show episodes
 
Artwork

1
Click Here

Recorded Future News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork

1
The Privacy Corner

Robert Bateman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
  continue reading
 
Artwork

1
Technology and Security

Dr Miah Hammond-Errey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork

1
Data Revolution

Kate Carruthers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to a podcast that dives deep into the fascinating crossroads of data, AI, privacy, and cybersecurity. Hosted by data and AI expert Kate Carruthers, this series explores the cutting-edge frontiers of our digital world, where data is forging an entirely new economy. Tune in to stay ahead of the curve and uncover the opportunities, challenges, and innovations shaping our future.
  continue reading
 
Artwork

1
Data Hurdles

Michael Burke and Chris Detzel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Data Hurdles is a podcast that brings the stories of data professionals to life, showcasing the challenges, triumphs, and insights from those shaping the future of data. Hosted by Michael Burke and Chris Detzel, this podcast dives into the real-world experiences of data experts as they navigate topics like data quality, security, AI, data literacy, and machine learning. Each episode features guest data professionals who share their journeys, lessons learned, and the impact of data on industr ...
  continue reading
 
Artwork

1
ISACA Podcast

ISACA Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
  continue reading
 
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
  continue reading
 
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
  continue reading
 
Artwork

1
Hacked

Hacked

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
  continue reading
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
Artwork

1
Microsoft Mechanics Podcast

Microsoft Mechanics

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
  continue reading
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
Artwork

1
Rebel Tech

Texas Public Policy Foundation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Rebel Tech podcast, hosted by Zach Whiting and David Dunmoyer, is a product of the Texas Public Policy Foundation that explores technology and innovation, and its implications on everything from culture, public policy discussions, business, to how we live our lives and interact with one another. The Rebel Tech podcast features prominent guests, ranging from lawmakers to entrepreneurs to thought leaders fighting on the side of humanity on the digital frontier.
  continue reading
 
Artwork

1
Serious Privacy

Dr. K Royal, Paul Breitbarth & Ralph O'Brien

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
For those who are interested in the hottest field in a technology world. Whether you are a professional who wants to learn more about privacy, data protection, or cyber law or someone who just finds this fascinating, we have topics for you from data management to cybersecurity to social justice and data ethics and AI. In-depth information on serious privacy topics. This podcast, hosted by Dr. K Royal, Paul Breitbarth and Ralph O'Brien, features open, unscripted discussions with global privac ...
  continue reading
 
Artwork

1
Breaches & Brews

Rivial Data Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
  continue reading
 
Artwork
 
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
  continue reading
 
Covering everything from the future of organizational culture to accelerated cloud adoption, in this inaugural podcast series, Splunk thought leaders sit down with Principal Analyst Daniel Newman to discuss the unique intricacies organizations are navigating in an era of rapid digital transformation and how data remains the key solution to thriving in uncertain times.
  continue reading
 
Artwork

1
Grumpy GDPR

Rie & Miloš

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
  continue reading
 
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
  continue reading
 
The Power of Digital Policy is a podcast that teaches you and your organization how to balance the risks and opportunities that come with operating websites, social media, mobile applications, voice assistants, AI and other channels. Through a monthly focus on individual topics, such as accessibility, cookies, copyrights, social media faux pas, data breaches, and data privacy, you will learn how to develop guardrails to maximize digital opportunity and minimize risk. Whether you work for a s ...
  continue reading
 
Artwork

1
BarCode

Chris Glanden

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
  continue reading
 
Artwork

1
Surveillance Report

Techlore & The New Oil

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork
 
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
  continue reading
 
Loading …
show series
 
Which behaviours increase risk and how we can measurably change them Driving employee engagement without incentives Which real-time interventions encourage safer employee behaviours Jonathan Craven, Host, teissTalk https://www.linkedin.com/in/jonathanbcraven/ Rebecca Stephenson, Specialist Lead Lecturer, Highlands College https://www.linkedin.com/i…
  continue reading
 
On this episode host Carol Flagg welcomes Irene Lecker, PhD, Director of Strategy at Supreme Optimization, part of Supreme Group. She joins Carol to talk about strategies for generating high quality sales leads using the LinkedIn advertising platform. Be sure to check out the agency's ebook "The Life Science Marketer’s Complete Guide To LinkedIn Ad…
  continue reading
 
Dr Miah Hammond-Errey is joined by Dr Johnny Ryan, Director of Enforce at the Irish Council for Civil Liberties and a leading authority on surveillance, data rights, and privacy. Drawing on his extensive experience in the ad tech industry and digital rights advocacy, Dr Ryan explains how real-time bidding (RTB)—the backbone of online advertising—ro…
  continue reading
 
Explore the critical intersection of Data Center Infrastructure Management (DCIM), Common Data Center Security issues and Zero Trust Architecture (ZTA) with a special focus on how our innovative OpenData solution can help. As data centers face increasing security threats and regulatory pressures, understanding how to effectively integrate DCIM into…
  continue reading
 
Even as the feud between Donald Trump and Elon Musk threatens untold chaos, the Supreme Court ruled in favor of DOGE in granting access to Americans' personal Social Security data. Jen Psaki, Ronan Farrow, Senator Elissa Slotkin, and Rep. Melanie Stansbury discuss the dangers and the level of concern among American voters.…
  continue reading
 
Stolen Kettering Health data published Reddit sues Anthropic for scraping North Face website customer accounts breached Huge thanks to our sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the follow up tasks you don’t have time for are close behind. What are you going to do? Here’s a better q…
  continue reading
 
Episode Description: Every device around you is collecting data about you and everyone you interact with. Amazon Echo recordings are being subpoenaed in murder trials. Period tracking apps are being used to prosecute women. Ancestry websites are revealing family secrets. We're participants in the largest social experiment in human history—and we ne…
  continue reading
 
Anand Athavale, Data Management veteran joins to explain why separating regulatory data (like PII) from security-sensitive data (like passwords and keys) is mission-critical. Learn how ransomware’s evolution has blurred roles between compliance and security, and why top-down policy, automation, and AI must reshape your data strategy now.…
  continue reading
 
Ransomware remains one of the most formidable cybersecurity threats facing organizations worldwide. In this episode of the ISACA Podcast, host Chris McGowan speaks with Netwrix endpoint protection expert Jeremy Moskowitz, who explains how ransomware infiltrates and cripples desktop environments. He explains cybercriminals' tactics to exploit social…
  continue reading
 
Hackers attacks target Microsoft Entra ID accounts using pentesting tool Google Cloud and Cloudflare outages reported House Homeland Chairman Mark Green announces his departure Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta.…
  continue reading
 
Zoom was built for speed. But in its rush to connect us, it may have left a few doors open. This week, a cybersecurity expert walks us through how one of Zoom's most mundane features became a hacker's best friend — and why the weakest link in crypto isn't the blockchain … it's the person who thinks they're too smart to get scammed. Learn about your…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love discusses critical AI-related security issues, such as the Echo Leak vulnerability in Microsoft's AI, MCP's universal integration risks, and Meta's privacy violations in Europe. The episode also explores the dangers of internet-exposed cameras as discovered by BitSight, highlighting the urgent n…
  continue reading
 
Interpol’s Operation Secure dismantles a major cybercrime network, and Singapore takes down scam centers. GitLab patches multiple vulnerabilities in its DevSecOps platform. Researchers unveil a covert method for exfiltrating data using smartwatches. EchoLeak allows for data exfiltration from Microsoft Copilot. Journalists are confirmed targets of P…
  continue reading
 
In this episode of the Data Center Frontier Show, we sit down with Kevin Cochrane, Chief Marketing Officer of Vultr, to explore how the company is positioning itself at the forefront of AI-native cloud infrastructure, and why they’re all-in on AMD’s GPUs, open-source software, and a globally distributed strategy for the future of inference. Cochran…
  continue reading
 
Want a quick download of the latest releases, updates, and tips for Microsoft 365 Copilot? With ongoing updates and new releases, it can be hard to keep up with all the great things you can do in M365 Copilot. Valorem Reply’s Modern Work experts are offering a Microsoft 365 Copilot Newsroom series where we compile the most important news and learni…
  continue reading
 
Want a quick download of the latest releases, updates, and tips for Microsoft 365 Copilot? With ongoing updates and new releases, it can be hard to keep up with all the great things you can do in M365 Copilot. Valorem Reply’s Modern Work experts are offering a Microsoft 365 Copilot Newsroom series where we compile the most important news and learni…
  continue reading
 
Zero-click data leak flaw in Copilot Operation Secure targets infostealer operations FIN6 targets recruiters Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. easier—while also strengthening yo…
  continue reading
 
This week, our hosts⁠⁠⁠⁠⁠ Dave Bittner, ⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with some more chicken follow up, this week, delving into malware-relat…
  continue reading
 
Patch Tuesday. Mozilla patches two critical FireFox security flaws. A critical flaw in Salesforce OmniStudio exposes sensitive customer data stored in plain text. The Badbox botnet continues to evolve. AI-powered “ghost students” enrolling in online college courses to steal government funds. Hackers steal nearly 300,000 vehicle crash reports from t…
  continue reading
 
This episode of 'Cybersecurity Today' hosted by Jim Love covers various significant events in the cybersecurity landscape. OpenAI has banned multiple ChatGPT accounts linked to state-sponsored hackers from countries including China, Russia, North Korea, Iran, and the Philippines for developing malware, generating disinformation, and conducting scam…
  continue reading
 
CISA, Microsoft warn of Windows zero-day used in attack on ‘major’ Turkish defense org 40K IoT cameras worldwide stream secrets to anyone with a browser Marks & Spencer begins taking online orders again, out for seven weeks due to cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more effic…
  continue reading
 
Donald Trump needs the protests in L.A. to be violent and chaotic so he can justify the power grab he desperately wants. His allies in Congress and right-wing media are only too happy to oblige by encouraging his exaggerations and distortions. Jen Psaki takes a closer look at how the protests in L.A. are being mischaracterized as Trump edges toward…
  continue reading
 
In this episode, Anthony and Kris discuss the intersection of AI, data governance, and productivity with Cadence founder Dave Slutzkin. Dave takes the pair through his experience building on this shifting foundation, the problem his start-up is focused on solving, and his take on why many companies abandon vibe coding too soon. Learn more (includin…
  continue reading
 
How can modern telemetry solutions help you? While at NDC in Melbourne, Richard chatted with Liz Fong-Jones of Honeycomb about her approach to educating leadership on creating great telemetry solutions for organizations. Liz discusses the importance of being able to answer questions about reliability issues without causing problems, as opposed to r…
  continue reading
 
An unsecured Chroma database exposes personal information of Canva Creators. A researcher brute-forces Google phone numbers. Five zero-day vulnerabilities in Salesforce Industry Cloud are uncovered. Librarian Ghouls target Russian organizations with stealthy malware. SAP releases multiple security patches including a critical fix for a NetWeaver bu…
  continue reading
 
Like what we’re doing with the DefSec Podcast and want to help support us? Donate here: https://www.patreon.com/defensivesec Links: https://www.theregister.com/2025/06/06/chatgpt_for_evil/ https://www.theregister.com/2025/06/06/ransomware_negotiation/ https://www.darkreading.com/cyber-risk/how-to-approach-security-era-ai-agents https://www.bleeping…
  continue reading
 
Hayden Smith, Hunted Labs Co-Founder comes on Absolute AppSec to discuss, among other things, the Hunted Labs work discovering and publicizing the EasyJson software supply chain threat. Before co-founding Hunted Labs, Hayden was Senior Director of Field Services at Anchore, assisting US government, intelligence, and Fortune 500 clients. Long a spec…
  continue reading
 
Can Security be “Agile”? with Brian Wagner In this comprehensive interview, Brian Wagner, CTO at Revenir and former AWS security executive, shares insights from his new book "Redefining Information Security" and explains why the cybersecurity industry needs a fundamental shift in approach. With over 20 years of experience leading security transform…
  continue reading
 
On the latest episode of Security Visionaries, host Max Havey interviews Marcus Thompson, Director of Cyber Compass and former head of Information Warfare for the Australian Defence Force. They discuss the intersection of military and cyber defense, exploring how cybersecurity roles differ between military and civilian sectors, and the transfer of …
  continue reading
 
All links and images can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis, partner, YL Ventures. Joining us is our sponsored guest, Sam Curry, global vp, CISO at Zscaler. This episode was recorded at a Zscaler event in Boston, MA. In this episode: Guardrails for decision making under …
  continue reading
 
What if you could understand what your customer really cares about—before saying a single word? In this episode, we explore how socialprofiler is changing the game for sales professionals by using AI to unlock public social media interests. Whether you’re pitching real estate, raising capital, or hiring your next key employee, this tool helps you c…
  continue reading
 
Jake Gallen was a rising star in crypto. Then, after what seemed like a routine YouTube interview, his digital world unraveled. His NFTs? Liquidated. His social accounts? Hijacked. It turns out, the hackers didn’t need phishing links or fake job offers. They needed something much simpler: a Zoom invite. Learn about your ad choices: dovetail.prx.org…
  continue reading
 
Brute forcing phone numbers linked to Google accounts The Guardian launches Secure Messaging service United Natural Foods hit by cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. ea…
  continue reading
 
Strengthen your security posture in Microsoft Entra by following prioritized Secure Score recommendations. Enforce MFA, block legacy authentication, and apply risk-based Conditional Access policies to reduce exposure from stale accounts and weak authentication methods. Use built-in tools for user, group, and device administration to detect and clea…
  continue reading
 
A new White House executive Order overhauls U.S. cybersecurity policy. The EU updates its “cybersecurity blueprint”. The Pentagon’s inspector general investigates Defense Secretary Hegseth’s Signal messages. Chinese hackers target U.S. smartphones. A new Mirai botnet variant drops malware on vulnerable DVRs. 17 popular Gluestack packages on NPM hav…
  continue reading
 
As hospitals and health systems continue to evolve in value-based care, optimizing the post-acute recovery process has become a top priority. On this episode Dan is joined by Diane Shifley, Assistant Vice President of Population Health and Post-Acute Services at a major Chicago health system to discuss how robust transitions-in-care programs can dr…
  continue reading
 
Presidential cyber executive order signed Neuberger warns of U.S. infrastructure’s cyberattack weakness Mirai botnet infects TBK DVR devices Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. ea…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley delves into alarming developments in the cybersecurity landscape. The FBI has flagged a massive malware campaign named Bad Box 2.0, which has compromised 1 million consumer devices globally, turning them into residential proxies. Additionally, a new variant of the Mirai malware is targeting…
  continue reading
 
Episode 228: Meta & Yandex skirt around Android's sandboxing to violate your privacy even further, Apple turned over thousands of push notification data requests, billions of session cookies are for sale, Signal might be rolling out backup subscriptions soon, and more! Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep yo…
  continue reading
 
The new UI is no UI - How AI is Transforming the EHR and other Core SolutionsNextGen Healthcare's CEO David Sides hosts a fascinating conversation with Diane Kaye, chief product officer, and Sanjeev Kumar, PH.D., chief analytics officer. They discuss how the healthtech industry is leveraging AI to remove sources of friction for providers and enable…
  continue reading
 
IBD 3 Part Series On this Part 3 of 3 episode host Fred Goldstein invites Dr. Christine Frissora, gastroenterologist and associate professor of clinical medicine, at The NY Presbyterian Cornell University Medical Center and Dr. Ken Schaecher, chief medical officer emeritus, University of Utah Health Plans and chief medical officer at a regional hea…
  continue reading
 
Our terminal apps are loaded, the goals are set, but we're already hitting a few snags. The TUI Challenge begins... Sponsored By: Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password Extended Access Management is a device …
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play