Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Cyber Strategy Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
THREATCON1 is the place to go for insights on emerging cyber threats. Hosted by VulnCheck’s Security Researcher Patrick Garrity, and Chief Marketing Officer Tom Bain, THREATCON1 will give listeners critical cyber insights through discussions with top cybersecurity practitioners and leaders in the industry that drive innovation and thought leadership. Patrick and Tom will dive into emerging news stories and cyber threats, and trends that are materially shaping the industry with sharp analysis ...
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Johna Till Johnson & John Burke bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions a ...
…
continue reading
Breaching the Boardroom is a high-level podcast designed to explore the intersection of leadership, growth, and technology. Each episode brings industry leaders, experts, and innovators together for candid conversations on how to navigate the evolving tech landscape while driving business success. We’re on a mission to simplify complex topics like AI, cyber threats, and IT strategy, making them accessible and actionable for executives in mid-market businesses.
…
continue reading
SC Media is proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
Everything seems to be accelerating: geopolitics, technology, security threats, the dispersal of information. At times, it feels like a blur. But beneath the dizzying proliferation of events, discoveries, there are deeper trends that can be grasped and understood through conversation and debate. That’s the idea behind Stop the World, the Australian Strategic Policy Institute’s podcast on international affairs and security. Each week, we cast a freeze-frame around the blur of events and bring ...
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Tech Tomorrow is your front-row seat to the conversations redefining the future. Each episode explores one big question about data, AI, or emerging tech, giving leaders clear, focused answers they can trust. If you're navigating complex innovation, from AI-augmented delivery to sustainability, this show helps you cut through the noise, connect cross-disciplinary trends, and lead with confidence in a rapidly evolving landscape. Previously known as Data Today, this podcast has examined how out ...
…
continue reading
Raising Tech is your guide to understanding the role technology plays in your community, where to invest to transform culture, and how to bring your team and residents along the journey. Tune in to explore the latest tech trends, dive into hot topics, and hear from industry experts, community leaders, and innovative vendors shaping the senior living tech landscape. Each episode is packed with practical insights and real-world stories to help you spark change and level up your community’s tec ...
…
continue reading
This podcast from Boston Consulting Group looks around the corner of today’s big business and social issues. The goal–the so what–is to make sense of today and prepare busy leaders and executives for the day after tomorrow. Award-winning British journalist Georgie Frost interviews the leading thinkers and doers at BCG on the trends, developments, and ideas that will shape and disrupt the future. This is not your typical business strategy podcast. This podcast uses the following third-party s ...
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading
Welcome to Serverless Craic from The Serverless Edge with Dave Anderson, Mark McCann and Mike O'Reilly. We want to share our tools and techniques so that you can use them to communicate your Technical Strategy with your C-Suite and business owners. We want to help you to build a serverless first organisation. We will show you how to use Wardley Mapping to gain situational awareness of where your cloud applications and business are. And then how to develop your technical capability in away th ...
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, geopolitics, and business, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Send feedback and show ideas to [email protected]. Each discussion delves into the intersection of technology advancement, market dynamics, and the founder journey, offering insigh ...
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
Conversations with Institutional Investors is your gateway to in-depth discussions with the masterminds behind leading global investment firms, including key figures from pension funds, insurance companies, and sovereign wealth funds. Our podcast explores the evolving landscape of asset allocation, portfolio construction, and investment strategy, offering you firsthand insights from industry experts to inspire smarter, more innovative investment approaches. For further insights go to i3-inve ...
…
continue reading
The podcast making sense of cyber and technology issues impacting business.
…
continue reading
Enterprise Security Tech presents The Cyber Jack Podcast. The Cyber Jack Podcast brings together critical news, expert insights, and product information to help CISOs, CIOs, and CEOs make informed IT technology and cybersecurity decisions.
…
continue reading
Welcome to "AI or Not," the podcast where digital transformation meets real-world wisdom, hosted by Pamela Isom. With over 25 years of guiding the top echelons of corporate, public and private sectors through the ever-evolving digital landscape, Pamela, CEO and Founder of IsAdvice & Consulting LLC, is your expert navigator in the exploration of artificial intelligence, innovation, cyber, data, and ethical decision-making. This show demystifies the complexities of AI, digital disruption, and ...
…
continue reading
Artificial intelligence is reshaping how we work, live, and lead. But what does that mean for Australian businesses? The AI Australia Podcast, hosted by Emma Bromet and Kathryn Collier, is your essential guide to understanding the AI revolution and its impact on Australian businesses. We cut through the jargon to bring you practical discussions and expert interviews on how AI is affecting everything from enterprise strategy to daily life, with a focus on ethical and responsible AI, diversity ...
…
continue reading
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
…
continue reading
The Security Briefing is the official podcast from the organisers of The Security Event. Each episode brings together industry leaders, innovators, and frontline professionals to discuss the latest trends, technologies, and challenges shaping the future of security. From cyber to physical, strategy to innovation, this is your inside track on the issues that matter most to security professionals today.
…
continue reading
Welcome to the podcast channel for the Scottish AI Alliance, the delivery body for Scotland’s national AI Strategy. Scotland’s AI Strategy launched on 22 March 2021 with the vision for Scotland to become a world leader in the development and use of trustworthy, ethical and inclusive AI. This podcast will feature updates on the delivery of Scotland’s AI Strategy as well as interviews and chats about all things AI in Scotland and beyond. Find us online at www.scottishai.com.
…
continue reading
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
…
continue reading
Welcome to Cyber Career Chat, the podcast supporting innovation in the fast-paced world of cyber security. Join us as we explore the exciting career paths and opportunities available and keep up with industry developments in Australia and around the world. Cyber Career Chat is brought to you by the Workforce Development team at the New South Wales Cyber Cyber Security Innovation Node and proudly produced and supported by the Experts On Air Podcast Network.
…
continue reading
Ever felt like your darkest fears of being watched were actually true? Marie's powerful documentation pulls back the curtain on life as a targeted individual—where privacy becomes fiction and safety an illusion. Marie begins her candid, unfiltered account by describing how traditional authorities—police, FBI, employers, and school officials etc.—have failed her, offering therapy referrals instead of protection. "To me, that's just a nice way of saying you're crazy," she explains, highlightin ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
…
continue reading
1
Young and Profiting with Hala Taha (Entrepreneurship, Sales, Marketing)
Hala Taha | Entrepreneurship, Sales, Marketing | YAP Media Network
Young and Profiting with Hala Taha is the must-listen podcast for anyone who is hardcore into entrepreneurship. Hosted by Hala Taha, a self-made entrepreneur and marketing expert, this top-ranked show features mini-masterclasses with business icons and entrepreneurs like GaryVee, Alex Hormozi, Mel Robbins, Reid Hoffman, Tom Bilyeu and Codie Sanchez. Listen to YAP to profit in all aspects of life - from boosting sales and beating algorithms, to brain hacks and biohacking. Whether you’re launc ...
…
continue reading
Formerly the Joy Joya Jewelry Marketing Podcast, Marketing With Laryssa is a podcast for purpose-driven, product-based brand owners who want to build real connections with their customers. Hosted by Laryssa Wirstiuk, founder of Joy Joya and marketing strategist since 2018, the show zooms out beyond tactics to explore the bigger picture of email, SMS, and digital storytelling. With a mix of practical tips, inspiring ideas, and behind-the-scenes insights, Laryssa shares how to grow your brand ...
…
continue reading
Bringing you up to date news, interviews and guests from around the world of UFOs, UAP & connected phenomena Hosted by Andy McGrillen
…
continue reading
1
Episode 5: Building a Proactive Cyber Strategy with Focus and Cross-team Collaboration
42:03
42:03
Play later
Play later
Lists
Like
Liked
42:03Tom and Patrick welcomed Simon Goldsmith, CISO, Ovo Energy to the show, to chat about the emerging threat landscape across different industries he’s served in - from the CISO’s perspective. We dig into some of his cyber experiences throughout his career, talk rugby, debate Oasis vs Blur and even drill down into how to counter coordinated nation-sta…
…
continue reading
1
Defense as Strategy: How Bright Pixel Capital and Tidal Cyber Are Redefining Cybersecurity
36:03
36:03
Play later
Play later
Lists
Like
Liked
36:03Send us a text In this episode of Secure Insights, recorded in Washington, D.C., Nick sits down with Rick Gordon, CEO of Tidal Cyber, and Marcos Osorio, Director at Bright Pixel Capital, to discuss a fundamental shift in cybersecurity thinking - treating defense as a strategy, not a cost. The conversation explores how defensive cybersecurity is evo…
…
continue reading
1
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 279 ~ Watch Now ~
1:00:04
1:00:04
Play later
Play later
Lists
Like
Liked
1:00:04Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 279 ~ Watch Now ~ In this AMA edition of DailyCyber, we go deep on what’s actually happening in cybersecurity leadership today. From emotional regulation in the SOC to unapproved AI tools in the workplace, this episode unpacks the real conversations CISOs and vCISOs are having b…
…
continue reading
1
Kevin O'Leary: The Game-Changing Habits That Set Top Entrepreneurs Apart | Entrepreneurship | YAPLive | E376
1:16:23
1:16:23
Play later
Play later
Lists
Like
Liked
1:16:23Now on Spotify video! Starting a business is brutally hard, and Kevin O’Leary is a living example of that truth. Despite early failures, he went on to build and sell The Learning Company for $4.2 billion in one of the most competitive tech markets in history. As an investor in over 50 companies, he can spot true entrepreneurs from a mile away and k…
…
continue reading
1
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing
14:29
14:29
Play later
Play later
Lists
Like
Liked
14:29A preparation guide for Certified Ethical Hacker (CEH) certification, focusing on a wide array of cybersecurity topics. It covers fundamental concepts such as ethical hacking, vulnerabilities, and types of attacks, moving into practical methodologies like footprinting, network scanning, and enumeration. The guide also details various malicious soft…
…
continue reading
1
#5. What's Eating the Security Industry: How to Thrive in Today's Global Evolution
30:30
30:30
Play later
Play later
Lists
Like
Liked
30:30Drawing from extensive global research and observations, this discussion explores the transformative forces reshaping today's security landscape. As the traditional $10B high-security sector faces unprecedented change, a new $100B mainstream security market is emerging - one that builds upon historical foundations while breaking free from conventio…
…
continue reading
1
Unlocking Data Protection: Vishnu Varma on Cybersecurity Challenges
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55Send us a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how Bo…
…
continue reading
1
360 - Why Your Email Marketing Feels Flat (And How to Spark More Desire)
10:13
10:13
Play later
Play later
Lists
Like
Liked
10:13If your ecommerce brand is obsessing over checkout tweaks, button colors, pop-ups, and discounts—but your email marketing still feels flat—there's a deeper issue at play. And it's not friction. It's desire. 🎧 In this episode, I break down a powerful idea inspired by Wes Kao: the difference between decreasing friction and increasing desire—and why m…
…
continue reading
1
AI in the GRC: What's real, what's risky and what's next. [Special Edition]
1:02:46
1:02:46
Play later
Play later
Lists
Like
Liked
1:02:46Join us for a timely and insightful live discussion on the evolving role of artificial intelligence in governance, risk, and compliance. Host Dave Bittner from N2K | CyberWire is joined by Kayne McGladrey from Hyperproof, Matthew Cassidy, PMP, CISA from Grant Thornton (US), and Alam Ali from Hyperproof to explore the current state of artificial int…
…
continue reading
1
Danielle Jablanski: Finding the path to success [Strategy] [Career Notes]
9:21
9:21
Play later
Play later
Lists
Like
Liked
9:21Please enjoy this encore of Career Notes. Operational technology cybersecurity strategist from Nozomi Networks, Danielle Jablanski shares her story of building a target map to end up where she is today. She shares how she started in college and how different paths in life got her to be on the target of success where she is today. She says " you bui…
…
continue reading
1
The Active Defender: Immersion in the Offensive Security Mindset (Tech Today)
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38Focusing on cybersecurity defense through the lens of offensive security. The material covers the evolution of cybersecurity practices, critiques the traditional passive and reactive defense posture, and advocates for an "Active Defender" mindset, which involves understanding and leveraging attacker methodologies, tools, and the hacker mentality. K…
…
continue reading
1
A new stealer hiding behind AI hype. [Research Saturday]
22:08
22:08
Play later
Play later
Lists
Like
Liked
22:08Please enjoy this encore of Research Saturday. This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as …
…
continue reading
1
The Cybersecurity Manager's Guide: The Art of Building Your Security Program
17:24
17:24
Play later
Play later
Lists
Like
Liked
17:24Outlines a seven-step methodology for building an effective InfoSec program by focusing on the "art," or people side, of security. The author, Todd, draws on over two decades of experience to argue that success hinges on cultivating strong relationships and ensuring alignment with the company's risk tolerance, as most organizations are indifferent …
…
continue reading
1
Serverless Craic Ep76 Sustainability & Innovation in Modern Cloud: Value Flywheel Chapter 18
22:51
22:51
Play later
Play later
Lists
Like
Liked
22:51Send us a text Sustainability & Innovation in Modern Cloud: In this episode of Serverless Craic, Dave, Mark, and Michael dive into Chapter 18 of The Value Flywheel Effect — Sustainability and Space for Innovation. We explore why sustainable architectures, well-designed domains, situational awareness, and the innovate–leverage–commoditise cycle are …
…
continue reading
1
From Summoning to Surveillance: The Hidden War with the Phenomenon
56:01
56:01
Play later
Play later
Lists
Like
Liked
56:01**Part 2 of 2** Order my book, Atlas of UFOs, here → https://geni.us/AtlasOfUFOs Andy welcomes Reed Summers back for an in-depth discussion on the strategic and existential implications of the UFO phenomenon. They examine the Age of Disclosure documentary, the evolving role of non-human intelligence, historical and modern UAP engagements, South Ame…
…
continue reading
1
Michelle Tillis Lederman: 7 Mindset Shifts That Turn Networking Into Your Greatest Advantage | Leadership | YAPClassic
49:41
49:41
Play later
Play later
Lists
Like
Liked
49:41After being laid off, Michelle Tillis Lederman landed a new job in just three days, thanks to her mindset of intentional relationship-building, not luck. That experience inspired her to create the “Connector’s Advantage,” a framework for building authentic connections that drive faster and better results. In this episode, Michelle reveals how organ…
…
continue reading
1
Certificate of Cloud Auditing Knowledge Study Guide
17:50
17:50
Play later
Play later
Lists
Like
Liked
17:50Focusing heavily on the complexities of cloud governance, compliance, and auditing. A significant portion of the text is dedicated to the Cloud Controls Matrix (CCM), an industry-specific framework developed by the Cloud Security Alliance (CSA), which is used to assess security and compliance across various cloud service models like IaaS, PaaS, and…
…
continue reading
1
Pass the intel, please. [Only Malware in the Building]
38:06
38:06
Play later
Play later
Lists
Like
Liked
38:06Please enjoy this encore of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the r…
…
continue reading
1
The Big Picture: UAP Strategy, Hostile Encounters & What Comes Next
1:11:41
1:11:41
Play later
Play later
Lists
Like
Liked
1:11:41**Part 1 of 2** Order my book, Atlas of UFOs, here → https://geni.us/AtlasOfUFOs Andy welcomes Reed Summers back for an in-depth discussion on the strategic and existential implications of the UFO phenomenon. They examine the Age of Disclosure documentary, the evolving role of non-human intelligence, historical and modern UAP engagements, South Ame…
…
continue reading
In this episode of Breaching the Boardroom, host Latina Berryhill speaks with Brad Reinhardt, president of WEL Companies, about the logistics industry, the importance of trust and relationships, and the challenges posed by cybersecurity. Brad shares insights on how technology is reshaping logistics, the impact of COVID-19 on supply chain awareness,…
…
continue reading
1
teissTalk: Shielding sensitive data from ransomware – staying ahead of evolving threats
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49How modern ransomware actors are deploying multidimensional tactics to outpace traditional defences Strategies to reduce data loss and sustain business operations after an attack AI and automation – enhancing visibility and accelerating response to ransomware threats Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Edward St…
…
continue reading
1
Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime
19:35
19:35
Play later
Play later
Lists
Like
Liked
19:35Explains the nature of cybercrime and the three primary levels of the internet: the Surface Web, Deep Web, and Dark Web. A significant portion of the material details the major criminal activities found on the Dark Web, including drug trafficking, child pornography, human trafficking, and cyberterrorism. Finally, the excerpts examine the various to…
…
continue reading
1
Hacker Movies Then vs Now [Threat Vector]
47:06
47:06
Play later
Play later
Lists
Like
Liked
47:06We dive into a nostalgic yet revealing journey through classic hacker films, from WarGames to The Net and beyond, to assess what they got right, what they wildly imagined, and what those stories say about culture, fears, and cyber reality today. David Moulton, Senior Director of Thought Leadership for Unit 42 talks with Ben Hasskamp, Global Content…
…
continue reading
1
Identifying vulnerabilities in space with Bigbear.ai. [Deep Space]
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Please enjoy this encore of T-Minus Deep Space. BigBear.ai is at the forefront of innovation for national security, and is committed to supporting the critical infrastructure driving America’s competitive edge. The company deploys cutting-edge Al, machine learning, and computer vision solutions to defend critical operations and win with decision ad…
…
continue reading
1
4. Data Security. Locked and Loaded. Using security tools you have.
39:48
39:48
Play later
Play later
Lists
Like
Liked
39:48Welcome!...to 'Getting to Grips with Data Security' our podcast for anyone interested in learning more about how to 'beat the hackers' using the best types of information security controls. This new 5 part series covers all aspects of data security for businesses where we discuss: Ep 1: Strategy; Ep 2: Cloud Controls; Ep 3: People Risk; Ep 4: Using…
…
continue reading
1
CR116: Unlocking Cloud for critical missions with Danny Polaine, Thales
47:45
47:45
Play later
Play later
Lists
Like
Liked
47:45Accelerating cloud adoption to drive innovation across domains like space, identity, and naval systems presents unique challenges. Success depends on aligning organizational culture, governance, financial models, and regulatory frameworks to enable collaboration, scalability, and software-defined capabilities. This week, Dave, Esmee, and Rob speak …
…
continue reading
Report sheds light on cyber activity targeting space-related organizations during the Gaza War. Russian threat actor targets US civil engineering firm. FBI says $262 million has been stolen in account takeover scams this year. HashJack attack tricks AI browser assistants. London councils disrupted by cyberattacks. Russia’s Gamaredon and North Korea…
…
continue reading
The Virginia Republican discusses the Pentagon's acquisition reforms, the defense secretary's legislative-affairs bottleneck, and his priorities for the upcoming spending bills. Guest: Rep. Rob Wittman, R-Va., chairman of the House Armed Services Subcommittee on Tactical Air and Land Forces, in conversation with Defense One Executive Editor Bradley…
…
continue reading
1
The Creator's Playbook: How to Launch Courses That Sell Out in Record Time | Sales | Presented by Teachable
30:11
30:11
Play later
Play later
Lists
Like
Liked
30:11Many creators struggle with sales, finding it hard to turn audience interest into paying customers. They have great content but lack the right sales funnels, persuasion techniques, and closing strategies to convert prospects. In this second episode of the Creator's Playbook, presented by Teachable, Hala Taha breaks down how to confidently sell your…
…
continue reading
1
Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals
11:58
11:58
Play later
Play later
Lists
Like
Liked
11:58Serves as an in-depth textbook resource, outlining the foundational concepts of cybersecurity, beginning with definitions of data, information, and networking. It extensively covers the history and evolution of cybercrime, categorizing various malicious activities like phishing, spoofing, and different types of DDoS attacks. Furthermore, the text e…
…
continue reading
1
The Death of Passwords: The Future of Authentication
55:19
55:19
Play later
Play later
Lists
Like
Liked
55:19Is passwordless authentication finally ready for prime time, or are we just replacing one set of problems with another? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I'm Jim and in this episode, we're tackling one of the oldest chall…
…
continue reading
1
CyberComply CMMC GRC Partner Rates and Discounts
4:08
4:08
Play later
Play later
Lists
Like
Liked
4:08Thank you for visiting our podcasts on CMMC Cybersecurity! Explore more insights, updates, and expert discussions on our blog: https://cybercomply.us/blog-list Luis G. Batista C.P.M., CPSM Founder & CEO, Armada Cyber Defense | CyberComply [email protected] Office: (305) 306-1800 Ext. 800 CAGE: 9QG33 UEI: K6UZHLE1WUA7 Schedule Introduction: https:…
…
continue reading
1
Rep. Eric Burlison Exclusive: “Trump Is the Disclosure President”
18:15
18:15
Play later
Play later
Lists
Like
Liked
18:15Order my book, Atlas of UFOs, here → https://geni.us/AtlasOfUFOs An exclusive interview with Congressman Eric Burlison as he joins me to discuss the Age of Disclosure documentary, the involvement of notable figures like Marco Rubio and James Clapper, and the efforts to pass the UAP Disclosure Act. Burlison discusses the challenges and progress in g…
…
continue reading
CISA warns of spyware targeting messaging apps. CodeRED, this is not a test. Infostealer campaign spreads via malicious Blender files. Shai-Hulud’s second coming. Real estate finance firm SitusAMC investigates breach. Dartmouth College discloses Oracle EBS breach. Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the…
…
continue reading
Welcome!...to 'Getting to Grips with Data Security' our podcast for anyone interested in learning more about how to 'beat the hackers' using the best types of information security controls. This new 5 part series covers all aspects of data security for businesses where we discuss: Ep 1: Strategy; Ep 2: Cloud Controls; Ep 3: People Risk; Ep 4: Using…
…
continue reading
1
How Cybersecurity Impacts Patient Care in Hospitals with Christian Dameff Part 2
24:07
24:07
Play later
Play later
Lists
Like
Liked
24:07Welcome to another episode of Forcepoint's To The Point Cybersecurity Podcast! In this week's conversation, Rachael Lyon and Jonathan Knepper sit down for part two with Dr. Christian Dameff, the nation's first Medical Director of Cybersecurity at UC San Diego Health. Dr. Dameff, who also works as an emergency physician, clinical informaticist, and …
…
continue reading
1
HS118: Bricking the Company – Discussing Existential Threats with Leadership
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05AI and other technologies are increasingly capable of delivering company-ending events. How do you have “the conversation” with senior leadership–the one about the existential risks your organization faces, and the steps needed for remediation–in a way that ensures that your company is maximally protected, and that you get the resources you need? A…
…
continue reading
1
Threat & Exposure Management in 2025: What Security Leaders Must Know
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46Send us a text This week on Secure Insights, Ben Seri Co-Founder & CTO at Zafran Security joins the show to break down the shifts happening in threat and exposure management and explain how AI can elevate, scale and future-proof modern cyber defence. We explore the real challenges security teams are facing today, from tool sprawl and limited visibi…
…
continue reading
1
Wireless Network Simulation: A Guide using Ad Hoc Networks and the ns-3 Simulator
16:17
16:17
Play later
Play later
Lists
Like
Liked
16:17Focusing on Ad Hoc Networks and utilizing the ns-3 simulator. The material covers both the theoretical and practical aspects of simulation, including the formal definition and characteristics of Mobile Ad Hoc Networks (MANETs), various wireless communication technologies (like IoT and Mobile Clouds), and the methodology for designing and analyzing …
…
continue reading
1
A midseason takeaway. [CISO Perspectives]
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from a security standpoint and from an attacker's view. Whether you're catc…
…
continue reading