A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Cybersecurity Tips Podcasts
Welcome to Ciphered Reality – your trusted source for cybersecurity tips, tricks, and guidance. Powered by RITC Cybersecurity, this podcast is tailored for individuals and businesses looking to secure their digital assets in an increasingly connected world. We break down complex cybersecurity topics into simple, actionable insights to help you safeguard your data, identity, and online presence. Whether you’re a tech-savvy user or just getting started, Cybphered Reality helps you stay informe ...
…
continue reading
You already know the monthly OUCH! Newsletter brings you the latest cybersecurity tips—but now, we’re taking it even further. Tune in to the new OUCH! Podcast, where we go deeper on cybersecurity topics and give you extra insights to stay ahead of the threats.
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
In this episode, Tyler and Bob break down cybersecurity in a fun, human way—no tech jargon overload, just real tips and tricks to keep your business safe. From password tricks and phishing scams to the importance of backups and cloud security, they share easy-to-follow advice with plenty of humour and relatable insights. If you’ve ever ignored an update or used ”password123,” this one’s for you. Tune in, laugh a little, and learn how to become a cybersecurity rockstar!
…
continue reading
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Welcome to the Passwork Cybersecurity Webinars — a space for insightful conversations on digital security and the latest trends in the world of cybersecurity. Each episode, we bring together industry experts, thought leaders, and practitioners to share real-world stories, practical tips, and deep dives into the challenges and innovations shaping our digital lives. Join us as we unravel the complexities of cybersecurity and empower you to protect what matters most.
…
continue reading
Cybersecurity, Startups & Artificial Intelligence... but fun. Welcome to a place where hacking meets humor, AI meets absurdity, and your online safety might just be saved by a bad meme. We live in a world where your fridge can spy on you, your toaster has a firmware update, and a Nigerian prince still wants your money – but now through ChatGPT. It’s wild out there. This podcast arms you with the knowledge to survive and thrive in today’s tech jungle. You’ll get practical tips, real-world sto ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
SipCyber: Where Great Coffee Meets Essential Cybersecurity What happens when a former special education teacher turned Minnesota State Cybersecurity Coordinator sits down with a perfect cup of coffee? You get cybersecurity advice that's actually approachable. Jen Lotze from IT Audit Labs brings you SipCyber — the podcast that pairs cozy coffee shop discoveries with decaffeinated cybersecurity tips. No jargon. No fear-mongering. Just practical ways to protect yourself, your family, and your o ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
A weekly podcast with cybersecurity and physical security tips for the logistics community and security professionals. Hosted by a retired FBI Special Agent and former UK Intelligence Community member. Give a listen, tell a friend.
…
continue reading
Welcome to Treasury Talk, a podcast for Michigan taxpayers hosted by State Treasurer, Rachael Eubanks. Our trending topics with Subject Matter Experts will include cybersecurity, tax prep tips, education savings plans, the budget and our economy, and leadership best practices. Listen for take-aways that will support you, your family and your business!
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
This podcast is for lawyers who want more freedom, flexibility, and control over their practice. Ernie focuses on the 20% of tools and strategies—especially AI—that deliver 80% of the results. No buzzwords. No hype. Just clear, practical insights on using AI, automation, outsourcing, marketing, cybersecurity, and smart systems to reduce friction, streamline workflows, and run your practice your way—from anywhere.
…
continue reading
The PBD Podcast, hosted by Patrick Bet-David, delivers engaging conversations on business, entrepreneurship, current events, politics, and sports. Live every Monday, Wednesday, and Friday at 9:00 AM EST with the Home Team and special guests, the show brings real-time reactions and dynamic discussions from the VAULT inside Valuetainment’s Fort Lauderdale studio. Every Tuesday and Thursday at 9:00 AM EST, tune in for exclusive interviews with top entrepreneurs, leaders, and newsmakers from aro ...
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Security certificates are a great way to show you know your stuff, but now what? You want to get into the field, and it seems impossible at times to even get to the prescreening phase of an interview when you've never had a security role you're chasing. In this podcast, local professionals in the industry spill all to the tips and shortcuts they've used in securing their roles. https://isc2la.org/joinus The ISC2 Los Angeles chapter wants to see you succeed as the security professional you we ...
…
continue reading

1
KeyStone’s Stock Talk – Canadian & US Small-Cap Growth & Dividend Stocks, Tips & Portfolio Building Strategies
Stock Talk Podcast by KeyStone Financial
Hosted by Ryan Irvine & Aaron Dunn, the podcast is highly interactive taking listener questions each week on individual Canadian & U.S. stocks as well as stock portfolio building strategies. The podcast focuses on high quality Canadian Dividend growth stocks, unknown & profitable Canadian Small-Cap stocks, U.S. tech leaders and high growth small-cap stocks. We also provide simple portfolio building tips for DIY investors. Weekly show highlights include: - Case For & Against Any Stock: our Ry ...
…
continue reading
Techtonic is the podcast that's all about groundbreaking progress in your tech job search. Whether you're a tech professional on the hunt for your next big opportunity or a team leader looking for expert insights on navigating the tech hiring market, this is the place for you. Every episode, we bring you real stories, struggles, resume hacks, professional branding, and success tips directly from those in the trenches and top hiring managers.
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Cybersecurity career, technology, and success tips.
…
continue reading
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
…
continue reading
This is your guide to navigating the ever-evolving world of cybersecurity. Hosted by Annie-Mei Forster and Anika Guenov, this podcast breaks down complex topics into relatable, easy-to-understand conversations. Whether you're a tech enthusiast, a curious newcomer, or a professional looking for fresh perspectives, join us as we explore cyber threats, digital safety tips, and the human stories behind the screen. Follow us on Instagram @thecybersecuritygals
…
continue reading
Transform your business with AI in just 91 days! Join me each week for real-world AI strategies that deliver immediate results. Every episode includes: Transformation Stories: Learn from business leaders who've successfully used AI tools like ChatGPT, Claude, and MidJourney. Actionable Tips: Step-by-step guidance to save time, boost profits, and add value to your business. Expert Insights: Hear from AI pioneers and industry leaders sharing their experiences and solutions. No theory—just prac ...
…
continue reading
"The Digital Revolution with Jim Kunkle", is an engaging podcast that delves into the dynamic world of digital transformation. Hosted by Jim Kunkle, this show explores how businesses, industries, and individuals are navigating the ever evolving landscape of technology. On this series, Jim covers: Strategies for Digital Transformation: Learn practical approaches to adopting digital technologies, optimizing processes, and staying competitive. Real-Life Case Studies: Dive into inspiring success ...
…
continue reading
This is the podcast to discuss how to Get a Job in Tech, interview stories and advice. always awesome Get a Job in Tech Interview and job search strategies that work https://getajobinit.teachable.com/ https://garymcneelyit.com/ https://x.com/garymcneelyIT Interview and job search strategies that work Book by Gary McNeely Link: http://a.co/fxrPYIH
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
Cyber Snacks, by Buckingham, is a podcast dedicated to providing useful data privacy and cybersecurity tips in bite-sized pieces. The goal is to keep each episode short, simple, actionable, and reasonable.
…
continue reading
Welcome to Culturally Sound, the podcast that explores the dynamic intersection of culture, leadership, and communication in today’s diverse and interconnected world. Hosted by Chandler Cutler, this show dives deep into the challenges and opportunities leaders face to create an inviting, creative, and rewarding working environment. Each episode brings you insightful conversations with thought leaders, industry experts, and changemakers who share actionable strategies for building inclusive t ...
…
continue reading
Listen to cybersecurity and technology topics from industry experts. Don't worry; we'll keep it fun and light.
…
continue reading

1
LLVM Techniques, Tips, and Best Practices Clang and Middle-End Libraries: Design powerful and reliable compilers using the latest libraries
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57A comprehensive guide to the LLVM compiler infrastructure. It covers various aspects of LLVM, including its build system, testing utilities like LIT, and the domain-specific language TableGen. The text explores frontend development with Clang, explaining its architecture, preprocessing, Abstract Syntax Tree (AST) handling, and custom toolchain crea…
…
continue reading

1
🌐 Cybersecurity Unmasked 🌐 EP 25: TELUS's $70 Billion Investment: Opportunities and Challenges
14:54
14:54
Play later
Play later
Lists
Like
Liked
14:54Telus just announced a massive $70 billion investment in Canada's digital infrastructure over the next few years. In this episode of Cybersecurity Unmasked, we unpack what this means for small and medium-sized businesses—the opportunities are huge, but so are the cybersecurity risks. This infrastructure boom promises faster fiber networks, rural co…
…
continue reading

1
Teamsters Union President Targets Amazon - Sean O’Brien | PBD Podcast | 665
1:24:19
1:24:19
Play later
Play later
Lists
Like
Liked
1:24:19Patrick Bet-David sits down with Teamsters President Sean O’Brien in a fiery conversation about unions, capitalism, and the future of American workers. They debate corporate greed, 1099 jobs, small business realities, and Sean’s shocking take on Amazon, Uber, and Karl Marx. Plus, the viral Senate fight, Trump call, and RNC speech that made headline…
…
continue reading
A comprehensive guide to the security architecture of mobile telecommunications systems, particularly focusing on Long Term Evolution (LTE). It details the evolution of cellular security from analogue systems to 2G (GSM), 3G (UMTS), and the Evolved Packet System (EPS), highlighting common vulnerabilities and subsequent design improvements. The text…
…
continue reading
In this Week's Show: TECSYS Inc. (TCS:TSX): Great Business, Bad Timing? Waste Connections (WCN:TSX) vs. Waste Management (WM:NYSE): Which Waste Stock Is Worth Holding?By Stock Talk Podcast by KeyStone Financial
…
continue reading

1
The Trust Hack That Sells Without Selling | 91 Day AI Transformation Podcast
34:26
34:26
Play later
Play later
Lists
Like
Liked
34:26Jonathan Mast talks with Mariana Henninger from BrandMagnetic about the power of genuine human connection in business and how to build trust with your audience long before you ever make an offer.Topics covered:• Why connection matters more than conversion in today’s market• How to communicate as a human, not a salesperson• The one simple technique …
…
continue reading

1
Trump Nobel SHOCKER, Katie Porter's Campaign Disaster, Letitia James INDICTED & Gaza Ceasefire | PBD Podcast | Ep. 644
2:08:36
2:08:36
Play later
Play later
Lists
Like
Liked
2:08:36Patrick Bet-David, Tom Ellsworth, Vincent Oshana, and Adam Sosnick break down the shocking outcome of Trump’s Nobel Peace Prize bid, Katie Porter’s campaign implosion, Letitia James’ indictment, and the global reaction to the Gaza ceasefire. ------ 📺 PBD'S INTERVIEW WITH TEAMSTERS PRESIDENT SEAN O'BRIEN - LIVE ON SATURDAY, 10/11 @ 9AM ET: https://b…
…
continue reading

1
Stop Copying CIS! How to Build Baselines That Actually Work
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14👉 Click here for expert Intune implementation: Threatscape's Intune Implementation Service 🎬 This is the season finale of Threatscast Season 3. We’ll be back next year with more guests and more cybersecurity topics.Security wants control. Users want flexibility. That tension breaks most Intune baseline projects.In this final episode of the season, …
…
continue reading

1
LTE Cellular Narrowband Internet of Things (NB-IoT): Practical Projects for the Cloud and Data Visualization
17:13
17:13
Play later
Play later
Lists
Like
Liked
17:13A practical guide to Narrowband Internet of Things (NB-IoT), detailing its underlying cellular communication technologies like 4G and 5G LTE, and its applications in Machine Type Communication (MTC). The text covers Arduino-based projects for developers, showcasing the use of an NB-IoT hardware board with a microcontroller (MCU) and Quectel BG96 mo…
…
continue reading

1
NSITSP Spotlight: Diana Giles, Skyline IT (EP 911)
23:42
23:42
Play later
Play later
Lists
Like
Liked
23:42This episode explores why professionalism, certification, and ethics matter more than ever in the IT sector. Diana Giles talks about her rise as a recognized industry leader, the transition from side hustle to full-time business, and the benefits of clear communication for IT consultants. Hear insights from Diana’s teaching career and community inv…
…
continue reading
We explore the unsettling intersection between technology and emotion. When machines begin to understand, and imitate, human empathy. What happens to our sense of trust, vulnerability, and authenticity moving forward? Discover how artificial intelligence is learning to recognize distress, comfort users, and even mirror emotion, and why that should …
…
continue reading

1
The Secret Life of a Growth Manager in Cybersecurity
56:47
56:47
Play later
Play later
Lists
Like
Liked
56:47Overview In this episode of Culturally Sound, Chandler Cutler sits down with Allan Richards, Growth Manager at EasyDMARC, to unpack the real-world challenges of email authentication, MSP enablement, and protecting digital trust in a rapidly evolving cybersecurity landscape. Allan’s career spans nearly two decades in cybersecurity channel sales, fro…
…
continue reading

1
Zero Trust Framework | Latest Cybersecurity News: The Ciphered Reality Podcast by RITC Cybersecurity
47:43
47:43
Play later
Play later
Lists
Like
Liked
47:43New Episode Alert! Dive into the latest episode of The Ciphered Reality Podcast by RITC Cybersecurity, where your favorite hosts Mike & Mari break down why adopting a Zero Trust framework is essential to cutting down security incidents across your enterprise. Stick around till the end as Mike & Mari unpack the hottest stories in Cybersecurity News,…
…
continue reading

1
History of Big Pharma & OxyContin | Gerald Posner | PBD Podcast | 663
2:07:06
2:07:06
Play later
Play later
Lists
Like
Liked
2:07:06Patrick Bet-David sits down with investigative journalist Gerald Posner to expose how the government protected Big Pharma during the OxyContin crisis, the FDA’s cover-ups, and the Vatican’s hidden financial dealings. ——— Ⓜ️ CONNECT ON MINNECT WITH GERALD POSNER: http://bit.ly/3WsdS8P Ⓜ️ PBD PODCAST CIRCLES: https://bit.ly/4mAWQAP 🍋 ZEST IT FORWARD:…
…
continue reading

1
Patch or Perish: Navigating the Windows 10 EOL Minefield
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12The impending end-of-life (EOL) for operating systems like Windows 10 creates an immediate and permanent security vulnerability, essentially transforming these unpatched systems into prime targets for sophisticated cyber threats and ransomware attacks. This failure to maintain supported software leads to massive financial liabilities, including pot…
…
continue reading

1
CCT 287: Practice CISSP Questions - Deep Dive (Domain 5)
23:08
23:08
Play later
Play later
Lists
Like
Liked
23:08Send us a text Leadership churn is reshaping security from the top down. We open the door on why CISO tenures are shrinking to 18–26 months and what that says about pressure, culture, compensation, and board-level risk literacy. From startups that stretch leaders thin to enterprises that treat security as a cost center until the breach, we map the …
…
continue reading
This episode opens with a bombshell: Synology finally reversed its drive compatibility policy for NAS units, allowing IT pros and businesses to use third-party drives again—a move that’s sent shockwaves through online forums and social media. I discuss the implications for MSPs and what it means for client storage setups. Next, DattoCon coverage re…
…
continue reading

1
When Ransomware Turns Deadly: Breaking Cyber Crime News and Essential Security Tips for Businesses
27:58
27:58
Play later
Play later
Lists
Like
Liked
27:58Cyber Flash Point on the following topics: how ransomware kills in real life and latest cyber crime news, Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show 🔥New Special Offers! 🔥 Remove Your Private Data Online …
…
continue reading

1
NYSE's Polymarket Bet, Gold & Bitcoin Skyrocket, Candace Owens Texts & Wall Street Woos Trump | PBD Podcast | Ep. 662
2:07:14
2:07:14
Play later
Play later
Lists
Like
Liked
2:07:14Patrick Bet-David, Eric Bolling, Tom Ellsworth, and Brandon Aceto break down the NYSE’s $2 billion Polymarket investment, gold and Bitcoin’s explosive rally, Bari Weiss’s groundbreaking CBS News deal, and how Fannie Mae, Freddie Mac, and Wall Street are all working to court Trump. ------- Ⓜ️ PBD ENTREPRENEUR CIRCLES: https://bit.ly/46U4DTM 👕 THE VT…
…
continue reading

1
The PSYOP Industrial Complex: Hacking Human Trust in the Fifth Generation War
43:26
43:26
Play later
Play later
Lists
Like
Liked
43:26Modern conflict, often characterized as Fifth Generation Warfare (5GW), targets the consciousness and subconsciousness of civil populations through invisible, non-attributable cyber and informational attacks. We explore the looming "PSYOP industrial complex," which fuses military psychological operations techniques with hyper-personalized digital m…
…
continue reading

1
Every Government Shutdown is a National Cybersecurity Risk
55:53
55:53
Play later
Play later
Lists
Like
Liked
55:53In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams and Shannon Tynes discuss the latest cybersecurity news, including the implications of the government shutdown on cybersecurity operations, emerging threats like Comet Jacking, and China's severe penalties for cybercriminals. They also share personal updates and reflecti…
…
continue reading

1
Don't Get Hooked: Recognize Phishing Scams in Seconds
2:39
2:39
Play later
Play later
Lists
Like
Liked
2:39What if that urgent email from "Amazon" isn't from Amazon at all? Before you click that link, you need to know what to look for—because phishing scams have gotten scary good, and they're counting on you to act fast without thinking twice. In this episode of SipCyber, host Jen Lotze visits Waystone Coffee in River Falls, WI, to share a simple but po…
…
continue reading

1
Sora 2 Launches Realistic Video Generation
10:08
10:08
Play later
Play later
Lists
Like
Liked
10:08Send us a text Imagine a world where artificial intelligence doesn’t just generate video, it simulates reality. Not in abstract brushstrokes or pixelated guesses, but with the precision of physics, the nuance of motion, and the emotional depth of cinematic storytelling. That’s the promise of Sora 2, OpenAI’s latest leap into video generation. This …
…
continue reading
By CyberSecurity Summary
…
continue reading

1
#86: Are You Drowning In Account Sprawl, And Don’t Know It?
23:16
23:16
Play later
Play later
Lists
Like
Liked
23:16Are you sure every login in your company is legit? Cybersecurity leader Matt Topper exposes the hidden chaos of account sprawl—where forgotten logins and shadow SaaS tools quietly drain budgets and open doors for hackers. Learn how simple, free steps can tighten security and save thousands.By Extra Something Media
…
continue reading

1
Preparing for the Quantum Era: Why Blockchain is Leading the Charge | James Stephens
46:19
46:19
Play later
Play later
Lists
Like
Liked
46:19By Justin Beals
…
continue reading

1
AI, CaaS, and Cronos: Inside the Industrialization of Cybercrime in 2024
11:02
11:02
Play later
Play later
Lists
Like
Liked
11:02By CISO Marketplace
…
continue reading

1
Don’t Worry, We’ll Get to Solving Your Problem on Slide 87
36:41
36:41
Play later
Play later
Lists
Like
Liked
36:41
…
continue reading
By CyberSecurity Summary
…
continue reading

1
The DeepSeek AI Paradox: Security Catastrophe, CCP Censorship, and the High Cost of 'Cheap' Models
16:21
16:21
Play later
Play later
Lists
Like
Liked
16:21By CISO Marketplace
…
continue reading
By Mateusz Chrobok
…
continue reading

1
Israel & Hamas Meeting, Epstein's Blackmail Network CONFIRMED & Diddy Locked Up | PBD Podcast | Ep. 661
2:27:19
2:27:19
Play later
Play later
Lists
Like
Liked
2:27:19Patrick Bet-David, Tom Ellsworth, Vincent Oshana, and Adam Sosnick break down Hamas and Israel’s secret peace meeting, new evidence confirming Jeffrey Epstein’s global blackmail network, and Diddy officially being locked up. ------ 👕 VT ALLEGEDLY COLLECTION: https://bit.ly/3KzXIaV Ⓜ️ PBD PODCAST CIRCLES COMMUNITY: https://bit.ly/4mAWQAP 🥃 BOA…
…
continue reading

1
Identity and Brand Protection. Things We NEED to Know.
47:36
47:36
Play later
Play later
Lists
Like
Liked
47:36By Cyber Crime Junkies-David Mauro
…
continue reading

1
CCT 286: Access Controls - Role Based, Rule Based and Many More Controls (Domain 5.4)
40:20
40:20
Play later
Play later
Lists
Like
Liked
40:20Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A headline‑grabbing data leak is the wake‑up call; what you do next is th…
…
continue reading

1
Brit Card or Big Brother? UK’s Digital ID Mandate
16:27
16:27
Play later
Play later
Lists
Like
Liked
16:27Send us a text Welcome back to The Digital Revolution, I’m Jim Kunkle, and welcome to the rise of the digital ID. A digital ID offers individuals a streamlined, secure way to verify their identity across a growing number of digital platforms and services. In an era where nearly every aspect of life, from banking and healthcare to employment and tra…
…
continue reading

1
Java Professional Interview Guide: Learn About Java Interview Questions and Practise Answering About Concurrency, JDBC, Exception Handling
28:21
28:21
Play later
Play later
Lists
Like
Liked
28:21Serves as a comprehensive interview guide for Java professionals, covering a wide array of topics essential for technical interviews. It begins by outlining non-technical aspects of job searching, such as recruitment processes, interview types (telephonic, technical, personal), and strategies for success, including resume preparation and soft skill…
…
continue reading

1
Why Are Ransomware Victims Paying Millions But Still Losing Data?
55:23
55:23
Play later
Play later
Lists
Like
Liked
55:23This week on The Awareness Angle, Anthony Davis and Luke Pettigrew dig into a packed line-up of stories that show just how wide the cyber threat landscape has become—from luxury retailers and carmakers taken offline, to insider risks, ransom trends, and the latest fights between governments and Big Tech. It’s not just about breaches and numbers; it…
…
continue reading
Phishing simulations have been a cornerstone of security awareness training for years. But do they actually change user behavior, or are they just creating frustration and fatigue? In this episode, Tom Eston and Scott Wright (CEO of ClickArmor) debate whether simulated phishing attacks are still valuable in 2025. We cover the benefits, challenges, …
…
continue reading

1
Are Phishing Simulations Still Worth It in 2025?
26:51
26:51
Play later
Play later
Lists
Like
Liked
26:51Phishing simulations have been a cornerstone of security awareness training for years. But do they actually change user behavior, or are they just creating frustration and fatigue? In this episode, Tom Eston and Scott Wright (CEO of ClickArmor) debate whether simulated phishing attacks are still valuable in 2025. We cover the benefits, challenges, …
…
continue reading
Hear from Bradley Gross, one of the tech industry’s top attorneys and founder of Bradley Gross, PA. With over 20 years representing MSPs, Brad shares what every IT pro must know as lawsuits skyrocket around ransomware events. The conversation covers the specifics of contract language, rising legal standards, and how vendor agreements now shape your…
…
continue reading

1
Personal Pest Control: Cybersecurity Awareness Month
23:25
23:25
Play later
Play later
Lists
Like
Liked
23:25October is Cybersecurity Awareness Month, and it's time to clean house! Let's get rid of all those dust bunnies (weak passwords) and vacuum under the sofa cushions (no multi-factor authentication) and even do a check under the bed for that half-eaten Pop Tart (vulnerable emails). Hear about a few instances where poor cybersecurity led to unfortunat…
…
continue reading

1
The Cybersecurity and Privacy Divide: CISO vs. DPO in the Age of GDPR
16:31
16:31
Play later
Play later
Lists
Like
Liked
16:31We break down the crucial differences between the Chief Information Security Officer (CISO), who is responsible for protecting information assets against cyber threats, and the Data Protection Officer (DPO), whose primary focus is ensuring compliance with privacy laws and regulations. The roles face an inherent conflict of interest because the DPO …
…
continue reading
A new episode of Darnley’s Cyber Café is here, and it’s one you won’t want to miss. We dive into a shocking story about a familiar childhood pastime that takes an unexpected twist into the world of surveillance, privacy, and hidden risks. This isn’t just about toys, it’s about what’s happening behind the curtain in our digital world, and why parent…
…
continue reading

1
ITIL 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50Serves as a comprehensive guide for IT professionals, offering both theoretical knowledge and practical application of ITIL 4 service management principles. It covers key concepts, roles, the four dimensions of service management, the Service Value System (SVS), guiding principles, governance, the service value chain, and various ITIL practices. Th…
…
continue reading

1
Stop the Attack Cycle: Play Ransomware, Phishing, and the Power of MFA
13:41
13:41
Play later
Play later
Lists
Like
Liked
13:41Ransomware groups, such as Play (also known as Playcrypt), were among the most active groups in 2024 and use advanced methods like double extortion, first exfiltrating data and then encrypting systems, often targeting critical infrastructure globally. Initial access frequently begins with human elements, as phishing remains the top entry point for …
…
continue reading