyber threats, and dynamic economic and regulatory landscapes. Their roles are rapidly evolving from purely technical oversight to strategic business risk management, encompassing areas like AI strategy and comprehensive talent development. This podcas…
…
continue reading

1
Innovative Events for MSP Growth (EP 851)
11:03
11:03
Play later
Play later
Lists
Like
Liked
11:03What does it take to stand out in the MSP world? Join Uncle Marv and event management expert Amy Slater as they unpack the power of community, collaboration, and smart event planning. From organizing intimate Lunch and Learns to orchestrating large-scale panels, Amy reveals how Innovative Events supports MSPs and small businesses in finding their v…
…
continue reading

1
Episode 141: A Human-Centered Take on Password Policies
43:18
43:18
Play later
Play later
Lists
Like
Liked
43:18In episode 141 of Cybersecurity Where You Are, Tony Sager is joined by Phyllis Lee, VP of SBP Content Development at the Center for Internet Security®(CIS®); and Julie Haney, Computer Scientist & Human-Centered Cybersecurity Researcher at the National Institute of Standards and Technology (NIST). Together, they use a human-centered understanding of…
…
continue reading
Send us a text On this bonus episode. I’ll explain the public position that Elon Musk has on artificial intelligence. In the age of accelerating innovation, artificial intelligence sits at the crossroads of unbridled ambition and deep-seated fear. On one hand, it fuels a new frontier, powering breakthroughs in medicine, transportation, communicatio…
…
continue reading

1
The Defender's Journal Episode 26 - Kaeli Smith
39:22
39:22
Play later
Play later
Lists
Like
Liked
39:22Welcome to another inspiring episode of The Defender’s Journal! This week, Kaeli Smith joins us. But how does a former graphic design student go from nearly joining the CIA to leading a 30+ person cyber risk team? In this episode, we explore the mindset shift that pulled Kaeli into tech, how she’s translated risk for executives, and what it really …
…
continue reading

1
Is the Rise of Vibe Hacking the Next Cybersecurity Nightmare?
12:35
12:35
Play later
Play later
Lists
Like
Liked
12:35In this episode, Ryan Williams Sr. and Shannon Tynes discuss the intersection of cybersecurity and artificial intelligence, focusing on the emerging threats posed by AI-assisted hacking. They explore the implications of AI in making hacking more accessible and the potential for increased cyber threats. The conversation also delves into the human fa…
…
continue reading
In this Week's Show: Firan Technology Group (FTG:TSX) VS Simply Solventless Concentrates (HASH:TSX-V): Small-Cap M&A Strategies Compared Is Lakeland Industries (LAKE:NASDAQ) a Blazing Bargain or a Total Burn? Star & Dog of the Week: Groupe Dynamite (GRGD:TSX) Breaks Out, Hims & Hers (HIMS:NYSE) Breaks Down The Power of Dividend Investing Explained…
…
continue reading

1
Episode 90: Global Wars - Cyber Strikes Back
50:11
50:11
Play later
Play later
Lists
Like
Liked
50:11🎙️ New Secure AF Episode: Global Wars: Cyber Strikes Back 🌐⚔️ How does global news shape cybersecurity operations? In this episode, we dig into how real-world events influence the threats we track, the way we respond, and the tools we use for social engineering/pentesting. 🔍 We talk threat intel, evolving attack methods, and what teams should be lo…
…
continue reading
The greatest data leak in history?! For the past few days, a bit of news are spreading like wildfire about a leak of 16 billion passwords from Google, Apple and Facebook. But as you know: it’s not so easy. #shorts #leak #databreach #cybersecurityBy Mateusz Chrobok
…
continue reading

1
Travel, Food & IT with Brook Lee (EP 850)
28:32
28:32
Play later
Play later
Lists
Like
Liked
28:32Join Uncle Marv and Brook Lee as they swap stories from the road, sharing the secrets to building authentic vendor relationships and the value of thinking outside the box. From event etiquette to real-world onboarding challenges, they share stories and strategies that will help you spot the best fit for your business. Plus, get ready for a world to…
…
continue reading

1
Special Episode: The Secure Talk Security Awareness Training 2025 (With HIPAA!)
1:11:17
1:11:17
Play later
Play later
Lists
Like
Liked
1:11:17SecureTalk 2025 Security Awareness Training | Complete Compliance Guide Welcome to SecureTalk's comprehensive 2025 Security Awareness Training video! This annually updated training is designed to help organizations meet their security compliance requirements while building a strong security culture. 🎯 What You'll Learn: Social Engineering & AI-Enha…
…
continue reading

1
Cybersecurity in Retail Amidst Escalating Attacks
10:42
10:42
Play later
Play later
Lists
Like
Liked
10:42Myke Lyons, CISO at Cribl, discusses cybersecurity in retail, especially in relation to the recent string of attacks against the sector.
…
continue reading

1
Automating MSP Success with Cyft (EP 849)
24:27
24:27
Play later
Play later
Lists
Like
Liked
24:27Ever feel like your MSP is drowning in data but starved for context? Jeffrey Newton, co-founder of CYFT, shares how his AI-driven platform is giving MSPs real-time situational awareness—automating documentation, enriching tickets, and ensuring techs have the right info before they even pick up a call. Listen to why “best practice” may not always be…
…
continue reading

1
Mind the Gap: The Psychology of Security Risk
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Explore the fascinating disconnect between how we feel about security and the actual risks we face, a phenomenon rooted in deep-seated human psychological biases. This podcast delves into why our brains are ill-equipped for modern threats, often leading to irrational decisions and the prevalence of "security theater" over genuine protection. We exa…
…
continue reading

1
We Can Either Build Resilience or Just Always Be Perfect
38:09
38:09
Play later
Play later
Lists
Like
Liked
38:09All links and images can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Ryan Bachman, executive vice president and CISO, GM Financial. In this episode Identity consolidation versus simplification Entry-level pathways into cyberse…
…
continue reading

1
The IIA’s New Cybersecurity Topical Requirement
19:13
19:13
Play later
Play later
Lists
Like
Liked
19:13The Institute of Internal Auditors Presents: All Things Internal Audit Tech In this episode, Logan Wamsley talks with George Barham about The IIA’s Cybersecurity Topical Requirement. They discuss how internal audit functions should prepare for its 2026 effective date, and why CAEs should take action now. The conversation also highlights the require…
…
continue reading

1
Proxmox, Docker & Containers Explained (EP 848)
47:12
47:12
Play later
Play later
Lists
Like
Liked
47:12If you’ve ever dreamed of building your own home lab or wondered how to get started with Synology, Unraid, or TrueNAS, this episode is for you. Uncle Marv and Mike Wieger break down the pros and cons of each platform, explain the magic of Docker and containerization, and share practical tips for home automation and security. Get inspired to tinker,…
…
continue reading

1
Secure Endpoint Management with Devicie (EP 847)
22:34
22:34
Play later
Play later
Lists
Like
Liked
22:34What if you could manage hundreds of Intune tenants without ever repeating the same task? Colin Britton shares how Devicie’s runbooks and automation tools make it possible, while also providing deep insights into endpoint health and security. Learn about their new Reporting Connector for Edge for Business and how it brings browser security into foc…
…
continue reading

1
#76 – Using AI in Cybersecurity: Best Practices for Small/Medium Businesses
27:53
27:53
Play later
Play later
Lists
Like
Liked
27:53AI is transforming cybersecurity in businesses of every size. In Ep. 76 of DIY Cyber Guy, RAD Security's Jimmy Mesta explains how AI tools fight phishing, cut costs & boost IT.By Extra Something Media
…
continue reading

1
16 Billion Passwords Leaked—Here's What You Must Do Right Now
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a significant cybersecurity incident involving the leak of 16 billion passwords. They emphasize the importance of password security, the need for multi-factor authentication (MFA), and the adoption of passkey security to enhance protection a…
…
continue reading

1
Leading with Agility and Embracing Change with Cassie Jeppson
42:20
42:20
Play later
Play later
Lists
Like
Liked
42:20On this episode of the Sell Me This Podcast, Keith Daser talks with Cassie Jeppson, Director of Channel Programs and Operations Strategy at Lenovo. From hobby-farming in Tennessee to leading one of North America’s largest channel teams, Cassie has a diverse background that informs her dynamic perspective on leadership, technology, and the evolving …
…
continue reading

1
Decoding the Quantum Threat: Navigating Post-Quantum Cybersecurity
53:57
53:57
Play later
Play later
Lists
Like
Liked
53:57Quantum computing is on the horizon, poised to break today's standard encryption and enable "harvest now, decrypt later" attacks, threatening sensitive data worldwide. This episode explores the critical technical and financial hurdles organizations face in migrating to post-quantum cryptography (PQC), from pervasive system integration and interoper…
…
continue reading

1
Eric Torres on Channel and Community at Pax 8 (EP 846)
14:46
14:46
Play later
Play later
Lists
Like
Liked
14:46Eric Torres joins Uncle Marv to discuss the power of community, peer groups, and collaboration in the MSP industry. Eric shares his personal journey, the importance of vendor partnerships, and how PAX 8 is helping MSPs transition to MSP 3.0—where AI and intelligence drive business success. Eric shares his journey from Milwaukee to Melbourne, his pa…
…
continue reading

1
CCT 256: Understanding, Adhering To, and Promoting Professional Ethics (Domain 1.1)
34:53
34:53
Play later
Play later
Lists
Like
Liked
34:53Send us a text Ethical leadership lies at the heart of effective cybersecurity practice. In this episode, we dive deep into Domain 1.1 of the CISSP certification, exploring professional ethics and their critical importance for security professionals. The episode opens with a sobering look at the current landscape of cyber warfare, examining how Isr…
…
continue reading
Send us a text In today's episode, we're talking about: Emotional Bonds With AI Companions. Chris Smith, once an AI skeptic, found himself unexpectedly swept into a deeply emotional relationship, with a chatbot he built and named Sol. What began as a casual interaction using ChatGPT for music mixing tips evolved into something far more intimate. Sm…
…
continue reading

1
Is Your Security Awareness Program Just Ticking Boxes?
49:50
49:50
Play later
Play later
Lists
Like
Liked
49:50This week on The Awareness Angle, Anthony Davis and Luke Pettigrew explore a special episode on what it really takes to build meaningful cybersecurity awareness, as part of preparing for Cybersecurity Awareness Month. 📢 Beyond the Poster Campaign – Open communication channels and positive reinforcement are key to building trust and encouraging peop…
…
continue reading

1
Kids Online Safety Act (KOSA): Protecting Kids or Censorship?
16:21
16:21
Play later
Play later
Lists
Like
Liked
16:21In this episode, we explore the Kids Online Safety Act (KOSA), a controversial bill aimed at protecting children online. Joined by co-host Scott Wright, we discuss the potential implications of KOSA, including concerns about censorship, mass surveillance, and the impact on free expression and online privacy. We also touch on the broad support for t…
…
continue reading

1
Kids Online Safety Act (KOSA): Protecting Kids or Censorship?
16:21
16:21
Play later
Play later
Lists
Like
Liked
16:21In this episode, we explore the Kids Online Safety Act (KOSA), a controversial bill aimed at protecting children online. Joined by co-host Scott Wright, we discuss the potential implications of KOSA, including concerns about censorship, mass surveillance, and the impact on free expression and online privacy. We also touch on the broad support for t…
…
continue reading
Not everyone passes on the first try—but failure doesn’t define your journey. In this episode, we guide you through a structured plan for recovery if you don’t pass the CISSP exam. We cover how to interpret your exam feedback, identify weak domains, revise your study strategy, and rebuild confidence. You’ll also learn how to maintain momentum and a…
…
continue reading