A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Cybersecurity Tips Podcasts
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
In this episode, Tyler and Bob break down cybersecurity in a fun, human way—no tech jargon overload, just real tips and tricks to keep your business safe. From password tricks and phishing scams to the importance of backups and cloud security, they share easy-to-follow advice with plenty of humour and relatable insights. If you’ve ever ignored an update or used ”password123,” this one’s for you. Tune in, laugh a little, and learn how to become a cybersecurity rockstar!
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
…
continue reading
SipCyber: Where Great Coffee Meets Essential Cybersecurity What happens when a former special education teacher turned Minnesota State Cybersecurity Coordinator sits down with a perfect cup of coffee? You get cybersecurity advice that's actually approachable. Jen Lotze from IT Audit Labs brings you SipCyber — the podcast that pairs cozy coffee shop discoveries with decaffeinated cybersecurity tips. No jargon. No fear-mongering. Just practical ways to protect yourself, your family, and your o ...
…
continue reading
Welcome to Treasury Talk, a podcast for Michigan taxpayers hosted by State Treasurer, Rachael Eubanks. Our trending topics with Subject Matter Experts will include cybersecurity, tax prep tips, education savings plans, the budget and our economy, and leadership best practices. Listen for take-aways that will support you, your family and your business!
…
continue reading
This is your guide to navigating the ever-evolving world of cybersecurity. Hosted by Annie-Mei Forster and Anika Guenov, this podcast breaks down complex topics into relatable, easy-to-understand conversations. Whether you're a tech enthusiast, a curious newcomer, or a professional looking for fresh perspectives, join us as we explore cyber threats, digital safety tips, and the human stories behind the screen. Follow us on Instagram @thecybersecuritygals
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
You already know the monthly OUCH! Newsletter brings you the latest cybersecurity tips—but now, we’re taking it even further. Tune in to the new OUCH! Podcast, where we go deeper on cybersecurity topics and give you extra insights to stay ahead of the threats.
…
continue reading
This podcast is for lawyers who want more freedom, flexibility, and control over their practice. Ernie focuses on the 20% of tools and strategies—especially AI—that deliver 80% of the results. No buzzwords. No hype. Just clear, practical insights on using AI, automation, outsourcing, marketing, cybersecurity, and smart systems to reduce friction, streamline workflows, and run your practice your way—from anywhere.
…
continue reading
A weekly podcast with cybersecurity and physical security tips for the logistics community and security professionals. Hosted by a retired FBI Special Agent and former UK Intelligence Community member. Give a listen, tell a friend.
…
continue reading
Welcome to The Defender's Journal (our next step up from The Tech Stack), where we delve into the lives and minds of leading professionals in the cybersecurity space. Discover their unique stories, motivations, perspectives on the industry, and tips for long-term success! *Interested in joining us on the show? Please connect with Cameron Wenham or Jeff Harrod!
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
An instructional technology podcast featuring all the ed tech happenings in the Redlands Unified School District, with a side of chips and salsa.
…
continue reading
Welcome to the Passwork Cybersecurity Webinars — a space for insightful conversations on digital security and the latest trends in the world of cybersecurity. Each episode, we bring together industry experts, thought leaders, and practitioners to share real-world stories, practical tips, and deep dives into the challenges and innovations shaping our digital lives. Join us as we unravel the complexities of cybersecurity and empower you to protect what matters most.
…
continue reading
If you are looking for the latest stock tip, look elsewhere. Here, you'll find sound strategies based on financial principles that apply to your life. This isn't about financial jargon. This is about you. So listen, learn and ask questions of your own. After all, it's your money.
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
This is the podcast to discuss how to Get a Job in Tech, interview stories and advice. always awesome Get a Job in Tech Interview and job search strategies that work https://getajobinit.teachable.com/ https://garymcneelyit.com/ https://x.com/garymcneelyIT Interview and job search strategies that work Book by Gary McNeely Link: http://a.co/fxrPYIH
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
…
continue reading
Welcome to The Pulse On Cyber — your quick, clear, and powerful source for staying safe in today’s digital world. Hosted by CJ James, cybersecurity specialist and founder of CJ Network Systems, this podcast delivers fast, actionable cybersecurity tips in under two minutes. Each episode gives everyday consumers and small-to-medium businesses simple, real-world ways to protect themselves from the newest threats, scams, and digital risks. From phishing and password breaches to mobile scams and ...
…
continue reading
We cover diabetes technology, news, research, and management tips through expert interviews and people with diabetes who use the tech. We cover all the insulin pump and continuous glucose monitor (CGM) updates, patient stories and news from every diabetes conference.
…
continue reading
…
continue reading
Techtonic is the podcast that's all about groundbreaking progress in your tech job search. Whether you're a tech professional on the hunt for your next big opportunity or a team leader looking for expert insights on navigating the tech hiring market, this is the place for you. Every episode, we bring you real stories, struggles, resume hacks, professional branding, and success tips directly from those in the trenches and top hiring managers.
…
continue reading
Welcome to TiPS: Today in Public Safety! Stay informed. Stay prepared. Stay connected. TiPS: Today in Public Safety delivers the latest insights in Next Generation 911 (NG911) and public safety technology, helping you navigate the innovations transforming emergency response. Hosted by Mark J. Fletcher, ENP (“Fletch”), a leading expert with 14 U.S. patents, each episode dives into real-world trends in NG911 implementation, interoperability, cybersecurity, and emergency communications strategy ...
…
continue reading
1
KeyStone’s Stock Talk – Canadian & US Small-Cap Growth & Dividend Stocks, Tips & Portfolio Building Strategies
Stock Talk Podcast by KeyStone Financial
Hosted by Ryan Irvine, Brennan Habetler, and Brett Rodway - the podcast is highly interactive taking listener questions each week on individual Canadian & U.S. stocks as well as stock portfolio building strategies. The podcast focuses on high quality Canadian Dividend growth stocks, unknown & profitable Canadian Small-Cap stocks, U.S. tech leaders and high growth small-cap stocks. We also provide simple portfolio building tips for DIY investors. Weekly show highlights include: - Case For & A ...
…
continue reading
Weekly Information Security News. Stay up to date on what’s going on in the InfoSec world in about 40 minutes. Join us for InfoSec news and stay for some friendly banter, guest interviews, gadget reviews, tech interview tips, and hilarious dad jokes! New episodes every Monday.
…
continue reading
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
…
continue reading
A teacher podcast for busy educators—about 10 minutes, every week. Stay current on artificial intelligence in education (plain English), edtech, and what matters in the classroom: culture, instruction, assessment, digital health and wellness, and more. Simple ideas you can use right away. Hosted by AP Computer Science teacher Vicki Davis (Cool Cat Teacher)—author and longtime edtech blogger—this teaching podcast features best-selling teachers, researchers, and in-the-classroom administrators ...
…
continue reading
The Smart Communications Podcast helps busy nonprofit leaders build their communications skills and develop their organization’s voice. Every episode shares insights and practical tips to help you leverage strategic communications to advance your nonprofit’s mission.
…
continue reading
Cybersecurity career, technology, and success tips.
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Cybersecurity, Startups & Artificial Intelligence... but fun. Welcome to a place where hacking meets humor, AI meets absurdity, and your online safety might just be saved by a bad meme. We live in a world where your fridge can spy on you, your toaster has a firmware update, and a Nigerian prince still wants your money – but now through ChatGPT. It’s wild out there. This podcast arms you with the knowledge to survive and thrive in today’s tech jungle. You’ll get practical tips, real-world sto ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
"The Digital Revolution with Jim Kunkle", is an engaging podcast that delves into the dynamic world of digital transformation. Hosted by Jim Kunkle, this show explores how businesses, industries, and individuals are navigating the ever evolving landscape of technology. On this series, Jim covers: Strategies for Digital Transformation: Learn practical approaches to adopting digital technologies, optimizing processes, and staying competitive. Real-Life Case Studies: Dive into inspiring success ...
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
Cyber Snacks, by Buckingham, is a podcast dedicated to providing useful data privacy and cybersecurity tips in bite-sized pieces. The goal is to keep each episode short, simple, actionable, and reasonable.
…
continue reading
1
🌐 Cybersecurity Unmasked 🌐 EP 27: North York Nonprofit Averts Data Breach Through Awareness
15:43
15:43
Play later
Play later
Lists
Like
Liked
15:43One click. One password. That's all it took to put an entire North York nonprofit minutes away from disaster. In this episode of Cybersecurity Unmasked, we share a real case study from our own clients—how a single moment of awareness stopped what could have been a catastrophic $200K+ data breach. This phishing attack wasn't some poorly written scam…
…
continue reading
“95% Certain… BUT 100% Wrong: The Confidence Score Problem” What if your mapping screen showed a 95% confidence location for a 9-1-1 caller… …but the caller wasn’t actually in that building… or on that block… or even on the right floor? Welcome to today’s episode of TiPS: Today in Public Safety, where we dig into the surprisingly misunderstood real…
…
continue reading
1
Deepfakes, Donations, and Deception: The Psychology of the Cyber Con
40:50
40:50
Play later
Play later
Lists
Like
Liked
40:50Threat actors are exploiting human psychology using sophisticated techniques like AI-powered deepfakes and emotional manipulation to bypass traditional security defenses. This episode explores how nonprofits and consumer organizations are increasingly targeted by highly effective scams, including CEO impersonation fraud, Business Email Compromise (…
…
continue reading
Send us a text AI’s energy appetite is already staggering, and projections suggest it could reshape global electricity demand within the next decade. Data centers consumed less than 300 terawatt-hours of electricity in 2020, but forecasts from the International Energy Agency indicate this could surge to nearly 1,000 terawatt-hours by 2028, more tha…
…
continue reading
1
AI Safety 101: Manipulation, Hallucinations & Defense
3:58
3:58
Play later
Play later
Lists
Like
Liked
3:58The tools we trust most can deceive us fastest. In this episode of SipCyber, Jen Lotze brings insights straight from Wild West Hackin' Fest—one of the premier ethical hacking conferences—to Wabasha Brewing in St. Paul, MN. Fresh off an AI cybersecurity course, Jen breaks down two critical vulnerabilities in the AI tools millions of us use daily: ma…
…
continue reading
1
The Bad Apple Latte: How One Insider Nearly Brewed a Cyber Disaster
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17In this episode of Darnley’s Cyber Café, we dive into the real story behind CrowdStrike’s recent insider scandal, and what it teaches us about the hidden dangers brewing inside modern companies. We break down how a “bad apple” employee allegedly leaked internal information to a notorious hacking collective, why insider threats are so hard to detect…
…
continue reading
1
Black Friday 2025: Tech, Coffee, and Cables (EP 945)
1:02:52
1:02:52
Play later
Play later
Lists
Like
Liked
1:02:52Looking for real-world tech, home, and office upgrades for Black Friday? Marv and Dawn spotlight Roborock robot mops, Plaud AI transcription, Keds conference shoes, active noise-canceling headphones, desk and chair splurges, and smart Christmas lights that daisy-chain cleanly. They wrap it all in an MSP-friendly conversation about IT Nation, podcas…
…
continue reading
1
The Accidental Leak: Why You're the Biggest Threat to Your Own Data
29:01
29:01
Play later
Play later
Lists
Like
Liked
29:01We dive into the most financially devastating threats of 2025, revealing how ransomware, which accounted for 76% of incurred losses in one portfolio, and vendor breaches continue to drive significant financial damage. The discussion explores how AI is turbocharging social engineering and credential stuffing (which caused a 250% increase in Account …
…
continue reading
1
Risky Business #816 -- Copilot Actions for Windows is extremely dicey
58:07
58:07
Play later
Play later
Lists
Like
Liked
58:07In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Salesforce partner Gainsight has customer data stolen Crowdstrike fires insider who gave hackers screenshots of internal systems Australian Parliament turns off wifi and bluetooth in fear of of visiting Chinese bigwigs Shai-Hulud npm/Github worm is b…
…
continue reading
In this Week's Show: NEO Performance Materials (NEO:TSX) Breaks Momentum — Here’s What Happened Meet Greg Abel: The Canadian Taking Over Berkshire Hathaway Constellation Software (CSU:TSX) Drops 30% — Opportunity or Warning Sign?By Stock Talk Podcast by KeyStone Financial
…
continue reading
1
Leadership, Tax Policy, and National Impact: A Conversation with Chief Deputy Treasurer Lance Wilkinson
23:50
23:50
Play later
Play later
Lists
Like
Liked
23:50What do billion-dollar road funding shifts, a new marihuana tax, and leadership in national tax policy have in common? Michigan’s Treasury is at the center of it all. In this episode, we meet Chief Deputy Treasurer Lance Wilkinson and hear about his path into public service and tax policy. He shares insights into the role of the Chief Deputy Treasu…
…
continue reading
This week on WELSTech we take a deep dive into Google’s NotebookLM. Discover how this AI tool uses only your uploaded documents to create everything from video and audio overviews, flashcards, and summary documents, plus learn about other innovative AI tools like Hume Voice AI and the Plaud audio recorder that are changing the way […]…
…
continue reading
1
Avoid Black Friday scams and shop safely online with Simon Miller | BLACK FRIDAY HOLIDAY SCAMS
1:03:47
1:03:47
Play later
Play later
Lists
Like
Liked
1:03:47Black Friday season is upon us! 🛍️ This week, we’re joined by Simon Miller from Cifas, the UK’s leading fraud prevention service, to unpack the latest online scams. He shares essential tips to help you stay safe online and protect your hard-earned cash while shopping online this holiday season. 💳🔒 In Watchtower Weekly, we dive into why weak passwor…
…
continue reading
The conversation dives into the theme of corporate accountability, exploring why companies often escape consequences for their actions and the importance of learning from mistakes. It draws parallels between corporate behavior and child behavior correction, emphasizing the need for early intervention to prevent more serious issues later on.Articles…
…
continue reading
1
Why Architect for Human Error When We Can Make People Feel Really Bad About It?
39:23
39:23
Play later
Play later
Lists
Like
Liked
39:23All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is Richard Rushing, CISO, Motorola Mobility. In this episode Mindset over tools When hygiene becomes risk Systems for actual humans Conversations over compliance Huge than…
…
continue reading
This podcast dissects adversary tactics, techniques, and procedures (TTPs), focusing on how attackers leverage social engineering and human psychological weaknesses like fear and trust to gain unauthorized access. We explore the proactive strategies of Red Teaming and Breach and Attack Simulation (BAS), which use the MITRE ATT&CK framework to emula…
…
continue reading
1
318: AI is a consensus machine (and here's why that's good for some lawyers)
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01Show Notes In this episode, Ernie discusses the impact of AI on the legal profession, emphasizing that while AI may replace surface-level tasks, the best lawyers will thrive by focusing on deeper, strategic thinking and understanding complex legal outcomes. Takeaways The best lawyers won't just survive this wave of AI. They're gonna dominate. If yo…
…
continue reading
1
Ep. 25 Chris Mielczarski — Networking for Introverts: Chris Mielczarski on Bravery, Vulnerability & Career Connections
34:37
34:37
Play later
Play later
Lists
Like
Liked
34:37In this episode of Techtonic, we explore one of the biggest challenges tech professionals face today: networking when you're an introvert. I'm joined by Senior Salesforce Developer and community builder, Chris Mielczarski. Chris brings a refreshingly human perspective to the art of connecting with others in the tech ecosystem. Together, we break do…
…
continue reading
Bruce Helmer and Peg Webb share tips to help keep holiday spending from derailing your finances this holiday season.
…
continue reading
1
TiPS Episode 25 1124 - Turkey Day Testing for NG911
8:29
8:29
Play later
Play later
Lists
Like
Liked
8:29In today’s TiPS episode, Fletch explains the annual holiday disaster affectionately called The NG911 Turkey Test — the Thanksgiving surge that reveals every weakness in our public safety networks. We discuss why Thanksgiving consistently generates the strangest call traffic of the year, what really fails during surge conditions, and how NG911 netwo…
…
continue reading
1
Is Your Pump Secure? A Cybersecurity Expert Breaks It Down
44:44
44:44
Play later
Play later
Lists
Like
Liked
44:44I sit down with Josiah Dykstra—a cybersecurity expert who spent nearly two decades at the NSA and has lived with type 1 diabetes for over 30 years—to explore what diabetes management looks like inside some of the most locked-down buildings in the world. We talk about what happens when your phone, smartwatch, and even certain medical devices are ban…
…
continue reading
1
CCT 300: Failing Securely, Simply, Separation of Duties, KISS and Zero Trust (CISSP)
44:36
44:36
Play later
Play later
Lists
Like
Liked
44:36Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Security programs fail when they try to do everything at once. We walk th…
…
continue reading
1
CISA’s OT Cybersecurity: Asset Inventory Essentials
15:07
15:07
Play later
Play later
Lists
Like
Liked
15:07Send us a text When you think about protecting critical infrastructure, pipelines, power grids, or water treatment facilities, the first question isn’t how to defend them, but what exactly are we defending? That’s the challenge The Cybersecurity & Infrastructure Security Agency or the CISA tackled in its August 13th 2025 guidance on OT cybersecurit…
…
continue reading
1
Episode 235 - Worldwide Crackdown On Scam Compounds, Checkout.com Hacked and Donates Ransom, European Auto Ring Busted, Car Talk
49:08
49:08
Play later
Play later
Lists
Like
Liked
49:08Welcome to this week's episode of the PEBCAK Podcast! We’ve got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! World…
…
continue reading
1
WhatsApp Leak, Rail Hack and CCTV Horror Stories | Weekly Cyber News, But Human
52:19
52:19
Play later
Play later
Lists
Like
Liked
52:19📢 Subscribe on your favourite platforms and visit https://linktr.ee/riskycreative for more of ∠The Awareness Angle 📢 This Week on The Awareness Angle Rail hacks, WhatsApp risks, CCTV horror stories, teenage cyber gangs, and a staffing breach that leaked over a hundred thousand CVs. It has been a busy week. Luke and I break down the biggest cyber st…
…
continue reading
1
AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage
18:12
18:12
Play later
Play later
Lists
Like
Liked
18:12In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to target 30 global organizations. We explain how the attack was executed, why it matters, and its implications for cybersecurity. Join the conversation as …
…
continue reading
1
Zero Trust to SCADA: Navigating the InfoSec Mandate
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25This podcast explores the comprehensive responsibilities of modern InfoSec professionals, ranging from core security operations like vulnerability management across operating systems, network devices, and containers, to ensuring physical security and managing application development standards. Dive deep into emerging and complex domains such as AI …
…
continue reading
Welcome to this week's bonus episode of the PEBCAK Podcast! We’ve got some amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcastBy Chris Louie
…
continue reading
1
Episode 195 Cloudflare’s Outage, DoorDash hacked, Nvidia $57B revenue, and Tech Career Crashouts
2:00:14
2:00:14
Play later
Play later
Lists
Like
Liked
2:00:14Get into cybersecurity here : https://app.techtualconsulting.tech/bundles/57 ------------------------------------------------------------------------------------ In this episode, HD and CyberShortieee dive into everything from navigating IT career moves and salary negotiation, to analyzing the recent Cloudflare outage, security breaches at DoorDash…
…
continue reading
1
From FBI to Cybersecurity Leader: M.K. Palmore's Career Journey | Breaking Into Cybersecurity
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18In this episode of Breaking Into Cybersecurity, M.K. Palmore, a cybersecurity leader and former FBI special agent, shares his journey from serving in the Marines and the FBI to leading his own consulting firm, Apogee Global RMS. He discusses his early interest in technology, the importance of effective communication in cybersecurity leadership, and…
…
continue reading
1
EiPS Episode 25 1121 - Dispatch Dopplegangers NG911 Digital Twins
10:29
10:29
Play later
Play later
Lists
Like
Liked
10:29In this episode of TiPS: Today in Public Safety, Fletch dives into a topic that sounds futuristic but is already knocking on the ECC door: AI-powered “dispatch doppelgängers.” These aren’t JUST chatbots, scripts, or templates — they’re digital twins of your best call takers, created from real performance data to help with training, simulations, and…
…
continue reading
1
The Privacy Divide: State Laws, Age Limits, and the Battle for the Under-18 Consumer.
36:11
36:11
Play later
Play later
Lists
Like
Liked
36:11This episode explores the complex division in state mandates between general consumer privacy laws and specific children’s design codes, which often function as separate acts or amendments. We break down how compliance is determined either by broad, quantitative thresholds like annual gross revenue and high data volume, or by the specific service's…
…
continue reading
1
#89 – Is The Expanding Quantum Computing Workforce Your Next Career Move?
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45Do you think Quantum Computing jobs are just for PhD's and physics geniuses? Not anymore. Your current SaaS, business, or marketing skills are desperately needed to build this new industry. Izhar Medalsy tells us how to jump careers, and why the new quantum computing industry is already exciting.By Extra Something Media
…
continue reading
1
Risky Biz Soap Box: Greynoise knows when bad bugs are coming
37:51
37:51
Play later
Play later
Lists
Like
Liked
37:51In this sponsored Soap Box edition of the podcast, Andrew Morris joins Patrick Gray to talk about how Greynoise can often get a 90 day heads up on serious vulnerabilities. Whether it’s malicious actors doing reconnaissance or the affected vendors trying to understand the scope of the problem, it seems that mass scanning activity lines up pretty nic…
…
continue reading
1
Think Like a Spy, Hunt Like a Hacker: Former FBI Agent Eric O’Neill on Outsmarting Cybercriminals
46:47
46:47
Play later
Play later
Lists
Like
Liked
46:47In this episode of the Cybersecurity Mentors Podcast, Eric O'Neill shares his experiences as an undercover FBI agent who caught one of the most damaging spies in U.S. history, Robert Hansen. He discusses the evolution of cybercrime, the importance of understanding cyber attacks, and the intersection of espionage and cybersecurity. O'Neill emphasize…
…
continue reading
1
CCT 299: Practice CISSP Questions - Data Security Controls
19:19
19:19
Play later
Play later
Lists
Like
Liked
19:19Send us a text Words can trigger audits, budget panic, or calm execution, and few words carry more weight than “leak” and “breach.” We unpack the real differences, the legal and regulatory implications of each, and how precise language shapes incident response. From there, we get hands-on with CISSP-ready concepts—data states, DLP, CASB, DRM, minim…
…
continue reading
1
Impossible Goals That Transform MSPs (EP 944)
57:20
57:20
Play later
Play later
Lists
Like
Liked
57:20Curious why most MSPs get stuck in the “success prison” and how some break through to massive growth? This episode explores tangible strategies for setting and reaching impossible goals, plus expert tips for standing out in tech. Takeaways: Understand the difference between standards and best practices—and why best practices alone will commoditize …
…
continue reading
1
Compass One: Blackpoint’s North Star for MSPs (EP 943)
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27Presented by Thread — the AI-powered service desk transforming MSP support, automation, and productivity for today’s IT leaders. https://www.itbusinesspodcast.com/thread/ In this lively episode from IT Nation Orlando, Uncle Marv is joined by Mike Estep, Chief Client Officer at Blackpoint Cyber, who discusses the evolution of MSP security products, …
…
continue reading
1
TiPS Episode 25 1119 - The NG911 Data Deluge in the ECC
8:01
8:01
Play later
Play later
Lists
Like
Liked
8:01In this episode of TiPS: Today in Public Safety, Fletch opens the door to the part of NG911 nobody really wants to talk about — the data closet. As multimedia floods the ECC from every direction — drones, doorbell cameras, IoT sensors, telematics, citizen uploads, automated crash detection, AI transcripts — public safety centers are rapidly becomin…
…
continue reading
1
The Crown Jewels of Governance: Australian Cyber Security Priorities for Boards in 2025-26
12:25
12:25
Play later
Play later
Lists
Like
Liked
12:25Australia faces a heightened global cyber threat environment driven by geopolitical tensions, with malicious actors continuing to target organizations of all types and sizes, which has led to rising cybercrime costs and serious data breaches. Drawing on guidance from the Australian Signals Directorate (ASD) and the Australian Institute of Company D…
…
continue reading
1
Scams Exploiting Trust: Quishing & Pig Butchering
4:08
4:08
Play later
Play later
Lists
Like
Liked
4:08Trust is essential in our daily lives—but it's also what scammers exploit most. In this episode of SipCyber, Jen Lotze visits Central Park Coffee in Owatonna, MN, to discuss two evolving scams that prey on human trust: quishing (QR code fraud) and pig butchering (romance investment scams). From fake QR codes on restaurant tables to elaborate romanc…
…
continue reading
1
Ant Digital at Singapore FinTech Festival
10:21
10:21
Play later
Play later
Lists
Like
Liked
10:21Send us a text At the heart of every great digital transformation story is a moment of convergence, where technology, trust, and timing collide to reshape industries. That’s exactly what we’re witnessing with Ant Digital Technologies at the Singapore FinTech Festival. This isn’t just another product showcase; it’s a strategic signal from one of Asi…
…
continue reading
1
How Ordinary People Are Accidentally Helping Hackers Break Into Global Companies
12:00
12:00
Play later
Play later
Lists
Like
Liked
12:00In this episode of Darnley's Cyber Café, Darnley exposes how everyday people around the world are unknowingly helping hackers infiltrate global companies. We break down fake remote job scams, identity laundering, and the red flags that businesses and individuals need to watch for. Learn how cybercriminals recruit ordinary citizens, why these scheme…
…
continue reading
1
A Defender's Journal Spin-Off - Meg Anderson
28:30
28:30
Play later
Play later
Lists
Like
Liked
28:30Welcome to a special spin-off episode of The Defender’s Journal. This week, we sit down with Meg Anderson - a longtime security executive whose career spans nearly 40 years in one of the most tightly regulated environments in the industry... We explore what longevity really takes, how leadership evolves over decades, and what she might need to unle…
…
continue reading
1
Rob Rae Unpacks Managed Intelligence (EP 942)
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18Presented by Thread — the AI-powered service desk transforming MSP support, automation, and productivity for today’s IT leaders. https://www.itbusinesspodcast.com/thread/ Rob Rae breaks down the next era for IT businesses—Managed Intelligence Providers. Learn about real-world AI adoption, Pax8’s industry playbooks, and how events shape the MSP futu…
…
continue reading
1
Mastering MSP Cybersecurity with OpenText (EP 941)
24:45
24:45
Play later
Play later
Lists
Like
Liked
24:45Presented by Thread — the AI-powered service desk transforming MSP support, automation, and productivity for today’s IT leaders. https://www.itbusinesspodcast.com/thread/ If you’re an MSP aiming to modernize your cybersecurity stack and stay ahead of technology shifts, this episode is your key resource. Mike and Jason share candid insights on autom…
…
continue reading
1
Risky Business #815 -- Anthropic's AI APT report is a big deal
51:24
51:24
Play later
Play later
Lists
Like
Liked
51:24In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Anthropic says a Chinese APT orchestrated attacks using its AI It’s a day ending in -y, so of course there are shamefully bad Fortinet exploits in the wild Turns out slashing CISA was a bad idea, now it’s time for a hiring spree Researchers brute for…
…
continue reading
1
AI Hacks Are Here Agentic AI Espionage, Cybersecurity Layoffs & Info Sharing Gaps
38:39
38:39
Play later
Play later
Lists
Like
Liked
38:39The conversation delves into the alarming use of AI in espionage, highlighting a recent incident reported by Anthropic where AI tools were manipulated to conduct attacks on various global organizations. The discussion emphasizes the unprecedented nature of these threats and the significant role AI plays in modern cybersecurity challenges.Article: A…
…
continue reading
In this Week's Show: End of an Era: Buffett Hands the Reins to Greg Abel Northland Power’s (NPI:TSX) 2027 Outlook — Trouble or Turnaround? Is Strategy Inc. (MSTR:NASDAQ) Bitcoin Plan Falling Apart?By Stock Talk Podcast by KeyStone Financial
…
continue reading