The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
…
continue reading
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
…
continue reading
Welcome to Maddocks on the Mic — the official podcast of Maddocks, the modern Australian law firm — operating in Canberra, Melbourne and Sydney, Australia. Dive into bite-sized series from around the firm aimed at educating and hopefully entertaining too!
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
The podcast making sense of cyber and technology issues impacting business.
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Welcome to the new realities of cyber security podcast series, where we'll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to GDPR, this series covers topical issues that matter.
…
continue reading
Welcome to Futurecast, Vitech's forward-thinking podcast dedicated to exploring the evolving landscape of the group insurance and retirement industries. Our mission is to equip industry leaders with cutting-edge insights and strategic foresight to future-proof your business in an increasingly dynamic market. In each episode, we engage with pioneering executives, innovative thought leaders, and industry disruptors from the insurance, pension, and pension risk transfer (PRT) sectors to uncover ...
…
continue reading
Welcome to "Securely Connected Everything," a dynamic podcast hosted by Michael van Rooyen (MVR), dedicated to exploring the intricate relationship between connectivity and security in the digital age. Each week, MVR welcomes guests from diverse backgrounds, to shed some light on cutting-edge technologies and methodologies that enhance digital experiences while safeguarding against potential threats. From exploring the origins and capabilities of innovative solutions, to dissecting the impli ...
…
continue reading
A Podcast For Jamf Employees And Customers
…
continue reading
A look at developments from the technology sector and what they mean for investors. The Allianz Technology Trust investment team will offer their insight, as they discuss cutting edge companies and how they are changing our lives. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Looking Glass is the premier international relations podcast by The SAIS Review of International Affairs with support from The Foreign Policy Institute. Showcasing fresh, policy-relevant perspectives from professional and student experts, The Looking Glass is dedicated to advancing the debate on leading contemporary issues in world affairs. *The views and opinions expressed in this podcast are the speakers' own, and they do not represent the views or opinions of The SAIS Review of Intern ...
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Radio station and place for veteran Entrepreneurs , veterans and the kickass get After mentality and spirit warriorship
…
continue reading
Today’s cyber attacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. Each episode, you’ll learn how today’s threats really work, who’s being targeted by them, and what you can do to safeguard your people, data and systems.Get real-world insight and learn about the latest trends in social engineering, malware, threat protection, cloud security and more. Protecting People is cybersecurity for the rest of us.
…
continue reading
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading

1
South American Cyber Shockwave_ Teenage Hackers, Political Hacks, and the Exploding Threat Landscape
19:20
19:20
Play later
Play later
Lists
Like
Liked
19:20South American Cyber Shockwave_ Teenage Hackers, Political Hacks, and the Exploding Threat Landscape Notable Cyber Actors and Incidents Across South AmericaI. Executive Summary * **Featured Hacker/Case: Alberto Daniel Hill (Cybersecurity Expert, Controversially Imprisoned)**The case of Alberto Daniel Hill in Uruguay presents a unique narrative, foc…
…
continue reading

1
Hackers, Phreaks, and the Hunt for Par. The Genesis of Cybercrime
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46Hackers, Phreaks, and the Hunt for Par. The Genesis of Cybercrime. The term "hacker" evokes a multitude of images, from the playful intellectual tinkerer to the shadowy cybercriminal. This report delves into the multifaceted history of hacking, tracing its evolution from nascent academic subcultures to a globally recognized phenomenon with profound…
…
continue reading

1
Making It Rain? The Promises and Pitfalls of Cloud Seeding
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Welcome back, everyone, to the SAIS Review’s The Looking Glass Podcast. We are your hosts, Nassim Ali Ahmad and Rachel Fink. As the world confronts new and novel future crises, among the most concerning will be environmental challenges, driven in many places by the sheer scarcity of water. One answer to that dilemma comes from geoengineering, or th…
…
continue reading

1
CYFIRMA Research: GhostSpy- Web-Based Android RAT
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08A high-risk Android malware poses a serious threat by targeting banking apps, bypassing screenshot protections through UI reconstruction to steal sensitive financial data. It records live screen activity, captures video, and audio in real time, SMS, Contacts, Call logs, files and silently auto-grants all permissions. Once installed, it takes full c…
…
continue reading

1
From Teen Idol to Survivor_ The Unfolding Story of Nicole Eggert
7:49
7:49
Play later
Play later
Lists
Like
Liked
7:49From Teen Idol to Survivor_ The Unfolding Story of Nicole Eggert
…
continue reading

1
Inside the attack chain: A new methodology for tracking compartmentalized threats
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29Edmund Brumaghin joins Hazel to discuss how threat actors (including state sponsored attackers), are increasingly compartmentalizing their attacks i.e they're bringing in specialist skillsets from other groups to handle different aspects of the attack chain. Edmund discusses why this is happening, and the challenges this poses for defenders when it…
…
continue reading

1
SubSeven Unmasked: The Real Story of the Legendary RAT and the Mobman Imposter
26:10
26:10
Play later
Play later
Lists
Like
Liked
26:10SubSeven Unmasked: The Real Story of the Legendary RAT and the Mobman Imposter "In the nascent, often chaotic, digital landscape of the late 1990s and early 2000s, few pieces of malicious software achieved the notoriety or inspired the same blend of fear and fascination as SubSeven. More than just a string of code, it became a legend—a potent Remot…
…
continue reading

1
Do What Matters | New Beginnings – Our journey from students to lawyers & podcasters at Maddocks
19:10
19:10
Play later
Play later
Lists
Like
Liked
19:10New hosts Pete Gavralas and Emily Kidd share their career stories, discuss what matters to them at Maddocks and provide listeners with previews of the exciting topics and conversations expected in future episodes. With our Sydney and Canberra clerkship applications opening on Monday 9 June (Melbourne on Monday 7 July), this series is a must-listen …
…
continue reading

1
Uruguay Under Cyber Siege_ Unpacking the 2024-25 Attacks and What's Next?
20:51
20:51
Play later
Play later
Lists
Like
Liked
20:51Uruguay Under Cyber Siege_ Unpacking the 2024-25 Attacks and What's Next?
…
continue reading

1
__gov (2).eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__.eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__
16:12
16:12
Play later
Play later
Lists
Like
Liked
16:12__gov (2).eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__.eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__
…
continue reading

1
Mexico: Narco-State Symbiosis, Tech Wars, and the Price of Impunity
36:31
36:31
Play later
Play later
Lists
Like
Liked
36:31Mexico: Narco-State Symbiosis, Tech Wars, and the Price of Impunity-
…
continue reading

1
When Fraud Meets Cyber: The Retail Sector’s Expanding Risk Landscape with NRF’s Christian Beckner
18:34
18:34
Play later
Play later
Lists
Like
Liked
18:34In this episode of the Cyber Focus podcast, recorded on April 30 at the RSA Conference in San Francisco, host Frank Cilluffo sits down with Christian Beckner, Vice President of Retail Technology and Cybersecurity at the National Retail Federation. Beckner provides a wide-ranging look at how cybersecurity, fraud, and emerging technologies are reshap…
…
continue reading
Hello and welcome to today’s episode of the SAIS Review’s The Looking Glass Podcast. We are your hosts Talita Fernandes and Hantong Wu. Natural disaster relief can pose many challenges, and we have seen that they are only exacerbated by domestic conflict in the area. Since 2021, when the military deposed the democratically elected government, Myanm…
…
continue reading

1
S3 E7: Cybersecurity Chat with Chuck Sapp | From Military Service to Cyber Awareness
38:06
38:06
Play later
Play later
Lists
Like
Liked
38:06Join hosts Josh and Wade as they sit down with Charles (Chuck) Sapp, a seasoned cybersecurity expert and security awareness specialist. In this episode, Chuck shares his unique journey from serving in the Marine Corps to becoming an influencer in the cybersecurity community. Gain insights into his military background, his passion for educating othe…
…
continue reading
JP Glab (Mandiant Consulting) joins host Luke to discuss responding to activity from North Korean IT workers. He walks through what initially triggered the investigation at this organization, how it progressed in parallel with an HR investigation, and ultimately what was discovered. For more on the DPRK IT workers and trends in incident response, c…
…
continue reading

1
__NATO Police Nightmare_ When a Breakup Becomes an International Crisis__
20:12
20:12
Play later
Play later
Lists
Like
Liked
20:12__NATO Police Nightmare_ When a Breakup Becomes an International Crisis__
…
continue reading

1
CYFIRMA Research- Tracking Ransomware: April 2025
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39Stay ahead of evolving ransomware threats with CYFIRMA’s April 2025 Ransomware Report. Last month revealed shifting dynamics—Qilin surged by 71%, while Play and DragonForce increased by 75% and 25% respectively. Despite a 29% drop in total incidents from March, the Manufacturing, IT, and Consumer sectors remained heavily targeted. The U.S. topped t…
…
continue reading

1
Cartel Cell Networks_ Beyond Burner Phones & Encrypted Apps
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12The assertion that Mexican drug cartels have engineered and deployed their own sophisticated, independent cellular networks to circumvent governmental surveillance, as detailed in the primary source article 1, presents a significant development in the operational capabilities of transnational criminal organizations. This report offers an exhaustive…
…
continue reading

1
Stolen Star Power: How Lana Rose's Online Life Fuels Romance Scams
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01Stolen Star Power: How Lana Rose's Online Life Fuels Romance Scams A significant challenge in this analysis is the current inaccessibility of the live Instagram profile @lanarose786. Consequently, this assessment relies on data from third-party analytics providers such as HypeAuditor , publicly accessible information from platforms including YouTub…
…
continue reading

1
Havana Syndrome Unpacked: From Sonic Attacks to Scientific Uncertainty
23:24
23:24
Play later
Play later
Lists
Like
Liked
23:24Anomalous Health Incidents: An In-Depth Examination of the “Havana Syndrome” PhenomenonI. The Emergence of a Medical Mystery: Unexplained Health Incidents The perplexing saga of what became popularly known as “Havana Syndrome” began to unfold against a backdrop of shifting geopolitical tides. Its emergence not only presented a novel medical challen…
…
continue reading

1
Overview: Georgia Protests and Anonymous Activism
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49This episode features a compelling conversation covering personal stories and insights into the world of cybersecurity and the challenges individuals face when navigating its complexities and interacting with legal systems. The discussion centers around the experiences of guests, including Alberto Daniel Hill, who shares his remarkable and difficul…
…
continue reading

1
Beneath the Black River-Oil Spills in Ecuador’s Amazon Rainforests
41:42
41:42
Play later
Play later
Lists
Like
Liked
41:42The March 2025 oil spill in Ecuador’s Esmeraldas province is one of the country’s worst recent environmental disasters. Over 25,000 barrels of crude oil leaked from the SOTE pipeline, contaminating rivers, farmland, and coastal mangroves. This spill destroyed local biodiversity, poisoned water supplies, and disrupted the lives of more than half a m…
…
continue reading

1
Follow the motive: Rethinking defense against Initial Access Groups
16:38
16:38
Play later
Play later
Lists
Like
Liked
16:38In this episode, Hazel welcomes Talos researcher Ashley Shen to discuss the evolution of initial access brokers (IABs) and the importance of distinguishing between different types of IABs. We talk about the need for a new taxonomy to categorize IABs into three types: financially motivated (FIA), state-sponsored (SIA), and opportunistic (OIA) initia…
…
continue reading

1
Compliance, Launch Daemons and Jamf Account, Oh My!
48:39
48:39
Play later
Play later
Lists
Like
Liked
48:39Join co-hosts Kat Garbis & Sean Rabbitt with guest Isaac Ordonez of Mann Consulting, a Jamf Partner, to discuss what it is like to be a managed service provider (MSP) and provide insight on ways they leverage Jamf. Isaac discusses unique ways they are supporting Jamf to help their customers achieve compliance, building applications and integrations…
…
continue reading

1
The One-Way Street of Digital Transformation: OT Cybersecurity with Nozomi's Edgard Capdevielle
20:24
20:24
Play later
Play later
Lists
Like
Liked
20:24In this special RSA Conference edition of Cyber Focus, host Frank Cilluffo sits down with Edgard Capdevielle, President and CEO of Nozomi Networks, to unpack the evolving landscape of operational technology (OT) cybersecurity. Together, they explore how digital transformation and the convergence of IT and OT are reshaping the threat environment for…
…
continue reading

1
Politics of Disaster Miniseries: Disaster Capitalism in Lebanon
47:28
47:28
Play later
Play later
Lists
Like
Liked
47:28Welcome back everybody to the SAIS Review’s The Looking Glass Podcast. We are your hosts, Nadia Sleiman and Amber Escudero-Kontostathis. Today, we are diving into the critical topic of disaster capitalism in Lebanon amidst its ongoing financial crisis. As Lebanon grapples with currency collapse, inflation, and government paralysis, important questi…
…
continue reading

1
S3 E6: From Submarines to Cybersecurity - Navigating Small Business Security
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37Welcome to another episode of Simply Defensive! In this installment, hosts Josh Mason and Wade Wells are joined by cybersecurity expert James Bierly. James shares his unique journey from a submarine sonar technician in the Navy to founding his own security firm, Secure Point Solutions, which specializes in helping small businesses tackle cybersecur…
…
continue reading

1
CYFIRMA Research- PupkinStealer : A .NET-Based Info-Stealer
4:33
4:33
Play later
Play later
Lists
Like
Liked
4:33CYFIRMA’s latest threat report reveals the workings of PupkinStealer, a .NET-based information stealer designed to extract a focused set of sensitive data from victim systems. Targeting browser credentials, desktop files, Telegram and Discord sessions, and screenshots, the malware compresses all stolen content into a ZIP archive and exfiltrates it …
…
continue reading

1
Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed (2/2)
4:12
4:12
Play later
Play later
Lists
Like
Liked
4:12Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed (2/2) This article was prepared by the Global Institute for Digital Rights and Justice.
…
continue reading

1
Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed (1/2)
5:30
5:30
Play later
Play later
Lists
Like
Liked
5:30Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed. This article was prepared by the Global Institute for Digital Rights and Justice.
…
continue reading

1
Trump's Signal Clone App was Hacked in 15 minutes
8:11
8:11
Play later
Play later
Lists
Like
Liked
8:11Trump's Signal Clone App was Hacked in 15 minutes
…
continue reading

1
**"To Hell and Back" - my talk @ekoparty 2022 - For Spotify Video with English subtitles!**
48:33
48:33
Play later
Play later
Lists
Like
Liked
48:33**"To Hell and Back" - my talk @ekoparty 2022 - with English subtitles!** In 2014, Alberto Daniel Hill, a cybersecurity expert, discovered a security vulnerability on a medical provider's website. While reporting on the issue, he became the first person imprisoned in Uruguay for a computer-related crime—a crime he did not commit and that likely nev…
…
continue reading

1
Jonathan Scott - Full Episode- Apple products and privacy.
2:14:38
2:14:38
Play later
Play later
Lists
Like
Liked
2:14:38We are speaking about YOUR privacy and YOUR #HumanRightsViolated tonight. I will disclose the tools that @Apple has, and show you the truth about what has been going on for a long time. VPN logs, Contacts, Emails, SMS logs, and much more. @jonathandata1
…
continue reading

1
Mano a mano con el hacker mas buscado del Rio de la Plata gov.eth - Alberto Daniel Hill
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22Mano a mano con el hacker mas buscado del Rio de la Plata gov.eth - Alberto Daniel Hill#policia #argentina #hacker #goveth -------------------Alberto Daniel Hill https://albertohill.com https://x.com/ADanielHill https://cybermidnight.club https://t.me/cybermidnight #hacker #uruguay #cybersecurity #cybersecuritytips #infosecurity #hacking #police #p…
…
continue reading

1
The Dark Web Black Market Trade Cyber Crime Crime Alpha Bay
1:30:58
1:30:58
Play later
Play later
Lists
Like
Liked
1:30:58The Dark Web Black Market Trade Cyber Crime Crime Alpha Bay
…
continue reading

1
CYFIRMA Research- EXPLAINER: THE ALGERIA / MOROCCO TENSIONS
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45Geopolitical tensions between Algeria and Morocco have reignited over the Western Sahara issue. Hacktivist groups have exacerbated the situation by targeting each other’s critical infrastructure. Algerian hacktivists claimed to have breached Morocco's CNSS, while Moroccan hacktivists alleged, they had hacked and leaked data from Algeria's MGPTT. Ho…
…
continue reading

1
Inside the CrowdStrike 2025 Latin America Threat Landscape Report
20:49
20:49
Play later
Play later
Lists
Like
Liked
20:49Latin America has become a hotspot for cyber activity. Threat actors around the world, particularly eCriminals, are targeting organizations operating in Central and South America, Mexico, and the Caribbean. Latin America-based cybercriminals are emerging as well. The CrowdStrike 2025 Latin America Threat Landscape Report provides key insights into …
…
continue reading

1
The AI Energy Surge: Jason Plautz on Grid Strain and National Stakes
33:00
33:00
Play later
Play later
Lists
Like
Liked
33:00In this episode of Cyber Focus, host Frank Cilluffo sits down with award-winning journalist Jason Plautz of Politico’s E&E News Energywire to explore the growing tension between artificial intelligence, energy demand, and infrastructure readiness. Plautz breaks down how AI-driven data centers are reshaping the U.S. power grid—and what state and fed…
…
continue reading
A new threat is on the rise - Gunra Ransomware. This sophisticated ransomware not only encrypts files but also exfiltrates sensitive data, threatening to leak the data unless the ransom is paid. Read the latest report from the CYFIRMA research team to learn more! Stay informed and safeguard your systems! Link to the Research Report: https://www.cyf…
…
continue reading

1
Watchdog | No basis for Holden dealers to re-write bargain post-Australian exit
11:08
11:08
Play later
Play later
Lists
Like
Liked
11:08Now in its fifth season, the Watchdog Podcast has returned, with Maddocks Partner and series host Shaun Temby providing an overview of the dismissal of a claim brought against General Motors Holden Australia NSC Pty Ltd by a number of its dealers (and franchisees) arising out of General Motors Company’s decision in 2020 to shut down the Holden bran…
…
continue reading

1
UNC5221 and The Targeting of Ivanti Connect Secure VPNs
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55Matt Lin (Senior Incident Response Consultant, Mandiant) and Daniel Spicer (Chief Security Officer, Ivanti) dive into the research and response of UNC5221's campaigns against Ivanti. They cover how this threat actor has evolved from earlier campaigns, the continued focus of edge infrastructure by APT actors, and the shared responsibility of securit…
…
continue reading

1
CYFIRMA Research- US MANUFACTURING RELOCATION AND THREATS
11:21
11:21
Play later
Play later
Lists
Like
Liked
11:21Donald Trump’s new tariff promises to revive American manufacturing, but evidence shows they are more likely to raise prices, reduce competitiveness, deter investment, and fuel geopolitical instability. The vision of millions of factory jobs ignores automation, labor shortages, and global supply chains. Instead of revitalizing the industry, tariffs…
…
continue reading

1
S3 E5: The Ultimate Guide to Detection as Code and Blue Team Tactics with David French
48:33
48:33
Play later
Play later
Lists
Like
Liked
48:33Join hosts Josh Mason and Wade Wells as they sit down with David French for an insightful episode of Simply Defensive. Discover David's journey from coding CCTV systems to becoming a staff security engineer at Google Cloud. Explore their discussion on detection as code, automation, detection testing, and relevant tools like Dorothy and Atomic Red T…
…
continue reading

1
Chris Pogue: Digital Forensics in the Modern Threat Landscape
48:33
48:33
Play later
Play later
Lists
Like
Liked
48:33This Kitecast episode features Chris Pogue, Director of Digital Forensics at CyberCX, a cybersecurity veteran with 25 years of experience. Chris brings unique insights from his extensive background spanning penetration testing, executive leadership, and military instruction. As an adjunct professor at Oklahoma State University, he teaches both inte…
…
continue reading

1
Agentic AI, the Future of CISA and International Cyber Strategy: Key Takeaways from RSAC 2025
37:36
37:36
Play later
Play later
Lists
Like
Liked
37:36Recorded on May 1, 2025, at the RSA Conference in San Francisco, this special Cyber Focus episode brings together government, industry, and policy leaders for an insider look at the key takeaways from the biggest cybersecurity event of the year. Frank Cilluffo sits down with David Colberg, a longtime RSA leader and architect of the conference’s pol…
…
continue reading
Cybersecurity tips
…
continue reading

1
Hackers vulneraron la página de Buquebus Turismo. La mayor informacion en la web sobre el hecho aqui! gov.eth @adanielhill
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Este video:📽️Video sin editar de gov.eth sobre los recientes hackeos a servidores en Uruguay🇺🇾💻: su versión de los hechos. Está frustrado😡 tras perder tiempo con periodistas . 📷Por favor difundir para que la gente no se quede solo con la versión de los medios tradicionales.📺😇Yo, Alberto Daniel Hill, no estoy involucrado en estos eventos. 😇@Observad…
…
continue reading