Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cybersecurity Security Hacking Risk Technology Podcasts

show episodes
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
**Framework** is your go-to podcast for mastering the **NIST Cybersecurity Framework (CSF)**—the foundational model for building and improving organizational security programs. This series breaks down every function, category, and subcategory within the CSF, helping professionals, educators, and leaders understand how to apply the framework in real-world environments. Each episode delivers clear, practical explanations that connect framework concepts to daily security operations, governance, ...
  continue reading
 
Welcome to The Monica Talks Cyber Podcast Experience: The fastest, easiest and an engaging way to build and grow your career and business in artificial intelligence, leadership and cybersecurity. Monica Talks Cyber is a technology, career and business podcast and an engaging platform for real stories, discussions and opinions from renowned global experts in technology, leadership and cybersecurity. The podcast show is hosted by Monica Verma, Hacker, CISO, Keynote Speaker, Founder & CEO, Mult ...
  continue reading
 
Artwork

1
Real CyberSecurity

Greg Young & Bill Malik

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Real Cybersecurity Podcast decrypts the issues and business of technology security. But instead of just scaring you, these industry veterans provide real advice and analysis for organizations trying to make security real today. Hosted by Greg Young and Bill Malik.
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Artwork

1
Hack the Plant

Bryson Bort

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
  continue reading
 
Artwork

1
FinTech Germany – Innovation, Banking & Venture Capital by Startuprad.io™

Startuprad.io™ – Europe’s Startup & VC Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
FinTech Germany, powered by Startuprad.io™, is Europe’s definitive podcast on financial innovation and venture capital in the DACH region. Hosted by Joe Menninger, the show reveals how startups, banks, and investors collaborate to reshape finance for a digital, sustainable future. From Frankfurt to Zurich and Vienna, FinTech Germany examines the pioneers building Europe’s next-generation financial infrastructure — covering everything from open banking, embedded finance, and regtech to digita ...
  continue reading
 
Artwork

1
Beers & Bytes Podcast

Beers & Bytes Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Beer is one of the oldest and most widely consumed alcoholic drinks in the world, and the third most popular drink overall after water and tea. Cybersecurity is required today for businesses to protect themselves from the persistent threat of malware and ransomware. Hosts Chris Jordan, CEO of Fluency Security, and Jeremy Murtishaw, CEO of Fortify 24x7 discuss cybersecurity, information technology, and hockey with their guests while enjoying some of their favorite beers. Grab your favorite be ...
  continue reading
 
Artwork

1
The Daily Threat

QIT Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
Loading …
show series
 
Question? Text our Studio direct. Inside Espionage What Every American Should Know. Inside Truth Behind Data Breaches. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Impact of Chinese Espionage on…
  continue reading
 
Got a question or comment? Message us here! In this episode of the #SOCBrief, we dig into how world events can trigger cyber fallout that lands directly on the desks of security teams. From ransomware crews capitalizing on instability to hacktivists launching DDoS attacks and opportunistic actors going after vulnerable sectors, we talk through why …
  continue reading
 
Question? Text our Studio direct. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Threat of Chinese Espionage to American National Security Inside Espionage: What Every American Should Know Season …
  continue reading
 
What Security Congress Reveals About the State of Cybersecurity This discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioner…
  continue reading
 
Got a question or comment? Message us here! 📱 This #SecureAF episode covers the everyday questions and concerns people have when they think something unusual is happening with their devices or accounts. Hickman and Peters talk through typical scenarios, common misunderstandings, and the foundational steps that help people regain control of their ac…
  continue reading
 
In this episode, Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity news, including a ransomware attack on a small Ohio village and the FCC's warnings about cybersecurity risks. They dive into the importance of operational security (OPSEC) and cyber hygiene, share personal reflections on Thanksgiving, and explore various entertain…
  continue reading
 
Question? Text our Studio direct. The Supreme Court is hearing a billion-dollar piracy case that could literally change how the entire internet works. Sony says Cox Communications should be liable for customers illegally downloading music — including 10,017 songs in dispute. Cox argues: “We didn’t do it.” Leaked email: “F the DMCA!!!” Yeah… this ca…
  continue reading
 
Question? Text our Studio direct. Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch…
  continue reading
 
When hackers target the systems controlling your water, power, and transportation, the consequences go far beyond data breaches—people can die. Leslie Carhartt, Technical Director of Incident Response at Dragos, pulls back the curtain on one of cybersecurity's most critical blind spots: industrial control systems that keep society running but remai…
  continue reading
 
Question? Text our Studio direct. In this shocking monthly cyber update, the Cyber Crime Junkies (David, Dr. Sergio E. Sanchez, and Zack Moscow) expose the craziest, must-know stories in tech and security. What's Inside This Episode: The AI Threat is Real: Dr. Sergio reveals how Chinese threat actors manipulated Anthropic's Claude AI system to stag…
  continue reading
 
Question? Text our Studio direct. Can Brett Johnson Help You SPOT Fraud Before it's Too Late? Brett Johnson joins us to talk about spotting fraud before its too late. We discuss how to limit cyber risk for small business, ways to identify refund fraud, AI implications in cyber security today, best policies to limit cyber liability and how can we sp…
  continue reading
 
In this episode of the Cyber Uncut podcast, David Hollingworth and Bethany Alvaro talk about the week's cyber security and AI news! Hollingworth and Alvaro get things started with a warning about a rise in AI-driven holiday scams taking advantage of the silly season. The pair also talk about a recent call from CPA Australia for young Australians to…
  continue reading
 
Europe's startup narrative is changing fast — from apps and valuations to sovereignty, infrastructure and resilience. In this month's DACH Startup News, we unpack the moves that made European tech sovereignty the defining theme of 2025. What you’ll learn: – Why sovereign cloud is becoming foundational for startups and enterprise buyers – How AI, ro…
  continue reading
 
Got a question or comment? Message us here! This week’s #SOCBrief dives into the FortiWeb zero-day that’s letting attackers create admin accounts with a single unauthenticated HTTP request. With exploitation spiking and Fortinet pushing out a quiet fix, SOC teams are under pressure to lock down configs, audit firewalls, and patch fast. We break dow…
  continue reading
 
What if you could build a startup that survives downturns, grows profitably, and never depends on constant fundraising? That’s the core of the camel startup strategy — and in this episode, STS Ventures investor Stephan Schubert breaks it down with 25+ years of operator-investor experience. From founding OnVista in the early internet era to backing …
  continue reading
 
In this episode of the Contested Ground podcast, hosts Phil Tarrant, Major General (Ret'd) Dr Marcus Thompson and new co-host, Steve Kuper, detail the intricacies of the proposed Russia–Ukraine peace deal announced by US President Donald Trump. The trio also unpack three emerging security issues: a proposed Russia–Ukraine peace deal, heightened Chi…
  continue reading
 
This episode focuses on a security incident that prompts an honest discussion about transparency, preparedness, and the importance of strong processes. Sean Martin speaks with Viktor Petersson, Founder and CEO of Screenly, who shares how his team approaches digital signage security and how a recent alert from their bug bounty program helped validat…
  continue reading
 
⬥EPISODE NOTES⬥ Understanding the Startup Engine Behind Cybersecurity This episode brings Sean Martin together with Ross Haleliuk, author, investor, product leader, and creator of Venture Insecurity, for a candid look at the forces shaping cybersecurity startups today. Ross shares how his decade of product leadership and long involvement in the sec…
  continue reading
 
Question? Text our Studio direct. We discuss How ransomware can kill and ways to build security resilience with Chris Loehr, SVP of Solis Security. Ransomware Attacks Can Be DEADLY What Makes You SAFE? Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done with full cyber chaos: 🔥 Int…
  continue reading
 
Got a question or comment? Message us here! We’re back with the Hacker Holiday Gift Guide, and this year’s lineup is stacked with RF gadgets, Wi-Fi tools, red-team essentials, and quirky cyber gifts Tanner swears by. Whether you’re shopping for a pentester, a tinkerer, or someone who just loves breaking things (legally), these picks won’t miss. Get…
  continue reading
 
Black Friday season is upon us! 🛍️ This week, we’re joined by Simon Miller from Cifas, the UK’s leading fraud prevention service, to unpack the latest online scams. He shares essential tips to help you stay safe online and protect your hard-earned cash while shopping online this holiday season. 💳🔒 In Watchtower Weekly, we dive into why weak passwor…
  continue reading
 
The conversation dives into the theme of corporate accountability, exploring why companies often escape consequences for their actions and the importance of learning from mistakes. It draws parallels between corporate behavior and child behavior correction, emphasizing the need for early intervention to prevent more serious issues later on.Articles…
  continue reading
 
Question? Text our Studio direct. Discover the shocking story of Charlie Javice, the entrepreneur who went from being featured on the cover of Forbes to facing a federal indictment. Learn about her rise to fame and the events that led to her downfall. Get the inside scoop on the controversies surrounding her business ventures and the charges brough…
  continue reading
 
Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Mario Zaki - https://www.mazteck.com/ Bryan Lachapelle - https://www.b4networks.ca/ Guest: Faiz Gouri -https://www.linkedin.com/in/faizgouri/ https://modelcontextprotocol.io/ Microsoft Senior Software Engineer Business owners, your data just became incredibly powerful—and potentially danger…
  continue reading
 
Question? Text our Studio direct. 🔥New Episode🔥 dives into a famous betrayal case, showcasing the breach movie trailer as an example of Hollywood's take on espionage. This story highlights the perilous nature of insider threat and the critical importance of **counterintelligence**. We explore this true spy narrative, bringing you another compelling…
  continue reading
 
Question? Text our Studio direct. What Happens in Your BRAIN During Social Engineering Attacks We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Season 8 is officiall…
  continue reading
 
In this episode of the Cyber Uncut podcast, David Hollingworth is joined by Bethany Alvaro to talk about all things Australia and cyber security! The pair kick things off with some AI news. NVIDIA announced record earnings as the AI bubble steadfastly refuses to burst, and ChatGPT's curious new group chat feature. Hollingworth and Alvaro then talk …
  continue reading
 
Question? Text our Studio direct. LOCKBIT Cyber Crime Takedown Uncovered! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Backgroun…
  continue reading
 
Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Mario Zaki - https://www.mazteck.com/ Bryan Lachapelle - https://www.b4networks.ca/ Guest: Craig Taylor - http://cyberhoot.com/ Your cybersecurity awareness training might be sabotaging your business. Recent studies show traditional "gotcha" phishing tests actually increase clicks and creat…
  continue reading
 
⬥EPISODE NOTES⬥ Understanding Beg Bounties and Their Growing Impact This episode examines an issue that many organizations have begun to notice, yet often do not know how to interpret. Sean Martin is joined by Casey Ellis, Founder of Bugcrowd and Co-Founder of disclose.io, to break down what a “beg bounty” is, why it is increasing, and how security…
  continue reading
 
Got a question or comment? Message us here! A new zero-day. 63 flaws. Endless patching chaos. This week’s #SOCBrief breaks down Microsoft’s November Patch Tuesday and what it means for your SOC. We’ll cover the top critical CVEs, patching priorities, and how to keep your systems resilient before attackers strike. Support the show Watch full episode…
  continue reading
 
The conversation delves into the alarming use of AI in espionage, highlighting a recent incident reported by Anthropic where AI tools were manipulated to conduct attacks on various global organizations. The discussion emphasizes the unprecedented nature of these threats and the significant role AI plays in modern cybersecurity challenges.Article: A…
  continue reading
 
Question? Text our Studio direct. Join us as we delve into the uncharted territory where artificial intelligence meets modern warfare, exploring the profound implications and potential consequences of this revolutionary intersection. From autonomous drones to predictive analytics, we'll examine how AI is transforming the face of combat and defense …
  continue reading
 
Happy Veterans Day! In this episode of the Other Side of the Firewall podcast, host Ryan Williams Sr. interviews Bryce Englin, a retired Air Force veteran with extensive experience in IT and project management. They discuss the transition from military to civilian leadership, the importance of feedback and mentorship, and the challenges facing the …
  continue reading
 
What if your security team is playing defense while hackers play offense 24/7? Foster Davis, former Navy cyber warfare officer and founder of BreachBits, breaks down why traditional penetration tests become obsolete in weeks—and how continuous red teaming changes the game. From hunting pirates in the Indian Ocean to defending critical infrastructur…
  continue reading
 
In this episode of the Contested Ground podcast, hosts Phil Tarrant, Liam Garman, and Major General (Ret'd) Dr Marcus Thompson unpack two unfolding challenges shaping Australia's strategic outlook, an Iran-linked cyber breach exposing sensitive defence data, and China's latest move to outmanoeuvre Canberra in the Pacific. The discussion opens with …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play