Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
30-Day InfoSec, a monthly information security recap show for the latest news, stories, and happenings from around the cybersecurity community.
…
continue reading
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
…
continue reading
SecTools Podcast is a series of audio podcast featuring free or opensource tool authors from Information Security industry, sharing their interesting experience on developing and maintaining amazing tools for the security community. Hosted by Sanoop Thomas (s4n7h0) https://infoseccampus.com https://twitter.com/InfoSecCampus
…
continue reading
Welcome to the Razorwire podcast where we share information, best practices and up to date news in cyber security and infosec. Our mission is to help you become a better cyber security professional and support our vision of creating an agile community of cyber professionals who are stronger than ever before. This show is first and foremost about sharing knowledge and benefiting from collaboration. We bring you the advice and wisdom of both your host, James Rees, and his guests to build on th ...
…
continue reading
CyberSpeaksLIVE is an InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeakslive.
…
continue reading
Welcome to Security Happy Hour, where we interview new and established members of the cybersecurity community. In this show we cover where guests have come from and where they want to go, as well as current events and other security related items.
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
Every Tuesday, NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
…
continue reading
Inspirational stories of black women in tech. Support this podcast: https://podcasters.spotify.com/pod/show/frauvis/support
…
continue reading

1
Mark & Spencer CyberAttack, SK Telecom Hacked, Lemonade Breach, Russian Cyber Sabotage
15:50
15:50
Play later
Play later
Lists
Like
Liked
15:50🎙️ Mark & Spencer CyberAttack, SK Telecom Hacked, Lemonade Breach, Russian Cyber Sabotage 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 901: Today’s episode will discuss the latest news as Mark & Spencer CyberAttack more news below: · Baltimore public school ransomware · Cookie Bi…
…
continue reading

1
Japan Trading Account Hack, Windows NTLM Vulnerability Exploited, North Korea Cyberattacks, Info Sharing Bill
18:08
18:08
Play later
Play later
Lists
Like
Liked
18:08🎙️ Japan Trading Account Hack, Windows NTLM Vulnerability Exploited, North Korea Cyberattacks, Info Sharing Bill 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 900: Today’s episode will discuss the latest news as Japan Trading Account Hack more news below: · Abilene, TX Cyberattack…
…
continue reading

1
Data Minimization Means We Don’t Tell You What We’re Collecting
41:53
41:53
Play later
Play later
Lists
Like
Liked
41:53All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series, and Andy Ellis, partner, YL Ventures. Joining us is Mandy Huth, svp, CISO, Ultra Clean Technology. In this episode: Start with good defaults Building talent bridges Don’t forget the humans Differentiating wit…
…
continue reading

1
What’s Hot in AI Security at RSA Conference 2025?
24:14
24:14
Play later
Play later
Lists
Like
Liked
24:14Send us a text What’s really hot at RSA Conference 2025? MLSecOps Community Manager Madi Vorbrich sits down with Protect AI Co‑Founder Daryan “D” Dehghanpisheh for a rapid rundown of must‑see sessions, booth events, and emerging AI‑security trends—from GenAI agents to zero‑trust AI and million‑model scans. Use this episode to build a bullet‑proof R…
…
continue reading

1
Hertz Cleo Data Breach, Shadow AI Usage, ClickFix Goes Nation State, Apple ZeroDays Patched
19:48
19:48
Play later
Play later
Lists
Like
Liked
19:48🎙️ Hertz Cleo Data Breach, Shadow AI Usage, ClickFix Goes Nation State, Apple ZeroDays Patch 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 899: Today’s episode will discuss the latest news as Hertz Cleo Data Breach more news below: · Ahold Delhaize USA Ransomware · China Targets R…
…
continue reading

1
Vibe Coding: Creativity Meets Risk in the Age of AI-Driven Development | A Conversation with Izar Tarandach | Redefining CyberSecurity with Sean Martin
35:52
35:52
Play later
Play later
Lists
Like
Liked
35:52⬥GUEST⬥ Izar Tarandach, Sr. Principal Security Architect for a large media company | On LinkedIn: https://www.linkedin.com/in/izartarandach/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In …
…
continue reading

1
Tariffs Tech Tensions and Cyber Warfare The Practitioner Playbook
17:36
17:36
Play later
Play later
Lists
Like
Liked
17:36Tariffs Tech Tensions and Cyber Warfare The Practitioner Playbook James is on vacation this week, so we pre-recorded this week’s episode on amazing topics that matter based on your feedback. President Trump’s newly escalated tariffs may be aimed at economic revival, but they’re also triggering a supply‑chain shake‑up that will redefine cybersecurit…
…
continue reading

1
Unpacking the Cloud Security Alliance AI Controls Matrix
35:53
35:53
Play later
Play later
Lists
Like
Liked
35:53Send us a text In this episode of the MLSecOps Podcast, we sit down with three expert contributors from the Cloud Security Alliance’s AI Controls Matrix working group. They reveal how this newly released framework addresses emerging AI threats—like model poisoning and adversarial manipulation—through robust technical controls, detailed implementati…
…
continue reading

1
Entering infosec as an outsider! Tips from a librarian turned cyber analyst
43:27
43:27
Play later
Play later
Lists
Like
Liked
43:27A librarian and an OSINT analyst may have more in common than you realize. That’s how Tracy Maleeff found her way into cyber and made a name as InfoSec Sherpa.By Authentic8
…
continue reading

1
Rebuilding Cybersecurity: A New Global Strategy Changing the Cyber Paradigm
16:54
16:54
Play later
Play later
Lists
Like
Liked
16:54Rebuilding Cybersecurity: A New Global Strategy Changing the Cyber Paradigm In this eye-opening episode, James Azar dissects the unsustainable rise of cybercrime—now at six trillion dollars—and demands a radical approach to defending our digital frontier. He breaks down the pitfalls of outdated technology, the shortcomings of regulatory efforts, an…
…
continue reading

1
From Facebook-phished to MVR Top 5 with Dhiral Patel
40:15
40:15
Play later
Play later
Lists
Like
Liked
40:15In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Dhiral Patel, Senior Security Engineer at ZoomInfo and one of MSRC’s Most Valuable Researchers (MVR). Dhiral shares how a hacked Facebook account sparked his passion for ethical hacking. From web development to penetration testing, Dhiral has become a top bug…
…
continue reading

1
Unconventional Paths to Cybersecurity (AKA keeping your Nan Safe From Hackers)
41:25
41:25
Play later
Play later
Lists
Like
Liked
41:25How can overcoming personal adversity lead to a successful career in cybersecurity? Welcome to Razorwire, the podcast that delves into the world of cybersecurity by sharing the journeys of its most inspiring figures. Join us for a truly heartwarming episode as we welcome Jemma, the brilliant mind behind CultureGem and a passionate champion for secu…
…
continue reading

1
Shadows of the Cyber World: Exposing the Hidden Toll of Online Exploitation
15:16
15:16
Play later
Play later
Lists
Like
Liked
15:16James is on vacation this week, so we pre-recorded this week’s episode on amazing topics that matter based on your feedback. This gripping episode dives deep into the human toll of cyber threats—revealing how platforms can become breeding grounds for sextortion, trafficking, and child abuse, all while shining a spotlight on cybersecurity expert Pau…
…
continue reading

1
Welcome to Cybersecurity: Where Everything Is Made Up and the Points Don’t Matter
40:53
40:53
Play later
Play later
Lists
Like
Liked
40:53All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis, partner, YL Ventures. Joining us is Mike D’Arezzo, executive director of infosec and GRC, Wellstar Health Systems. In this episode: The shift left myth Reconsidering CISO evaluations The power …
…
continue reading

1
Agentic AI: The Future of Autonomous Cyber Defense and Business Special Episode
15:16
15:16
Play later
Play later
Lists
Like
Liked
15:16James is on vacation this week, so we pre-recorded this week’s episode on amazing topics that matter based on your feedback. In this episode, we explore how Agentic AI—autonomous, decision-making artificial intelligence—is reshaping cybersecurity and business operations at lightning speed. From thwarting ransomware in seconds to handling customer i…
…
continue reading

1
Oracle Now Denies Cloud Breach, Nissan Leaf Hacked, Interim NSA Director Hartman Appears in Senate
23:18
23:18
Play later
Play later
Lists
Like
Liked
23:18🎙️ Oracle Now Denies Cloud Breach, Nissan Leaf Hacked, Interim NSA Director Hartman Appears in Senate 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 895: Today’s episode will discuss the latest news as Oracle Now Denies Cloud Breach more news below: · Sensata Disrupted by Ransomwar…
…
continue reading

1
Treasury Attacker Lurked Over a Year, Microsoft ZeroDay, Russian Target RDP, Patch Tuesday Breakdown
21:27
21:27
Play later
Play later
Lists
Like
Liked
21:27🎙️ Treasury Attacker Lurked Over a Year, Microsoft ZeroDay, Russian Target RDP, Patch Tuesday Breakdown 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 894: Today’s episode will discuss the latest news as Treasury Attacker Lurked Over a Year more news below: · Microsoft ZeroDay · Pa…
…
continue reading

1
Australian Pension Fund Hack Rattles Consumers, Apple Sues the UK Government, CrushFTP Attacks, Ivanti Again
16:34
16:34
Play later
Play later
Lists
Like
Liked
16:34🎙️ Australian Pension Fund Hack Rattles Consumers, Apple Sues the UK Government, CrushFTP Attacks, Ivanti Again 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 893: Today’s episode will discuss the latest news as Australian Pension Fund Hack Rattles Consumers more news below: · WK K…
…
continue reading

1
With AI, Don’t Think Like a Hacker, Think Like the Whole of Society
39:04
39:04
Play later
Play later
Lists
Like
Liked
39:04All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis, partner, YL Ventures. Joining us is our sponsored guest Nathan Hunstad, director, security at Vanta. In this episode: Thinking like AI Building off a solid foundation Start with ownership Follo…
…
continue reading

1
Oracle Confirms Hack, NSA Director Fired, China Targets Ivanti Again, EncryptHub Behind 618 Breaches
21:18
21:18
Play later
Play later
Lists
Like
Liked
21:18🎙️ Oracle Confirms Hack, NSA Director Fired, China Targets Ivanti Again, EncryptHub Behind 618 Breaches 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 892: Today’s episode will discuss the latest news as Oracle Confirms Hack more news below: · Australia Pension Fund Cyber Attack · …
…
continue reading

1
KidFlix On Dark Web Shut Down, 39 Million Secrets Leaked on GitHub, Royal Mail Data Leak, March M&A News
17:48
17:48
Play later
Play later
Lists
Like
Liked
17:48🎙️ KidFlix On Dark Web Shut Down, 39 Million Secrets Leaked on GitHub, Royal Mail Data Leak, March M&A News 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 891: Today’s episode will discuss the latest news as KidFlix On Dark Web Shut Down more news below: · Native Minnesota Tribe Cy…
…
continue reading

1
From Pickle Files to Polyglots: Hidden Risks in AI Supply Chains
41:21
41:21
Play later
Play later
Lists
Like
Liked
41:21Send us a text Join Keith Hoodlet from Trail of Bits as he dives into AI/ML security, discussing everything from prompt injection and fuzzing techniques to bias testing and compliance challenges. Full transcript with links to resources available at https://mlsecops.com/podcast/from-pickle-files-to-polyglots-hidden-risks-in-ai-supply-chains Thanks f…
…
continue reading
From government to private enterprise, counterintelligence can unlock big benefits in cybersecurity. We sit down with a counterintelligence professional to define the practice, and how everyone can benefit by employing it.By Authentic8
…
continue reading

1
North Korean IT Army Expends to Europe, Nakasone Points to China as Major Threat, Cyber Reporting
17:07
17:07
Play later
Play later
Lists
Like
Liked
17:07🎙️ North Korean IT Army Expends to Europe, Nakasone Points to China as Major Threat, Cyber Reporting 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 890: Today’s episode will discuss the latest news as North Korean IT Army Expends to Europe more news below: · UK Sets out Cyber Repor…
…
continue reading

1
AI & the Hunt for Hidden Vulnerabilities with Tobias Diehl
35:25
35:25
Play later
Play later
Lists
Like
Liked
35:25In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by security researcher Tobias Diehl, a top contributor to the Microsoft Security Research Center (MSRC) leaderboards and a Most Valuable Researcher. Tobias shares his journey from IT support to uncovering vulnerabilities in Microsoft products. He discusses his p…
…
continue reading

1
Mastering the Art of Communication in InfoSec
42:59
42:59
Play later
Play later
Lists
Like
Liked
42:59In this latest episode of Razorwire, I sit down with the brilliant Stefania Chaplin to explore the often overlooked yet crucial skill of effective communication in information security. Throughout our conversation, we discuss why communication matters so much in our field, especially during critical moments when tensions run high. Stefania brings h…
…
continue reading

1
Moscow Subway Disruption, Check Point Hack, Samsung Customer Data Leaks, Canadian Arrested for Texas GOP Hack
21:05
21:05
Play later
Play later
Lists
Like
Liked
21:05🎙️ Moscow Subway Disruption, Check Point Hack, Samsung Customer Data Leaks, Canadian Arrested for Texas GOP Hack 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 889: Today’s episode will discuss the latest news as Moscow subway disruption ensue more news below: · Chinese Security Ex…
…
continue reading

1
This Security Control Is So Good We Don’t Even Have to Turn It On (LIVE in Clearwater, FL)
45:00
45:00
Play later
Play later
Lists
Like
Liked
45:00All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Christina Shannon, CIO, KIK Consumer Products. Joining them is Jim Bowie, CISO, Tampa General Hospital. In this episode: A journey, not a destination The difference between pressure and stress Fighting com…
…
continue reading

1
Sams Club Breach Claims, Oracle Health Breach, Solar Systems Expose Grid Hacking, Splunk Patches
20:08
20:08
Play later
Play later
Lists
Like
Liked
20:08🎙️ Sams Club Breach Claims, Oracle Health Breach, Solar Systems Expose Grid Hacking, Splunk Patches 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 888: Today’s episode will discuss the latest news as Sams Club Breach Claims more news below: · FireFox Flaw Similar to Chrome Zeroday …
…
continue reading

1
Oracle Customer Confirms Data Stolen in Breach, Supply Chain Breach Fine, Hyper V Server Ransomware
18:16
18:16
Play later
Play later
Lists
Like
Liked
18:16🎙️ Oracle Customer Confirms Data Stolen in Breach, Supply Chain Breach Fine, Hyper V Server Ransomware 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 887: Today’s episode will discuss the latest news as Oracle Customer Confirms Data Stolen in Breach with more news below: · Streamel…
…
continue reading

1
Google Chrome Sandbox Zeroday, EncryptHub Linked to ZeroDay on Windows, Malaysia Airport Ransomware
15:19
15:19
Play later
Play later
Lists
Like
Liked
15:19🎙️ Google Chrome Sandbox Zeroday, EncryptHub Linked to ZeroDay on Windows, Malaysia Airport Ransomware 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 886: Today’s episode will discuss the latest news as Google Chrome Sandbox Zeroday with more news below: · CrushFTP Patch · VMware P…
…
continue reading

1
Banned Chinese Telecom Still In operations, 23andme Files Bankruptcy, Ukraine Rail Offline after Cyberattack
16:25
16:25
Play later
Play later
Lists
Like
Liked
16:25🎙️ Banned Chinese Telecom Still In operations, 23andme Files Bankruptcy, Ukraine Rail Offline after Cyberattack 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 885: Today’s episode will discuss the latest news as Banned Chinese Telecom Still In operations with more news below: · Ant…
…
continue reading

1
The Security Incident Has Been Upgraded From “Ouch” to “Boiiiing” (LIVE in Orlando, FL)
42:01
42:01
Play later
Play later
Lists
Like
Liked
42:01All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Trina Ford, CISO, iHeartMedia. Joining us is our sponsored guest Rob Allen, chief product officer, ThreatLocker. This episode was recorded in front of a live audience at Zero Trust World in Orlando, Florid…
…
continue reading

1
Building and Securing Intelligent Workflows: Why Your AI Strategy Needs Agentic AI Threat Modeling and a Zero Trust Mindset | A Conversation with Ken Huang | Redefining CyberSecurity with Sean Martin
43:10
43:10
Play later
Play later
Lists
Like
Liked
43:10⬥GUEST⬥ Ken Huang, Co-Chair, AI Safety Working Groups at Cloud Security Alliance | On LinkedIn: https://www.linkedin.com/in/kenhuang8/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In this e…
…
continue reading

1
Cybersecurity Policy Reform, Coinbase Target of Supply Chain Attack, Veeam RCE Bug Patch Now
21:26
21:26
Play later
Play later
Lists
Like
Liked
21:26🎙️ Cybersecurity Policy Reform, Coinbase Target of Supply Chain Attack, Veeam RCE Bug Patch Now 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 884: Today’s episode will discuss the latest news as Cybersecurity Policy Reform with more news below: · Root Cause of GitHub Supply Chain …
…
continue reading

1
Corporate Spying Highlights Insider Threat Risks, Ukraine Targeted in new Attack, Whatsapp ZeroDay
18:10
18:10
Play later
Play later
Lists
Like
Liked
18:10Corporate Spying Highlights Insider Threat Risks, Ukraine Targeted in new Attack, Whatsapp ZeroDay 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 883: Today’s episode will discuss the latest news as Corporate Spying Highlights Insider Threat Risks with more news below: · Pennsylvan…
…
continue reading

1
Rethinking AI Red Teaming: Lessons in Zero Trust and Model Protection
36:52
36:52
Play later
Play later
Lists
Like
Liked
36:52Send us a text Full transcript with links to resources available at https://mlsecops.com/podcast/rethinking-ai-red-teaming-lessons-in-zero-trust-and-model-protection This episode is a follow up to Part 1 of our conversation with returning guest Brian Pendleton, as he challenges the way we think about red teaming and security for AI. Continuing from…
…
continue reading
Meet the new hosts of NeedleStack. Robert Vamosi is a CISSP and award-winning journalist. AJ Nash has two decades of experience in the Intelligence community. Together they will host new episodes of NeedleStack, with an array of amazing guests.By Authentic8
…
continue reading

1
AI is Turbocharging Cyber Crime, Wiz Scores $32B from Google, China Disclosing Data Breaches
19:56
19:56
Play later
Play later
Lists
Like
Liked
19:56🎙️ AI is Turbocharging Cyber Crime, Wiz Scores $32B from Google, China Disclosing Data Breaches 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 882: Today’s episode will discuss the latest news as AI is Turbocharging Cyber Crime with more news below: · State Attackers Exploit · GitH…
…
continue reading

1
Bug Hunting from the Beach with Brad Schlintz
38:43
38:43
Play later
Play later
Lists
Like
Liked
38:43In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Brad Schlintz, independent security researcher and bug bounty hunter. Brad shares how he transitioned from a decade-long career as a software engineer to hacking Microsoft products while traveling the world with his wife. He recounts his early days tinkering …
…
continue reading

1
Spotlight on Technology: Mastering Attack Surface Management
48:45
48:45
Play later
Play later
Lists
Like
Liked
48:45In our latest episode, join me, James Rees, for a chat with Nick Palmer from Censys about the critical importance of attack surface management. With 25 years of experience in the industry, Nick explains how today's threat landscape has evolved dramatically, with attackers now discovering vulnerabilities within hours rather than weeks. We explore th…
…
continue reading

1
Telegram CEO Durov Leaves France, LockBit & Blackbasta Ransomware News, Github OAuth Hijack
18:16
18:16
Play later
Play later
Lists
Like
Liked
18:16🎙️ Telegram CEO Durov Leaves France, LockBit & Blackbasta Ransomware News, Github OAuth Hijack 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 881: Today’s episode will discuss the latest news as Telegram CEO Durov Leaves France with more news below: · Exploit Code For Apache Tomcat…
…
continue reading

1
How to Best Maintain a Healthy Work-Work Balance in Cybersecurity
40:56
40:56
Play later
Play later
Lists
Like
Liked
40:56All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis, partner, YL Ventures. Joining us is Edward Contreras, senior evp and CISO, Frost Bank. In this episode: A gradual language shift Don’t reflexively rise and grind Lean into focus Gauging the unm…
…
continue reading

1
Detection vs. Noise: What MITRE ATT&CK Evaluations Reveal About Your Security Tools | A Conversation with Allie Mellen | Redefining CyberSecurity with Sean Martin
36:06
36:06
Play later
Play later
Lists
Like
Liked
36:06⬥GUEST⬥ Allie Mellen, Principal Analyst, Forrester | On LinkedIn: https://www.linkedin.com/in/hackerxbella/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On ITSPmagazine: https://www.itspmagazine.com/sean-martin ⬥EPISODE NOTES⬥ In this episode, Allie Mellen, Principal Analyst on the Security and…
…
continue reading

1
Nvidia Riva Vulnerability, GitHub Supply Chain Attack, Telecom Cyber Espionage, Superblack Ransomware
16:50
16:50
Play later
Play later
Lists
Like
Liked
16:50🎙️ Nvidia Riva Vulnerability, GitHub Supply Chain Attack, Telecom Cyber Espionage, Superblack Ransomware 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 880: Today’s episode will discuss the latest news as Nvidia Riva Vulnerability Abuse AI Services with more news below: · Booking P…
…
continue reading

1
AI Security: Map It, Manage It, Master It
41:18
41:18
Play later
Play later
Lists
Like
Liked
41:18Send us a text Full transcript with links to resources available at https://mlsecops.com/podcast/ai-security-map-it-manage-it-master-it In part one of our two-part MLSecOps Podcast episode, security veteran Brian Pendleton takes us from his early hacker days to the forefront of AI security. Brian explains why mapping every AI integration is essenti…
…
continue reading

1
China’s Volt Typhoon in Network for 300 Days, Chinese Router Attacks Continues, Zoom Vulnerability
18:30
18:30
Play later
Play later
Lists
Like
Liked
18:30🎙️ China’s Volt Typhoon in Network for 300 Days, Chinese Router Attacks Continues, Zoom Vulnerability 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 879: Today’s episode will discuss the latest news as China’s Volt Typhoon in Network for 300 Days with more news below: · Medusa Rans…
…
continue reading

1
6 Microsoft Zero days Patch Now, Patch Tuesday, Apple Webkit Exploit, New CISA Director Nominated
20:40
20:40
Play later
Play later
Lists
Like
Liked
20:40🎙️ 6 Microsoft Zero days Patch Now, Patch Tuesday, Apple Webkit Exploit, New CISA Director Nominated 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 878: Today’s episode will discuss the latest news as 6 Microsoft Zero days Patch Now with more news below: · Patch Tuesday Recap · Nor…
…
continue reading

1
The Cyber Resilience Act: How the EU is Reshaping Digital Product Security | A Conversation with Sarah Fluchs | Redefining CyberSecurity with Sean Martin
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10⬥GUEST⬥ Sarah Fluchs, CTO at admeritia | CRA Expert Group at EU Commission | On LinkedIn: https://www.linkedin.com/in/sarah-fluchs/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martin ⬥EPISODE NOTES⬥ The Europ…
…
continue reading

1
Massive Cyberattack on X, Exploit of PHP Vulnerability, MGM Ransomware Case Dismissed, Record Fraud
18:29
18:29
Play later
Play later
Lists
Like
Liked
18:29🎙️ Massive Cyberattack on X, Exploit of PHP Vulnerability, MGM Ransomware Case Dismissed, Record Fraud 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 877: Today’s episode will discuss the latest news as Massive Cyberattack on X with more news below: · Industrial Attacks due to Scad…
…
continue reading