The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Cybersecurity Awareness Podcasts
James McQuiggan brings inspiring stories of cybersecurity practitioners "break-into-industry" stories across all dimensions of cybersecurity.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
In this episode, Tyler and Bob break down cybersecurity in a fun, human way—no tech jargon overload, just real tips and tricks to keep your business safe. From password tricks and phishing scams to the importance of backups and cloud security, they share easy-to-follow advice with plenty of humour and relatable insights. If you’ve ever ignored an update or used ”password123,” this one’s for you. Tune in, laugh a little, and learn how to become a cybersecurity rockstar!
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
SC Media is proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
…
continue reading
In a world overloaded with information, great leaders separate the signal, the most critical insights that drive success, from the noise of distractions and uncertainty. Signal to Noise by Riviera Partners is the podcast for tech executives, innovators, talent leaders, and investors who need to make meaningful moves, whether in moments of crisis, clarity, or opportunity. In each episode, we sit down with respected leaders to unpack the defining decisions of their careers. Our guests share po ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
…
continue reading
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
SAE International explores critical topics in transportation cybersecurity with industry, government, and legal experts.
…
continue reading
The purpose of this podcast is to provide unclassified information about current trends in homeland security for the state of New Jersey, as well as educational information and resources for your awareness.
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
Humans are the key to solving our cybersecurity challenges…but first we need them to be Well Aware. The Well Aware Security Show is hosted by George Finney, CISO for SMU and author of the award winning book, Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future. Security is in your DNA…so be Well Aware!
…
continue reading
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
DTX Unplugged delves into the major challenges and innovations shaping business transformation, embodying our event's focus on the critical intersection of people, process, and technology. While rooted in the DTX ethos, this will be an industry-focused platform, tackling key issues, spotlighting groundbreaking innovations, and raising awareness for important topics across the sector.
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
🎙️ Dive into the world of cybersecurity with Cubic Lighthouse Podcast - your expert companion in navigating the latest developments and crucial topics in the field. We dissect complexities, provide strategic insights, and ensure you stay abreast of cutting-edge trends. Whether you're a seasoned professional or a cybersecurity enthusiast, join us for concise expertise and actionable intelligence to enhance your security posture. 🌐🔐
…
continue reading
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and he ...
…
continue reading
Technology as it impacts our society told from the point of view of a blind technologist
…
continue reading
Bite-sized information about cybersecurity for not-for-profit boards and leaders. In each episode we help leaders of not-for-profits to understand the information security risks to their organisations and they leave with at least one actionable insight that they can put into practice. It also features interviews with not-for-profit leaders sharing their cybersecurity journey, insights and lessons learned.
…
continue reading
We started Tech Gumbo in Nov 2014 as a conversational show of news, information & updates about the past, present & future of all things technology in a topical, interesting and digestible way.
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading
CSIAC's Mission Mission Statement CSIAC is chartered to leverage the best practices and expertise from government, industry, and academia in order to promote technology domain awareness and solve the most critically challenging scientific and technical problems in the following areas: Cybersecurity and Information Assurance, Software Engineering, Modeling and Simulation, and Knowledge Management/Information Sharing.
…
continue reading
Thriving With Technology is the podcast from techwellness.com. Our Mission is to bring awareness, balance and health to our relationship with tech. Our new reality makes that harder than ever, BUT, it's not impossible. We'll help you find it without having to abandon the technology that makes life easy, convenient and connected. Join the movement today at techwellness.com
…
continue reading
Seasoned professionals chatting about current accounting, audit, tax, and operational issues germane to tax-exempt entities including nonprofits, associations, employee benefit plans, labor unions, and other business enterprises.
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Welcome to the What's Next! Podcast. I've met so many brilliant people as I traveled the globe and have had some fascinating conversations that I've wished had been recorded so I could share them with you - this podcast was a way for me to recreate those moments and let you in on some fantastic insights. My current conversations center around one objective: what's next for companies and individuals as they look to innovate and grow. I hope these conversations inspire you as much as they have ...
…
continue reading
Welcome to "The CvCISO Podcast" - an extension of SecurityStudio's vCISO training program. Designed to keep the conversation alive beyond the confines of traditional training, this podcast is your ongoing resource for all things related to Virtual Chief Information Security Officers (vCISOs). This podcast is a space where vCISOs can continue to explore, discuss, and evolve their understanding of the cybersecurity landscape. Join us as we delve into the experiences, perspectives, and challeng ...
…
continue reading
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It's a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
…
continue reading
Unraveling the (con)fusion between Tech & Risk Management
…
continue reading
Tastier than a bucket of kittens
…
continue reading
1
🌐 Cybersecurity Unmasked 🌐 EP 27: North York Nonprofit Averts Data Breach Through Awareness
15:43
15:43
Play later
Play later
Lists
Like
Liked
15:43One click. One password. That's all it took to put an entire North York nonprofit minutes away from disaster. In this episode of Cybersecurity Unmasked, we share a real case study from our own clients—how a single moment of awareness stopped what could have been a catastrophic $200K+ data breach. This phishing attack wasn't some poorly written scam…
…
continue reading
1
Pornhub’s Big Tech Plea, Malaysia’s Social Ban, Meta’s Safety Scandal, Roblox’s AI Scan
22:01
22:01
Play later
Play later
Lists
Like
Liked
22:01News and Updates: Pornhub urges tech giants to implement device-level age verification, arguing current site-based laws fail to protect minors and drive traffic to unregulated platforms. Malaysia announced a 2026 ban on social media for children under 16, joining Australia in enforcing stricter digital age limits to combat online harm. Unredacted c…
…
continue reading
1
CYFIRMA Research: Rising Cybercrime During Black Friday & Cyber Monday- A 2025 Threat Intelligence Report
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05Black Friday & Cyber Monday Cyber Threats Are Already Here As festive shopping surges, so does cybercrime. CYFIRMA’s latest analysis reveals a spike in fake websites, phishing campaigns, malicious ZIP downloads, UPI-based payment scams, and dark-web-powered phishing kits—all engineered to exploit the 2025 holiday rush. Our researchers uncovered mul…
…
continue reading
1
Cartels, Fake Updates and One Big Budget Oops
43:52
43:52
Play later
Play later
Lists
Like
Liked
43:52📢 Subscribe on your favourite platforms and visit https://linktr.ee/riskycreative for more of ∠The Awareness Angle. 📢 This Week on The Awareness Angle A council incident affecting thousands of residents, emergency alerts taken offline, a vishing breach at Harvard, fake Windows updates, AI voice scam stories, and an industrial scale Black Friday cam…
…
continue reading
1
Biorobotics & Neuralink: How Tech Is Rewiring the Human Body
9:30
9:30
Play later
Play later
Lists
Like
Liked
9:30In this episode of Darnley’s Cyber Café, we dive into the fascinating, and slightly unsettling, world of biorobotics, where human biology meets advanced robotics and neural technology. From groundbreaking innovations like Neuralink, next-gen prosthetics, and brain-computer interfaces, to the hidden cybersecurity risks of merging technology directly…
…
continue reading
1
CHAOS: AI Jailbreaks, Cloud Meltdowns & The Fish-Tank Casino Hack That Shocked the World
48:36
48:36
Play later
Play later
Lists
Like
Liked
48:36Question? Text our Studio direct. In this shocking monthly cyber update, the Cyber Crime Junkies (David, Dr. Sergio E. Sanchez, and Zack Moscow) expose the craziest, must-know stories in tech and security. What's Inside This Episode: The AI Threat is Real: Dr. Sergio reveals how Chinese threat actors manipulated Anthropic's Claude AI system to stag…
…
continue reading
I talk about the following algorithms that I have developed: My envy free cake cutting algorithm: https://www.academia.edu/37422796/siscos_robotic_knife Base Ten Filtration Perfect for isolating noise from a signal: https://www.academia.edu/37011971/Base_Ten_Filtration Check out the website: https://thesiscoreport.com…
…
continue reading
1
Can Brett Johnson Help You SPOT Fraud Before it's Too Late?
48:40
48:40
Play later
Play later
Lists
Like
Liked
48:40Question? Text our Studio direct. Can Brett Johnson Help You SPOT Fraud Before it's Too Late? Brett Johnson joins us to talk about spotting fraud before its too late. We discuss how to limit cyber risk for small business, ways to identify refund fraud, AI implications in cyber security today, best policies to limit cyber liability and how can we sp…
…
continue reading
1
Ep. 196 CrowdStrike's Insider Threat Problem, $140k Student Loan Debt, and Phishing Attacks
2:20:48
2:20:48
Play later
Play later
Lists
Like
Liked
2:20:48Get into cybersecurity here : https://app.techtualconsulting.tech/bundles/57 ------------------------------------------------------------------------------------ In this episode of The TechTual Talk, HD and CyberShortieee dive into cybersecurity news and insights, focusing on topics like phishing attacks, the risks of legacy systems, insider threat…
…
continue reading
1
teissTalk: Shielding sensitive data from ransomware – staying ahead of evolving threats
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49How modern ransomware actors are deploying multidimensional tactics to outpace traditional defences Strategies to reduce data loss and sustain business operations after an attack AI and automation – enhancing visibility and accelerating response to ransomware threats Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Edward St…
…
continue reading
1
CYFIRMA Research: Tycoon 2FA- A Technical Analysis of its Adversary-in-the-Middle Phishing Operation
3:21
3:21
Play later
Play later
Lists
Like
Liked
3:21Tycoon 2FA - The Phishing-as-a-Service Platform Our latest technical deep-dive reveals how Tycoon 2FA, a sophisticated Phishing-as-a-Service (PhaaS) platform, is successfully evading detection and bypassing multi-factor authentication (MFA) to compromise enterprise cloud environments. This isn't just another phishing kit. It's an Adversary-in-the-M…
…
continue reading
1
Humanely managing IT and security teams
1:23:24
1:23:24
Play later
Play later
Lists
Like
Liked
1:23:24The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! On this episode, Accidental CISO is joined by guest host Mike Simmons. Mike is a consultant, leadership coach, speaker, and podcaster. He combines systems thinking with a people focuse…
…
continue reading
1
The Bad Apple Latte: How One Insider Nearly Brewed a Cyber Disaster
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17In this episode of Darnley’s Cyber Café, we dive into the real story behind CrowdStrike’s recent insider scandal, and what it teaches us about the hidden dangers brewing inside modern companies. We break down how a “bad apple” employee allegedly leaked internal information to a notorious hacking collective, why insider threats are so hard to detect…
…
continue reading
1
Guest: Sarah W. Anderson, Attorney at Law, specializing in Cybersecurity
22:22
22:22
Play later
Play later
Lists
Like
Liked
22:22We discuss: Cyber ligation, biometrics and passwords, AI & Social Media from a legal perspectiveBy Haggai Davis
…
continue reading
1
CvCISO Podcast Episode 74 Special Guest Dan Ovick and Holiday Awareness Resources
52:46
52:46
Play later
Play later
Lists
Like
Liked
52:46Summary In this episode of CBC So Podcast, the hosts discuss various aspects of cybersecurity, particularly focusing on the upcoming holiday season and the associated risks. They introduce their guests, including Dan Ovick, who shares his journey in cybersecurity and the importance of community networking. The conversation shifts to holiday cyberse…
…
continue reading
1
Ransomware Attacks Can Be DEADLY What Makes You SAFE?
57:25
57:25
Play later
Play later
Lists
Like
Liked
57:25Question? Text our Studio direct. We discuss How ransomware can kill and ways to build security resilience with Chris Loehr, SVP of Solis Security. Ransomware Attacks Can Be DEADLY What Makes You SAFE? Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done with full cyber chaos: 🔥 Int…
…
continue reading
- JLR’s Cyber Shutdown Turns Costly - Revenue Drop from the Fallout - UK Economy Takes a Hit Too - Supply Chain Pain Across the Midlands - A Lesson in Economic Security. Support the show Support the show Remember... Even with top-tier security, human negligence and/or error can compromise systems. Invest in employee training—it’s the ultimate safeg…
…
continue reading
1
Why 95% of AI Projects Fail and How to be the 5% with Jon Krohn
57:58
57:58
Play later
Play later
Lists
Like
Liked
57:58As AI capabilities are doubling every seven months, organizations face a pivotal challenge: How do you successfully implement AI when 95% of projects fail? In this episode of the Signal to Noise Podcast, host Michael Newcomer is joined by Jon Krohn, Co-Founder and CEO of Y Carrot, to share groundbreaking insights on the evolving landscape of AI and…
…
continue reading
1
From Forbes Fame to Federal Charges: The Shocking Tale of Charlie Javice!
8:30
8:30
Play later
Play later
Lists
Like
Liked
8:30Question? Text our Studio direct. Discover the shocking story of Charlie Javice, the entrepreneur who went from being featured on the cover of Forbes to facing a federal indictment. Learn about her rise to fame and the events that led to her downfall. Get the inside scoop on the controversies surrounding her business ventures and the charges brough…
…
continue reading
1
80% Lie on Dating Apps — Here’s How to Know the Truth
6:49
6:49
Play later
Play later
Lists
Like
Liked
6:49They said they love hiking, jazz, and meditation—but their socials say otherwise. In a world where 80% of dating profiles contain lies or omissions, how can you know who you’re really talking to? In this episode of Ask Socialprofiler, Tony and Dave unpack the truth about online dating in 2025. From fake identities to billion-dollar scams, they show…
…
continue reading
1
Top Tax Deductions Every Self-Employed Professional Should Know
18:41
18:41
Play later
Play later
Lists
Like
Liked
18:41Jeff Lewis, Ethan Gewolb, and Evan Peoples break down the most commonly overlooked tax deductions for self-employed individuals. From pension contributions and health insurance premiums to unreimbursed business expenses, mileage, and home office rules, this episode offers clear guidance on what you can deduct and how to stay compliant with IRS requ…
…
continue reading
1
Cloudflare Outage, Apple Digital ID, Waymo Expansion, MS Agentic OS, Cyber Awareness Crisis
22:00
22:00
Play later
Play later
Lists
Like
Liked
22:00News and Updates: Cloudflare Outage- A routine Cloudflare config change triggered a hidden bug, crashing bot-mitigation systems and causing massive global outages. No attack involved; fixes deployed as Cloudflare reviews resilience. Apple Digital ID- Apple Wallet now lets users add US passport data for TSA checks at 250+ airports. It aids domestic …
…
continue reading
1
WhatsApp Leak, Rail Hack and CCTV Horror Stories | Weekly Cyber News, But Human
52:19
52:19
Play later
Play later
Lists
Like
Liked
52:19📢 Subscribe on your favourite platforms and visit https://linktr.ee/riskycreative for more of ∠The Awareness Angle 📢 This Week on The Awareness Angle Rail hacks, WhatsApp risks, CCTV horror stories, teenage cyber gangs, and a staffing breach that leaked over a hundred thousand CVs. It has been a busy week. Luke and I break down the biggest cyber st…
…
continue reading
1
CAUGHT: Biggest Spy in US History--Spies, Lies & Cybercrime
55:51
55:51
Play later
Play later
Lists
Like
Liked
55:51Question? Text our Studio direct. 🔥New Episode🔥 dives into a famous betrayal case, showcasing the breach movie trailer as an example of Hollywood's take on espionage. This story highlights the perilous nature of insider threat and the critical importance of **counterintelligence**. We explore this true spy narrative, bringing you another compelling…
…
continue reading
1
Episode 195 Cloudflare’s Outage, DoorDash hacked, Nvidia $57B revenue, and Tech Career Crashouts
2:00:14
2:00:14
Play later
Play later
Lists
Like
Liked
2:00:14Get into cybersecurity here : https://app.techtualconsulting.tech/bundles/57 ------------------------------------------------------------------------------------ In this episode, HD and CyberShortieee dive into everything from navigating IT career moves and salary negotiation, to analyzing the recent Cloudflare outage, security breaches at DoorDash…
…
continue reading
Children should be protected while online, but they shouldn't get on by themselves in the first place. Check out: https://thesiscoreport.comBy Kevin Sisco
…
continue reading
1
From FBI to Cybersecurity Leader: M.K. Palmore's Career Journey | Breaking Into Cybersecurity
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18In this episode of Breaking Into Cybersecurity, M.K. Palmore, a cybersecurity leader and former FBI special agent, shares his journey from serving in the Marines and the FBI to leading his own consulting firm, Apogee Global RMS. He discusses his early interest in technology, the importance of effective communication in cybersecurity leadership, and…
…
continue reading
1
What Happens in Your BRAIN During Social Engineering Attacks
53:32
53:32
Play later
Play later
Lists
Like
Liked
53:32Question? Text our Studio direct. What Happens in Your BRAIN During Social Engineering Attacks We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Season 8 is officiall…
…
continue reading
1
Cyber Journeys: Transition, Leadership, and Trekking with Bill "The Reel Bilbo" Boston
43:45
43:45
Play later
Play later
Lists
Like
Liked
43:45This week we chat with Bill Boston, also known as 'The Real Bilbo,' to explore his extensive journey from IT support roles to becoming a cybersecurity professional. With over 20 years in support and a strong background in healthcare and consulting, Bill shares unique insights into overcoming mental health challenges, the importance of being fair, f…
…
continue reading
1
CYFIRMA Research- Pig Butchering Scams: Cybercrime Threat Intelligence
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51Pig-butchering scams have evolved into one of the most damaging global cybercrime models, combining long-term emotional grooming, AI-driven impersonation, fake investment platforms, and sophisticated crypto-laundering networks. Our latest CYFIRMA Threat Intelligence Report breaks down: How global scam compounds operate like industrial-scale BPOs Th…
…
continue reading
Question? Text our Studio direct. LOCKBIT Cyber Crime Takedown Uncovered! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Backgroun…
…
continue reading
1
Culture as a Competitive Advantage with Richard Fain
31:31
31:31
Play later
Play later
Lists
Like
Liked
31:31Welcome to the What's Next! Podcast with Tiffani Bova. I'm excited to welcome Richard Fain to the show this week. He served as Royal Caribbean Group CEO for over three decades, leading its transformation from a small Norwegian company with three ships that held just over 700 passengers each into one of the world's largest and most profitable cruise…
…
continue reading
1
teissTalk: Resilience as a business outcome
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10Identifying critical assets and dependencies to focus investment where impact is highest Designing for rapid recovery with tested runbooks and clear RTO/RPO targets Strengthening resilience through training, playbooks, and cross-functional drills Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Scott Hardy, CISO, Sargent-Dis…
…
continue reading
1
How Ordinary People Are Accidentally Helping Hackers Break Into Global Companies
12:00
12:00
Play later
Play later
Lists
Like
Liked
12:00In this episode of Darnley's Cyber Café, Darnley exposes how everyday people around the world are unknowingly helping hackers infiltrate global companies. We break down fake remote job scams, identity laundering, and the red flags that businesses and individuals need to watch for. Learn how cybercriminals recruit ordinary citizens, why these scheme…
…
continue reading
1
What Happens When AI Collides with MODERN Warfare?
55:22
55:22
Play later
Play later
Lists
Like
Liked
55:22Question? Text our Studio direct. Join us as we delve into the uncharted territory where artificial intelligence meets modern warfare, exploring the profound implications and potential consequences of this revolutionary intersection. From autonomous drones to predictive analytics, we'll examine how AI is transforming the face of combat and defense …
…
continue reading
1
Rethinking Trust in the GenAI Era with Mahi Sethuraman
30:40
30:40
Play later
Play later
Lists
Like
Liked
30:40How do leaders navigate the delicate balance between rapid innovation and maintaining consumer trust? This question sits at the heart of a fascinating conversation between Mahi Sethuraman, the Vice President of Consumer Engineering at Credit Acceptance, and Kyle Langworthy, Partner and Head of AI, ML, and Data Practice at Riviera Partners. In this …
…
continue reading
1
Protecting Your Kids Online. What Every Parent Needs to Know
8:18
8:18
Play later
Play later
Lists
Like
Liked
8:18Your child is online—and so are the people influencing them. From games to group chats, social media to secret accounts, the digital world is shaping your kids in real time. Are you part of that conversation? In this episode of Ask Socialprofiler, Tony and Dave dive into what modern parenting really looks like in 2025—and how AI-powered tools like …
…
continue reading
1
CvCISO Podcast Episode 73 Glen Legus, CvCISO Foundations Course Instructor
1:05:18
1:05:18
Play later
Play later
Lists
Like
Liked
1:05:18Summary In this episode of the CBC So podcast, host Andy and guests discuss various aspects of information security, including the importance of context in decision-making, market trends, and the value of leadership in security practices. They share personal stories and insights on navigating business challenges, the role of confidence, and the evo…
…
continue reading
1
Can Attackers really turn safety tools into weapons?
59:05
59:05
Play later
Play later
Lists
Like
Liked
59:05📢 Subscribe on your favourite platforms and visit https://linktr.ee/riskycreative for more of ∠The Awareness Angle This week on The Awareness Angle, Ant Davis and Luke Pettigrew break down a wild mix of stories that show how everyday tools are becoming attack surfaces. This episode digs into the human habits, design gaps and risky shortcuts that ma…
…
continue reading
1
From Philosophy to Cybersecurity: An Unexpected Path With Christine Smoley
37:39
37:39
Play later
Play later
Lists
Like
Liked
37:39This week we have a captivating conversation with Christine Smoley, as she shares her journey from an academic background in phenomenology to a successful career in cybersecurity. Key topics include networking at DEFCON, the importance of language acquisition and mental models, challenges of building security teams in startups, and her unique inter…
…
continue reading
1
Spies, Lies & Cybercrime--Treason from Inside The FBI
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40Question? Text our Studio direct. A young undercover FBI operative risks everything to expose America’s most devastating traitor — revealing how Cold-War spycraft evolved into today’s cybercrime economy. The shocking true story of Robert Hanssen — the FBI mole who sold America’s deepest secrets to Russia for over 20 years, leading to the execution …
…
continue reading