show episodes
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
Artwork

1
Political Fix

Financial Times

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Financial Times takes you into the corridors of power to unwrap, analyse and debate British politics with a regular lineup of FT correspondents and informed commentators. New episodes available every Friday. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
How to Fix the Internet

Electronic Frontier Foundation (EFF)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Small changes, made over time, can produce significant results. Much like a high performance engine, or an entire orchestra, when even a small part is not doing what it is supposed to do, everything suffers. And the same is true of your finances. This show is dedicated to the small things that make a significant difference.
  continue reading
 
Artwork

1
Security & GRC Decoded

Raj Krishnamurthy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
  continue reading
 
Artwork

1
The Anxious To Secure PODCAST

Jula - The Anxious To Secure Coach

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to Anxious to Secure - the podcast for anyone who feels anxious in love and wants to feel calm, confident, and connected. If you’re chasing an emotionally unavailable (Avoidant) partner… If you’re attaching out of fear, not love… Your relationship is running on survival mode. (I’ve been there - and it can change.) 🤍 I’m Jula: an anxious attachment coach + certified life coach. In just 6 months, I became a more secure version of myself 🫳🏻🎤 Now I help you stop overthinking every text a ...
  continue reading
 
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
  continue reading
 
Artwork

1
National Security Law Today

National Security Law Today

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
National Security Law Today brings legal experts discussing the hot topics and current issues in the world of national security law right to your phone. Get information and advice for lawyers, law students or interested parties who want to dig deeper into the law that protects the country.
  continue reading
 
A podcast about private mortgage lending for residential and commercial real estate investors. It's also known as "hard money lending" or "bridge lending." Most of it is short-term financing with terms less than 2 years, but we also cover long-term loans. We focus on loan origination but also share insights about the capital side of the business.
  continue reading
 
Artwork

1
Financially Naked

The Financial Gym

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Your Best. Financial. Friends. (B.F.F.s) give you a weekly dose of personal finance stories, tips and insights. Join Trainers of The Financial Gym as they dig deep below the surface and get real about money! Along the way, they’ll be joined by members of the FinGym Fam for conversations about their own journeys of financial fitness and the triumphs and tribulations along the way.
  continue reading
 
Artwork

1
Fixed Deposit

bhishma4691

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shriram Fixed deposits are the most secured investment options with guaranteed returns that multiply your investments. Shriram offers one of the highest interest rates at 9.20%, including 0.50% for senior citizens. Returns on Fixed deposits do not change with market or external factors. More Information Visit: https://www.shriramfinance.in/fixed-deposit
  continue reading
 
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley & Carole Theriault

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
  continue reading
 
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
  continue reading
 
Artwork

1
The Register Kettle

Chris Williams, The Register, Nicole Hemsoth Prickett, Tobias Mann, Iain Thomson, Brandon Vigliarolo, Tom Claburn

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
What's a kettle, you ask? Why a group of vultures in flight, of course. News, insights, analysis, and overall chatter around what's happening in the broader world of IT. With hosts Iain Thomson, Chris Williams, Brandon Vigliarolo, Nicole Hemsoth Prickett, and more....
  continue reading
 
Artwork
 
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
  continue reading
 
Artwork

1
Think Cyber Secure

Think Cyber Secure

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
  continue reading
 
🎙️ Welcome to the Microsoft Intune and Security Report Podcast🎙️ — your essential stop for the latest in Windows and Edge security! This podcast is designed to be a time-saving powerhouse, distilling the most critical updates, new features, and emerging vulnerabilities from multiple trusted sources into one convenient, ready-to-reference report. Each week, we dig deep into the data to give you a concise, actionable rundown on the security landscape, helping you stay one step ahead. So whethe ...
  continue reading
 
Artwork

1
Louder with Crowder

Louder with Crowder

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Steven Crowder brings you news, entertainment and politics with the most politically incorrect show on the web. Guests, rants, sketches, your calls ... it's whatever. Watch the VIDEO version of this podcast here: http://www.louderwithcrowder.com/mugclub
  continue reading
 
Retirement and income planning in a fast paced format. Kevin has focused on helping investors age 50+ preserve and grow their assets, increase their income, and reduce overall income and estate taxes. Many conservative investors have used his advice to invest their savings prudently and transfer more wealth to their heirs efficiently. Visit silverleaffinancial.com for more information.
  continue reading
 
Artwork

1
Bond Investment Mentor

Chris Nelson, CFA

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Are you searching for an objective source to help you understand how to manage fixed income investments for your financial institution? Each week, join Chris Nelson, a 30-year banking and investment veteran, as he covers fixed income securities and investment portfolio management, and discusses the latest news and developments in the financial markets.
  continue reading
 
Welcome to the Biotech Bytes podcast, where we sit down with Biotech and Pharma IT leaders to learn what's working in our industry. Steven Swan is the CEO of The Swan Group LLC. He has 20 years of experience working with companies and individuals to make long-term matches. Focusing on Information technology within the Biotech and Pharmaceutical industries has allowed The Swan Group to become a valued partner to many companies. Staying in constant contact with the marketplace and its trends a ...
  continue reading
 
Artwork

1
Nature Podcast

Springer Nature Limited

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Nature Podcast brings you the best stories from the world of science each week. We cover everything from astronomy to zoology, highlighting the most exciting research from each issue of the Nature journal. We meet the scientists behind the results and provide in-depth analysis from Nature's journalists and editors. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Talent Hub Talk

Ben Duncombe: Salesforce, Sales Force, CRM, Data

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Talent Hub Talk is a podcast dedicated to giving you your Salesforce fix, featuring insights and real-life stories from Trailblazers, community leaders and those in the ecosystem with a valuable perspective to share. Talent Hub Talk is a podcast brought to you by Ben Duncombe, Founder of Talent Hub, the Salesforce Recruitment Experts.
  continue reading
 
Artwork

1
The Retirement and IRA Show

Jim Saulnier, CFP® & Chris Stein, CFP®

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
What do you get when you combine two knowledgeable CFP® PROFESSIONALS (one also a well-informed COLLEGE FINANCE INSTRUCTOR)? If you mix in relevant financial information and a healthy dose of humor you get the Retirement and IRA Radio Show! JIM SAULNIER, a CERTIFIED FINANCIAL PLANNER™ Professional with Jim Saulnier and Associates who specializes in retirement planning for clients across the country, CHRIS STEIN, a Finance Instructor at Colorado State University who is also a CERTIFIED FINANC ...
  continue reading
 
Loading …
show series
 
Cisco, Atlassian fix high-severity vulnerabilities Alleged Ryuk ransomware gang member arrested and extradited Telecom company Viasat attacked by Salt Typhoon Huge thanks to our sponsor, Adaptive Security — OpenAI’s first cybersecurity investment As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing si…
  continue reading
 
Public-interest journalism speaks truth to power, so protecting press freedom is part of protecting democracy. But what does it take to digitally secure journalists’ work in an environment where critics, hackers, oppressive regimes, and others seem to have the free press in their crosshairs? That’s what Harlo Holmes focuses on as Freedom of the Pre…
  continue reading
 
Are you stuck on the anxious‑avoidant relationship rollercoaster? Feeling like every conversation ends in confusion, distance, or chasing? In this episode of the Anxious to Secure podcast, you'll learn how to fix an Anxious‑Avoidant Relationship in 15 Steps. I’m breaking down a powerful 15‑step pyramid framework from the five BIGGEST mistakes that …
  continue reading
 
Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://is…
  continue reading
 
A bizarre case of political impersonation, where Trump’s top aide Susie Wiles is cloned (digitally, not biologically — we think), and high-ranking Republicans start getting invitations to link up with "her" on Telegram to share their Trump pardon wishlists. Was it a deepfake? Or just someone with a halfway decent impression and access to a shady da…
  continue reading
 
SANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerability Details Released Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outloo…
  continue reading
 
Why would a security vulnerability take more than two years to fix? Richard chats with Steve Syfuhs about the evolution of the response to KB5015754. Originally published in 2022, the issue involved vulnerabilities in the on-premises certificate authority for Active Directory. Pushing a fix to force the immediate replacement of the certificates cou…
  continue reading
 
Jeffrey Wheatman sits down with Cary Johnson, founder of Phishbusters Audit and Consulting, to expose the failures of traditional phishing simulations. They discuss why standard metrics fall short, how self-assessment distorts results, and what it really takes to track — and influence — behavioral change in security awareness programs.…
  continue reading
 
Kevin Brucher discusses the importance of mindset in making better financial decisions. He emphasizes how stress can negatively impact financial choices and suggests strategies for managing stress. The conversation also covers the significance of long-term thinking in financial planning and the current concerns regarding national debt and its impli…
  continue reading
 
Will he? Won’t he? President Donald Trump has given little indication as to whether America will join in the conflict between Israel and Iran. So where does this leave the UK and its assets in the region? How does the prime minister play his hand with the president, and what does that mean for his relationship with his own party, especially given L…
  continue reading
 
How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, N…
  continue reading
 
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.s…
  continue reading
 
The world’s smartest man weighs in on God, Jesus and the universe. Eric Swalwell shared an anti-Trump ad that’s even worse them him eating a taco in front of a mirror with a pride flag border. In celebration of Juneteenth, we take a look at laws that have been revoked because of “something something racism,” and we find out how this has made everyo…
  continue reading
 
The new cybersecurity pioneers aren’t chasing alerts, they’re building with AI. But what happens when tools meant to assist begin making decisions for us? And what skills do we lose when machines fill the gaps we used to grow into? In this episode, Chris Cochran, CEO and Founder of Commandant, returns to Hacker Valley Studio with an insider view on…
  continue reading
 
We put together an open conversation between our podcast hosts, CyberWire Daily's Dave Bittner, T-Minus Space Daily’s Maria Varmazis, and CISO Perspectives podcast’s Kim Jones. Their conversation goes deeper than just the historical significance of Juneteenth, diving into candid conversations on allyship, representation, and the enduring value of d…
  continue reading
 
Over 5 million impacted by Episource breach Predatory Sparrow strikes Iran again Data leak at Swiss banks Huge thanks to our sponsor, Adaptive Security — OpenAI’s first cybersecurity investment As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing simulations featuring realistic personalized deepfakes …
  continue reading
 
Here are Dopamine Menu Ideas That ACTUALLY Work For Anxious Attachment ✨💛 Your dopamine menu is EVERYTHING if you have an anxious attachment style Why? Because it helps you stop chasing those quick emotional hits from your partner. You’ll stop needing constant texting, reassurance, or obsessing over every little thing 💭📱 Even that urge to stalk you…
  continue reading
 
How IT is Transforming Biotech with AI | Anthony Murabito on Data, Security & Innovation #biotech #informationtechnology #aiinbiotech Can IT really revolutionize a biotech company’s success in the AI era? In this episode, I talk with Anthony Murabito, VP of IT and Head of Data Security at Wave Life Sciences, to uncover how modern biotech companies …
  continue reading
 
A GCHQ intern forgets the golden rule of spy school — don’t take the secrets home with you — and finds himself swapping Cheltenham for a cell. Meanwhile, an Australian hacker flies too close to the sun, hacks his way into a US indictment, and somehow walks free... only to get booted back Down Under. Plus: flow states, Bob Mortimer, and the joys of …
  continue reading
 
Viasat confirms it was breached by Salt Typhoon. Microsoft’s June 2025 security update giveth, and Microsoft’s June 2025 security update taketh away. Local privilege escalation flaws grant root access on major Linux distributions. BeyondTrust patches a critical remote code execution flaw. SMS low cost routing exposes users to serious risks. Erie In…
  continue reading
 
It’s still Pride Month. While it’s been overshadowed by No Kings, political assassinations, and Leftist riots, let’s check in on how the gays are doing. Tucker Carlson thinks he dunked on Senator Ted Cruz. Except the only people who think he did aren’t the kind of people you want agreeing with you. Jon Steward tries to formulate an argument about R…
  continue reading
 
We’d like to learn more about our listeners, please help us out by filling in this short survey. In this episode: 00:45 The tiny moths that use the stars to navigate Bogong moths use the stars to help them navigate during their enormous migration across Australia, according to new research. Every year, billions of these nocturnal moths travel up to…
  continue reading
 
Hackers exploit critical Langflow flaw to unleash Flodrix botnet Organizations warned of vulnerability exploited against discontinued TP-Link routers Russia detects first SuperCard malware attacks skimming bank data via NFC Huge thanks to our sponsor, Adaptive Security — OpenAI’s first cybersecurity investment As deepfake scams and GenAI phishing e…
  continue reading
 
Chris’s Summary: Jim and I continue our focus for Annuity Awareness Month by explaining how fixed indexed annuities work and the regulatory nuances that distinguish them from other fixed products. We walk through their structure, common misconceptions, when they can be appropriate, and how to compare them to MYGAs and buffered ETFs. We also highlig…
  continue reading
 
We're taking some time to highlight our best Gymsplain Episodes, and next is our series busting some financial myths! With so much personal finance advice out there, it’s hard to know what to listen to. In this episode, Catriona and Kylie delve into common misconceptions surrounding taxes, self-employment, credit card points, and more, offering val…
  continue reading
 
Here comes SQL Server 2025! While at Build, Richard chatted with Bob Ward about releasing a preview version of SQL Server 2025. Bob discusses SQL Server 2025 as an AI-ready enterprise database with numerous capabilities specifically tailored to your organization's AI needs, including a new vector data type. This includes making REST API calls to Az…
  continue reading
 
A House oversight committee requests DOGE documents from Microsoft. Predatory Sparrow claims a cyberattack on an Iranian bank. Microsoft says data that happens in Europe will stay in Europe. A complex malware campaign is using heavily obfuscated Visual Basic files to deploy RATs. A widely used CMS platform suffers potential RCE bugs. North Korea’s …
  continue reading
 
The recent dismissal of the Judge Advocates General of the Army and Air Force has raised new questions about the role of independent legal advice in the U.S. military. This week, we’re airing a special rebroadcast of our May 28th live program on the role of Judge Advocates General in advising military leadership and upholding the law of armed confl…
  continue reading
 
The Left once again advocates for a slave labor class in America. It didn’t work in the 1800’s. Not sure it’s going to work now. Today, we have him: the man, the myth, the legend. Border czar Tom Homan joins us for an update on ICE, the border, and deportations.Finally, President Donald Trump is losing his coalition over Iran. Or, not. Let’s take a…
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
Beware the SMS 2FA middleman Police seize Archetyp Market Zoomcar hack impacts 8.4 million users Huge thanks to our sponsor, Adaptive Security As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing simulations featuring realistic personalized deepfakes and engaging security awareness training. Their new…
  continue reading
 
Conflict broke out between Israel and Iran on Friday, with Israel launching an attack on Iran’s nuclear and military facilities and Iran responding in turn. Vali Nasr, a Middle East expert and professor at Johns Hopkins University, sits down with Ravi Agrawal to discuss. Nasr is the author, most recently, of Iran’s Grand Strategy: A Political Histo…
  continue reading
 
Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider build for Windows 11, Microsoft is testing an export feature for data stored by Recall. The feature is limited to European …
  continue reading
 
SANS Stormcast Monday, June 16th, 2025: Extracing Data from JPEG; Windows Recall Export; Anubis Wiper; Mitel Vuln and PoC Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider b…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play