In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
Cybersecurity Tips Podcasts

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
You already know the monthly OUCH! Newsletter brings you the latest cybersecurity tips—but now, we’re taking it even further. Tune in to the new OUCH! Podcast, where we go deeper on cybersecurity topics and give you extra insights to stay ahead of the threats.
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
This is the podcast to discuss how to Get a Job in Tech, interview stories and advice. always awesome Get a Job in Tech Interview and job search strategies that work https://getajobinit.teachable.com/ https://garymcneelyit.com/ https://x.com/garymcneelyIT Interview and job search strategies that work Book by Gary McNeely Link: http://a.co/fxrPYIH
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
A bi-weekly podcast that helps you curb cybersecurity risk and tackle technology challenges
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
In this episode, Tyler and Bob break down cybersecurity in a fun, human way—no tech jargon overload, just real tips and tricks to keep your business safe. From password tricks and phishing scams to the importance of backups and cloud security, they share easy-to-follow advice with plenty of humour and relatable insights. If you’ve ever ignored an update or used ”password123,” this one’s for you. Tune in, laugh a little, and learn how to become a cybersecurity rockstar!
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
…
continue reading
Security certificates are a great way to show you know your stuff, but now what? You want to get into the field, and it seems impossible at times to even get to the prescreening phase of an interview when you've never had a security role you're chasing. In this podcast, local professionals in the industry spill all to the tips and shortcuts they've used in securing their roles. https://isc2la.org/joinus The ISC2 Los Angeles chapter wants to see you succeed as the security professional you we ...
…
continue reading
Cybersecurity, Startups & Artificial Intelligence... but fun. Welcome to a place where hacking meets humor, AI meets absurdity, and your online safety might just be saved by a bad meme. We live in a world where your fridge can spy on you, your toaster has a firmware update, and a Nigerian prince still wants your money – but now through ChatGPT. It’s wild out there. This podcast arms you with the knowledge to survive and thrive in today’s tech jungle. You’ll get practical tips, real-world sto ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Welcome to Treasury Talk, a podcast for Michigan taxpayers hosted by State Treasurer, Rachael Eubanks. Our trending topics with Subject Matter Experts will include cybersecurity, tax prep tips, education savings plans, the budget and our economy, and leadership best practices. Listen for take-aways that will support you, your family and your business!
…
continue reading
This is your guide to navigating the ever-evolving world of cybersecurity. Hosted by Annie-Mei Forster and Anika Guenov, this podcast breaks down complex topics into relatable, easy-to-understand conversations. Whether you're a tech enthusiast, a curious newcomer, or a professional looking for fresh perspectives, join us as we explore cyber threats, digital safety tips, and the human stories behind the screen. Follow us on Instagram @thecybersecuritygals
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Welcome to The Defender's Journal (our next step up from The Tech Stack), where we delve into the lives and minds of leading professionals in the cybersecurity space. Discover their unique stories, motivations, perspectives on the industry, and tips for long-term success! *Interested in joining us on the show? Please connect with Cameron Wenham or Jeff Harrod!
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Welcome to The Bare Metal Cyber CISSP Prepcast — your essential guide to mastering the CISSP certification. Whether you're just starting your cybersecurity journey or preparing for exam day, this podcast delivers expert insights, practical strategies, and clear explanations to help you succeed. Designed by professionals who’ve walked the path, each episode helps you build confidence, sharpen your skills, and move one step closer to certification success.
…
continue reading
Concrete advice on how to simplify technology to streamline work and gain more freedom. Running a law practice today means navigating a sea of tech options. Success with tech demands you focus on a few key tools in six areas: (1) automation, (2) outsourcing, (3) marketing, (4) cybersecurity, (5) remote work, and (6) artificial intelligence. That's what this podcast will help you with: strategically focusing on a few key tech options and explaining why they matter and how to get the most from ...
…
continue reading
An instructional technology podcast featuring all the ed tech happenings in the Redlands Unified School District, with a side of chips and salsa.
…
continue reading

1
KeyStone’s Stock Talk – Canadian & US Small-Cap Growth & Dividend Stocks, Tips & Portfolio Building Strategies
Stock Talk Podcast by KeyStone Financial
Hosted by Ryan Irvine & Aaron Dunn, the podcast is highly interactive taking listener questions each week on individual Canadian & U.S. stocks as well as stock portfolio building strategies. The podcast focuses on high quality Canadian Dividend growth stocks, unknown & profitable Canadian Small-Cap stocks, U.S. tech leaders and high growth small-cap stocks. We also provide simple portfolio building tips for DIY investors. Weekly show highlights include: - Case For & Against Any Stock: our Ry ...
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Welcome to the Ruff Draft Podcast, where education meets innovation! Hosted by Clyde CISD, this podcast spotlights the latest in educational technology, classroom creativity, and inspiring stories from our district. Whether you’re a teacher looking for tech tips, a student curious about new tools, or a community member passionate about learning, we’ve got something for you. Join us as we celebrate the Bulldog spirit and explore exciting ways to enhance education!
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
All Things Internal Audit is a new video podcast sharing news and practical knowledge for internal auditors. Produced by The Institute of Internal Auditors, each episode features insightful interviews with knowledgeable pros, timely tips and the latest news about the profession. All Things Internal Audit is available everywhere you get podcasts. IIA Members get more podcast content in each episode. Visit www.theiia.org for more information.
…
continue reading
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
…
continue reading
Our show is education-based to give information to entrepreneurs to help them know the rules and regulations that need to be followed to help them avoid penalties and keep them in compliance. It also offers tips for success in various areas including marketing, website design, budgeting, understanding information on financial reports and more.By listening to this program, you will learn about specific regulations in the areas of business licenses, payroll, sales tax (for online and brick and ...
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
Cybersecurity career, technology, and success tips.
…
continue reading
Sell Me This Podcast is a deep dive into the intricate world of enterprise technology sales and procurement. Hosted by Keith Daser, each episode unravels the strategies, tactics, and human psychology behind how business-oriented technology solutions are bought and sold. Designed for corporate buyers, technology sales professionals, and business leaders, the podcast provides actionable insights to help maximize the value of tech investments. Expect engaging interviews with industry experts, r ...
…
continue reading
"The Digital Revolution with Jim Kunkle", is an engaging podcast that delves into the dynamic world of digital transformation. Hosted by Jim Kunkle, this show explores how businesses, industries, and individuals are navigating the ever evolving landscape of technology. On this series, Jim covers: Strategies for Digital Transformation: Learn practical approaches to adopting digital technologies, optimizing processes, and staying competitive. Real-Life Case Studies: Dive into inspiring success ...
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading

1
Episode 140: Threat-Informed Travel Safety Tips
34:28
34:28
Play later
Play later
Lists
Like
Liked
34:28In episode 140 of Cybersecurity Where You Are, Sean Atkinson is joined by John Cohen, Executive Director of the Program for Countering Hybrid Threats at the Center for Internet Security®(CIS®). Together, they discuss travel safety tips informed by today's evolving multidimensional threat environment. Here are some highlights from our episode: 01:30…
…
continue reading
Social Media make us unhappy and no, it’s not just an opinion, but scientific fact. Source:https://zurl.co/V0U90 #shortsBy Mateusz Chrobok
…
continue reading

1
Human Risk Management with uSecure (EP 861)
13:53
13:53
Play later
Play later
Lists
Like
Liked
13:53What if your security training ran itself, effortlessly protecting your clients from human error? Nihil Morjaria of uSecure explains how their platform automates everything from onboarding to dark web monitoring, giving MSPs more time for complex projects. With award-winning results and a focus on real-life scenarios, uSecure is changing the game f…
…
continue reading

1
From Clicks to Confidence: How Positive Phishing Transforms Cybersecurity Training with Craig Taylor
32:44
32:44
Play later
Play later
Lists
Like
Liked
32:44Send us a text Are your employees afraid of clicking the wrong email? Flip the script on fear-based training. Learn how positive phishing and gamified cyber literacy create lasting behavioral change. #CyberSecurity #EmployeeTraining #PositivePhishing #CyberAwareness #SmallBusinessTips Support the show Resources: https://affordablebookkeepingandpayr…
…
continue reading

1
Securing AI at Enterprise Scale: Lessons from Walmart's Transformation with Tobias Yergin
44:22
44:22
Play later
Play later
Lists
Like
Liked
44:22When one of the world's largest enterprises deploys AI across 10,000+ developers, the security challenges are unlike anything most organizations have faced. In this episode of SecureTalk, we explore the critical security and strategic considerations for deploying AI tools at enterprise scale with Tobias Yergin, who led AI transformation initiatives…
…
continue reading

1
S2E2, My First Year in Cyber; What I wish I knew with David Lin
39:51
39:51
Play later
Play later
Lists
Like
Liked
39:51Keywords: cybersecurity, community, learning, mentorship, networking, communication, compassion, authenticity, career advice, challenges Summary In this engaging conversation, Steve Weltman and David Lin explore the journey of entering the cybersecurity field, sharing personal experiences, challenges, and the importance of community support. David …
…
continue reading
Ever wonder how top MSPs break through the noise and get deals done? Dmitrius Garcia, president and co-founder of XAmplify, joins Uncle Marv to share the company’s journey from product-centric to service-first. Learn how XAmplify’s AI agent and analytics platform are helping MSPs turn complex jargon into clear value propositions, track every campai…
…
continue reading

1
We Require 3-5 Years of Experience to Qualify for the Cyber Skills Shortage
37:49
37:49
Play later
Play later
Lists
Like
Liked
37:49All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining us is Anne Marie Zettlemoyer, former vp of security, Activision Blizzard. In this episode SOC automat…
…
continue reading

1
🎉 BONUS: Win a Free Year of 1Password – Take Our 2025 Listener Survey!
3:39
3:39
Play later
Play later
Lists
Like
Liked
3:39WE NEED YOU! Our 2025 listener survey is now live, and we’d love to hear from you. Whether you’ve been with us from episode one or just joined the chaos, your feedback will make the show even better. 💬 Do you have a favourite episode? Do you secretly skip a segment? Now’s your chance to let us know — honestly, we want to hear it all. 💙 As a thank y…
…
continue reading

1
Identity Unlocked: Balancing Security, User Experience, and Efficiency
17:54
17:54
Play later
Play later
Lists
Like
Liked
17:54In a world where identity is recognized as the new perimeter, organizations face the critical challenge of balancing robust security measures with seamless user experiences and operational efficiency in identity management. This episode delves into key strategies such as implementing phishing-resistant Multi-Factor Authentication (MFA) and password…
…
continue reading

1
Cybersecurity in Higher Ed: Columbia University on IT Decentralization and Governance
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03Send us a text Colleges and universities face unique cybersecurity challenges, especially when IT is decentralized. In this CyberSound episode, Eric Baumgart, Director of Cybersecurity at Columbia University, shares how his team manages risk across a complex academic environment. From handling shadow IT and enclave networks to building trust across…
…
continue reading

1
Timus Networks: SASE for the Channel (EP 859)
19:13
19:13
Play later
Play later
Lists
Like
Liked
19:13Pinar Ormeci shares how Timus Networks is empowering MSPs with always-on zero trust, granular firewall policies, and rich reporting. The episode covers the company’s move to Tampa, their focus on the channel, and the latest innovations in network security. Why Listen: Learn how shared gateways make SASE accessible for small clients Discover smart V…
…
continue reading
The Institute of Internal Auditors Presents: All Things Internal Audit Tech In this episode, Mike Levy and Shontelle Mixon discuss the growing risks tied to fourth-party relationships. They discuss how internal auditors can leverage technology, enhanced contracts, and cross-functional collaboration to pinpoint, track, and reduce those downstream ri…
…
continue reading

1
Episode 453. Security Operations Center (SOC) Analyst, Cybersecurity jobs
8:24
8:24
Play later
Play later
Lists
Like
Liked
8:24Episode 453. Security Operations Center (SOC) Analyst, Cybersecurity jobs
…
continue reading

1
EP 151: Trust, But Verify: How HITRUST is Reshaping Assurance
45:29
45:29
Play later
Play later
Lists
Like
Liked
45:29In this episode of the Virtual CISO Podcast, host John Verry and guest Chris Schaeffer discuss the HITRUST framework, its evolution, and its significance in the cybersecurity landscape. They delve into the Common Security Framework (CSF), the different assessment models (E1, I1, R2), and how HITRUST compares to other frameworks like SOC 2 and ISO 2…
…
continue reading
Marcus Fontoura (CTO of Microsoft's Azure Core) discusses why AI may not reduce dev team sizes but instead raises quality expectations, just like spell check did for writing.By Extra Something Media
…
continue reading

1
Ep. 13 The Cybersecurity Degree Dilemma: Do You Really Need One?
57:02
57:02
Play later
Play later
Lists
Like
Liked
57:02In this episode of Lost in Cyberia, hosts Annie-Mei and Anika explore the question of whether you need a cybersecurity degree to work in the field. With varied personal experiences, they provide insights into the current job market, entry-level challenges, and the importance of hands-on skills versus formal education. They discuss alternative pathw…
…
continue reading
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss the latest cybersecurity news, focusing on the FBI's warning about two-factor authentication bypass attacks by a group called Scattered Spider. They explore the tactics used by this group, the implications for cybersecurity, a…
…
continue reading
In this episode, host Mike Neal breaks down practical, no-nonsense cybersecurity habits that anyone—whether in public service, education, or the private sector—can adopt to protect their organization. From avoiding phishing traps to securing both digital and physical spaces, this episode delivers essential guidance in a clear, relatable format. Lea…
…
continue reading

1
MSP Owners Group: The New M&A Model (EP 858)
15:26
15:26
Play later
Play later
Lists
Like
Liked
15:26How do you keep your MSP thriving after selling? The answer lies in the community-driven vision of the MSP Owners Group. Juan Fernandez shares why this model is so different from traditional private equity buyouts—focusing on leaders who want to stay, grow, and mentor the next generation. Discover why Prodigy Techs and Cool Technology are among the…
…
continue reading
Peter from TruGrid joins Uncle Marv to tackle the myths and realities of RDP security. Peter explains why RDP isn’t the problem—it’s how it’s protected. He shares how TruGrid’s innovative architecture, built on SASE and Zero Trust, is making remote access safer and easier for MSPs, especially in the age of BYOD and cloud adoption. Why Listen: Bust …
…
continue reading

1
The Dragon's AI Engine: Infrastructure, Ambition, and Influence
20:56
20:56
Play later
Play later
Lists
Like
Liked
20:56This podcast uncovers China's state-driven campaign to dominate global artificial intelligence, revealing a sweeping national buildout of AI data centers and a strategic fusion of commercial capacity with geopolitical intent. We explore how the People's Republic of China's (PRC) rapid infrastructure expansion, including over 250 AI data centers and…
…
continue reading

1
CCT 258: Data Classification and Protection in the CISSP Exam (Domain 2.1.1)
38:38
38:38
Play later
Play later
Lists
Like
Liked
38:38Send us a text Effective data classification isn't just about regulatory compliance—it's the foundation of your entire security program. Whether you're preparing for the CISSP exam or leading security initiatives at your organization, understanding how to identify, categorize, and protect sensitive information is critical to your success. This epis…
…
continue reading

1
Code Red: How AI Can Stop Nuclear Proliferation
14:13
14:13
Play later
Play later
Lists
Like
Liked
14:13Send us a text In this episode, we’re discussing a high-stakes frontier where artificial intelligence meets global security. In recent years, AI has become a silent sentinel in monitoring Iran’s nuclear ambitions, analyzing satellite imagery to detect covert facility expansions, parsing open-source intelligence for subtle linguistic cues, and enhan…
…
continue reading

1
E43 - Are AI Jobs the FUTURE of Work or a Threat to Human Employment?
46:39
46:39
Play later
Play later
Lists
Like
Liked
46:39AI's Impact on Jobs & Cybersecurity: Off The Wire Podcast Special Edition In this special edition of Off The Wire, IT executives Tanner and Anthony dive deep into a discussion on the impact of artificial intelligence (AI) on the job market and cybersecurity. With 35 years of combined experience, they share personal insights, debate differing viewpo…
…
continue reading

1
Military Secrets Leaked On A Gaming Forum?
1:11:26
1:11:26
Play later
Play later
Lists
Like
Liked
1:11:26This week on The Awareness Angle, Anthony Davis and Luke Pettigrew break down the biggest cyber stories, from smishing attacks in car parks to leaked US military secrets on gaming forums. It’s all about what slipped through the cracks, and what to watch for next. 🛡️ Mass Claims & M&S Breach – Legal firms swarm the M&S data breach. Who really benefi…
…
continue reading

1
Cybersecurity Talent Shortage: Myth, Mismatch, or Reality?
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02Is there really a cybersecurity talent shortage, or are we just looking in all the wrong places? This week on the Shared Security Podcast, we tackle the buzz around the so-called cybersecurity skills gap. Host Tom Eston welcomes Katie Soper, Senior Consultant at Avetix Cyber and co-founder of the CyberVault Podcast, to discuss the challenges and mi…
…
continue reading

1
Cybersecurity Talent Shortage: Myth, Mismatch, or Reality?
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02Is there really a cybersecurity talent shortage, or are we just looking in all the wrong places? This week on the Shared Security Podcast, we tackle the buzz around the so-called cybersecurity skills gap. Host Tom Eston welcomes Katie Soper, Senior Consultant at Avetix Cyber and co-founder of the CyberVault Podcast, to discuss the challenges and mi…
…
continue reading

1
Cyber Shield: Navigating NIS2 with ENISA
1:24:00
1:24:00
Play later
Play later
Lists
Like
Liked
1:24:00This podcast is your essential guide to building a robust cybersecurity risk management strategy for network and information systems across Europe, as mandated by the NIS2 Directive. We delve into ENISA's Technical Implementation Guidance, breaking down its core components, such as risk management frameworks, incident handling, and supply chain sec…
…
continue reading

1
Shield Your Business: 5 Practical Steps to Prevent EEOC Claims
5:54
5:54
Play later
Play later
Lists
Like
Liked
5:54Send us a text Avoid costly legal battles and protect your team with 5 practical, proactive steps every employer should know. From training to trust-building, these strategies help you foster a workplace where people thrive, not file claims. #HRBestPractices #EEOCCompliance #WorkplaceCulture #EmployerTips #BusinessLeadership Support the show Resour…
…
continue reading

1
CISO Under Fire: Navigating Personal Liability in the Cyber Age
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25The evolving landscape of cybersecurity now places Chief Information Security Officers (CISOs) at significant personal legal risk, evidenced by landmark cases such as Uber's Joe Sullivan conviction for covering up a data breach and the SEC's charges against SolarWinds' CISO Tim Brown for misrepresenting security practices. This heightened accountab…
…
continue reading
In this episode of 'The Other Side of the Firewall' podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a variety of topics ranging from personal updates and reflections on aging, to cultural sensitivity in media, and reviews of recent films like 'Ballerina' and '28 Years Later'. They also touch on the impact of AI in film, the legacy of act…
…
continue reading

1
The 5 Paradigm Shifts of Exposure Management
34:58
34:58
Play later
Play later
Lists
Like
Liked
34:58Exposure management is fundamentally changing the way we view cybersecurity. Ivanti's Chris Goettl and Robert Waters introduce five paradigm shifts brought on by this emerging technology and how your organization's security strategy might shift as a result. For more, check out our Exposure Management Strategy Guide: (https://ivanti.com/resources/ex…
…
continue reading
Live from PAX 8 Beyond, Uncle Marv chats with Leonard from Rythmz, the MSP-first company bringing portable internet to events and emergencies. Their rugged Pelican cases house bonded SIM cards for unlimited, high-priority data, perfect for powering small chamber events or a 100,000-person concert. Leonard shares how MSPs are cashing in by charging …
…
continue reading

1
Voices of Deception: Navigating the Deepfake Era
16:37
16:37
Play later
Play later
Lists
Like
Liked
16:37Deepfake attacks are transforming the cybersecurity landscape by exploiting fundamental human vulnerabilities, creating hyper-realistic, AI-generated audio and video that mimics real individuals, making it increasingly difficult to distinguish between authentic and fabricated content. In the corporate realm, these sophisticated threats enable imper…
…
continue reading

1
From Hustle to Harmony: Rewiring Your Money Mindset with Audrey Faust
33:47
33:47
Play later
Play later
Lists
Like
Liked
33:47Send us a text Are you tired of stressing over your finances? In this powerful conversation, CFO Audrey Faust shares how to transform your money mindset, overcome limiting beliefs, and take control of your business finances with confidence. #MoneyMindset #WomenInBusiness #FinancialEmpowerment #EntrepreneurTips #BizHelpForYou Support the show Resour…
…
continue reading

1
Controlling the Uncontrollable in IT (EP 855)
31:54
31:54
Play later
Play later
Lists
Like
Liked
31:54Live from Pax8 Beyond, Uncle Marv catches up with Brian Weiss, the Tech Stoic, who’s revolutionizing IT with Stoic philosophy. Running iTech Solutions, Brian focuses on people, process, and technology—helping clients navigate outages with practical solutions like backup internet or power redundancies. His Stoic mindset keeps his team grounded, emph…
…
continue reading

1
The CROWN Act: What It Means, How It Helps
24:52
24:52
Play later
Play later
Lists
Like
Liked
24:52Join MI State Treasurer Rachael Eubanks and her guests, Ashley Kuykendoll and State Senator Sarah Anthony, for a special edition of the podcast to acknowledge the second anniversary of the “Creating a Respectful and Open World for Natural Hair” (CROWN) Act legislation. The CROWN Act expanded the state’s Elliott-Larsen Civil Rights Act and banned ra…
…
continue reading

1
Zensai: Training Made Simple for MSPs (EP 854)
16:51
16:51
Play later
Play later
Lists
Like
Liked
16:51Uncle Marv welcomes Kathleen Lord, Chief Revenue Officer at Zensai, to the show live from Pax8 Beyond in Denver. They dive into why compliance is broken and how MSPs can bridge the gap between technology implementation and user adoption. Kathleen explains how Zensai’s learning management system, built natively into Microsoft Teams, makes training s…
…
continue reading

1
Multi-Cloud Fortress: Securing Your Distributed Digital Frontier
21:09
21:09
Play later
Play later
Lists
Like
Liked
21:09Multi-cloud environments offer immense flexibility but introduce complex security challenges, from fragmented identities and inconsistent policies to critical visibility gaps across diverse platforms. This podcast delves into the most impactful practices, including unified identity and access management, advanced AI-driven automation, and centraliz…
…
continue reading

1
CCT 257: Practice CISSP Questions - Understanding, Adhering To, and Promoting Professional Ethics (Domain 1.1)
37:14
37:14
Play later
Play later
Lists
Like
Liked
37:14Send us a text Check us out at: https://www.cisspcybertraining.com/ Ethical dilemmas lurk around every corner in cybersecurity, ready to challenge even the most technically competent professionals. Sean Gerber tackles these moral minefields head-on in this thought-provoking episode focused on CISSP Domain 1.1, presenting fifteen real-world ethical …
…
continue reading

1
S3 EP 04 Cybersecurity & Compliance for Auto Dealers: A Conversation with ComplyAuto
35:23
35:23
Play later
Play later
Lists
Like
Liked
35:23Built for dealerships. Backed by experts. IT and Cybersecurity for Car Dealers https://www.onestepsecureit.com/beyond-cyber-contact#beyond-cyber-contact-form In this episode, Scott Kreisberg sits down with Nick Moyes, Regulatory Compliance Manager at ComplyAuto, for a must-hear conversation on what auto dealerships need to know now about data priva…
…
continue reading

1
How to Know You’re Not Charging Enough (EP 853)
47:32
47:32
Play later
Play later
Lists
Like
Liked
47:32Ever wondered what it’s like to face a client who suddenly wants to pay less—while secretly discovering they’ve already shopped around and found your rates are actually half the competition? Uncle Marv shares a jaw-dropping story about pricing, client loyalty, and the emotional rollercoaster of running an IT business. Should you run DHCP on a serve…
…
continue reading
Ever wonder why some MSPs struggle with Macs while others thrive? Justin Esgar, founder of an Apple-focused MSP and host of All Things MSP, pulls back the curtain on what it really takes to manage Macs at scale. From hilarious conference stories to the secrets of Mac deployment and security, this episode is packed with actionable insights for MSPs …
…
continue reading
🔐 New SOC Brief Episode: Tracing the Breadcrumbs Cybercriminals always leave a trail, if you know where to look. In this episode, we break down Indicators of Compromise (IOCs) and how they help security teams detect and respond to threats faster. 🎯 What we cover: • Real-world incident reports & proof of concept examples • Threat actor aliases & ran…
…
continue reading
In this episode of The Other Side of the Firewall podcast, Ryan Williams Sr. and Shannon Tynes discuss the rising threat of cyberattacks on retail, particularly in the UK, and how these incidents are affecting supply chains and consumer access to essential goods. They explore the implications of these attacks for businesses, the potential for incre…
…
continue reading

1
The CISO Crucible: Navigating Cyber's New Frontier
17:05
17:05
Play later
Play later
Lists
Like
Liked
17:05Today's cybersecurity leaders face immense pressure from a persistent talent shortage, escalating cyber threats, and dynamic economic and regulatory landscapes. Their roles are rapidly evolving from purely technical oversight to strategic business risk management, encompassing areas like AI strategy and comprehensive talent development. This podcas…
…
continue reading