Welcome to "Cyber Compliance and Beyond," a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
Cyber Risk Podcasts
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
…
continue reading
Welcome to Risk Management: Brick by Brick! Join Jason Reichl on his journey to discover the crucial role technology plays in risk management in the construction sector. Accompanied by industry-leading risk managers, this podcast will deep-dive into the people who are helping to build and maintain the physical world around us.
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
…
continue reading
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
…
continue reading
Delve into the public sector risk management domain with PRIMA's Risk Management Podcast Series. This innovative, time-efficient, educational resource is designed to afford risk management professionals the opportunity to learn-on-the-go! Listen to PRIMA podcasts to remain cognizant of important issues affecting the public risk management community!
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Welcome to The Pulse On Cyber — your quick, clear, and powerful source for staying safe in today’s digital world. Hosted by CJ James, cybersecurity specialist and founder of CJ Network Systems, this podcast delivers fast, actionable cybersecurity tips in under two minutes. Each episode gives everyday consumers and small-to-medium businesses simple, real-world ways to protect themselves from the newest threats, scams, and digital risks. From phishing and password breaches to mobile scams and ...
…
continue reading
Threatscape Briefing delivers daily audio sitreps on the signals shaping global risk and competition. Each episode distills the “One Big Thing” into a concise, executive-ready briefing connecting military, economic, cyber, and cultural flashpoints. Built for analysts, risk managers, and decision-makers, the format is fast, authoritative, and globally timed to keep you ahead of the curve. Threatscape Briefing is part of the Geopolitical Threatscape ecosystem and equips decision‑makers with cl ...
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
…
continue reading
1
CRECo.ai Roundtable: Technology, Marketing, Brokerage, Government Policy, Capital, Construction & Cyber Security in Real Estate with Andreas Senie
Andreas Senie
Your all in one comprehensive view of what is happening across the real estate industry -- straight from some of the industry's earliest technology adopters and foremost experts in Technology, Marketing, Government Policy, Brokerage, Capital, Construction & Cyber Security in Real Estate. The show is broken down into three parts: Part I: Introductions and what's new for each panelist and the business sector Part II: Sector Focus on the past month's most prominent news and paradigm shifts Part ...
…
continue reading
The Next Five is the FT’s partner-supported podcast, exploring the future of industries through expert insights and thought-provoking discussions with host Tom Parker. Each episode brings together leading voices to analyse the trends, innovations, challenges and opportunities shaping the next five years in business, technology, health and lifestyle This content is paid for by advertisers and is produced in partnership with the Financial Times’ Commercial Department Hosted on Acast. See acast ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
…
continue reading
This podcast series offers risk intelligence and analysis from RANE Network. RANE is a risk intelligence company that provides business professionals with access to critical insights, analysis, and support, enabling them to better anticipate, monitor, and respond to emerging risks and threats. In the RANE podcast series, risk management experts and thought leaders share best practices for managing business risk, geopolitical risk, physical and cyber security risks, compliance risk, and other ...
…
continue reading
The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.
…
continue reading
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
…
continue reading
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
…
continue reading
The SurfWatch Cyber Chat podcast includes interviews with experts on all things related to cyber risk. Learn what cybercriminals are up to and how it’s impacting businesses from those in the trenches. SurfWatch Labs helps organizations and service providers quickly establish a strategic cyber threat intelligence operation that drives more effective use of their tactical defenses. For more information, visit www.surfwatchlabs.com.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
The Banking on Data podcast is for community bank and credit union leaders who understand that the future of financial services is powered by data. Hosted by Ed Vincent, CEO of Lumio Solutions, this podcast offers executive-level insights into how financial institutions can leverage business intelligence, data strategy, and advanced analytics to drive performance, manage risk, and unlock growth opportunities. Each episode features conversations with industry leaders, data experts, and financ ...
…
continue reading
Want a peak behind the curtain into one of the best places to work in cybersecurity and the minds of the innovators behind the industry’s leading security operations platform? Tune in to The Howler podcast! Hosted by Chelsea Lowman, People Experience Specialist, and Mary Newville, People Experience Senior Manager, the culture duo connects with pack leaders on leadership insights, mental health and overall wellbeing, and how they lead their teams to advance our mission of ending cyber risk.
…
continue reading
The purpose of the Skeptical Analyst podcast is to offer my opinions, remarks, and contemplations about issues at the intersection of the insurance industry, technology, society, and cyber risks.
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Timely topics affecting the commercial insurance industry—and the world. A podcast about fast-changing risks and their impact on people, businesses, and global economies. Listen to snapshot conversations as Mosaic Insurance specialists quiz expert guests on trending threats like cyber risk, political violence, and transactional liability. Give us a moment…and we’ll bring you up to speed.
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
We live in two worlds, the real world and the cyber world. Both worlds are interconnected and interdependent but very different. Different rules apply. We have no choice but to exist in both worlds. As innovation and digitalization accelerates, we need to understand the risks, consequences and safeguards necessary to safely protect businesses, people and society.Paul C Dwyer, President of the ICTTF International Cyber Threat Task Force hosts the “Cyber Task Force” podcast. In each show, Paul ...
…
continue reading
THREATCON1 is the place to go for insights on emerging cyber threats. Hosted by VulnCheck’s Security Researcher Patrick Garrity, and Chief Marketing Officer Tom Bain, THREATCON1 will give listeners critical cyber insights through discussions with top cybersecurity practitioners and leaders in the industry that drive innovation and thought leadership. Patrick and Tom will dive into emerging news stories and cyber threats, and trends that are materially shaping the industry with sharp analysis ...
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Independent holistic security consultancy
…
continue reading
Introducing The Cyber Translator, a 10-minute podcast designed for busy business leaders who want to bridge the gap between cybersecurity, technology, and business strategy. Hosted by Sean Hanna, this podcast cuts through the complexity of cyber technology, risk, and governance, translating it into practical, actionable insights that drive real business value. Each episode helps business leaders understand "technology speak" and shows them how to turn cybersecurity and compliance into opport ...
…
continue reading
"Securing Our Place In The Industry" The podcast dedicated to removing roadblocks and adding diversity to the cybersecurity industry.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
The Entropy Podcast is a cybersecurity, technology, and business podcast hosted by Francis Gorman. Each episode features in-depth conversations with cybersecurity professionals, technology leaders, and business executives who share real world insights on cyber risk, digital transformation, emerging technologies, leadership, and the evolving threat landscape. Designed for CISOs, IT leaders, founders, and professionals navigating today’s digital economy, The Entropy Podcast explores how organi ...
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
1
21 - Managing Cyber Risk: The Insurance Component Leaders Shouldn't Overlook
39:34
39:34
Play later
Play later
Lists
Like
Liked
39:34In this episode, we take a practical look at how cyber insurance fits into the broader world of organizational risk. While we often talk about risk from a security and compliance perspective, insurance brings its own lens, which has become increasingly important as threats evolve, and claims grow more complex. Today's guest, Mark Westcott, Presiden…
…
continue reading
1
Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over the world. She served four combat zo…
…
continue reading
1
AI & Cybersecurity: Balancing Risk & Innovation
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06This week on Simplifying Cyber, Aaron Pritz and Cody Rivers sit down with Jax Scott — combat veteran, podcast host (Two Cyber Chicks), and VP of Cybersecurity at Pearson — for a conversation that’s equal parts leadership, risk reality, and “why is everyone still confused about BISOs?” Jax shares her unconventional path into cybersecurity (perfume s…
…
continue reading
1
Episode 136 - Inside CTEM: The New Standard for Cyber Risk
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22On this episode, Silent Sector breaks down what cybersecurity really looks like beyond the buzzwords. We dive into CTEM and why continuous exposure management beats the outdated once-a-year pen test. You’ll hear how adversarial simulation, social engineering, and threat modeling work together to reveal real-world risk—not just compliance checkboxes…
…
continue reading
1
Selling Your Business? Don’t Let Cyber Risk Turn Your Golden Goose Into a Wreck
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08Episode Summary: If you plan to sell your business in the next three to five years, cyber risk may be the biggest threat to your exit that no one is talking about. A single breach, a hidden vulnerability, or an untested environment can delay your deal, cut your valuation, or kill the transaction outright. In this episode, Mike Fitzpatrick breaks do…
…
continue reading
Discover the cutting-edge technology of CYBER EAGLE, a revolutionary system designed to defend against the threats of quantum warfare. As the world enters a new era of cybersecurity challenges, CYBER EAGLE is poised to be at the forefront of protecting sensitive information and national security. In this conversation, host David Mauro engages with …
…
continue reading
1
DtSR Episode 687 - Dan Geers Wisdom from 2014
1:02:03
1:02:03
Play later
Play later
Lists
Like
Liked
1:02:03TL;DR: This week's episode is a special one. I (Rafal) revisit episode 100 with the one and only Dan Geer. Some shows are "in the moment", some are timeless. This show is timeless. Dan's wisdom and insights are as applicable today as they were 12 years ago. Crazy, right? Fun story - I ran into Dan at Black Hat conference a few years ago and asked h…
…
continue reading
1
Lessons Learned from Renovating Public Buildings and Schools
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39Lessons Learned from Renovating Public Buildings and Schools by Public Risk Management Association (PRIMA)By Public Risk Management Association (PRIMA)
…
continue reading
1
New Ways to Take Control Over Data Privacy with Kurt Long.
56:23
56:23
Play later
Play later
Lists
Like
Liked
56:23Kurt Long CEO and founder of BUNKR (https://www.bunkr.life/) an affordable all-in-one app with secure messaging, password management, and secure file storage. We discuss new approaches to safe and private messaging apps, how to keep criminals out of your private data, and why online privacy is important to freedom. Chapters 01:09 Kurt Long's Work a…
…
continue reading
1
Your Next Hire Might Be a Deepfake With Brian Long CEO of Adaptive Security
44:24
44:24
Play later
Play later
Lists
Like
Liked
44:24Send us a text In this episode, Joe sits down with Brian Long, CEO of Adaptive Security, to delve into the evolving landscape of cybersecurity, focusing on the alarming rise of AI-powered social engineering attacks. Brian shares insights from his extensive experience, highlighting the sophisticated tactics used by attackers, including deep fake tec…
…
continue reading
1
Spotify Scraped and Google Phish Steals Microsoft Logins
48:45
48:45
Play later
Play later
Lists
Like
Liked
48:45This week on The Awareness Angle, trusted platforms are being abused at scale, and the damage often starts with things that look completely legitimate. From Spotify facing claims of a massive torrent based scrape to phishing emails abusing real Google services, the theme this week is misplaced trust, and how attackers keep exploiting it. We kick of…
…
continue reading
1
The Fake Tap-to-Pay Sticker Myth: Why These Gas Pump Decals Aren’t Stealing Your Data – The Pulse On Cyber Ep. 8
2:14
2:14
Play later
Play later
Lists
Like
Liked
2:14Send us a text Welcome to Episode 8 of The Pulse On Cyber! In this episode, we debunk the viral “fake tap-to-pay sticker” myth that’s been making waves online. You’ll discover why these rumored gas pump stickers aren’t actually a threat, how NFC (Near Field Communication) technology protects your contactless payments, and how to separate fact from …
…
continue reading
1
Don't Get Tricked. Don't Skip These Two Steps. That's It
2:18
2:18
Play later
Play later
Lists
Like
Liked
2:18Most cybercrime doesn’t start with genius hackers. It starts on a Tuesday. Someone’s busy. An email feels urgent. And a decision gets made five seconds too fast. Fear-based cybersecurity training hasn’t made people safer. It’s made them tired. Most cyber attacks don’t start with genius hackers. They start with rushed decisions, social engineering, …
…
continue reading
1
Protecting Identities - Best Practices and Fraud Prevention
53:20
53:20
Play later
Play later
Lists
Like
Liked
53:20Fraud Expert Ayelet Biger joins us. Find her at her site: https://scamranger.ai/ Chapters 00:00 Introduction and Overview 02:49 Shining a Light on the Victim's Perspective 10:00 Creating a Seamless User Experience 12:23 The Role of Behavioral Biometrics in Fraud Detection 15:16 Distinguishing Between Legitimate Users and Cyber Criminals 20:06 The E…
…
continue reading
1
The Silent Heist – Episode 7: What the Trust Wallet Hack Revealed (December 2025)
2:43
2:43
Play later
Play later
Lists
Like
Liked
2:43Send us a text Episode 7 – The Silent Heist: The Trust Wallet Hack (December 2025) In this episode of The Silent Heist on Pulse On Cyber, we break down the Trust Wallet hack from December 2025 and explain why it’s a serious warning for anyone using a hot wallet to store cryptocurrency. You’ll learn what actually happened, who was affected, and how …
…
continue reading
1
Stop Taking Bad Advice. An Open Letter To The World
2:18
2:18
Play later
Play later
Lists
Like
Liked
2:18We’ve trained people to fear nation-state hackers…while getting breached by rushed clicks and skipped updates. Cybercrime doesn’t win because it’s smart. It wins because people are tired. We’ve been trained to panic about rare, cinematic attacks… while leaving the front door unlocked every single day. The boring truth that actually works: • Don’t g…
…
continue reading
1
Episode 349 Deep Dive: Mike Worth | Why Legal SMBs Overlook Cybersecurity
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26In this episode, we sit down with Mike Worth, Founder of Indi-tech Consultancy, as he unpacks the unique cybersecurity challenges facing small and medium-sized legal firms. Mike highlights a major misconception in the industry—treating cybersecurity solely as an IT problem rather than a broader business risk—and explains why investing in the human …
…
continue reading
1
REAL ESTATE ROUNDTABLE: RELATIONSHIPS, AI, CONSTRUCTION TRENDS SHAPING 2026
1:00:10
1:00:10
Play later
Play later
Lists
Like
Liked
1:00:10Send us a text This episode brings together commercial real estate, construction, and capital markets leaders to unpack what truly drove success in 2025—and where the smartest opportunities lie in 2026. The panel explains why consistent relationship-building and disciplined preparation outperformed attempts to time a volatile market, sharing concre…
…
continue reading
1
Ransomware Negotiations EXPOSED: Inside Cyber Hostage Deals with Kurtis Minder
1:00:43
1:00:43
Play later
Play later
Lists
Like
Liked
1:00:43Kurtis Minder, seasoned ransomware negotiator, shares insights into the complex world of cybercrime negotiations. He discusses the psychological aspects of negotiating with cybercriminals, the role of AI in both offense and defense, and the importance of understanding the motivations behind cybercrime. The conversation also touches on the evolving …
…
continue reading
1
The Silent Heist: Episode 6 – QR Code Scams That Steal Without a Click
3:37
3:37
Play later
Play later
Lists
Like
Liked
3:37Send us a text QR codes are everywhere — parking meters, restaurant menus, package notices, even emails and text messages. But what looks convenient can quietly become a gateway for cybercriminals. In Episode 6 of The Silent Heist on Pulse On Cyber, we break down the growing threat of QR code scams, also known as quishing, and explain how a single …
…
continue reading
1
After the Blast: How One CEO Fought Back 💥 | A True Crime
1:19:35
1:19:35
Play later
Play later
Lists
Like
Liked
1:19:35Robert Cioffi, CEO of a small company discusses the highly emotional impact that a major ransomware attack had on his, his customers and the community.The Emotional Toll of Cyber Attack was horrific to witness and made national news. Learn how to get prepared in this True Cyber Crime Story. Question? Text our Studio direct. Growth without Interrupt…
…
continue reading
1
End-of-Year Wrap: 2025 Threat Trends and Bold Predictions for 2026 🎆
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14Got a question or comment? Message us here! In this special end-of-year SOC Brief, Andrew breaks down the biggest threat-actor and ransomware trends that shaped 2025, and what cybersecurity teams should be preparing for in 2026. From AI-powered ransomware and supply-chain attacks to the growing blur between nation-state operations and cybercrime, t…
…
continue reading
1
Why Most Incident Response Plans Fail — And What to Do Instead
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04Episode Summary: Most companies have an incident response plan, but very few have one that actually works at 2 in the morning when everything goes sideways. In this episode, Mike Fitzpatrick breaks down the real reasons IR plans fail, why untested playbooks become liabilities, and how CEOs can turn a paper plan into a real business protection strat…
…
continue reading
1
Ransomware Is NOT the Greatest Threat | Here Is What's Coming
48:11
48:11
Play later
Play later
Lists
Like
Liked
48:11New Episode🔥The Cybercrime Junkies show discusses the evolution of ransomware, highlighting how it has shifted from simple file locking to direct extortion. We explore the latest ransomware trends and the significant ransomware impact on critical sectors like hospitals and supply chains. This ransomware attack strategy now directly targets customer…
…
continue reading
1
DtSR Episode 686 - An Unexpected Windows XP Conversation
49:30
49:30
Play later
Play later
Lists
Like
Liked
49:30TL;DR: On today's pod, Rob Allen of ThreatLocker makes his triumphant return to derail us straight into a conversation about legacy systems and why he's still supporting WindowsXP. Right, you read that right. A great conversation ensued, and I'm glad we were able to record this one. Enjoy. From us to you, thank you for following along this year, an…
…
continue reading
1
Midnight Blizzard | How Russian Intelligence Breached Microsoft - w/ Alyssa Robinson, CISO @ HubSpot
32:38
32:38
Play later
Play later
Lists
Like
Liked
32:38Midnight Blizzard | How Russian Intelligence Breached Microsoft With guest CISO Co-Host Alyssa Robinson, CISO at HubSpot In late 2023, a Russian state-sponsored threat actor known as Midnight Blizzard (also called NOBELIUM and widely associated with APT29) began probing Microsoft the old-fashioned way: password spraying. No zero-day. No smash-and-g…
…
continue reading
1
ISO & CMMC – Lessons Learned During Audits
54:06
54:06
Play later
Play later
Lists
Like
Liked
54:06Welcome back to The CyberCall. Our guest, Joy Beland from Summit7, helps lead security and compliance at the largest MSP serving the Defense Industrial Base. Joy joins us to share what it actually took to prepare as a service provider, what broke, what changed, and what lessons MSPs can learn if they expect CMMC — or ISO 27001 — to become part of t…
…
continue reading
1
The Silent Heist: Episode 5 – When One-Time Passcodes Betray You
2:40
2:40
Play later
Play later
Lists
Like
Liked
2:40Send us a text One-time passcodes are designed to protect your accounts—but what happens when scammers turn them into the attack itself? In this episode of The Silent Heist on Pulse On Cyber, we take a deep dive into one-time passcode (OTP) scams—an increasingly common and highly effective form of cybercrime that has cost victims hundreds of millio…
…
continue reading
1
A Historical Look-back on U.S.-Middle East Relations
35:44
35:44
Play later
Play later
Lists
Like
Liked
35:44For this special episode of Essential Geopolitics, RANE's Senior Middle East and North Africa Analyst Ryan Bohl provides a brief, but substantive historical overview of U.S. involvement in the Middle East over the past 200 years. Register here to receive a complimentary subscription to RiskBook, our curated email digest with the latest risk news an…
…
continue reading
1
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
50:44
50:44
Play later
Play later
Lists
Like
Liked
50:44Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro interviews Aaron and discusses id…
…
continue reading
1
The Audit 2025: Deepfakes, Quantum & AI That Changed Everything
22:57
22:57
Play later
Play later
Lists
Like
Liked
22:57In this special year-end episode, Joshua Schmidt revisits the most mind-bending moments from The Audit's 2025 season. From Justin Marciano and Paul Vann demonstrating live deepfakes in real-time (yes, they actually did it on camera) to Bill Harris explaining how Google's quantum experiments suggest parallel universes, to Alex Bratton's urgent warni…
…
continue reading
1
How to Measure Cyber Risk Today: Guidelines for Leaders
1:02:20
1:02:20
Play later
Play later
Lists
Like
Liked
1:02:20What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to Know Ryan Leirvik who joins us in the studio. Ryan is the CEO of Neuvik & author of Under…
…
continue reading
1
If Cyber Can Move a Stock Price, It Can Move a Deal Price
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26If Cyber Can Move a Stock Price, It Can Move a Deal Price Host: Mike Fitzpatrick A single cyber issue can cut your valuation before you ever reach the negotiating table. Most advisors won’t mention it. Buyers won’t announce it. But the discount shows up anyway. In this episode, Mike Fitzpatrick breaks down how cyber risk shapes deal pricing in the …
…
continue reading
1
Famous Hacker Reveals TRUE Ethical Hacking Stories
49:03
49:03
Play later
Play later
Lists
Like
Liked
49:03🚨New Episode 🚨We’re joined in-studio by Bryan Seely— World Famous Hacker who Reveals True Ethical Hacking Storie. Bryan is a cybersecurity expert, and media commentator featured on CNBC, Fox News, CNN, and WSJ. He’s also the author of Cyber Fraud: The Web of Lies! We discuss: true ethical hacking stories, data brokers and privacy risks, wiretapping…
…
continue reading
1
The Silent Heist: Episode 4 – When One-Time Passcodes Become the Attack
2:41
2:41
Play later
Play later
Lists
Like
Liked
2:41Send us a text In this episode of The Silent Heist on Pulse On Cyber, we break down one of the fastest-growing threats in digital security: one-time passcode (OTP) scams. These attacks don’t rely on malware or hacking tools — instead, they exploit trust. Scammers impersonate banks, email providers, delivery services, and even workplace IT teams to …
…
continue reading
1
LIVE: They’re Stealing You with AI 😳 | AI Risks to Identity & How to Fight Back
1:26:43
1:26:43
Play later
Play later
Lists
Like
Liked
1:26:43If you manage care about protecting yourself, your loved ones—and your organization-- this episode offers actionable takeaways you can use today. This is part of our official Cyber Crime Junkies podcast series—subscribe wherever you listen! ✅ **Don’t forget to like, subscribe, and hit the bell 🔔.** 💬 Comment your “worst phishing attempt” below—I’ll…
…
continue reading