Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Cyber Sitrep brings you all the latest cybersecurity news, commentary, and threat intelligence. Focused on small to midsize businesses who we feel have been left behind. Hosted by Eric from Corvus Technologies and Mike from Digital Beachhead who bring their unique perspective based on their military and cybersecurity experience. If you want to understand more about how cybersecurity is important to your organization, enjoy funny tales or just want to learn more about the field of cybersecuri ...
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Email feedback and show ideas to [email protected]. Join us as we examine the next major tech cycle, uncover emerging global tech hubs, and analyze where VC investment d ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
…
continue reading
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
Introducing The Cyber Translator, a 10-minute podcast designed for busy business leaders who want to bridge the gap between cybersecurity, technology, and business strategy. Hosted by Sean Hanna, this podcast cuts through the complexity of cyber technology, risk, and governance, translating it into practical, actionable insights that drive real business value. Each episode helps business leaders understand "technology speak" and shows them how to turn cybersecurity and compliance into opport ...
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
Become a Paid Subscriber: https://podcasters.spotify.com/pod/show/siliconcurtain/subscribe A podcast about propaganda, digital disinformation, politics, corruption, hybrid warfare, weaponised conspiracy theories, social echo chambers and digital dystopias. 1984, Authoritarian, Autocracy, Autocrat, Big Brother, Brainwashing, Cold war, Cold war propaganda, Communism, Conflict, Conspiracy theories, Control, Cults, Cyber warfare, Deception, Dictator, Dictatorship, Digital dystopia, Digital media ...
…
continue reading
A critical look at new technologies, new approaches and new ways of thinking, from politics to media to environmental sustainability.
…
continue reading
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
This is your guide to navigating the ever-evolving world of cybersecurity. Hosted by Annie-Mei Forster and Anika Guenov, this podcast breaks down complex topics into relatable, easy-to-understand conversations. Whether you're a tech enthusiast, a curious newcomer, or a professional looking for fresh perspectives, join us as we explore cyber threats, digital safety tips, and the human stories behind the screen. Follow us on Instagram @thecybersecuritygals
…
continue reading
Join former House Speaker, professor, historian, and futurist Newt Gingrich as he shares his lifetime of knowledge and access to the world’s most interesting minds in a new series that covers all aspects of our society. From history to health, national security to science, Newt offers stories, conversations, and context to uncover new perspectives, knowledge and insight. This podcast isn’t about politics; it’s about exploring the past, present, and future to understand where we’ve been and w ...
…
continue reading
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
…
continue reading
The cyber security podcast from SE LABS ® - Understand cyber security and other security issues. Practical and insightful, our experts have experience in attacking and defending in the physical and digital worlds. Peek behind the curtain with Cyber Security DE:CODED.
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
…
continue reading
Raising Tech is your guide to understanding the role technology plays in your community, where to invest to transform culture, and how to bring your team and residents along the journey. Tune in to explore the latest tech trends, dive into hot topics, and hear from industry experts, community leaders, and innovative vendors shaping the senior living tech landscape. Each episode is packed with practical insights and real-world stories to help you spark change and level up your community’s tec ...
…
continue reading
Tune into "Privacy Please," where hosts Cam and Gabe engage with privacy and security professionals around the planet. They bring expert insights to the table and break down complicated tech stuff everyone can understand.
…
continue reading
Cyber Security doesn't have to be a daunting task. Everyone has the right to be more secure and enjoy some privacy while surfing the web. That's where we come in. We will give you simple yet effective ways of staying safe and private online. And we'll do it in a language you'll understand. Learn how to be Cyber Smart because Privacy Matters.
…
continue reading
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
…
continue reading
Bi-Weekly Cyber intellgence briefing, each episode includes update regrading some of the latest events happened in the cyber security world. This podcast is meant for people who wants to listen to a short (5 minute) overview about some of the latest events happened lately in the cyber world. The Podcast is not getting into technical details and anyone can understand.
…
continue reading
A podcast series aimed at helping Australians deepen their understanding of the local cyber security industry.
…
continue reading
Join Keith Marchiano, Senior Executive Coach & Program Manager for Sales Enablement at Pax8, for the Results Selling Framework (RSF) podcast. The RSF provides a robust foundation designed to enhance your engagements with potential prospects and existing clients. This strategy can revolutionize your MSP’s sales approach, helping you connect with buyers and understand the problems their businesses face. Tune in to learn how to elevate your sales game and achieve better results through a proven ...
…
continue reading
ABC News Daily is the podcast that helps you understand the issues affecting your world. Every episode, host Samantha Hawley walks through one story with the help of an ABC colleague or expert in under 15 minutes. When you want coverage you can trust, listen to ABC News Daily. Key topics of recent episodes include the Donald Trump administration, DOGE, Tesla, insurance costs, recession risks, egg shortages, DeepSeek, neo-Nazis, Putin and Xi, solar batteries, the jobs market, anti-Semitism, a ...
…
continue reading
The law affects our lives and our society in many unique and profound ways. Reasonably Speaking, produced by The American Law Institute, features interviews with legal experts on some of the most important legal topics of our time. Each episode takes you through the law in action, beyond courtrooms and casebooks. Whether you are a legal scholar or a concerned citizen, this examination of the relationship between our laws and our society will leave you with a better understanding of how we go ...
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
…
continue reading
Join George and Jim from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
…
continue reading
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
…
continue reading

1
Malwareception: SakuraRAT is a Backdoor to Trick Script Kiddies
6:32
6:32
Play later
Play later
Lists
Like
Liked
6:32Malware is everywhere, even inside of other malware. One tool advertising itself as an advanced remote access trojan ended up being much more, a backdoor infecting novice hackers. This was not just a one off, however, and lead to the discovery of a massive backdoored malware campaign infecting other hackers and gaming cheaters. Sources: https://pas…
…
continue reading

1
Ep. 308 - Human Element Series - Finding Common Ground With Lonnie Marts
33:35
33:35
Play later
Play later
Lists
Like
Liked
33:35Today we are joined by Lonnie Marts. Lonnie is an American creator, entertainer, and host known for his magnetic charm and comedic storytelling. His unique ability to engage audiences has catapulted him to digital stardom, with nearly 3 million highly engaged fans tuning in daily for his comedic skits and feel-good content on social media. A gradua…
…
continue reading

1
738. Zarina Zabrisky - Russia is Training Killers in a Human Safari Being Inflicted on Kherson City Daily
42:43
42:43
Play later
Play later
Lists
Like
Liked
42:43The United Nations has confirmed what residents of Kherson, and Zarina Zabrisky, revealed nearly a year ago: Russia’s drone attacks on civilians were systematic, premeditated and intended to instil terror and forcibly displace the population. A deliberate war crime. ----------Zarina Zabrisky is an American writer based in the Bay Area, California. …
…
continue reading

1
Why Trump and Musk were stronger together
14:31
14:31
Play later
Play later
Lists
Like
Liked
14:31The explosive break-up of Donald Trump and Elon Musk has been fascinating to watch as the pair trade insults and threats. Could there be a reconciliation between the president and the billionaire? Or could Elon Musk follow through on his threats to start backing other political forces? Musk’s space and satellite businesses are heavily involved in t…
…
continue reading

1
CCT 252: Logging and Monitoring Security Activities for the CISSP (Domain 7.2)
44:45
44:45
Play later
Play later
Lists
Like
Liked
44:45Send us a text Dive deep into the critical world of security logging and monitoring as we explore Domain 7.2 of the CISSP certification. This episode unpacks the strategic considerations behind effective logging practices that balance comprehensive visibility with practical resource management. We begin with a thought-provoking look at Anthropic's …
…
continue reading

1
Strictly Cyber EP 2 - Cyber security and people - Your Human Firewall
45:02
45:02
Play later
Play later
Lists
Like
Liked
45:02In this episode, we're shifting the focus from technology to people. When it comes to cyber security, your team can be your biggest asset. We'll break down why human error is one of the greatest risks to your business and how building a strong security culture is key to keeping your business safe. We'll also discuss a real life example of a situati…
…
continue reading

1
Silicon Bites #154 - Manufactured Provocation to Accelerate Authoritarian Slide in Trump's America
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47Edition No155 | 08-06-2025 - Let’s forget for a moment there are such things as Republicans and Democrats, one side and the other. Let’s simply look at the authoritarian timelines of regime such as those in Russia, Georgia, Hungary and Germany in the 1930s and others. At some point, regimes looking to consolidate their power, and limit democratic e…
…
continue reading

1
736. Denys Ganzha - 'Freedom is our Religion' - Why Ukraine Refuses to Submit to Tyranny and Oppression
54:52
54:52
Play later
Play later
Lists
Like
Liked
54:52Denys Ganzha joined CFC Big Ideas in 2019 and advanced rapidly from an intern to become Co-CEO now. Denys founded an NGO “Public Diplomacy Platform” which worked closely with the Ukrainian government on youth policy projects. The NGO set up more than 20 projects in nearly all regions of Ukraine and cooperated with such international partners as USA…
…
continue reading

1
Woodside’s massive gas extension explained
15:22
15:22
Play later
Play later
Lists
Like
Liked
15:22The oil and gas giant Woodside has been handed a big win by Labor, with the life of its massive gas plant in Western Australia extended until 2070. That’s great news for the company that wants to start extracting gas from a new basin off the WA coast. But given that almost all the gas is sent overseas, what’s it in for Australian taxpayers and what…
…
continue reading
Explores how APEX Accelerators and Project Spectrum, both DoD-funded resources collaborate to support small businesses in the Defense Industrial Base (DIB) with CMMC compliance. APEX provides hands-on, personalized guidance while Project Spectrum offers technical tools and training. Together, they form a coordinated support system to help contracto…
…
continue reading

1
Silicon Bites #154 - Victim Blaming - Trump Adopts Abusers' Defense - Enables Kremlin's Aggression
18:39
18:39
Play later
Play later
Lists
Like
Liked
18:39Edition No154 | 07-06-2025 - Trump was asked a simple question. One which any man with empathy, leadership qualities, or any human dignity would find simple to answer. His instinct was to reach for a classic rapists’ response, or defense. Ukraine was asking for it, he basically said. Trump was asked: Do Ukraine's strikes against Russian airfields c…
…
continue reading

1
Episode 850: Drone Attacks Escalate the War in Ukraine
26:36
26:36
Play later
Play later
Lists
Like
Liked
26:36Newt talks with Anatol Lieven, Director of the Eurasia Program at the Quincy Institute for Responsible Statecraft, about the escalating conflict between Ukraine and Russia, highlighting recent drone attacks by Ukraine on Russian aircraft and Russia's subsequent retaliatory strikes. Lieven provides insights into the historical and current dynamics o…
…
continue reading

1
Silicon Bites #153 - MAGA Meltdown as Civil War Erupts Between Trump & Musk - Popcorn is Obligatory.
17:38
17:38
Play later
Play later
Lists
Like
Liked
17:38Edition No153 | 06-06-2025 - Steve Bannon has launched an attack on Elon Musk, with absolute glee and viscous energy. “We’re going to go to f—ing war,” he exclaimed, following the feud between President Trump and the tech billionaire and world’s richest man. “The president treated him almost like a son. He invited his family to Christmas dinner. He…
…
continue reading

1
CYFIRMA Research: Firewalls and Frontlines- The India-Pakistan Cyber Battlefield Crisis
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47As tensions between India and Pakistan escalated in early 2025, the conflict spilled into cyberspace. In the wake of the April 22nd Kashmir attack and India’s Operation Sindoor, dozens of hacktivist groups launched a wave of digital assaults — from DDoS attacks and defacements to claimed data breaches — targeting critical infrastructure and governm…
…
continue reading

1
Episode 849: Education Inside U.S. and International Prisons
32:24
32:24
Play later
Play later
Lists
Like
Liked
32:24Newt talks with Gerard Robinson, a professor of practice at the Batten School of Leadership and Public Policy at the University of Virginia, about his recent article on how World War II influenced prison policy. Their conversation explores Robinson's experiences mentoring youth in the juvenile justice system and teaching fifth grade, which shaped h…
…
continue reading

1
Reassessing the laws of war; and why progress isn't always a straight line
28:39
28:39
Play later
Play later
Lists
Like
Liked
28:39The International commitment to ban landmines is wavering. Several European countries are reversing their opposition to using them. The shift comes as disarmament negotiators struggle to regulate the spread of "killer robots" — AI-controlled autonomous weapons. So, is the future of weapons containment and control under threat? And are treaties sign…
…
continue reading

1
718. Alya Shandra and Jonathan - Why Study Russia?
33:36
33:36
Play later
Play later
Lists
Like
Liked
33:36SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtain----------TRUSTED CHARITIES ON THE GROUND:Save Ukrainehttps://www.saveukraineua.org/Superhumans - Hospital for war traumashttps://superhumans.com/en/UNBROKEN - Treatment. Prosthesis. Rehabilitation for Ukrainians in Ukrainehttps://unbroken.org.ua/Co…
…
continue reading

1
716. Yevhen Hlibovytsky - Fruits of Evil Forces Appeased and Enabled - Lessons not Learned from History
22:21
22:21
Play later
Play later
Lists
Like
Liked
22:21Co-founder and head of the Frontier Institute – Ukrainian expert in long-term strategies and communications. Hlibovytsky is part of the Nestor and Univ interdisciplinary expert groups and serves on the Supervisory Board of the National Public Broadcasting Company of Ukraine. With experience as a journalist, TV host, and media manager, he now teache…
…
continue reading

1
Silicon Bites #152 - MAGA Meltdown as Musk Seeks Revenge on Trump in Epic Damaging Social Media Feud
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20Edition No152 | 05-06-2025 - Tensions between Elon Musk and Donald Trump seem to have been bubbling below the surface for days and have now erupted into the public realm. Not just a few traded barbs, but full-scale war (by social media) seems to have broken out, and it’s getting real ugly, real quickly. Buckle up, crack out the mega bucket of popco…
…
continue reading

1
Silicon Bites #151 - Trump Chickens Out Again in a Show of Endless Weakness and Appeasement of Putin
17:34
17:34
Play later
Play later
Lists
Like
Liked
17:34Edition No151 | 05-06-2025 - Trump is apparently annoyed with both Putin and Zelenskyy, according to aides, but his approbation and ire is especially reserved for Zelenskyy, who Trump is said to consider “a bad guy”, “who will lead the world to the brink of nuclear war.” This is a narrative likely planted in his head by Vladimir Putin, who has once…
…
continue reading

1
What the US warning on China means for our defence
15:28
15:28
Play later
Play later
Lists
Like
Liked
15:28Donald Trump is demanding America’s allies massively boost defence spending and US Defense Secretary Pete Hegseth says a Chinese invasion of Taiwan could be ‘imminent’. At the same time, the United Kingdom, one of Australia’s closest allies, is rushing to invest billions of dollars in its defence force to make sure it’s ‘war ready’. Today, Peter De…
…
continue reading

1
Blueprint for an AI Future: OpenAI Chief Economist on How AI Will Shape the Global Economy
52:18
52:18
Play later
Play later
Lists
Like
Liked
52:18Will AI displace more jobs than it creates? How can the U.S. win the AI race? How can AI benefits be evenly distributed across businesses and society? We explore these questions and more as Sriram Viswanathan sits down with Ronnie Chatterji, Chief Economist at OpenAI, for an in-depth exploration of AI's economic impact and policy implications. Ronn…
…
continue reading

1
CCT 251: Practice CISSP Questions - Security Control Testing, Vulnerability Assessments and Network Scanning (Domain 6.2)
19:53
19:53
Play later
Play later
Lists
Like
Liked
19:53Send us a text The boundaries between digital vulnerabilities and physical warfare are dissolving before our eyes. Ukrainian forces have dramatically shifted military paradigms by marrying cybersecurity breaches with commercial drone attacks against strategic Russian targets like Tupolev aircraft manufacturers. This evolution demands security profe…
…
continue reading
Send Bidemi a Text Message! In this episode, host Bidemi Ologunde spoke with Joshua Lauer, the Founder and CEO of Lauer Creations Inc. During the conversation, Joshua explained how companies can avoid drowning in meaningless data, how to get rid of messy manual processes and automate reports that focus on scaling, how to fix GA4 tracking issues to …
…
continue reading

1
97. Pacemakers Dance Team- Living Proof That Age Is Just a Number
43:34
43:34
Play later
Play later
Lists
Like
Liked
43:34In this uplifting and high-energy episode, host Amber Bardon welcomes the dynamic and inspiring Pacemakers Dance Team, a senior dance troupe breaking barriers and shaking up aging stereotypes one dance step at a time. Ranging in age from 60 to 86, these talented performers use hip hop, jazz, and tap to inspire audiences and redefine what it means t…
…
continue reading
In this episode of Threat Vector, host David Moulton talks with Arjun Bhatnagar, CEO of Cloaked, about why protecting your digital privacy is more urgent than ever. From building better cybersecurity habits to understanding the hidden risks in everyday apps, Arjun shares practical advice that listeners can use immediately. Learn how personal data i…
…
continue reading

1
CRSP05: Reimagining telecom industry pt.5 - Growth with Nik Willetts, TM Forum
38:43
38:43
Play later
Play later
Lists
Like
Liked
38:43The telecom industry is undergoing a fundamental transformation. This shift is creating new business opportunities and services but also brings significant challenges in transformation and modernization. In a new five-part mini-series, Reimagining Telecoms, we will explore these challenges through five distinct lenses: Growth, Networks, Simplificat…
…
continue reading

1
Sitrep Intel CyberNews: Unpacking the Latest in Cybersecurity
24:05
24:05
Play later
Play later
Lists
Like
Liked
24:05#cybersecuritynews #dataprotection #techinsights - In this episode of CyberSitrep, we delve into the latest developments in cybersecurity. Topics include recent data breaches, emerging threats, and expert insights into protecting digital assets. Stay informed with our in-depth analysis and discussions on the evolving landscape of cyber threats. Cyb…
…
continue reading

1
Alan Kohler on making housing a bad investment
14:34
14:34
Play later
Play later
Lists
Like
Liked
14:34Interest rates might be coming down, but house prices are heading in the other direction, once again. Given there is a major problem with housing affordability and there are so many people who can’t even afford to enter the market, who keeps pushing up prices? Today, the ABC’s finance expert Alan Kohler on why history is repeating and conditions ar…
…
continue reading

1
S6 E8: Cyber Warfare & Geopolitics: How Threat Actors Are Targeting America with David Cook
22:52
22:52
Play later
Play later
Lists
Like
Liked
22:52In this episode of 2 Cyber Chicks, we sit down with David Cook, Director of National Security at ShadowDragon, to discuss the intersection of intelligence, cybersecurity, and geopolitics. With the 2024 election cycle in full swing and tensions rising globally, cyber threats against the U.S. are more complex than ever. David, a seasoned national sec…
…
continue reading

1
Silicon Bites #150 - Putin's Bridge, Pride and Authority go Boom as SBU Attack Infamous Kerch Bridge
14:22
14:22
Play later
Play later
Lists
Like
Liked
14:22Edition No150 | 03-06-2025 - We’ll come to the extraordinary strike on the Kerch Bridge in a minute, but there has also been significant development in the so-called peace process. Or rather the mask has slipped, and Russia’s true purpose in engaging in the Istanbul process has been made abundantly clear by vodka-soaked political thug, Medvedev, Ru…
…
continue reading

1
CYFIRMA Research- Versa Concerto: Understanding and Mitigating CVE-2025-34027
4:27
4:27
Play later
Play later
Lists
Like
Liked
4:27Critical Alert: CVE-2025-34027 – Authentication Bypass + RCE in Versa Concerto! Organizations using Versa Concerto for network orchestration must take immediate action. This newly disclosed vulnerability allows unauthenticated attackers to bypass login mechanisms and gain remote code execution through exposed REST APIs. The flaw affects key authent…
…
continue reading

1
SN 1028: AI Vulnerability Hunting - Jailbreaking is Over
3:08:02
3:08:02
Play later
Play later
Lists
Like
Liked
3:08:02Pwn2Own 2025, Berlin results. PayPal seeks a "newly registered domains" patent. An expert iOS jailbreak developer gives up. The rising abuse of SVG images, via JavaScript. Interesting feedback from our listeners. Four classic science fiction movies not to miss. How OpenAI's o3 model discovered a 0-day in the Linux kernel Show Notes - https://www.gr…
…
continue reading
Pwn2Own 2025, Berlin results. PayPal seeks a "newly registered domains" patent. An expert iOS jailbreak developer gives up. The rising abuse of SVG images, via JavaScript. Interesting feedback from our listeners. Four classic science fiction movies not to miss. How OpenAI's o3 model discovered a 0-day in the Linux kernel Show Notes - https://www.gr…
…
continue reading

1
Can you supercharge security with a browser?
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41In this episode of Threat Vector, Ofer Ben‑Noon steps in as guest host to interview cybersecurity strategist Kirsten Davies. They explore why browsers now handle 85 percent of work and how that shift makes them the prime attack surface. Learn how phishing and session hijacks exploit low‑friction paths, why Zero Trust and enterprise browsers must wo…
…
continue reading

1
S6, E244: They didn't hack in, they just logged in: The LexisNexis Security Incident
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33Send us a text We explore the recent LexisNexus data breach that exposed sensitive personal information of over 364,000 individuals through a third-party platform accessing their GitHub account. This incident highlights critical vulnerabilities in how data brokers handle our most sensitive information and raises questions about regulatory oversight…
…
continue reading

1
Silicon Bites #149 - Finland Preparing for the Worst as Russia Rebuilds its Military Border Forces
10:19
10:19
Play later
Play later
Lists
Like
Liked
10:19Edition No149 | 03-06-2025 - Finland is ‘preparing for the worst’ as Russia expands military presence near border. Finland has said it expects Russia to further build up troops along their shared border when the war in Ukraine ends, after reports that Moscow had strengthened its military bases near the NATO frontier. Head of strategy of Finnish def…
…
continue reading

1
How Hackers Get In: Penetration Testing Secrets from the Front Line
26:24
26:24
Play later
Play later
Lists
Like
Liked
26:24Think your network is locked down? Think again. In this episode of Cyberside Chats, we’re joined by Tom Pohl, LMG Security’s head of penetration testing, whose team routinely gains domain admin access in over 90% of their engagements. How do they do it—and more importantly, how can you stop real attackers from doing the same? Tom shares the most co…
…
continue reading

1
Erin Patterson’s evidence about eating wild mushrooms
15:26
15:26
Play later
Play later
Lists
Like
Liked
15:26For a second day, the accused in the keenly watched mushroom murder trial has been questioned in court. Erin Patterson is accused of murdering her former in-laws Don and Gail Patterson along with Gail’s sister Heather Wilkinson with death cap mushrooms served at a beef wellington lunch in 2023. She denies the charges. Today, co-host of the Mushroom…
…
continue reading
A new ransomware! Lyrix Ransomware targets Windows systems, encrypting files and appending random 10-character extensions. Victims receive a README.txt ransom note demanding payment, threatening to leak stolen data. Strengthen robust defenses & comprehensive incident response now! Link to the Research Report: https://www.cyfirma.com/research/lyrix-…
…
continue reading

1
Ep. 11 How a Simple Question Launched a Cybersecurity Career with Alaina Lawson
40:30
40:30
Play later
Play later
Lists
Like
Liked
40:30In this episode of Lost in Cyberia, hosts Annie Mei and Anika are joined by Alaina Lawson, a Perth-based cybersecurity consultant. Alaina discusses her journey into cybersecurity, starting from her interest in IT during high school, influenced by her family background in IT. She shares how asking a simple question to a customer when she was working…
…
continue reading

1
Build your own pen testing tools and master red teaming tactics | Ed Williams
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Ed Williams, Vice President of EMEA Consulting and Professional Services (CPS) at TrustWave, shares his two decades of pentesting and red teaming experience with Cyber Work li…
…
continue reading

1
MSP Customers Face Ransomware after Remote Assist Tool Compromised
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07Using an MSP can be handy for getting your IT set up or managing technical support without hiring a lot of full time staff, but there are risks that can come with outsourcing your IT to a third party. One MSP was compromised, leading to many customers having ransomware headaches. Sources: https://pastebin.com/hLKSqRaS…
…
continue reading

1
Is it really the end for Elon Musk and Trump?
15:14
15:14
Play later
Play later
Lists
Like
Liked
15:14Elon Musk has spent a lot of time inside the Oval Office since Donald Trump returned to the White House. It was from there that the world’s richest man, sporting a black eye, was farewelled from his role in the Trump administration on Friday. He insists his so-called Department of Government Efficiency, or DOGE, has made great progress, cutting mor…
…
continue reading

1
Preparing for Beyond, Embracing AI, and Busting Through Your Next Plateau | Results Selling Framework Podcast Episode 21
36:21
36:21
Play later
Play later
Lists
Like
Liked
36:21In this episode, Keith Marchiano interviews Rex Frank, a visionary in the MSP space and VP of Academy at Pax8. They discuss the evolution of the IT services industry, the importance of attending industry events, and the future of AI in the MSP realm. Rex shares his journey from technician to service executive and the lessons learned along the way. …
…
continue reading

1
Reputation is Everything: How AI and Domain Security Shape Today's Threat Landscape
55:13
55:13
Play later
Play later
Lists
Like
Liked
55:13Send us a text Ihab Shraim shares his expertise on domain security and why it represents the "missing chapter" in modern cybersecurity strategy. We explore how AI is accelerating cyber threats from years to weeks and why protecting your online presence is more critical than ever. • Domain security is often overlooked despite being critical to an or…
…
continue reading
In this tech tutorial episode, Michael Lynn walks you through everything you need to know about using Uber. From downloading the app to booking your first ride, Michael covers it all in a clear and friendly way. He also shares pro tips for safety, setting up payment, and why linking your phone number can make your experience smoother. What You’ll L…
…
continue reading