Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Become a Paid Subscriber: https://podcasters.spotify.com/pod/show/siliconcurtain/subscribe A podcast about propaganda, digital disinformation, politics, corruption, hybrid warfare, weaponised conspiracy theories, social echo chambers and digital dystopias. 1984, Authoritarian, Autocracy, Autocrat, Big Brother, Brainwashing, Cold war, Cold war propaganda, Communism, Conflict, Conspiracy theories, Control, Cults, Cyber warfare, Deception, Dictator, Dictatorship, Digital dystopia, Digital media ...
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Hear interviews and discussions about all areas of digital transformation with industry leaders.
…
continue reading
The MERICS China Podcast, brought to you by the Mercator Institute for China Studies, a show that analyses current affairs in China and the latest developments in EU-China relations.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
Journalists Carole Cadwalladr and Peter Jukes – with the help of Conservative party whistleblower Sergei Cristo – expose an alleged secret spy ring operating at the very heart of the British political system. This is the untold story of the most audacious Russian influence operation in British history. It involves honey traps, Russian agents and information warfare. Russian wealth and glamour collide with a wild west of new digital landscapes. And as Sergei tries and fails to raise the alarm ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
In-depth conversations on technology and business with senior leaders from top global companies. Hosted by industry analyst Michael Krigsman.
…
continue reading
We Cover the Cyberspace.
…
continue reading
Interviews and fun with professionals, hackers, and everything in between.
…
continue reading
Star Link emphasizes in providing corporate organizations with all types of biometric attendance system & access control system and all most all types of softwares to speed up HRs, Admin & Top Most Management with smooth an effective workflow.
…
continue reading
The Digital Banking Podcast is powered by Tyfone. Tyfone is a dramastically better digital banking provider. Our appeal is unique, we collaborate closely with our customers and the banking ecosystem in an open approach coupled with a powerful user experience that helps “get things done”! On our podcast you will hear how digital banking plays a leading role for community minded financial institutions from the unique perspectives of our industry expert guests.
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Senior Intelligence Analysts Chris Morgan and Kim Bromley bring together over 30 years of experience in threat intelligence across government, military, and telecommunications. Along with their guests, they provide practical perspectives on t ...
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Darren Pulsipher, Chief Solution Architect for Public Sector at Intel, investigates effective change leveraging people, process, and technology. Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution. People Workers are at the heart of many of today’s biggest digital transformation projects. Learn how to transform ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading

1
Hackers Breach Morocco's Social Security Database in an Unprecedented Cyberattack...Ep.21
10:12
10:12
Play later
Play later
Lists
Like
Liked
10:12- Cybersecurity in South Africa: How The Cell C and SABS Attacks Could Have Been Prevented. - Hackers Breach Morocco’s Social Security Database in an Unprecedented Cyberattack. - Kaspersky Flags Surge in Cyber Threats Across Africa in The GITEX Africa April 2025 Conference. - Google Says "Fibre Optic Should Be Considered 'Critical Infrastructure' i…
…
continue reading
One of the essential skill sets for a DFIR analyst is the ability to understand the impact of vulnerabilities quickly. In many IR scenarios, you may find a newly discovered vulnerability or receive a scan that flags multiple potential weaknesses. To stay efficient, you must...
…
continue reading

1
🎙️ Future Secured Episode 34: The Fifth Domain is Cyber Warfare
44:13
44:13
Play later
Play later
Lists
Like
Liked
44:13In this hard hitting episode of Future Secured, Jason Murrell and Tom Finnigan sit down with Matt Wilcox, Founder and CEO of FIFTH DOMAIN, to unpack what it really takes to train and equip the cyber warriors of today. With a unique background, Matt brings a rare perspective to cyber training, focusing on human performance, immersive learning, and t…
…
continue reading

1
Smart Payroll Solutions for Modern Businesses
3:07
3:07
Play later
Play later
Lists
Like
Liked
3:07In this episode, Star Link Communication explores how payroll management has evolved from traditional, error-prone manual systems to fully automated, web-based solutions. The focus is on the transformative role of Star Link’s Payroll Management Software, which simplifies salary processing while ensuring full compliance with Indian tax regulations a…
…
continue reading

1
E044 - Digital Hostage Crisis (Brian goes SOLO for an episode)
28:53
28:53
Play later
Play later
Lists
Like
Liked
28:53In this episode of Socializing Security, Brian goes SOLO for an episode and breaks down the complex world of cybersecurity, exploring how cyber warfare, espionage, and ransomware are reshaping the digital landscape. From real-world impacts of data breaches to the silent threat of cyber spies, we uncover why your personal security matters more than …
…
continue reading

1
"There's No Such Thing as Crypto Crime": Nick Furneaux on Blockchain Investigation, Digital Forensics, and the Future of Cryptocurrency
48:25
48:25
Play later
Play later
Lists
Like
Liked
48:25In this eye-opening episode of SecureTalk, host Justin Beals sits down with Nick Furneaux, renowned cryptocurrency investigator and author of the provocatively titled book "There's No Such Thing as Crypto Crime." Furneaux shares his extensive expertise on blockchain technology, cryptocurrency investigations, and the evolving landscape of digital fi…
…
continue reading

1
Digital Car Theft: How Hackers Steal in Seconds – PlaxidityX Ep 20
9:56
9:56
Play later
Play later
Lists
Like
Liked
9:56In this episode, we explore the shift from traditional theft to a new era of digital car theft. Instead of smashing windows, today’s criminals launch automotive cyber-attacks that bypass immobilizers, unlock doors, and hijack control systems, all without leaving a trace. From CAN bus vulnerabilities to cloned key fobs, cybercriminals are finding ne…
…
continue reading

1
How Digital Forensics Supports Incident Response And Who Should Own IAM - Gerard Johansen
22:20
22:20
Play later
Play later
Lists
Like
Liked
22:20In this episode of the Security Repo Podcast, we sit down with cybersecurity expert Gerard Johansen to dive deep into identity and access management (IAM) challenges in the enterprise space. We explore the explosion of data and identities, the ongoing debate over who "owns" IAM in organizations, and how threat actors are evolving their tactics to e…
…
continue reading

1
From Special Forces to Cybersecurity: Ricoh Danielson’s Journey to CISO and Digital Forensics
48:12
48:12
Play later
Play later
Lists
Like
Liked
48:12Send us a text In this episode, host Joe sits down with Ricoh Danielson, a former Special Forces operator turned cybersecurity expert and CISO. Ricoh shares his incredible journey—from nine combat rotations overseas to law school, and eventually a career pivot into IT and digital forensics. Discover how military discipline, resilience, and adaptabi…
…
continue reading

1
684. Yuri Felshtinsky - Trump's Peace Deal was Authored in Moscow, and Designed to be Punitive on Ukraine
1:05:04
1:05:04
Play later
Play later
Lists
Like
Liked
1:05:04Dr Yuri Felshtinsky is a prominent author, historian, and journalist, and expert on Russia and the former Soviet Union. He has appeared in hundreds of print, TV, and radio interviews worldwide, and is widely known as co-author of the book “Blowing Up Russia” with Alexander Litvinenko, a former Lieutenant Colonel in the FSB who was poisoned with rad…
…
continue reading

1
Lawfare Archive: The Spymasters with Chris Whipple
52:02
52:02
Play later
Play later
Lists
Like
Liked
52:02From September 16, 2020: What is the proper relationship between the CIA director and the president? How should directors handle arguably illegal orders? How important is the director's role as the nation's honest broker of information during times of crisis? To get at these questions, David Priess sat down with Chris Whipple, a documentary filmmak…
…
continue reading

1
Man CONTINUES sending money to his military girlfriend!
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26Man CONTINUES sending money to his military girlfriend! [1]
…
continue reading

1
Silicon Bites #134 - One of Putin's Military Generals Erased in Bomb Blast on the Streets of Moscow.
5:39
5:39
Play later
Play later
Lists
Like
Liked
5:39Edition No134 | 25-04-2025 - Lieutenant General Yaroslav Moskalik has been killed in a car bomb attack near Moscow. The most likely suspect for this highly targeted assassination is Ukraine. The elimination of Lieutenant General Yaroslav Moskalik follows that of another senior Russian military figure, Lieutenant General Igor Kirillov, in December. …
…
continue reading

1
683. Georgijs Ivanovs - Coalition of the Useless and Deluded is Falling Apart Even Before it's Deployed
1:01:40
1:01:40
Play later
Play later
Lists
Like
Liked
1:01:40Georgijs Ivanovs started the Ukraine Matters channel in 2007, and it has garners 11.5 m views. He started the channel to explain the situation surrounding the war in Ukraine in simple terms. Like myself, he is not Ukrainian, nor is he a military expert. But he has been to Ukraine many times and seen it almost fully (except for Odesa region). He has…
…
continue reading

1
Privacy in the age of robotics: A discussion with Erin Relford
36:48
36:48
Play later
Play later
Lists
Like
Liked
36:48Autonomous robots with embedded artificial intelligence are growing more common across industry sectors. So-called “embodied AI,” collects vast amounts of data through its sensors and changes how humans interact with technology. As embodied AI becomes more common and continues to drive innovation, it also creates new challenges for ethical uses of …
…
continue reading

1
„China in 25": Xis Reisediplomatie, Chinas Wirtschaft im 1. Quartal und deutsche Unternehmen
26:17
26:17
Play later
Play later
Lists
Like
Liked
26:17„China in 25“ – in maximal 25 Minuten sprechen Mikko Huotari, Bernhard Bartsch und Claudia Wessling über aktuelle Entwicklungen in China. In dieser Folge geht es um die Reisediplomatie von Partei- und Staatschef Xi Jinping, der sich bei Besuchen in Südostasien darum bemüht hat, Unterstützer im Handelskrieg mit den USA zu gewinnen. Wir sprechen auch…
…
continue reading

1
Lawfare Daily: Cybersecurity Challenges and Opportunities
32:03
32:03
Play later
Play later
Lists
Like
Liked
32:03For today's episode, Lawfare Foreign Policy Editor Daniel Byman interviewed Michael Sulmeyer, who was the top Defense official for all aspects of cyber policy in the Biden administration. Sulmeyer discusses the cyber threat landscape, different roles and missions, how Artificial Intelligence might be leveraged, and the key role of allies in cyberde…
…
continue reading

1
Mic Drop: The Hackalorian: A careful student strikes back
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30Meet Mando: an IT guy by day, cybercrime fighter by night. And his mentor? One of the most prolific data thieves ever. Together, they’re rewriting the rules of digital justice. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
Silicon Bites #133 - Trump Implores his 'Friend' Vladimir After Murderous Assault on Kyiv and Cities
10:30
10:30
Play later
Play later
Lists
Like
Liked
10:30Edition No133 | 24-04-2025 - The US is on the verge of exiting the so-called peace process. It’s become ever harder for him to hide the blatant alignment of his administration with Russia’s goal and objectives, Russian strategies and narratives. As we’ve said in, multiple recent episodes, it’s been all carrots for the Kremlin, and all sticks for Ze…
…
continue reading

1
681. Konstantin Samoilov - Putin Regime Crisis - Russia is Running Out of Money and Time
49:23
49:23
Play later
Play later
Lists
Like
Liked
49:23Welcome to our monthly conversation with Konstantin, who is one of the most respected voices on YouTube about what is happening Inside Russia. Konstantin Samoilov is a well-known YouTuber whose channel ‘Inside Russia’ comments insightfully on Russia’s decent into authoritarianism over the last few years. But now, like many others, he’s outside Russ…
…
continue reading

1
#259 End of Windows 10: What Businesses Must Know Before 2025
33:27
33:27
Play later
Play later
Lists
Like
Liked
33:27Dr. Darren and Denis O'Shea discuss the impending end of support for Windows 10 and its implications for small and mid-sized companies. They explore the challenges of upgrading to Windows 11, the importance of modern IT infrastructure, and the role of managed service providers in navigating these changes. The discussion also touches on the impact o…
…
continue reading

1
Protecting People, Not Just Perimeters with Andrey Suzdaltsev
45:21
45:21
Play later
Play later
Lists
Like
Liked
45:21AI is reshaping the cybersecurity battlefield, and cyber adversaries are getting smarter. In this episode, Ron Eddings welcomes Andrey Suzdaltsev, Co-Founder and CEO of Brightside AI, for a look into the evolution of social engineering, AI’s role in personalized phishing, and how Brightside is turning the tables with automation and human-centric pr…
…
continue reading

1
#258 Supermicro: Pioneering Data Center Innovations
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49Dr. Darren interviews Thomas Jorgensen from Supermicro. With over 30 years of experience in acceleration technology, Thomas Jorgensen brings a wealth of knowledge to the table. He shares his insights on the evolution of computing, the shift towards AI and video as primary technology drivers, the importance of pre-trained AI models for businesses, a…
…
continue reading

1
Lawfare Daily: Ideological Exclusions and Deportations with Julia Rose Kraut
52:40
52:40
Play later
Play later
Lists
Like
Liked
52:40On today’s episode, Julia Rose Kraut, author of the book “Threat of Dissent: A History of Ideological Exclusion and Deportation in the United States,” joins Lawfare Managing Editor Tyler McBrien to talk about that book, originally published in 2020, and how it can help us make sense of the Trump administration’s recent immigration and deportation p…
…
continue reading

1
The China-US trade war and implications for the EU, with Jacob Gunter
35:40
35:40
Play later
Play later
Lists
Like
Liked
35:40Global tariffs introduced by the US government under the second Trump administration on April 2nd have rocked global markets. While they have been reduced to a blanket rate of 10 percent a week later, they have increased for China to 145 percent. In retaliation, the Chinese government raised tariffs on all US goods to 125 percent. Johannes Heller-J…
…
continue reading

1
Big tech, big trouble, and a dash of DORA.
49:06
49:06
Play later
Play later
Lists
Like
Liked
49:06This week we are joined by Avani Desai, CEO of Schellman, who is talking about what we can expect now that Digital Operational Resilience Act (DORA) is in effect. Ben’s got the story of how a federal judge ruled that Google broke antitrust laws to maintain its dominance in online advertising, marking the second major legal blow in a year that could…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are inc…
…
continue reading

1
From SOCs to Threat Detection Engineering: Crafting Better Security Responses - Chris Kulakowski
20:03
20:03
Play later
Play later
Lists
Like
Liked
20:03In this episode of the Security Repo Podcast, Chris Kulakowski, a seasoned detection engineer from IBM, delves into the complexities of threat detection, from writing detection rules to collaborating with red teams for proactive security strategies. He shares insights on prioritizing security risks, the evolving role of AI in cybersecurity, and the…
…
continue reading

1
680. Stream: It's Over - Trump's Dumb Deal is Dead (Probably on Arrival and by Design to Blame Ukraine)
1:29:05
1:29:05
Play later
Play later
Lists
Like
Liked
1:29:05Easter Pysanky: Silicon Curtain https://car4ukraine.com/campaigns/easter-pysanky-silicon-curtainCar for Ukraine has joined forces with a group of influencers, creators, and news observers during this special Easter season. In peaceful times, we might gift a basket of pysanky (hand-painted eggs), but now, we aim to deliver a basket of trucks to our …
…
continue reading

1
679. Glen Grant - The Western Defense Industry is Broken in an Age of Rapidly Evolving Drone Warfare
43:00
43:00
Play later
Play later
Lists
Like
Liked
43:00Glen Grant worked as a defence and reform expert in Ukraine working for the Ukrainian Institute for the Future. He is also a Senior Fellow in the UK Institute for Statecraft on Building Integrity Initiative countering Russian influence. Glen graduated from the Royal Military Academy Sandhurst, the Junior Staff Course Warminster and the Joint Staff …
…
continue reading

1
BreachForums Down: Hacktivist Attack or FBI Crackdown?
24:15
24:15
Play later
Play later
Lists
Like
Liked
24:15Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and John as they discuss: BreachForums Down: Dark Storm Team Takes Credit A Potential New Vulnerability in SAP NetWeaver Exploit User Targets Salesforce Data ReliaQuest Research: Understanding Chinese Espionage Strategies Kim Bromley: Senior Cyber …
…
continue reading

1
Rational Security: “The More You DOGE” Edition
1:22:19
1:22:19
Play later
Play later
Lists
Like
Liked
1:22:19This week, Scott sat down with his Lawfare colleagues Anna Bower, Tyler McBrien, and Kevin Frazier to talk through the week’s big national security news, including: “Aliens vs. Predators.” Despite forceful legal pushback—including by the U.S. Supreme Court—the Trump administration is working hard to continue its campaign to remove foreign aliens it…
…
continue reading

1
Social Media Smoke: Razzlekhan, Dutch, and the $4 Billion Heist
23:27
23:27
Play later
Play later
Lists
Like
Liked
23:27When over 100,000 Bitcoin went missing in 2016, no one suspected the culprits: a quiet, mild-mannered developer and his ostentatious entrepreneur/rapper wife with a wacky social media presence. Meet Razzlekhan and Dutch, the most unlikely thieves in the history of crime. Resources: Razzlekhan and husband guilty of $4.5bn Bitcoin launder Bitcoin Plu…
…
continue reading

1
The Role of AI in Ad Tech - Digital CxO Podcast Episode 119
14:07
14:07
Play later
Play later
Lists
Like
Liked
14:07Amanda Razani speaks with Mike Novosel, VP of strategic partnerships at Stack Adapt, about the role of AI in Ad Tech, use cases, and what the future may hold.By Techstrong Group
…
continue reading

1
Lawfare Daily: Mikhail Zygar on Putin, the Russia-Ukraine War, and Press Freedom
50:18
50:18
Play later
Play later
Lists
Like
Liked
50:18On today's episode, Mikhail Zygar, a renowned Russian journalist living in exile in the U.S., the author of multiple books on Vladimir Putin, and the author of The Last Pioneer substack, joined Lawfare Associate Editor Olivia Manes to discuss his experience as the founder of one of the last independent Russian media channels, TV Rain. They talked a…
…
continue reading

1
The Rise of Fast Flux and its Threat to National Security - Ep 146
16:56
16:56
Play later
Play later
Lists
Like
Liked
16:56In this episode of Reimagining Cyber, Tyler Moffitt, Senior Security Analyst at OpenText Cybersecurity, explores the evolution of fast flux — a once obscure spamming tactic that has now become a serious national security concern. Learn how this evasive DNS technique enables ransomware groups and nation-state actors to stay resilient, hide their inf…
…
continue reading

1
678. Jake Broe - Global Oil Price Collapsing Due to Trump's Tariffs - It's a Disaster for Putin's Economy
59:47
59:47
Play later
Play later
Lists
Like
Liked
59:47Jake Broe is a United States Air Force veteran who served for six years as a Nuclear and Missile Operations Officer. But you may know him better as one of the most prominent voices on YouTube throughout the war, someone with absolute moral clarity about who the victim of the war is – spoilers, it’s Ukraine – and who brings direct military experienc…
…
continue reading

1
Beyond the Blinky Lights: Why Security Governance Drives Technology with Bryant Tow
46:50
46:50
Play later
Play later
Lists
Like
Liked
46:50In this eye-opening episode of SecureTalk, host Justin Beals welcomes Bryant Tow, Chief Security Officer at LeapFrog Services, to discuss why technology alone can't solve cybersecurity challenges. Bryant reveals how the "Ring of Security" concept shows that up to half of your attack surface lies outside of technology—in governance, policies, people…
…
continue reading

1
Mastering Cyber Risk: Matthew Alderman on Cybersecurity, Leadership & Building CyberSaint
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16Send us a text Join Joe as he reconnects with Matthew Alderman, Chief Product Officer at CyberSaint, in this insightful episode of the podcast! With over 250 episodes under his belt, Joe dives deep with Matthew, a cybersecurity veteran, podcast host, and advisor, to explore: CyberSaint’s Game-Changing Approach: How CyberSaint uses historical loss d…
…
continue reading

1
E045 - Dialed In: Telemarketing, Compliance, and Consumer Protection
48:12
48:12
Play later
Play later
Lists
Like
Liked
48:12Telemarketing compliance isn’t exactly the hottest topic in tech circles… but maybe it should be. In this episode, Milou and Brian sit down with Kevin Mayfield, Manager of Marketing Compliance at CompliancePoint, to dig into the often-overlooked world of do-not-call laws, TCPA risks, and the real impact of telemarketing rules on tech companies (yes…
…
continue reading

1
Lawfare Daily: Chris Hughes on His New Book, ‘Marketcrafters’
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44Chris Hughes, author of “Marketcrafters” and co-founder of the Economic Security Project, joins Kevin Frazier, AI Innovation and Law Fellow at Texas Law and Contributing Editor at Lawfare, to discuss his book and its implications at a time of immense economic uncertainty and political upheaval. The duo explore several important historical case stud…
…
continue reading
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 Nove…
…
continue reading
This week, how a global game of cat and mouse led to a friendship—and an unexpected redemption. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
Driving Multi-Modal Retail and Healthcare CX - with Brett Kiley of CVS Health
18:38
18:38
Play later
Play later
Lists
Like
Liked
18:38In this episode of the AI in Business Podcast, Brett Kiley, Executive Director of Customer Experience and Client Solutions at CVS Health, joins us for a compelling discussion on the evolving landscape of customer interactions. With over two decades of experience, Brett shares how CVS navigates the challenges of personalization, efficiency, and seam…
…
continue reading