Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Cyber Assurance Podcasts
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
…
continue reading
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
…
continue reading
Reinventing Finance is a Podcast hosted by Nikolaus Sühr, CEO and Co-Founder of KASKO and Ronald Engel, CEO of VIG Platform Partners. This Podcast is for anyone who is interested in the current developments of the Insurtech, Insurance, Fintech and Finance market. Thought-provoking, entertaining and critical. Join us as we discover what some of the current industry leaders and decision makers are doing, the lessons they have learned, the main challenges and opportunities they identify, and ho ...
…
continue reading
Welcome, interstellar travelers, to the Hitchhiker’s Guide to the GRC Technology Galaxy, your improbable companion through the expanding universe of governance, risk, and compliance. In a cosmos where regulations multiply faster than Tribbles, cyber incidents drop like falling whales, and third parties sprout surprises with Vogon-level timing, this podcast is your towel, your Babel Fish, and your improbability drive rolled into one. Each episode, Michael Rasmussen and guests explore the cons ...
…
continue reading
The EY Academy Podcast is designed for third level students. It is a platform to provide further insight from a business perspective on what you are learning in the classroom. Professors and Lectures from colleges around the country submit questions and experts within our business answer them. Its casual, in a relaxed format and hopefully really informative. Coming soon – The EY Career Hub where we advise students on everything from what a graduate programme is to how to perform great at int ...
…
continue reading
1
From Chaos to Capability: iluminr in the GRC Galaxy
29:52
29:52
Play later
Play later
Lists
Like
Liked
29:52In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen is joined by iluminr to confront a hard truth: business continuity is dying, and resilience must take its place. Organizations today aren’t just facing power outages and weather events, they’re also preparing for ransomware, geopolitical escalation, misinforma…
…
continue reading
1
Building Trust and Value in the German Insurance Comparison Platform Market - Aljoscha Ziller, Managing Director of Verivox Versicherungsvergleich GmbH | Eps.65 - The Reinventing Finance Podcast
1:09:43
1:09:43
Play later
Play later
Lists
Like
Liked
1:09:43In this episode of the Reinventing Finance Podcast, KASKO CEO & Co-Founder Nikolaus Sühr and VIG Platform Partners CEO Dr. Ronald Engel speak with Aljoscha Ziller, Managing Director of Verivox Versicherungsvergleich GmbH. Here are some of the key topics discussed in the episode: – how Verivox Versicherungsvergleich GmbH as price comparison …
…
continue reading
1
A fish commits credit card fraud (inadvertently).
51:31
51:31
Play later
Play later
Lists
Like
Liked
51:31This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engin…
…
continue reading
1
Cyber Resilience, a National Solution with Herbert Fensury
30:01
30:01
Play later
Play later
Lists
Like
Liked
30:01Cyber crime is now a daily fact of life and a significant concern in both the private and public sectors but our response capabilities do not seem to be keeping up. This episode dives deep into one organization that is combatting this problem with a combination of academic research, industry expertise and hands-on training with the founder and CEO,…
…
continue reading
Please enjoy this encore of Word Notes. Software designed to prevent cheating in video games. CyberWire Glossary link: https://thecyberwire.com/glossary/anti-cheat-software Audio reference link: “The BIG Problem with Anti-Cheat,” by Techquickie, YouTube, 5 June 2020By N2K Networks
…
continue reading
Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents …
…
continue reading
1
Active Cyber Insurance & Systemic Risk - Kyle Bryant, Head of International Coalition | Eps.64 - The Reinventing Finance Podcast
1:11:56
1:11:56
Play later
Play later
Lists
Like
Liked
1:11:56In this episode of the Reinventing Finance Podcast, KASKO CEO & Co-Founder Nikolaus Sühr and VIG Platform Partners CEO Dr. Ronald Engel speak with Kyle Bryant, Head of International at Coalition. Here are some of the key topics discussed in the episode: – how “active insurance” combines live internet scanning with underwriting to prevent claims, no…
…
continue reading
Please enjoy this encore of Hacking Humans. On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there…
…
continue reading
Please enjoy this encore of Word Notes. Malware, in the guise of ransomware, that destroys data rather than encrypts. CyberWire Glossary link: https://thecyberwire.com/glossary/pseudoransomware Audio reference link: “Some Men Just Want to Watch the World Burn | the Dark Knight,” by YouTube, 2 November 2019.…
…
continue reading
1
Governing the Galaxy of Third Parties: apexanalytix in the GRC Galaxy
28:52
28:52
Play later
Play later
Lists
Like
Liked
28:52In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with apexanalytix to chart a course through the sprawling universe of third-party and vendor relationships—where complexity multiplies, risks hide in plain sight, and organizations often panic at the wrong end of the lifecycle. Unlike many in the spa…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering s…
…
continue reading
1
Trusted Platform Module (TPM) (noun) [Word Notes]
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Please enjoy this encore of Word Notes. A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link: https://thecyberwire.com/glossary/trusted-platform-module Audio reference link: “TPM (Trusted Platform Module) - Computerphile,” Computerphile, 23 July 2021…
…
continue reading
1
The Governance Guide Reimagined: Cura in the GRC Galaxy
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with Cura Software Solutions to explore how a platform that began as a focused risk tool has evolved into a global, end-to-end GRC ecosystem. From enterprise risk to operational resilience, audit, compliance, legal, analytics, and more, Cura now span…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, ph…
…
continue reading
1
Private Network Access (PNA) (noun) [Word Notes]
5:36
5:36
Play later
Play later
Lists
Like
Liked
5:36Please enjoy this encore of Word Notes. A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link. Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.By N2K Networks
…
continue reading
1
The Culture at the Center of the Galaxy: Decision Focus in the GRC Galaxy
23:28
23:28
Play later
Play later
Lists
Like
Liked
23:28In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with the team at Decision Focus to explore why the future of GRC isn’t about more features, it’s about better decisions. They discuss how culture, values, and the people building and using the technology shape outcomes far more than checklists or tem…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing s…
…
continue reading
Please enjoy this encore of Word Notes. The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. CyberWire Glossary link: …
…
continue reading
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, …
…
continue reading
1
The Assurance Singularity: AuditBoard in the GRC Galaxy
21:05
21:05
Play later
Play later
Lists
Like
Liked
21:05In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with Jason Sechrist of AuditBoard to explore how the company has transformed from an audit tool into one of the most intelligent platforms in the GRC cosmos. They discuss what makes AuditBoard distinctly improbable—a platform that’s as beautiful as i…
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, …
…
continue reading
1
Identity access management (IAM) (noun) [Word Notes]
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management Audio reference link: “The Wrath of Khan (1982) ‘Kirk’s Response,’” by Russell, YouTube, 16 May 2017.…
…
continue reading
1
Seeing Through the Risk Matrix: Riskonnect in the GRC Galaxy
33:47
33:47
Play later
Play later
Lists
Like
Liked
33:47In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen connects with the Riskonnect CEO, Jim Wetekamp, to explore how the company is helping organizations see through the code of risk, from insurable exposures and geopolitical volatility to AI-driven analysis and quantified decision-making. The discussion dives in…
…
continue reading
This week, while Dave Bittner is on vacation, hosts Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing …
…
continue reading
20 years after their paths first crossed, three Canadian security professionals regroup to discuss a new risk management strategy book based on hard won field experience. Patrick Hayes was a security strategist before organizations knew this was success differentiator. For decades he has been guiding organizations large and small, public, private a…
…
continue reading
1
NCSC Annual Review 2025: Crisis in the Boardroom, AI driven threats and Supply Chain Resilience Roadmap
33:14
33:14
Play later
Play later
Lists
Like
Liked
33:14Trish and Tom take a deep dive into the NCSC Annual Review for 2025 and unpack practical tips for business leaders. We're tearing open the most critical report of the year: the NCSC Annual Review 2025. The message from GCHQ is crystal clear: Cyber risk is no longer just an IT issue—it’s a boardroom priority. Forget those old assumptions—the threats…
…
continue reading
Please enjoy this encore of Word Notes. The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. CyberWire Glossary…
…
continue reading
1
The Event-Based Guide to the Galaxy: SureCloud in the GRC Galaxy
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with Alex Hollis of SureCloud to discuss how the company is rewriting the rules of digital risk and resilience. SureCloud’s event-sourced architecture captures everything that ever happens in the system (every change, every control, every decision) a…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal ex…
…
continue reading
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer Audio reference link: “What Is Abstraction in Computer Science,” by Codexpanse, YouTube, 29 October 2018.…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
1
How Warranty & Indemnity Insurance Is Transforming M&A - Jefferey Doran CEO Talos | Eps.63 - The Reinventing Finance Podcast
59:38
59:38
Play later
Play later
Lists
Like
Liked
59:38In this episode of the Reinventing Finance Podcast, KASKO CEO & Co-Founder Nikolaus Sühr and VIG Platform Partners CEO Dr Ronald Engel speak with Jeff Doran, Co-Founder of Talos, an MGA specialising in transactional risk insurance. Doran discusses the evolution of the warranty and indemnity (W&I) insurance market and how technology is shaping its…
…
continue reading
1
The Improbability of Compliance Made Simple: Comply in the GRC Galaxy
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with Comply to explore what sets the firm apart in the sprawling universe of financial services compliance. Serving clients across the US, UK, and more than 60 countries, Comply supports firms of every size, from global institutions to boutique shops…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
…
continue reading
By N2K Networks
…
continue reading
By N2K Networks
…
continue reading
1
From Sysadmin to Ethical Hacker: Phillip Wylie shares Skills, Labs, and Real-World Strategies
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25Send us a text Want a real-world map into penetration testing instead of a maze of hot takes? We sit down with Philip Wiley—offensive security veteran, teacher, and author of The Pentester Blueprint—to unpack practical paths that work today. Philip traces his journey from sysadmin to consultant and shows how prior roles become leverage in security:…
…
continue reading
1
Evolving Through the Galaxy: Archer in the GRC Galaxy
23:29
23:29
Play later
Play later
Lists
Like
Liked
23:29In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with Steve Scharlman of Archer to chart the platform’s evolution from its early days to its role today as a cornerstone of enterprise risk and compliance. Once a household name for CISOs, Archer has become just as essential for chief risk officers, e…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are …
…
continue reading
Please enjoy this encore of Word Notes. A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence. CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, I…
…
continue reading
1
So Long, and Thanks for All the Risk: Renee Murphy in the GRC Galaxy
38:22
38:22
Play later
Play later
Lists
Like
Liked
38:22In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with Renee Murphy, analyst, advisor, and master storyteller, to look back at the origins of the term “GRC” and trace how the technology space has evolved since its early days. Together they reflect on their parallel paths as analysts shaping the fiel…
…
continue reading
This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and …
…
continue reading
Please enjoy this encore of Word Notes. A subset of security orchestration, the management of identities across an organization's set of digital islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestrationBy N2K Networks
…
continue reading
1
The Interconnectedness of All Things: Workiva in the GRC Galaxy
31:05
31:05
Play later
Play later
Lists
Like
Liked
31:05In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen sits down with Workiva to explore what happens when GRC, ESG, and finance finally converge on a single platform. The conversation digs into what Workiva brings to the GRC landscape, where it’s best of breed, and why the interconnectedness of governance, risk, …
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and…
…
continue reading
1
Small Businesses Are Prime Targets, But There Are Ways to Fight Back
27:09
27:09
Play later
Play later
Lists
Like
Liked
27:09Send us a text "We're too small to be hacked" might be the most dangerous myth in small business cybersecurity today. As James Baierle, founder of SecurePoint Solutions, asks with a touch of irony – how exactly do you let the bad guys know to leave you alone? The hard truth is you can't, and that's why specialized security services for small busine…
…
continue reading
Please enjoy this encore of Word Notes. A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: http…
…
continue reading
1
Regulation at the Speed of AI: Corlytics in the GRC Galaxy
18:11
18:11
Play later
Play later
Lists
Like
Liked
18:11In this episode of The Hitchhiker’s Guide to the GRC Technology Galaxy, Michael Rasmussen navigates with Corlytics through the ever-expanding cosmos of regulatory change. With 30 million pages of regulatory text published each year, Corlytics combines the precision of AI with the insight of top-tier subject matter experts and data scientists to mak…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal …
…
continue reading