Think Cyber Secure public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Think Cyber Secure

Think Cyber Secure

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
  continue reading
 
Artwork

1
Ahead of the Threat

Federal Bureau of Investigation

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
  continue reading
 
Introducing The Cyber Translator, a 10-minute podcast designed for busy business leaders who want to bridge the gap between cybersecurity, technology, and business strategy. Hosted by Sean Hanna, this podcast cuts through the complexity of cyber technology, risk, and governance, translating it into practical, actionable insights that drive real business value. Each episode helps business leaders understand "technology speak" and shows them how to turn cybersecurity and compliance into opport ...
  continue reading
 
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. ...
  continue reading
 
Artwork

1
Cyber Security Interviews

Douglas A. Brush | Weekly Interviews w/ InfoSec Pros

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork
 
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork
 
This is the She Said Privacy / He Said Security podcast with Jodi and Justin Daniels. Like any good marriage, Jodi and Justin will debate, evaluate, and sometimes quarrel about how privacy and security impact business in the 21st century.
  continue reading
 
Artwork

1
Security Explained

Chris Grayson, Drew Porter, Logan Lamb

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.
  continue reading
 
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
  continue reading
 
Artwork

1
Alongside

NorthStandard

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
NorthStandard‘s podcast features thought-provoking discussions on news and topics in the maritime industry. We talk with experts from the club and special guests in the field from around the world
  continue reading
 
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
  continue reading
 
Artwork

1
Security Voices

Security Voices

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
Artwork

1
CEO Tech Live

Hexaware and Ben Fanning

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
CEO TECH LIVE is where the greatest minds in business and tech share their hard-earned lessons, insights, and stories. These are the change champions of industry. You'll discover the keys to success for leading innovation, growth, and stability within your organization. The podcast is powered by Hexaware--the world's most loved digital transformation partner, who seeks to create smiles through great people and technology. https://hexaware.com/
  continue reading
 
At AARP California, we are so much more than our membership card and ‘In Clear Terms’ is all about informing you about the great things that we do for Californians of all ages. This podcast will cover news that you can use as you think about healthcare, retirement savings, caregiving, new technology, and legislation you should be aware of that we are engaged in on your behalf. Join Thyonne Gordon for conversations that are fun and thought provoking with community leaders, thought leaders, el ...
  continue reading
 
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
  continue reading
 
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
  continue reading
 
Artwork

1
ChooseFI

ChooseFI

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
How would your life change if you reached Financial Independence and got to the point where working is optional? What actions can you take today to make that not just possible but probable. Jonathan & Brad explore the tactics that the FI community uses to reclaim decades of their lives. They discuss reducing expenses, crushing debt, tax optimization, building passive income streams through online businesses and real estate and how to travel the world for free. Every episode is packed with ac ...
  continue reading
 
Artwork

1
A Better Peace: The War Room Podcast

A Better Peace: The War Room Podcast

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
This is the podcast of WAR ROOM, the official online journal of the U.S. Army War College. Join us for provocative discussions about U.S. national security and defense, featuring prominent national security and military professionals.
  continue reading
 
Lawyers from international law firm Pinsent Masons discuss the latest news in the world of business law. We analyse rulings, laws, news events and trends to help organisations navigate a complicated and fast-moving world of business law and regulations. Every fortnight in these 20 minute episodes we give expert guidance to keep you ahead of your competition and to help you meet the challenges ahead. Listen and subscribe for the latest news and analysis on legal and regulatory issues from exp ...
  continue reading
 
Now that's IT: Stories of MSP Success dives into the journeys of some of the trailblazers in the Managed Service Provider industry to find out how they used their passion for technology to help turn Managed Services into the thriving sector it is today. Every episode is packed with the valuable insights, practical strategies, and inspiring anecdotes that lead our guests to the transformative moment when they knew, Now, That's IT. This podcast provides educational information about issues tha ...
  continue reading
 
Artwork

1
The Hack Podcast

Leon McQuade Paul Longley Dean Bulfield

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Hack Podcast, straight-talk smart tech. Leon McQuade, Paul Longely and Dean Bulfeild bring a leader’s eye over technology drivers shaping the world back to East Yorkshire. We now live in a dazzling world of screens that continues to revolutionise how we live, work and play. The futures arriving faster than ever before, it's time to Think Different. We talk transformation and change focusing on People, Process and Technology. Originally Inspired By Pete Lindsay and Mark Bawden's Book “Pig ...
  continue reading
 
Essential listening for the broadcast production, journalism and technology communities. Your guide to everything from editorial and craft skills to taking your next step in the industry. Practical advice on all aspects of TV, radio, journalism.
  continue reading
 
Loading …
show series
 
Host David Mauro interviews Dr. Feleks Kravetz, US citizen who migrated from the former USSR and founder of Cuber Security Easy. We discuss: 🎯protecting yourself online, 🎯cybersecurity risks for families, and 🎯the importance of cybersecurity awareness. Find Dr. Felix and his mission to raise awareness for all here: 🌐 Website: https://www.CyberSecur…
  continue reading
 
Todd Renner is a seasoned cybersecurity professional with over 25 years of experience leading global cyber investigations, incident response efforts, and digital asset recovery operations. He advises clients on a wide range of cybersecurity and data privacy matters, combining deep technical knowledge with a strategic understanding of risk, complian…
  continue reading
 
Recorded Live at the Canopy Hotel during the RSAC Conference in San Francisco, David Moulton speaks with Noelle Russell, CEO of the AI Leadership Institute and a leading voice in responsible AI. Drawing from her new book Scaling Responsible AI, Noelle explains why early-stage AI projects must move beyond hype to operational maturity—addressing accu…
  continue reading
 
In this episode of In Clear Terms with AARP California, host Dr. Thyonne Gordon speaks with Dr. Brandie Nonnecke, Director of the CITRIS Policy Lab and host of TecHype, about the latest developments in artificial intelligence. They break down what AI really is — beyond the hype — and how it’s already impacting daily life, public services, and even …
  continue reading
 
At Knowledge 2025, the spotlight is on big announcements and bold innovations—but we’re taking you behind the scene!. In this two-part special, we dive into the engine driving ServiceNow’s evolution, with exclusive conversations you won’t hear on the main stage. In Part 2, Dave, Esmee, and Rob speak with Amanda Joslin, Senior Director of Platform a…
  continue reading
 
At Knowledge 2025, the spotlight is on big announcements and bold innovations—but we’re taking you behind the scene!. In this two-part special, we dive into the engine driving ServiceNow’s evolution, with exclusive conversations you won’t hear on the main stage. In Part 1, Dave, Esmee, and Rob sit down with Karel van der Poel, SVP of Products at Se…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analyst John and threat hunter Tristan as they discuss: Scattered Spider Attacks UK Retail Orgs Bring Your Own Installer SentinelOne Bypass Hunting for North Korean Insiders Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research …
  continue reading
 
Ever feel like the faster you develop, the harder it gets to stay secure? You're not alone—and you're certainly not imagining things! In this episode of Cyber After Hours—Security in the DevOps Era: Balancing Speed and Safety—Paul and Evan are joined by Josh Dixon for a lively discussion that starts with relatable confessions about battling imposte…
  continue reading
 
One of the interesting things is there's no agreement domestically among civilians and military or internationally about what strategy is.Each year, while the military senior service schools compete upon the fields of friendly strife in the event known as Jim Thorpe Sports Days, the U.S. Army War College hosts a different kind of contest: The Annua…
  continue reading
 
In this mailbag episode, Brad and Rachael dive deep into strategies for efficiently withdrawing money from taxable brokerage and retirement accounts. With a focus on understanding the different tax treatments associated with these accounts, listeners gain crucial insights into managing tax liabilities for retirement. Key Takeaways Different Types o…
  continue reading
 
Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro interviews Aaron and discusses id…
  continue reading
 
Jodi Daniels is the Founder and CEO of Red Clover Advisors, a privacy consultancy, that integrates data privacy strategy and compliance into a flexible, scalable approach that simplifies complex privacy challenges. A Certified Information Privacy Professional, Jodi brings over 27 years of experience in privacy, marketing, strategy, and finance acro…
  continue reading
 
In this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outdated OT environments. Wendi shares critical insights on how nation-state threats have evolved, why AI must be part of moder…
  continue reading
 
TechnoVision 2025 by Capgemini helps business leaders and technologists understand and prioritize emerging technologies. It provides a clear view of tech trends, guiding decision-makers to enhance organizational effectiveness. TechnoVision acts as a beacon in the evolving technology landscape. In this very special episode, Dave, Esmee, and Rob talk…
  continue reading
 
Rural Healthcare and small/midsized businesses are being tipped over the edge. Not by Tariffs or high interest rates, but by investments needed into protecting their people and systems from disruption. How can you protect yourself from something you don’t know? A risk you don’t understand. What if you could think like a hacker… and use that power t…
  continue reading
 
Are you an expert in communications? Do you need communications help? Are you ready for how to communicate to employees, the government, or your customers if a crisis happens? Many agencies believe they have it covered, but when a crisis does happen, the reality comes into focus that communications is a more nuanced and involved part of a response.…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss: ReliaQuest's Discovery of Critical SAP NetWeaver Vulnerability AI Upgrade for Darcula Phishing Kit DragonForce's New Cartel Business Model Maximum Severity Commvault flaw Kim Bromley: Senior Cyber Threa…
  continue reading
 
Ever wonder if hype cycles fuel genuine innovation or just add to the noise? In this lively Episode 23 of Cyber After Hours—titled “Do Hype Cycles Help or Hurt?”—Evan and Paul kick things off with some personal updates and practical productivity pointers (including a radical approach to inbox management) before tackling one of tech’s most debated t…
  continue reading
 
Join the conversation with the ChooseFI community on the brand NEW ChooseFI Members Site and participate in discussions about budgeting, travel rewards, and obviously all things financial independence! Register Your Free Account See the Group Discussion Ginger Mentioned in this Episode Hi, all! Ginger here. Brad and I discussed minimalism a bit, an…
  continue reading
 
We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation …
  continue reading
 
📲 Got a DM from the “FBI” on Telegram? 🚨 Did someone named “Jaimie Quin” claim they run IC3? ⚠️ It’s a scam. Full stop. The FBI just issued an alert warning the public: They are NOT direct messaging victims on Telegram or any other social media app. A scammer posing as “Jaimie Quin” is pretending to be the head of the FBI’s Internet Crime Complaint…
  continue reading
 
Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure 03:11 Vulnerabilities and Weaknesses in Critical Infrastructure 10:0…
  continue reading
 
👀 Could your next Google search lead you into a cyber trap? 🔐 Are you sure that “HR login” link isn’t a fake? 🚨 The FBI just issued a Public Service Announcement warning EVERYONE — yes, even you — that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals). Here’s how it works: ⚠️ Fraudsters buy sea…
  continue reading
 
📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real? 🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing. 🕵️‍♂️ Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google. ✅ No misspellings ✅ No suspicious …
  continue reading
 
Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in em…
  continue reading
 
In this episode of Threat Vector, host David Moulton speaks with Daniel B. Rosenzweig, a leading data privacy and AI attorney, about the growing complexity of privacy compliance in the era of big data and artificial intelligence. Dan explains how businesses can build trust by aligning technical operations with legal obligations—what he calls “say w…
  continue reading
 
When John McCoy walked away from a high-paying corporate job, he wasn’t chasing freedom—he was answering a calling. In this episode, John shares how his commitment to helping others led him to launch MidSolv, an MSP rooted in community and built on trust. But it wasn’t until he caught a ransomware attack in real time that his purpose fully crystall…
  continue reading
 
David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters 00:00 The Reality of Cybercri…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and John as they discuss: BreachForums Down: Dark Storm Team Takes Credit A Potential New Vulnerability in SAP NetWeaver Exploit User Targets Salesforce Data ReliaQuest Research: Understanding Chinese Espionage Strategies Kim Bromley: Senior Cyber …
  continue reading
 
Ever wonder if Security Orchestration, Automation, and Response (SOAR) is truly essential—or just another buzzword in cybersecurity? In this episode of Cyber After Hours—SOAR: Hype or Necessity?—Paul and Evan sit down with Josh Lawson to unpack exactly that, starting with some amusing (and insightful) stories on workplace culture and how company dy…
  continue reading
 
It's time to talk about the Harding Project once again. The project is the Chief of Staff of the Army's (CSA) effort to renew professional publications, strengthen the profession, and ultimately enhance the warfighting capability of the U.S. Army. Jake Larkowich, Deputy Commandant of the U.S. Army War College and associate editor for War Room, step…
  continue reading
 
Whether putting pen to paper or fingers to the keyboard, writing clarifies and improves ideas while also allowing those thoughts to be shared with others. But the idea of publishing one's thoughts can be intimidating. Why does it seem so hard to get thoughts down on paper? And how do you approach an editor? How do you even get started? Zach Griffit…
  continue reading
 
In this episode of ChooseFI, Brad Barrett is joined by Mindy from BiggerPockets Money and Chris from Can I Retire Yet? to explore the concept of the "middle-class trap." They discuss the challenges faced by many middle-class individuals who appear wealthy on paper, yet find themselves financially restricted due to their assets being tied up in home…
  continue reading
 
Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today,…
  continue reading
 
Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Ha…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play