Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading

1
Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.
Craig Petronella
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
…
continue reading
Welcome to Uncanny Valley—an insider look at the people, power, and influence of Silicon Valley—where each week, WIRED’s writers and editors bring you original reporting and analysis about some of the biggest stories in tech. On Tuesdays, WIRED’s Zoë Schiffer has an urgent conversation about this week in the news. And on Thursdays, WIRED’s Global Editorial Director Katie Drummond is joined by Lauren Goode, Michael Calore, to break down a recent story or phenomena bubbling up in Silicon Valle ...
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
…
continue reading
Scramblex.com has released a free encryption service that will protect sensitive data from unauthorised access and the potential for identity or financial theft.
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
Oblivion VPN provides top-tier online privacy and security with fast speeds, reliable encryption, and global server access. Protect your data and enjoy unrestricted browsing. Visit Oblivion VPN (https://oblivionvpn.com/) to start today! Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
…
continue reading
We will be doing podcasts about data storage, backup & disaster recovery, and cloud storage solutions
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
…
continue reading
This is a podcast about innovation, game-changing, up-leveling and trailblazing business concepts and trends mostly technology focused. We discuss current events, news and provide interviews all centered on answering the crucial question, IS MY BRAND PROTECTED? Listening to this podcast is NOT to be construed as LEGAL ADVICE. Sometimes we do not discuss legal topics at all, sometimes we just chat about innovation but we are lawyers. We may help you realize that you really need to seek profes ...
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
The Agenda podcast explores the promises of crypto, blockchain and Web3, and how everyday people level up and improve their lives with these new technologies. It covers everything from new blockchain tech to Bitcoin mass adoption and cultural shifts in Web3. Every two weeks, Cointelegraph’s The Agenda podcast tackles a new topic by speaking with the innovators and experts building the Web3 the world actually needs. After all, crypto is for everyone, not just rocket scientists, venture capita ...
…
continue reading

1
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk
6:30
6:30
Play Later
Play Later
Lists
Like
Liked
6:30xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
…
continue reading

1
3282: Fighting Waste with AI and Community at Olio
27:02
27:02
Play Later
Play Later
Lists
Like
Liked
27:02What does it take to turn a moment of frustration into a global mission to tackle waste? At the AWS Summit in London, I sat down with Tessa Clarke, co-founder and CEO of Olio, to explore how a single idea born on a snowy Swiss street evolved into a powerful tech platform reshaping how communities think about consumption, sharing, and sustainability…
…
continue reading

1
3281: From Cambridge to Call of Duty: The Rise of Real Holography
20:58
20:58
Play Later
Play Later
Lists
Like
Liked
20:58Holography has long lived in the shadow of science fiction, but what happens when it’s finally real and ready for the consumer market? In this episode recorded at Tech Talks Daily, I sit down with Darran Milne, co-founder and CEO of VividQ to unpack what sets true holography apart from the gimmicks. With a background in quantum physics and years of…
…
continue reading

1
3280: Yobi and the Future of Ethical AI at Scale
32:28
32:28
Play Later
Play Later
Lists
Like
Liked
32:28What if companies could tap into powerful behavioral AI without compromising user privacy or crossing legal lines? In this episode of Tech Talks Daily, I sit down with Frank Portman, CTO of Yobi, to explore how his team is building foundation models grounded in real user behavior, backed by ethically sourced and consented data. Frank shares how Yob…
…
continue reading

1
SANS Stormcast Friday, May 16th: Increase in Sonicwall Scans; RVTools Compromised?; RountPress
6:26
6:26
Play Later
Play Later
Lists
Like
Liked
6:26Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
…
continue reading

1
3279: How Rewriting the Code is Empowering Women in Tech
44:05
44:05
Play Later
Play Later
Lists
Like
Liked
44:05When we talk about the future of technology, it is easy to focus on the tools, trends, and innovations that dominate headlines. But behind every breakthrough is a human story, and behind every system are individuals navigating an industry that has not always welcomed them equally. That is why I sat down with Sue Harnett, founder and CEO of Rewritin…
…
continue reading

1
Is Elon Musk Really Stepping Back from DOGE?
41:39
41:39
Play Later
Play Later
Lists
Like
Liked
41:39Elon Musk says he’s stepping back from his role with the so-called Department of Government Efficiency to turn his attention to his businesses—most urgently to Tesla, which has faced global sales slumps in recent months. Today on the show, we discuss how our understanding of DOGE has evolved over the past five months and what we think will happen w…
…
continue reading

1
SANS Stormcast Thursday, May 15th: Google Open Redirects; Adobe, Ivanti, and Samsung patches
6:16
6:16
Play Later
Play Later
Lists
Like
Liked
6:16Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
…
continue reading

1
3278: Zensar Technologies on the Real ROI of AI-Powered IT Services
31:30
31:30
Play Later
Play Later
Lists
Like
Liked
31:30When we talk about the future of IT services, the conversation often revolves around the potential of AI and automation. But what does that really mean when applied at scale, across legacy infrastructure, evolving customer expectations, and real-world operational challenges? In today’s episode, I sat down with Manish Tandon, CEO of Zensar Technolog…
…
continue reading

1
The Future of Medicine: How Robotic Surgery is Revolutionizing Healthcare with Dave Saunders
1:14:37
1:14:37
Play Later
Play Later
Lists
Like
Liked
1:14:37Send us a text Surgical robotics stands at the fascinating crossroads of cutting-edge technology and life-saving medical innovation. Dave Saunders, a seasoned technology leader with three decades of experience spanning from early internet protocols to modern surgical robotics, takes us deep into this revolutionary field. The stakes couldn't be high…
…
continue reading

1
SN 1025: Secure Conversation Records Retention - FBI Says to Toss Your Old Router
2:45:03
2:45:03
Play Later
Play Later
Lists
Like
Liked
2:45:03The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK'…
…
continue reading

1
SANS Stormcast Wednesday, May 14th: Microsoft Patch Tuesday; 0-Days patched for Ivanti Endpoint Manager and Fortinet Products
6:38
6:38
Play Later
Play Later
Lists
Like
Liked
6:38Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.san…
…
continue reading

1
3277: Hexaware Reimagines Customer Experience Through Agentic AI
29:44
29:44
Play Later
Play Later
Lists
Like
Liked
29:44What happens when automation grows and learns to think, reason, and adapt? That is precisely what I explored in today's episode with Bennet Kumar, Executive Vice President and Global Head of Business Process Services at Hexaware Technologies. As the enterprise world braces for rapid AI-driven change, Bennet joined me to unpack how agentic AI quietl…
…
continue reading

1
Network for Rent: The Criminal Market Built on Outdated Routers
9:37
9:37
Play Later
Play Later
Lists
Like
Liked
9:37Cybercriminals are exploiting outdated routers to build massive proxy networks that hide malware operations, fraud, and credential theft—right under the radar of enterprise defenses. In this episode, Sherri and Matt unpack the FBI’s May 2025 alert, the role of TheMoon malware, and how the Faceless proxy service industrializes anonymity for hire. Le…
…
continue reading

1
The Hottest Topic At This Year's Pornhub Awards? Censorship
20:20
20:20
Play Later
Play Later
Lists
Like
Liked
20:20Pornhub is currently not available in more than a third of US States, due to new age verification laws. And just last week, two Republican senators introduced a bill which could ban pornography across the country. The looming threat on the industry was not lost on some of the biggest names in the adult film industry at this year’s Pornhub Awards. I…
…
continue reading

1
SANS Stormcast Tuesday, May 12th: Apple Patches; Unipi Technologies Scans;
6:29
6:29
Play Later
Play Later
Lists
Like
Liked
6:29Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking d…
…
continue reading

1
3276: How AWS is Building the Infrastructure for AI at Scale
22:46
22:46
Play Later
Play Later
Lists
Like
Liked
22:46What happens when access to advanced AI models is no longer the real differentiator, and the true advantage lies in how businesses leverage their own data? At the AWS Summit in London, I sat down with Rahul Pathak, Vice President of Data and AI Go-to-Market at AWS, to unpack this question and explore how organisations are moving beyond experimentat…
…
continue reading

1
SANS Stormcast Monday, May 11th: Steganography Challenge; End-of-Life Routers; ASUS Driverhub; RV-Tools SEO Poisoning
6:39
6:39
Play Later
Play Later
Lists
Like
Liked
6:39Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/ FBI Warns of End-of-life routers The FBI is tracking larger…
…
continue reading

1
3275: Cloudflare Discusses AI, Quantum Risk, and Data Protection
29:19
29:19
Play Later
Play Later
Lists
Like
Liked
29:19In today’s episode of Tech Talks Daily, I sit down with Christian Reilly, Field CTO for EMEA at Cloudflare, the Connectivity Cloud company, to examine the latest findings from their cybersecurity research and what they reveal about how prepared different industries really are. While sectors like IT, gaming, and financial services have seen a higher…
…
continue reading

1
3274: Inside Abnormal AI's Approach to Threat Detection
26:49
26:49
Play Later
Play Later
Lists
Like
Liked
26:49In today's episode of Tech Talks Daily, I reconnect with Abnormal AI's CIO, Mike Britton, to explore one of the most pressing topics in the tech world—AI regulation and cybersecurity. Speaking from his base near Dallas, Mike brings a pragmatic perspective shaped by decades of experience at the intersection of enterprise technology and security. As …
…
continue reading

1
3273: AI, Ethics, and the Human Element in Leadership
26:52
26:52
Play Later
Play Later
Lists
Like
Liked
26:52As artificial intelligence continues to reshape how we work, lead, and interact, the need for emotionally intelligent and human-centered leadership has never been more urgent. In this episode of Tech Talks Daily, I sit down with Jen Croneberger, the Founder and Chief Inspiration Officer at The Human Leadership Institute, to explore how relational l…
…
continue reading

1
SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch
4:57
4:57
Play Later
Play Later
Lists
Like
Liked
4:57No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932 SAMSUNG magicINFO 9 Server Flaw Still exploitable The SAMSUNG magicINFO 9 Serv…
…
continue reading

1
3272: Inside Illumio's Global Ransomware Report - Building Real-World Cyber Resilience
23:11
23:11
Play Later
Play Later
Lists
Like
Liked
23:11How prepared is your business for a ransomware attack? Not just to prevent it, but to continue operating when it happens. In this episode, I sit down with Trevor Dearing, Director of Critical Infrastructure at Illumio, to discuss the latest findings from their global ransomware report and what they reveal about cyber resilience. Trevor shares insig…
…
continue reading

1
Trump, Cryptocurrency, and the Real Winners and Losers
39:51
39:51
Play Later
Play Later
Lists
Like
Liked
39:51In the days before his inauguration, President Trump announced his own cryptocurrency, TRUMP coin, a move that could stand to make the Trump family significantly wealthier. And now, Trump has offered investors something else– access to him, when he recently announced he’ll hold a private dinner with the largest investors in TRUMP coin. In this week…
…
continue reading

1
SANS Stormcast Thursday, May 8th: Modular Malware; Sysaid Vuln; Cisco Wireless Controller Patch; Unifi Protect Camera Patch
5:41
5:41
Play Later
Play Later
Lists
Like
Liked
5:41Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%22Modular%22%20Malware/31928 Sysaid XXE Vulnerabilities IT Service Management Software Sysaid patched a number of XXE vulner…
…
continue reading

1
3271: Inside Poolside’s Mission to Reinvent Enterprise Software Engineering
25:10
25:10
Play Later
Play Later
Lists
Like
Liked
25:10Amid the buzz of the AWS Summit in London, I sat down with Eiso Kant, the CTO and Co-Founder of Poolside, to explore how his team is reshaping the future of software development through AI. This conversation was recorded right on the show floor inside a surprisingly sleek podcast booth at the ExCel, where Eiso unpacked what sets Poolside apart in a…
…
continue reading

1
SANS Stormcast Wednesday, May 7th: Infostealer with Webserver; Android Update; CISA Warning
6:44
6:44
Play Later
Play Later
Lists
Like
Liked
6:44Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that, in addition to implementing typical infostealer functionality, includes a web server suitable to create local phishing sites. https://isc.sans.edu/diary/Python%20InfoStealer%20with%20Embedded%20Phishing%20Webserver/31924 Android Update Fixes Freetype 0…
…
continue reading

1
SN 1024: Don't Blame Signal - The Real Story Behind the TM SGNL Breach
2:46:22
2:46:22
Play Later
Play Later
Lists
Like
Liked
2:46:22Microsoft to officially abandon passwords and support their deletion. Meta's RayBan smart glasses weaken their privacy terms. 30% of Microsoft code is now being written by AI. Google says prying Chrome from it will damage its security. Nearly 1,000 six-year-old eCommerce backdoors spring to life. eM Client moves to version 10.3 A bunch of terrific …
…
continue reading

1
3270: AI, Health Data, and the Vision Behind Zoe's New App
43:12
43:12
Play Later
Play Later
Lists
Like
Liked
43:12What if the food you eat could not only affect how you feel today but also determine how many healthy years you’ll have in the future? In this episode of Tech Talks Daily, I sit down with Jonathan Wolf, the co-founder and CEO of Zoe, to explore how advanced science, AI, and data are reshaping our understanding of nutrition and health. Jonathan shar…
…
continue reading

1
Hacker AI: Smarter Attacks, Faster Exploits, Higher Stakes
19:29
19:29
Play Later
Play Later
Lists
Like
Liked
19:29AI isn’t just revolutionizing business—it’s reshaping the threat landscape. Cybercriminals are now weaponizing AI to launch faster, more convincing, and more scalable attacks. From deepfake video scams to LLM-guided exploit development, the new wave of AI-driven cybercrime is already here. In this engaging and eye-opening session, Sherri and Matt s…
…
continue reading

1
Why Is The Trump Administration Having So Much Trouble Keeping Their Comms Private?
17:15
17:15
Play Later
Play Later
Lists
Like
Liked
17:15When former national security advisor Mike Waltz had a picture taken of him last week, he didn’t expect for the whole world to see that he was using TeleMessage, a messaging app similar to Signal. Now the app has been hacked, with portions of data linked to government entities like Customs and Border Protection (CBP) and companies like Coinbase. To…
…
continue reading

1
SANS Stormcast Tuesday, May 6th: Mirai Exploiting Samsung magicInfo 9; Kali Signing Key Lost;
6:57
6:57
Play Later
Play Later
Lists
Like
Liked
6:57Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung s MagicInfo 9 CMS, was patched last August but attracted new attention last week after being mostly ignored so far. https://isc.sans.edu/diary/Mirai+No…
…
continue reading

1
3269: Meet Frich and the Tech Driving Gen Z’s Financial Confidence
38:20
38:20
Play Later
Play Later
Lists
Like
Liked
38:20How do you teach financial literacy to a generation that’s grown up swiping on social media, watching crypto rise and fall, and navigating economic uncertainty before they’ve even finished university? That’s the question Aleksandra Medina set out to answer when she co-founded Frich—a social finance app built with Gen Z in mind. In this episode, I s…
…
continue reading

1
SANS Stormcast Monday, May 5th: Steganography Challenge; Microsoft Makes Passkeys Default and Moves Away from Authenticator as Password Manager; Magento Components Backdoored.
5:57
5:57
Play Later
Play Later
Lists
Like
Liked
5:57Steganography Challenge Didier published a fun steganography challenge. A solution will be offered on Saturday. https://isc.sans.edu/diary/Steganography+Challenge/31910 Microsoft Makes Passkeys Default Authentication Method Microsoft is now encouraging new users to use Passkeys as the default and only login method, further moving away from password…
…
continue reading