Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Digital Security Podcasts
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
Official Website: https://psysecure.com/podcast/ Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
The MERICS China Podcast, brought to you by the Mercator Institute for China Studies, a show that analyses current affairs in China and the latest developments in EU-China relations.
…
continue reading

1
OSINT with ShadowDragon & Digital Tools For Modern Investigations
Daniel Clemens from ShadowDragon, LLC
This podcast covers a variety of cyber security topics, with a focus on candor, and zero b.s. Topics may include OSINT, PAI, Tailored Monitoring, Investigations, Offensive Disciplines, AI/ML, Object Recognition, Forensics, Historical Industry Lore, All things considered in Cyber.
…
continue reading
They say we die twice: once when we take our last breath and again when our name is spoken for the final time. But in today's world, there's a third passing to consider - our digital death. Welcome to Death and Dying in the Digital Age, a podcast that explores the uncharted territory of our online afterlife. Join host Niki Weiss each week as she navigates the complexities of end-of-life planning, from safeguarding your individual legacy to ensuring your loved ones can access your important d ...
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
In-depth conversations on technology and business with senior leaders from top global companies. Hosted by industry analyst Michael Krigsman.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Beginner friendly if listened to in order! For anyone interested in an educational podcast about philosophy where you don't need to be a graduate-level philosopher to understand it. In chronological order, the thinkers and ideas that forged the world we live in are broken down and explained.
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
continue reading
The Digital Banking Podcast is powered by Tyfone. Tyfone is a dramastically better digital banking provider. Our appeal is unique, we collaborate closely with our customers and the banking ecosystem in an open approach coupled with a powerful user experience that helps “get things done”! On our podcast you will hear how digital banking plays a leading role for community minded financial institutions from the unique perspectives of our industry expert guests.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
In this podcast, we delve into various aspects of cybersecurity, inviting global security leads to discuss trends, the impact of new concepts and regulations, talent retention, and more through one-on-one discussions.
…
continue reading

1
Cyber Mining With Lego - Future Secured Ep 40
46:50
46:50
Play later
Play later
Lists
Like
Liked
46:50In this episode, Vannessa Van Beek, Global CISO at Fortescue, joins Tom Finnigan and Jason Murrell to unpack what it takes to lead cyber security at the intersection of AI, mining, and innovation at scale. She shares her unconventional journey to becoming CISO, her early adoption of AI inside security operations, and how Fortescue is using emerging…
…
continue reading
What happens to your Social Security when life takes an unexpected turn? In this eye-opening episode of the Digital Legacy Podcast, host Niki Weiss welcomes financial planner Bob Goldberg, CFP to demystify Social Security and survivor benefits in the context of end-of-life and legacy planning. Bob breaks down key Social Security strategies, includi…
…
continue reading

1
The Impact of AI on Digital Identity with Kristie Pfosi
11:03
11:03
Play later
Play later
Lists
Like
Liked
11:03In this episode, Kristie Pfosi, CISO at Marelli, discusses the evolving landscape of digital identity and cybersecurity, highlighting the significant role of AI in data analytics and risk identification. She talks about the current hesitations in fully adopting AI/ML capabilities, citing concerns over data transparency and control. Kristie also exp…
…
continue reading

1
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Jordan Avnaim, Chris Hickman, Amit Sinha, Albert Estevez Polo - BSW #397
1:07:59
1:07:59
Play later
Play later
Lists
Like
Liked
1:07:59This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
…
continue reading

1
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Amit Sinha, Chris Hickman, Albert Estevez Polo, Jordan Avnaim - BSW #397
1:07:59
1:07:59
Play later
Play later
Lists
Like
Liked
1:07:59This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
…
continue reading
AI is quietly ending traditional online searches, killing websites, blogs, and countless jobs. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
The Secret CISO: Navigating the Human and Technical Challenges in Cybersecurity
51:57
51:57
Play later
Play later
Lists
Like
Liked
51:57In this episode of 'Cybersecurity Today,' hosts John Pinard and Jim Love introduce their unique show, 'The Secret CISO,' which aims to dive deep into the lives and thoughts of CISOs and similar roles, beyond the usual interview-style format. The guest for this episode is Priya Ali, CISO at Sheridan College, who shares her journey from engineering t…
…
continue reading

1
027 - Stop Playing the Game, Join The New Matrix Privacy Community
44:15
44:15
Play later
Play later
Lists
Like
Liked
44:15In this episode, I discuss breaking free from the Apple ecosystem, the dangers of social media oversharing, and introduce our new Matrix community. I also cover the upcoming capture the flag challenge, share thoughts on the OSINT Defense & Security Framework progress, and rant about security theater at airports and online services that block VPNs. …
…
continue reading
Super-cheap storage sounds great until you see what you’re really about to get. Don’t get burned. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
$200,000 Zoom Call, Microsoft, Zero-Click, China & HD With $649 million of Bitcoin - SWN #485
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38This week we have, $200,000 Zoom Call, Microsoft Teams, INTERPOL, Zero-Click, Junk Food, China & Hard Drive With $649 million of Bitcoin. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-485
…
continue reading

1
Episode 89: Meet the Alias SOC - on the Battlefront of Cybersecurity
29:57
29:57
Play later
Play later
Lists
Like
Liked
29:57🔐 Inside the SOC 🔐 Go behind the scenes with the Alias Security Operations Center (SOC) team to learn how they operate, collaborate, and tackle today’s top cyber threats ⚔️. Find out why a SOC matters, and how organizations can still leverage SOC insights and support, even without one in-house 💼. 🎧 Tap in and get cyber-smart with the experts. #Cybe…
…
continue reading

1
Cybersecurity in Banking: How to Navigate Vendor Risk with Jones Walker LLP
1:18:55
1:18:55
Play later
Play later
Lists
Like
Liked
1:18:55This episode of the Digital Banking Podcast explored the crucial role of cybersecurity in banking, focusing on vendor risk management. Josh DeTar spoke with Lara Sevener, Tom Walker, and Rob Carothers, partners at Jones Walker LLP, about the unique challenges faced by community and mid-sized banks. The discussion highlighted the increasing reliance…
…
continue reading

1
The party and the private economy, with Kasper Ingeman Beck and Nis Grünberg
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11The Chinese Communist Party (CCP) is widening its influence over private companies. Since Xi Jinping took office as party and state leader, the CCP has increased its control over the private economy by guiding capital, controlling shares and engaging in corporate governance. In this episode, Kasper Ingeman Beck, Postdoc at the Copenhagen Business S…
…
continue reading
Last year, Apple promised groundbreaking AI, but Siri's failures have left the company scrambling. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Zoom was built for speed. But in its rush to connect us, it may have left a few doors open. This week, a cybersecurity expert walks us through how one of Zoom's most mundane features became a hacker's best friend — and why the weakest link in crypto isn't the blockchain … it's the person who thinks they're too smart to get scammed. Learn about your…
…
continue reading

1
AI Security Threats: Echo Leak, MCP Vulnerabilities, Meta's Privacy Scandal, and the 'Peep Show'
12:55
12:55
Play later
Play later
Lists
Like
Liked
12:55In this episode of Cybersecurity Today, host Jim Love discusses critical AI-related security issues, such as the Echo Leak vulnerability in Microsoft's AI, MCP's universal integration risks, and Meta's privacy violations in Europe. The episode also explores the dangers of internet-exposed cameras as discovered by BitSight, highlighting the urgent n…
…
continue reading
Ditch the cheesy store cards. Use ChatGPT to turn your favorite photo into a custom keepsake. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
UEFI Vulnerabilities Galore - PSW #878
2:10:48
2:10:48
Play later
Play later
Lists
Like
Liked
2:10:48This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
…
continue reading

1
Ep. 11 - Building Resiliency: The New Paradigm in Security Leadership
38:51
38:51
Play later
Play later
Lists
Like
Liked
38:51In this episode, we’re flipping the script on traditional security thinking. As security champions, we know that resiliency isn’t just a buzzword—it’s the backbone of modern cybersecurity strategy. Join us as we unpack: 🔐 From Security to Resiliency – Were we too confident in the early days of CISO-ship? We reflect on the evolution of security lead…
…
continue reading

1
Is Your Ego Impeding Your Career Fulfillment?
1:02:21
1:02:21
Play later
Play later
Lists
Like
Liked
1:02:21In this episode of Unspoken Security, host AJ Nash sits down with Jennifer Leggio, Chief Strategy Officer of W2 Communications, to discuss the unspoken challenges impacting career fulfillment. Jennifer shares her personal experiences with toxic work environments, imposter syndrome, and the struggle to balance ego and self-awareness. She highlights …
…
continue reading
You’re still told to switch on airplane mode before takeoff. What really happens if you don’t? Here’s the truth. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
The AI That Tried to Escape with Ron Eddings
23:43
23:43
Play later
Play later
Lists
Like
Liked
23:43What happens when AI refuses to be replaced? This episode kicks off with a chilling real-world example of an AI threatening blackmail—and only gets more intense from there. Host Ron Eddings unpacks the terrifyingly innovative ways AI is altering the cybersecurity threat landscape. From deepfakes convincing enough to fool your own family to auto-sum…
…
continue reading

1
What Smart Manufacturing Leaders Consider Before Adopting AI - with Tim Burge of Aquant
28:47
28:47
Play later
Play later
Lists
Like
Liked
28:47Today’s guest is Tim Burge, Director at Aquant. Aquant is an AI platform built for service teams that maintain and repair complex equipment. It gives clear, accurate answers to service questions — from basic fixes to deep diagnostics — so field techs, call centers, managers, and customers can get to solutions faster. Used by top manufacturers like …
…
continue reading

1
Shaping the Future of Healthcare with AI - with Lyndi Wu of NVIDIA and Will Guyman of Microsoft
39:40
39:40
Play later
Play later
Lists
Like
Liked
39:40In this episode of the ‘AI in Business’ podcast, Principal Group Product Manager Will Guyman of Microsoft and Senior Director Lyndi Wu of NVIDIA explore how healthcare providers are deploying AI at scale to drive clinical and operational transformation. With host Matthew DeMello, they discuss the combined power of NVIDIA’s GPU acceleration and Micr…
…
continue reading

1
The art of the breakup: Trump’s antitrust surge.
46:21
46:21
Play later
Play later
Lists
Like
Liked
46:21This week on Caveat, Dave and Ben welcome back N2K’s own Ethan Cook for our latest policy deep dive segment. As a trusted expert in law, privacy, and surveillance, Ethan is joining the show regularly to provide in-depth analysis on the latest policy developments shaping the cybersecurity and legal landscape. While this show covers legal topics, a…
…
continue reading

1
Managing online security throughout the decades.
43:09
43:09
Play later
Play later
Lists
Like
Liked
43:09This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with some more chicken follow up, this week, delving into malware-relat…
…
continue reading

1
CR102: Tattoos, Tech, and Teams, what ink means in the age of AI with Jitske Kramer, Corporate Anthropologist
56:30
56:30
Play later
Play later
Lists
Like
Liked
56:30Every organization is built on people, structures, and culture. But culture isn’t static—it evolves with every interaction, ambition, and shift in circumstance. As IT drives business transformation, new technologies reshape how people connect and collaborate. In this ever-changing landscape, a strong, adaptive culture is the key to lasting success.…
…
continue reading

1
Lost retirement money? Here’s how to find it
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Nearly $2 trillion is sitting in forgotten 401(k) accounts. Yours might be one of them. Here’s how to check. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Reducing Developer Toil, Shifting Security Left, And Using Caution With AI – Andy Dennis
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41In this episode of the Security Repo Podcast, Andy Dennis, VP at Modus Create, joins Dwayne McDaniel to unpack what "shifting left" really means for security and engineering teams. They explore the impact of hands-on security training at B-Sides events, the concept of developer toil, and the role AI tools like GitHub Copilot AutoFix are starting to…
…
continue reading
Welcome to 🎙️The SOC Brief 🎙️our byte-sized mini series bringing you weekly updates straight from the Security Operations Center. In this episode, Andrew, Dax, and Dylan break down what life in the SOC looks like, the rise of malvertising, and the emerging threat known as Recipe Lister, discussing how it’s being tracked. Tune in for a quick, expert…
…
continue reading
Think of everything you ever told your chatbot. Did you delete it? Even if you did, you didn't. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Episode 071 - The Future of HubSpot is Passwordless - Alyssa Robinson
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39The Future of HubSpot is Passwordless Learn how HubSpot’s CISO Alyssa Robinson breaks down passwordless authentication, innovative security strategies, and the art of balancing usability with protection on the latest episode. + + + Find more episodes on YouTube or wherever you listen to podcasts, as well as at netspi.com/agentofinfluence.…
…
continue reading

1
Security Money: The Index is Up, CISOs Need to Get Out, and Are You Burning Out? - BSW #399
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
…
continue reading

1
Security Money: The Index is Up, CISOs Need to Get Out, and Are You Burning Out? - BSW #399
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
…
continue reading

1
Security Money: The Index is Up, CISOs Need to Get Out, and Are You Burning Out? - BSW #399
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
…
continue reading

1
Cybersecurity Today: State-Backed ChatGPT Misuse, Dark Gaboon Attacks, and Starlink Installation Controversy
12:50
12:50
Play later
Play later
Lists
Like
Liked
12:50This episode of 'Cybersecurity Today' hosted by Jim Love covers various significant events in the cybersecurity landscape. OpenAI has banned multiple ChatGPT accounts linked to state-sponsored hackers from countries including China, Russia, North Korea, Iran, and the Philippines for developing malware, generating disinformation, and conducting scam…
…
continue reading

1
The AI Minded Path to Scalable and Responsible Innovation Across the Enterprise - with James Raybould of Turing Intelligence
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18Enterprise leaders are no longer asking if they should adopt AI — the question is how to do it effectively. In this episode, Emerj Editorial Director Matthew DeMello speaks with James Raybould, SVP and GM of Turing Intelligence at Turing, about what distinguishes successful enterprise AI deployments from stalled pilots. Turing is one of the world’s…
…
continue reading

1
Lexis Nexis data breach: See if you’re at risk
12:00
12:00
Play later
Play later
Lists
Like
Liked
12:00The data broker had a massive data breach, leaking personal info on hundreds of thousands of people. Here’s what you need to know. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more... - SWN #484
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-484
…
continue reading

1
Data flows, privacy risks and foreign surveillance of Australians with Johnny Ryan
42:42
42:42
Play later
Play later
Lists
Like
Liked
42:42Dr Miah Hammond-Errey is joined by Dr Johnny Ryan, Director of Enforce at the Irish Council for Civil Liberties and a leading authority on surveillance, data rights, and privacy. Drawing on his extensive experience in the ad tech industry and digital rights advocacy, Dr Ryan explains how real-time bidding (RTB)—the backbone of online advertising—ro…
…
continue reading

1
From the Frontlines to the Civilian World: A Military Perspective on Cybersecurity
26:53
26:53
Play later
Play later
Lists
Like
Liked
26:53On the latest episode of Security Visionaries, host Max Havey interviews Marcus Thompson, Director of Cyber Compass and former head of Information Warfare for the Australian Defence Force. They discuss the intersection of military and cyber defense, exploring how cybersecurity roles differ between military and civilian sectors, and the transfer of …
…
continue reading
…
continue reading
Apple's WWDC 2025 is just as disappointing as expected. Has the company lost its magic touch? Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
…
continue reading

1
Chinese FDI in Europe rebounds, with Armand Meyer and Andreas Mischer
25:56
25:56
Play later
Play later
Lists
Like
Liked
25:56Chinese outbound foreign direct investment in the EU and UK rose for the first time in 2024 after seven consecutive years of decline. In this episode we look at what has changed, where the money is going, and what is happening in the particularly important sector of electric vehicles. Armand Meyer, Senior Research Analyst with Rhodium Group’s China…
…
continue reading