Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Data Security Podcasts
A regular conversation with those at the convergence of data privacy, data security, data regulation, records, and governance.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
The State and Popular Culture
…
continue reading
Jen Psaki tackles the biggest issues of the week and features one-on-one interviews with newsmakers.
…
continue reading
Welcome to a podcast that dives deep into the fascinating crossroads of data, AI, privacy, and cybersecurity. Hosted by data and AI expert Kate Carruthers, this series explores the cutting-edge frontiers of our digital world, where data is forging an entirely new economy. Tune in to stay ahead of the curve and uncover the opportunities, challenges, and innovations shaping our future.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
A podcast on the journey to discovery through data in information security by Bob Rudis & Jay Jacobs
…
continue reading
Data Hurdles is a podcast that brings the stories of data professionals to life, showcasing the challenges, triumphs, and insights from those shaping the future of data. Hosted by Michael Burke and Chris Detzel, this podcast dives into the real-world experiences of data experts as they navigate topics like data quality, security, AI, data literacy, and machine learning. Each episode features guest data professionals who share their journeys, lessons learned, and the impact of data on industr ...
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading

1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Our latest TIAKI thought leadership to help determined leaders achieve differentiation in the global sports ecosystem. Listen to our expert analysis and bold thinking to help you achieve the extraordinary in sport.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
For those who are interested in the hottest field in a technology world. Whether you are a professional who wants to learn more about privacy, data protection, or cyber law or someone who just finds this fascinating, we have topics for you from data management to cybersecurity to social justice and data ethics and AI. In-depth information on serious privacy topics. This podcast, hosted by Dr. K Royal, Paul Breitbarth and Ralph O'Brien, features open, unscripted discussions with global privac ...
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
…
continue reading
Covering everything from the future of organizational culture to accelerated cloud adoption, in this inaugural podcast series, Splunk thought leaders sit down with Principal Analyst Daniel Newman to discuss the unique intricacies organizations are navigating in an era of rapid digital transformation and how data remains the key solution to thriving in uncertain times.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
The Rebel Tech podcast, hosted by Zach Whiting and David Dunmoyer, is a product of the Texas Public Policy Foundation that explores technology and innovation, and its implications on everything from culture, public policy discussions, business, to how we live our lives and interact with one another. The Rebel Tech podcast features prominent guests, ranging from lawmakers to entrepreneurs to thought leaders fighting on the side of humanity on the digital frontier.
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
The Power of Digital Policy is a podcast that teaches you and your organization how to balance the risks and opportunities that come with operating websites, social media, mobile applications, voice assistants, AI and other channels. Through a monthly focus on individual topics, such as accessibility, cookies, copyrights, social media faux pas, data breaches, and data privacy, you will learn how to develop guardrails to maximize digital opportunity and minimize risk. Whether you work for a s ...
…
continue reading
An open show powered by community LINUX Unplugged takes the best attributes of open collaboration and turns it into a weekly show about Linux.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
computer help free. blogtvpccareman
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading

1
Healthcare for Humans: Little Manila Rising's Blueprint for Health and Healing
30:30
30:30
Play later
Play later
Lists
Like
Liked
30:30Episode 71 When Communities Lead: Little Manila Rising's Blueprint for Health and HealingOn this episode they explore the powerful story of Little Manila Rising, an organization founded to preserve the Filipino American legacy in Stockton, California, and uplift the South Stockton community. Hear how founders rallied local residents to prevent the …
…
continue reading

1
InfoSec Beat: Careers in Information Security – Client Data Protection
25:59
25:59
Play later
Play later
Lists
Like
Liked
25:59This episode of the InfoSec Beat podcast focuses on careers in information security. Accenture CISO Kris Burkhardt talks with Kyle Friedman, who leads Security Contracting and Request for Proposal Support for our Information Security Client Data Protection team. She ensures that we have the right provisions in our proposal responses and contracts t…
…
continue reading

1
Episource Breach, Predatory Sparrow strikes again, Swiss banks data leak
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Over 5 million impacted by Episource breach Predatory Sparrow strikes Iran again Data leak at Swiss banks Huge thanks to our sponsor, Adaptive Security — OpenAI’s first cybersecurity investment As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing simulations featuring realistic personalized deepfakes …
…
continue reading

1
SANS Stormcast Monday, June 16th, 2025: Extracting Data from JPEG; Windows Recall Export; Anubis Wiper; Mitel Vuln and PoC
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider build for Windows 11, Microsoft is testing an export feature for data stored by Recall. The feature is limited to European …
…
continue reading

1
teissTalk: Mitigating human cyber-risks with data and behavioural sciences
45:38
45:38
Play later
Play later
Lists
Like
Liked
45:38Which behaviours increase risk and how we can measurably change them Driving employee engagement without incentives Which real-time interventions encourage safer employee behaviours Jonathan Craven, Host, teissTalk https://www.linkedin.com/in/jonathanbcraven/ Rebecca Stephenson, Specialist Lead Lecturer, Highlands College https://www.linkedin.com/i…
…
continue reading

1
Data flows, privacy risks and foreign surveillance of Australians with Johnny Ryan
42:42
42:42
Play later
Play later
Lists
Like
Liked
42:42Dr Miah Hammond-Errey is joined by Dr Johnny Ryan, Director of Enforce at the Irish Council for Civil Liberties and a leading authority on surveillance, data rights, and privacy. Drawing on his extensive experience in the ad tech industry and digital rights advocacy, Dr Ryan explains how real-time bidding (RTB)—the backbone of online advertising—ro…
…
continue reading

1
'A huge freaking deal': Psaki sounds alarm on Supreme Court letting DOGE access social security data
41:39
41:39
Play later
Play later
Lists
Like
Liked
41:39Even as the feud between Donald Trump and Elon Musk threatens untold chaos, the Supreme Court ruled in favor of DOGE in granting access to Americans' personal Social Security data. Jen Psaki, Ronan Farrow, Senator Elissa Slotkin, and Rep. Melanie Stansbury discuss the dangers and the level of concern among American voters.…
…
continue reading
…
continue reading

1
How to Know If Someone Is a Threat Before Letting Them In?
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Over 70% of people misrepresent themselves online. But what happens when that misrepresentation becomes a real threat—to your family, your business, or your peace of mind? In this episode of Ask Socialprofiler, we explore how AI-powered social media background checks can help you spot red flags, assess compatibility, and decide who really belongs i…
…
continue reading

1
57. The Password Trap: What It’s Costing Your Business (And How to Escape) with Raul Cepeda
38:23
38:23
Play later
Play later
Lists
Like
Liked
38:23Password fatigue isn’t just annoying—it’s expensive and dangerous. In this episode of UnHacked, Raul Cepeda Jr. from rf IDEAS breaks down the hidden costs of password dependence and shows small businesses a better way forward. From clinicians wasting hours re-logging into systems to the real risk of password-related breaches, Raul makes the case fo…
…
continue reading

1
We Can Either Build Resilience or Just Always Be Perfect
38:09
38:09
Play later
Play later
Lists
Like
Liked
38:09All links and images can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Ryan Bachman, executive vice president and CISO, GM Financial. In this episode Identity consolidation versus simplification Entry-level pathways into cyberse…
…
continue reading

1
OWASP vulnerable and outdated components (noun) [Word Notes]
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. Audio reference Link: "The…
…
continue reading

1
Retaliatory Iranian cyberattacks, steel giant confirms breach, ransomware hits healthcare system again
8:31
8:31
Play later
Play later
Lists
Like
Liked
8:31DHS warns of retaliatory Iranian cyberattacks Steel giant Nucor confirms breach Ransomware hits healthcare system again Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a de…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%20AtHome%20IP%20Cameras/32062 Critical Netscaler Security Update CVE-2025-5777 CVE 2025-5777 is a critical severity vu…
…
continue reading

1
The Biggest Data Breach That Never Happened
36:54
36:54
Play later
Play later
Lists
Like
Liked
36:54Episode 230: The headline-making data breach that isn't really a data breach, how the data broker industry enabled political assassination, Meta unveils two new forms of enshittification, and more! Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest security & privacy news. 🔑 Protect yourself onli…
…
continue reading
US warns of heightened risk of Iranian cyberattacks. Cyber warfare has become central to Israel and Iran’s strategies. Oxford City Council discloses data breach. Europe aiming for digital sovereignty. Michigan hospital network says data belonging to 740,000 was stolen by ransomware gang. RapperBot pivoting to attack DVRs. A picture worth a thousand…
…
continue reading
On January 12th, 2025, the ShmooCon hacker conference held it’s 20th and final gathering. I was lucky enough to be able to not only attend the final show but also to interview the founders, Heidi and Bruce Potter. We talk about how it all got started, what made this hacker con so special and beloved, and hear some hilarious stories from the past tw…
…
continue reading

1
CMS retailer report, Aflac investigates activity, Russian dairy cyberattack
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10CMC officially points finger at Scattered Spider for Marks & Spencer and Co-op attacks Aflac investigating suspicious activity on its U.S. network Russian dairy producers suffer cyberattack Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses…
…
continue reading

1
Kids Online Safety Act (KOSA): Protecting Kids or Censorship?
16:21
16:21
Play later
Play later
Lists
Like
Liked
16:21In this episode, we explore the Kids Online Safety Act (KOSA), a controversial bill aimed at protecting children online. Joined by co-host Scott Wright, we discuss the potential implications of KOSA, including concerns about censorship, mass surveillance, and the impact on free expression and online privacy. We also touch on the broad support for t…
…
continue reading
Off-the-shelf didn't cut it, so we built what we needed using open hardware and open source. Sponsored By: Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for comp…
…
continue reading

1
SANS Stormcast Monday, June 23rd, 2025: ADS and Python; More Secure Cloud PCs; Zend.to Path Traversal; Parser Differentials
5:36
5:36
Play later
Play later
Lists
Like
Liked
5:36ADS & Python Tools Didier explains how to use his tools cut-bytes.py and filescanner to extract information from alternate data streams. https://isc.sans.edu/diary/ADS%20%26%20Python%20Tools/32058 Enhanced security defaults for Windows 365 Cloud PCs Microsoft announced more secure default configurations for its Windows 365 Cloud PC offerings. https…
…
continue reading

1
Unscripted the AMCP Podcast: Joe Honcz: AI in Managed Care Pharmacy
13:34
13:34
Play later
Play later
Lists
Like
Liked
13:34On this episode host Fred Goldstein invites Joe Honcz, from C4I consulting and an AMCP Board Member to discuss AI and its potential uses in Managed Care Pharmacy.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen…
…
continue reading

1
Jadee Hanson: Cybersecurity is a team effort. [CISO] [Career Notes]
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09Please enjoy this encore of Career Notes. Jadee Hanson, CIO and CISO at Code 42, started her technology journey thanks to the help of a teacher in high school. She began college studying computer science and ended with a degree in computer information systems as it had more of the business side. Working in the private sector for companies such as D…
…
continue reading

1
This Just In: HIMSS25 with Carl Brown and Tony Black
25:19
25:19
Play later
Play later
Lists
Like
Liked
25:19On this episode host Justin Barnes recorded live at HIMSS25 in Las Vegas. Stay tuned for the next few weeks to hear all his guests.This week his guests are Carl Brown, General Manager Business Development at Supermicro and Tony Black, Global Director, Healthcare, Privacy & Digital Transformation at Kyndryl.To stream our Station live 24/7 visit www.…
…
continue reading

1
Signed, sealed, exploitable. [Research Saturday]
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the M…
…
continue reading

1
Vance gets the cause of fear in L.A. totally backward in trying to justify military presence
41:38
41:38
Play later
Play later
Lists
Like
Liked
41:38JD Vance came to Los Angeles with the goal of making the case that the fear of unruly protests justifies the continued deployment of military forces of the city (and other cities), completely ignoring the fact that what the people of Los Angeles are actually afraid of is Donald Trump's militarized raids and street snatchings.…
…
continue reading

1
Health Cent$: Jeffrey S Gold MD on Direct Primary Care (DPC)
27:57
27:57
Play later
Play later
Lists
Like
Liked
27:57On this inaugural episode, host Adam Russo welcomes Jeffrey S. Gold MD, owner and physician of Gold Direct Care PC to discuss Direct Primary Care (DPC). Dr. Gold explains what DPC is along with sharing his insights on why he transitioned to DPC and how it has allowed him to engage with his patients in a way that traditional insurance-based primary …
…
continue reading

1
56. Unlocked Remote Access: How One Mistake Brought a Manufacturer to a Halt with Brett Galant
59:45
59:45
Play later
Play later
Lists
Like
Liked
59:45In this episode of UnHacked, cybersecurity strategist Brett Gallant walks us through a real-world disaster—a manufacturing plant brought to its knees by an unsecured remote access tool. We break down what went wrong, how it could’ve been prevented, and why business leaders must stop assuming their IT support has cybersecurity covered. If you’re a m…
…
continue reading

1
Week in Review: ClickFake deepfake scam, Krispy Kreme breach, NIST ZTA guidance
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Howard Holton, COO and industry analyst, GigaOm Thanks to our show sponsor, Adaptive Security As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing simulations featuring realistic persona…
…
continue reading
An historic data breach that wasn’t. Aflac says it stopped a ransomware attack. Cloudflare thwarts a record breaking DDoS attack. Mocha Manakin combines clever social engineering with custom-built malware. The Godfather Android trojan uses a sophisticated virtualization technique to hijack banking and crypto apps. A British expert on Russian inform…
…
continue reading
In this engaging conversation, Chris Glanden speaks with Pat Gorman AKA InfoSec Pat, a cybersecurity professional with over 12 years of experience. Pat shares his unique journey into the cybersecurity field, discussing his early life, career transitions, and the importance of certifications. He emphasizes the need for practical skills and the value…
…
continue reading

1
Cisco, Atlassian fixes, Ryuk member arrested, Viasat Typhoon attack
8:57
8:57
Play later
Play later
Lists
Like
Liked
8:57Cisco, Atlassian fix high-severity vulnerabilities Alleged Ryuk ransomware gang member arrested and extradited Telecom company Viasat attacked by Salt Typhoon Huge thanks to our sponsor, Adaptive Security — OpenAI’s first cybersecurity investment As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing si…
…
continue reading

1
Psaki calls out media that fell for Trump's 'two week' trick
41:07
41:07
Play later
Play later
Lists
Like
Liked
41:07Jen Psaki points out the mistake some media outlets made in relaying Donald Trump's two-week deadline to make a decision on U.S. action on Iran, without also pointing out that Trump often promises to do things in two weeks, and seldom actually follows through.By NBC News
…
continue reading

1
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, N…
…
continue reading

1
Health Stealth Radio: Building Your Personal CISO Brand
25:32
25:32
Play later
Play later
Lists
Like
Liked
25:32S2E9: Building Your Personal CISO BrandHost: Frank CutittaGuest: Lisa Gallagher, Cybersecurity Advisor, CHIMETo stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more a…
…
continue reading

1
Healthcare IT: Today Radiology Image Sharing and AI-Enabled Patient Action
27:44
27:44
Play later
Play later
Lists
Like
Liked
27:44Hosts Colin Hung and John Lynn discuss Radiology Image Sharing and AI-Enabled Patient Action in the Reputation Economy.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Le…
…
continue reading

1
Health UnaBASHEd: Keith Kerman, NYC Chief Fleet Officer, Deputy Commissioner, DCAS
27:43
27:43
Play later
Play later
Lists
Like
Liked
27:43Greening the Grid: How NYC’s Keith Kerman is Electrifying the Nation’s Largest FleetOn this episode Gil Bashe welcomes Keith Kerman, New York City’s Chief Fleet Officer and Deputy Commissioner at DCAS. Keith leads the transformation of the city’s 30,000+ vehicle fleet—making it a model for climate-forward, tech-enabled urban mobility. From electric…
…
continue reading

1
Digital Health Talks: From Vision to Reality By Building Smart Hospitals That Actually Work
28:19
28:19
Play later
Play later
Lists
Like
Liked
28:19From Vision to Reality: Building Smart Hospitals That Actually WorkHealthcare expert Lorren Pettit shares insights on how hospitals are transforming from basic digital systems to AI-powered smart healthcare environments, covering real-world applications and implementation challenges.Key Takeaways: • Beyond basic digitization - Hospitals are progres…
…
continue reading
Like what we’re doing with the DefSec Podcast and want to help support us? Donate here: https://www.patreon.com/defensivesec Links: https://www.bleepingcomputer.com/news/security/sentinelone-shares-new-details-on-china-linked-breach-attempt/ https://thehackernews.com/2025/06/new-supply-chain-malware-operation-hits.html?m=1 https://www.csoonline.com…
…
continue reading

1
teissTalk: Securing against AI-driven phishing attacks
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16How cyber criminals are using AI tools to scale malicious operations Streamlining user experience with biometrics or device-based authentication Making your organisation cyber resilient and securing critical systems as AI continues to advance Featuring: Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Derek Hanson, VP Soluti…
…
continue reading

1
Juneteenth: Reflecting, belonging, and owning your seat at the table. [Special Edition]
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26We put together an open conversation between our podcast hosts, CyberWire Daily's Dave Bittner, T-Minus Space Daily’s Maria Varmazis, and CISO Perspectives podcast’s Kim Jones. Their conversation goes deeper than just the historical significance of Juneteenth, diving into candid conversations on allyship, representation, and the enduring value of d…
…
continue reading
Please enjoy this encore of Hacking Humans. On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there…
…
continue reading
Q&A229: Windows privacy, SMS/RCS privacy, KYC-free crypto, E2EE Discord alternatives, XMPP's potential, TSA prescreenings, self-hosting considerations, EXIF data, and iMazing. Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded or XMR Chat: https://xmrchat.com/surveillancepod Welcome to the Surveillance Report Q&A …
…
continue reading

1
Trump's lack of foreign policy principles tears MAGA apart on Iran
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45Jen Psaki looks at the various influences manipulating Donald Trump as he makes decisions on the war between Israel and Iran without having any personal principles mooring his thinking, and how his lack of leadership is leaving his supporters to fight with each other.By NBC News
…
continue reading
Viasat confirms it was breached by Salt Typhoon. Microsoft’s June 2025 security update giveth, and Microsoft’s June 2025 security update taketh away. Local privilege escalation flaws grant root access on major Linux distributions. BeyondTrust patches a critical remote code execution flaw. SMS low cost routing exposes users to serious risks. Erie In…
…
continue reading

1
Data Makes the World Go Round (with Noël Luke)
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07Send us a text It's been a while since we last talked about cross-border data transfers, but that does not mean that all issues have resolved themselves. And while the focus may still largely be on the EU-US relations for data transfers, the core developments actually relate to the Global Cross-Border Privacy Rules. Therefore, on this week of Serio…
…
continue reading

1
Hackers exploit Langflow flaw, TP-Link routers still vulnerable, Russia detects SuperCard malware attacks
8:52
8:52
Play later
Play later
Lists
Like
Liked
8:52Hackers exploit critical Langflow flaw to unleash Flodrix botnet Organizations warned of vulnerability exploited against discontinued TP-Link routers Russia detects first SuperCard malware attacks skimming bank data via NFC Huge thanks to our sponsor, Adaptive Security — OpenAI’s first cybersecurity investment As deepfake scams and GenAI phishing e…
…
continue reading

1
Outrage grows over ICE overreach as public gets wise to Trump's dirty tactics to round up immigrants
41:28
41:28
Play later
Play later
Lists
Like
Liked
41:28Jen Psaki reports on yet another public official being arrested by ICE in the course of their heavy-handed tactics in rounding up immigrants. But each new instance of abuse of power by ICE is met with more vocal outrage and louder public protests.By NBC News
…
continue reading

1
Oklahoma Heart Hospital and Their 11 Month Epic Implementation
43:10
43:10
Play later
Play later
Lists
Like
Liked
43:10Oklahoma Heart Hospital and Their 11 Month Epic ImplementationHost: Phil Sobol, Chief Commercial Officer at CereCoreGuests: David Miles, Chief Information Officer and Jim Wetzel, Director of Clinical Systems, from Oklahoma Heart HospitalFind all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn m…
…
continue reading