A free podcast about cybersecurity, vulnerability management, and the CVE Program.
…
continue reading
The CYSA PrepCast is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Compliance Conversations is a biweekly podcast for healthcare professionals and compliance officers who want to stay on top of the compliance game. Host CJ Wolf has in-depth conversations with industry experts to explore the riddles and complexities of the compliance world. Wolf chats with fellow compliance experts, auditors, physicians and government officials. Compliance Conversations is produced by Healthicity.
…
continue reading
The Anger Management Podcast is your weekly guide to mastering your anger and creating the calm, happy and loving relationships youāve always wanted. Join anger expert Alastair Duhs as he shares practical tips, proven techniques and game-changing strategies to help you control your anger, master your emotions and transform your relationships into sources of calm, happiness and respect. This podcast is for anyone whoās ready to break free from angerās grip and create a life filled with peace ...
…
continue reading
Where entrepreneurs get real about their stories and turn failures into lessons for success. Hosted by Megan Bruneau, The Failure Factor explores the journey of business owners, entrepreneurs and thought leaders who have faced significant challenges, persevered through adversity, and emerged triumphant providing listeners with insights to navigate their own entrepreneurial paths There's a myth out there that failure is career-ending and that success is achieved without any bumps in the road. ...
…
continue reading
What is your Working Genius? The Working Genius podcast is designed to help people identify their natural gifts and find joy and fulfillment in their work and life. Leadership and teamwork expert Patrick Lencioni and his team explore the Working Genius model and provide practical advice for applying this framework individually, at our jobs and in our homes. What type of work makes you thrive? Are you burning out because your job requires you to work in your areas of frustration? How can team ...
…
continue reading
Community IT offers free webinars monthly to promote learning within our nonprofit technology community. Our podcast is appropriate for a varied level of technology expertise. Community IT is vendor-agnostic and our webinars cover a range of topics and discussions. Something on your mind you donāt see covered here? Contact us to suggest a topic! http://www.communityit.com
…
continue reading
Are you ready to take the mystery out of having great relationships and to gain the knowledge you need to step confidently into the next level of your life? Welcome to the Letās Get Vulnerable podcast where your host, Dr. Morgan Anderson, gives you real talk on all things dating, relationships, and sex. Dr. Morgan is a relationship coach, psychologist and creator of the E.S.L relationship method. She brings humor, truth and knowledge to the complex world of dating and relationships. Podcast ...
…
continue reading
The world doesn't need any more noise, an army of identical leaders or rigid leadership models. Instead, the challenges we all face call for thoughtful, reflective, confident leadership. People who want to lead by example, bring others with them and who are ready to learn and adapt to deliver brilliant results. Join Juliet Corbett and Lucy Gower as they explore the transformative power of quiet leadership. Through candid conversations and practical insights they guide senior and aspiring lea ...
…
continue reading
Rob Fonte is the host of the Leadership Jam Session Podcast, where every other week you'll get to hear leaders at all levels of management share their practical solutions to the management challenges you face every day. On this podcast, Rob shares leadership experiences with listeners by bringing in leaders from all different levels to āJamā on a variety of leadership topics. Some of the best insights are captured from just listening and learning from each other as they share their experienc ...
…
continue reading
š The Defuse Podcast: Personal Threat Management for High-Risk Lives When the threats are real, the stakes are high ā so what actually works?" Hosted by Philip Grindell ā former Scotland Yard detective, behavioural threat specialist, and author of Personal Threat Management ā this podcast lifts the lid on the proven methods used to keep prominent individuals, executives, and private clients safer. Each episode features straight-talking conversations with trusted experts on: Stalking, fixated ...
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
Managing Our Minds Where vulnerability isnāt weaknessāitās the spark that ignites growth. Hosted by Dominique Easley, Super Bowl Champion & NFL vet, and Damien Jacobs, NFL vetāthis podcast creates a raw, unfiltered space for honest conversations about mental health, resilience, and personal growth. We sit down with high school, college, and professional athletes, as well as entrepreneurs, top execs, and entertainers, to uncover the real stories behind their success. They open up about upbrin ...
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Elevate Wellness with Lisa D. Murphy is more than a podcastāitās a movement for women ready to rise. Hosted by certified holistic nutritionist, life coach, and mom of five Lisa D. Murphy, each episode blends real-life vulnerability with actionable strategies to help you heal, grow, and thriveāphysically, emotionally, spiritually, and even financially. After losing her father to cancer at 14, Lisaās journey became about more than foodāit became about meaning. Now, she helps others redefine ān ...
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading

1
The Speak Easy Podcast
Jen Estill and Karen Stefl ā creative studio entrepreneurs, brand and video experts, boss ladies, moms
Hi. Jen Estill and Karen Stefl here. In The Speak Easy Podcast, we share years of expertise in marketing, branding, video production, strategyānot to mention management, employee development, mentoring, sales, creativity, maintaining life balance, managing money, and.. you get the idea. It takes a lot to keep a couple of creative studios thriving. We developed this podcast after years of "how do you..." boss lady conversations. It was clear that if we were both in such similar places with re ...
…
continue reading
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
In healthcare, burnout rates are higher in women. In fact, forty percent of women physicians have cut back or left medicine within 6 years of completing training. Why? Is it added responsibilities at home? Gender bias at work? Invisible work at work? Mom guilt? Too much self-sacrifice and inability to say no? Poor boundaries, lack of time management skills, lack of self-care? In this podcast, weāll explore the reasons why women in medicine are strugglingāand more importantly, what to do abou ...
…
continue reading
The Bare Metal Cyber CISA Prepcast is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protectionāall aligned to ISACAās exam objectives. Whether you're just beginning your study journey or need a high-impact re ...
…
continue reading
Welcome to Let's Talk, People ā more than a podcast; a movement to raise the bar on how we lead. This is where leaders and people managers come to unpack their hardest-to-navigate people dynamics at work. Your host, Emily Frieze-Kemeny, is a renowned leadership amplifier. She is the founder and CEO of AROSE Group, a leadership and organizational change firm and previously held roles as head of talent and leadership development at Morgan Stanley, IBM, Avon, and Scholastic. Drawing from this d ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
We are passionate about helping leaders, HR, and ethics professionals build healthy cultures that enable mission success, a thriving workplace and responsible impact. Every other Thursday we post insightful and actionable conversations with leading thinkers, researchers, and practitioners on culture, values, ethics, and transformational change.
…
continue reading

1
The Emotional Intelli-Gents Podcast: Navigating Leadership with Emotional intelligence
Ismail Qadry & Sameer Aleem
Welcome to the Emotional Intelli-Gents Podcast. A podcast dedicated to helping leaders understand and hone their emotional intelligence skills. We are Ismail and Sameer, the hosts of the show, and together we have a passion for helping others navigate the complex world of emotions in the workplace. We believe that emotional intelligence is a crucial skill for success in all aspects of leadership, and we are here to share our knowledge and experience with you. So join us as we explore the wor ...
…
continue reading
Join psychotherapists Alison Bickers and Ros Peckham as they discuss relatable (and sometimes less relatable) life struggles.
…
continue reading
Iāve spent over 20 years studying the emotions and experiences that bring meaning and purpose to our lives, and if thereās one thing Iāve learned itās this: we are hardwired for connection, and connecting requires courage, vulnerability, and conversation. I want this to be a podcast thatās real, unpolished, honest, and reflects both the magic and the messiness of what it means to be human. Episodes will include conversations with the people who are teaching me, challenging me, confusing me, ...
…
continue reading
…
continue reading
"You Are More, with Emily Cave Boit," is a podcast dedicated to empowering you to embrace their true self, navigate lifeās challenges with confidence, and discover your unique path to healing and self-acceptance. This podcast invites you into the intimate journey of Emily Cave Boit, a remarkable woman who has faced unimaginable grief and emerged with a powerful story of resilience, love, and self-discovery. At just 26 years old, Emily found herself unexpectedly widowed before celebrating her ...
…
continue reading
Ever feel lost and alone on your management journey? We've felt that too. Great management is so critical, yet few of us are ātaughtā how to do itāit seems we're often expected to just learn on the job. Join us on our mission to become the manager that everyone wants to work for. We'll learn from some kickass managers, hear about their mistakes and triumphs, and get their hard-earned tips and tricks. Learn more at: youllmanage.com
…
continue reading

1
Ms. Fits Podcast - On the Go, Full of Faith, Slightly Unfiltered
Kristin McLauchlan/Tammie McClafferty
Welcome to Ms.Fits Podcastāthe weekly Christian podcast for working women who are spinning plates, saying prayers, and trying to find Godās grace in the middle of the madness. Weāre two women who have lived through the beautiful chaos of motherhood, marriage, careers, and the unexpected detours that come with it all. We started this podcast because we know what it feels like to love Jesus deeply while moving beyond expectations and perfection. Our hope is that we can share some sprinkles of ...
…
continue reading
A microdose podcast, āExploring the themes of subconsciousness by asking āun-asked' questions," says Benzinga. Discussing thoughts about my thoughts...and perhaps your thoughts. Sharing tools and/or reminders from a space of vulnerability and awareness. Let's unlearn together.
…
continue reading
Value through Vulnerability which is dedicated to helping put the human back into humanity with a particular focus on inclusion, improving voice for all, and designing work to support everybody thriving at work is brought to you by HEXO Change. We catalyse ideas, opinions & challenges around courage, self-awareness, vulnerability, inclusion, listening, trust, values, mindset etc Join Garry Turner with co-host and HumansFirst founder Mike vacanti from Ep 100, as they host conversations where ...
…
continue reading
Powerful life stories that motivate and inspire! Intimate conversations with Incredible people. Ryan dives deep into conversations with guests from all walks of life, discussing the moments that have shaped them. Ryan also shares his thoughts & journey along the way. Full episodes & Vlogs on YouTube!
…
continue reading
If you have ever felt disconnected, excluded, or that you just didnāt matter at work, then this podcast is for you. Your host, Rhodes Perry, 2x bestselling author of Imagine Belonging and Belonging at Work, introduces you to inclusive leaders, visionaries, and change-makers. This show was created for people like you ā people ready to imagine and build belonging at work. In this podcast, we dare to imagine workplace cultures that have yet to existā¦until now. It recognizes that leading this ki ...
…
continue reading
Welcome to the Flexera Security Vulnerability Insight Podcast, your go-to source for all things related to cybersecurity, software vulnerabilities, and threat intelligence. In this engaging podcast series, we will dive deep into the ever-evolving world of digital security, providing you with valuable insights, expert interviews, and the latest industry trends. Hosted by Jeroen Braak and leading experts in the field, each episode explores critical topics such as: Vulnerability Management: Sta ...
…
continue reading
The podcast centers on the value of Emotional Intelligence, which is both a mindset and an approach to life that regards problems as situations that help you learn and grow; it is a way of being and doing in the world that enables you to develop and sustain a positive relationship with yourself and others, at home, at work, and everywhere in between. Coupled with mental fitness, emotional intelligence is an essential component of Positive Intelligence (PQ) that enables you to leverage your p ...
…
continue reading
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
…
continue reading
A chat show where we aim to question, challenge and explore the rather wonderfully complex, and often slippery subject of mental health. Join us as we all laugh and cry together over honest frank discussion, true stories and music. Delivered by hosts and guests alike that are prepared to share their stories and are not afraid to show their vulnerability. Your 4 hosts are, Brandon Block: DJ, stress management, goal mapping coach. Chesney Hawkes: Singer, Songwriter, Musician Lynn Ferguson: Wri ...
…
continue reading
We discuss interpersonal communication and all the human stuff that gets in the way. To communicate more effectively we cannot rely on communication skills alone. We need to shine a light on our perceptions of other people and ourselves. We delve into topics like emotional intelligence, body language, deception, storytelling, social engineering, culture, personality, negotiation, sales and leadership. Join us as we learn to get our message across with more courage, clarity and connection.
…
continue reading
If Product Management and girl talk had a podcast baby, it would be named productmanagHER. After over a decade in Product Management and five years as a Product Management Instructor, your host - Blair Presley - is a full-time Product Management Career Coach who helps professionals to leverage their existing skills into new Product careers. Listen in to learn the secrets of the trade and the experiences of other women in Product to help you navigate your pivot into tech. If you're an existin ...
…
continue reading
You've got ideas. You've got ambition. You've got no time. If you're a working mom juggling mom life, work life, fill in the blank life, this podcast is for you. Join host Marisa Lonic, working mom of four, each week as she provides a mix of tips, motivation, and fun, to make whatever you're looking to achieve happen, no matter how busy AF, tired AF, and overwhelmed AF you may feel. This show is all about slaying the day as a working mom, whether that means setting and achieving big goals yo ...
…
continue reading
The Mighty Podcast infuses the health space with positivity, humor, and vulnerability. Explore topics on mental health, chronic illness, rare disease, disability, and more. Continue the conversation with a community who gets it on TheMighty.com.
…
continue reading
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we donāt. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
…
continue reading
Call them changemakers. Call them rule breakers. We call them Redefiners. And in this provocative podcast, we explore how daring leaders from across industries and around the globe are redefining their organizationsāand themselvesāto create extraordinary impact in todayās rapidly changing world. In each episode, Russell Reynolds Associates Leadership Advisor Hoda Tahoun and former CEO Clarke Murphy host engaging, purposeful conversations with leaders in and out of the business world who shar ...
…
continue reading
The podcast for emerging and blue collar leaders looking to grow their leadership skills. Letās explore some simple skills and knowledge which could transform your leadership and build better teams.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
The Project Medtech podcast is interview-style podcast on the Medtech Industry where guests share stories, advice, pitfalls, trends and innovations produced by Project Medtech.
…
continue reading

1
EP 567: When All Your Friends are Getting Engaged: How to Manage Timeline Anxiety
22:35
22:35
Play later
Play later
Lists
Like
Liked
22:35š„³ Episode Links: Apply to the E.S.L. Program Here Itās your host, Dr. Morgan, and in this episode, weāre getting real about wedding season; the comparison traps, the loneliness, and the inner dialogue that so many of us face when everyone around us seems to be finding āthe one.ā I share how to reframe jealousy and turn it into clarity about your deā¦
…
continue reading
For more information on how to control your anger, visit angersecrets.com. In this heartfelt episode of The Anger Management Podcast, we explore the quiet loneliness that can exist even in close relationshipsāand how vulnerability can bridge that emotional gap. Anger expert Alastair Duhs, with help from AI co-hosts Jake and Sarah, dives into why opā¦
…
continue reading

1
"Unlocking the Seed of Greatness: Exploring Management and Stewardship"
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36In this enlightening episode, we delve into the powerful concepts of management and stewardship as inspired by Dr. Miles Monroe's impactful teachings. As we explore the definitions and applications of effective management, our hosts share personal insights and experiences reflecting on utilizing God-given resources efficiently. Engage in this thougā¦
…
continue reading

1
Week in Review: ShinyHunters-Scattered Spider merge, DARPA AI prize, Water infrastructure volunteers
30:29
30:29
Play later
Play later
Lists
Like
Liked
30:29Link to episode page This weekās Cyber Security Headlines ā Week in Review is hosted by Rich Stroffolino with guest Steve Zalewski, co-host, Defense in Depth Thanks to our show sponsor, Vanta Do you know the status of your compliance controls right now? Likeā¦right now? We know that real-time visibility is critical for security, but when it comes toā¦
…
continue reading

1
Managing AI Risks at Nonprofits with Peter Campbell
22:03
22:03
Play later
Play later
Lists
Like
Liked
22:03Peter Campbell is the principal consultant at Techcafeteria, a micro-consulting firm dedicated to helping nonprofits make more affordable and effective use of technology to support their missions. He recently published a free download powerpoint on Managing AI Risk and had time to talk with Carolyn about his thoughts on developing AI policies with ā¦
…
continue reading

1
The Difference Between Affordable and Cheap
13:17
13:17
Play later
Play later
Lists
Like
Liked
13:17Every business has budget constraints, but here's what we've learned: cheap and affordable aren't the same thing. Cheap is about paying as little as possible; affordable is about getting the most value for the right price. One leaves you wanting more, the other leaves you satisfied with smart trade-offs that actually move your business forward.In tā¦
…
continue reading

1
NFC fraud reappears, Canada government breach, Zoomās critical flaw
8:08
8:08
Play later
Play later
Lists
Like
Liked
8:08New wave of NFC relay fraud, call hijacking, and root exploits in banking sector Canadaās House of Commons suffers cyberattack Zoom fixes critical Windows client flaw that could enable privilege escalation Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibilā¦
…
continue reading

1
SANS Stormcast Friday, August 15th, 2025: Analysing Attack with AI; Proxyware via YouTube; Xerox FreeFlow Vuln; Evaluating Zero Trust @SANS_edu
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12AI and Faster Attack Analysis A few use cases for LLMs to speed up analysis https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198 Proxyware Malware Being Distributed on YouTube Video Download Site Popular YouTube download sites will attempt to infect users with proxyware. https://asec.ahnlab.com/en/89574/ Xeroā¦
…
continue reading

1
Hackberry PIs and Other Hacker Things - PSW #887
2:08:42
2:08:42
Play later
Play later
Lists
Like
Liked
2:08:42We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You neeā¦
…
continue reading

1
The Compliance Impact of the CMS TEAM Model
33:28
33:28
Play later
Play later
Lists
Like
Liked
33:28In this episode of Compliance Conversations, CJ Wolf speaks with Eddie Qureshi, CEO of Rainfall Health, to break down the new CMS TEAM Modelāand what it means for your hospitalās future. What Youāll Learn: Which hospitals are impacted (and how to check the list) Why CMS is shifting post-acute accountability to hospitals What compliant documentationā¦
…
continue reading

1
Court filing system hack explained, PA AG weighs in on attack, Fortinet attacks raise concerns
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22Hack of federal court filing system exploited security flaws known since 2020 Pennsylvania attorney general says cyberattack knocked phone, email systems offline Spike in Fortinet VPN brute-force attacks raises zero-day concerns Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We knowā¦
…
continue reading

1
ADHD in leadership: How to thrive and help others do the same (Ep.37)
36:10
36:10
Play later
Play later
Lists
Like
Liked
36:10In this episode of The Quiet Leadership Revolution, Lucy Gower is joined by ADHD coach and trainer Anj Cairns to explore what it means to lead with ADHD ā and how to support yourself and your team with confidence, compassion and clarity. Lucy and Anj discuss: What ADHD is ā and how it can show up differently in different people The challenges of geā¦
…
continue reading

1
EP 22: Toxic Relationships - How to Spot the Signs and Protect Yourself
37:28
37:28
Play later
Play later
Lists
Like
Liked
37:28In this episode of Relational Lives, we take a deep dive into the reality of toxic relationships - how they differ from unhealthy ones, the warning signs to look out for, and why even strong, self-aware people can find themselves trapped in them. We explore behaviours like gaslighting, love bombing, manipulation, coercive control, and isolation, asā¦
…
continue reading
In June's episode of BOOKNERDS, Kyle Klute, Brianna Rhue, and Aaron Werner dive into Jim Collinsā How the Mighty Fall. They explore the five stages of decline that can quietly destroy even the most successful businessesāand how doctors and practice owners can avoid them through discipline, alignment, and asking the right questions. From the dangersā¦
…
continue reading
This week, our hostsā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā Dave Bittnerā ā ā ā ā ā ā , ā ā ā ā ā ā ā ā ā ā ā ā Joe Carriganā ā ā ā ā ā ā ā ā ā ā ā , and ā ā ā ā ā ā ā ā ā ā ā ā Maria Varmazisā ā ā ā ā ā ā ā ā ā ā ā (also host of the ā ā ā ā ā ā ā ā ā ā ā ā T-Minusā ā ā ā ā ā ā ā ā ā ā ā Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe's stoā¦
…
continue reading

1
SANS Stormcast Thursday, August 14th, 2025: Equation Editor; Kerberos Patch; XZ-Utils Backdoor; ForitSIEM/FortiWeb patches
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16CVE-2017-11882 Will Never Die The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email. https://isc.sans.edu/diary/CVE-2017-11882%20Will%20Never%20Die/32196 Windows Kerberos Elā¦
…
continue reading

1
EP 570: Motherhood, Relationships, and Reclaiming Yourself with Special Guest Vanessa Bennett
59:08
59:08
Play later
Play later
Lists
Like
Liked
59:08Today I am so excited to welcome the amazing Vanessa Bennett ā depth psychologist, author, and truth-teller when it comes to the real journey of motherhood and relationships. In this episode, we get real about her leap from the corporate world into psychology, navigating motherhood during COVID, and the life-changing insights from her upcoming bookā¦
…
continue reading

1
Fortinet SSL VPNs getting hammered, The Netherlands critical infrastructure compromise, Africa the most targeted for cyber attacks
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26The hits just keep on coming Where's the Little Dutch Boy when you need him? I felt the ransomware down in Africa Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programsā¦we rely on point-in-timeā¦
…
continue reading

1
AWP: Idealistic Supporter: Skyler Wernerās Working Genius Revealed
31:19
31:19
Play later
Play later
Lists
Like
Liked
31:19In this special Aaron Werner Podcast takeover, Sophie Thune returns to explore the Working Genius profile of Skyler Wernerālead technician at Werner Optometry and Aaronās son. After a fun and insightful first episode exploring Dr. Warnerās genius type, this follow-up digs into Skylerās unique pairing: Enablement + Wonder, the āIdealistic Supporter.ā¦
…
continue reading

1
Leadership Lounge: Leadership Under Fire: How Mentorship Can Help C-suites Turn Headwinds Into Opportunity
18:59
18:59
Play later
Play later
Lists
Like
Liked
18:59C-suite executives face an unprecedented cascade of simultaneous challengesāAI transformation, regulatory upheaval, geopolitical instability, and economic turbulence. Unlike previous generations who weathered single crises, todayās leaders must navigate sustained uncertainty that many have never experienced before. So, how can the right mentor tranā¦
…
continue reading

1
SANS Stormcast Wednesday, August 13th, 2025: Microsoft Patch Tuesday; libarchive vulnerability upgrade; Adobe Patches
8:55
8:55
Play later
Play later
Lists
Like
Liked
8:55Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compressionā¦
…
continue reading

1
Open Source Security: OSTIF's 10-Year Journey of Collaborative Audits
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30In this episode of "What's in the SOSS," Derek Zimmer and Amir Montezari from the Open Source Technology Improvement Fund (OSTIF) discuss their decade-long mission of providing security resources to open source projects. They focus on collaborative, maintainer-centric security audits that help projects improve their security posture through expert ā¦
…
continue reading

1
Are You the Same Person in Private? How Authentic Leaders Align Identity and Impact
16:13
16:13
Play later
Play later
Lists
Like
Liked
16:13Are your public and private identities aligned? Discover how to lead from within in this episode of Elevate Wellness. Subscribe for more! What Youāll Learn: The distinction between public identity vs. private identity. How to challenge outdated processes in health, leadership, and life. The 5 distinctions of true leadership: challenge, inspire, enaā¦
…
continue reading

1
93. Galvanizing is the Most Disruptive Genius
20:38
20:38
Play later
Play later
Lists
Like
Liked
20:38What makes galvanizing more disruptive than other Working Geniuses? In episode 93 of the Working Genius Podcast, Pat and Cody explore why galvanizing is the most disruptive of all the Working Geniuses. They unpack the nature of galvanizing as the only Genius that necessarily involves moving others, making it uniquely powerfulāand often misunderstooā¦
…
continue reading
Please enjoy this encore of Word Notes. The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits. CyberWire Glossary link: ā https://thecyberwire.com/glossary/pegasusā Audio reference link:ā āCybersecurity beyond the Headlines: A Conversatioā¦
…
continue reading

1
North Korean crypto theft, Microsoft rolls out back up, four charged in global scheme
9:07
9:07
Play later
Play later
Lists
Like
Liked
9:07North Korean crypto theft Microsoft rolls out PC back up during attack U.S. charges four in $100M global fraud scheme Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programsā¦we rely on point-in-ā¦
…
continue reading

1
SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto;
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number ofā¦
…
continue reading

1
EP 569: Pt. 2. Secure Love Starts Here: Dating with Boundaries, Clarity, and Confidence
41:31
41:31
Play later
Play later
Lists
Like
Liked
41:31š„³ Episode Links: Apply to the E.S.L. Program Here In this episode of the Let's Get Vulnerable podcast, we dive into the world of securely attached dating, focusing on how to effectively use dating apps. Discover practical advice on creating authentic profiles, setting boundaries, and maintaining a healthy mindset. This is part two of my series on sā¦
…
continue reading

1
Episode 227 | Aaron DeGagne, Senior Healthcare Analyst at PitchBook | Medtech Investment Insights & The Future of Health Innovation
39:48
39:48
Play later
Play later
Lists
Like
Liked
39:48In this episode, Duane Mancini welcomes to the show Aaron DeGagne, Healthcare Senior Analyst at PitchBook. From quarterly reports to market dynamics, Aaron sheds light on significant healthcare investments, including the rise in surgical tools, devices, and the blurring lines between healthtech and medtech. They delve into the impact of global markā¦
…
continue reading

1
DARPA code prize, ScarCruft adds ransomware, Columbia breach tally
8:21
8:21
Play later
Play later
Lists
Like
Liked
8:21DARPA awards $4 million prize for AI code review at DEF CON North Korea ScarCruft group adds ransomware to its activities Columbia University hack affects over 860,000 Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but whenā¦
…
continue reading

1
CWP: Navigating AI in Optometry: Purposeful Tech Adoption
21:07
21:07
Play later
Play later
Lists
Like
Liked
21:07Join Dr. Chris Wolfe as we delve into the role of AI in optometry practices. Discover insights from the Vision Source Gateway Tour, explore the balance between technology and human touch, and learn how to enhance patient care while embracing AI's potential. Tune in for actionable steps and thought-provoking discussions on the future of eye care Forā¦
…
continue reading

1
SANS Stormcast Monday, August 11th, 2025: Fake Tesla Preorders; Bad USB Cameras; Win-DoS Epidemic
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07Google Paid Ads for Fake Tesla Websites Someone is setting up fake Tesla lookalike websites that attempt to collect credit card data from unsuspecting users trying to preorder Tesla products. https://isc.sans.edu/diary/Google%20Paid%20Ads%20for%20Fake%20Tesla%20Websites/32186 Compromising USB Devices for Persistent Stealthy Access USB devices, likeā¦
…
continue reading

1
41 - 5 Simple Strategies To Control Your Anger
18:16
18:16
Play later
Play later
Lists
Like
Liked
18:16For more information on how to control your anger, visit angersecrets.com. What if you could stop anger before it spirals out of control? In this episode of The Anger Management Podcast, anger expert Alastair Duhs shares five powerful strategies to help you take control of anger in the heat of the momentābefore it causes lasting damage to your relaā¦
…
continue reading

1
Week in Review: UK LegalAid collapse, public ransomware approval, Salesforce breach impact
30:03
30:03
Play later
Play later
Lists
Like
Liked
30:03Link to episode page This weekās Cyber Security Headlines ā Week in Review is hosted by Rich Stroffolino with guest Montez Fitzpatrick, CISO, Navvis Thanks to our show sponsor, ThreatLocker ThreatLockerĀ® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. Thā¦
…
continue reading

1
Microsoft Unified Security Administration Deadline Approaching with Steve Longenecker
21:03
21:03
Play later
Play later
Lists
Like
Liked
21:03On September 30th Microsoft will only support a new unified multi-factor authentication control configuration. What does this mean for your nonprofit? In March 2023 Microsoft announced that after September 30th, 2025, they would no longer automatically support ālegacyā multi-factor authentication controls in the Microsoft 365 Entra ID and General Aā¦
…
continue reading

1
Hybrid Exchange flaw, France telecom breach, Dialysis company attack
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44Microsoft warns of high-severity flaw in hybrid Exchange deployments Franceās third-largest mobile operator suffers breach Dialysis companyās April attack affects 900,000 people Huge thanks to our sponsor, ThreatLocker ThreatLockerĀ® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-dā¦
…
continue reading

1
SANS Stormcast Friday, August 8th, 2025:: ASN43350 Mass Scans; HTTP1.1 Must Die; Hyprid Exchange Vuln; Sonicwall Update; SANS.edu Research: OSS Security and Shifting Left
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59Mass Internet Scanning from ASN 43350 Our undergraduate intern Duncan Woosley wrote up aggressive scans from ASN 43350 https://isc.sans.edu/diary/Mass+Internet+Scanning+from+ASN+43350+Guest+Diary/32180/#comments HTTP/1.1 Desync Attacks Portswigger released details about new types of HTTP/1.1 desync attacks it uncovered. These attacks are particularā¦
…
continue reading
Why should hate AI When firmware attacks The 300 second breach Old ways still work, AI might help And so begins the crawler wars Turn off your SonicWall VPN Your Pie may be wrapped in PII Attackers will find a way Signed kernel drivers D-Link on the KEV Rasperry PIs attack Stealthy LoRa LLM's don't commit code, people do Jame's Bond style rescue wiā¦
…
continue reading

1
AWP: How Virtual Team Members Unlocked 78% Service Growth and 20 Extra Hours per Week
59:37
59:37
Play later
Play later
Lists
Like
Liked
59:37In this episode of The Aaron Werner Podcast, the team at Teem joins Aaron to share a compelling case study featuring Dr. Allen Chung and the transformative impact virtual assistants have had on his optometry practice. We unpack how Dr. Chung leveraged Teemās support to drive a 38% increase in revenue over the course of a yearāall while saving nearlā¦
…
continue reading

1
Gemini AI hijacked, Nvidia rejects AI chip backdoors, phishers abuse Microsoft 365
6:23
6:23
Play later
Play later
Lists
Like
Liked
6:23Hackers hijacked Googleās Gemini AI with a poisoned calendar invite to take over a smart home Nvidia rejects US demand for backdoors in AI chips Google says hackers stole its customersā data by breaching its Salesforce database Huge thanks to our sponsor, ThreatLocker ThreatLockerĀ® is a global leader in Zero Trust endpoint security, offering cybersā¦
…
continue reading

1
EP 21: Conflict Styles: How You Fight & Why It Matters
37:54
37:54
Play later
Play later
Lists
Like
Liked
37:54In this episode of Relational Lives, Ali and Ros explore the three most common conflict styles that show up in relationships: blame-blame, attack-withdraw, and withdraw-withdraw. With warmth, insight, and lived experience, they help listeners identify their own patterns, understand the emotional drivers underneath, and reflect on how these cycles aā¦
…
continue reading
This week, our hostsā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā ā Dave Bittnerā ā ā ā ā ā , ā ā ā ā ā ā ā ā ā ā ā Joe Carriganā ā ā ā ā ā ā ā ā ā ā , and ā ā ā ā ā ā ā ā ā ā ā Maria Varmazisā ā ā ā ā ā ā ā ā ā ā (also host of the ā ā ā ā ā ā ā ā ā ā ā T-Minusā ā ā ā ā ā ā ā ā ā ā Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some ā¦
…
continue reading

1
SANS Stormcast Thursday, August 7th, 2025: Sextortion Update; Adobe and Trend Micro release emergency patches
5:06
5:06
Play later
Play later
Lists
Like
Liked
5:06Do Sextortion Scams Still Work in 2025? Jan looked at recent sextortion emails to check if any of the crypto addresses in these emails received deposits. Sadly, some did, so these scams still work. https://isc.sans.edu/diary/Do%20sextortion%20scams%20still%20work%20in%202025%3F/32178 Akira Ransomware Group s use of Drivers Guidepoint Security obserā¦
…
continue reading

1
EP 568: Pt 1. Secure Love Starts Here: Dating with Boundaries, Clarity, and Confidence
29:09
29:09
Play later
Play later
Lists
Like
Liked
29:09š„³ Episode Links: Apply to the E.S.L. Program Here In this episode, Iām sharing the core shifts that help you date from a place of secure attachment. Whether youāre constantly second-guessing yourself, confused by mixed signals, or struggling to set boundaries, youāre not alone. Iāll walk you through how to slow things down, honor your needs, and buā¦
…
continue reading

1
PBS confirms data breach, TSMC fires engineers over theft, Cloudflare: Perplexity is web scraping
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04PBS confirms data breach after employee info leaked on Discord servers TSMC fires engineers over suspected semiconductor secrets theft Cloudflare on Perplexity web scraping techniques to avoid robot.txt and network blocks Huge thanks to our sponsor, ThreatLocker ThreatLockerĀ® is a global leader in Zero Trust endpoint security, offering cybersecuritā¦
…
continue reading

1
Ep. 55 The Myth of the Perfect Leader: Embracing Vulnerability in Leadership
20:03
20:03
Play later
Play later
Lists
Like
Liked
20:03In this episode, we delve into the pervasive myth that a perfect leader existsāsomeone who has all the answers and never makes mistakes. Our hosts, Sameer and Ismail, discuss the pressures leaders face to appear flawless and the implications of this mindset on their effectiveness and authenticity. They explore the importance of vulnerability, the iā¦
…
continue reading

1
SANS Stormcast Wednesday, August 6th, 2025: Machinekeys and VIEWSTATEs; Perplexity Unethical Learning; SonicWall Updates
7:41
7:41
Play later
Play later
Lists
Like
Liked
7:41Stealing Machinekeys for fun and profit (or riding the SharePoint wave) Bojan explains in detail how .NET uses Machine Keys to protect the VIEWSTATE, and how to abuse the VIEWSTATE for code execution if the Machine Keys are lost. https://isc.sans.edu/diary/Stealing%20Machine%20Keys%20for%20fun%20and%20profit%20%28or%20riding%20the%20SharePoint%20waā¦
…
continue reading
āWe Speak CVEā podcast host Shannon Sabens chats with CVEā¢/CWE⢠Project Lead Alec Summers and CWE Top 25 task lead/CWE Root Causes Mapping Working Group lead Connor Mullaly about the importance of mapping CVE Records (vulnerabilities) to their technical root causes using Common Weakness Enumeration (CWE). Additional topics include the benefits of Rā¦
…
continue reading