Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Daily analysis of the biggest global security developments, brought to you by military specialists and The Times' renowned foreign correspondents. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
WAR ROOM: Pandemic is the first and most comprehensive program to bring the most up to the minute information on the news of the day. Stephen K. Bannon brings medical experts, politicians, business leaders, and those on the front lines for a comprehensive look at the latest news from all and provide their insider insights.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
We Cover the Cyberspace.
…
continue reading
Podcast by Alex Wood & Robb Reck
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
The Financial Times takes you into the corridors of power to unwrap, analyse and debate British politics with a regular lineup of FT correspondents and informed commentators. New episodes available every Friday. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Across the world, from Europe to Asia, the Americas to the Middle East, tensions are rising between nation states. Traditional alliances and alignments are constantly evolving in the 21st century. An understanding of defence and security policy and the tides of political, social and economic changes is crucial for any informed understanding of our world. 2024 sees war in Europe and Israel, and elections in major economies, including the US, the UK, Taiwan, South Africa, and many others. Insu ...
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Journalists Carole Cadwalladr and Peter Jukes – with the help of Conservative party whistleblower Sergei Cristo – expose an alleged secret spy ring operating at the very heart of the British political system. This is the untold story of the most audacious Russian influence operation in British history. It involves honey traps, Russian agents and information warfare. Russian wealth and glamour collide with a wild west of new digital landscapes. And as Sergei tries and fails to raise the alarm ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
"Humanizing cybersecurity with candid tales from cyberspace and beyond!" Voices of the Vigilant builds and shares knowledge by engaging with diverse voices and perspectives within the cybersecurity industry.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
Everything seems to be accelerating: geopolitics, technology, security threats, the dispersal of information. At times, it feels like a blur. But beneath the dizzying proliferation of events, discoveries, there are deeper trends that can be grasped and understood through conversation and debate. That’s the idea behind Stop the World, the Australian Strategic Policy Institute’s podcast on international affairs and security. Each week, we cast a freeze-frame around the blur of events and bring ...
…
continue reading
Your dose of tips about all things Information Security, ICT Legislation and Risk. South African podcast.
…
continue reading

1
The Medcurity Podcast: HIPAA Compliance | Security | Technology | Healthcare
Medcurity: HIPAA Compliance
Healthcare is complicated. Joe Gellatly and Amanda Hepper are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more.
…
continue reading
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
…
continue reading
The DSR Daily is a daily news podcast cover the foreign policy and national security news. Each weekday morning, Riley Fessler, Minnah Stein, and David Rothkopf will bring you the latest as covered by the best media outlets from around the world. See acast.com/privacy for privacy and opt-out information.
…
continue reading

1
The CVE Saga - Talkin’ Bout [infosec] News 2025-04-21
58:29
58:29
Play later
Play later
Lists
Like
Liked
58:29Register for upcoming webcasts & summits - https://poweredbybhis.com 00:00 - PreShow Banter™ — A Monocle and a Glass of Wine 05:36 - The CVE Saga - Talkin’ Bout [infosec] News 2025-04-21 06:43 - Story # 1: US agency extends support for cyber vulnerability database 29:08 - Story # 1b: CVE Foundation 32:35 - Story # 2: Former cybersecurity agency chi…
…
continue reading

1
Unsecurity Episode 237: HERoic Hacks Recap w/ Melissa Kjendle
32:36
32:36
Play later
Play later
Lists
Like
Liked
32:36In this episode of the Unsecurity Podcast, hosts Brad Nigh and Megan Larkins are joined by Melissa Kjendle, Assessor Manager at FRSecure, to recap our recent HERoic Hacks event. Melissa spoke at the event, highlighting the significance of inclusive and diverse perspectives in cybersecurity—particularly focusing on the growing role of women in the f…
…
continue reading

1
Frontline special - Professor Mark Galeotti
37:41
37:41
Play later
Play later
Lists
Like
Liked
37:41In this extended Frontline conversation writer and Russia analyst, Mark Galeotti, discusses the latest developments in the war in Ukraine. The World in 10 is the Times' daily podcast dedicated to global security. Expert analysis of war, diplomatic relations and cyber security from The Times' foreign correspondents and military specialists. Watch mo…
…
continue reading

1
Lawfare Archive: The Legislative Dog That Hasn’t Barked
48:01
48:01
Play later
Play later
Lists
Like
Liked
48:01From April 11, 2022: The period after Watergate and President Nixon's resignation saw an unprecedented barrage of congressional efforts at reforming the executive branch. The period after Donald Trump's departure from office has seen no comparable spree of legislative action—at least not yet. In a recent Lawfare article, Quinta Jurecic and Andrew K…
…
continue reading
Episode 4443: Special Coverage: The Funeral Of Pope Francis Cont.By WarRoom.org
…
continue reading
Episode 4442: Special Coverage: The Funeral Of Pope FrancisBy WarRoom.org
…
continue reading

1
Frontline special - Former British Army Officer Hamish De Bretton-Gordon (EXTENDED)
32:15
32:15
Play later
Play later
Lists
Like
Liked
32:15In this extended Frontline conversation, Former British Army Officer Hamish de Bretton-Gordon discusses the latest developments in the war in Ukraine. The World in 10 is the Times' daily podcast dedicated to global security. Expert analysis of war, diplomatic relations and cyber security from The Times' foreign correspondents and military specialis…
…
continue reading

1
Hackers Breach Morocco's Social Security Database in an Unprecedented Cyberattack...Ep.21
10:12
10:12
Play later
Play later
Lists
Like
Liked
10:12- Cybersecurity in South Africa: How The Cell C and SABS Attacks Could Have Been Prevented. - Hackers Breach Morocco’s Social Security Database in an Unprecedented Cyberattack. - Kaspersky Flags Surge in Cyber Threats Across Africa in The GITEX Africa April 2025 Conference. - Google Says "Fibre Optic Should Be Considered 'Critical Infrastructure' i…
…
continue reading

1
World-leaders in Cryptography: Jonathan Katz
1:01:14
1:01:14
Play later
Play later
Lists
Like
Liked
1:01:14Jonathan was a professor in the Department of Computer Science at the University of Maryland. He is now a Senior Staff Research Scientist at Google, with a core focus on cryptography and cybersecurity. Jonathan received his BS degree in mathematics and chemistry from MIT in 1996, and, in 2002, completed a PhD in computer science from Columbia Unive…
…
continue reading

1
Lawfare Archive: The Spymasters with Chris Whipple
52:02
52:02
Play later
Play later
Lists
Like
Liked
52:02From September 16, 2020: What is the proper relationship between the CIA director and the president? How should directors handle arguably illegal orders? How important is the director's role as the nation's honest broker of information during times of crisis? To get at these questions, David Priess sat down with Chris Whipple, a documentary filmmak…
…
continue reading
Episode 4441: CCP Infiltration In America; Truth Behind The Deportation NumbersBy WarRoom.org
…
continue reading
WarRoom Battleground EP 755: The Lords Of Easy Money Three Years LaterBy WarRoom.org
…
continue reading

1
Week in Review: Secure by Design departure, Microsoft’s security report, LLMs outrace vulnerabilities
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bethany De Lude, CISO emeritus, The Carlyle Group Thanks to our show sponsor, Dropzone AI Alert investigation is eating up your security team’s day—30 to 40 minutes per alert adds up fast. Dropzone AI‘s SOC Analyst transforms this rea…
…
continue reading

1
7MS #672: Tales of Pentest Pwnage – Part 70
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07Today’s a fun tale of pentest pwnage where we leveraged a WinRM service ticket in combination with the shadow credentials attack, then connected to an important system using evil-winrm and make our getaway with some privileged Kerberos TGTs! I also share an (intentionally) vague story about a personal struggle I could use your thoughts/prayers/vibe…
…
continue reading

1
Lazarus Strikes Again: Inside Operation SyncHole and the 1-Day Exploitation Crisis
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49In this episode, we break down the most urgent cybersecurity developments from late April 2025—including the Lazarus Group’s high-profile “Operation SyncHole” targeting South Korean industries. Discover how attackers are exploiting newly disclosed vulnerabilities faster than ever, with nearly 1 in 3 CVEs weaponized within 24 hours of publication. W…
…
continue reading

1
Thomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware security
1:33:42
1:33:42
Play later
Play later
Lists
Like
Liked
1:33:42Three Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism. We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national s…
…
continue reading
Episode 4440: Empty Vatican; Meetings And Death In MoscowBy WarRoom.org
…
continue reading
Episode 4439: Trump Time Magazine Deal With It; Stopping The Hurricane Of SpenindigBy WarRoom.org
…
continue reading

1
OAuth Phishing and Microsoft 365: The Hidden Threats SMBs Can't Ignore
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54In this episode, we dissect the real-world challenges of securing Microsoft 365 environments—especially for small and medium-sized businesses—amid rising threats and licensing limitations. From Reddit frustrations to official Microsoft documentation, we explore the harsh truth: many essential security features, like alerting on suspicious logins, r…
…
continue reading

1
Witkoff lands in Moscow - a bomb goes off
10:26
10:26
Play later
Play later
Lists
Like
Liked
10:26As Donald Trump’s envoy Steve Witkoff arrives in Moscow for talks to end the war in Ukraine, a car bomb has killed a high-ranking Russian general, Yaroslav Moskalik. After a string of similar bombings during the course of the war, defence analyst Nick Drummond examines how it was possible, and whether this is a shift to a new guerrilla campaign by …
…
continue reading

1
Part 2: Solving the Top 10 Problems with Vulnerability Management
38:32
38:32
Play later
Play later
Lists
Like
Liked
38:32Once again, we're back with all the answers. Traditional vulnerability management comes with many pitfalls, and we're counting down the solutions to all the problems you might be running into. Ivanti's Chris Goettl and Robert Waters break down the back five on our list: a periodic approach to remediation, poor prioritization, lack of business conte…
…
continue reading

1
April 25: More Court Setbacks for Trump Admin
14:27
14:27
Play later
Play later
Lists
Like
Liked
14:27On the DSR Daily for Friday, we break down the mounting number of court setbacks for the administration, an investigation into ActBlue, Trump’s statement that “Crimea will stay with Russia,” and more. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The DSR Network
…
continue reading

1
Innovators in Cryptography and Blockchain: Maciej Zurawski
1:13:38
1:13:38
Play later
Play later
Lists
Like
Liked
1:13:38Maciej Zurawski is technology entrepreneur and blockchain specialist with over 25 years of experience in commercial software development, R&D and business leadership. He is currently the CEO at Redeem Technologies, and serves as the Executive Director of Blockchain Scotland - the principal industry association advancing commercial blockchain adopti…
…
continue reading

1
Reform on the march? Our local elections guide
39:51
39:51
Play later
Play later
Lists
Like
Liked
39:51Ahead of England’s local elections next week, the Political Fix team pick the races to watch and what’s at stake for the main parties, as voters head to the polls to elect 1,600-odd councillors, six mayors and one new MP. Host Lucy Fisher is joined by podcast regulars Miranda Green and Anna Gross, plus the FT’s Northern correspondent Jennifer Willi…
…
continue reading

1
Why Outlook Is Eating Your CPU — And What Microsoft Says About It
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17Microsoft has acknowledged a serious issue affecting users of classic Outlook for Windows: CPU usage spikes up to 50% just from typing emails. First appearing in builds released since November 2024, this bug is now hitting users across several update channels—including Current, Monthly Enterprise, and Insider—leading to power drain, sluggish perfor…
…
continue reading

1
Priviso Live Episode 32 The Cellphone Debate
11:27
11:27
Play later
Play later
Lists
Like
Liked
11:27Are you an Apple or Android fan? And which should you be, if you are concerned about security? Lyn and Stephen discuss. #Priviso #PrivisoLive #Security #InformationSecurity #iOS #AndroidBy Anthony Olivier
…
continue reading

1
Lawfare Daily: Cybersecurity Challenges and Opportunities
32:03
32:03
Play later
Play later
Lists
Like
Liked
32:03For today's episode, Lawfare Foreign Policy Editor Daniel Byman interviewed Michael Sulmeyer, who was the top Defense official for all aspects of cyber policy in the Biden administration. Sulmeyer discusses the cyber threat landscape, different roles and missions, how Artificial Intelligence might be leveraged, and the key role of allies in cyberde…
…
continue reading

1
Russian army map malware, edge tech attack report, Commvault flaw
8:12
8:12
Play later
Play later
Lists
Like
Liked
8:12Russian army targeted by Android malware hidden in mapping app Attackers hit security device defects hard in 2024 Critical Commvault Command Center flaw warning Huge thanks to our sponsor, Dropzone AI Alert investigation is eating up your security team's day—30 to 40 minutes per alert adds up fast. Dropzone AI's SOC Analyst transforms this reality …
…
continue reading

1
Priviso Live Episode 32: The Cellphone Debate
10:22
10:22
Play later
Play later
Lists
Like
Liked
10:22Are you Apple or Android? And which should you be, if you are concerned about security? Lyn and Stephen discuss. #Priviso #PrivisoLive #Security #InformationSecurity #iOS #AndroidBy Anthony Olivier
…
continue reading
Donald Trump's defence secretary Pete Hegseth shared classified information on an unsecured group chat - not once but twice, according to new details that emerged this week. But the real turbulence shaking the Pentagon isn’t just about loose digital lips. It’s deeper: a toxic mix of internal rivalries, leadership clashes, and a crumbling sense of m…
…
continue reading
WarRoom Battleground EP 754: MAGA’s Clash With The Establishment, America Thru The DecadesBy WarRoom.org
…
continue reading
Episode 4438: Jihad Takes Over TexasBy WarRoom.org
…
continue reading

1
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues; (#)
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues; Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Tel…
…
continue reading

1
Hacking Crosswalks and Attacking Boilers - PSW #871
2:04:15
2:04:15
Play later
Play later
Lists
Like
Liked
2:04:15The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
…
continue reading

1
Trojan Map App: Spyware Targets Russian Soldiers via Alpine Quest
9:14
9:14
Play later
Play later
Lists
Like
Liked
9:14A newly discovered Android spyware campaign is targeting Russian military personnel by weaponizing a popular mapping app. Disguised as a cracked version of Alpine Quest Pro, this trojanized app delivers Android.Spy.1292.origin—a powerful surveillance tool that steals data, tracks location in real-time, and downloads secondary payloads to extract co…
…
continue reading
Episode 4437: Illegal's Do Not Have Same Due Process As Citizens; Sex Ed Summer CampsBy WarRoom.org
…
continue reading
Episode 4436: The Casino Market; Stopping The Illegal Smuggling Taking Place In The USBy WarRoom.org
…
continue reading

1
Blue Shield Breach: 4.7 Million Health Records Leaked via Google Analytics
8:47
8:47
Play later
Play later
Lists
Like
Liked
8:47Blue Shield of California has confirmed a data breach affecting 4.7 million members—caused not by hackers, but by a misconfigured Google Analytics setup. Sensitive health information was inadvertently exposed to Google’s ad platforms between April 2021 and January 2024. In this episode, we break down what went wrong, what data was leaked, and what …
…
continue reading

1
Fear, loathing and lie detectors - Hegseth's Pentagon descends into "chaos"
10:33
10:33
Play later
Play later
Lists
Like
Liked
10:33The sacking of key officials and departure of others has left US Secretary of Defense, Pete Hegseth without key advisors in the Pentagon. At a time when a culture of leaks appears to have developed the department, The Times' former Pentagon correspondent, Michael Evans, digs into whether Hegseth is the real problem and whether the damage being done…
…
continue reading

1
April 24: Russia Ramps Up Attacks on Ukraine
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12On the DSR Daily for Thursday, we cover Russia’s attack on Kyiv, mounting tensions between India and Pakistan, Trump’s attempt to change college accreditation, and more. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The DSR Network
…
continue reading

1
$16.6 Billion Lost: The True Cost of Cybercrime in America
8:48
8:48
Play later
Play later
Lists
Like
Liked
8:48Cybercrime in the U.S. has reached new, record-breaking heights. In this episode, we dive deep into the FBI's 2024 Internet Crime Complaint Center (IC3) report — a comprehensive look at the economic and human toll of cybercrime in America. With $16.6 billion in reported losses, a 33% increase year-over-year, and 859,532 complaints filed, the data p…
…
continue reading

1
Don’t Chase Titles — Build These 3 Things Instead (CISO Advice) with Nathan Wright
40:37
40:37
Play later
Play later
Lists
Like
Liked
40:37🎙️ The Professional CISO Show – Episode 61 Guest: Nathan Wright, CISO at Textron Host: David Malicoat 🎧 Episode Summary: In this episode of The Professional CISO Show, host David Malicoat sits down with Nathan Wright, CISO at Textron, to explore one of the most unconventional — and inspiring — journeys to cybersecurity leadership. From Russian ling…
…
continue reading

1
Lawfare Daily: Ideological Exclusions and Deportations with Julia Rose Kraut
52:40
52:40
Play later
Play later
Lists
Like
Liked
52:40On today’s episode, Julia Rose Kraut, author of the book “Threat of Dissent: A History of Ideological Exclusion and Deportation in the United States,” joins Lawfare Managing Editor Tyler McBrien to talk about that book, originally published in 2020, and how it can help us make sense of the Trump administration’s recent immigration and deportation p…
…
continue reading

1
Blue Shield of California shared private data,FBI IC3 report, Ex-Army sergeant jailed
9:43
9:43
Play later
Play later
Lists
Like
Liked
9:43Blue Shield of California shared private health data of millions with Google The FBI issues its 2024 IC3 report Ex-Army sergeant jailed for selling military secrets Huge thanks to our sponsor, Dropzone AI Security analysts need practical experience to build investigation skills, but getting expert guidance for every alert is impossible. That's why …
…
continue reading

1
Big tech, big trouble, and a dash of DORA.
49:06
49:06
Play later
Play later
Lists
Like
Liked
49:06This week we are joined by Avani Desai, CEO of Schellman, who is talking about what we can expect now that Digital Operational Resilience Act (DORA) is in effect. Ben’s got the story of how a federal judge ruled that Google broke antitrust laws to maintain its dominance in online advertising, marking the second major legal blow in a year that could…
…
continue reading

1
Get Arrested with a Clearance? Here's What You Need to Know
12:57
12:57
Play later
Play later
Lists
Like
Liked
12:57Security clearance holders - they're just like us! Working in national security holds individuals to a higher standard, but it doesn't mean their perfect. Legal run ins cause clearance holders a lot of anxiety, but the only thing worse than getting caught on the familiar side of a pair of handcuffs is trying to hide that arrest or police incident f…
…
continue reading

1
2025 HIPAA Essentials in 5 Minutes | Medcurity Live 090
5:28
5:28
Play later
Play later
Lists
Like
Liked
5:28In five minutes, we break down what HIPAA really expects from your organization in 2025. From your Security Risk Analysis to employee training, access controls, audit logs, and business associate agreements—this is the real-world checklist regulators are looking for. We’ll explain each core requirement, how enforcement is evolving, and offer practi…
…
continue reading
Send us a text Sivan Tehila, CEO and founder of Onyxia Cyber, shares her journey from Israeli military CISO to innovative startup founder and cybersecurity educator, revealing how personal resilience shaped her multi-faceted career. • Started as a cybersecurity officer in the Israeli military for 10 years, serving as CISO of the Research and Analys…
…
continue reading