Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cybersecurity Fundamentals Podcasts

show episodes
 
The CompTIA IT Fundamentals+ Audio Course is your step-by-step guide to building a rock-solid foundation in IT, covering hardware, software, networking, databases, and security in a way that’s clear and approachable. Designed for beginners and those looking to prepare for more advanced certifications, each episode turns exam objectives into practical lessons you can follow with confidence. Produced by BareMetalCyber.com, this series gives you the knowledge and momentum to pass the exam and l ...
  continue reading
 
Artwork

1
Simply ICS Cyber

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
  continue reading
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Artwork

1
The Security Brief

Hound Security Systems

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
In a world where security threats evolve daily, staying informed isn't just smart—it's essential. Welcome to the security breif, the podcast that cuts through the noise of the security industry. Each episode, we dive deep into the latest articles, trends, and expert insights, breaking down complex topics into clear, actionable advice. From the future of CCTV and AI-powered analytics to the fundamentals of access control and cybersecurity, we use real-world blog posts as our launchpad for dis ...
  continue reading
 
The Tech+ Audio Course is your complete, on-demand study companion for mastering the CompTIA Tech+ (FC0-U71) certification exam. Designed for those beginning their journey into information technology, it guides you step by step through every domain and objective of the official exam blueprint. Each episode transforms complex IT concepts into clear, relatable lessons filled with practical examples, definitions, and real-world applications. Whether you’re learning about hardware components, so ...
  continue reading
 
Artwork

1
Tech Tasty

Megan and Jackson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
This podcast is about the news and events surrounding the tech industry. It will also talk about jobs like but not limited to Cybersecurity, Web Development, and Network Fundamentals.
  continue reading
 
The A+ Audio Course is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this Audio Course breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most, helping you understand, retain, and apply essential IT concepts—from hardware and networking to operating systems, security, troubleshooting, and professi ...
  continue reading
 
Artwork

1
Manufacturing Hub

Vlad Romanov & Dave Griffith

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We bring you manufacturing news, insights, discuss opportunities, and cutting edge technologies. Our goal is to inform, educate, and inspire leaders and workers in manufacturing, automation, and related fields.
  continue reading
 
Artwork

1
The Legal Department

Stacy Bratcher

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Practical, efficient and fun, The Legal Department podcast delivers the bottom line of what busy in-house attorneys need to know to level up their career. Whether you’re the general counsel or just starting a career in a corporate law department, The Legal Department podcast is the place to get real world advice from leading legal executives, executive coaches, and other thought leaders on how to grow your career and deliver more value to your clients. Through conversations with prominent ge ...
  continue reading
 
Artwork

1
Cyber Survivor

Dan Dodson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
  continue reading
 
Artwork

1
Ahead of the Threat

Federal Bureau of Investigation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
  continue reading
 
Artwork

1
Techstrong Unplugged

Techstrong Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to Techstrong Unplugged, the go-to podcast for young adults stepping into the immersive world of technology. Brought to you by Techstrong, this series demystifies the tech industry and empowers the next generation. Whether you’re a digital native looking to expand your knowledge or a tech enthusiast eager to explore new trends, Techstrong Unplugged is your bridge to understanding the fundamentals and beyond. In each episode, we’ll dive into the latest in tech, from AI breakthroughs t ...
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Loading …
show series
 
[email protected] Security that actually holds under pressure starts long before passwords and antivirus. We pull back the rack door and walk through the parts that make a network resilient: switches that enforce port security, routers that block spoofed traffic, servers that stay patched and locked down, and load balancers that keep services…
  continue reading
 
This episode takes you inside the reality of becoming a systems integrator and growing a technical services business from the ground up. Vlad and Dave share their personal experiences launching and running integration companies, the lessons they learned as engineers moving into business ownership, and the challenges that come with finding customers…
  continue reading
 
In this episode of The Book Nerds Podcast, Aaron, Brianna, and Kyle dive into The Stress Paradox by Dr. Sharon Horesh Bergquist — exploring why stress isn’t the enemy we think it is. From redefining “good stress” to balancing life’s pressures with purpose, they connect insights on biology, mindset, and leadership with their own lives and practices.…
  continue reading
 
In this episode of Simply ICS Cyber, Don and Tom welcome Sam Blaney, retired Chief Warrant Officer (CW3) from the Georgia National Guard and current cybersecurity professor at the University of North Georgia. Sam shares insights from his career building and leading Cyber Protection Team 170, his transition into teaching, and his continued work help…
  continue reading
 
[email protected] The everyday internet feels effortless, but behind every click lives a maze of services quietly doing the heavy lifting. I pull back the curtain on the systems that make your workday possible—file shares that just appear on your desktop, printers that hum along until a 200‑page PDF wrecks the queue, and the alphabet soup of …
  continue reading
 
------------------- For our listeners, use the code 'EYECODEMEDIA22' for 10% off at check out for our Premiere Billing & Coding bundle or our EyeCode Billing & Coding course. Sharpen your billing and coding skills today and leave no money on the table! [email protected] https://docs.google.com/forms/d/e/1FAIpQLSdEt3AkIpRrfNhieeImi…
  continue reading
 
You’ve invested thousands in a state-of-the-art intruder alarm. You see the keypads and sensors every day, so you assume you're protected. But what if that system has a hidden fault? In this critical episode of The Security Brief, we investigate the single most overlooked factor in security: ongoing professional maintenance. We reveal how a "false …
  continue reading
 
In this deep-dive episode of The Security Brief, we are exploring the definitive rulebook for professional intruder alarms in the UK. What is the real difference between a certified, police-responsive system and one that an insurer won't even recognize? The answer lies in a complex web of standards, urgent deadlines, and strict operational rules. T…
  continue reading
 
Are you a business owner in 2025 wondering if your security cameras are up to the job? The world of CCTV has split in two: the reliable, old-school Analogue systems versus the smart, high-tech IP network cameras. Sticking with what's cheap and simple might seem smart, but could it be costing you more in the long run? In this episode, we cut through…
  continue reading
 
What if your security team never missed a single alert and actually had time to think strategically? In this episode, Ahmed Achchak, CEO and Co-Founder of Qevlar AI, reveals how autonomous SOCs are reshaping security operations worldwide. From tackling alert fatigue to empowering analysts with intelligent AI-driven investigations, Ahmed shares the …
  continue reading
 
In this conversation recorded at the Ignition Community Conference, Vlad, Dave, and their guest David Grussenmeyer from Inductive Automation explore one of the most important and inspiring stories in the world of industrial automation education. David leads the Educational Engagement Program at Inductive Automation and has spent the last several ye…
  continue reading
 
Cyber threats don’t just steal data—they halt care, cancel clinics, and shake trust. I sat down with Brent Yax, founder and CEO of Aweccom Technologies to unpack the hard truth: today’s attackers are profit-driven, organized, and focused on disrupting operations until we pay. We trace how the threat landscape shifted from amateur mischief to a matu…
  continue reading
 
https://integratedpwm.com/ ------------------- For our listeners, use the code 'EYECODEMEDIA22' for 10% off at check out for our Premiere Billing & Coding bundle or our EyeCode Billing & Coding course. Sharpen your billing and coding skills today and leave no money on the table! [email protected] https://docs.google.com/forms/d/e/…
  continue reading
 
Who said cybersecurity had to be serious? The future of cyber is creative, human, and even a little sexy. In this special 400th episode, Ron Eddings celebrates six incredible years of Hacker Valley Studio with one of cyber’s most creative voices, Maria Velasquez, Co-Founder of the Cybersecurity Marketing Society and Co-Host of Breaking Through in C…
  continue reading
 
The growing need for visibility and response in industrial environments is driving more organizations to consider ICS/OT Security Operations Centers — but what does that actually look like for small and medium-sized operations? In this episode of Simply ICS Cyber, Don and Tom sit down with Dan Gunter, CEO and founder of Insane Cyber, to discuss how…
  continue reading
 
[email protected] Ever wonder how your phone grabs an IP address the instant you join Wi‑Fi? We break down the invisible handshake that makes it happen: DORA. From discovery to acknowledgement, we map each step of the DHCP exchange, explain lease timers, and show how networks hand out addresses at scale without stepping on their own toes. Alo…
  continue reading
 
Attention all legal operations professionals! This episode is for you. Legal Ops consultant Lyndsey Cain of LegalEng is in The Legal Department to talk about how to make your legal tech implementation a success. From identifying a non-IT leader, knowing your goals, having a comms plan, and an ongoing governance structure, Lyndsey shares that succes…
  continue reading
 
As 2025 winds down, Aaron sits down with Refractional CFO’s Jackson Pace and Kevin Dang to break down the major tax changes from the “One Big Beautiful Bill.” They unpack what practice owners need to know about bonus depreciation, Section 179, QBI updates, ERC audits, and new deductions and credits—from child tax to senior benefits. Whether you lov…
  continue reading
 
Dr. Chris Wolfe examines how dry eye disease became linked with aesthetic treatments like IPL and radiofrequency. While these light-based therapies show real benefits for inflammation and gland function, marketing them as cosmetic services blurs the line between medical care and elective treatment. ------------------- For our listeners, use the cod…
  continue reading
 
[email protected] A census solved with cardboard, a company remade by a $5 billion gamble, and a tiny firmware layer that cracked open the PC market—this is the human story behind how computing became a platform, not a product. We go from Hermann Hollerith’s 1890 insight to IBM’s sales-first system that taught the world to think in fields and…
  continue reading
 
In this episode of Manufacturing Hub, hosts Vladimir Romanov and Dave Griffith sit down with Davide (David) Pascucci, founder of Bright IA (https://brightiatx.com/), for an in-depth conversation about what it truly takes to build, grow, and succeed in the world of robotics integration and industrial automation. Davide shares his incredible journey …
  continue reading
 
To defend like a human, you first have to think like a hacker. In this episode, Ron Eddings sits down with Chris Dale, Co-Founder and Chief Hacking Officer at River Security, to explore the human side of hacking, where curiosity, persistence, and vigilance meet defense. Chris shares how the traditional idea of penetration testing has evolved into a…
  continue reading
 
Dan Dodson hosts Drex DeFord, a leader in healthcare cybersecurity, to discuss the evolution and current state of cybersecurity in healthcare. Drex shares his career journey from a hospital administrator in the Air Force to leading roles in various healthcare organizations and consulting for tech companies. He describes how the rapid digitization o…
  continue reading
 
20/20 Magazine’s Christine Yeh joins Aaron to unpack Oakley’s 50th, the rise of smart glasses beyond the “fad,” how eyewear became the ultimate accessory, and where print and social media, fashion, and AI are taking optical—while keeping it real for patients. To connect with Christine: 20/20 Magazine Instagram @2020mag LinkedIn --------------------…
  continue reading
 
[email protected] The mic feels heavier at 100—not from gear, but from history. We started with a doctoral dare, a $40 class, and a shaky first recording. We built a library that helped learners pass A+, Network+, and Security+ while connecting the dots between hardware, operating systems, storage, networking, and the human choices behind eve…
  continue reading
 
In this episode, Chris discusses the evolving landscape of diabetic eye exams, particularly the shift towards fundus photography and the implications of AI in this space. He emphasizes the importance of comprehensive eye care beyond just fundus imaging, highlighting the limitations of such technology and the need for a holistic approach to patient …
  continue reading
 
[email protected] A quiet country house. A noisy war. And a handful of people who turned logic into a lifeline. We take you inside Bletchley Park to follow the thread from Poland’s algebraic assault on Enigma, through Alan Turing’s audacious vision for the Bombe, to Tommy Flowers’ all‑electronic Colossus that read Germany’s secrets at machine…
  continue reading
 
When code meets intuition, innovation gets personal. But what happens when we let AI vibe with our ideas? In this episode, Ron Eddings covers the rise of AI-driven development from Vibe Coding, where natural language shapes real code, to the emerging Model Context Protocols (MCPs) that redefine how apps talk to AI. He breaks down the recent Figma M…
  continue reading
 
At Automate 2025, Vlad and Dave take Manufacturing Hub inside the Siemens booth to explore how one of the world’s largest industrial technology companies is shaping the future of manufacturing. From the latest S7-1200 G2 PLC to industrial copilots powered by AI, digital twins that simulate entire factories, and virtual PLCs redefining automation, t…
  continue reading
 
[email protected] What’s the weakest link in your world—an old router, a forgotten Windows box, or that “anyone with the link” setting you meant to change? We unpack the real vulnerabilities hiding in small businesses, nonprofits, and home networks, then share a clear playbook to find them early and fix them fast without enterprise budgets. W…
  continue reading
 
The industrial threat landscape never stands still — and neither can defenders. In this episode of Simply ICS Cyber, Don and Tom sit down with Joe Slowik, a globally recognized expert in cyber threat intelligence (CTI), detection engineering, and incident response for ICS, OT, and critical infrastructure environments. With over 15 years of experien…
  continue reading
 
[email protected] Ever wish the network would just explain itself? We walk through the real language of connectivity—how links come alive, how packets choose their paths, and how a few core ideas unlock routers, firewalls, addressing, and the exam questions that test them. It starts with the wire (and the air): DSL over copper, cable scaling …
  continue reading
 
In this Office Hours discussion, Stacy Bratcher is joined by Leah Huddleston, Chief Legal Officer/Corporate Secretary at CBIZ, and Candace Jackson, Senior Vice President/General Counsel/Corporate Secretary of Silvaco. They share their journeys from associate general counsel and deputy GC to their current chairs, highlighting the most valuable lesso…
  continue reading
 
In this conversation, Chris and Dr. Ryan Corte discuss the journey from being a student to becoming a successful optometrist with multiple locations. They delve into the challenges and strategies of rebranding a practice, the differences between corporate and private practice, and the role of AI in modern optometry. They also explore the importance…
  continue reading
 
[email protected] What if the world’s hard drives merged into one invisible place—and you used it a hundred times today without thinking? We pull back the curtain on cloud storage, tracing its unlikely path from room-sized machines and punch cards to AWS’s game-changing S3, Dropbox’s frictionless sync, and the moment Netflix stopped shipping …
  continue reading
 
Modern robotic picking is moving beyond neat rows and perfect lighting conditions. In this Automate 2025 conversation, Vlad and Dave sit down with Kevin Wu from Siemens to explore how Simatic Robot Pick AI Pro is tackling the messy reality of warehouses and factories. They discuss how the new edge architecture with the Simatic IPC BX 59 A and an NV…
  continue reading
 
[email protected] What keeps a business alive when the lights flicker, a server drops, or an ISP blinks? We pull back the curtain on practical resilience—how continuity planning, capacity, and clear runbooks turn chaos into a minor hiccup—then pressure-test the plan with drills, documentation, and ruthless honesty. We start by grounding COOP …
  continue reading
 
The real edge in cybersecurity isn’t found in new tools, it’s built through timeless fundamentals and a mindset that never stops learning. In this episode, Ron sits down with Rich Greene, Senior Solutions Engineer and Instructor at SANS Institute, to uncover how true cyber value starts with skills, curiosity, and mindset. Rich shares his remarkable…
  continue reading
 
Dan Dodson interviews Dr. Bradley Fowler, author of “Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education,” discussing the pressing cybersecurity workforce shortages and the role of education and leadership in addressing risks. Dr. Fowler shares insights from his research, emphasizing human error as a major cau…
  continue reading
 
[email protected] What if your “all-in-one” router is doing too much—and your Wi‑Fi “speed” isn’t the real bottleneck? We pull back the rack door and trace the digital bloodstream from SOHO setups to enterprise backbones, translating jargon into choices you can actually make. Starting with LANs, WANs, WLANs, and SANs, we map how scope changes…
  continue reading
 
[email protected] A tiny stick changed how we move information—and how attackers move too. We pull back the curtain on the USB flash drive’s quiet takeover: why floppies and CD-Rs failed us, how flash memory and USB converged, and which teams across Singapore, Israel, and China raced to ship the first pocket drive that actually worked. From e…
  continue reading
 
What if protecting your digital twin becomes the new cyber hygiene? In this week's episode, Ron welcomes back cybersecurity leader Jason Rebholz, CEO of Evoke, to discuss how AI is reshaping the fundamentals of cyber hygiene. From data breaches and deepfakes to everyday habits that protect our digital lives, Jason shares how small actions and smart…
  continue reading
 
ICC 2025 was a clear level up for the Ignition community. In this conversation Vlad and Dave share on the ground insights from a week of packed sessions, vendor showcases, and ProveIt demonstrations that brought working integrations to life. They unpack why the move to a larger venue created more chances for deep technical conversations, how the co…
  continue reading
 
[email protected] Cloud perimeters are fading, identities are multiplying, and threats move faster than patches. We dive into the real mechanics of securing a hybrid world—mapping cloud deployment choices, clarifying shared responsibility across SaaS, PaaS, and IaaS, and showing how Zero Trust reshapes defenses around identity, posture, and c…
  continue reading
 
Aaron sits down with compliance expert Dr. Joe DeLoach, Cheif Compliance Officer of Practice Performance Partners and cybersecurity specialist Dave MacKinnon of Promethean One to unpack what every private practice owner needs to know about HIPAA, data protection, and evolving security laws. They discuss the biggest threats facing eye care practices…
  continue reading
 
Selecting and managing ICS/OT cybersecurity vendors and integrators isn’t just a procurement step - it’s a strategic decision that shapes resilience, compliance, and long-term security outcomes. The best approach depends on organization size, resources, and security objectives. In this episode, Don and Tom are joined by Saltanat Mashirova, OT Cyber…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play