The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Cyber Defense Podcasts
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Welcome to Channel Security Secrets. Join host, Lou Rabon, each week to expose the untold secrets and critical insights from the minds shaping the future of cybersecurity sales in the trusted advisor channel. Channel Security Secrets is brought to you by Cyber Defense Group, on a mission to shift cybersecurity from reactive to resilient. Explore all episodes and resources at: https://www.cdg.io/podcast/
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
We are going to teach you how to defend yourself against cybercrime, privacy abuse, vehicle hacking, bomb drones and cyber warfare, REGARDLESS of your proficiency with computers. Because you don't have to be technical to survive the Digital Age!
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
The GovCIO Media & Research podcast network comprises GovCast, CyberCast and HealthCast featuring conversations with key leaders on timely issues impacting the federal IT landscape. Topics include cybersecurity, artificial intelligence, cloud computing, IT modernization, data analytics, workforce development and more. New episodes release each Tuesday.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
…
continue reading
A "real clear" discussion of contemporary issues in defense featuring the writers and editors of RealClear Defense.
…
continue reading
Welcome to "Cyber Compliance and Beyond," a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
…
continue reading
Best 10-minute, daily tech podcast on emerging technologies, hundreds of Silicon Valley CEOs, Influencers and Celebrities. Hosted by technology executive and creator of Coruzant Technologies.
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
Taking the cannel to new levels giving short insights to geopolitical issues around the world that everyone should be aware of. Philip INGRAM MBE, is a former senior British Military Intelligence officer and now presenter, presenters friend and commentator on Times Radio, Talk, Sky News, the BBC and many other global channels
…
continue reading
Kill Chain features experts and guests in the platform and vehicle cybersecurity space. Each week we'll discuss the latest in cybersecurity news as well as topics surrounding platform and vehicle cybersecurity.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
In a world where technology and cybersecurity are constantly evolving, staying ahead of the curve is no longer just an option—it's a necessity. Prime Cyber Insights plunges you into the fast-paced universe of tech and cybersecurity, where the stakes are high, and the pace is relentless. Hosted by Niko Pulse and Kyra Pixel, this daily podcast is your essential guide to navigating the ever-changing landscape of technology and cybersecurity. From AI breakthroughs to the latest in cyber threats, ...
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Enterprise Security Tech presents The Cyber Jack Podcast. The Cyber Jack Podcast brings together critical news, expert insights, and product information to help CISOs, CIOs, and CEOs make informed IT technology and cybersecurity decisions.
…
continue reading
Exploring practical applications of artificial intelligence in business. We learn from leading AI startups and executives how AI is reinventing the way we run businesses and our society.
…
continue reading
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
The weekly news show on defense politics, policy, procurement and technology from the the world's leading defense media, Breaking Defense. Available here in audio podcast form, or on our site in video. Follow and subscribe today!
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Mastering Cybersecurity is your narrated audio guide to the essential building blocks of digital protection. Each 10–15 minute episode turns complex security concepts into clear, practical lessons you can apply right away—no jargon, no fluff. From passwords and phishing to encryption and network defense, every topic is designed to strengthen your understanding and confidence online. Whether you’re new to cybersecurity or refreshing your knowledge, this series makes learning simple, smart, an ...
…
continue reading
We are Morrison & Foerster. We are MoFo. We are synonymous with a commitment to client service and advisors to market-changing deals and impact litigation. Our clients include some of the largest financial institutions, Fortune 100 companies, and leading technology and life sciences companies. We represent investment funds and startup companies, and over the years have supported their growth and development as leading industry players and household brands.
…
continue reading
Worldwise Wealth is a podcast designed for global-minded entrepreneurs and investors eager to build borderless lives. Each episode dives into strategies for international diversification, including second residencies and citizenships, unlocking new financial landscapes, and understanding your global diversification opportunities. With insights from experts across the globe, we offer practical steps for leveraging global markets, reducing tax burdens, and achieving personal freedom through a ...
…
continue reading
Are you prepared to embrace change, take risks and disrupt yourself in response to the digital disruption in banking? If not, this podcast is for you. Hosted by top 5 banking and fintech influencer, Jim Marous, Banking Transformed highlights the leadership and cultural challenges facing the banking industry. Featuring interviews with some of the top minds in business, this podcast explores how financial institutions can prepare for the future of banking.
…
continue reading
Our podcast covers major data breaches, digital privacy issues, and the quirks of internet culture with a mix of humor and insight. Why Subscribe? Stay Informed: Get the latest updates on cybersecurity threats, ransomware attacks, and cyber insurance trends. Engaging Content: We break down complex topics with a lighthearted approach, making them easy to understand. Expert Insights: Learn from industry experts and our own experiences in the cybersecurity field. We dive deep into the latest in ...
…
continue reading
Shoveling Smoke – A Frantz Ward Lawcast is a podcast series created by Frantz Ward LLP, a full-service law firm in Cleveland, Ohio. Supreme Court Justice Oliver Wendell Holmes said that "lawyers spend a great deal of their time shoveling smoke." One interpretation of his remark is that lawyers take a vague concept or principle and give it shape, clearing away the smoke. Our podcast series focuses on current legal issues and news items that may affect your business, your community or you as a ...
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
Latest internet technology, trends, and solutions
…
continue reading
In today's interconnected world, the lines between cybersecurity and safety are more crucial than ever. Join us on "Cyber Safety: The Life-Saving Distinction," where we delve into the critical differences that could protect your digital life and personal well-being. Hosted by cybersecurity enthusiast Allison Cutts (AJ), this podcast explores the nuances of staying secure in a fast-paced digital age. Each episode offers insightful discussions, expert interviews, and practical advice to help y ...
…
continue reading
1
CyberCast: EPA Evolves Cyber Defense Amid Rising Threats
19:59
19:59
Play later
Play later
Lists
Like
Liked
19:59The U.S. is facing a surge in advanced threats from nation-state actors like China and Russia, who are increasingly probing critical infrastructure vulnerabilities. David Travers, director of the Environmental Protection Agency's (EPA) Office of Water Emergency Response and Cybersecurity, noted how escalating risks to the nation's water sector has …
…
continue reading
1
The Hidden Threat: Harvest-Now-Forge-Later and the Collapse of Digital Trust
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22As quantum computing advances, organizations can no longer view post-quantum cryptography as a future project. In this episode of Shielded: The Last Line of Cyber Defense, Konstantinos Karagiannis, Director of Quantum Computing Services at Protiviti, lays out a practical and attacker-focused perspective on preparing for the quantum era. Konstantino…
…
continue reading
1
Defensive Security Podcast Episode 331B
1:10:28
1:10:28
Play later
Play later
Lists
Like
Liked
1:10:28Reposting Episode 331 due to the wrong mp3 attached to the original. Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://cloud.google.com/blog/topics/threat-intelligence/unc6040-proactive-hardening-recommendations https://www.theregister.com/2025/11/13/chinese_spies_claude_attacks/…
…
continue reading
1
Securing the AI Era: Joshua Scott on Automation, Risk, and the Future of Cyber Defense | Ep 1159
9:08
9:08
Play later
Play later
Lists
Like
Liked
9:08In this episode of The Digital Executive, host Brian Thomas welcomes Joshua Scott, Vice President of Security at Hydrolix and a veteran with nearly 30 years of experience turning complex security risks into clear business value. Josh shares how Hydrolix is redefining what’s possible with massive-scale log data—processing everything from terabytes t…
…
continue reading
1
Cyber Defense Radio – Brad Taylor - CEO - Proficio – Hotseat Podcast – 2025
18:27
18:27
Play later
Play later
Lists
Like
Liked
18:27🚨 New Episode of Cyber Defense Radio is LIVE! 🎙️ Hosted by Annabelle Thomas — Cybersecurity Champion of @CyberDefenseMag In this compelling interview, Brad Taylor, CEO of Proficio, joins the Hotseat Podcast to share how Proficio @proficioinc transformed from a startup into a top-tier leader in the MDR (Managed Detection & Response) market. Discover…
…
continue reading
1
Threat-Informed Defense: Using ATT&CK and Models to Plan Improvements
11:08
11:08
Play later
Play later
Lists
Like
Liked
11:08Threat informed defense means using knowledge about real attacks to guide security work, so defensive choices stay connected to how adversaries actually behave in the world. For a beginner, this idea matters because it turns cybersecurity from a pile of disconnected tools into a story about attackers, their steps, and the ways defenders can interru…
…
continue reading
1
The Rise of AI in Cyber Defense Strategy | Harry Thomas, Frenos
44:46
44:46
Play later
Play later
Lists
Like
Liked
44:46In this episode of the Tesoro AI podcast, host Darius Gant interviews Harry, a former nurse turned cybersecurity expert and the founder of Frenos, an AI-native OT security posture management platform. Harry shares his unique career journey from the medical field to cybersecurity and AI, delving into his transition phases and the creation of Frenos.…
…
continue reading
1
EP 153 No Tech Just Cyber - Why Defensive Security Isn’t Enough Anymore with Terry Cutler International Award-Winning Cybersecurity Expert
52:14
52:14
Play later
Play later
Lists
Like
Liked
52:14Send us a text 🎧 Episode Summary — “Why Defensive Security Isn’t Enough Anymore” In this episode, cybersecurity author, keynote speaker and ethical hacker Terry Cutler joins The Security Circle to unpack the harsh realities of today’s cyber threat landscape. Terry discusses the shift organisations are experiencing as budgets tighten while attacks a…
…
continue reading
1
Blueprint for Defense: How DCISE is Securing the Defense Industrial Base
1:16:36
1:16:36
Play later
Play later
Lists
Like
Liked
1:16:36Terry Kalka, Director of DCISE, the critical information-sharing center for the DoD Cyber Crime Center, visits the Cyber Coffee Hour. He reveals how actionable threat intelligence is shared across more than 1,300 defense partners, driving collaboration and innovation to strengthen DoD data defense. Learn what it takes to win the cyber fight togethe…
…
continue reading
1
Inside State Cyber Defense: Whole-of-State Security with Alabama's Daniel Urquhart and Chad Smith
28:52
28:52
Play later
Play later
Lists
Like
Liked
28:52State and local governments are stepping up to defend critical services against fast-evolving cyber threats. In this episode of Cyber Focus, Alabama's top IT leaders show how they're staying ahead of the curve. They explain how a hybrid, highly decentralized environment forces them to lean on shared standards, SLCGP funding, and whole-of-state part…
…
continue reading
1
Cyber Insurance Explained: What Blue Teams Need to Know Before an Incident
32:54
32:54
Play later
Play later
Lists
Like
Liked
32:54From teaching AP art history to brokering cyber insurance deals. 🎓➡️🛡️ In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Andy Runyan from Yukon to break down everything blue teamers need to know about cyber insurance — before an incident happens. Andy shares his unconventional journey from fourth-generation educator and b…
…
continue reading
1
Inside The Global Push For Offensive Cyber And Smarter Defense
45:32
45:32
Play later
Play later
Lists
Like
Liked
45:32Send us a text We trace how cyber policy tries to catch up with fast-moving threats, from decades-old laws to a new push for offensive capabilities. Along the way, we unpack what real resilience looks like for SMEs, critical infrastructure, and the talent pipeline that holds it all together. • Verona’s route from public policy to cybersecurity • Wh…
…
continue reading
1
How Microsoft Is Redefining Global Cyber Defense
35:30
35:30
Play later
Play later
Lists
Like
Liked
35:30Amy Hogan-Burney, Corporate Vice President of Customer Trust and Security at Microsoft joins Ann on this week's episode of Afternoon Cyber Tea to discuss her unexpected journey into cybersecurity, Microsoft’s evolving approach to combating global cybercrime, and the importance of collaboration across the private and public sectors. She reflects on …
…
continue reading
1
New National Security Strategy drops as Congress floats $901B NDAA
7:18
7:18
Play later
Play later
Lists
Like
Liked
7:18This week on The Weekly Break Out, Aaron Mehta and Lee Ferran break down the Trump administration's new National Security Strategy, what it signals for Europe, Russia and homeland defense — and how it aligns with what we heard at the Reagan National Defense Forum. Then after the break, the hosts dig into the compromise 2026 National Defense Authori…
…
continue reading
1
The Hidden Backbone of the Internet: Subsea Cable Security with Alex Botting
37:25
37:25
Play later
Play later
Lists
Like
Liked
37:25Undersea cables quietly carry almost all global internet traffic yet rarely feature in security debates. This episode explains how subsea infrastructure underpins the global economy, data flows, and modern military operations while facing frequent "accidental" disruptions and growing geopolitical risk. Listeners hear why chokepoints, island depende…
…
continue reading
1
Anthrax Response to Cyber IR to Hacking Teslas: Ex-Marine & Cyber Podcaster, Wil Klusovsky, reveals 2026's Deadliest Cyber Threats
59:19
59:19
Play later
Play later
Lists
Like
Liked
59:19Ever wondered what handling deadly anthrax at the US Capitol has in common with battling ransomware in 2025? What if the next big cyber attack isn't from hackers in a basement—but from quantum computers shattering your encryption overnight? In this unmissable episode of Ransomware Rewind, cybersecurity legend Wil Klusovsky spills insider secrets th…
…
continue reading
In this video, Jim Marous broadcasts from Miami’s Wynwood Arts District — one of the most vibrant creative hubs in the world. Using the evolution of Wynwood as a backdrop, Jim explores why so many financial institutions struggle to differentiate, why creativity has become a strategic imperative, and how banks can learn from brands and artists unafr…
…
continue reading
1
Inside Data Breaches and Human Behavior with Troy Hunt
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00Troy Hunt, founder of Have I Been Pwned, joins Ann on this week's episode of Afternoon Cyber Tea to explore what billions of breached records reveal about attacker behavior, human weakness, and the state of breach disclosure. He explains why organizations often hesitate to notify victims, how breach fatigue shapes user responses, and why transparen…
…
continue reading
1
Power Without Stealth: Should America Flex In Cyberspace Or Starve Cartels Online
1:13:48
1:13:48
Play later
Play later
Lists
Like
Liked
1:13:48Send us a text We trace Jake’s unlikely route from journalism to the White House, how DEF CON’s Voting Village began, and why imposter syndrome can be a secret advantage when paired with relentless learning. Then we pull apart cyber strategy, Stuxnet’s signal value, and a plan to choke fentanyl through targeted offensive operations against cartels’…
…
continue reading
1
The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin)
30:14
30:14
Play later
Play later
Lists
Like
Liked
30:14The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin) When attackers breached HubSpot in March 2022, they weren’t after HubSpot at all. They were after the customers of its customers. Crypto firms like Trezor, BlockFi, and Swan Bitcoin suddenly saw their users targeted by near-perfect phishing emails designed to st…
…
continue reading
In late 2023, the world’s most trusted identity provider experienced the kind of breach it was designed to prevent. Attackers quietly infiltrated Okta’s customer support system, stole session tokens hidden inside HAR files and used them to impersonate users across some of the most secure organizations on earth. For two full weeks, the intruders ope…
…
continue reading
1
The Widening Gulf Between Iran and the Gulf
58:18
58:18
Play later
Play later
Lists
Like
Liked
58:18Guest host Behnam Ben Taleblu is joined by former U.S. intelligence official Norman Roule to examine Iran’s postwar moment: from puncturing the comforting illusion created by viral clips of loosened social activity (or, as Norm puts it, why “a few videos of dancing and hijab-free afternoons don’t outweigh 21,000 arrests and expedited executions”) t…
…
continue reading
1
💡 AI & Cyber Safety: Staying Grounded in a Digital World
3:30
3:30
Play later
Play later
Lists
Like
Liked
3:30💡 AI & Cyber Safety: Staying Grounded in a Digital World In 2019, I experienced a cybercrime that shook me to my core. It wasn’t just financial — it challenged my confidence, my trust, and my sense of safety online. Today, with AI creating content faster and more convincingly than ever, the digital world can feel overwhelming. Deepfakes, manipulate…
…
continue reading
1
💛 Rebounding & Rebalancing After a Cybercrime
3:21
3:21
Play later
Play later
Lists
Like
Liked
3:21💛 Rebounding & Rebalancing After a Cybercrime 3 Steps to Rebuilding Confidence in a Digital World Today, I’m sharing one of the most personal videos I’ve ever created. When I experienced a cybercrime in 2019, it didn’t just impact my finances — it shook my confidence, my identity, and my sense of safety. What I learned through that season is that h…
…
continue reading
1
Pay Transparency in Cleveland: Compliance Tips for Employers
7:41
7:41
Play later
Play later
Lists
Like
Liked
7:41Frantz Ward Associate and Host Josh A. Friedman sits down with Associate Ben F. Kerns to break down Cleveland’s new Pay Transparency Ordinance, which took effect Monday, October 27, 2025. They discuss which employers and applicants are covered, what the ordinance requires in job postings, and how restrictions on salary history inquiries will impact…
…
continue reading
1
Building the Future with Agentic-AI: Deep Dive with Ben Wilcox
47:04
47:04
Play later
Play later
Lists
Like
Liked
47:04Episode 46: Building the Future with Agentic AI — Deep Dive with Ben Wilcox In this episode of Cybersecurity America, technologist and Proarch leader Ben Wilcox breaks down the biggest insights from Microsoft Ignite, including breakthroughs in agentic AI, emerging security trends, and what organizations must prepare for as AI-driven systems rapidly…
…
continue reading
1
Jeff Mahony: Fixing Blockchain for Real-World Use | Ep 1164
22:05
22:05
Play later
Play later
Lists
Like
Liked
22:05In this episode of The Digital Executive, host Brian Thomas welcomes serial entrepreneur and architect Jeff Mahony, founder of RYT, a purpose-built Layer-1 blockchain engineered for institutional-grade speed, security, and compliance. Jeff shares insights from founding and investing in over 30 companies across fintech, digital identity, and decentr…
…
continue reading
1
Beyond Best Practice: How We Really Build a Safer Digital World with Curtis Dukes
37:40
37:40
Play later
Play later
Lists
Like
Liked
37:40In this episode, Ciaran and James are joined by Curtis Dukes, Executive Vice President of the Center for Internet Security, to discover what “best practice” really means in cybersecurity today. Curtis draws on his extensive experience as former Head of the Information Assurance Directorate at the NSA, and discusses his current work on safe harbor l…
…
continue reading
1
How To Tell When a Vendor is Selling AI Snake Oil
33:51
33:51
Play later
Play later
Lists
Like
Liked
33:51All links and images can be found on CISO Series. Check out this post by Christofer Hoff of Truist for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Caleb Sima, builder, WhiteRabbit. Joining them is Crystal Chatam, vp of cybersecurity, Speedcast. In this episod…
…
continue reading
1
Investing in Relationship Capital - Tim Vandermel - Channel Security Secrets - Episode #19
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07How do you build lasting success in cybersecurity sales, when technology changes faster than trust can form? In this episode of Channel Security Secrets, host Lou Rabon sits down with Tim VanderMel, Global Technology Advisor at C3 Technology Advisors, an award-winning channel leader and U.S. Army veteran. Tim shares how he’s built his career on “re…
…
continue reading
1
How AI Is Rewriting SEO and Digital Strategy—With Adam Hamadache | Ep 1163
16:20
16:20
Play later
Play later
Lists
Like
Liked
16:20In this episode of The Digital Executive, host Brian Thomas sits down with Adam Hamadache, founder and CEO of Formula and ScorePlan, and one of the most respected voices at the intersection of AI, SEO, and hospitality. Adam shares the key turning points that helped him transform his agency from early hustle to a scalable, systemized growth engine—i…
…
continue reading
This is today’s cyber news for December third, 2025. Attackers are turning hacked home cameras, developer tools, and mobile phones into powerful surveillance and access channels that traditional controls struggle to cover. Leaders who understand these overlaps can better prioritize resilience, privacy, and vendor risk. Listeners will hear about sma…
…
continue reading
1
EP 154 When Sport, Strategy & Security Collide. Security Isn’t a Solo Sport — And Why That Needs to Change with Paul Harvey
1:03:15
1:03:15
Play later
Play later
Lists
Like
Liked
1:03:15Send us a text 🎧 Podcast Summary — When Sport, Strategy & Security Collide Security Isn’t a Solo Sport — And Why That Needs to Change In this powerful episode of The Security Circle, Yolanda “Yoyo” Hamblen sits down with security heavyweight Paul Harvey to explore the unexpected intersections between elite sport, leadership, crisis management, and …
…
continue reading
1
Cybercrime Reset - Life After Operation Endgame - Ep 178
13:56
13:56
Play later
Play later
Lists
Like
Liked
13:56Operation Endgame didn’t just disrupt a single ransomware group — it shook the entire cybercrime economy. In this episode, we break down how the world’s largest coordinated cyber takedown dismantled the loaders, botnets, and access brokers that ransomware groups relied on… and what criminals are building in their place. Cybersecurity expert Tyler M…
…
continue reading
1
Ashish Aggarwal on the Future of No-Code Monetization | Ep 1162
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55In this episode of The Digital Executive, Brian Thomas interviews Ashish Aggarwal, Co-Founder of AppBroda—a no-code ad network empowering mobile app and game developers to scale revenue without writing a single line of code. Drawing on his experience at Google working with thousands of developers, Ashish explains the industry’s biggest friction poi…
…
continue reading
1
The Army's "No Fail" Cyber Mission with Brandon Pugh
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48Army Principal Cyber Advisor Brandon Pugh joins Frank Cilluffo to address a stark reality: if critical infrastructure fails, the Army cannot mobilize. To meet this "no fail" mission, Pugh explains how the service is aggressively merging cyber with electronic warfare and cutting red tape to field new technology in days rather than years. They also d…
…
continue reading
1
Navy cancels Constellation-Class Frigate + Reagan Forum Preview
5:06
5:06
Play later
Play later
Lists
Like
Liked
5:06The Navy's decision to cancel its Constellation-class frigate program has shifted from quiet speculation to front-page news. In this episode of The Weekly Break Out, Breaking Defense unpacks what might come next for Fincantieri and US sailors. Then the conversation moves west to Simi Valley, where the upcoming Reagan National Defense Forum is set t…
…
continue reading
1
20 - Red Teamers and Pen Testers: Technical, Cloud and Soft Skills
50:54
50:54
Play later
Play later
Lists
Like
Liked
50:54There's no shortage of cybersecurity tools, but most compromises don't happen because of technology failures, they happen because of a failure in organizational processes. In today's episode, we explore how penetration testing and red teaming expose the people, processes and operational weaknesses that technology alone cannot. We discuss why securi…
…
continue reading
This is today’s cyber news for December 2nd, 2025. The brief highlights how everyday tools like browsers, developer extensions, mobile apps, and public Wi Fi are being bent into silent surveillance and credential theft channels that hit both consumers and enterprises. Listeners will hear how popular browser extensions turned into spying implants, h…
…
continue reading
1
Future of Banking Through the Eyes of a Shark
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35Today on Banking Transformed, I sit down with someone who never holds back – Kevin O’Leary from Shark Tank. We recorded this conversation live at the Catalyst Strategic Summit in Austin, where Kevin and I explored one of the biggest questions facing the industry today: What is the real future of retail banking—and where do smaller financial institu…
…
continue reading
1
Colin Cooper: Human-Centered AI | Ep 1161
11:13
11:13
Play later
Play later
Lists
Like
Liked
11:13In this episode of The Digital Executive, host Brian Thomas sits down with technologist, educator, and futurist Colin Cooper, whose lifelong passion for computing began at age 13 when he dismantled and rebuilt his father’s Olivetti 486. Now with 26+ years of global experience across 38 countries, Colin works at the intersection of AI, human behavio…
…
continue reading
1
“ISACs: The History, the Barriers, and the Future Through Streaming Defense”
24:17
24:17
Play later
Play later
Lists
Like
Liked
24:17I’m thrilled to announce the release of a powerful new episode diving into one of the most influential — yet often misunderstood — foundations of cybersecurity: ISACs and the future of collective cyber defense. In this conversation with Barrie Drum, CFE, Co-Founder of Streaming Defense, we unpack the past, present, and future of how organizations s…
…
continue reading
1
From Pre-Law to FLARE: How Josh Stroschein Became Google's Malware Analyst
39:38
39:38
Play later
Play later
Lists
Like
Liked
39:38In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Josh Stroschein — aka The Cyber Yeti — a former professor turned reverse engineer now working on one of the largest malware analysis teams in the world. Josh shares his unconventional path through .NET development, credit card processing security, and academia before landi…
…
continue reading
1
Roland Austrup on Turning R&D Into Real Growth | Ep 1160
10:47
10:47
Play later
Play later
Lists
Like
Liked
10:47In this episode of The Digital Executive, host Brian Thomas speaks with Roland Austrup, Chief Growth Officer and Executive Committee member at Innventure—an industrial growth platform that transforms validated R&D from multinational corporations into high-growth standalone companies. With deep experience as CFO, Head of Capital Markets, and now CGO…
…
continue reading
This is today’s cyber news for December 1st, 2025. The briefing opens on the holiday crush, where industrial-scale fake shopping sites and cloned Cyber Monday stores quietly skim cards and personal details while banks and brands eat the fallout. From there it moves into the developer stack, with tens of thousands of live secrets sitting in public G…
…
continue reading
1
Unlocking Data Protection: Vishnu Varma on Cybersecurity Challenges
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55Send us a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how Bo…
…
continue reading