Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Cyber Awareness Podcasts
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
We started Tech Gumbo in Nov 2014 as a conversational show of news, information & updates about the past, present & future of all things technology in a topical, interesting and digestible way.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Ever wondered how automation will change the world? Maybe you puzzle over what India could do to ease traffic congestion, or how China's aircraft carriers will transform Indian Ocean geopolitics? All Things Policy, a daily podcast brought to you by the Takshashila Institution, brings you all the answers. Every weekday, our researchers break down complex economic and geopolitical ideas through the lens of current events. For everyone from the busy executive to the curious student, All Things ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Step into the world of digital forensics, mobile forensics, OSINT, and cybersecurity with The Cyber Sleuth Show! Hosted by Kevin DeLong, this podcast dives deep into the ever-evolving landscape of digital investigations, featuring expert guests, cutting-edge tools, real-world case insights, and, of course, the occasional terrible dad joke. From law enforcement investigators and forensic analysts to OSINT specialists and cybersecurity pros, we uncover the latest trends, techniques, and challe ...
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Are you ready to get connected?! You’re listening to the "Insured Connection" by PICA Group, a ProAssurance Company. We provide expert advice for your practice when you need it most. We connect you with industry leaders to discuss timely topics so you can listen, learn, and get back to caring for your patients. Now, let's connect!
…
continue reading
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It's a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
What The HealthTech?, a podcast from Radar Healthcare, creates a space for health and social care professionals to join honest conversations about current trends, challenges in the sector and making an impact on people’s lives. In our bi-weekly Thursday episodes, we’ll be chatting to industry leaders, inspiring organisations, and our own team at Radar Healthcare, to share insight and learn alongside you. Listen today to discover something new, and don’t forget to subscribe!
…
continue reading
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
…
continue reading
SC Media is proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
James McQuiggan brings inspiring stories of cybersecurity practitioners "break-into-industry" stories across all dimensions of cybersecurity.
…
continue reading
The TribalHub podcast shares stories of tribal leaders who are driving their organizations, businesses that are collaborating with tribes, and leaders in the industry who are savvy about technology. Subscribe on your favorite podcast platform! TribalHub...Connections, Membership, Opportunity.
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
…
continue reading
Hello! This is the Aware and Prepared podcast. I'm your host, Mandi Pratt, a trained domestic violence advocate. I teach women and vulnerable populations how to be street smart. I'm a mom with a gnarly backstory from almost two decades ago. The FBI showed up at my door one day to alert me that my abusive ex had become wanted for multiple bank robberies. Our story was in the news (a few times). I was tired of feeling vulnerable and learned how to keep myself and my son safer. I wish when I wa ...
…
continue reading
Produced and hosted by Dragon Podcast Assistant Manager, Ryan Record, Dragon Talk is a student-focused podcast highlighting topics of interest to our diverse student population at Howard Community College. Tune in to find out what’s happening in Dragon Country!
…
continue reading
U.S. Army Garrison Bavaria's Better in Bavaria podcast, where we share stories and highlight the people behind them - the Soldiers and Army civilians who support our readiness mission all while making our community a great place to work, live and raise a family. - Hosted by Linda A. Read and Andreas Kreuzer - Produced by Kayla Overton, Natalie Simmel, and Ella Händel
…
continue reading
“WHERE ARE THE WOMEN IN CYBER?” The Landscape In 2022 the cyber security field still consists of 24% women and only 2.2% LGBTQ+ minorities. Long-perpetuated gender, age, and demographic biases held by the ‘Baby Boomer’ and Gen-X groups have led to a severe gap in the representation and advancement of women and minorities in this field. Millennials entered the workforce and attempted to forge a new way by asking for small changes; but definitely conceding others. Currently the Boomers/Gen-X a ...
…
continue reading
Marketing Strategies for Supplement Business Owners. Discover what works in nutritional supplements marketing online. If you’re a supplement brand, this show will uncover: - E-Commerce Growth - Marketing Strategies - Maximize your supplement marketing - What are the top supplement trends? - How to use YouTube ads to grow a health supplement business - What is the best way to grow a supplement brand? - How to grow a supplement company - What are the best supplement marketing strategies that w ...
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
🎙️ Dive into the world of cybersecurity with Cubic Lighthouse Podcast - your expert companion in navigating the latest developments and crucial topics in the field. We dissect complexities, provide strategic insights, and ensure you stay abreast of cutting-edge trends. Whether you're a seasoned professional or a cybersecurity enthusiast, join us for concise expertise and actionable intelligence to enhance your security posture. 🌐🔐
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading
Produced by AI and based on articles published in ICAEW's Insights section.
…
continue reading
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
…
continue reading
1
Federal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
John Gilroy
The federal government spends $90 billion on technology every year. If you are a tech innovator and want to expand your share of the market, this is the podcast for you to find new opportunities for growth. Every week, Federal Tech Podcast sits down with successful innovators who have solved complex computer system problems for federal agencies. They cover topics like Artificial Intelligence, Zero Trust, and the Hybrid Cloud. You can listen to the technical issues that concern federal agenci ...
…
continue reading
SC Media is proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Designed to challenge old-school business practices and the traditional business suit culture, on unsuitable on Rea Radio you'll hear industry professionals speak about meaningful, modern solutions to help you enhance your company’s growth. Hosted by Doug Houser.
…
continue reading
1
Cloudflare Outage, Apple Digital ID, Waymo Expansion, MS Agentic OS, Cyber Awareness Crisis
22:00
22:00
Play later
Play later
Lists
Like
Liked
22:00News and Updates: Cloudflare Outage- A routine Cloudflare config change triggered a hidden bug, crashing bot-mitigation systems and causing massive global outages. No attack involved; fixes deployed as Cloudflare reviews resilience. Apple Digital ID- Apple Wallet now lets users add US passport data for TSA checks at 250+ airports. It aids domestic …
…
continue reading
1
WhatsApp Leak, Rail Hack and CCTV Horror Stories | Weekly Cyber News, But Human
52:19
52:19
Play later
Play later
Lists
Like
Liked
52:19📢 Subscribe on your favourite platforms and visit https://linktr.ee/riskycreative for more of ∠The Awareness Angle 📢 This Week on The Awareness Angle Rail hacks, WhatsApp risks, CCTV horror stories, teenage cyber gangs, and a staffing breach that leaked over a hundred thousand CVs. It has been a busy week. Luke and I break down the biggest cyber st…
…
continue reading
1
Ep. 282 the Hidden Cyber Gaps Threatening America's Digital Infrastructure
37:50
37:50
Play later
Play later
Lists
Like
Liked
37:50Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com In a recent report from Microsoft, they share that foreign adversaries are increasing attacks on American infrastructure. One variation is that they will not penetrate systems and attack, but they will steal crede…
…
continue reading
1
Cyber Trauma and Digital Safety Plans: What Every Parent and Educator Should Know
38:52
38:52
Play later
Play later
Lists
Like
Liked
38:52How do we really keep kids safe online? What are the signs a child might be silently struggling with digital stress? And how can parents or educators build a realistic, compassionate digital safety plan that actually works? In this conversation, Mandi talks with Deyanira Murga, PPS, CPOI, a professional security consultant and founder of Security N…
…
continue reading
1
Mentorship and Medicine: A 4th Year Podiatry Student's Journey
22:02
22:02
Play later
Play later
Lists
Like
Liked
22:02The Insured Connection podcast is excited to welcome Hoanganh Chau, a 4th-year podiatry student at Samuel Merritt University. She shares her journey into podiatry, discussing how she discovered the field, her experiences in medical school, and the importance of mentorship. Subscribe now on your favorite podcast platform to hear more interesting sto…
…
continue reading
1
The Real Driver of Sustainable e-Commerce Growth in DTC Supplements
19:28
19:28
Play later
Play later
Lists
Like
Liked
19:28"Send me a text" In this episode, I break down the exact framework I've used to help e-commerce growth for supplement brands scale past $100M in revenue while staying profitable. You'll discover why 72% of your revenue comes from just 20% of your customers, how to calculate true Customer Lifetime Value (LTV) the right way, and the four pillars of L…
…
continue reading
1
CHAOS: AI Jailbreaks, Cloud Meltdowns & The Fish-Tank Casino Hack That Shocked the World
48:36
48:36
Play later
Play later
Lists
Like
Liked
48:36Question? Text our Studio direct. In this shocking monthly cyber update, the Cyber Crime Junkies (David, Dr. Sergio E. Sanchez, and Zack Moscow) expose the craziest, must-know stories in tech and security. What's Inside This Episode: The AI Threat is Real: Dr. Sergio reveals how Chinese threat actors manipulated Anthropic's Claude AI system to stag…
…
continue reading
1
Can Brett Johnson Help You SPOT Fraud Before it's Too Late?
48:40
48:40
Play later
Play later
Lists
Like
Liked
48:40Question? Text our Studio direct. Can Brett Johnson Help You SPOT Fraud Before it's Too Late? Brett Johnson joins us to talk about spotting fraud before its too late. We discuss how to limit cyber risk for small business, ways to identify refund fraud, AI implications in cyber security today, best policies to limit cyber liability and how can we sp…
…
continue reading
1
Episdoe 344 Deep Dive: Steven Grossman | Cybersecurity and Compliance in regulated Small and Medium Sized Businesses (SMBs)
35:30
35:30
Play later
Play later
Lists
Like
Liked
35:30In this episode, we sit down with Steven Grossman, CISO / CIO at Standard & Preferred Insurance, as he talks about the challenges small and medium-sized businesses face in securing their environment, especially in view of growing regulatory requirements, and how he brings his enterprise consulting experience to bear in driving change. Steven discus…
…
continue reading
1
Homes as Workplaces: How Karnataka’s New Bill Can Change Our Lives
31:49
31:49
Play later
Play later
Lists
Like
Liked
31:49Following the Gig Workers Act, Karnataka’s proposed Domestic Workers Social Security and Welfare Bill aims to extend similar protections to domestic workers. While the need for safeguards is unquestionable, can laws designed for one sector be simply transplanted to another? What makes domestic work uniquely different — and how might this bill resha…
…
continue reading
In this episode of Unspoken Security, host AJ Nash sits down with Charlotte Guiney, Cyber Threat Intelligence Manager at Toyota Financial Services. They explore what it takes to build threat intelligence programs that work for both security teams and the wider business. Charlotte cuts through the noise, stressing that buy-in is step one—and that it…
…
continue reading
1
teissTalk: Shielding sensitive data from ransomware – staying ahead of evolving threats
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49How modern ransomware actors are deploying multidimensional tactics to outpace traditional defences Strategies to reduce data loss and sustain business operations after an attack AI and automation – enhancing visibility and accelerating response to ransomware threats Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Edward St…
…
continue reading
1
CYFIRMA Research: Tycoon 2FA- A Technical Analysis of its Adversary-in-the-Middle Phishing Operation
3:21
3:21
Play later
Play later
Lists
Like
Liked
3:21Tycoon 2FA - The Phishing-as-a-Service Platform Our latest technical deep-dive reveals how Tycoon 2FA, a sophisticated Phishing-as-a-Service (PhaaS) platform, is successfully evading detection and bypassing multi-factor authentication (MFA) to compromise enterprise cloud environments. This isn't just another phishing kit. It's an Adversary-in-the-M…
…
continue reading
In this episode, Vanshika Saraf joins Sriram Iyer, a pension fund manager and financial expert. Together, they explore pensions as a public policy challenge rather than just a personal finance issue. They discuss the recent reforms to the National Pension System, the regulatory institutions involved, and what it will take for India to build a more …
…
continue reading
1
The Bad Apple Latte: How One Insider Nearly Brewed a Cyber Disaster
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17In this episode of Darnley’s Cyber Café, we dive into the real story behind CrowdStrike’s recent insider scandal, and what it teaches us about the hidden dangers brewing inside modern companies. We break down how a “bad apple” employee allegedly leaked internal information to a notorious hacking collective, why insider threats are so hard to detect…
…
continue reading
1
Guest: Sarah W. Anderson, Attorney at Law, specializing in Cybersecurity
22:22
22:22
Play later
Play later
Lists
Like
Liked
22:22We discuss: Cyber ligation, biometrics and passwords, AI & Social Media from a legal perspectiveBy Haggai Davis
…
continue reading
1
From Commvault SHIFT 2025 – KB On The Go | Danielle Sheer and Avi Boru
42:43
42:43
Play later
Play later
Lists
Like
Liked
42:43In this bonus episode, KB sits down with Danielle Sheer, Chief Trust Officer at Commvault, and Avi Boru, Senior Director, Cloud Engineering, Network & Telecom at Lennar. Together they discuss building trust by design and how AI, transparency, and authentic relationships are shaping the future of business continuity and cyber recovery. Danielle Shee…
…
continue reading
1
S5: EP 007: Behind the Screens: The Real Impact of Customer Support
31:00
31:00
Play later
Play later
Lists
Like
Liked
31:00What really happens behind the scenes in customer support? In this episode of What the HealthTech, host Sophie Blackett chats with George Musgrave, Support Analyst at Radar Healthcare, to uncover the real impact of support teams in health and social care tech. George shares his journey through the company, the importance of first-line support, and …
…
continue reading
In this episode of All Things Policy, Swathi Kalyani, Geospatial Research Analyst and Anisree Suresh, Geoeconomics Research Analyst, at the Takshashila Institution, discuss the recent extreme poverty eradication claim by the state of Kerala. They delve into the definitions of poverty in India and Kerala, the historical evolution of the efforts towa…
…
continue reading
1
Ransomware Attacks Can Be DEADLY What Makes You SAFE?
57:25
57:25
Play later
Play later
Lists
Like
Liked
57:25Question? Text our Studio direct. We discuss How ransomware can kill and ways to build security resilience with Chris Loehr, SVP of Solis Security. Ransomware Attacks Can Be DEADLY What Makes You SAFE? Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done with full cyber chaos: 🔥 Int…
…
continue reading
1
Ep. 284 Automation That Keeps Agencies Running: Continuity Strategies for the Next Federal Shutdown
30:48
30:48
Play later
Play later
Lists
Like
Liked
30:48Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Every federal agency prepares a backup strategy to protect data. This is a rigorous endeavor in which teams practice what to do in the event of a breach or system failure. However, nobody really has a plan for a t…
…
continue reading
- JLR’s Cyber Shutdown Turns Costly - Revenue Drop from the Fallout - UK Economy Takes a Hit Too - Supply Chain Pain Across the Midlands - A Lesson in Economic Security. Support the show Support the show Remember... Even with top-tier security, human negligence and/or error can compromise systems. Invest in employee training—it’s the ultimate safeg…
…
continue reading
Cyber attacks don’t just knock systems offline—they can empty shelves, disrupt feeding schedules, endanger animals, and muddy price signals across the food supply. We sat down with Kristen (Demoranville) King, CEO of Anzen Sage and host of Bites and Bytes Podcast, to unpack how modern agriculture runs on a mesh of OT, data, and logistics that adver…
…
continue reading
Though exit barriers intend to preserve employment, they often have adverse implications. They deter the entry of new firms and lock productive resources into low-productivity firms, ultimately lowering the economy's overall productivity. In this episode of All Things Policy, Sarthak Pradhan talks to Dr Shoumitro Chatterjee, who explains the extent…
…
continue reading
1
From Forbes Fame to Federal Charges: The Shocking Tale of Charlie Javice!
8:30
8:30
Play later
Play later
Lists
Like
Liked
8:30Question? Text our Studio direct. Discover the shocking story of Charlie Javice, the entrepreneur who went from being featured on the cover of Forbes to facing a federal indictment. Learn about her rise to fame and the events that led to her downfall. Get the inside scoop on the controversies surrounding her business ventures and the charges brough…
…
continue reading
1
Hidden Signs of Child Trafficking: What Every Parent and Advocate Should Know (Part 2)
21:53
21:53
Play later
Play later
Lists
Like
Liked
21:53Many kids and teens won’t say “I’m being trafficked” BUT they will show signs. In Part 2 of this conversation, Mandi and Erin with Love146 answer real concerns from parents, teachers, and teens about how to recognize trafficking and what supportive adult response actually looks like. They dig into why asking gentle, curious questions can open the d…
…
continue reading
1
How to Set Realistic Recovery Point Objective (RPO) Goals
35:08
35:08
Play later
Play later
Lists
Like
Liked
35:08Want to know how much data you're really willing to lose? We're breaking down recovery point objective RPO - the agreement about how much data loss you can accept, measured in time. Most organizations have RPOs that are pure fantasy, claiming they can only lose an hour of data when they're backing up once a day. Curtis and Prasanna discuss why RPO …
…
continue reading
1
AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage
18:11
18:11
Play later
Play later
Lists
Like
Liked
18:11In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to target 30 global organizations. We explain how the attack was executed, why it matters, and its implications for cybersecurity. Join the conversation as …
…
continue reading
1
US - India Ties in Crisis : Impact on Military Capability Building
45:52
45:52
Play later
Play later
Lists
Like
Liked
45:52In this episode of All Things Policy, Air Marshal T.D. Joseph (Retd) and Brigadier Anil Raman (Retd) examine how growing tensions in U.S.–India relations are affecting India’s efforts to build its military capabilities. President Donald Trump’s turbulent handling of bilateral ties, particularly his trade-driven disruptions, has led many in India to…
…
continue reading
1
Why Smart Supplement Marketers Are Mining Cross-Category Opportunities
30:14
30:14
Play later
Play later
Lists
Like
Liked
30:14"Send me a text" Most supplement brands are stuck fighting the same tired battles in crowded single-benefit categories. Meanwhile, a small group of marketers are doing something different—and it's working. In this episode, we explore cross-category positioning: the strategy of addressing multiple connected health benefits instead of just one isolat…
…
continue reading
1
CAUGHT: Biggest Spy in US History--Spies, Lies & Cybercrime
55:51
55:51
Play later
Play later
Lists
Like
Liked
55:51Question? Text our Studio direct. 🔥New Episode🔥 dives into a famous betrayal case, showcasing the breach movie trailer as an example of Hollywood's take on espionage. This story highlights the perilous nature of insider threat and the critical importance of **counterintelligence**. We explore this true spy narrative, bringing you another compelling…
…
continue reading
1
Episode 100: Episode 100 - Security knowledge alone is not enough
28:03
28:03
Play later
Play later
Lists
Like
Liked
28:03In this episode, Richard is of the opinion that security knowledge is just not enough to succeed in this field.
…
continue reading
1
From FBI to Cybersecurity Leader: M.K. Palmore's Career Journey | Breaking Into Cybersecurity
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18In this episode of Breaking Into Cybersecurity, M.K. Palmore, a cybersecurity leader and former FBI special agent, shares his journey from serving in the Marines and the FBI to leading his own consulting firm, Apogee Global RMS. He discusses his early interest in technology, the importance of effective communication in cybersecurity leadership, and…
…
continue reading
1
What Happens in Your BRAIN During Social Engineering Attacks
53:32
53:32
Play later
Play later
Lists
Like
Liked
53:32Question? Text our Studio direct. What Happens in Your BRAIN During Social Engineering Attacks We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Season 8 is officiall…
…
continue reading
1
Cyber Journeys: Transition, Leadership, and Trekking with Bill "The Reel Bilbo" Boston
43:45
43:45
Play later
Play later
Lists
Like
Liked
43:45This week we chat with Bill Boston, also known as 'The Real Bilbo,' to explore his extensive journey from IT support roles to becoming a cybersecurity professional. With over 20 years in support and a strong background in healthcare and consulting, Bill shares unique insights into overcoming mental health challenges, the importance of being fair, f…
…
continue reading
1
CYFIRMA Research- Pig Butchering Scams: Cybercrime Threat Intelligence
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51Pig-butchering scams have evolved into one of the most damaging global cybercrime models, combining long-term emotional grooming, AI-driven impersonation, fake investment platforms, and sophisticated crypto-laundering networks. Our latest CYFIRMA Threat Intelligence Report breaks down: How global scam compounds operate like industrial-scale BPOs Th…
…
continue reading
Jobs with high exposure to AI are seeing signs of disruption, causing real anxiety about the future. Join Sridhar Krishna, Rijesh Panicker, and Bharath Reddy as they try and make sense of the downsizing, the impact on hiring, and explore how we can prepare for this transformation. All Things Policy is a daily podcast on public policy brought to you…
…
continue reading
Question? Text our Studio direct. LOCKBIT Cyber Crime Takedown Uncovered! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Backgroun…
…
continue reading
1
teissTalk: Resilience as a business outcome
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10Identifying critical assets and dependencies to focus investment where impact is highest Designing for rapid recovery with tested runbooks and clear RTO/RPO targets Strengthening resilience through training, playbooks, and cross-functional drills Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Scott Hardy, CISO, Sargent-Dis…
…
continue reading
MeitY has officially notified the DPDP Rules 2025, paving the way for implementing India's Digital Personal Data Protection Act. However, there are multiple aspects to be considered when reading the Act and Rules such as consent, data retention, children's data protection, grievance redressal, etc. In this episode of All Things Policy, Adya Madhava…
…
continue reading
1
Ep. 283 Smarter, Scalable Threat Hunting to Protect Federal Data
21:56
21:56
Play later
Play later
Lists
Like
Liked
21:56Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com The federal government recognizes that threats are multiplying at an exponential level. In fact, in October 2025, CISA released a free vulnerability scanner, and 10,000 organizations have signed up. Today, CISA is…
…
continue reading