show episodes
 
Artwork

1
Security Breach

Eric Sorensen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
Threat Monitor

SearchSecurity.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley & Carole Theriault

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Artwork

1
Cybersecurity Where You Are (video)

Center for Internet Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Artwork

1
Easy Prey

Chris Parker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
  continue reading
 
Artwork

1
AWS Executive Insights

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Executive Insights podcast, brought to you by AWS (Amazon Web Services), features peer-to-peer conversations between business executives on innovating for growth, building resiliency, and shaping the future of their organizations. Learn more at AWS Executive Insights and follow us on LinkedIn. For video versions of these and other conversations, subscribe to our YouTube playlist.
  continue reading
 
The federal government spends $90 billion on technology every year. If you are a tech innovator and want to expand your share of the market, this is the podcast for you to find new opportunities for growth. Every week, Federal Tech Podcast sits down with successful innovators who have solved complex computer system problems for federal agencies. They cover topics like Artificial Intelligence, Zero Trust, and the Hybrid Cloud. You can listen to the technical issues that concern federal agenci ...
  continue reading
 
Every Sunday, Fanbyte’s John Warren brings you a weekly roundup of the biggest news headlines in video games and entertainment. Plus interviews with industry professionals from around the gaming world. Talk to us and fellow listeners on the Fanbyte Discord: https://fanbyte.casa/
  continue reading
 
Artwork

1
Moderated Content

evelyn douek

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Moderated Content from Stanford Law School is podcast content about content moderation, moderated by assistant professor Evelyn Douek. The community standards of this podcast prohibit anything except the wonkiest conversations about the regulation—both public and private—of what you see, hear and do online.
  continue reading
 
Artwork

1
Risk & Repeat

Robert Wright

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
AT&T ThreatTraq

AT&T Tech Channel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
AT&T ThreatTraq is a roundtable discussion of current cyber security trends, observations, and recommendations from AT&T Security's Malware team. The full video of each discussion is available from the AT&T Tech Channel at https://techchannel.att.com/attthreattraq
  continue reading
 
In this podcast ArticHost will show you how to get started with Virtual Private Servers, and then take you through setting them up under our platform. We will go through Windows VPS and Linux VPS instant setup. Our goal is to provide our customers, and general Virtual Server users with knowledge to get started. https://www.artichost.com/ Also check out the review blog https://techstat.net/
  continue reading
 
Germany has a long and rich history when it comes to entrepreneurship. In TechStartups Germany, we interview local companies that are looking for global expansion opportunities or investors seeking out fresh investment prospects at home or abroad. We cover startups from Hessen including Frankfurt, Darmstadt, and other tech startup hubs in the state, as well as the deep tech and venture capital ecosystem. Our goal is to provide an insightful look into the Hessian startup scene for entrepreneu ...
  continue reading
 
Artwork

1
The Cybersecurity Digest

The Cybersecurity Digest LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In the ever-evolving world of cybersecurity, keeping updated on the latest developments is crucial. The Cybersecurity Digest is your curated source for the most recent cybersecurity updates. Our goal is to bring you a comprehensive roundup of news, ensuring you’re well-informed and ahead of the curve. Stay Informed to Stay Secure.
  continue reading
 
Netenrich threat researcher and security expert John Bambenek interviews leading security experts and threat researchers on the latest cyber threats and attacks, and what organizations need to do. Threat researchers, analysts, and SOC teams will gain insights on the latest techniques and approaches to advanced detection, investigation, and response. Learn how enterprises are modernizing outdated systems by adopting data analytics to gain increased visibility, intelligence and efficiencies to ...
  continue reading
 
Welcome to Your Network’s Edge by RAD, where innovation meets connectivity. This podcast highlights how RAD’s technologies are empowering businesses and service providers. In every episode, we provide in-depth insights into the world of IoT, 5G, network Edge, and AI-powered networking, showcasing how RAD’s solutions empower service providers and critical infrastructure operators to stay ahead. Whether you’re a communications service provider, an industrial IoT professional, or someone passio ...
  continue reading
 
Loading …
show series
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com How do you defend your website against an attack that can reach one hundred million requests a second? The federal government is in an unusual position: in addition to the "garden variety" attacks, such as phishin…
  continue reading
 
Helpful episodes to listen to first What is a Security Stack Questions we answer in this episode What are the 6 layers in the Bulletproof Stack Formula? How are they grouped? What are the most neglected layers? Episode summary There are 6 types of layers we can review to help us build a Security Stack. They help us build redundancy into our Securit…
  continue reading
 
"The thing to challenge is the fact that fraud prevention is a vertical by itself," says Guido Ronchetti, CTO at XTN Cognitive Security. He stresses that recent fraudulent trends exhibit "no real separation between fraud, cybersecurity, and AML.” In this episode of The Security Strategist podcast, Jonathan Care discusses fraud prevention with Ronch…
  continue reading
 
In this episode, Graham unravels Operation Endgame - the surprisingly stylish police crackdown that is seizing botnets, mocking malware authors with anime videos, and taunting cybercriminals via Telegram. Meanwhile, Carole exposes the AI-generated remote hiring threat. Could your next coworker be a North Korean hacker with a perfect LinkedIn? And B…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst Hayden and Threat Hunter Leo as they discuss: New Scattered Spider Attack Chain Israel and Iran Cyber Threat Deep Dive Top Iran-linked Threat Groups & How to Mitigate Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research…
  continue reading
 
People used to think fraud was something that happened in the shadows, rare, distant, and mostly affecting big companies. But after talking to PJ Rohall, it’s clear that fraud is evolving fast, and it’s showing up in places most of us don’t even think to look. In this episode, I sit down with PJ Rohall, Head of Fraud Strategy and Education at SEON …
  continue reading
 
In episode 141 of Cybersecurity Where You Are, Tony Sager is joined by Phyllis Lee, VP of SBP Content Development at the Center for Internet Security®(CIS®); and Julie Haney, Computer Scientist & Human-Centered Cybersecurity Researcher at the National Institute of Standards and Technology (NIST). Together, they use a human-centered understanding of…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com There is a whirlwind of change in federal technology. For example, Federal News Network has reported that 25% of the IRS technology staff have left. Additionally, funding has been reduced, data stores are increasi…
  continue reading
 
Tanuja Randery (VP and Managing Director of EMEA for AWS) interviews Dmitry Gurski, CEO and co-founder of Flo Health, the world's leading women's health app that supports over 70 million monthly users. The conversation explores Gurski's journey from pharmaceutical chemistry to software development, and how he built Flo Health into Europe's first fe…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Gregory Garrett, Chief Operating Officer at REI Systems, discussed digital transformation and innovation at the AWS summit in Washington, DC. He has a fascinating background that includes a career as a fighter pil…
  continue reading
 
"What we're seeing now is a lot of the vendors that were traditionally one of the identity pillars are kind of expanding into other pillars,” says Kevin Converse, Vice President, Identity and Access Management, GuidePoint Security. In this episode of The Security Strategist podcast, Richard Stiennon speaks with Converse, VP at GuidePoint Security. …
  continue reading
 
I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So I’ll apologize in advance because I’m about to do that very thing again. The difference is that Howard Grimes, the CEO of the Cybersecurity Manufactur…
  continue reading
 
Helpful episodes to listen to first Seven Critical Router Security Settings How DDoS Attacks Affect You Questions we answer in this episode What are the 5 questions in the Bulletproof Stack Formula? How do they help us? Episode summary There are 5 questions we can ask to help us build a Security Stack. These questions help to ensure that our Securi…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Many of today’s archaic federal systems have been built over decades. As a result, they are perfected but also fragile. One obvious source of vulnerability is the workforce that created it. It is hard to believe t…
  continue reading
 
A GCHQ intern forgets the golden rule of spy school — don’t take the secrets home with you — and finds himself swapping Cheltenham for a cell. Meanwhile, an Australian hacker flies too close to the sun, hacks his way into a US indictment, and somehow walks free... only to get booted back Down Under. Plus: flow states, Bob Mortimer, and the joys of …
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analyst Joey and detection engineer Marken as they discuss: Anubis Ransomware Wiper Capability Teamfiltration Pentesting Tool Cyber Implications of Israel-Iran Conflict The Most Up to Date Attacker Trends Kim Bromley: Senior Cyber Threat Intelligence Analyst on …
  continue reading
 
Sometimes it feels like every new technology we adopt comes with a new risk we didn’t see coming. From AI and data breaches to phishing scams and ransomware, it's clear we live in a time when cybersecurity isn’t just a tech issue, it’s a human issue. In this episode, I talk with Jeff Reich, Executive Director of the Identity Defined Security Allian…
  continue reading
 
In episode 140 of Cybersecurity Where You Are, Sean Atkinson is joined by John Cohen, Executive Director of the Program for Countering Hybrid Threats at the Center for Internet Security®(CIS®). Together, they discuss travel safety tips informed by today's evolving multidimensional threat environment. Here are some highlights from our episode: 01:30…
  continue reading
 
Discover what it takes to compete at the highest level in the sporting world in this honest conversation with Jess Corones, General Manager of Performance Support and Olympic Campaign at Swimming Australia. Fresh from Australia's success at the Paris Olympics, Corones shares powerful insights on building high-performance cultures, managing team dyn…
  continue reading
 
Nick, Rei, Eric, and Kurabara are back to talk about what is going on in World of Warcraft! This week, Patch 11.1.7 launches on June 17th, so its time for the Patch 11.1.7 Quiz! But first Rei talks about guild members demanding her time inappropriately. Then she talks about some bugs that entered the game recently related to shared quests. They als…
  continue reading
 
Nick, Rei, Eric, and Kurabara are back this week to talk about what has been going on in World of Warcraft! Rei starts by talking about pugging and running mythic+ dungeons. Then Nick gets into a chat about incentives for raiding in the current game. Eric mentions that Order of Corrupted Souls has downed Heroic Gallywix, either due to a nerf to Gal…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Sometimes, one plus one is three. Back in 2021, McAfee’s Enterprise business merged with FireEye to form Trellix. Today, the net result is a company that generates $1.2 billion globally and $400 million in the pub…
  continue reading
 
Helpful episodes to listen to first Our Super Chatty Devices Questions we answer in this episode What are the 4 phases in a Security Stack? How do they help us? Which one is the most important? Episode summary The 4 phases of a Security Stack are: Learn, Prevent, Detect, and Repair. This parallels how an attack affects us over time. We want to Lear…
  continue reading
 
Hear from Prabhakar Appana, SVP and Head of AWS Ecosystem at HCLTech, about their leadership in Generative AI implementation. Prabhakar discusses HC Tech's holistic approach to Generative AI, emphasizing the importance of data strategy, security, and sustainability, while sharing success stories across healthcare, banking, and insurance sectors.…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com If you are a regular listener, you know that I interview tech companies to have them elucidate the ways they can help federal agencies reach goals. Today, I will pull back the curtain and sit down with an HR profe…
  continue reading
 
What do a sleazy nightclub carpet, Google’s gaping privacy hole, and an international student conned by fake ICE agents have in common? This week’s episode of the "Smashing Security" podcast obviously. Graham explains how a Singaporean bug-hunter cracked Google’s defences and could brute-force your full phone number. Meanwhile, Carole dives into a …
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Alex and John as they discuss: The Enduring Legacy of Black Basta Qilin's Exploitation of Fortinet Flaws Vishing for Salesforce Data Atomic Stealer x ClickFix Campaign Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Resear…
  continue reading
 
I used to think of my car as just a tool to get from point A to point B. But after this conversation, I can’t help but see it as something else entirely, a powerful data collection device that knows far more about me than I realized. From where I go and who I text to how I drive and even what’s on my phone, today’s vehicles are gathering a staggeri…
  continue reading
 
In episode 139 of Cybersecurity Where You Are, Tony Sager is joined by Amelia Gifford, Sr. Manager, Administration, at the Center for Internet Security®(CIS®); and George Bailey, Director of Purdue cyberTAP. Together, they discuss how the 2025 grant from the Alan Paller Laureate Program will support Purdue cyberTAP's mission of community building f…
  continue reading
 
In this episode of the Federal Tech Podcast, host John Gilroy sits down with Vishwas Lele, CEO and co-founder of pWin.ai, and Larry Katzman, President and CEO of Applied Information Sciences (AIS), to explore how technology leaders can write smarter proposals in an increasingly complex federal landscape. The conversation dives into the current stat…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Years ago, the headline “Data Breach” was shocking; today, it is common. That may not be a problem for some, but the federal government maintains data stores that contain information about finances, health, and mi…
  continue reading
 
Nick, Rei, Eric, and Kurabara are back to talk about everything going on in World of Warcraft. First, Rei talks about struggling on Heroic Gallywix with the guild. Then, she talks about earning crests with the cap removed. She also discusses some successful pugs she worked with. Next, Eric talks about doing Mythic dungeons and bringing his tank out…
  continue reading
 
Helpful episodes to listen to first 4 Strategies for Picking Your Priorities Questions we answer in this episode What does Makani love building? What is a Security Stack? How do you build one? What is the twist on our usual Call-to-Actions for this series? Episode summary A Security Stack is a piece of your Personal Security Plan focused on a speci…
  continue reading
 
Discover how emotional intelligence is revolutionizing cybersecurity leadership in this episode of AWS Executive Insights, featuring Hart Rossman, VP of Global Services Security. Beyond technical expertise, security leaders must cultivate empathy, emotional regulation, and interpersonal skills within their workforce in order to avoid burnout, reduc…
  continue reading
 
Today, we have a pattern interrupt. Instead of a standard 25 minute interview, we will sit down with five nominees for a leadership award from Women in Technology. Each candidate sits for a "lightning" round of eight minutes where they answer three questions about leadership and give their reason for participating in Women In Technology. In order t…
  continue reading
 
A bizarre case of political impersonation, where Trump’s top aide Susie Wiles is cloned (digitally, not biologically — we think), and high-ranking Republicans start getting invitations to link up with "her" on Telegram to share their Trump pardon wishlists. Was it a deepfake? Or just someone with a halfway decent impression and access to a shady da…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Scattered Spider's Focus on Tech Vendors How APT41 Abuses Google Calendar for C2 The SentinelOne Outage A New Void Blizzard Espionage Campaign Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat …
  continue reading
 
Some scams are so convincing, they’re almost impossible to spot. With phishing emails that look like they’re from your bank, deep fake videos that mimic real people, and AI-generated messages that feel personal, it’s getting harder to know what’s real and what’s a trap. In this episode, I sit down with Gabrielle Hempel, a security operations specia…
  continue reading
 
In episode 138 of Cybersecurity Where You Are, Sean Atkinson is joined by Timothy Davis, Lead Cyber Threat Intelligence (CTI) Analyst at the Center for Internet Security®(CIS®). Together, they discuss how organizations can use Generative Artificial Intelligence (GenAI) to refine how they develop Tabletop Exercises (TTXs). Here are some highlights f…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Everyone is trying to figure out how to apply AI to federal problems—essentially, building large language models and trying to wring value from them. Inevitably, many are jumping into creating LLMs from various da…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Automation is a two-edged sword. On the one hand, it promises greater efficiency; on the other hand, it can pose inherent risks, such as maliciously modified data, bias, and even data poisoning. During today’s int…
  continue reading
 
Frank Ford, Partner at Bain & Company, discusses how organizations can drive meaningful change through "micro-battles" - a method of tackling tough business problems in small, winnable chunks that can later be scaled across the organization. He explains why traditional large-scale transformations often fail (with only 12% success rate) and how focu…
  continue reading
 
Nick, Rei, Eric, and Kura are back to talk about what's going on in World of Warcraft. This week, Rei talks about the struggles of not being available on social media and the related etquitte. Eric talks about how the guild is struggling with a tank with limited playtime. Kura talks more about leveling his characters. Then everyone talks about bein…
  continue reading
 
Insider threats are creating new attack vectors, but old-school solutions could rise to the challenge. Regardless of the situation or dynamic, everyone likes to think that they’re special. However, with experience we learn that appreciating both the shared similarities, as well as some of those unique traits, are how we can best solve problems. A g…
  continue reading
 
Here we are in the spring of 2025, and the headline news is that the federal government is removing tech staff; at the same time, reports are coming in of thousands of unfilled cybersecurity positions across the government. Today, we sit down with a self-proclaimed “Cybersecurity Lifer” who will give the perspective of the SANS Institute on this di…
  continue reading
 
Questions we answer in this episode What is the 4P formula? What are 4 strategies for picking your priorities? What is the theme of our new series of episodes? How many episodes do you think it will take Makani to finish it? Episode summary There's a lot of ways you can improve your online security. But where should you begin? It can be a daunting …
  continue reading
 
In this episode of The Security Strategist podcast, host Richard Stiennon, industry analyst and author, speaks to Craig Roberts, Principal Software Engineer at Rapid7, about digital exposure and the increasing challenges of Attack Surface Management (ASM). The conversation peels back the layers of hidden vulnerabilities and misconfigurations that p…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com GitLab has been around for ten years and has garnered a reputation for helping federal agencies ensure compliance with stringent government standards. Today, we sat down with Joel Krooswick from GitLab to discuss …
  continue reading
 
Why is a cute Star Wars fan website now redirecting to the CIA? How come Cambodia has become the world's hotspot for scam call centres? And can a WhatsApp image really drain your bank account with a single download, or is it just a load of hacker hokum? All this and much more is discussed in the latest edition of the award-winning "Smashing Securit…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Factors Driving Russian Market's Popularity Attackers' Favorite Infostealers Infostealer Attack Paths Main Types and Exclusivity of Stolen Logs Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play