Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
…
continue reading
🎙️ Welcome to the Microsoft Intune and Security Report Podcast🎙️ — your essential stop for the latest in Windows and Edge security! This podcast is designed to be a time-saving powerhouse, distilling the most critical updates, new features, and emerging vulnerabilities from multiple trusted sources into one convenient, ready-to-reference report. Each week, we dig deep into the data to give you a concise, actionable rundown on the security landscape, helping you stay one step ahead. So whethe ...
…
continue reading
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
…
continue reading
The Power of Digital Policy is a podcast that teaches you and your organization how to balance the risks and opportunities that come with operating websites, social media, mobile applications, voice assistants, AI and other channels. Through a monthly focus on individual topics, such as accessibility, cookies, copyrights, social media faux pas, data breaches, and data privacy, you will learn how to develop guardrails to maximize digital opportunity and minimize risk. Whether you work for a s ...
…
continue reading
Threat Wire by Hak5 is a quick weekly dose of news about security, privacy, and what is threatening the freedom of our Internet.
…
continue reading
Spotify Premium APK is a modified version of the official Spotify app that unlocks premium features like ad-free listening, unlimited skips, and offline downloads — all without a subscription. While it may seem like a free alternative, it comes with serious risks, including security threats, account bans, and legal issues
…
continue reading
Bradley Chambers and various experts discuss the latest with Apple in the enterprise and K-12. New episodes come out bi-weekly on Tuesday.
…
continue reading
Fox updates on the latest trends, gadgets and news in the world of technology.
…
continue reading
Interviews with end users and industry experts in, IT, AV and security about commercial technologies that can help institutions from enterprise to education to healthcare and beyond.
…
continue reading
Welcome to Cybphered Reality – your trusted source for cybersecurity tips, tricks, and guidance. Powered by RITC Cybersecurity, this podcast is tailored for individuals and businesses looking to secure their digital assets in an increasingly connected world. We break down complex cybersecurity topics into simple, actionable insights to help you safeguard your data, identity, and online presence. Whether you’re a tech-savvy user or just getting started, Cybphered Reality helps you stay inform ...
…
continue reading
Country Life magazine has been celebrating the best of life in Britain for over 126 years, from the castles and cottages that dot the land to the beautiful countryside around us. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
These are the audio tracks from Sports Cards Live (on YouTube). Host and lifelong collector Jeremy Lee is joined by passionate collectors, industry insiders, hobbypreneurs, content creators to educate, inform, entertain, and inspire hobbyists of all genres and experience. Sports Cards Live is an interactive livestream video podcast where you are part of the show as your comments and questions are in play.
…
continue reading
No matter what’s holding you back, therapist Beth Rogerson wants to help you live a better, more balanced life. Are you and your partner going through a rough patch? Do you struggle with anxiety or depression? Or do you simply need some guidance on your journey to become your best Self? Beth often uses the Internal Family Systems (or IFS) model to help listeners understand and navigate their inner world. She frequently interviews other experienced therapists on subjects like security, shame, ...
…
continue reading
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep network visibility to not only protect against sophisticated cyber- ...
…
continue reading
Welcome to the Flexera Security Vulnerability Insight Podcast, your go-to source for all things related to cybersecurity, software vulnerabilities, and threat intelligence. In this engaging podcast series, we will dive deep into the ever-evolving world of digital security, providing you with valuable insights, expert interviews, and the latest industry trends. Hosted by Jeroen Braak and leading experts in the field, each episode explores critical topics such as: Vulnerability Management: Sta ...
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Dial into a frequency where the meticulous world of auditing and the rebellious spirit of hacking collide! Meet Clarissa and Bill, your audacious hosts, navigating you through the labyrinth of traditional auditing and into a realm where controls aren’t just checkboxes but catalysts for change. Steer away from the monotonous audit routines and venture into a world where compliance and managing risk is not a battle but a collaborative journey toward organizational excellence. Clarissa, author ...
…
continue reading
The Mid-Atlantic’s Best IT services company. Helping Business Owners create, improve and scale their Technology strategy. IT services, IT Security and IT Support advice and leadership from expert professionals. Q&A with Senior Engineers, Service Managers and Business Development.
…
continue reading
Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
…
continue reading

1
PortalFuse Weekly Security Report: June 2025 Patch Tuesday
36:46
36:46
Play later
Play later
Lists
Like
Liked
36:46Welcome to the PortalFuse weekly security report for June 2025. In this deep dive, we get Windows and Intune administrators up to date on the latest security issues impacting your environments. This month, we're unpacking the June 10th, 2025, Patch Tuesday release, which includes 38 new CVEs. We cut through the noise to find the actionable intellig…
…
continue reading

1
EP2138: Chill Chill Security - Patch Tuesday June 2025
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55Sponsor by SEC Playground
…
continue reading

1
Road to the National Ep. 3 - Upper Deck President Jason Masherah Unveils New Patch Security Tech
42:24
42:24
Play later
Play later
Lists
Like
Liked
42:24Road to the National Ep. 3: Upper Deck's New Patch Security Innovation with Jason MasherahIn Episode 3 of the "Road to the National" series, we sit down with Jason Masherah, President of Upper Deck, to discuss the company's exciting plans for the 2025 National Sports Collectors Convention in Chicago. Jason shares exclusive insights into Upper Deck’…
…
continue reading

1
SANS Stormcast Wednesday, June 11th, 2025: Microsoft Patch Tuesday; Acrobat Patches
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20June%202025/32032 Adobe Vulnerabilities Adobe relea…
…
continue reading

1
SANS Stormcast Wednesday, June 11th, 2025: Microsoft Patch Tuesday; Acrobat Patches (#)
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59SANS Stormcast Wednesday, June 11th, 2025: Microsoft Patch Tuesday; Acrobat Patches Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/dia…
…
continue reading

1
The Evolution of Patch Management with Eric Schultze
24:02
24:02
Play later
Play later
Lists
Like
Liked
24:02Join us for a stroll down patch memory lane! Ivanti's Chris Goettl invites an old colleague to the show -- Eric Schultze, a former software development leader at Amazon, Microsoft, and Shavlik Technologies -- to look back on the early days of Patch Tuesday and how patch management has evolved over the decades since. Join the conversation online on …
…
continue reading

1
Signed, sealed, exploitable. [Research Saturday]
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the M…
…
continue reading

1
EP2147: Forensic Day - ShadowLink- นวัตกรรมใหม่ของแฮกเกอร์รัสเซีย
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45Sponsor by SEC Playground
…
continue reading
Self-driving car company Waymo wants to start testing their vehicles in New York City streets. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Radio
…
continue reading
An historic data breach that wasn’t. Aflac says it stopped a ransomware attack. Cloudflare thwarts a record breaking DDoS attack. Mocha Manakin combines clever social engineering with custom-built malware. The Godfather Android trojan uses a sophisticated virtualization technique to hijack banking and crypto apps. A British expert on Russian inform…
…
continue reading

1
"Still Got It?” – The Ethics of Posting Cards You No Longer Own
37:38
37:38
Play later
Play later
Lists
Like
Liked
37:38In Part 5 of Episode 271, the panel wrestles with one of the hobby’s more nuanced and quietly controversial behaviors: sharing cards online that you no longer own. Is it deceptive? Is it aspirational? Or is it simply part of storytelling in the hobby? Chris McRae, Chris McGill, Joe Poirot, and Jeremy Lee explore how collectors present their collect…
…
continue reading

1
EP2146: Chill Chill Security - Cybersecurity Confessions – 10 Worst Mistakes
12:29
12:29
Play later
Play later
Lists
Like
Liked
12:29Sponsor by SEC Playground
…
continue reading

1
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, N…
…
continue reading
Miles Perret Cancer Services is one of the latest charities to have to warn donors about scammers trying to impersonate the group's Venmo account. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Radio
…
continue reading

1
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords (#)
5:47
5:47
Play later
Play later
Lists
Like
Liked
5:47SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.s…
…
continue reading

1
Automox Insiders – Ted Harapat, Tales of the Linux Firefighter, E03
13:49
13:49
Play later
Play later
Lists
Like
Liked
13:49In this episode of IT Insiders, host Maddie Regis sits down with Ted Harapat, Senior Systems Engineer at Automox, for a candid and compelling look into the world of Linux, cybersecurity, and the origins of IT careers. Ted shares how a midnight knock on his window sparked a decades-long journey into IT, what it’s like to support and expand Automox’s…
…
continue reading

1
How AI is Reshaping Cyber Defense | Supply Chain Security Explained | RITC Cybersecurity Podcast
32:20
32:20
Play later
Play later
Lists
Like
Liked
32:20🚨 Supply Chain Attacks Are the New Frontline in Cyber Warfare. Are You Ready? In this power-packed episode of the RITC Cybersecurity Podcast, our founder Mike Rotondo and co-host Mari Cherry dive deep into the evolving threat landscape — where AI is both a weapon and a shield. 🔍 What’s Inside: How threat actors exploit supply chain vulnerabilities …
…
continue reading

1
Latest News in Cybersecurity Space & Cyberawareness for Small and Medium Companies
21:00
21:00
Play later
Play later
Lists
Like
Liked
21:00🎙️ Cyphered Reality: Cyber Threats You Need to Know About This Week 🔐 Did you hear? The PowerSchool hacker just pled guilty. 😳 Ransomware has hit Arla Foods – again proving no one’s safe. And for SMBs, cyberawareness isn’t optional anymore – it’s survival. In this episode, Mike Rotondo and Mari Cherry break down what these headlines really mean for…
…
continue reading

1
Tips on securing personal & company devices
32:24
32:24
Play later
Play later
Lists
Like
Liked
32:24Hop on to the latest podcast by RITC CyberSecurity with Mike and Mari as they discuss latest news & developments in the Rapidly changing space of CyberSecurity and how to keep your personal company devices secure. Stay with us till the end to understand some of the key strategies you can implement today all by yourself to improve security of your v…
…
continue reading

1
You Can’t Patch Human Error — But You Can Prevent a Breach
44:57
44:57
Play later
Play later
Lists
Like
Liked
44:57You can’t patch human error — but you can prevent a breach. From GitHub malware to fake AI sites, attackers are slipping through simple mistakes — copy-paste, downloads, even CAPTCHA pages. This episode breaks down how these threats work and what you can do today to stop them. Is your team actually protected… or just hoping for the best? Listen now…
…
continue reading

1
Cybercrime Is Getting Smarter. Is Your Business Falling Behind?
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34Hackers aren’t just stealing data — they’re mocking victims and locking systems before you can react. Outdated backups, AI jailbreaks, and zero-day threats are hitting small businesses hard. Cybercrime Is Getting Smarter. Is Your Business Falling Behind? This episode breaks down what’s really happening behind the scenes — and how to stay ahead befo…
…
continue reading
AI, Phishing, and Identity Theft: What Every Business Needs to Know in 2025 Hackers are faking voices, sending deepfake emails, and breaching businesses using tools powered by AI. In this episode of Cyber Reality, we break down what’s real, what’s happening now, and what you need to do to stay protected. Would your team spot the threat before it’s …
…
continue reading

1
Regret, Risk & Reward: Buying the Card Before You’re Ready
36:30
36:30
Play later
Play later
Lists
Like
Liked
36:30Stretching Budgets, Auction Regrets & the Rise of Card Funding In Part 4 of Episode 271, the discussion turns to a familiar dilemma in the hobby: should you buy the card even if you’re not quite ready? Jeremy, Joe, Chris McRae, and Chris McGill share real stories about pushing past budget limits, chasing grails, and the cards they still regret not …
…
continue reading

1
Juneteenth: Reflecting, belonging, and owning your seat at the table. [Special Edition]
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26We put together an open conversation between our podcast hosts, CyberWire Daily's Dave Bittner, T-Minus Space Daily’s Maria Varmazis, and CISO Perspectives podcast’s Kim Jones. Their conversation goes deeper than just the historical significance of Juneteenth, diving into candid conversations on allyship, representation, and the enduring value of d…
…
continue reading

1
EP2145: Chill Chill Security - DNS log and use case
10:00
10:00
Play later
Play later
Lists
Like
Liked
10:00Sponsor by SEC Playground
…
continue reading
Meta is signing a 20 year deal with Constellation Energy to buy energy from its nuclear power plant in Illinois, the latest tech giant to turn to nuclear for the massive amounts of energy needed for artificial intelligence goals. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Radio
…
continue reading
Viasat confirms it was breached by Salt Typhoon. Microsoft’s June 2025 security update giveth, and Microsoft’s June 2025 security update taketh away. Local privilege escalation flaws grant root access on major Linux distributions. BeyondTrust patches a critical remote code execution flaw. SMS low cost routing exposes users to serious risks. Erie In…
…
continue reading

1
EP2144: Chill Chill Security - Incident ที่เกิดขึ้นมันความผิดใคร
18:21
18:21
Play later
Play later
Lists
Like
Liked
18:21Sponsor by SEC Playground
…
continue reading

1
Cardboard Over Plastic? Multipliers, Manipulation & Market Realities
36:06
36:06
Play later
Play later
Lists
Like
Liked
36:06In Part 3 of Episode 271, the panel takes on one of the hobby’s most debated topics: grading premiums and whether the slab should matter more than the card itself. Chris McRae kicks things off with his now-viral take — “The card over the slab, every time” — sparking a lively discussion with Chris McGill, Chris Hoge, Joe Poirot, and Jeremy Lee about…
…
continue reading

1
Risky Business #796 -- With special guest co-host Chris Krebs
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04On this week’s show Patrick Gray and Adam Boileau are joined by special guest Chris Krebs to discuss the week’s cybersecurity news. They talk through: Israeli “hacktivists” take out an Iranian state-owned bank Scattered-spider and friends pivot into attacking insurers Securing identities in a cloud-first world keeps us awake at night Microsoft take…
…
continue reading
Colleges and universities are going old-school to combat cheating in the age of artificial intelligence. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Radio
…
continue reading

1
Executive IT – Balancing Security, Usability, and Speed | E05
17:45
17:45
Play later
Play later
Lists
Like
Liked
17:45How can IT and the business work better together—without sacrificing speed, security, or sanity? In this episode of Executive IT, host Evan Kiely is joined by Volker Otto, a seasoned IT executive, to explore how teams can bridge the gap between user experience and technical requirements. They dive into the rise of business relationship managers, ma…
…
continue reading
A House oversight committee requests DOGE documents from Microsoft. Predatory Sparrow claims a cyberattack on an Iranian bank. Microsoft says data that happens in Europe will stay in Europe. A complex malware campaign is using heavily obfuscated Visual Basic files to deploy RATs. A widely used CMS platform suffers potential RCE bugs. North Korea’s …
…
continue reading

1
The 3-Bucket Method: Decluttering Your PC Without Regret
37:07
37:07
Play later
Play later
Lists
Like
Liked
37:07In Part 2 of Episode 271, The Smarter Collector Chris McRae returns to share one of his most resonant ideas: the three-bucket method for evaluating your collection. Every card falls into one of three categories — essential, value add, or junk — and this simple framework can be a game-changer when consolidating, downsizing, or refining your personal…
…
continue reading

1
Breaking down multi-display support on the Mac
23:35
23:35
Play later
Play later
Lists
Like
Liked
23:35Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple device…
…
continue reading

1
SANS Stormcast Monday, June 16th, 2025: Extracting Data from JPEG; Windows Recall Export; Anubis Wiper; Mitel Vuln and PoC
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider build for Windows 11, Microsoft is testing an export feature for data stored by Recall. The feature is limited to European …
…
continue reading

1
EP2143: Security Vocabulary - Pivoting vs Lateral Movement
4:23
4:23
Play later
Play later
Lists
Like
Liked
4:23Sponsor by SEC Playground
…
continue reading
While many Americans were concerned that digital price tags would lead to "surge pricing" and other means of skimming higher profits, a new study suggests it may not be happening after all. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Radio
…
continue reading