Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Cyber Security Certifications Podcasts
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Cyber Sitrep brings you all the latest cybersecurity news, commentary, and threat intelligence. Focused on small to midsize businesses who we feel have been left behind. Hosted by Eric from Corvus Technologies and Mike from Digital Beachhead who bring their unique perspective based on their military and cybersecurity experience. If you want to understand more about how cybersecurity is important to your organization, enjoy funny tales or just want to learn more about the field of cybersecuri ...
…
continue reading
Overcoming impostor syndrome - Practical tips for combating feelings of not belonging in the cyber workplace provided by distinguished guests within the cyber security field
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession.
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
…
continue reading
Bare Metal Cyber Presents: Framework is your go-to podcast for mastering cybersecurity frameworks, with a special focus on the NIST Cybersecurity Framework (CSF) and NIST 800-53. This series breaks down each function, category, and subcategory to help professionals, educators, and organizations understand their structure and real-world applications. Each episode delivers clear, practical insights with examples that make cybersecurity frameworks more accessible and actionable. Whether you're ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 6:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Secure Ninja TV is a weekly source of updates, insights, opinions and overviews of the Information Security and IT industry. Through interviews with industry leaders and cutting-edge IT instructors, Secure Ninja TV will empower you to attack network threats and security vulnerabilities with the most valuable tool at your disposal...knowledge.
…
continue reading
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
…
continue reading

1
#51 Q&A: Why YouTube Took Down My Wi-Fi Hacking Video
27:29
27:29
Play later
Play later
Lists
Like
Liked
27:29In this Q&A episode of The Hacker’s Cache, I answer your top questions about breaking into cybersecurity from a software engineering background, whether an associate's degree is worth pursuing, and how I prepare for CompTIA certifications using third-party resources. I also open up about why YouTube took down one of my most popular Wi-Fi hacking vi…
…
continue reading
DevSecOps generates a lot of data valuable for better decision making. However, decision makers may not see all they need to in order to make best use of the data for continuous improvement. The SEI open source Polar tool unlocks the data, giving DevSecOps teams greater capability to automate, which in turn means they can innovate rapidly – without…
…
continue reading
#mobilesecurity #AppPrivacy #cybertips - Are the mobile apps on your phone really safe? In this episode, we dive into the cybersecurity side of mobile applications—how much access they have, what data they collect, and whether you should trust that app you downloaded last night. From shady permissions to sneaky trackers, we break down what you need…
…
continue reading

1
Cybersecurity Certifications: Worth It or Waste of Time?
20:49
20:49
Play later
Play later
Lists
Like
Liked
20:49In this episode, we explore a hot-button topic in the cybersecurity world: Are certifications actually necessary to succeed in the industry? Whether you're just starting your cyber career or you're a seasoned pro, this episode breaks down the real-world value of certifications like CompTIA Security+, CISSP, and others. Cyber Sitrep Episode #29 Epis…
…
continue reading

1
You Make This Possible – Shoutout to Our Fans!
2:43
2:43
Play later
Play later
Lists
Like
Liked
2:43#ThankYouSubscribers #CreatorCommunity #ShoutoutTimeIn this short but meaningful episode, we take a moment to give a heartfelt shoutout to all our amazing subscribers. Your support fuels everything we do, and this one's for you! Whether you've been with us since day one or just joined the community—thank you. Cyber Sitrep Episode #30 Episodes Every…
…
continue reading

1
Thriving Through Volatility: Insights for CISOs - Jeff Pollard, Pejman (Pej) Roshan, Deepen Desai - BSW #401
1:05:24
1:05:24
Play later
Play later
Lists
Like
Liked
1:05:24In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
…
continue reading

1
Thriving Through Volatility: Insights for CISOs - Jeff Pollard, Pejman (Pej) Roshan, Deepen Desai - BSW #401
1:05:24
1:05:24
Play later
Play later
Lists
Like
Liked
1:05:24In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
…
continue reading

1
#50 No OSCP. No Degree. Still Landed a Red Team Job ft. Richie Vinson (4NU81X7H3H4CK3r)
39:24
39:24
Play later
Play later
Lists
Like
Liked
39:24In this episode, Richie Vinson (4NU81X7H3H4CK3r) shares how he broke into red teaming without a college degree or the OSCP certification. He explains why he skipped traditional credentials, how volunteering at cybersecurity conferences helped him bypass the HR firewall, and what newcomers can do to stand out. From earning a Black Badge at HackSpace…
…
continue reading

1
An Introduction to the MLOps Tool Evaluation Rubric
1:00:23
1:00:23
Play later
Play later
Lists
Like
Liked
1:00:23Organizations looking to build and adopt artificial intelligence (AI)–enabled systems face the challenge of identifying the right capabilities and tools to support Machine Learning Operations (MLOps) pipelines. Navigating the wide range of available tools can be especially difficult for organizations new to AI or those that have not yet deployed sy…
…
continue reading

1
CISO Cyber Insurance Empowerment - Peter Hedberg, Stephan Jou, Morey Haber - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
…
continue reading

1
CISO Cyber Insurance Empowerment - Morey Haber, Peter Hedberg, Stephan Jou - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
…
continue reading

1
From FBI Cyber Agent to Police Tech Innovator | Andre McGregor
52:39
52:39
Play later
Play later
Lists
Like
Liked
52:39Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast Andre McGregor of ForceMetrics shares his incredible journey from reluctant FBI recruit to cybersecurity entrepreneur. Despite initially declining the FBI's recruitment call, Andre went on to beco…
…
continue reading

1
#49 He Found Vulnerabilities in His Own Code: Then Made a Career Out of It ft. John Kounelis
41:06
41:06
Play later
Play later
Lists
Like
Liked
41:06In this episode of The Hacker’s Cache, Kyser Clark interviews John Kounelis, a Senior Product Security Engineer with a background in software development and AppSec. John shares how discovering vulnerabilities in his own code led him to a full-time role in application security, and explains the key differences in AppSec across defense, biotech, and…
…
continue reading

1
Security Money: The Index is Up, CISOs Need to Get Out, and Are You Burning Out? - BSW #399
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
…
continue reading

1
Security Money: The Index is Up, CISOs Need to Get Out, and Are You Burning Out? - BSW #399
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
…
continue reading

1
Strictly Cyber EP 2 - Cyber security and people - Your Human Firewall
45:02
45:02
Play later
Play later
Lists
Like
Liked
45:02In this episode, we're shifting the focus from technology to people. When it comes to cyber security, your team can be your biggest asset. We'll break down why human error is one of the greatest risks to your business and how building a strong security culture is key to keeping your business safe. We'll also discuss a real life example of a situati…
…
continue reading

1
#48 He Got Hired Without Knowing the Answer: Here’s Why ft. Michael Kim
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28In this episode of The Hacker’s Cache, senior offensive security consultant Michael Kim shares how he landed a cybersecurity job without knowing all the answers in the interview and why hiring managers still chose him. We discuss how to ace your cybersecurity interview, the importance of mindset and growth, and why technical skills alone aren’t eno…
…
continue reading

1
Sitrep Intel CyberNews: Unpacking the Latest in Cybersecurity
24:05
24:05
Play later
Play later
Lists
Like
Liked
24:05#cybersecuritynews #dataprotection #techinsights - In this episode of CyberSitrep, we delve into the latest developments in cybersecurity. Topics include recent data breaches, emerging threats, and expert insights into protecting digital assets. Stay informed with our in-depth analysis and discussions on the evolving landscape of cyber threats. Cyb…
…
continue reading

1
Regain Control of Business Risks, Your Leadership Habits, and Being Present - Alla Valente - BSW #398
1:18:17
1:18:17
Play later
Play later
Lists
Like
Liked
1:18:17During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
…
continue reading

1
Regain Control of Business Risks, Your Leadership Habits, and Being Present - Alla Valente - BSW #398
1:18:17
1:18:17
Play later
Play later
Lists
Like
Liked
1:18:17During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
…
continue reading

1
Build your own pentesting tools and master red teaming tactics | Ed Williams
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Ed Williams, Vice President of EMEA Consulting and Professional Services (CPS) at TrustWave, shares his two decades of pentesting and red teaming experience with Cyber Work li…
…
continue reading

1
To SIEM or Not to SIEM? Why Your Security Depends on It
28:08
28:08
Play later
Play later
Lists
Like
Liked
28:08#cybersecurity #SIEM #CyberSitrep In this episode of the Cyber Sitrep, Eric and Mike tackle the question: “To SIEM or not to SIEM?” They break down what a SIEM (Security Information and Event Management) system actually is, why it's a cornerstone of cybersecurity infrastructure, and what it takes to implement one effectively. From log normalization…
…
continue reading

1
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Amit Sinha, Chris Hickman, Albert Estevez Polo, Jordan Avnaim - BSW #397
1:07:59
1:07:59
Play later
Play later
Lists
Like
Liked
1:07:59This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
…
continue reading

1
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Jordan Avnaim, Chris Hickman, Amit Sinha, Albert Estevez Polo - BSW #397
1:07:59
1:07:59
Play later
Play later
Lists
Like
Liked
1:07:59This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
…
continue reading

1
#47 Q&A: Feel Lost Watching Hacking Videos? Listen to This
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00Feeling overwhelmed watching hacking videos and not understanding what’s going on? You’re not alone, and you’re not behind. In this episode of The Hacker’s Cache, I answer real questions from the community about certifications, career paths, and that all-too-familiar. I share my own experience struggling with concepts early on, why I prefer the bab…
…
continue reading

1
Dude, Where’s My Token? The Hidden Risk of MFA
20:53
20:53
Play later
Play later
Lists
Like
Liked
20:53#CyberSecurity #MultiFactorAuthentication #PhishingAwareness - In this episode of Cyber SitRep, Eric and Mike explore the risks of stolen authentication tokens and how even multi-factor authentication (MFA) can be compromised when users are targeted through phishing and proxy attacks. They break down how token-based access works, share real-world h…
…
continue reading

1
Microsoft Is Killing Windows 10—Here’s What Happens Next
16:14
16:14
Play later
Play later
Lists
Like
Liked
16:14#cybersecurity #windows10 #technews In this episode of The Cyber Sitrep, Eric and Mike discuss the upcoming end-of-life for Windows 10 and what it means for users still on the platform. They break down the risks of running an unsupported operating system, the importance of security updates, and why migrating to Windows 11 is critical before the Oct…
…
continue reading
Cyber Sitrep Episode #18 - Cyber Security 101 "Introduction" - Today we are starting a 6-part series in which we go into a well-rounded guide to Cyber Security for Small and Medium businesses. In this specific episode Eric and Mike go into the introduction to the series and a bit of an overview of what is to come. Episodes will be on Tuesday's and …
…
continue reading
Cyber Sitrep Episode #21 - Cyber Security 101 "Ring 2" - In this episode Eric and Mike talk about what all is within ring 2 of our Cyber Security 101 course. STIG Link: https://public.cyber.mil/stigs/ Episodes Every Wednesday at 11 A.M. MST Links: Corvus website: https://www.corvus-tech.net/ Digital Beachhead website: https://digitalbeachhead.com/ …
…
continue reading
Cyber Sitrep Episode #22 Cyber Security 101 "Ring 3" - In this Episode Eric and Mike talk about STIGS, Audits, and SIEM's. Episode Links: STIG: https://public.cyber.mil/stigs/ CIS: https://www.cisecurity.org/cis-benchmarks Microsoft Sentinel: https://azure.microsoft.com/en-us/products/microsoft-sentinel Tenable: https://www.tenable.com/ Episodes Ev…
…
continue reading
Cyber Sitrep Episode #-20 Cyber Security 101 "Ring 1" - In this Episode Eric and Mike talk about the first Ring of Cyber Security 101. Episodes Every Wednesday at 11 A.M. MST https://www.av-comparatives.org/ Links: Corvus website: https://www.corvus-tech.net/ Digital Beachhead website: https://digitalbeachhead.com/ The Cyber Sitrep brings you all t…
…
continue reading
In this Episode Eric and Mike close out the 6 part series about Cyber Security 101 with the Edge. Cyber Sitrep Episode #23 Cyber Security 101 Ep.6 "Edge" Episode Links: https://csrc.nist.gov/publications/sp800 Episodes Every Wednesday at 11 A.M. MST Links: Corvus website: https://www.corvus-tech.net/ Digital Beachhead website: https://digitalbeachh…
…
continue reading
Cyber Sitrep Episode #19 - Cyber Security 101 "Core" - In this episode Eric and Mike go over how Data backups, and training are a great start for your business cyber health. Links: Corvus website: https://www.corvus-tech.net/ Digital Beachhead website: https://digitalbeachhead.com/ The Cyber Sitrep brings you all the latest cybersecurity news, comm…
…
continue reading

1
CMMC Scoping: What You Don’t Know WILL Hurt You
20:59
20:59
Play later
Play later
Lists
Like
Liked
20:59#cmmc #cybersecurity #scopematters In this episode of The Cyber Sitrep, Eric and Mike dive deep into one of the most critical — yet misunderstood — elements of CMMC assessments: scoping. They explain why scoping your environment accurately can save you serious time, money, and pain during a C3PAO assessment. From defining "in scope" vs. "out of sco…
…
continue reading

1
CISO Cheat Sheet, as Role Evolves and vCISO is Viable, Cobalt Strike and Resilience - Theresa Lanowitz, Rohit Dhamankar - BSW #396
1:17:08
1:17:08
Play later
Play later
Lists
Like
Liked
1:17:08In the leadership and communications section, Why Every CISO Should Be Gunning For A Seat At The Board Table, The Innovation We Need is Strategic, Not Technical , The Best Leaders Ask the Right Questions, and more! This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them! Fortra is successfully reduc…
…
continue reading

1
CISO Cheat Sheet, as Role Evolves and vCISO is Viable, Cobalt Strike and Resilience - Theresa Lanowitz, Rohit Dhamankar - BSW #396
1:17:08
1:17:08
Play later
Play later
Lists
Like
Liked
1:17:08In the leadership and communications section, Why Every CISO Should Be Gunning For A Seat At The Board Table, The Innovation We Need is Strategic, Not Technical , The Best Leaders Ask the Right Questions, and more! This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them! Fortra is successfully reduc…
…
continue reading