Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
A series of episodes that look at databases and the world from a data professional's viewpoint. Written and recorded by Steve Jones, editor of SQLServerCentral and The Voice of the DBA.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
The Debbie Reynolds "The Data Diva" Talks podcast features thought-provoking discussions with global leaders on data privacy challenges affecting businesses. This podcast delves into emerging technologies, international laws and regulations, data ethics, individual privacy rights, and future trends. With listeners in over 123 countries, we offer valuable insights for anyone interested in navigating the evolving data privacy landscape. Did you know that "The Data Diva" Talks Privacy podcast h ...
…
continue reading
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
TV Tech Guy Rich DeMuro offers tech news, gadget reviews, helpful apps and answers your questions. richontech.tv
…
continue reading

1
The Medcurity Podcast: HIPAA Compliance | Security | Technology | Healthcare
Medcurity: HIPAA Compliance
Healthcare is complicated. Joe Gellatly and Amanda Hepper are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more.
…
continue reading
On Masters of Scale, iconic business leaders share lessons and strategies that have helped them grow the world's most fascinating companies. Founders, CEOs, and dynamic innovators join candid conversations about their triumphs and challenges with a set of luminary hosts, including founding host Reid Hoffman (LinkedIn co-founder and Greylock partner). From navigating early prototypes to expanding brands globally, Masters of Scale provides priceless insights to help anyone grow their dream ent ...
…
continue reading
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
…
continue reading
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
…
continue reading
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
…
continue reading
Your Weekly Source for Linux GNews from the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Connecting you to the most talked-about stories of the day in Nova Scotia. Hosted by Portia Clark.
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
Cybersecurity and Hacking related news like Hacks, Bugs, Vulnerabilities, Data Breaches of the last 7 days on every Wednesday.
…
continue reading
Each episode of the What It Means podcast features Forrester analysts providing their unique perspective on the latest news and trends impacting marketing, CX, and technology leaders.
…
continue reading
Maritime Noon is a one-hour program devoted to delivering informative reports and interviews which explore issues that are of interest to Maritimers. Join host Bob Murphy weekdays from noon to 1 p.m.
…
continue reading
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
…
continue reading
Nastygram is an actual play RPG podcast that is all about the game! We might take our RPG nerdage seriously but not ourselves. Our goal is for you to feel like you are at the table with us as we build stories collaboratively across a variety of game worlds and systems while keeping the authentic feel of tabletop roleplaying amongst friends. Join us weekly to listen and let's get Nasty!
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
Labor Radio is news by, for, and about working people in Madison, Wisconsin and around the world. It originates out of the studios of WORT 89.9 FM Madison.
…
continue reading
SC Media and Snyk are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
I have been involved in the Umbrella and Payroll Industry for nearly 20 years. Whilst I have seen the industry change profoundly, one thing that remains is that it’s still unregulated. With monies circulating the industry that rival the Premier League, these no holds barred Orca Pods we will be swimming in shark infested waters, discussing the topics no one wants to speak about, the hidden and shadowy practices and what is being done to change the industries perception and its very survival.
…
continue reading
Hosts Matt Walsh and Nic Carter of Castle Island Ventures explore news and deals in the public blockchain space and talk to some of the leading experts in the industry. Learn more and stay up to date at CastleIsland.vc and follow on twitter @CastleIslandVC
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2025, National Security Corporation. All Rights Reserved
…
continue reading
Podcasts summarising important cases in privacy and data law in the UK and Europe.
…
continue reading

1
Lexis Nexis data breach: See if you’re at risk
12:00
12:00
Play later
Play later
Lists
Like
Liked
12:00The data broker had a massive data breach, leaking personal info on hundreds of thousands of people. Here’s what you need to know. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Kettering data published, Reddit sues Anthropic, North Face breached
7:27
7:27
Play later
Play later
Lists
Like
Liked
7:27Stolen Kettering Health data published Reddit sues Anthropic for scraping North Face website customer accounts breached Huge thanks to our sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the follow up tasks you don’t have time for are close behind. What are you going to do? Here’s a better q…
…
continue reading

1
Inside the 2025 Verizon Data Breach Investigations Report | Medcurity Live 095
7:50
7:50
Play later
Play later
Lists
Like
Liked
7:50What’s really driving breaches in healthcare? This episode breaks down key stats from the 2025 Verizon Data Breach Investigations Report—including ransomware trends, human error patterns, and how attackers are moving faster than ever. We’ll highlight what it means for your organization and where to focus your efforts this year. Learn more about Med…
…
continue reading

1
On the phone-in: Listeners call with questions about data breaches and fraud. And off the top, we hear some testimony today at a legislative committee in Halifax where NSP officials discuss the data breach ...
52:34
52:34
Play later
Play later
Lists
Like
Liked
52:34On the phone-in: Two experts -- Jeff Horncastle and Spence Hutchinson -- provide advice and information to listeners calling with questions about data breaches and fraud. And off the top of the show, we hear some of the testimony today in Halifax at a legislative committee where NSP officials were questioned about the company's data breach. We also…
…
continue reading

1
Cybersecurity Incidents: Eddie Steeler Malware, ConnectWise Breach, and Nova Scotia Power Data Theft
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27In this episode of Cybersecurity Today, host David Shipley discusses several key cyber incidents affecting organizations and individuals. A new rust-based information stealer, known as Eddie Steeler, is being distributed via deceptive CAPTCHA verification pages. ConnectWise, a management software firm, has been breached in an attack suspected to be…
…
continue reading

1
Protect yourself after data breach, free PC cleaners & Apple’s China challenge (123 , May 31, 2025)
1:44:56
1:44:56
Play later
Play later
Lists
Like
Liked
1:44:56Rich talked about a massive data breach exposing 184 million logins and passwords. He recommends using strong, unique passwords and turning on two-factor authentication for key accounts. Mentioned: Have I Been Pwned and MalwareBytes Digital Footprint Tool Rich highlighted the impressive Gemini live video feature, which brings real-time AI to life. …
…
continue reading
Customers tell of difficulty protecting themselves from effects off Nova Scotia Power hack.
…
continue reading

1
AI to solve housing troubles, ATO denies security issues, and our favourite data breach tool
29:20
29:20
Play later
Play later
Lists
Like
Liked
29:20In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft have a chat about everything, from the NSW government’s new drive to use AI to solve the housing crisis to deepfake takedowns, who may or may not be behind the hacking campaign targeting big-name UK retailers (still!), security issues at the Australian Taxation Office, …
…
continue reading

1
311: Nobara 42 released, Steam Data Breach?, openSUSE drops Deepin, KDE Plasma 6.4 Beta & more Linux news
46:34
46:34
Play later
Play later
Lists
Like
Liked
46:34video: https://youtu.be/BPO50JSnLCU Comment on the TWIL Forum This week in Linux, we have a ton of news. In fact, sometimes I have to push stuff off a week, but we're going to do something a little different. We're going to do a bunch of extra topics. We're going to start off with Nobara 42 release. We also have a beta release of KDE Plasma's next …
…
continue reading

1
Episode 134: Preventing Data Breaches: Strategies to Mitigate Initial Compromise
47:20
47:20
Play later
Play later
Lists
Like
Liked
47:20In this episode of The Cyber Threat Perspective, we tackle the crucial first step in cybersecurity: preventing initial compromise. We'll dissect common attack vectors like phishing and exploitation and explore layered defenses ranging from MFA and patch management to DMZs and WAFs. Get actionable guidance to integrate these controls into your secur…
…
continue reading

1
Weekly Roundup 05/16/25 (GENIUS is back, Coinbase data breach, Big Tech stables) (EP.625)
40:53
40:53
Play later
Play later
Lists
Like
Liked
40:53Matt and Nic are back with another week of news and deals. In this episode: Why is Boston such a good sports city? Price inflation in dinosaur skeletons Cryptopunks IP is sold Machinsky is sentenced Nakamoto Holdings launches Meta wants to add stablecoins to its platforms Exchanges are honeypots for KYC data Coinbase suffers a data breach The GENIU…
…
continue reading
I read a piece recently that got me thinking that data breaches might be inevitable. Disclosure: This was written by Redgate, for whom I work, titled "Data breaches May Be Inevitable—Compliance Failures Don’t Have to Be". It's based on our research with the State of Database Landscape survey as well as feedback and conversations with customers. The…
…
continue reading
When talking about DevOps, the goal is to produce better software over time. Both better quality as well as a smoother process of getting bits to your clients. There are a number of metrics typically used to measure how well a software team is performing, and one of the things is Change fail percentage. This is the percentage of deployments that ca…
…
continue reading
Ditch the cheesy store cards. Use ChatGPT to turn your favorite photo into a custom keepsake. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
You’re still told to switch on airplane mode before takeoff. What really happens if you don’t? Here’s the truth. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
What started as five friends filming trick shot videos 16 years ago has become a new media empire. Dude Perfect has more than 61 million followers on YouTube alone. CEO Andrew Yaffe talks with host Jeff Berman about how he and the dudes are leveraging the Disney playbook to build a vertically integrated business that spans, content, products, event…
…
continue reading

1
CoPilot zero-click, Operation Secure, FIN6 targets recruiters
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43Zero-click data leak flaw in Copilot Operation Secure targets infostealer operations FIN6 targets recruiters Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. easier—while also strengthening yo…
…
continue reading

1
Perplexity’s Strategy, B2B Influencers, Salesforce Buys Informatica
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03If there’s one constant in business today, it’s change. New partnerships, new strategies, and new risks are popping up in all areas. In this episode, we look at three major changes taking place in the B2C, B2B, and enterprise application spaces and tap our analysts for their guidance on how to manage these changes.…
…
continue reading
Non-indigenous fishermen ask court to rule on questions left unanswered by landmark Marshall decision.
…
continue reading

1
On the phone-in: We discuss what can be done to address the rise in authoritarianism in the world, particularly in the US. And off the top, we hear about a carpentry project at Louisbourg in Cape Breton ...
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02On the phone-in: Our guest is Ketty Nivyabandi -- Amnesty International Canada’s Secretary General. She discusses what can be done to address the rise in authoritarianism in the world, particularly in the US. And off the top of the show, we hear about a carpentry project at the Louisbourg fortress in Cape Breton. And Sussex, NB, now has a Flood Ris…
…
continue reading

1
Lost retirement money? Here’s how to find it
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Nearly $2 trillion is sitting in forgotten 401(k) accounts. Yours might be one of them. Here’s how to check. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
The Forgotten Compliance Risks of Shared Workstations | Medcurity Live 096
8:22
8:22
Play later
Play later
Lists
Like
Liked
8:22Shared workstations—especially in clinical areas—can be a blind spot in privacy and security. Whether it’s leaving PHI on the screen, shared login credentials, or lack of session timeouts, these seemingly small things can cause big issues. Learn more about Medcurity here: https://medcurity.com #Healthcare #Cybersecurity #Compliance #HIPAA #Security…
…
continue reading
Think of everything you ever told your chatbot. Did you delete it? Even if you did, you didn't. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Cybersecurity Today: State-Backed ChatGPT Misuse, Dark Gaboon Attacks, and Starlink Installation Controversy
12:50
12:50
Play later
Play later
Lists
Like
Liked
12:50This episode of 'Cybersecurity Today' hosted by Jim Love covers various significant events in the cybersecurity landscape. OpenAI has banned multiple ChatGPT accounts linked to state-sponsored hackers from countries including China, Russia, North Korea, Iran, and the Philippines for developing malware, generating disinformation, and conducting scam…
…
continue reading

1
40K IoT cameras stream secrets to browsers, Marks & Spencer taking online orders post-cyberattack, PoC Code escalates Roundcube Vuln threat
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04CISA, Microsoft warn of Windows zero-day used in attack on ‘major’ Turkish defense org 40K IoT cameras worldwide stream secrets to anyone with a browser Marks & Spencer begins taking online orders again, out for seven weeks due to cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more effic…
…
continue reading

1
On the phone-in: We discuss the growth in the Indigenous tourism sector. And off the top, we hear from a woman who's part of the clinical trials for a vaccine against Lyme disease. We also have a talkback ...
52:40
52:40
Play later
Play later
Lists
Like
Liked
52:40On the phone-in: Our guests Bradley Paul and Heather Stevens discuss the growth in the Indigenous tourism sector. And off the top of the show, we hear from Diana Moser who's part of the clinical trials for a vaccine against Lyme disease. We also hear your feedback on alcohol in corner stores in NS and the possible increase in mining in the Maritime…
…
continue reading

1
Defensive Security Podcast Episode 309
1:00:41
1:00:41
Play later
Play later
Lists
Like
Liked
1:00:41Like what we’re doing with the DefSec Podcast and want to help support us? Donate here: https://www.patreon.com/defensivesec Links: https://www.theregister.com/2025/06/06/chatgpt_for_evil/ https://www.theregister.com/2025/06/06/ransomware_negotiation/ https://www.darkreading.com/cyber-risk/how-to-approach-security-era-ai-agents https://www.bleeping…
…
continue reading
Apple's WWDC 2025 is just as disappointing as expected. Has the company lost its magic touch? Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Trump’s impact on crypto future and your portfolio, with Unchained’s Laura Shin
28:25
28:25
Play later
Play later
Lists
Like
Liked
28:25While the first family engage in their own memecoin ventures, the crypto market is booming. Crypto expert and host of the podcast Unchained, Laura Shin joins Rapid Response to reveal the sector’s emerging economic, political and geopolitical implications. Shin also provides a primer on how to best experiment with crypto today, why Stablecoin is gro…
…
continue reading

1
Cybersecurity News: Brute forcing Google accounts, Guardian's Secure Messaging, UNFI cyberattack
8:13
8:13
Play later
Play later
Lists
Like
Liked
8:13Brute forcing phone numbers linked to Google accounts The Guardian launches Secure Messaging service United Natural Foods hit by cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. ea…
…
continue reading

1
The Data Diva E240 - Ian Glazer and Debbie Reynolds
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14Send us a text In episode 240 of The Data Diva Talks Privacy Podcast, host Debbie Reynolds, “The Data Diva,” welcomes Ian Glazer, Vice President of Product Strategy at SGNL (SGNL.ai) and co-founder of IDPro. With decades of leadership in digital identity, Ian shares insights on how identity, privacy, and security have become essential foundations o…
…
continue reading

1
On the phone-in: We debate the pros and cons of the possibility of alcohol being more widely available in corner stores in NS. And off the top of the show, we hear about problems in the wild oyster fishery ...
52:50
52:50
Play later
Play later
Lists
Like
Liked
52:50On the phone-in: We hear arguments for and against about possibly making alcohol more widely available in corner stores in NS. And off the top of the show, we hear an update from PEI about the wild oyster season which is troubled by MSX. And New Brunswick adopts a motion to declare gender-based violence an epidemic.…
…
continue reading
Urban planner says plan to pause creation of new bike lanes is exactly the wrong approach, if you want to relieve traffic congestion.
…
continue reading
Amazon says your Echo only tunes in when you say the wake word. Not exactly true. Here’s how to check everything Alexa’s recorded about you Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Empowering Developers: Fostering a Culture of Security in AppSec - Danielle Ruderman - CSP #213
30:37
30:37
Play later
Play later
Lists
Like
Liked
30:37In this episode, we explore the crucial role of cultivating a strong security culture to drive change in AppSec, where training and collaboration are key. Our distinguished guest, Danielle Ruderman, discusses the importance of executive support in ensuring that application development isn't just about churning out apps on time, but also about adopt…
…
continue reading

1
#236 - Build a World Class GRC Program (with Matt Hillary)
46:30
46:30
Play later
Play later
Lists
Like
Liked
46:30In this episode of CISO Tradecraft, host G Mark Hardy sits down with Matt Hillary, the Chief Information Security Officer of Drata, to discuss governance, risk, and compliance (GRC) and trust management. They explore key topics such as the evolution of GRC, trust management, compliance automation, and the advent of AI in compliance processes. Matt …
…
continue reading
The big tech event of the year is underway. Will it be a showstopper? Here’s why Apple lovers are frustrated. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410
1:38:02
1:38:02
Play later
Play later
Lists
Like
Liked
1:38:02Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
…
continue reading

1
Cyber executive order, Neuberger’s infrastructure warning, Mirai botnet warning
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42Presidential cyber executive order signed Neuberger warns of U.S. infrastructure’s cyberattack weakness Mirai botnet infects TBK DVR devices Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. ea…
…
continue reading

1
Cybersecurity Today: Massive Smart TV Botnets and Major US Cyber Policy Overhaul
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21In this episode of Cybersecurity Today, host David Shipley delves into alarming developments in the cybersecurity landscape. The FBI has flagged a massive malware campaign named Bad Box 2.0, which has compromised 1 million consumer devices globally, turning them into residential proxies. Additionally, a new variant of the Mirai malware is targeting…
…
continue reading

1
On the phone-in: Pharmacist Graham MacKenzie answers questions about medications and supplements. And off the top, we hear about concerns in New Brunswick about mining projects.
52:43
52:43
Play later
Play later
Lists
Like
Liked
52:43On the phone-in: Pharmacist Graham MacKenzie answers questions about medications and supplements. And off the top of the show, we hear about concerns in New Brunswick about the mining of critical minerals. We also hear about an event in Shediac commemorating the "flying boats" of the 1930s and 40s.
…
continue reading
Many of us are faced with choices and decisions constantly in our jobs. How do we approach a problem? What should we do as a team to get the work done? How do we code or manage or test or do something else with a database? Maybe more importantly, how long do we spend deciding? Read the rest of Shorten the Debate…
…
continue reading

1
The scary new fraud your inbox can’t spot
11:52
11:52
Play later
Play later
Lists
Like
Liked
11:52AI is making scam emails look like the real deal. Double-check before you click, reply, or send money. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Missed the signs? Check these secret apps and files cheaters use to cover their tracks. Be ready for what you find. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
314: /e/OS 3.0, GNOME Dropping X11, Alpine Linux, Ubuntu wants a Rusty Sudo, & more Linux news
31:47
31:47
Play later
Play later
Lists
Like
Liked
31:47video: https://youtu.be/-BWzypViJVQ Comment on the TWIL Forum This week in Linux, we have a lot of cool things to talk about. Murena has announced the latest release of the /e/OS mobile operating system for smartphones with each /e/OS 3.0. We also have Alpine Linux releasing a new version of their distro. And we're going to go to the Canonical Corn…
…
continue reading

1
Hands-on Nintendo Switch 2, light bulb security cam & passkey basics (124, June 7, 2025)
1:45:22
1:45:22
Play later
Play later
Lists
Like
Liked
1:45:22Rich gave his first impressions of the Nintendo Switch 2. Looking for details on how to get it? Check out TheShortcut.com Jim in British Columbia wonders if an advertisement he sees on Facebook for a $29 pallet full of returned Amazon goods is legitimate. Drew in Costa Mesa is looking for a solid basic printer/copier. Rich recommends the Brother L2…
…
continue reading