show episodes
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Hidden Forces

Demetri Kofinas

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Get the edge with Hidden Forces where media entrepreneur and financial analyst Demetri Kofinas gives you access to the people and ideas that matter, so you can build financial security and always stay ahead of the curve.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Piers Morgan Uncensored

Piers Morgan Uncensored

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Piers Morgan Uncensored is the global arena for fearless debate, bold opinions and major interviews. Follow the podcast for all-new and exclusive daily content. YouTube: @PiersMorganUncensored X: @PiersUncensored TikTok: @piersmorganuncensored Insta: @piersmorganuncensored
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Artwork
 
Tim Miller and guests discuss the latest political news for the flagship podcast of the Never Trump movement and the reality-based community. Every weekday we provide insightful analysis, political hot-takes, an unabashed defense of liberal democracy and long-form interviews that cut through the "both-sides" BS. Plus a few laughs to help you wash down the crazy. Bulwark+ members can get a totally ad-free version of the show delivered right to their favorite podcast player.
  continue reading
 
Artwork
 
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
  continue reading
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Artwork

1
Unsolicited Response

Dale Peterson: ICS Security Catalyst and S4 Conference Chair

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
  continue reading
 
Artwork

1
ASecuritySite Podcast

Professor Bill Buchanan OBE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
  continue reading
 
Artwork

1
SpyTalk

SpyTalk, Jeff Stein

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
  continue reading
 
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
Cloud Security Podcast

Cloud Security Podcast Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
  continue reading
 
Artwork
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Artwork
 
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Artwork

1
AM

ABC News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
AM is Australia's most informative morning current affairs program. With key political interviews and stories about the Australian way of life, AM sets the agenda for the nation’s daily news and current affairs coverage.
  continue reading
 
Artwork

1
WSJ Tech News Briefing

The Wall Street Journal

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Tech News Briefing is your guide to what people in tech are talking about. Every weekday, we’ll bring you breaking tech news and scoops from the pros at the Wall Street Journal, insight into new innovations and policy debates, tips from our personal tech team, and exclusive interviews with movers and shakers in the industry.
  continue reading
 
Artwork

1
Safe Nation

Nikki Renfroe

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Safe Nation is an inaugural podcast curated to share insight and discussion about law enforcement, security and crime prevention with a focus on current events and honest data. Offering a fresh perspective on safety through interviews, opinions and great practical advice, join your host, retired, female state trooper Captain Nikki Renfroe. Listen as she interviews industry professionals, sharing information on how to protect yourself from danger and crimes while also bringing attention to un ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork

1
Dirty South Security Podcast

VerSprite Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
  continue reading
 
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
  continue reading
 
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 18:00 UTC.
  continue reading
 
Artwork

1
Security Halt!

Deny Caballero

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to Security Halt! Podcast, the show dedicated to Veterans, Active Duty Service Members, and First Responders. Hosted by retired Green Beret Deny Caballero, this podcast dives deep into the stories of resilience, triumph, and the unique challenges faced by those who serve. Through powerful interviews and candid discussions, Security Halt! Podcast highlights vital resources, celebrates success stories, and offers actionable tools to navigate mental health, career transitions, and perso ...
  continue reading
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Loading …
show series
 
A whistle-blower claims DOGE uploaded a sensitive Social Security database to a vulnerable cloud server. Allies push back against North Korean IT scams. ZipLine is a sophisticated phishing campaign targeting U.S.-based manufacturing. Researchers uncover a residential proxy network operating across at least 20 U.S. states. Flock Safety license plate…
  continue reading
 
A year ago, China was globally isolated and its economy was struggling. But once Trump was back in office pursuing his own personal and political gain, the U.S. brand got tossed in the toilet and the view from Beijing got pretty sweet. Trump has allowed China to buy American microchips that could be used against our own national security interests,…
  continue reading
 
The conversation around cloud security is maturing beyond simple threat detection. As the industry grapples with alert fatigue, we explore the necessary shift from a reactive to a proactive security posture, questioning if a traditional SecOps model is sufficient for modern cloud environments. We spoke with Gil Geron, CEO of Orca Security, to exami…
  continue reading
 
Get Your Laetrile B-17 https://rncstore.com/rp78 Get 10% off with code RP78 What happens when you tell your boss they can’t fire you? CRISIS! Free Solar Panels W/ 3300W Generator: http://www.PrepareWithRedPill78.com Be Prepared - Click here Get your chlorine dioxide kits http://onenessdrops.com/redpill78 Use code REDPILL78 10% off Feel Focused, Ene…
  continue reading
 
Get Your Laetrile B-17 https://rncstore.com/rp78 Get 10% off with code RP78 Chicago deployment up next Free Solar Panels W/ 3300W Generator: http://www.PrepareWithRedPill78.com Be Prepared - Click here Get your chlorine dioxide kits http://onenessdrops.com/redpill78 Use code REDPILL78 10% off Feel Focused, Energetic and Rested Today, click the link…
  continue reading
 
In this episode of the Security Repo Podcast, Sean Juroviesky joins us to share their journey through cybersecurity, from finding community in BurbSec to giving talks at major conferences like DEF CON and BlueTeamCon. Sean dives deep into the realities of risk management, executive sign-off processes, and the critical importance of understanding bu…
  continue reading
 
Get Your Laetrile B-17 https://rncstore.com/rp78 Get 10% off with code RP78 NO ONE IS ABOVE THE LAW! Public corruption will NOT be tolerated! Free Solar Panels W/ 3300W Generator: http://www.PrepareWithRedPill78.com Be Prepared - Click here Get your chlorine dioxide kits http://onenessdrops.com/redpill78 Use code REDPILL78 10% off Feel Focused, Ene…
  continue reading
 
Get Your Laetrile B-17 https://rncstore.com/rp78 Get 10% off with code RP78 Cheaters never win in Trump’s America - POTUS COMES OUT ON TOP Free Solar Panels W/ 3300W Generator: http://www.PrepareWithRedPill78.com Be Prepared - Click here Get your chlorine dioxide kits http://onenessdrops.com/redpill78 Use code REDPILL78 10% off Feel Focused, Energe…
  continue reading
 
In this episode of the Security by Default podcast, host Joe Carson speaks with Secretary Harry Coker Jr. about his journey into cybersecurity, the importance of mentorship, and the challenges faced in leadership roles. They discuss the evolving role of AI in government and cybersecurity, the significance of resilience in the face of failures, and …
  continue reading
 
Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
  continue reading
 
Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
  continue reading
 
The Famine of 1932–1933 in Ukraine: An Anatomy of the Holodomor (CIUS Press, 2018) is a distillation of thirty years of study of the topic by one of Ukraine’s leading historians. In this account, Stanislav Kulchytsky ably incorporates a vast array of sources and literature that have become available in the past three decades into a highly readable …
  continue reading
 
Agnes Arnold-Forster's book The Cancer Problem: Malignancy in Nineteenth-Century Britain (Oxford UP, 2021) offers the first medical, cultural, and social history of cancer in nineteenth-century Britain. It begins by looking at a community of doctors and patients who lived and worked in the streets surrounding the Middlesex Hospital in London. It fo…
  continue reading
 
The vast majority of the world's countries are experiencing a demographic revolution: dramatic, sustained, and likely irreversible population aging. States' median ages are steadily increasing as the number of people ages 65 and older skyrockets. Analysts and policymakers frequently decry population aging's domestic costs, especially likely slowing…
  continue reading
 
The vast majority of the world's countries are experiencing a demographic revolution: dramatic, sustained, and likely irreversible population aging. States' median ages are steadily increasing as the number of people ages 65 and older skyrockets. Analysts and policymakers frequently decry population aging's domestic costs, especially likely slowing…
  continue reading
 
My guest today is Anders M. Greene-Crow. Anders teaches at the Woods College of Advancing Studies and is a former Professor of English at Boston College. More recently, Anders has been preparing for the New York state bar exam, while also co-hosting the podcast “Say Podcast and Die!,” about R.L. Stine’s book series, Goosebumps. Today, we are discus…
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Australia expels Iranian ambassador Hackers sabotage Iranian shipping satcoms APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK? Trail of Bits uses image-downscaling to sneak prompts into Google Gemini The Com’s King Bob ge…
  continue reading
 
We engage with Erica Lonergan and Jack Snyder, authors of "Cultural Change in Military Organizations: Hackers and Warriors in the US Army." The discussion delves into the fusion of cyber and traditional military cultures within the U.S. Army, focusing on the creation of the Cyber Corps and its implications for national security. The conversation hi…
  continue reading
 
A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting entry-level jobs hardest. Michigan’s Supreme Court upholds limits on ce…
  continue reading
 
Some rando far-right social media suck-up, who Trump rewarded with an appointment to his administration, is pushing mortgage fraud investigations of Adam Schiff, Tish James, and now Fed governor Lisa Cook. Trump claims he's fired Cook based on a tweet—but will any institution stand up to these McCarthy-like campaigns against his political foes? Mea…
  continue reading
 
The assassination of JFK and the Epstein Files are two stories that have piqued the world's interest for some time - and both have spawned all manner of conspiracy theories. Piers Morgan asked those closest to the cases to answer some of the more pressing questions - and here we've rounded up the most interesting responses. Piers Morgan Uncensored …
  continue reading
 
Plus: Aerospace telecom-equipment maker Filtronic signs its largest deal with Elon Musk’s SpaceX. And AT&T agrees to buy spectrum licenses from EchoStar for $23 billion in cash. Anthony Bansie hosts. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The Wall Street Journal
  continue reading
 
Martin Albrecht is a Professor of Cryptography at King's College London and a Principal Research Scientist at SandboxAQ. He works broadly across the field of cryptography. His work focuses on the analysis of deployed or soon-to-be deployed cryptographic solutions and he has responsibly disclosed severe vulnerabilities to various public and private …
  continue reading
 
Send the hosts a message - try it now! TL;DR: This week's returning guest is the man, the myth, the Alpaca farmer, Philippe Humeau of CrowdSec. Life comes at you fast, threats come at you faster. The good news is - defenses can keep up. Listen in, then go check out CrowdSec! YouTube video: https://youtube.com/live/7Xc99bXCfwQ Support the show >>> P…
  continue reading
 
A key challenge with designing AI agents is that large language models are stateless and have limited context windows. This requires careful engineering to maintain continuity and reliability across sequential LLM interactions. To perform well, agents need fast systems for storing and retrieving short-term conversations, summaries, and long-term fa…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
"On the centenary of the Russian Revolution, Jonathan Daly and Leonid Trofimov have reinvigorated the study of a turning point in world history. Instead of rehashing the internal dynamics of the Bolshevik takeover, the authors have carefully juxtaposed the international ambitions of the Bolsheviks with the Revolution's reception around the world. D…
  continue reading
 
The Jacobites and the Grand Tour: Educational travel and small-states' diplomacy (Manchester University Press, 2025) by Dr. Jérémy Filet is the first monograph to fully examine the intersecting networks of Jacobites and travellers to the continent. In the book, Dr. Filet considers how small states used official diplomacy and deployed soft power - e…
  continue reading
 
In Imperial Creature: Humans and Other Animals in Colonial Singapore, 1819-1942 (National University of Singapore Press, 2019), Timothy Barnard explores the more-than-human entanglements between empires and the creatures they govern. What is the relationship between the subjugation of human communities and that of animals? How did various interacti…
  continue reading
 
Has Amazon finally cracked the code for the online-grocery business? WSJ Heard on the Street columnist Dan Gallagher tells us what the e-commerce giant is doing and how it stacks up against competitors. Then, while some dating apps have lost their charm, Raya has a long waitlist of interested users. WSJ Style News desk reporter Lane Florsheim expla…
  continue reading
 
Farmers Insurance discloses a data breach affecting over a million people. Agentic AI tools fall for common scams. A new bill in Congress looks to revive letters of marque for the digital age. Cybercriminals target macOS users with the Shamos infostealer. New Android spyware masquerades as antivirus to target Russian business executives. CISA seeks…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play