Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
…
continue reading
Cyber Resilience Strategies Podcasts
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
The Cyber Resilience Brief is your 15-minute pulse on how organizations can build stronger defenses and achieve true cyber resilience. Each episode dives into the practical realities of Breach and Attack Simulation (BAS), adversarial exposure validation, and the evolving strategies that keep modern enterprises secure. Hosted by Tova Dvorin and brought to you by SafeBreach — the leader in Adversarial Exposure Validation — this podcast features insights from cybersecurity leaders, integration ...
…
continue reading
Cyber resilience is fast emerging as the driving force behind critical business continuity in our digital era. Faced with brownouts, blackouts, and the ‘when not if’ nature of cyberattacks, how do businesses harness this resilience for stronger cybersecurity and networking? Listen in to The Resilience Factor as our hosts — renowned social engineer Jenny Radcliffe and Zscaler’s own Kate Baker — explore how organizations and employees can fail forward to adapt with confidence. Through trend-ba ...
…
continue reading
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
…
continue reading
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™
Startuprad.io – Europe’s Startup & VC Podcast Network
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
Pathways-2-Partnership (P2P) delivers expert insights, real-world success stories, and actionable strategies from MoveAmerica—the premier think tank for public-private collaboration. Each episode will explore innovations, partnerships, and policies that strengthen the defense industrial base, secure supply chains, and drive mission success. Created for entrepreneurs, industry executives, government leaders, and policy makers, P2P helps you navigate the acquisition processes, ethically influe ...
…
continue reading
The Global Warming is Real podcast seeks to raise awareness and inspire action. We advocate for climate action, environmental stewardship, and sustainable human development Through compelling storytelling and insightful interviews, we explore the realities of global warming and highlight innovative solutions from around the world. Our show combines first-person narratives, meditations, book reviews, and expert discussions with authors, activists, scientists, policymakers, and entrepreneurs. ...
…
continue reading
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
…
continue reading
In a world where technology moves faster than strategy, how do businesses keep their data and their future secure? Smarter, Strategic Thinking brings you conversations with leaders, innovators, and partners shaping the future of IT. From ransomware protection and storage innovation to smarter infrastructure decisions, each episode explores the strategies that matter most to today’s technology leaders. Hosted by Fortuna Data — trusted partners of IBM, Lenovo, Seagate, HYCU, QNAP, and Qualstar ...
…
continue reading
Broadcasting from Dubai, The CTO Show with Mehmet explores the latest trends in technology, startups, and venture funding. Host Mehmet Gonullu leads insightful discussions with thought leaders, innovators, and entrepreneurs from diverse industries. From emerging technologies to startup investment strategies, the show provides a balanced view on navigating the evolving landscape of business and tech, helping listeners understand their profound impact on our world. [email protected]
…
continue reading
CyberCast offers a different and thoughtful perspective on the cybersecurity issues facing industry and government today. 213656
…
continue reading
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
…
continue reading
The Defence & Security Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence and security industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynami ...
…
continue reading
What sets *Build Your Empire Podcast* apart is the focus on practical wisdom. Every episode begins with a “Weekly Stoic Quote” to set the mindset for the journey ahead, and guests share actionable advice both in their field of expertise and for life in general. Whether you’re listening to a well known sports figure or another empire builder, we share strategies for overcoming challenges, discussions on the importance of mental and physical health, and the lessons learned here are meant to re ...
…
continue reading
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Russ Branzell, President & CEO of the College of Healthcare Information Management Executives (CHIME), interviews leaders in Digital Health from around the world. These thought leaders share their knowledge, challenges, best practices, and ideas for helping to transform health and care on a global level.
…
continue reading
Expert-driven insights and practical strategies for navigating the future of AI and emerging technologies in business. Led by an ensemble cast of expert interviewers offering in-depth analysis and practical advice to make informed decisions for your enterprise.
…
continue reading
"On Aon" offers conversations between Risk Capital and Human Capital experts and guests about the Risk and People issues impacting businesses around the world. Each episode provides unique insights to help industry experts make better decisions across Trade, Technology, Weather and Workforce.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
One CA Podcast is here to inspire anyone interested in traveling to work with a partner nation’s people and leadership to forward U.S. foreign policy. We bring in current or former military, diplomats, development officers, and field agents to discuss their experiences and give recommendations for working the ”last three feet” of foreign relations. The show is sponsored by the Civil Affairs Association.
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Delivering considered, contextual strategic communications advice. The Aprio team is a group of skilled, experienced and highly-regarded communications specialists and our strategically-minded team of experts allows us to deliver and implement strategies in key business areas such as investor relations, crisis and issue communications, digital strategy and content creation, and training and development. Recorded and produced by Solid Gold Podcasts | #BeHeard
…
continue reading
In just 25 minutes, I deliver concise and thought-provoking conversations with top minds in technology, cybersecurity, business, culture and enterpreneurship. Whether you’re a technologist, executive, culture-enthusiast or someone passionate about growth, each episode explores trends, strategies and ideas that shape success. For those with limited time but unlimited ambition, 25Minutes offers actionable insights and fresh perspectives where they matter most. Your time is valuable. Your 25 mi ...
…
continue reading
The energy industry is evolving—how will quantum computing, AI, and digital transformation shape the future? Join CGI’s experts as they discuss the latest trends in decarbonization, grid modernization, and disruptive technologies driving the energy transition. Topics include: The impact of AI, quantum computing, and digital transformation Decarbonization strategies and the rise of green energy How utilities are modernizing power grids and improving resilience Innovations in battery storage, ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Bringing you the latest news, views and experiences in Technology, Talent and Transformational change hosted by CTO, Author and leading Tech For Good advocate Prof. Sally Eaves @sallyeaves. With weekly episodes and an inspiring diversity of guests from some of the most pioneering organisations, projects and people of our time, this is Your engaging space to learn from C-Suite to Student, CIO to Academic and Enterprise to SME. Our shows focus on the latest innovations in emergent technology i ...
…
continue reading
Business Matters with Karl Fitzpatrick is a popular business podcast that has featured over 2,000 interviews with entrepreneurs from Ireland, UK, Australia and the United States. Karl Fitzpatrick is an EY Entrepreneur of the Year Finalist and CEO of Chevron College. Chevron employs 135 staff and delivers further and higher education programmes to over 15,000 students annually, through e-learning. Business Matters delves into all aspects of entrepreneurship and business development. Hosted by ...
…
continue reading
Upgrade Your Future with actionable advice from the world’s most brilliant minds in technology and human science. Join multi-million dollar business founder, leadership coach, neuroscience junkie, and Navy Seal wannabe Javier Guerra. Each episode, we're sharing powerful advice from global thought leaders. Presented by: TechHuman.com
…
continue reading
Founded in 1990 by Marc Lee, former Managing Director of FT Business Enterprises who established and ran the Financial Times global conference business, Cityforum has for many years been acknowledged as a major contributor to public policy debate. Cityforum comprises a small, trusted, fully independent group of experienced individuals, respected for their intellectual honesty, knowledge and extensive contacts across every level of the private, public and not-for-profit sectors, at home and a ...
…
continue reading
The Gem of all Mechanisms podcast is an interview series, where we talk to people in the know from many different disciplines: academics, computer scientists, policy makers, philosophers and more about the complexities of 21st century tech and how it affects us all. It is produced by BCS, the Chartered Institute for IT. BCS is on a mission to ensure everyone’s experience with technology is positive. We support the people who work in the industry and aim to make IT good for society. Our membe ...
…
continue reading
1
SPOTLIGHT: Maritime readiness and the evolving AUKUS journey, with Leidos' Kevin Quarderer and ANU's Jennifer Parker
23:41
23:41
Play later
Play later
Lists
Like
Liked
23:41In this episode of the Defence Connect Spotlight podcast, host Steve Kuper speaks with former US naval attaché to Australia and Leidos Australia international science and technology director Kevin Quarderer and leading naval strategist Dr Jennifer Parker, an expert associate at the National Security College - The Australian National University. The…
…
continue reading
1
Breaking Free from Busywork: AI and the Future of Profitable Client Delivery
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38Client service teams are at a breaking point. Margins are shrinking, the demand keeps rising, and much of the day is consumed by work that doesn’t move the needle. As a result, skilled people often spend hours reconciling spreadsheets, re-entering the same data across multiple systems, and chasing updates, time that should be spent on the work clie…
…
continue reading
1
CYBER UNCUT: The National AI Plan, social media ban worries, and Aussie retailer Oxford hacked – plus e-sports!
37:53
37:53
Play later
Play later
Lists
Like
Liked
37:53In this episode of the Cyber Uncut podcast, David Hollingworth and Bethany Alvaro talk about the week's cyber security and AI news! Hollingworth and Alvaro get things started by unpacking the Australian government's National AI Plan. Is it actually good governance, or more of a vibe ripe to be abused by the AI giants? The pair then talk about the e…
…
continue reading
1
Ep. 33 - BRICKSTORM Reemerges: CISA & NSA Warn of New Persistence Tactics and Cyber Resilience Gaps
12:31
12:31
Play later
Play later
Lists
Like
Liked
12:31In Episode 33 of The Cyber Resilience Brief, hosts Tova Dvorin and Adrian Culley revisit the BRICKSTORM threat—this time through the lens of the new CISA, NSA, and Canadian Cyber Centre joint advisory. While Episode 24 explored BRICKSTORM’s origin, stealth techniques, and UNC5221’s long-term espionage campaign, this episode focuses on what’s change…
…
continue reading
1
#550 From Zero to a Million-Dollar Month: How Colin McIntosh Built a Breakout Consumer Startup
1:02:28
1:02:28
Play later
Play later
Lists
Like
Liked
1:02:28In this conversation, Colin opens the curtain on how Sheets & Giggles became a breakout DTC success by doing things differently: selling before building, leaning into humor, making bold brand decisions, and prioritizing community and impact over hype. This episode is packed with practical lessons for founders navigating uncertainty, fundraising, pr…
…
continue reading
1
How Generative AI is Transforming Customer Experience Today
22:24
22:24
Play later
Play later
Lists
Like
Liked
22:24With the rapid evolution of Generative AI, customer experience (CX) is evolving rapidly, too. In a recent episode of the Tech Transformed podcast, Mike Gozzo, Chief Product and Technology Officer at Ada, sat down with host Christina Stathopoulos, Founder of Dare to Data. They talked about how generative AI is changing business-to-customer interacti…
…
continue reading
1
The Case for Audacity in AI and Capacity Management Strategy
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34What Keeps You Up at Night? – Tales from the Digital Frontier The Case for Audacity in AI and Capacity Management Strategy Russ Branzell welcomes Erik Barnett, Health Partner at Guidehouse and leader of the Health Technology Consulting Practice, for a candid discussion on the realities of AI adoption in healthcare. Drawing on his experience as both…
…
continue reading
1
#549 Why Small Teams Win: Mark Donnigan on GTM, Marketing, and Founder-Led Growth
1:05:04
1:05:04
Play later
Play later
Lists
Like
Liked
1:05:04Mark Donnigan has spent decades helping deep tech and video technology startups translate complex products into commercial traction. In this conversation, we cover why early stage companies must stay lean, how to diagnose GTM confusion, and what AI first marketing looks like in practice. We also dig into the new buyer journey in B2B, why content is…
…
continue reading
1
Launched effects and attack helicopter modernisation, with Terry Jamison
23:27
23:27
Play later
Play later
Lists
Like
Liked
23:27In this episode of the Defence Connect Podcast, host Robert Dougherty is joined by business development director for Boeing Attack Helicopter Programs, Terry "TJ" Jamison, as they discuss the changing strategy of attack helicopters in modern warfare and the development of "launched effects". Jamison, a 30-year veteran of the US Army, has previously…
…
continue reading
1
How Modern Cyber Resilience Really Works With Panzura
27:08
27:08
Play later
Play later
Lists
Like
Liked
27:08Send us a text Relying on reactive backup alone is no longer enough. In this episode of Smarter Strategic Thinking, we sit down with Panzura’s CTO to explore how their hybrid cloud file and data services platform is built for cyber resiliency, data security, governance and compliance. We discuss how Panzura combines real-time anomaly detection base…
…
continue reading
1
Ep. 32 - Inside “The Com”: The Social-Engineering Supergroup Behind Global Ransomware Attacks
17:12
17:12
Play later
Play later
Lists
Like
Liked
17:12In this episode of The Cyber Resilience Brief, host Tova Dvorin and offensive security expert Adrian Culley expose The Com—the decentralized cybercrime collective behind threat groups like Lapsus$, Scattered Spider (UNC 3944 / Octo Tempest), and ShinyHunters. Together, they break down how this teenage-to-young-adult adversary ecosystem has weaponiz…
…
continue reading
1
The 3G Sunset Worldwide: How Enterprises Can Avoid Device Disruption
18:23
18:23
Play later
Play later
Lists
Like
Liked
18:23The era of 3G is ending. For many industrial businesses, smart infrastructure systems, remote device management, and IoT connectivity rely on networks that are now being phased out globally. The question isn’t if—but when your operations could be disrupted. In this episode of Tech Transformed, Trisha Pillay speaks with Jana Vidis, Business Developm…
…
continue reading
1
Navigating Legacy Cybersecurity and Quantum Threats with Damien Fortune
32:46
32:46
Play later
Play later
Lists
Like
Liked
32:46Welcome back to Forcepoint's "To the Point Cybersecurity Podcast," where hosts Rachael Lyon, Jonathan Knepher, and Damien Fortune explore the fast-moving world of cybersecurity and its impact on our businesses, governments, and everyday lives. In this episode, we dive into legacy vulnerabilities, quantum-powered threats, and the ongoing tug-of-war …
…
continue reading
1
Risk and Resilience in the Age of Autonomous Vehicles
18:30
18:30
Play later
Play later
Lists
Like
Liked
18:30On Aon — Episode 97 Risk and Resilience in the Age of Autonomous Vehicles Autonomous vehicles and self-driving technology are no longer futuristic — they’re transforming how we move today. As adoption accelerates worldwide, insurers face a new set of risks and opportunities. Jillian Slyfield, Aon’s global chief innovation officer and global technol…
…
continue reading
1
#548 AI, Threats, and the New Cyber Resilience Playbook With Gerald Beuchelt & Subu Rao
53:38
53:38
Play later
Play later
Lists
Like
Liked
53:38In this conversation, Mehmet is joined by Gerald Beuchelt and Subu Rao, two cybersecurity leaders from Acronis, to unpack the evolving threat landscape, the rise of AI in both offense and defense, and why cyber resilience has become a board-level priority. They break down what CISOs need to know, how MSPs can create new value, and what frameworks a…
…
continue reading
1
254: Iran’s Criminal Playbook. Sam Cooper on Cartels, Diaspora Networks, and Strategic Evasion
19:37
19:37
Play later
Play later
Lists
Like
Liked
19:37Investigative journalist Sam Cooper returns to the One CA Podcast to expose how Iran weaponizes criminality to advance foreign policy goals. From Hezbollah’s business affairs unit to fentanyl super-labs in Canada, Cooper traces the global footprint of Iranian-linked networks—intertwined with Chinese triads, Mexican cartels, and diaspora businessmen…
…
continue reading
1
SPOTLIGHT: Leveraging digital capabilities to empower Defence with Dee Lucero and Mohammad Siddique, DXC Technology
42:56
42:56
Play later
Play later
Lists
Like
Liked
42:56In this episode of the Defence Connect Spotlight podcast, host Steve Kuper is joined by Dee Lucero and Mohammad Siddique from DXC Technology, where they unpack the intricacies of the Defence Enterprise Resource Planning program and the role of digital systems in supporting the broader transformation. The trio also discuss a range of factors shaping…
…
continue reading
1
From air gaps to zero-trust: Building cyber-physical resilience in the modern grid
16:22
16:22
Play later
Play later
Lists
Like
Liked
16:22Send us a text Zero-trust, device identity and cyber-physical resilience are now essential for securing modern energy grids. In this episode, CGI’s Andrea Grad speaks with PHYSEC CEO Prof. Dr. Christian Zenger about protecting OT, IoT, smart meters, substations and distributed energy resources (DERs) at scale. They also examine how regulations such…
…
continue reading
1
CYBER UNCUT: Holiday scams, pollies warned ahead of Chinese visit, and Russian hackers sanctioned
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16In this episode of the Cyber Uncut podcast, David Hollingworth and Bethany Alvaro talk about the week's cyber security and AI news! Hollingworth and Alvaro get things started with a warning about a rise in AI-driven holiday scams taking advantage of the silly season. The pair also talk about a recent call from CPA Australia for young Australians to…
…
continue reading
1
Black (Cyber) Monday: How the Sausage is Made in an Instantaneous, Digital World
7:32
7:32
Play later
Play later
Lists
Like
Liked
7:32How I Felt Ridiculous When I Ordered Same-Day Delivery In this short bonus episode, I briefly examine the complexities of modern consumerism and the often-overlooked hidden costs of our convenience-driven shopping habits. As we rush into another holiday shopping season, I revisit a 2018 article that explored the darker side of online shopping conve…
…
continue reading
1
#547 Why OKRs Fail: Radhika Dutt on Building Teams That Think, Learn, and Adapt
57:52
57:52
Play later
Play later
Lists
Like
Liked
57:52In this episode, Mehmet sits down with Radhika Dutt, author of Radical Product Thinking, to explore why OKRs and traditional performance frameworks often collapse under the realities of modern work. Radhika introduces OLA, a new approach built on puzzle-solving, continuous learning, and adaptability — designed for today’s fast-moving product, engin…
…
continue reading
1
The Dark Truth About Modern Cyber Threats | Joshua Domagalski, CISO, Astronomer
41:09
41:09
Play later
Play later
Lists
Like
Liked
41:09In this powerful episode, host David Redekop sits down with Joshua Domagalski, Chief Information Security Officer and former offensive operator, to explore the real complexities of modern cyber defense. Joshua opens up about his journey from the military to cybersecurity leadership, the shift from attacking systems to protecting them, and why defen…
…
continue reading
1
The Progress Report: The drone age and STEM's next generation
40:40
40:40
Play later
Play later
Lists
Like
Liked
40:40How do you go from growing up in Ukraine to winning Academic of the Year in Australia? Dr Oleksandra Molloy, senior lecturer in aviation at UNSW Canberra, shares her extraordinary journey. Tash Taylor dives into Oleksandra's courageous move to Australia and her experience pioneering research in emerging technologies, particularly her vital work on …
…
continue reading
1
Barrierefreiheit: Das Internet ist für alle da (dgna)
1:17:48
1:17:48
Play later
Play later
Lists
Like
Liked
1:17:48Digitale Dienstleistungen und Angebote sind aus dem Alltag nicht mehr wegzudenken. Von reiner Informationsvermittlung bis zur KI-Interaktion: Das Web ist unser ständiger Begleiter. Was aber tun all jene Menschen, die aufgrund von körperlichen oder geistigen Beeinträchtigungen nur bedingt oder im schlimmsten Fall gar nicht am Netz teilhaben können?D…
…
continue reading
Send us a text In this episode, Ray speaks with Stefan Ferrari from Vawlt, the multi-cloud storage platform built for resilience, predictable costs and zero-knowledge security. You’ll learn how Vawlt: • Stores data across AWS, Azure, GCP, Wasabi & Backblaze simultaneously • Eliminates egress fees and API charges • Protects data even if a cloud prov…
…
continue reading
1
Looking back on the year that's been, with the Honourable Pat Conroy MP, Minister for Defence Industry
39:35
39:35
Play later
Play later
Lists
Like
Liked
39:35In this episode of the Defence Connect Podcast, host Steve Kuper is joined by Minister for Defence Industry, Pat Conroy, as they unpack the major milestones for Defence and defence industry. The pair discuss a range of topics, including: The impact of the SEA 3000 decision and implications for industrial and defence cooperation between Australia an…
…
continue reading
1
#546 Reinventing GTM: Jonathan Kvarfordt on Building AI Native Revenue Teams
53:51
53:51
Play later
Play later
Lists
Like
Liked
53:51In this conversation, Jonathan breaks down the real state of AI adoption in GTM, why most revenue teams are still “stuck in the basics,” and how leaders can shift from dashboards to intelligence. He explains why CRM data hygiene is dead, how operational AI works behind the scenes, and what it truly means to run an AI native revenue team. From first…
…
continue reading
1
Episode 21- How Healthcare Cybersecurity Became A Patient Safety Issue. With Jen Ellis
53:35
53:35
Play later
Play later
Lists
Like
Liked
53:35The alarms aren’t just in the data center anymore. When ransomware shutters clinics and pushes oncology schedules into chaos, the question isn’t “What did they exfiltrate?” It’s “Who didn’t get care?” We sit down with Jen Ellis, founder of NextGen Security and co-chair of the Ransomware Task Force, to unpack how cybersecurity in healthcare became a…
…
continue reading
1
European Tech Sovereignty: The November 2025 DACH Startup News Briefing
22:25
22:25
Play later
Play later
Lists
Like
Liked
22:25Europe's startup narrative is changing fast — from apps and valuations to sovereignty, infrastructure and resilience. In this month's DACH Startup News, we unpack the moves that made European tech sovereignty the defining theme of 2025. What you’ll learn: – Why sovereign cloud is becoming foundational for startups and enterprise buyers – How AI, ro…
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deBy OWASP German Chapter
…
continue reading
1
News from the Juice Shop ecosystem (god2025)
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a c…
…
continue reading
1
OWASP Top 10:2025: Aktuelle Informationen und Insights zum Projekt (god2025)
11:10
11:10
Play later
Play later
Lists
Like
Liked
11:10Der Kurzvortrag stellt den aktuellen Stand der OWASP Top 10:2025 vor, mit etwas Glück haben wir bis dahin schon mehr...Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deBy Torsten Gigler
…
continue reading
1
YuraScanner: Leveraging LLMs for Task-driven Web App Scanning (god2025)
22:08
22:08
Play later
Play later
Lists
Like
Liked
22:08Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresse…
…
continue reading
1
Der Cyber Resilience Act: Wie OWASP für die Software-Hersteller eine entscheidende Rolle spielen kann (god2025)
21:12
21:12
Play later
Play later
Lists
Like
Liked
21:12Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwa…
…
continue reading
1
Inside the Adversary Mindset: Building Smarter Protection in a Connected World
28:24
28:24
Play later
Play later
Lists
Like
Liked
28:24On this episode of the Connected Intelligence Podcast, Manish Mehta sits down with Chris Wingfield, SVP of Innovations at 360Privacy, to explore the evolving landscape of digital targeting and executive protection. Chris shares how his background in intelligence and signals analysis informs his approach to building proactive, AI-driven cyber threat…
…
continue reading
1
A CISO's Adventures in AI Wonderland (god2025)
42:22
42:22
Play later
Play later
Lists
Like
Liked
42:22As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice's adventures in Wonderland.Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to expla…
…
continue reading
1
The Trust Trap - Security von Coding Assistants (god2025)
43:05
43:05
Play later
Play later
Lists
Like
Liked
43:05Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
…
continue reading
1
"I have no idea how to make it safer": Security and Privacy Mindsets of Browser Extension Developers (god2025)
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42Browser extensions are a powerful part of the Web ecosystem as they extend browser functionality and let users personalize their online experience. But with higher privileges than regular web apps, extensions bring unique security and privacy risks. Much like web applications, vulnerabilities often creep in, not just through poor implementation, bu…
…
continue reading
1
How we hacked Y Combinator companies' AI agents (god2025)
24:28
24:28
Play later
Play later
Lists
Like
Liked
24:28We hacked 7 of the16 publicly-accessible YC X25 AI agents. This allowed us to leak user data, execute code remotely, and take over databases. All within 30 minutes each. In this session, we'll walk through the common mistakes these companies made and how you can mitigate these security concerns before your agents put your business at risk.Licensed …
…
continue reading
1
Extract: A PHP Foot-Gun Case Study (god2025)
24:37
24:37
Play later
Play later
Lists
Like
Liked
24:37Do you always read the documentation before using a function in your languages' standard library? This talk explores the attack surface of a special feature in PHP which is easy to misuse with unforseen consequences. The `extract` function allows to replace the value of local variables named after the keys in an array. Calling it with user-controll…
…
continue reading
1
MCP security hot potato: how to stay secure integrating external tools to your LLM (god2025)
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38Model Context Protocol (MCP) is the latest hot topic in cybersecurity. Business wants it (AI is the new mantra), developers are excited (new toys, new code), and security teams are left to make it safe—often with already packed schedules. Let's treat it like just another Tuesday. Like many shiny new technologies (remember the early days of cloud?),…
…
continue reading
1
Pwn My Ride: Jailbreaking Cars with CarPlay (god2025)
40:58
40:58
Play later
Play later
Lists
Like
Liked
40:58Apple CarPlay is a widely known protocol that connects smartphones to car multimedia systems. Based on AirPlay, CarPlay is installed in millions of cars, as it is supported by hundreds of car models from dozens of different manufacturers across the globe. In our talk, we will share how we managed to exploit all devices running CarPlay using a singl…
…
continue reading
1
The Automation Illusion? What Machines Can't Do in Threat Modeling (god2025)
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58Threat modeling stands at a critical juncture. While essential for creating secure systems, it remains mostly manual, handcrafted, and often too slow for today's development cycles. At the same time, automation and AI offer new levels of speed and scalability— but how much can we rely on them?This talk explores the tension between automation and hu…
…
continue reading
1
Ep. 31 - From Exercise to Efficacy: Resilience as a Measurement
7:52
7:52
Play later
Play later
Lists
Like
Liked
7:52In this final episode of our November Critical Infrastructure series, The Cyber Resilience Brief host Tova Dvorin and SafeBreach offensive engineer Adrian Culley explore what it truly means to measure resilience — not just talk about it. They break down how the CISA resilience framework (“Know, Assess, Plan, and Continuously Improve”) connects dire…
…
continue reading
1
OWASP Cumulus: Threat Modeling the Ops of DevOps (god2025)
26:08
26:08
Play later
Play later
Lists
Like
Liked
26:08In this presentation, we will highlight how threat modeling, as a proactive measure, can increase security in DevOps projects.We will introduce OWASP Cumulus, a threat modeling card game designed for threat modeling the Ops part of DevOps processes. This game (in combination with similar games like Elevation of Privilege or OWASP Cornucopia) enable…
…
continue reading
1
Phishing for Passkeys: An Analysis of WebAuthn and CTAP (god2025)
19:24
19:24
Play later
Play later
Lists
Like
Liked
19:24WebAuthn was supposed to replace swords on the web: uniform, secure, manageable authentication for everyone! One of its unique selling points was supposed to be the impossibility of phishing attacks. When passkeys were introduced, some of WebAuthn's security principles were watered down in order to achieve some usability improvements and thus reach…
…
continue reading
1
Introducing Passkeys - Strategies and Challenges for Developers (god2025)
22:18
22:18
Play later
Play later
Lists
Like
Liked
22:18The future of authentication is passwordless - Passkeys are the key technology. This talk supports developers in implementing Passkeys in their organizations and helps with the decision between in-house development, SDK, or Passkey-as-a-Service solutions. You will learn how to design recovery flows and fallback mechanisms in a user-friendly way, ho…
…
continue reading