Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Prof G Markets breaks down the news that’s moving the capital markets, helping you build financial literacy and security. Tune in every Monday and Thursday for no mercy, no malice insight from Scott Galloway and Ed Elson on high flying stocks, booming sectors, and master of the universe CEOs. Like it or not, we live in a capitalist society. The key to navigating it? Talk about money. Part of the Vox Media Podcast Network.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Risk Parity Radio is a podcast about investing located at www.riskparityradio.com. RPR explores risk-parity style portfolios comprised of uncorrelated or negatively correlated asset classes -- stocks, selected bonds, gold, managed futures, and other easily accessible fund options for the DIY investor. The goal is to construct portfolios that are robust and can be drawn down on in perpetuity, and to maximize projected Safe Withdrawal Rates regardless of projected overall returns.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Welcome to the PRMA Risk Ready podcast, the show for Risk Management Professionals in the High Net Worth Space.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading

1
Cybersecurity, Privacy, Risk Management, Cryptocurrencies, Fintech, Information Technology
Shahid Sharif
Career guidance & consulting services in Information Technology, Cybersecurity, Privacy, Risk Management, Cryptocurrencies, & Fintech #self improvement # productivity #cybersecurity #security #privacy #risk #fintech #blockchain #cryptocurrencies
…
continue reading
Your dose of tips about all things Information Security, ICT Legislation and Risk. South African podcast.
…
continue reading
Welcome to 'Risk Grustlers,' where we celebrate the extraordinary journeys of modern-day Risk Leaders who embrace the art of 'Grustle'—a powerful fusion of Grind and Hustle. Our podcast dives into the innovative strategies and bold decisions taken by these risk-takers, shaping the future of cybersecurity and risk management. Join us as we explore their inspiring stories, insightful advice, and cutting-edge technologies that define the alternative GRC landscape.
…
continue reading
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Independent holistic security consultancy
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Integrity Risk is a podcast series by The Risk Advisory Group, a leading independent global risk consultancy. Senior members of our business intelligence teams share their deep sector and regional understanding of the risk to business from bribery and corruption, corporate crime and evolving legal regimes. The Integrity Risk series aims to provide decision-makers with clarity and insight in uncertain political, regulatory and commercial conditions, and advice on how to best protect their bus ...
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
Catch up with summaries from an average of 50 new geopolitical events daily. Subscribe to better understand geopolitical risks.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. Join Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute, and CEO of NCX Group with over 24 years of expertise, for weekly, no-nonsense insights tailored to CEOs, CFOs, and business leaders. From data breaches to actionable cybersecurity and data privacy strategies, we deliver practical steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk into oppor ...
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
People are often described as the largest asset in most organisations. They are also the biggest single cause of risk. This podcast explores the topic of 'human risk', or "the risk of people doing things they shouldn't or not doing things they should", and examines how behavioural science can help us mitigate it. It also looks at 'human reward', or "how to get the most out of people". When we manage human risk, we often stifle human reward. Equally, when we unleash human reward, we often ina ...
…
continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
continue reading
We break down how events like Russia's war in Ukraine and European security shifts are shaping Germany - and the world. Whether you’re a student, journalist, or policymaker, hosts Nina Haase, Michaela Küfner, and Richard Walker deliver the insights you need to understand where Germany is headed and why it matters, with a hint of Berlin's distinct energy. Published every Friday. Find us also on YouTube: @dwnews. Subscribe to our newsletter: dw.com/berlinbriefing. Leave us a comment here: news ...
…
continue reading
Welcome to Portfolio Perspective: Managing Risk & Seizing Opportunity, a podcast focused on the asset-based lending industry. Join Andrew Pace, Chief Client Experience Officer at Asset Compliant Solutions, as he interviews experts, shares insights, and explores strategies for managing risk, optimizing portfolio performance, and seizing opportunities in an ever-evolving financial landscape. From regulatory changes to technological advances, each episode provides actionable takeaways and deep ...
…
continue reading
STRAT – Strategic Risk Assessment Talk, is a forum with a preparedness mindset. Mitigating risks, creating systems of prevention and recovery to deal with potential threats, and understanding the objectives of a Business Continuity Plan. This is the podcast for leaders who are committed to being prepared. The program is hosted by retired Marine Corps intelligence officer and strategic risk assessment professional Hal Kempfer and investment banker Mark Mansfield.
…
continue reading
I am your host, Alec Crawford, Founder and CEO of Artificial Intelligence Risk, Inc. and this is AI Risk-Reward, a podcast about balancing the risk and reward of using AI personally, professionally, and as a large organization! We will discuss hot topics such as, will AI take my job or make it better? When I ask Chat-GPT work questions, is that even safe? From an ethical perspective, is it enough for big companies to anonymize private data before using it? (Probably not.) I am discussing the ...
…
continue reading
Discover stories from real people who are living out their definition of a secure retirement.
…
continue reading

1
Phishing for Truth: Fixing the Flaws in Security Awareness
31:53
31:53
Play later
Play later
Lists
Like
Liked
31:53Jeffrey Wheatman sits down with Cary Johnson, founder of Phishbusters Audit and Consulting, to expose the failures of traditional phishing simulations. They discuss why standard metrics fall short, how self-assessment distorts results, and what it really takes to track — and influence — behavioral change in security awareness programs.…
…
continue reading

1
Securing the Future: Technology, Compliance, and Control in Asset-Based Lending
44:28
44:28
Play later
Play later
Lists
Like
Liked
44:28ACS CFO and CIO Greg Meyer joins host Andrew Pace for a deep dive into the operational backbone of modern recovery and collections. With nearly two decades of leadership at ACS, Greg discusses the growing overlap between finance, IT, and compliance—and what it means for lenders today. From securing sensitive data to building scalable frameworks for…
…
continue reading

1
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Shahar Man, Brian Fox, Mark Lambert - ASW #332
1:04:35
1:04:35
Play later
Play later
Lists
Like
Liked
1:04:35ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
…
continue reading

1
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Brian Fox, Mark Lambert, Shahar Man - ASW #332
1:04:35
1:04:35
Play later
Play later
Lists
Like
Liked
1:04:35ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
…
continue reading

1
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
…
continue reading

1
Episode 423: ALLW (It's New!), Social Security Claiming Considerations And Dividend Delusions
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35In this episode we answer emails from Dave, Jeff and Peter. We discuss a new risk parity ETF, ALLW, a social security claiming question and considerations, and how a listener has been misled regarding so-called dividend investing by misinterpreting a misleading source. Links: Father McKenna Center Donation Page: Donate - Father McKenna Center ALLW …
…
continue reading
What do people have to do with cybersecurity? A lot. As with other fields of human risk, it’s people that are typically the root cause of problems in the cybersecurity world. Which is where my guest’s expertise in behavioural design comes into play. On this episode, I’m speaking with Sarah Aalborg, a cybersecurity and behavioural design expert who’…
…
continue reading

1
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Dr. Aleksandr Yampolskiy, Lenny Zeltser - BSW #394
1:04:40
1:04:40
Play later
Play later
Lists
Like
Liked
1:04:40In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (lik…
…
continue reading

1
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Lenny Zeltser, Dr. Aleksandr Yampolskiy - BSW #394
1:04:40
1:04:40
Play later
Play later
Lists
Like
Liked
1:04:40In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (lik…
…
continue reading
In this episode, we sit down with James Morris OBE to explore the launch of CSBR — Cyber Security Business Resilience. Learn how this new venture is helping organisations stay secure, resilient, and prepared in an increasingly digital and threat-prone world. Watch the full episode here… SourceBy Risk And Business
…
continue reading
Join us for the May 31, 2025 edition of the Geopolitical Report Daily Podcast. On Friday, we mapped 55 events, including continuing protests in Tripoli.By Geopolitical Report
…
continue reading

1
The Evolution of Patch Management with Eric Schultze
24:02
24:02
Play later
Play later
Lists
Like
Liked
24:02Join us for a stroll down patch memory lane! Ivanti's Chris Goettl invites an old colleague to the show -- Eric Schultze, a former software development leader at Amazon, Microsoft, and Shavlik Technologies -- to look back on the early days of Patch Tuesday and how patch management has evolved over the decades since. Join the conversation online on …
…
continue reading

1
Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland... - SWN #481
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-481
…
continue reading

1
Why is Germany toughening its tone on Israel now?
40:03
40:03
Play later
Play later
Lists
Like
Liked
40:03When Germany's Chancellor speaks out on international law violations by Israel, it signals a shift. We explore Germany’s evolving stance on Israel, and how Staatsräson shapes the line between political criticism and accusations of antisemitism. Plus, what Merz’s backing of Ukraine’s missile program says about his global ambitions — and how he aims …
…
continue reading

1
The Digital Fourth Amendment with Orin Kerr
1:08:36
1:08:36
Play later
Play later
Lists
Like
Liked
1:08:36The Cyberlaw Podcast is back from hiatus – briefly! I’ve used the hiatus well, skiing the Canadian Ski Marathon, trekking through Patagonia, and having a heart valve repaired (all good now!). So when I saw (and disagreed with ) Orin Kerr’s new book, I figured it was time for episode 502 of the Cyberlaw Podcast. Orin and I spend the episode digging …
…
continue reading

1
Promoting Wellness Among Security Teams in the Midst of Crisis
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Danielle Weddepohl, Director of Public Safety and Emergency Management at George Brown College, discusses how to promote wellness among security teams.
…
continue reading
Join us for the May 30, 2025 edition of the Geopolitical Report Daily Podcast. On Thursday, we mapped 68 events, including protests returning to the streets of Nepal.By Geopolitical Report
…
continue reading

1
SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2;
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
…
continue reading
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
…
continue reading

1
No More Compliance Theater: Meet Real Security Compliance with Adam Brennick
1:19:31
1:19:31
Play later
Play later
Lists
Like
Liked
1:19:31Is it time to rethink SOC 2? (Spoiler: Adam thinks so—and he’s got the receipts.) In this insightful episode of Security & GRC Decoded, Adam Brennick, Director of Security Risk & Compliance at Cockroach Labs, joins Raj to challenge the status quo of SOC 2, compliance culture, and how GRC teams should operate in a modern, engineering-driven world. W…
…
continue reading
From the ISACA Middle Tennessee conference, March 2025. Dan Houser is a vCISO; 2024 Chair of the Board, ISC2; advisory strategist board member, NACD Certified Director, and more. He enables the business to take on more risk, safely, to acquire new markets, open new countries of operation and make connections that were impossible before. He helps or…
…
continue reading

1
Live from CISO XC DFW: Unfiltered Lessons in Modern Cybersecurity
21:29
21:29
Play later
Play later
Lists
Like
Liked
21:29Sponsor: HivePro (www.hivepro.com) EP67: Threat Exposure Clarity, CISO Certification Origins & Startup Security Strategy Live from CISO XC DFW, this episode of The Professional CISO Show features two powerhouse conversations. First, David Malicoat sits down with Critt Golden of Hive Pro to demystify Continuous Threat Exposure Management (CTEM) and …
…
continue reading

1
Why Cybersecurity Professionals Lie on Their Resumes
32:19
32:19
Play later
Play later
Lists
Like
Liked
32:19All images and links can be found on CISO Series. Check out this post by Gautam ‘Gotham’ Sharma of AccessCyber for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is Krista Arndt, associate CISO, St. Luke’s University Hea…
…
continue reading

1
Iran opens possibility of US inspectors for nuclear program
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36Join us for the May 29, 2025 edition of the Geopolitical Report Daily Podcast. On Wednesday, we mapped 62 events, including the possibility of Iran allowing US inspectors of their nuclear program.By Geopolitical Report
…
continue reading

1
Is the Market Calling Trump’s Bluff? — ft. Aswath Damodaran
1:13:48
1:13:48
Play later
Play later
Lists
Like
Liked
1:13:48Scott and Ed discuss the latest tariff tensions between the U.S. and the European Union, how the market reacted to BYD’s price cuts, and a potential sale of OnlyFans. Then Aswath Damodaran, professor of finance at NYU’s Stern School of Business, returns to the show to break down what he’s learned about the markets since Liberation Day. He discusses…
…
continue reading

1
SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
…
continue reading

1
Episode 427: Our Generous Listeners, BOXX, Direct Indexing And A Tribute To Sister Francine
30:32
30:32
Play later
Play later
Lists
Like
Liked
30:32In this episode we answer emails from Katie, Sean, Glen, Anonymous and Kelly. We discuss our matching campaign for the Father McKenna Center (rolled out in Episode 426), the BOXX ETF and the Rorschach test it presents, direct indexing, Risk Parity Chronicles, and the real purpose of Financial Independence and how to win at retirement and life. Link…
…
continue reading

1
Palestinians overrun aid station in Rafah
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59Join us for the May 28, 2025 edition of the Geopolitical Report Daily Podcast. On Tuesday, we mapped 61 events, including Palestinians overrunning an aid station in Rafah.By Geopolitical Report
…
continue reading

1
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Jordan Avnaim, Chris Hickman, Amit Sinha, Albert Estevez Polo - BSW #397
1:07:59
1:07:59
Play later
Play later
Lists
Like
Liked
1:07:59This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
…
continue reading

1
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Jordan Avnaim, Chris Hickman, Amit Sinha, Albert Estevez Polo - BSW #397
1:07:59
1:07:59
Play later
Play later
Lists
Like
Liked
1:07:59This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
…
continue reading

1
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Amit Sinha, Chris Hickman, Albert Estevez Polo, Jordan Avnaim - BSW #397
1:07:59
1:07:59
Play later
Play later
Lists
Like
Liked
1:07:59This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
…
continue reading

1
EP 127 Secrets for Sale: Inside the Shadowy World of Corporate Espionage with former British Intelligence Officer Gavin Stone
1:07:16
1:07:16
Play later
Play later
Lists
Like
Liked
1:07:16Send us a text ✍️ Short Podcast Summary: In this gripping episode of The Security Circle, former British intelligence officer Gavin Stone lifts the veil on the murky world of corporate espionage. From railgun leaks in Korea to bugs in boardrooms, Gavin shares shocking real-world tactics used to infiltrate companies, manipulate insiders, and extract…
…
continue reading

1
Feel First, Think Never: Your Emotions Are the Exploit
13:13
13:13
Play later
Play later
Lists
Like
Liked
13:13If it made you panic, rage, or rush… it probably bypassed your cognitive defenses. In the latest issue of Deceptive Minds, I dig into the dark cognitive malware of emotional hijacking: how scammers, manipulators, and even well-meaning voices use fear, urgency, outrage, and hope to short-circuit your critical thinking. Inside: 🧠 Why your emotions be…
…
continue reading

1
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
…
continue reading

1
AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more... - SWN #480
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-480
…
continue reading

1
PRMA Insurance Thought Leaders Insight Series- Kareen Boyadjian, VP of UW at Tokio Marine HCC – Cyber & Professional Lines Group
26:57
26:57
Play later
Play later
Lists
Like
Liked
26:57The PRMA Insurance Thought Leaders Insight Series with Spencer Houldin, alongside leading thought leaders in the industry, aims to examine the insurance terrain, identify solutions to navigating the bumpy roads, and provide a roadmap that guides risk management professionals in the right direction. In this episode our host, Spencer Houldin, Managin…
…
continue reading
This week, I delve into the Windows BAM artifact, unraveling its forensic significance and exploring how it can unlock critical insights in digital investigations.
…
continue reading

1
S7E27 201 - A Conversation with Thomas Ritter
30:06
30:06
Play later
Play later
Lists
Like
Liked
30:06Security practitioners and small and midsized business owners often do not pay necessary attention to the legal aspects of security and privacy. Thomas Ritter is an attorney and co-owner at Ritter Gallagher, a data privacy and cybersecurity law firm. Ritter Gallagher provides clients of all sizes with governance, risk management and compliance solu…
…
continue reading
Join us for the May 27, 2025 edition of the Geopolitical Report Daily Podcast. On Monday, we mapped 58 events, including the US and the Philippines kicking off the Kamandag exercise.By Geopolitical Report
…
continue reading

1
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Shahar Man, Brian Fox, Mark Lambert - ASW #332
1:04:35
1:04:35
Play later
Play later
Lists
Like
Liked
1:04:35ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
…
continue reading