Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
  continue reading
 
Artwork

1
Cyber Leaders

SANS Institute

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
  continue reading
 
Artwork

1
Cyber Coffee Hour

Dr. Joseph J. Burt-Miller Jr. and Alfredzo Nash

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
  continue reading
 
Artwork

1
Tea & Trend

Trend Micro

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Your invitation to pull up a chair and join fellow public sector professionals for a frank, no-nonsense chat about cybersecurity. Proactive Security for the Public Sector starts here Enjoy the podcast? There’s more where that came from! Get the latest Public Sector cyber insights and resources to help you stay ahead of your cyber risk at https://bit.ly/43bPTxz
  continue reading
 
Artwork

1
InTechnology

Camille Morhardt

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Welcome to InTechnology, hosted by Camille Morhardt. In this podcast you will hear conversations with industry leaders and technical experts in cybersecurity, sustainability, and technology. Our guests will explain their approach to recognize emerging trends and to create best practices… where more and more, the health of an organization depends on embracing the interconnectedness of these three areas.
  continue reading
 
Artwork

1
Cybersecurity Where You Are (video)

Center for Internet Security

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
  continue reading
 
Artwork

1
FUTUREPROOF.

Jeremy Goldman

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Welcome to FUTUREPROOF. We're the podcast that delves into the future. From Augmented Reality to Artificial Intelligence to Smart Cities to Internet of Things to Virtual Reality, we speak with some of the sharpest minds to better help you understand what the next few years may look like.Brought to you by author Jeremy Goldman (Going Social, Getting to Like).For booking inquiries: [email protected]
  continue reading
 
Artwork
 
Tech Disruptors by Bloomberg Intelligence features conversations with thought leaders and management teams on disruptive trends. Topics covered in this series include cloud, e-commerce, cybersecurity, AI, 5G, streaming, advertising, EVs, automation, crypto, fintech, AR/VR, metaverse and Web 3.0. This podcast is intended for professional investors only. It is being prepared solely for informational purposes only and does not constitute an offer or investment advice.
  continue reading
 
Artwork

1
STEM Everyday

Chris Woods (DailySTEM)

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The STEM Everyday podcast focuses on how easy it is to incorporate STEM (Science, Technology, Engineering, Math) into education. We explore and share great ideas that inspire students to take ownership in their learning. Episodes include short (20 minute) interviews with educators, innovators, & authors who are using creative ways to add STEM to their classrooms and communities everyday!
  continue reading
 
Carol Massar and Tim Stenovec bring you reporting from the magazine that helps global leaders stay ahead, plus insight on the people, companies and trends shaping today's complex economy. Watch us LIVE on YouTube: http://bit.ly/3vTiACF.
  continue reading
 
This podcast is for people passionate about current tech topics and trends who want to learn more about how technology can lead to real business growth. Our special guests come from all industries and share their insights on business trends, the latest cybersecurity threats, and more.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
Artwork

1
The Security Podcasts

www.securitymagazine.com

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
  continue reading
 
Artwork

1
HOU.SEC.CAST.

Michael Farnum and Sam Van Ryder

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Join HOU.SEC.CON Cofounders Michael and Sam each week as they chat with conference speakers about the latest topics and trends in the cybersecurity space.
  continue reading
 
Artwork

1
ThreatCast

Threatscape

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
  continue reading
 
Artwork

1
C.S. Cyber

Shawn Waldman and Chad Robinson

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
  continue reading
 
Artwork

1
Razorwire Cyber Security

Razorthorn Security

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
  continue reading
 
Artwork

1
To The Point - Cybersecurity

Forcepoint | Global Cybersecurity Leader | Security. Simplified.

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
  continue reading
 
Security Signal uncovers the signal from the noise for cybersecurity leaders, and helps them focus on important trends, threats and opportunities. Each episode translates cybersecurity complexities into actionable intelligence for executives at the helm. Security Signal helps leaders turn resilience into a competitive advantage. Follow us @CloudflareTV Explore our content hub for exclusive C-level conversations at cloudflare.tv/executive Read the full 2025 Cloudflare Security Signals report ...
  continue reading
 
Artwork

1
Dirty South Security Podcast

VerSprite Cybersecurity

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
  continue reading
 
Artwork
 
Join the brightest SolarWinds minds and IT industry influencers, as they cut through the jargon and give you the tools you need to grow and keep your tech knowledge razor-sharp. Come with questions—leave with actionable steps and practical insights. Have ideas for future episodes or topics? Tweet us @ SolarWinds using #TechPod.
  continue reading
 
Artwork

1
Kitecast

Tim Freestone and Patrick Spencer

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
  continue reading
 
Artwork

1
Industrial Cybersecurity Insider

Industrial Cybersecurity Insider

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
Join us as we discuss news and current events, trends, and controversies in the world of cybersecurity. We have strong feelings and they're not limited to FedRAMP, CMMC, FISMA, IRAP, security engineering, or documentation. Anything goes -- some of the things we say are probably even helpful! Interested in having words? Email us at [email protected].
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Cyber Work

Infosec

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork
 
Big Ideas. Simplified. Join the OrionX team and guests in lively discussions of trends and products that can impact your investment decisions and change the technology options you consider.
  continue reading
 
Artwork

1
The New CISO

Steve Moore

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
  continue reading
 
Artwork

1
Smells Like Identity Hygiene

SPHERE - Identity Hygiene Solutions

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
  continue reading
 
Introducing The Cyber Translator, a 10-minute podcast designed for busy business leaders who want to bridge the gap between cybersecurity, technology, and business strategy. Hosted by Sean Hanna, this podcast cuts through the complexity of cyber technology, risk, and governance, translating it into practical, actionable insights that drive real business value. Each episode helps business leaders understand "technology speak" and shows them how to turn cybersecurity and compliance into opport ...
  continue reading
 
Artwork
 
Dive into the ”AI Briefing Room” for a quick update on the latest tech trends and innovations. Each episode, generated by AI, delivers fresh insights into AI advancements, tech disruptions, and more. Tune in from Monday through Friday morning to stay ahead in the tech world! For advice, reach out to us at [email protected].
  continue reading
 
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
  continue reading
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
  continue reading
 
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
  continue reading
 
Artwork
 
Tech Transformation with Evan Kirstel: A podcast exploring the latest trends and innovations in the tech industry, and how businesses can leverage them for growth, diving into the world of B2B, discussing strategies, trends, and sharing insights from industry leaders! With over three decades in telecom and IT, I've mastered the art of transforming social media into a dynamic platform for audience engagement, community building, and establishing thought leadership. My approach isn't about per ...
  continue reading
 
Sunny’s Silver Linings is a Top MSP Channel Podcast hosted by the CEO of IT By Design, Sunny Kaila. Sunny and his guests cover a wide range of MSP and Talent-based topics, including MSP services, cybersecurity, customer service, and strategies to achieve growth and success in the channel. Listen now to take your business to the next level! https://hubs.ly/Q02DrxnQ0
  continue reading
 
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
  continue reading
 
Loading …
show series
 
In this special rewind episode we highlight outside influences shaping control system integrity, the impact of AI, emerging technologies, and the dynamics of building a career in OT cybersecurity. Drawing from frontline experiences and industry events like the S4 Conference, the discussion explores the growing organizational shift toward dedicated …
  continue reading
 
SentinelOne suffers a global service outage. A major DDoS attack hits a Russian internet provider. U.S. banking groups urge the SEC to scrap cybersecurity disclosure rules. Australia mandates reporting of ransomware payments. Researchers uncover a new Browser-in-the-Middle (BitM) attack targeting Safari users. A Florida health system pays over $800…
  continue reading
 
Get ready to brew up some serious inspiration! This episode of Cyber Coffee Hour features the phenomenal Dr. Kathi Middleton a captivating speaker, author, and undisputed powerhouse in cybersecurity and IT leadership. Join us for an electrifying conversation as Dr. Middleton shares her journey from spearheading massive security initiatives at giant…
  continue reading
 
(REPLAY) This is a recording of a webinar aimed at IT professionals, system administrators, and cybersecurity professionals eager to bolster their defenses against cyber threats. In this session, "How to Harden Active Directory to Prevent Cyber Attacks," our expert speakers will discuss comprehensive strategies and best practices for securing your …
  continue reading
 
AI Finds an 0-Day!, Postman Leaking Secrets, High Agency Mental Model, My Unified Entity Context Video, Github MCP Leaks Private Repos, Google vs. OpenAI vs. Apple on AI Vision, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclusive…
  continue reading
 
MEMBER EDITION: AI Finds an 0-Day!, Postman Leaking Secrets, High Agency Mental Model, My Unified Entity Context Video, Github MCP Leaks Private Repos, Google vs. OpenAI vs. Apple on AI Vision, and more... Read this episode online: https://newsletter.danielmiessler.com/p/ul-482 Follow on X: https://x.com/danielmiessler Follow on LinkedIn: https://w…
  continue reading
 
Interested in being a guest? Email us at [email protected] Retail is in an age of perpetual reinvention. From navigating online strategies in the early 2000s to mobile adoption in the mid-2000s and now grappling with tariffs and supply chain disruptions, retailers must continuously evolve to survive and thrive. According to Dominick Miserandino…
  continue reading
 
Welcome to episode three of our water series ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/alerts/ to subscribe. ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @secdefllc for…
  continue reading
 
Costco Wholesale Corp. posted better-than-expected earnings in the third quarter, a sign that the nation’s largest club chain is flexing its scale and devoted following to navigate tariffs and other forces of economic turbulence. The retailer said it generated earnings per share of $4.28 for the quarter ended May 11, above what Wall Street analysts…
  continue reading
 
In this episode of Tea & Trend, Jonathan Lee sits down with Jill Broom, Head of Cyber Resilience at techUK, for a deep dive into the state of public sector cybersecurity and the evolving challenges shaping the UK's digital defence. Together, they explore Jill’s unique path into cyber strategy and her role at techUK, as well as the critical intersec…
  continue reading
 
In this episode, Ciaran and James are joined by Ross McKerchar, CISO at Sophos, to discuss one of the most significant – and to some, controversial – counter cyber operations ever carried out by a private company. Ross shares insights from the frontlines of the Pacific Rim campaign, as well as the shifting dynamics of the cybersecurity industry and…
  continue reading
 
Struggling to scale your MSP with the right people? You're not alone. In this powerful episode, IT By Design CEO Sunny Kaila talks with Ainsley Lump of Entech about the real HR strategies that drive growth, loyalty, and culture in today’s MSP landscape. From recruiting smarter to building magnetic culture and performance systems your team actually …
  continue reading
 
Watch Carol and Tim LIVE every day on YouTube: http://bit.ly/3vTiACF. A federal appeals court offered President Donald Trump a temporary reprieve from a ruling threatening to throw out the bulk of his sweeping tariff agenda, offering at least some hope to a White House now facing substantial new restrictions on its effort to rewrite the global trad…
  continue reading
 
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
  continue reading
 
Children’s DNA in criminal databases. ASUS routers get an unwanted houseguest. New APT41 malware uses Google Calendar for command-and-control. Interlock ransomware gang deploys new Trojan. Estonia issues arrest warrant for suspect in massive pharmacy breach. The enemy within the endpoint. New England hospitals disrupted by cyberattack. Tim Starks f…
  continue reading
 
The criminal underground is experiencing its own version of startup disruption, with massive ransomware-as-a-service operations fragmenting into smaller, more agile groups that operate like independent businesses. John Fokker, Head of Threat Intelligence at Trellix, brings unique insights from monitoring hundreds of millions of global sensors, reve…
  continue reading
 
Interested in being a guest? Email us at [email protected] Connectivity has transformed from a luxury into a necessity. But what if your venue's Wi-Fi could do more than just provide internet access? What if it could become a powerful revenue generator and customer intelligence platform? Sean Bossons, Chief Revenue Officer at Purple, reveals ho…
  continue reading
 
The future of cybersecurity is here—and it’s driven by AI. Cybercriminals aren’t waiting — they’re already using AI to launch faster, more sophisticated attacks, including adversarial AI that can bypass traditional defenses. The threat is escalating, and C-suite security leaders need to act immediately to protect their cloud-first and hybrid enviro…
  continue reading
 
Bloomberg News Chief Correspondent for Global Macro Markets Liz McCormick explains why Asian investors are rethinking their strategy of investing in US assets. The trend has been driven by concerns over the US budget deficit, political polarization, and the impact of Trump's policies on the dollar. The shift away from US assets could lead to a sign…
  continue reading
 
“Agent-to-agent interactions are very different than traditional system-to-system interactions, and so there’s a huge uplift we’re thinking about today that we need to be there to get to that truly agentic autonomous world,” says Lori Beer, chief information officer of JPMorgan Chase. In this episode of Tech Disruptors, Beer sits down with Bloomber…
  continue reading
 
In this episode of Threat Vector, host David Moulton speaks with Sam Ainscow, Group Chief Security Officer at Hill & Smith PLC. With over 20 years in cybersecurity, Sam shares his deep insights into cyber resilience, risk assessment, and incident response. He explains why a business must prepare through practical training, testing, and honest post-…
  continue reading
 
Nvidia, the world’s most valuable chipmaker, gave an upbeat revenue forecast for the current period, even as a slowdown in China weighed on results. Sales will be about $45 billion in the second fiscal quarter, which runs through July, the company said on Wednesday. That included the loss of roughly $8 billion in revenue from China because of expor…
  continue reading
 
Watch Carol and Tim LIVE every day on YouTube: http://bit.ly/3vTiACF. Nvidia Corp., the world’s most valuable chipmaker, gave an upbeat revenue forecast for the current period, even as a slowdown in China weighed on results. Sales will be about $45 billion in the second fiscal quarter, which runs through July, the company said on Wednesday. That in…
  continue reading
 
Welcome to Part 3, the final episode of our GovRAMP Mini-Series. Over the last two episodes, we’ve covered what GovRAMP is and why companies are pursuing it. Today, we’re closing things out by getting tactical—what does the GovRAMP process actually look like from start to finish? To walk us through it, we’re joined by Matt Strasburg, manager of our…
  continue reading
 
The Czech Republic accuses Chinese state-backed hackers of cyber-espionage. CISA’s leaders head for the exits. Cybercriminals are using fake AI video generator websites to spread malware. A stealthy phishing campaign delivers the Remcos RAT via DBatLoader. A fake Bitdefender website spreads malware targeting financial data. Medusa ransomware claims…
  continue reading
 
Interested in being a guest? Email us at [email protected] The frontline workforce revolution is happening right now, and Zebra Technologies is leading the charge. In this enlightening conversation with Joe White, Chief Product and Solution Officer at Zebra Technologies, we explore how decades of operational digitization are culminating in an A…
  continue reading
 
Sukhinder Singh Cassidy, Chief Executive Officer of cloud software company Xero, discusses the New Zealand-based company's outlook and its push to grow its small-business customer base in the United States. Xero is a global small business platform that helps customers supercharge their business by bringing together the most important small business…
  continue reading
 
HOU.SEC.CON.'s first keynote speaker is returning for our 15-year anniversary! This week Michael and Sam are talking to cybersecurity legend Jeremiah Grossman about his start in cyber at just 19 years old, what we can learn from cybersecurity insurance companies, and what to expect at HOU.SEC.CON. 2025! Things Mentioned: · What Works in Cybersecuri…
  continue reading
 
In episode 137 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Terry Loftus, Assistant Superintendent (Chief Information Officer) of Integrated Technology Services at the San Diego County Office of Education (SDCOE); and Netta Squires, President of Government Affairs, Cybersecurity, & Resilience at Open District Solutions…
  continue reading
 
This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
  continue reading
 
At what age should we begin focusing on STEM learning? According to Jeremy Anderson, the data overwhelmingly shows that students are already forming interest and thoughts on STEM careers when they're in elementary school. That makes it vital to look at how we include STEM career introduction at a younger age. In discussions about STEM, math often t…
  continue reading
 
In today's episode, OpenText's Tyler Moffitt (Sr. Security Analyst) delves into 'Operation Endgame,' one of the most extensive coordinated cybercrime takedowns in history. Learn about the multinational law enforcement efforts that targeted critical malware infrastructure, dismantling key botnets and loaders vital to ransomware attacks. Tyler provid…
  continue reading
 
Can we secure generative AI before it outpaces our ability to defend it? Welcome back to Razorwire, where we have our finger on the pulse of cybersecurity’s most urgent dilemmas and future threats. I’m your host, Jim and in this episode, I sit down with Ante Gojsalić, CTO and co-founder of SplxAI, to unpick the tangled challenges of securing the ne…
  continue reading
 
Watch Carol and Tim LIVE every day on YouTube: http://bit.ly/3vTiACF. Wall Street kicked off the week with a rally in stocks as consumer confidence rebounded sharply while the US and the European Union sped up trade talks. A global surge in bonds also helped sentiment. As equities halted a four-day slide, the S&P 500 climbed 2%. Nvidia Corp. paced …
  continue reading
 
“Laundry Bear” airs dirty cyber linen in the Netherlands. AI coding agents are tricked by malicious prompts in a Github MCP vulnerability.Tenable patches critical flaws in Network Monitor on Windows. MathWorks confirms ransomware behind MATLAB outage. Feds audit NVD over vulnerability backlog. FBI warns law firms of evolving Silent Ransom Group tac…
  continue reading
 
In this special RSA episode of Future of Threat Intelligence, Martin Naydenov, Industry Principal of Cybersecurity at Frost & Sullivan, offers a sobering perspective on the disconnect between AI marketing and implementation. While the expo floor buzzes with "AI-enabled" security solutions, Martin cautions that many security teams remain reluctant t…
  continue reading
 
Interested in being a guest? Email us at [email protected] Ever wonder why nobody picks up your calls or reads your emails anymore? In this eye-opening conversation, Aaron Christopher "AC" Evans, founder of DRIPS, reveals why traditional outreach methods are increasingly ineffective in our distraction-filled world. AC explains how our evolution…
  continue reading
 
In this episode of Tech One, Two, we break down what Windows 10 End-of-Life (EOL) really means for businesses, IT leaders, and everyday users. With Microsoft’s official support ending in October 2025, the clock is ticking on a technology that has powered organizations for nearly a decade. What are the risks of staying on Windows 10? What steps shou…
  continue reading
 
Send us a text Is the financial system broken—or just misunderstood? Economist and author Matt Sekerke joins FUTUREPROOF. to challenge conventional wisdom on money, banking, and policy. In his new book Making Money Work (co-authored with Steve Hanke), he argues that fiat money is still king, the Fed doesn’t have as much power as we think, and the o…
  continue reading
 
Welcome back to To the Point Cybersecurity, where hosts Rachael Lyon and Jonathan Knepher take you inside the ever-evolving world of cyber threats, digital defense, and the impact of technology on our daily lives. In this episode, they sit down with Ricoh Danielson—national security expert, digital forensics pro, and US Army combat veteran of Iraq …
  continue reading
 
In this special rewind edition of Industrial Cybersecurity Insider, we revisit some of the most powerful insights shared on how to elevate OT cybersecurity across complex, distributed environments. From budget allocation strategies to disaster recovery frameworks and the nuances of executive engagement, this episode distills frontline lessons into …
  continue reading
 
What happens to your digital world when you die? In this episode of Cyberside Chats, LMG Security’s Tom Pohl joins the conversation to discuss the often-overlooked cybersecurity and privacy implications of death. From encrypted files and password managers to social media and device access, we’ll explore how to ensure your loved ones can navigate yo…
  continue reading
 
ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play