Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Analyst Podcasts

show episodes
 
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
  continue reading
 
Artwork

1
Cloud Realities

Capgemini

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
  continue reading
 
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Exploring threats to global stability from Ukraine to China to the Middle East with host Gavin Esler – former BBC News presenter, Washington correspondent and host of Newsnight – plus Ukraine-based war reporter Oz Katerji and independent conflict analyst Emma Beals. This Is Not A Drill dives deep into the dangers, corruption, conflicts, disinformation, rivalries and ruthless realpolitik that are making our world ever more dangerous. Support This Is Not A Drill on Patreon from just £3 per mon ...
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Artwork

1
CyberSpeak's Podcast

Bret Padres and Ovie Carroll

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted by two former federal agents who investigated computer crime, this is a technology Podcast covering Computer Security, Computer Crime and Computer Forensics Topics.
  continue reading
 
The CYSA Audio Course is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
  continue reading
 
Artwork

1
The Cyber Hub

Techie Pedias

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Dipanshu Parashar is a Blogger || influencer || Author || digital marketer. He brings out the best tech stories and shares the difficult moments which made his journey a huge success. He is currently India's youngest Cybersecurity author and security analyst.
  continue reading
 
Machine learning and artificial intelligence are dramatically changing the way businesses operate and people live. The TWIML AI Podcast brings the top minds and ideas from the world of ML and AI to a broad and influential community of ML/AI researchers, data scientists, engineers and tech-savvy business and IT leaders. Hosted by Sam Charrington, a sought after industry analyst, speaker, commentator and thought leader. Technologies covered include machine learning, artificial intelligence, de ...
  continue reading
 
Artwork

1
Dear Infosec

ISF Analyst Insight Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
  continue reading
 
Welcome to Sibylline Insight, the podcast where we delve into the intricate world of global intelligence and geopolitics. Join our hosts as they sit down with members of the Global Intelligence Team to provide in-depth analysis and context to the most pressing geopolitical developments of our time. Each episode features long-form interviews that unravel the complexities behind current events, offering listeners a unique perspective on international affairs. Whether you’re a seasoned analyst ...
  continue reading
 
Artwork
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
Artwork

1
The Gay Johnny Bravo

The Gay Johnny Bravo

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
“When men have realized that time has upset many fighting faiths, they may come to believe even more than they believe the very foundations of their own conduct that the ultimate good desired is better reached by free trade in ideas — that the best test of truth is the power of the thought to get itself accepted in the competition of the market” - Supreme Court Justice Oliver Wendell Holmes Jr., Abrams v. United States (1919) Some of the most important issues that face society today are diff ...
  continue reading
 
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
  continue reading
 
Artwork

1
BCG on Compliance

Boston Consulting Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
What are today’s most pressing criminal trends and how are compliance experts adapting to counter those threats? As financial crimes become increasingly sophisticated, compliance can no longer be just a checkbox. It’s emerged as a transformative force in every industry, reshaping practices in ethics, risk management, money laundering and cyber security. Introducing BCG on Compliance, a biweekly podcast from Boston Consulting Group where we dive deep into the minds driving that change. Hosted ...
  continue reading
 
Artwork
 
A gripping financial technology spy thriller. Produced by a former CIA officer. *****YOU CAN NOW BINGE SEASON 1. SEASON 2 IS FORTHCOMING***** The story: Jabbari Lincoln is the CIA’s top financial analyst. He happens to be Muslim. And he’s at the top of his professional game when he is unfairly suspected of being disloyal to the United States and gets suspended by the Agency. Dejected and disgraced, he takes on a central bank consulting gig in Nigeria. But as he uncovers a sophisticated cyber ...
  continue reading
 
Artwork

1
H4unt3d Hacker

H4unt3d Hacker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
The H4unt3d Hacker podcast is an idea that came to be from a conversation over a glass of bourbon. We bring you REAL talk about cybersecurity. Want to know how hackers see the world and events? Then tune in and go on a trip with the H4unt3d Hackers in their hoppin H4unt3d house. Mike Jones "H4unt3d" Mike is a former hacktivist, red teamer, SIGINT operator and intelligence analyst. Mike left the world of illegal hacking to help businesses and individuals learn how and why they are attacked an ...
  continue reading
 
Artwork

1
The Digital Forensics Files Podcast

Tyler Hatch, B.A., LL.B.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
  continue reading
 
Artwork

1
The TechTual Talk

Henri Davis, The Radcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
  continue reading
 
Artwork

1
Motor Trade Radio

Motor Trade Radio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Motor trade radio is your internet radio show dedicated to the global automotive industry. Each week we bring you guests from all over the world who have lived and breathed the auto industry.
  continue reading
 
Artwork

1
AnalystANGLE

SiliconANGLE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Offical Podcast feed for SiliconANGLE Media's podcast where our hosts and guests reflect upon the many events the CUBE provides coverage for. @theCUBE@dvellante@stu@furrier
  continue reading
 
Loading …
show series
 
Distracting the Analyst for Fun and Profit Our undergraduate intern, Tyler House analyzed what may have been a small DoS attack that was likely more meant to distract than to actually cause a denial of service https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Distracting%20the%20Analyst%20for%20Fun%20and%20Profit/32308 GitHub s plan for a more secur…
  continue reading
 
New DShield Support Slack Workspace Due to an error on Salesforce s side, we had to create a new Slack Workspace for DShield support. https://isc.sans.edu/diary/New%20DShield%20Support%20Slack/32376 Attackers Exploiting Recently Patched Cisco SNMP Flaw (CVE-2025-20352) Trend Micro published details explaining how attackers took advantage of a recen…
  continue reading
 
*Declassified Club exclusive: SUBSCRIBE⁠⁠ to listen to the full series* Who really killed John F. Kennedy in Dallas on 22 November 1963? Did the CIA have a vendetta against the 35th President of the United States after their failure against Castro in Cuba? Or was Lee Harvey Oswald just a lone gunman with a need for "justice"? Listen as David and Go…
  continue reading
 
Cyber attacks are on the rise and the threats impact us all. Which countries are leading these moves and how can we combat them? Britain’s National Cyber Security Centre says that the UK faced four ‘nationally significant’ attacks a week on average in the past year. It adds that China poses a "capable" cyber threat, "targeting a wide range of secto…
  continue reading
 
In 'Access All Areas' shows we go behind the scenes with the crew and their friends as they dive into complex challenges that organisations face—sometimes getting a little messy along the way. We’re launching a special AI mini-series exploring how artificial intelligence is reshaping industries. Each episode dives into key themes like scaling AI, s…
  continue reading
 
Clipboard Image Stealer Xavier presents an infostealer in Python that steals images from the clipboard. https://isc.sans.edu/diary/Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer/32372 F5 Compromise F5 announced a wide-ranging compromise today. Source code and information about unpatched vulnerabilities were stolen. https://my.f5.co…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk How long could Flax Typhoon nestle silently in your networks? Join host Kim along with intelligence analysts John & Joey as they discuss: Velociraptor Abused in Ransomware Attacks (1:13) New Oracle E-business Suite Flaw (5:19) GitHub CamoLeak AI Attack (7:46) Year-Long Flax Typhoon ArcGIS Campaign (…
  continue reading
 
Got a question or comment? Message us here! In this week’s #SOCBrief, Hickman and Peters break down Obscura ... a new ransomware variant making waves with aggressive evasion tactics, process terminations, and domain controller targeting. We cover what’s known so far, the risks it poses to businesses, and the key defenses every SOC should prioritize…
  continue reading
 
Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivanti Advisory Ivanti released an advisory with some mitigation steps users can take until the recently m…
  continue reading
 
"I think about it as little as possible ." That was President John F. Kennedy's revealing answer when asked about the impending "damned invasion" of Cuba. Despite his reservations and persistent requests to tone it down, the operation is moving forward. Join Gordon and David as they detail the plan to topple Castro within weeks. Learn why the CIA f…
  continue reading
 
In this episode, we're joined by Kunle Olukotun, professor of electrical engineering and computer science at Stanford University and co-founder and chief technologist at Sambanova Systems, to discuss reconfigurable dataflow architectures for AI inference. Kunle explains the core idea of building computers that are dynamically configured to match th…
  continue reading
 
Data science meets threat intelligence in this fascinating conversation with Dr. Jean Nestor Dahj, who reveals why the analytical mindset serves as the perfect foundation for effective cyber threat intelligence work. With over eight years in information security and a strong background in data science, Dr. Nestor-Dodge shares how his experience ana…
  continue reading
 
Send us a text A curiosity-fueled career moves from Atari and BBS days to leading research on a live SAP zero-day, with candid lessons on people skills, breaking into security, and holding the line when pressure spikes. We unpack how a benign SAP endpoint became an RCE chain and what it takes to defend complex systems at scale. • early path from Co…
  continue reading
 
Get your ticket to the BlackGirlsHack Gala here: https://www.zeffy.com/en-US/ticketing/rise-and-reign-a-blackgirlshack-celebration In this episode, HD and co-host Cyber Shorty dive into their personal cybersecurity journeys, tackling the challenges newcomers face in the job market, and offering advice on the importance of degrees, internships, and …
  continue reading
 
Scans for ESAFENET CDG V5 We do see some increase in scans for the Chinese secure document management system, ESAFENET. https://isc.sans.edu/diary/Heads%20Up%3A%20Scans%20for%20ESAFENET%20CDG%20V5%20/32364 Investigating targeted payroll pirate attacks affecting US universities Microsoft wrote about how payroll pirates redirect employee paychecks vi…
  continue reading
 
“I think that Senator Kennedy's policies and recommendations for the handling of the Castro regime are probably the most dangerously irresponsible recommendations that he's made during the course of this campaign.” That was Richard Nixon, in the final presidential debate of 1960, targeting John F. Kennedy's stance on Cuba. Fidel Castro has seized p…
  continue reading
 
New Oracle E-Business Suite Patches Oracle released one more patch for the e-business suite. Oracle does not state if it is already exploited, but the timing of the patch suggests that it should be expedited. https://www.oracle.com/security-alerts/alert-cve-2025-61884.html Widespread Sonicwall SSLVPN Compromise Huntress Labs observed the widespread…
  continue reading
 
It’s another episode of Tech Talk with Steve Thomson and Doug Swinhart!Topics include:Elon Musk’s upcoming Linux systemThe affordability of storage devicesSetting up a new laptopDownloading Proton and what’s includedAntivirus software… programs and preparationMicrosoft 360 office online issuesSyncing issues with Microsoft and Norton AntiVirus Windo…
  continue reading
 
🚨 POD ALERT 🚨 What a week in automotive! Catch the big car retailing stories and all the chatter that matters on this week’s Motor Trade Radio podcast, powered by MOTORS. 🗓️ A special focus on September with a look at the SMMT data for the new car and van markets during the plate-change and MOTORS’ Market View analysis of used car trends 💷 The lowd…
  continue reading
 
Today we chat with Cristina Pawlica, a distinguished member of the Simply Cyber community with an extensive background in cybersecurity and military service. Cristina shares her unique journey from serving in the Air Force as a Force Support Officer to pursuing a career in cybersecurity. She delves into crucial leadership lessons and discusses the …
  continue reading
 
Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to…
  continue reading
 
*Declassified Club exclusive: ⁠SUBSCRIBE⁠ to listen to the full interview* This week Gordon and David are joined by Kent Walker, Google's President of Global Affairs, to discuss the Aurora cyber attacks, his thoughts on the future of Artificial Intelligence, and what it was like to grow up in Silicon Valley before it became the world's technology h…
  continue reading
 
The evolving role of technology in modern defense environments, highlighting innovations in communications, automation, and open-source frameworks. Drawing from personal experience, the conversation emphasizes how real-world conflicts are reshaping how tech is deployed, adopted, and understood across military operations. This week, Dave, Esmee, and…
  continue reading
 
Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnerability A user cloning a git repository may be tricked into executing arbitrary code via…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst John and Threat Detection Engineer Marken as they discuss: Clop's Exploitation of Oracle E-Business Suite (1:09) Scattered Lapsus$ Hunters Return With Salesforce Leaks (5:27) Shutdown Threatens US Intel Sharing and Cyber Defense (10:02) Ransomware and Cy…
  continue reading
 
Got a question or comment? Message us here! What’s the real difference between a penetration test and a red team engagement, and how can each benefit your SOC? In this episode, Andrew is joined by Tanner, to unpack how pentests uncover vulnerabilities, how red teams stress-test defenders, and why every organization should be leveraging these exerci…
  continue reading
 
A US-led peace plan has brought renewed hopes that an end to the conflict in Gaza may be in sight. But as talks in Cairo continue over the release of Israeli hostages and Palestinian prisoners, the withdrawal of Israeli troops and disarmament of Hamas, what are the prospects for a lasting peace settlement? Gavin Esler discusses the latest with Greg…
  continue reading
 
Today, we're joined by Jacob Buckman, co-founder and CEO of Manifest AI to discuss achieving long context in transformers. We discuss the bottlenecks of scaling context length and recent techniques to overcome them, including windowed attention, grouped query attention, and latent space attention. We explore the idea of weight-state balance and the…
  continue reading
 
Send us a text We trade last‑minute schedules and kid chaos for a deep dive into how modern phones leak data, why “Ask App Not to Track” isn’t enforcement, and what a third platform built for privacy and free speech looks like. Joe shares his Apple-to-Unplugged journey, the Raxxis findings, and practical features that make privacy usable. • zero‑to…
  continue reading
 
Oracle E-Business Suite 0-Day CVE-2025-61882 Last week, the Cl0p ransomware gang sent messages to many businesses stating that an Oracle E-Business Suite vulnerability was used to exfiltrate data. Initially, Oracle believed the root cause to be a vulnerability patched in June, but now Oracle released a patch for a new vulnerability. https://www.ora…
  continue reading
 
It’s another edition of Tech Talk featuring Steve Thomson and Doug Swinhart!Topics include:Windows 10 deep diveIncreased competition for Apple and Microsoft from overseas Their level of trust in Chinese productsKeeping work and personal email separatedBroken power supply/damaged jack… should you replace the part or the machine?Tablets & E-ReadersCh…
  continue reading
 
🚨 Streaming now! Catch the big car retailing stories and all the chatter that matters on this week’s Motor Trade Radio Podcast, powered by MOTORS. 🎙️ 👥 This week, David joins as guest co-host to discuss the latest market trends and headlines | E65 S11 🔑 Key stories: 🚘 JLR confirms a “controlled, phased restart of operations” after the recent hack 💷…
  continue reading
 
Welcome back for Season 2! We kickoff with a graduating senior from Rensselaer Polytechnic University as she transitions from academic research to industry applications in the world of cybersecurity. In this episode, we sit down with Shoshana Sugerman, to explore her journey from classroom to conference room. We delve into Shoshana's work on Grover…
  continue reading
 
More .well-known scans Attackers are using API documentation automatically published in the .well-known directory for reconnaissance. https://isc.sans.edu/diary/More%20.well-known%20Scans/32340 RedHat Patches Openshift AI Services A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, fo…
  continue reading
 
Trump’s foreign policy means the United States is leaving a vacuum in world affairs – and China looks increasingly willing to fill it. Following the Shanghai Cooperation Organisation summit in Tianjin last month, what is the real nature of Xi Jinping and China’s expanding but complex international relationships, including those with Narendra Modi i…
  continue reading
 
Before Siri had sass and Alexa started judging your music taste, the original virtual assistant was quietly revolutionizing the '90s—powered by many patents and a whole lot of foresight. Now, as AI goes from buzzword to boss, we ask, will it transform your job, your home… or just steal your knowledge? This week, Dave, Esmee and Rob speak with Kevin…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play