Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Awareness Podcasts

show episodes
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork
 
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Artwork

1
Simplifying Cyber

Aaron Pritz, Cody Rivers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
  continue reading
 
Artwork

1
Ankush Gaikwad

Mr. Hacker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
  continue reading
 
Artwork
 
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
  continue reading
 
Artwork

1
Tech Gumbo

Haggai Davis

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
We started Tech Gumbo in Nov 2014 as a conversational show of news, information & updates about the past, present & future of all things technology in a topical, interesting and digestible way.
  continue reading
 
Artwork

1
All Things Policy

Takshashila Institution

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Ever wondered how automation will change the world? Maybe you puzzle over what India could do to ease traffic congestion, or how China's aircraft carriers will transform Indian Ocean geopolitics? All Things Policy, a daily podcast brought to you by the Takshashila Institution, brings you all the answers. Every weekday, our researchers break down complex economic and geopolitical ideas through the lens of current events. For everyone from the busy executive to the curious student, All Things ...
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
The Cyber Sleuth Show

Cyber Social Hub

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Step into the world of digital forensics, mobile forensics, OSINT, and cybersecurity with The Cyber Sleuth Show! Hosted by Kevin DeLong, this podcast dives deep into the ever-evolving landscape of digital investigations, featuring expert guests, cutting-edge tools, real-world case insights, and, of course, the occasional terrible dad joke. From law enforcement investigators and forensic analysts to OSINT specialists and cybersecurity pros, we uncover the latest trends, techniques, and challe ...
  continue reading
 
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
  continue reading
 
Artwork

1
The CyberDap Podcast

Daniel Agyemang Prempeh - TheCyberDap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
  continue reading
 
Artwork

1
KBKAST

KBI.Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
  continue reading
 
Artwork

1
Hack the Plant

Bryson Bort

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
  continue reading
 
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Are you ready to get connected?! You’re listening to the "Insured Connection" by PICA Group, a ProAssurance Company. We provide expert advice for your practice when you need it most. We connect you with industry leaders to discuss timely topics so you can listen, learn, and get back to caring for your patients. Now, let's connect!
  continue reading
 
Artwork

1
UAB TechKnow

University of Alabama at Birmingham

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
  continue reading
 
Welcome to the Re-Thinking the Human Factor podcast. It's a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
  continue reading
 
Artwork

1
What the HealthTech?

Radar Healthcare

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
What The HealthTech?, a podcast from Radar Healthcare, creates a space for health and social care professionals to join honest conversations about current trends, challenges in the sector and making an impact on people’s lives. In our bi-weekly Thursday episodes, we’ll be chatting to industry leaders, inspiring organisations, and our own team at Radar Healthcare, to share insight and learn alongside you. Listen today to discover something new, and don’t forget to subscribe!
  continue reading
 
Artwork

1
The Backup Wrap-Up

W. Curtis Preston (Mr. Backup)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
  continue reading
 
The TribalHub podcast shares stories of tribal leaders who are driving their organizations, businesses that are collaborating with tribes, and leaders in the industry who are savvy about technology. Subscribe on your favorite podcast platform! TribalHub...Connections, Membership, Opportunity.
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Artwork

1
RSAC

RSAC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
  continue reading
 
Artwork
 
Hello! This is the Aware and Prepared podcast. I'm your host, Mandi Pratt, a trained domestic violence advocate. I teach women and vulnerable populations how to be street smart. I'm a mom with a gnarly backstory from almost two decades ago. The FBI showed up at my door one day to alert me that my abusive ex had become wanted for multiple bank robberies. Our story was in the news (a few times). I was tired of feeling vulnerable and learned how to keep myself and my son safer. I wish when I wa ...
  continue reading
 
Artwork

1
Dragon Talk

Dragon Podcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Produced and hosted by Dragon Podcast Assistant Manager, Ryan Record, Dragon Talk is a student-focused podcast highlighting topics of interest to our diverse student population at Howard Community College. Tune in to find out what’s happening in Dragon Country!
  continue reading
 
Artwork

1
Better in Bavaria

U.S. Army Garrison Bavaria

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
U.S. Army Garrison Bavaria's Better in Bavaria podcast, where we share stories and highlight the people behind them - the Soldiers and Army civilians who support our readiness mission all while making our community a great place to work, live and raise a family. - Hosted by Linda A. Read and Andreas Kreuzer - Produced by Kayla Overton, Natalie Simmel, and Ella Händel
  continue reading
 
Artwork

1
The Cyber Queens Podcast

Maril Vernon, Erika Eakins, and Amber Devilbiss

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
“WHERE ARE THE WOMEN IN CYBER?” The Landscape In 2022 the cyber security field still consists of 24% women and only 2.2% LGBTQ+ minorities. Long-perpetuated gender, age, and demographic biases held by the ‘Baby Boomer’ and Gen-X groups have led to a severe gap in the representation and advancement of women and minorities in this field. Millennials entered the workforce and attempted to forge a new way by asking for small changes; but definitely conceding others. Currently the Boomers/Gen-X a ...
  continue reading
 
Marketing Strategies for Supplement Business Owners. Discover what works in nutritional supplements marketing online. If you’re a supplement brand, this show will uncover: - E-Commerce Growth - Marketing Strategies - Maximize your supplement marketing - What are the top supplement trends? - How to use YouTube ads to grow a health supplement business - What is the best way to grow a supplement brand? - How to grow a supplement company - What are the best supplement marketing strategies that w ...
  continue reading
 
Artwork

1
Unspoken Security

Unspoken Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
  continue reading
 
Artwork

1
Cubic Lighthouse

Guy Marong

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
🎙️ Dive into the world of cybersecurity with Cubic Lighthouse Podcast - your expert companion in navigating the latest developments and crucial topics in the field. We dissect complexities, provide strategic insights, and ensure you stay abreast of cutting-edge trends. Whether you're a seasoned professional or a cybersecurity enthusiast, join us for concise expertise and actionable intelligence to enhance your security posture. 🌐🔐
  continue reading
 
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
  continue reading
 
The federal government spends $90 billion on technology every year. If you are a tech innovator and want to expand your share of the market, this is the podcast for you to find new opportunities for growth. Every week, Federal Tech Podcast sits down with successful innovators who have solved complex computer system problems for federal agencies. They cover topics like Artificial Intelligence, Zero Trust, and the Hybrid Cloud. You can listen to the technical issues that concern federal agenci ...
  continue reading
 
Artwork
 
Designed to challenge old-school business practices and the traditional business suit culture, on unsuitable on Rea Radio you'll hear industry professionals speak about meaningful, modern solutions to help you enhance your company’s growth. Hosted by Doug Houser.
  continue reading
 
Loading …
show series
 
News and Updates: Cloudflare Outage- A routine Cloudflare config change triggered a hidden bug, crashing bot-mitigation systems and causing massive global outages. No attack involved; fixes deployed as Cloudflare reviews resilience. Apple Digital ID- Apple Wallet now lets users add US passport data for TSA checks at 250+ airports. It aids domestic …
  continue reading
 
📢 Subscribe on your favourite platforms and visit https://linktr.ee/riskycreative for more of ∠The Awareness Angle 📢 This Week on The Awareness Angle Rail hacks, WhatsApp risks, CCTV horror stories, teenage cyber gangs, and a staffing breach that leaked over a hundred thousand CVs. It has been a busy week. Luke and I break down the biggest cyber st…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com In a recent report from Microsoft, they share that foreign adversaries are increasing attacks on American infrastructure. One variation is that they will not penetrate systems and attack, but they will steal crede…
  continue reading
 
How do we really keep kids safe online? What are the signs a child might be silently struggling with digital stress? And how can parents or educators build a realistic, compassionate digital safety plan that actually works? In this conversation, Mandi talks with Deyanira Murga, PPS, CPOI, a professional security consultant and founder of Security N…
  continue reading
 
The Insured Connection podcast is excited to welcome Hoanganh Chau, a 4th-year podiatry student at Samuel Merritt University. She shares her journey into podiatry, discussing how she discovered the field, her experiences in medical school, and the importance of mentorship. Subscribe now on your favorite podcast platform to hear more interesting sto…
  continue reading
 
"Send me a text" In this episode, I break down the exact framework I've used to help e-commerce growth for supplement brands scale past $100M in revenue while staying profitable. You'll discover why 72% of your revenue comes from just 20% of your customers, how to calculate true Customer Lifetime Value (LTV) the right way, and the four pillars of L…
  continue reading
 
Question? Text our Studio direct. In this shocking monthly cyber update, the Cyber Crime Junkies (David, Dr. Sergio E. Sanchez, and Zack Moscow) expose the craziest, must-know stories in tech and security. What's Inside This Episode: The AI Threat is Real: Dr. Sergio reveals how Chinese threat actors manipulated Anthropic's Claude AI system to stag…
  continue reading
 
Question? Text our Studio direct. Can Brett Johnson Help You SPOT Fraud Before it's Too Late? Brett Johnson joins us to talk about spotting fraud before its too late. We discuss how to limit cyber risk for small business, ways to identify refund fraud, AI implications in cyber security today, best policies to limit cyber liability and how can we sp…
  continue reading
 
In this episode, we sit down with Steven Grossman, CISO / CIO at Standard & Preferred Insurance, as he talks about the challenges small and medium-sized businesses face in securing their environment, especially in view of growing regulatory requirements, and how he brings his enterprise consulting experience to bear in driving change. Steven discus…
  continue reading
 
Following the Gig Workers Act, Karnataka’s proposed Domestic Workers Social Security and Welfare Bill aims to extend similar protections to domestic workers. While the need for safeguards is unquestionable, can laws designed for one sector be simply transplanted to another? What makes domestic work uniquely different — and how might this bill resha…
  continue reading
 
In this episode of Unspoken Security, host AJ Nash sits down with Charlotte Guiney, Cyber Threat Intelligence Manager at Toyota Financial Services. They explore what it takes to build threat intelligence programs that work for both security teams and the wider business. Charlotte cuts through the noise, stressing that buy-in is step one—and that it…
  continue reading
 
How modern ransomware actors are deploying multidimensional tactics to outpace traditional defences Strategies to reduce data loss and sustain business operations after an attack AI and automation – enhancing visibility and accelerating response to ransomware threats Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Edward St…
  continue reading
 
Tycoon 2FA - The Phishing-as-a-Service Platform Our latest technical deep-dive reveals how Tycoon 2FA, a sophisticated Phishing-as-a-Service (PhaaS) platform, is successfully evading detection and bypassing multi-factor authentication (MFA) to compromise enterprise cloud environments. This isn't just another phishing kit. It's an Adversary-in-the-M…
  continue reading
 
In this episode, Vanshika Saraf joins Sriram Iyer, a pension fund manager and financial expert. Together, they explore pensions as a public policy challenge rather than just a personal finance issue. They discuss the recent reforms to the National Pension System, the regulatory institutions involved, and what it will take for India to build a more …
  continue reading
 
In this episode of Darnley’s Cyber Café, we dive into the real story behind CrowdStrike’s recent insider scandal, and what it teaches us about the hidden dangers brewing inside modern companies. We break down how a “bad apple” employee allegedly leaked internal information to a notorious hacking collective, why insider threats are so hard to detect…
  continue reading
 
In this bonus episode, KB sits down with Danielle Sheer, Chief Trust Officer at Commvault, and Avi Boru, Senior Director, Cloud Engineering, Network & Telecom at Lennar. Together they discuss building trust by design and how AI, transparency, and authentic relationships are shaping the future of business continuity and cyber recovery. Danielle Shee…
  continue reading
 
What really happens behind the scenes in customer support? In this episode of What the HealthTech, host Sophie Blackett chats with George Musgrave, Support Analyst at Radar Healthcare, to uncover the real impact of support teams in health and social care tech. George shares his journey through the company, the importance of first-line support, and …
  continue reading
 
In this episode of All Things Policy, Swathi Kalyani, Geospatial Research Analyst and Anisree Suresh, Geoeconomics Research Analyst, at the Takshashila Institution, discuss the recent extreme poverty eradication claim by the state of Kerala. They delve into the definitions of poverty in India and Kerala, the historical evolution of the efforts towa…
  continue reading
 
Question? Text our Studio direct. We discuss How ransomware can kill and ways to build security resilience with Chris Loehr, SVP of Solis Security. Ransomware Attacks Can Be DEADLY What Makes You SAFE? Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done with full cyber chaos: 🔥 Int…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Every federal agency prepares a backup strategy to protect data. This is a rigorous endeavor in which teams practice what to do in the event of a breach or system failure. However, nobody really has a plan for a t…
  continue reading
 
- JLR’s Cyber Shutdown Turns Costly - Revenue Drop from the Fallout - UK Economy Takes a Hit Too - Supply Chain Pain Across the Midlands - A Lesson in Economic Security. Support the show Support the show Remember... Even with top-tier security, human negligence and/or error can compromise systems. Invest in employee training—it’s the ultimate safeg…
  continue reading
 
Cyber attacks don’t just knock systems offline—they can empty shelves, disrupt feeding schedules, endanger animals, and muddy price signals across the food supply. We sat down with Kristen (Demoranville) King, CEO of Anzen Sage and host of Bites and Bytes Podcast, to unpack how modern agriculture runs on a mesh of OT, data, and logistics that adver…
  continue reading
 
Though exit barriers intend to preserve employment, they often have adverse implications. They deter the entry of new firms and lock productive resources into low-productivity firms, ultimately lowering the economy's overall productivity. In this episode of All Things Policy, Sarthak Pradhan talks to Dr Shoumitro Chatterjee, who explains the extent…
  continue reading
 
Question? Text our Studio direct. Discover the shocking story of Charlie Javice, the entrepreneur who went from being featured on the cover of Forbes to facing a federal indictment. Learn about her rise to fame and the events that led to her downfall. Get the inside scoop on the controversies surrounding her business ventures and the charges brough…
  continue reading
 
Many kids and teens won’t say “I’m being trafficked” BUT they will show signs. In Part 2 of this conversation, Mandi and Erin with Love146 answer real concerns from parents, teachers, and teens about how to recognize trafficking and what supportive adult response actually looks like. They dig into why asking gentle, curious questions can open the d…
  continue reading
 
Want to know how much data you're really willing to lose? We're breaking down recovery point objective RPO - the agreement about how much data loss you can accept, measured in time. Most organizations have RPOs that are pure fantasy, claiming they can only lose an hour of data when they're backing up once a day. Curtis and Prasanna discuss why RPO …
  continue reading
 
In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to target 30 global organizations. We explain how the attack was executed, why it matters, and its implications for cybersecurity. Join the conversation as …
  continue reading
 
In this episode of All Things Policy, Air Marshal T.D. Joseph (Retd) and Brigadier Anil Raman (Retd) examine how growing tensions in U.S.–India relations are affecting India’s efforts to build its military capabilities. President Donald Trump’s turbulent handling of bilateral ties, particularly his trade-driven disruptions, has led many in India to…
  continue reading
 
"Send me a text" Most supplement brands are stuck fighting the same tired battles in crowded single-benefit categories. Meanwhile, a small group of marketers are doing something different—and it's working. In this episode, we explore cross-category positioning: the strategy of addressing multiple connected health benefits instead of just one isolat…
  continue reading
 
Question? Text our Studio direct. 🔥New Episode🔥 dives into a famous betrayal case, showcasing the breach movie trailer as an example of Hollywood's take on espionage. This story highlights the perilous nature of insider threat and the critical importance of **counterintelligence**. We explore this true spy narrative, bringing you another compelling…
  continue reading
 
In this episode of Breaking Into Cybersecurity, M.K. Palmore, a cybersecurity leader and former FBI special agent, shares his journey from serving in the Marines and the FBI to leading his own consulting firm, Apogee Global RMS. He discusses his early interest in technology, the importance of effective communication in cybersecurity leadership, and…
  continue reading
 
Question? Text our Studio direct. What Happens in Your BRAIN During Social Engineering Attacks We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Season 8 is officiall…
  continue reading
 
This week we chat with Bill Boston, also known as 'The Real Bilbo,' to explore his extensive journey from IT support roles to becoming a cybersecurity professional. With over 20 years in support and a strong background in healthcare and consulting, Bill shares unique insights into overcoming mental health challenges, the importance of being fair, f…
  continue reading
 
Pig-butchering scams have evolved into one of the most damaging global cybercrime models, combining long-term emotional grooming, AI-driven impersonation, fake investment platforms, and sophisticated crypto-laundering networks. Our latest CYFIRMA Threat Intelligence Report breaks down: How global scam compounds operate like industrial-scale BPOs Th…
  continue reading
 
Jobs with high exposure to AI are seeing signs of disruption, causing real anxiety about the future. Join Sridhar Krishna, Rijesh Panicker, and Bharath Reddy as they try and make sense of the downsizing, the impact on hiring, and explore how we can prepare for this transformation. All Things Policy is a daily podcast on public policy brought to you…
  continue reading
 
Question? Text our Studio direct. LOCKBIT Cyber Crime Takedown Uncovered! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Backgroun…
  continue reading
 
Identifying critical assets and dependencies to focus investment where impact is highest Designing for rapid recovery with tested runbooks and clear RTO/RPO targets Strengthening resilience through training, playbooks, and cross-functional drills Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Scott Hardy, CISO, Sargent-Dis…
  continue reading
 
MeitY has officially notified the DPDP Rules 2025, paving the way for implementing India's Digital Personal Data Protection Act. However, there are multiple aspects to be considered when reading the Act and Rules such as consent, data retention, children's data protection, grievance redressal, etc. In this episode of All Things Policy, Adya Madhava…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com The federal government recognizes that threats are multiplying at an exponential level. In fact, in October 2025, CISA released a free vulnerability scanner, and 10,000 organizations have signed up. Today, CISA is…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play