RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
HPE news. Tech insights. World-class innovations. We take you straight to the source — interviewing tech's foremost thought leaders and change-makers that are propelling businesses and industries forward.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
Tech guru and veteran CNBC and Bloomberg journalist Eric Chemi takes on modern business and what it takes to break through from a journalist’s perspective. It’s all about being assertive (!!) in a way that wins friends and nurtures relationships – what we at Bospar have branded “Politely Pushy”. From CEOs, founders and investors, to IT experts, luminaries, and other interesting sorts, Eric delivers straight talk in a relaxed “let’s have coffee” conversation that’s interesting, fast-paced, an ...
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
The Doctor Chaos Security Podcast - Join us as we ramble on topics related to cyber security
…
continue reading
The ThreatReal Podcast covers Information Security news, events, and trends in cybersecurity with a technical focus. Join hosts Matt Scheurer and Micah K. Brown as they dig deep into the threats impacting enterprise environments and home networks. Discussion topics around threats include the actors, the hunting, the intelligence, the modeling, and more! Visit us online at https://threatreel.com
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading

1
Unmasking the Risks of Generative AI Deception
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39Generative AI is revolutionizing content creation, from news to entertainment. But as AI tools create increasingly realistic text, images, and video, the line between truth and fiction blurs. This podcast episode dives into the critical ethical and security challenges posed by deceptive generative AI. Tune in to explore the implications and potenti…
…
continue reading

1
Hugh Thompson on Building the RSA Conference [Afternoon Cyber Tea]
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34While our team is observing Memorial Day in the United States, please enjoy this episode from the N2K CyberWire network partner, Microsoft Security. You can hear new episodes of Ann Johnson's Afternoon Cyber Tea podcast every other Tuesday. Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann …
…
continue reading

1
Hugh Thompson on Building the RSA Conference
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from theme selection to llama-related surprises on the expo floor—and how the RSA community continues to evolve.…
…
continue reading

1
Mark Nunnikhoven: Providing clarity about security. [Cloud strategy]
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53Please enjoy this encore of Career Notes. Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, has gone from taking technology to its limits for his own understanding to providing clarity about security for others. Mark fell in love with his Commodore 128 and once he realized he could bend the machine to his will, it set him on the path to…
…
continue reading
This week, Dave is joined by Ziv Karliner, Pillar Security’s Co-Founder and CTO, sharing details on their work on "New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents." Vibe Coding - where developers use AI assistants like GitHub Copilot and Cursor to generate code almost instantly - has become central to how e…
…
continue reading
Cloudflare says yesterday’s widespread outage was not caused by a cyberattack. Predator mobile spyware remains highly active. Microsoft is investigating ongoing Microsoft 365 authentication services issues. An account takeover campaign targets Entra ID users by abusing a popular pen testing tool. Palo Alto Networks documents a JavaScript obfuscatio…
…
continue reading
Send us a text Jason Haddix, CEO of Arcanum Information Security, joins the MLSecOps Podcast to share his methods for assessing and defending AI systems. Full transcript, video, and links to episode resources available at https://mlsecops.com/podcast/holistic-ai-pentesting-playbook. Thanks for checking out the MLSecOps Podcast! Get involved with th…
…
continue reading
Interpol’s Operation Secure dismantles a major cybercrime network, and Singapore takes down scam centers. GitLab patches multiple vulnerabilities in its DevSecOps platform. Researchers unveil a covert method for exfiltrating data using smartwatches. EchoLeak allows for data exfiltration from Microsoft Copilot. Journalists are confirmed targets of P…
…
continue reading

1
How do you build the world's fastest supercomputer?
21:54
21:54
Play later
Play later
Lists
Like
Liked
21:54How do you make the world’s fastest supercomputer? This week, Technology Now dives into the world of supercomputers, and how El Capitan, the world’s largest supercomputer, was built. We will explore the software and hardware requirements as well as investigating the physical requirements needed to even be able to run a supercomputer on your premise…
…
continue reading

1
Ghost students “haunting” online colleges.
37:06
37:06
Play later
Play later
Lists
Like
Liked
37:06Patch Tuesday. Mozilla patches two critical FireFox security flaws. A critical flaw in Salesforce OmniStudio exposes sensitive customer data stored in plain text. The Badbox botnet continues to evolve. AI-powered “ghost students” enrolling in online college courses to steal government funds. Hackers steal nearly 300,000 vehicle crash reports from t…
…
continue reading
An unsecured Chroma database exposes personal information of Canva Creators. A researcher brute-forces Google phone numbers. Five zero-day vulnerabilities in Salesforce Industry Cloud are uncovered. Librarian Ghouls target Russian organizations with stealthy malware. SAP releases multiple security patches including a critical fix for a NetWeaver bu…
…
continue reading
Hayden Smith, Hunted Labs Co-Founder comes on Absolute AppSec to discuss, among other things, the Hunted Labs work discovering and publicizing the EasyJson software supply chain threat. Before co-founding Hunted Labs, Hayden was Senior Director of Field Services at Anchore, assisting US government, intelligence, and Fortune 500 clients. Long a spec…
…
continue reading

1
Using AI Agents to Solve Cloud Vulnerability Overload
38:09
38:09
Play later
Play later
Lists
Like
Liked
38:09In this episode, Ashish Rajan talks with Harry Wetherald, Co-Founder & CEO of Maze, about the reality of modern vulnerability management. They explore why current tools like CNAPPs can generate up to 90% false positives and how AI agents can provide a real solution by thinking like a security engineer to identify genuine, exploitable threats. Learn…
…
continue reading
A set of questions are being asked about whether the velocity of datacenter build outs is wavering. Analyst Dan Thompson returns to the podcast to explore the realities of the market with host Eric Hanselman. There are some facts that raised the questions, including Microsoft demurring on some datacenter projects, and they have fueled concerns that…
…
continue reading

1
White House reboots cybersecurity priorities.
36:12
36:12
Play later
Play later
Lists
Like
Liked
36:12A new White House executive Order overhauls U.S. cybersecurity policy. The EU updates its “cybersecurity blueprint”. The Pentagon’s inspector general investigates Defense Secretary Hegseth’s Signal messages. Chinese hackers target U.S. smartphones. A new Mirai botnet variant drops malware on vulnerable DVRs. 17 popular Gluestack packages on NPM hav…
…
continue reading

1
Ell Marquez: It's okay to be new. [Linux] [Career Notes]
9:52
9:52
Play later
Play later
Lists
Like
Liked
9:52Please enjoy this encore of Career Notes. Linux and Security Advocate at Intezer Ell Marquez shares her journey from the family ranch to security. Needing a life change due to a bunch of circumstances that had occurred that left her almost homeless, Ell found out about a six week Linux boot camp that took her down the path toward technology. She fe…
…
continue reading

1
A new stealer hiding behind AI hype. [Research Saturday]
25:08
25:08
Play later
Play later
Lists
Like
Liked
25:08This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users in…
…
continue reading
The DOJ files to seize over $7 million linked to illegal North Korean IT workers. The FBI warns of BADBOX 2.0 malware targeting IoT devices. Researchers uncover a major security flaw in Chrome extensions. ESET uncovers Iranian hackers targeting Kurdish and Iraqi government officials. Hitachi Energy, Acronis and Cisco patch critical vulnerabilities.…
…
continue reading

1
China’s largest data leak exposes billions.
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43Researchers discover what may be China’s largest ever data leak. CrowdStrike cooperates with federal authorities following last year’s major software bug. A researcher discovers over half a million sensitive insurance documents exposed online. Microsoft offers free cybersecurity programs to European governments. The FBI chronicles the Play ransomwa…
…
continue reading

1
How do you create quantum resistant encryption?
24:35
24:35
Play later
Play later
Lists
Like
Liked
24:35How do we prepare our cybersecurity for a post quantum world? This week, Technology Now explores how security experts are looking to future-proofing their work. We will examine the hurdles to post-quantum security, the underlying ways in which our data is protected, and we will be delving into the underground world of “harvest now, decrypt later”. …
…
continue reading

1
Appetite for tracking: A feast on private data.
37:00
37:00
Play later
Play later
Lists
Like
Liked
37:00Researchers uncover a major privacy violation involving tracking scripts from Meta and Yandex. A compliance automation firm discloses a data breach. PumaBot stalks vulnerable IoT devices. The Ramnit banking trojan gets repurposed for ICS intrusions. The North Face suffers a credential stuffing attack. Kaspersky says the Black Owl team is a cyber th…
…
continue reading
Google issues an emergency patch for a Chrome zero-day. A new malware campaign uses fake DocuSign CAPTCHA pages to trick users into installing a RAT. A high-severity Splunk vulnerability allows non-admin users to access and modify critical directories. Experts warn congress that Chinese infiltrations are preparations for war. Senators look to stren…
…
continue reading

1
Adapting to New Threats, Copilot Risks & The Future of Data (Feat. Matthew Radolec, Varonis)
39:31
39:31
Play later
Play later
Lists
Like
Liked
39:31AI is reshaping cybersecurity as we know it. From sophisticated AI-driven phishing attacks to the amplified risk of insider threats using tools like Copilot, the landscape is shifting at an unprecedented pace. How can security leaders and practitioners adapt? Join Ashish Rajan and Matthew Radolec (Varonis) as they explore the critical challenges an…
…
continue reading
Welcome to AI University! At Bospar, we understand that AI isn’t going anywhere. So instead of resisting, we are embracing AI and leveraging the power it holds to help us do our jobs better. Courtney Merolle and Kyle Ankney, our professors at AI University, join Eric Chemi to talk through how we thoughtfully leverage AI in our day-to-day operations…
…
continue reading
Yonatan Zunger, Corporate Vice President and Deputy Chief Information Security Officer for Artificial Intelligence at Microsoft joins Ann on this week's episode of Afternoon Cyber Tea. They dive into the evolving cybersecurity landscape shaped by generative and agentic AI, discussing both the opportunities and the risks. Yonatan shares insights on …
…
continue reading
In the rush to build out AI applications, a full understanding of the dynamics of personal data management can be difficult to achieve. As we kick off Pride Month, the complexities of personal data handling deserve more attention and Emily Jasper and Alan Moore join host Eric Hanselman to discuss the concerns and approaches to address privacy issue…
…
continue reading
An international law enforcement operation dismantles AVCheck. Trump’s 2026 budget looks to cut over one thousand positions from CISA. Cyber Command’s defensive wing gains sub-unified command status. A critical vBulletin vulnerability is actively exploited. Acreed takes over Russian markets as credential theft kingpin. Qualcomm patches three active…
…
continue reading

1
Brandon Karpf: A sailor of the 21st century. [Transitioning service member] [Career Notes]
11:27
11:27
Play later
Play later
Lists
Like
Liked
11:27Please enjoy this encore of Career Notes. Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, Brandon Karpf, knew he wanted to join the military at a young age. He achieved that through the US Naval Academy where he was a member of the men’s heavyweight rowing team. Commissioned as a cryptologic warfare officer, Brandon was sent to M…
…
continue reading

1
Triofox and the key to disaster. [Research Saturday]
22:26
22:26
Play later
Play later
Lists
Like
Liked
22:26This week, we are joined by John Hammond, Principal Security Researcher at Huntress, who is sharing his PoC and research on "CVE-2025-30406 - Critical Gladinet CentreStack & Triofox Vulnerability Exploited In The Wild." A critical 9.0 severity vulnerability (CVE-2025-30406) in Gladinet CentreStack and Triofox is being actively exploited in the wild…
…
continue reading
SentinelOne suffers a global service outage. A major DDoS attack hits a Russian internet provider. U.S. banking groups urge the SEC to scrap cybersecurity disclosure rules. Australia mandates reporting of ransomware payments. Researchers uncover a new Browser-in-the-Middle (BitM) attack targeting Safari users. A Florida health system pays over $800…
…
continue reading

1
When "out of the box" becomes "out of control."
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08Children’s DNA in criminal databases. ASUS routers get an unwanted houseguest. New APT41 malware uses Google Calendar for command-and-control. Interlock ransomware gang deploys new Trojan. Estonia issues arrest warrant for suspect in massive pharmacy breach. The enemy within the endpoint. New England hospitals disrupted by cyberattack. Tim Starks f…
…
continue reading
Where do you create an AI? This week, Technology Now explores the world of AI factories, dedicated spaces for building bespoke artificial intelligence software. We look into what these factories are, how they work, and we examine the importance of them going forward. Iveta Lohovska tells us more. This is Technology Now, a weekly show from Hewlett P…
…
continue reading
The Czech Republic accuses Chinese state-backed hackers of cyber-espionage. CISA’s leaders head for the exits. Cybercriminals are using fake AI video generator websites to spread malware. A stealthy phishing campaign delivers the Remcos RAT via DBatLoader. A fake Bitdefender website spreads malware targeting financial data. Medusa ransomware claims…
…
continue reading
“Laundry Bear” airs dirty cyber linen in the Netherlands. AI coding agents are tricked by malicious prompts in a Github MCP vulnerability.Tenable patches critical flaws in Network Monitor on Windows. MathWorks confirms ransomware behind MATLAB outage. Feds audit NVD over vulnerability backlog. FBI warns law firms of evolving Silent Ransom Group tac…
…
continue reading
Is Artificial Intelligence the ultimate security dragon, we need to slay, or a powerful ally we must train? Recorded LIVE at BSidesSF, this special episode dives headfirst into the most pressing debates around AI security. Join host Ashish Rajan as he navigates the complex landscape of AI threats and opportunities with two leading experts: Jackie B…
…
continue reading
Around the globe, municipalities are facing a set of challenges managing the impacts of more extreme weather, while addressing aging infrastructure and more chronic issues, such as rising heat and sea levels. There are a set of technologies that can help them to both be aware of the risks and improve planning to work on mitigating them. The Interne…
…
continue reading

1
Agentic AI to the Rescue? From Billable Hours to Bots: The New Legal Workflow | A Conversation with Frida Torkelsen and Maged Helmy | Redefining CyberSecurity with Sean Martin
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16⬥GUESTS⬥ Frida Torkelsen, PhD | AI Solution Architect at Newcode.ai | On LinkedIn: https://www.linkedin.com/in/frida-h-torkelsen/ Maged Helmy, PhD | Assoc. Professor - AI at University of South-Eastern Norway and Founder & CEO of Newcode.ai | On LinkedIn: https://www.linkedin.com/in/magedhelmy/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine a…
…
continue reading

1
AWS in Orbit: Automated Satellite Management. [T-Minus Space]
22:38
22:38
Play later
Play later
Lists
Like
Liked
22:38While our team is observing Memorial Day in the United States, please enjoy this episode from our team from T-Minus Space Daily recorded recently at Space Symposium. You can learn more about AWS in Orbit at space.n2k.com/aws. Our guests on this episode are Dax Garner, CTO at Cognitive Space and Ed Meletyan, AWS Sr Solutions Architect. Remember to l…
…
continue reading

1
Pattie Dillon: Take the leap. [Anti-fraud] [Career Notes]
9:06
9:06
Play later
Play later
Lists
Like
Liked
9:06Please enjoy this encore of Career Notes. Product Manager in Anti-Fraud Solutions at SpyCloud, Pattie Dillon shares her journey from raising her family to specializing in the anti-fraud space. Upon reentering the workforce, Pattie worked on identity verification and developed a system with privacy concerns in mind. She moved to work in gift cards a…
…
continue reading

1
Purple teaming in the modern enterprise. [CyberWire-X]
26:30
26:30
Play later
Play later
Lists
Like
Liked
26:30In large enterprise software companies, Red and Blue Teams collaborate through Purple Teaming to proactively detect, respond to, and mitigate advanced threats. In this episode of CyberWire-X, N2K's Dave Bittner is joined by Adobe’s Justin Tiplitsky, Director of Red Team and Ivan Koshkin, Senior Detection Engineer to discuss how their teams work tog…
…
continue reading

1
Pandas with a purpose. [Research Saturday]
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20This week, we are joined by Deepen Desai, Zscaler's Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda’s latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. They al…
…
continue reading
Operation Endgame dismantles cybercriminal infrastructure. DOGE’s use of the Grok AI chatbot raises ethical and privacy concerns. Malware on the npm registry uses malicious packages to quietly gather intelligence on developer environments. Researchers link Careto malware to the Spanish government. Exploring proactive operations via letters of marqu…
…
continue reading
A joint operation takes down Lumma infrastructure. The FTC finalizes a security settlement with GoDaddy. The Telemessage breach compromised far more U.S. officials than initially known. Twin hackers allegedly breach a major federal software provider from the inside. U.S. telecom providers fail to notify the Senate when law enforcement agencies requ…
…
continue reading
How can we prevent people misusing technology to harm others? This week, Technology Now investigates how technology can be used as a weapon against others. We ask how technology has been utilized by bad faith actors in this way and we examine whose responsibility it is to prevent this misuse of technology. Joanne O’Connor from HPE’s cybersecurity o…
…
continue reading