A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
…
continue reading
Learn how to think not what to think.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
…
continue reading
WoW! Talk! is Mash Those Button's bi-weekly podcast about World of Warcraft. Expect to hear news, rumors, and just the general on goings in the WoW world.
…
continue reading
The Executive Insights podcast, brought to you by AWS (Amazon Web Services), features peer-to-peer conversations between business executives on innovating for growth, building resiliency, and shaping the future of their organizations. Learn more at AWS Executive Insights and follow us on LinkedIn. For video versions of these and other conversations, subscribe to our YouTube playlist.
…
continue reading
Difficult conversations with Max Karson. mrgirl.substack.com
…
continue reading

1
Federal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
John Gilroy
The federal government spends $90 billion on technology every year. If you are a tech innovator and want to expand your share of the market, this is the podcast for you to find new opportunities for growth. Every week, Federal Tech Podcast sits down with successful innovators who have solved complex computer system problems for federal agencies. They cover topics like Artificial Intelligence, Zero Trust, and the Hybrid Cloud. You can listen to the technical issues that concern federal agenci ...
…
continue reading
A Grafana Labs' show all about the people, community, tools, and tech around Observability.
…
continue reading
Welcome to the The Black Celtic podcast, where the future leads to better things
…
continue reading
Every Sunday, Fanbyte’s John Warren brings you a weekly roundup of the biggest news headlines in video games and entertainment. Plus interviews with industry professionals from around the gaming world. Talk to us and fellow listeners on the Fanbyte Discord: https://fanbyte.casa/
…
continue reading
A monthly tech podcast that helps you know, understand and learn more about tech from the past.
…
continue reading
Moderated Content from Stanford Law School is podcast content about content moderation, moderated by assistant professor Evelyn Douek. The community standards of this podcast prohibit anything except the wonkiest conversations about the regulation—both public and private—of what you see, hear and do online.
…
continue reading
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
AT&T ThreatTraq is a roundtable discussion of current cyber security trends, observations, and recommendations from AT&T Security's Malware team. The full video of each discussion is available from the AT&T Tech Channel at https://techchannel.att.com/attthreattraq
…
continue reading
In this podcast ArticHost will show you how to get started with Virtual Private Servers, and then take you through setting them up under our platform. We will go through Windows VPS and Linux VPS instant setup. Our goal is to provide our customers, and general Virtual Server users with knowledge to get started. https://www.artichost.com/ Also check out the review blog https://techstat.net/
…
continue reading
Germany has a long and rich history when it comes to entrepreneurship. In TechStartups Germany, we interview local companies that are looking for global expansion opportunities or investors seeking out fresh investment prospects at home or abroad. We cover startups from Hessen including Frankfurt, Darmstadt, and other tech startup hubs in the state, as well as the deep tech and venture capital ecosystem. Our goal is to provide an insightful look into the Hessian startup scene for entrepreneu ...
…
continue reading
In the ever-evolving world of cybersecurity, keeping updated on the latest developments is crucial. The Cybersecurity Digest is your curated source for the most recent cybersecurity updates. Our goal is to bring you a comprehensive roundup of news, ensuring you’re well-informed and ahead of the curve. Stay Informed to Stay Secure.
…
continue reading
Netenrich threat researcher and security expert John Bambenek interviews leading security experts and threat researchers on the latest cyber threats and attacks, and what organizations need to do. Threat researchers, analysts, and SOC teams will gain insights on the latest techniques and approaches to advanced detection, investigation, and response. Learn how enterprises are modernizing outdated systems by adopting data analytics to gain increased visibility, intelligence and efficiencies to ...
…
continue reading
Welcome to Your Network’s Edge by RAD, where innovation meets connectivity. This podcast highlights how RAD’s technologies are empowering businesses and service providers. In every episode, we provide in-depth insights into the world of IoT, 5G, network Edge, and AI-powered networking, showcasing how RAD’s solutions empower service providers and critical infrastructure operators to stay ahead. Whether you’re a communications service provider, an industrial IoT professional, or someone passio ...
…
continue reading

1
Ep. 250 Can Your Agency Withstand a DDoS Attack? How Radware is Raising the Bar
26:39
26:39
Play later
Play later
Lists
Like
Liked
26:39Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com How do you defend your website against an attack that can reach one hundred million requests a second? The federal government is in an unusual position: in addition to the "garden variety" attacks, such as phishin…
…
continue reading
Helpful episodes to listen to first What is a Security Stack Questions we answer in this episode What are the 6 layers in the Bulletproof Stack Formula? How are they grouped? What are the most neglected layers? Episode summary There are 6 types of layers we can review to help us build a Security Stack. They help us build redundancy into our Securit…
…
continue reading

1
Why Fraud Prevention Silos Are Holding Your Business Back
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53"The thing to challenge is the fact that fraud prevention is a vertical by itself," says Guido Ronchetti, CTO at XTN Cognitive Security. He stresses that recent fraudulent trends exhibit "no real separation between fraud, cybersecurity, and AML.” In this episode of The Security Strategist podcast, Jonathan Care discusses fraud prevention with Ronch…
…
continue reading

1
Operation Endgame, deepfakes, and dead slugs
54:59
54:59
Play later
Play later
Lists
Like
Liked
54:59In this episode, Graham unravels Operation Endgame - the surprisingly stylish police crackdown that is seizing botnets, mocking malware authors with anime videos, and taunting cybercriminals via Telegram. Meanwhile, Carole exposes the AI-generated remote hiring threat. Could your next coworker be a North Korean hacker with a perfect LinkedIn? And B…
…
continue reading

1
Analyzing Iran-Israel Cyber Threats, New Scattered Spider Attack Chain
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst Hayden and Threat Hunter Leo as they discuss: New Scattered Spider Attack Chain Israel and Iran Cyber Threat Deep Dive Top Iran-linked Threat Groups & How to Mitigate Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research…
…
continue reading

1
Human Side of Fraud: Empathy, Education, & Evolution
46:35
46:35
Play later
Play later
Lists
Like
Liked
46:35People used to think fraud was something that happened in the shadows, rare, distant, and mostly affecting big companies. But after talking to PJ Rohall, it’s clear that fraud is evolving fast, and it’s showing up in places most of us don’t even think to look. In this episode, I sit down with PJ Rohall, Head of Fraud Strategy and Education at SEON …
…
continue reading

1
Episode 141: A Human-Centered Take on Password Policies
43:18
43:18
Play later
Play later
Lists
Like
Liked
43:18In episode 141 of Cybersecurity Where You Are, Tony Sager is joined by Phyllis Lee, VP of SBP Content Development at the Center for Internet Security®(CIS®); and Julie Haney, Computer Scientist & Human-Centered Cybersecurity Researcher at the National Institute of Standards and Technology (NIST). Together, they use a human-centered understanding of…
…
continue reading

1
Ep. 253 Managing Staff Cuts Without Compromising Code Security in Federal IT
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com There is a whirlwind of change in federal technology. For example, Federal News Network has reported that 25% of the IRS technology staff have left. Additionally, funding has been reduced, data stores are increasi…
…
continue reading

1
Integrity at Scale: Inside the Flo Health Mission
27:22
27:22
Play later
Play later
Lists
Like
Liked
27:22Tanuja Randery (VP and Managing Director of EMEA for AWS) interviews Dmitry Gurski, CEO and co-founder of Flo Health, the world's leading women's health app that supports over 70 million monthly users. The conversation explores Gurski's journey from pharmaceutical chemistry to software development, and how he built Flo Health into Europe's first fe…
…
continue reading

1
Ep. 252 From Legacy to Lean: Innovative Ways to Lower Costs in Federal IT Projects
27:34
27:34
Play later
Play later
Lists
Like
Liked
27:34Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Gregory Garrett, Chief Operating Officer at REI Systems, discussed digital transformation and innovation at the AWS summit in Washington, DC. He has a fascinating background that includes a career as a fighter pil…
…
continue reading

1
Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47"What we're seeing now is a lot of the vendors that were traditionally one of the identity pillars are kind of expanding into other pillars,” says Kevin Converse, Vice President, Identity and Access Management, GuidePoint Security. In this episode of The Security Strategist podcast, Richard Stiennon speaks with Converse, VP at GuidePoint Security. …
…
continue reading
I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So I’ll apologize in advance because I’m about to do that very thing again. The difference is that Howard Grimes, the CEO of the Cybersecurity Manufactur…
…
continue reading
Helpful episodes to listen to first Seven Critical Router Security Settings How DDoS Attacks Affect You Questions we answer in this episode What are the 5 questions in the Bulletproof Stack Formula? How do they help us? Episode summary There are 5 questions we can ask to help us build a Security Stack. These questions help to ensure that our Securi…
…
continue reading

1
Ep. 251 Breaking Through Bureaucracy: Modernizing Federal Systems in an Era of Digital Urgency
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Many of today’s archaic federal systems have been built over decades. As a result, they are perfected but also fragile. One obvious source of vulnerability is the workforce that created it. It is hard to believe t…
…
continue reading
A GCHQ intern forgets the golden rule of spy school — don’t take the secrets home with you — and finds himself swapping Cheltenham for a cell. Meanwhile, an Australian hacker flies too close to the sun, hacks his way into a US indictment, and somehow walks free... only to get booted back Down Under. Plus: flow states, Bob Mortimer, and the joys of …
…
continue reading

1
Israel-Iran Cyber Warfare, Anubis Ransomware, and More Attacker Trends
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analyst Joey and detection engineer Marken as they discuss: Anubis Ransomware Wiper Capability Teamfiltration Pentesting Tool Cyber Implications of Israel-Iran Conflict The Most Up to Date Attacker Trends Kim Bromley: Senior Cyber Threat Intelligence Analyst on …
…
continue reading
Sometimes it feels like every new technology we adopt comes with a new risk we didn’t see coming. From AI and data breaches to phishing scams and ransomware, it's clear we live in a time when cybersecurity isn’t just a tech issue, it’s a human issue. In this episode, I talk with Jeff Reich, Executive Director of the Identity Defined Security Allian…
…
continue reading

1
Episode 140: Threat-Informed Travel Safety Tips
34:28
34:28
Play later
Play later
Lists
Like
Liked
34:28In episode 140 of Cybersecurity Where You Are, Sean Atkinson is joined by John Cohen, Executive Director of the Program for Countering Hybrid Threats at the Center for Internet Security®(CIS®). Together, they discuss travel safety tips informed by today's evolving multidimensional threat environment. Here are some highlights from our episode: 01:30…
…
continue reading

1
Leadership Lessons from Elite Sports: Swimming Australia’s Path to Gold
27:38
27:38
Play later
Play later
Lists
Like
Liked
27:38Discover what it takes to compete at the highest level in the sporting world in this honest conversation with Jess Corones, General Manager of Performance Support and Olympic Campaign at Swimming Australia. Fresh from Australia's success at the Paris Olympics, Corones shares powerful insights on building high-performance cultures, managing team dyn…
…
continue reading
Nick, Rei, Eric, and Kurabara are back to talk about what is going on in World of Warcraft! This week, Patch 11.1.7 launches on June 17th, so its time for the Patch 11.1.7 Quiz! But first Rei talks about guild members demanding her time inappropriately. Then she talks about some bugs that entered the game recently related to shared quests. They als…
…
continue reading

1
#292: Horrific Visions, Dinars, and M.A.S.K.s
1:09:44
1:09:44
Play later
Play later
Lists
Like
Liked
1:09:44Nick, Rei, Eric, and Kurabara are back this week to talk about what has been going on in World of Warcraft! Rei starts by talking about pugging and running mythic+ dungeons. Then Nick gets into a chat about incentives for raiding in the current game. Eric mentions that Order of Corrupted Souls has downed Heroic Gallywix, either due to a nerf to Gal…
…
continue reading

1
Ep. 249 Securing Endpoints in Federal Systems Amid Constant Change
18:22
18:22
Play later
Play later
Lists
Like
Liked
18:22Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Sometimes, one plus one is three. Back in 2021, McAfee’s Enterprise business merged with FireEye to form Trellix. Today, the net result is a company that generates $1.2 billion globally and $400 million in the pub…
…
continue reading
Helpful episodes to listen to first Our Super Chatty Devices Questions we answer in this episode What are the 4 phases in a Security Stack? How do they help us? Which one is the most important? Episode summary The 4 phases of a Security Stack are: Learn, Prevent, Detect, and Repair. This parallels how an attack affects us over time. We want to Lear…
…
continue reading

1
How HCLTech Leads Customers to Generative AI Success
17:22
17:22
Play later
Play later
Lists
Like
Liked
17:22Hear from Prabhakar Appana, SVP and Head of AWS Ecosystem at HCLTech, about their leadership in Generative AI implementation. Prabhakar discusses HC Tech's holistic approach to Generative AI, emphasizing the importance of data strategy, security, and sustainability, while sharing success stories across healthcare, banking, and insurance sectors.…
…
continue reading

1
Ep. 248 Federal Efficiency Starts with Talent: What HR Experts Know
26:23
26:23
Play later
Play later
Lists
Like
Liked
26:23Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com If you are a regular listener, you know that I interview tech companies to have them elucidate the ways they can help federal agencies reach goals. Today, I will pull back the curtain and sit down with an HR profe…
…
continue reading

1
Toothpick flirts, Google leaks, and ICE ICE scammers
35:54
35:54
Play later
Play later
Lists
Like
Liked
35:54What do a sleazy nightclub carpet, Google’s gaping privacy hole, and an international student conned by fake ICE agents have in common? This week’s episode of the "Smashing Security" podcast obviously. Graham explains how a Singaporean bug-hunter cracked Google’s defences and could brute-force your full phone number. Meanwhile, Carole dives into a …
…
continue reading

1
Black Basta's Enduring Legacy, Qilin Exploits Fortinet Flaws
29:55
29:55
Play later
Play later
Lists
Like
Liked
29:55Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Alex and John as they discuss: The Enduring Legacy of Black Basta Qilin's Exploitation of Fortinet Flaws Vishing for Salesforce Data Atomic Stealer x ClickFix Campaign Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Resear…
…
continue reading

1
Your Car Is Spying On You What It’s Collecting and Who It’s Telling
42:45
42:45
Play later
Play later
Lists
Like
Liked
42:45I used to think of my car as just a tool to get from point A to point B. But after this conversation, I can’t help but see it as something else entirely, a powerful data collection device that knows far more about me than I realized. From where I go and who I text to how I drive and even what’s on my phone, today’s vehicles are gathering a staggeri…
…
continue reading

1
Episode 139: Community Building for the Cyber-Underserved
34:03
34:03
Play later
Play later
Lists
Like
Liked
34:03In episode 139 of Cybersecurity Where You Are, Tony Sager is joined by Amelia Gifford, Sr. Manager, Administration, at the Center for Internet Security®(CIS®); and George Bailey, Director of Purdue cyberTAP. Together, they discuss how the 2025 grant from the Alan Paller Laureate Program will support Purdue cyberTAP's mission of community building f…
…
continue reading

1
Ep. 247 Winning Federal Contracts: Smarter Proposal Writing for Tech Leaders in a Shifting Landscape
26:39
26:39
Play later
Play later
Lists
Like
Liked
26:39In this episode of the Federal Tech Podcast, host John Gilroy sits down with Vishwas Lele, CEO and co-founder of pWin.ai, and Larry Katzman, President and CEO of Applied Information Sciences (AIS), to explore how technology leaders can write smarter proposals in an increasingly complex federal landscape. The conversation dives into the current stat…
…
continue reading

1
Ep. 246 Thales Powers Federal Data Security Against Quantum-Era Threats
25:40
25:40
Play later
Play later
Lists
Like
Liked
25:40Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Years ago, the headline “Data Breach” was shocking; today, it is common. That may not be a problem for some, but the federal government maintains data stores that contain information about finances, health, and mi…
…
continue reading

1
#291: Leveling, Player Housing, and Getting off the Bench
1:09:58
1:09:58
Play later
Play later
Lists
Like
Liked
1:09:58Nick, Rei, Eric, and Kurabara are back to talk about everything going on in World of Warcraft. First, Rei talks about struggling on Heroic Gallywix with the guild. Then, she talks about earning crests with the cap removed. She also discusses some successful pugs she worked with. Next, Eric talks about doing Mythic dungeons and bringing his tank out…
…
continue reading
Helpful episodes to listen to first 4 Strategies for Picking Your Priorities Questions we answer in this episode What does Makani love building? What is a Security Stack? How do you build one? What is the twist on our usual Call-to-Actions for this series? Episode summary A Security Stack is a piece of your Personal Security Plan focused on a speci…
…
continue reading

1
Building a Better Security Team: Emotional Intelligence in DevSecOps
22:10
22:10
Play later
Play later
Lists
Like
Liked
22:10Discover how emotional intelligence is revolutionizing cybersecurity leadership in this episode of AWS Executive Insights, featuring Hart Rossman, VP of Global Services Security. Beyond technical expertise, security leaders must cultivate empathy, emotional regulation, and interpersonal skills within their workforce in order to avoid burnout, reduc…
…
continue reading

1
Ep. 245 Women in Technology Leadership Awards for 2025
35:39
35:39
Play later
Play later
Lists
Like
Liked
35:39Today, we have a pattern interrupt. Instead of a standard 25 minute interview, we will sit down with five nominees for a leadership award from Women in Technology. Each candidate sits for a "lightning" round of eight minutes where they answer three questions about leadership and give their reason for participating in Women In Technology. In order t…
…
continue reading

1
Fake Susies, flawed systems, and fruity fixes for anxiety
34:04
34:04
Play later
Play later
Lists
Like
Liked
34:04A bizarre case of political impersonation, where Trump’s top aide Susie Wiles is cloned (digitally, not biologically — we think), and high-ranking Republicans start getting invitations to link up with "her" on Telegram to share their Trump pardon wishlists. Was it a deepfake? Or just someone with a halfway decent impression and access to a shady da…
…
continue reading

1
Scattered Spider's Evolving Playbook, SentinelOne Outage
27:36
27:36
Play later
Play later
Lists
Like
Liked
27:36Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Scattered Spider's Focus on Tech Vendors How APT41 Abuses Google Calendar for C2 The SentinelOne Outage A New Void Blizzard Espionage Campaign Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat …
…
continue reading
Some scams are so convincing, they’re almost impossible to spot. With phishing emails that look like they’re from your bank, deep fake videos that mimic real people, and AI-generated messages that feel personal, it’s getting harder to know what’s real and what’s a trap. In this episode, I sit down with Gabrielle Hempel, a security operations specia…
…
continue reading

1
Episode 138: The Use of GenAI to Refine Your TTX Development
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54In episode 138 of Cybersecurity Where You Are, Sean Atkinson is joined by Timothy Davis, Lead Cyber Threat Intelligence (CTI) Analyst at the Center for Internet Security®(CIS®). Together, they discuss how organizations can use Generative Artificial Intelligence (GenAI) to refine how they develop Tabletop Exercises (TTXs). Here are some highlights f…
…
continue reading

1
Ep. 244 Unlocking Federal Efficiency: Cutting Costs and Boosting Security in LLM Development
22:38
22:38
Play later
Play later
Lists
Like
Liked
22:38Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Everyone is trying to figure out how to apply AI to federal problems—essentially, building large language models and trying to wring value from them. Inevitably, many are jumping into creating LLMs from various da…
…
continue reading

1
Ep. 243 From Bottlenecks to Breakthroughs: Boosting Federal Efficiency with Automation
27:19
27:19
Play later
Play later
Lists
Like
Liked
27:19Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Automation is a two-edged sword. On the one hand, it promises greater efficiency; on the other hand, it can pose inherent risks, such as maliciously modified data, bias, and even data poisoning. During today’s int…
…
continue reading

1
Driving Impactful Changes with Micro-Battles
27:51
27:51
Play later
Play later
Lists
Like
Liked
27:51Frank Ford, Partner at Bain & Company, discusses how organizations can drive meaningful change through "micro-battles" - a method of tackling tough business problems in small, winnable chunks that can later be scaled across the organization. He explains why traditional large-scale transformations often fail (with only 12% success rate) and how focu…
…
continue reading

1
#290: 11.1.5 Reactions and 11.1.7 Expectations
1:18:01
1:18:01
Play later
Play later
Lists
Like
Liked
1:18:01Nick, Rei, Eric, and Kura are back to talk about what's going on in World of Warcraft. This week, Rei talks about the struggles of not being available on social media and the related etquitte. Eric talks about how the guild is struggling with a tank with limited playtime. Kura talks more about leveling his characters. Then everyone talks about bein…
…
continue reading
Insider threats are creating new attack vectors, but old-school solutions could rise to the challenge. Regardless of the situation or dynamic, everyone likes to think that they’re special. However, with experience we learn that appreciating both the shared similarities, as well as some of those unique traits, are how we can best solve problems. A g…
…
continue reading

1
Ep. 242 Inside the SANS Institute’s Mission to Fortify Federal Cyber Defenses
27:04
27:04
Play later
Play later
Lists
Like
Liked
27:04Here we are in the spring of 2025, and the headline news is that the federal government is removing tech staff; at the same time, reports are coming in of thousands of unfilled cybersecurity positions across the government. Today, we sit down with a self-proclaimed “Cybersecurity Lifer” who will give the perspective of the SANS Institute on this di…
…
continue reading

1
65. 4 Strategies for Picking Your Priorities
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30Questions we answer in this episode What is the 4P formula? What are 4 strategies for picking your priorities? What is the theme of our new series of episodes? How many episodes do you think it will take Makani to finish it? Episode summary There's a lot of ways you can improve your online security. But where should you begin? It can be a daunting …
…
continue reading

1
Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges
23:09
23:09
Play later
Play later
Lists
Like
Liked
23:09In this episode of The Security Strategist podcast, host Richard Stiennon, industry analyst and author, speaks to Craig Roberts, Principal Software Engineer at Rapid7, about digital exposure and the increasing challenges of Attack Surface Management (ASM). The conversation peels back the layers of hidden vulnerabilities and misconfigurations that p…
…
continue reading

1
Ep. 241 The Role of Augmented AI in Modernizing Federal Agencies
26:45
26:45
Play later
Play later
Lists
Like
Liked
26:45Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com GitLab has been around for ten years and has garnered a reputation for helping federal agencies ensure compliance with stringent government standards. Today, we sat down with Joel Krooswick from GitLab to discuss …
…
continue reading

1
Star Wars, the CIA, and a WhatsApp malware mirage
47:44
47:44
Play later
Play later
Lists
Like
Liked
47:44Why is a cute Star Wars fan website now redirecting to the CIA? How come Cambodia has become the world's hotspot for scam call centres? And can a WhatsApp image really drain your bank account with a single download, or is it just a load of hacker hokum? All this and much more is discussed in the latest edition of the award-winning "Smashing Securit…
…
continue reading

1
SPECIAL: How Russian Market Fuels Credential-Based Attacks
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Factors Driving Russian Market's Popularity Attackers' Favorite Infostealers Infostealer Attack Paths Main Types and Exclusivity of Stolen Logs Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat…
…
continue reading