Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Security Engineers Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Technical interviews about software topics.
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
[email protected] (SE-Radio Team)
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. SE Radio is brought to you by the IEEE Computer Societ ...
…
continue reading
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
A weekly podcast about the electronics industry. Occasional guests. Lots of laughs.
…
continue reading
An off-the-cuff radio show and podcast for electronics enthusiasts and professionals. Note: this is the "show only" version of the feed. To see the show notes, check out the main podcast feed: https://theamphour.com/feed/
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
A podcast that helps us understand human vulnerability and how we can defend against the attacks that exploit us.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Get the edge with Hidden Forces where media entrepreneur and financial analyst Demetri Kofinas gives you access to the people and ideas that matter, so you can build financial security and always stay ahead of the curve.
…
continue reading
We share the most critical perspectives, habits & examples of great software engineering leaders to help evolve leadership in the tech industry. Join our community of software engineering leaders @ www.sfelc.com!
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
We created Enginears as a place to share Engineering stories and to aid knowledge sharing and discovery into how companies build their products. Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Stay up to date with the Nextcloud community!
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
The Platform Engineering Podcast is a show about the real work of building and running internal platforms — hosted by Cory O’Daniel, longtime infrastructure and software engineer, and CEO/cofounder of Massdriver. Each episode features candid conversations with the engineers, leads, and builders shaping platform engineering today. Topics range from org structure and team ownership to infrastructure design, developer experience, and the tradeoffs behind every “it depends.” Cory brings two deca ...
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
Building AI: Securing the Future of Artificial Intelligence is the podcast for leaders navigating the security challenges of modern AI infrastructure. Host David Yacov speaks with CISOs, security engineers, and enterprise leaders building secure AI systems, from privacy-preserving synthetic data and MLOps security to AI governance, regulatory compliance, and infrastructure risk management. If you're securing AI infrastructure, managing AI compliance, or building trustworthy AI systems, this ...
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
Join Scott Hanselman every Friday as he engages one-on-one with the engineers who build the services that power Microsoft Azure as they demo capabilities, answer Scott's questions, and share their insights. Follow us at: friday.azure.com.
…
continue reading
...where Tech, Engineering, and The Culture intersects.
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
News and interviews covering all corners of infrastructure, from rail to roads to energy to tunnels and much more, with guests from all around the wide world of civil engineering chatting with NCE news editor Rob Hakimian and the rest of the NCE team
…
continue reading
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
…
continue reading
Your exploration inside Lawrence Livermore National Laboratory. Hear untold stories, meet boundary-pushing pioneers and get unparalleled access to groundbreaking science and technology. From national security challenges to computing revolutions, discover the innovations that are shaping tomorrow, today.
…
continue reading
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
…
continue reading
Little Fluffy PolyClouds: The Data Engineering Playbook is your essential guide to building cloud-agnostic data infrastructure. We provide practical, step-by-step strategies for designing and deploying resilient data systems across all major platforms, including AWS, Azure, and GCP.
…
continue reading
An improved audio format version of our written content. Get your defence and security perspectives now through this podcast.
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn't do) How the pricing model works Then, our securi ...
…
continue reading
Tech Takes podcast knows what matters to you. Thought-provoking interviews with industry leaders, government officials, academia and influencers on hot topics relevant to the engineering and applied science profession and the technologies that shape the world around us.
…
continue reading
The Security Podcast of Silicon Valley invites founders, engineers, and security leaders to share how they tackle compliance, growth, and real-world security challenges—turning obstacles into strategic advantages. Brought to you by YSecurity.
…
continue reading
Embedded edge with Maurizio is a podcast show hosted by Maurizio Di Paolo Emilio, who talks to both engineers and executives in the embedded systems design and development industry to gain insights into the embedded systems, technologies and products featured in embedded.com.
…
continue reading
A podcast for Architects and Engineers who want to thrive in this industry by creating more freedom, fulfillment and financial security. Join Scott Zurn, P.E. and guests in uncovering how to restore value and honor to the unique people who choose to be designers and caretakers of our built world and why it’s essential to the future of our society, our industry, and our planet.
…
continue reading
1
How to Build Trust Between GRC and Engineering ft Tristan Ingold, Security GRC Program Manager at Meta
57:19
57:19
Play later
Play later
Lists
Like
Liked
57:19How do you build real trust between GRC and engineering? In this episode of Security & GRC Decoded, host Raj Krishnamurthy welcomes Tristan Ingold, Security GRC Program Manager at Meta. Tristan shares how consulting shaped his approach, why “policing” doesn’t work, and how GRC earns influence by acting as a partner to engineering -- not a blocker. …
…
continue reading
1
Episode 4: The Data Fortress: Securing and Governing Data for the DEA-C01
12:20
12:20
Play later
Play later
Lists
Like
Liked
12:20Lock down your data platform! This is the final domain, Domain 4 (18% of the DEA-C01 exam). We cover essential security best practices: using IAM and Lake Formation for access control, enforcing encryption with KMS (at rest and in transit), and securing network access via VPC and Security Groups.By James
…
continue reading
1
Turning Trust into a Growth Engine with SafeBase by Drata
19:51
19:51
Play later
Play later
Lists
Like
Liked
19:51All links and images can be found on CISO Series. Earning and maintaining customer trust has become increasingly complex as organizations struggle with manual, repetitive security review processes that frustrate customers and slow revenue cycles. Despite decades of talking about customer trust in security, companies still rely on outdated approache…
…
continue reading
1
Ep. 325 - Security Awareness Series - A Crystal Ball for Mitigating Threats With Chris and Carter
32:02
32:02
Play later
Play later
Lists
Like
Liked
32:02Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Carter Zupancich. Chris and Carter explore the evolving landscape of social engineering threats, focusing on the rise of vishing attacks and the role of AI in enhancing these tactics. Their discussion underscores the importance of empowering employees as a human…
…
continue reading
1
API Security: An Emerging Concern in Zero Trust Implementations
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41Application programing interfaces, more commonly known as APIs, are the engines behind the majority of internet traffic. The pervasive and public nature of APIs have increased the attack surface of the systems and applications they are used in. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), McKinley Sconie…
…
continue reading
In this episode, Robby welcomes Dan Cleary, Co-founder and CEO of PromptHub, an organisation focused on enhancing LLM-based applications. He’s also one of the organisers behind the Prompt Engineering Conference, the world’s first event exclusively dedicated to prompt engineering, taking place in London on October 16th. They discuss prompt engineeri…
…
continue reading
1
Arti Lalwani: Supporting and being the change. [Risk Management] [Career Notes]
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28Risk Management and Privacy Knowledge Leader at A-LIGN, Arti Lalwani shares her story from finance to risk management and how she made the transition. Arti started her career in finance after graduating with a finance degree. Quickly learning the field was not for her, she decided to dip her toes into the tech world. She credits her mentors for hel…
…
continue reading
1
Attack of the automated ops. [Research Saturday]
19:40
19:40
Play later
Play later
Lists
Like
Liked
19:40Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vec…
…
continue reading
1
3472: How Estonia is Scaling Space Through Software and Partnerships
31:34
31:34
Play later
Play later
Lists
Like
Liked
31:34In this episode, I sit down in Tallinn with Madis Võõras, Head of the Estonian Space Office at Enterprise Estonia, to unpack how Estonia is carving out a real role in the European space sector through brains, code, and smart partnerships. Madis explains how his team connects Estonian companies with the European Space Agency, brings public investmen…
…
continue reading
This week’s episode started with the usual existential sigh before tumbling straight into the corporate bloodbath. Amazon chopped 14,000 jobs under the noble banner of “embracing AI,” which CEO Andy Jassy insists isn’t about money—despite swimming Scrooge McDuck–style in profit. GM’s cutting 1,700 workers, YouTube’s dangling “voluntary” buyouts, an…
…
continue reading
CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Lu…
…
continue reading
1
The Future of Procurement: Real-Time Supply Chain Intelligence
53:20
53:20
Play later
Play later
Lists
Like
Liked
53:20Every product a company ships depends on thousands of tiny decisions happening deep inside the supply chain. But most organizations are still making those decisions using stale spreadsheets, fragmented systems, and guesswork. In this episode, we explore how AI-driven procurement intelligence is changing the game – moving teams from reactive firefig…
…
continue reading
1
0073: Sora 2, VO3, And The Next Wave Of Social Video
1:28:34
1:28:34
Play later
Play later
Lists
Like
Liked
1:28:34What happens when a single selfie and a ten-second voice clip can produce a convincing, fully voiced video of “you” on demand? We dive into Sora 2 and why it feels less like a lab demo and more like a social media earthquake. We walk through the creative upsides—fast ideation, brand-friendly explainer reels, and a wild new cameo economy where creat…
…
continue reading
1
What Could Possibly Go Wrong? Safety Analysis for AI Systems
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14How can you ever know whether an LLM is safe to use? Even self-hosted LLM systems are vulnerable to adversarial prompts left on the internet and waiting to be found by system search engines. These attacks and others exploit the complexity of even seemingly secure AI systems. In our latest podcast from the Carnegie Mellon University Software Enginee…
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
continue reading
1
3471: How Estonia Is Defining the Future of Space and Cyber Defense
27:24
27:24
Play later
Play later
Lists
Like
Liked
27:24What role does cybersecurity play when the battlefield extends beyond Earth's atmosphere? In this special episode recorded live in Tallinn for the fifth anniversary of the Software Defined Space Conference, I sit down with Kalev Koidumäe, CEO of the Estonian Defence and Aerospace Industry Association, to explore how software and security are transf…
…
continue reading
Is the AI boom a bubble? What happens if it pops? Economist Jared Bernstein joined FP Live to sound the alarm on the growth and investment in the AI sector. Plus, Ravi’s One Thing on the first Trump-Xi meeting in six years. James Palmer: Trump and Xi Step Back From the Brink—for Now Rishi Iyengar, Christina Lu, and Keith Johnson: What Trump and Xi …
…
continue reading
A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services. Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems. Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrut…
…
continue reading
1
How Do We Measure Our Defenses Against Social Engineering Attacks?
32:55
32:55
Play later
Play later
Lists
Like
Liked
32:55All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining them is their sponsored guest Bobby Ford, chief strategy and experience officer, Doppel. In this episode:…
…
continue reading
1
Building AI Agents on the Frontend with Sam Bhagwat and Abhi Aiyer
57:04
57:04
Play later
Play later
Lists
Like
Liked
57:04Most AI agent frameworks are backend-focused and written in Python, which introduces complexity when building full-stack AI applications with JavaScript or TypeScript frontends. This gap makes it harder for frontend developers to prototype, integrate, and iterate on AI-powered features. Mastra is an open-source TypeScript framework focused on build…
…
continue reading
1
EP05 - Craft Over Magic: How to Deploy AI Systems That Work
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10What happens when strategy consulting meets the trenches of enterprise AI deployment? Dr. Jasper Schwenzow, AI Lead for Defense at deepset, reveals why 70-80% of AI work is unglamorous data cleaning, not magic. From McKinsey to PhD to defense applications, discover why "speaking about the details" separates functional AI systems from expensive demo…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, …
…
continue reading
1
3470: How Netomi is Bringing Humanity Back to AI-Driven Customer Experience
27:16
27:16
Play later
Play later
Lists
Like
Liked
27:16Artificial intelligence has changed how we think about service, but few companies have bridged the gap between automation and genuine intelligence. In this episode of Tech Talks Daily, I'm joined by Puneet Mehta, CEO of Netomi, to discuss how customer experience is evolving in an age where AI doesn't just respond but plans, acts, and optimizes in r…
…
continue reading
Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists’ email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades…
…
continue reading
1
What Germany Can Teach the U.S. About Water and Wastewater Management
20:55
20:55
Play later
Play later
Lists
Like
Liked
20:55In this conversation, Scott Zurn shares insights from his recent trip to Germany, where he was part of a delegation focused on water and wastewater management. The discussion covers the differences in environmental engineering practices between Germany and the United States, highlighting innovative solutions, the role of nonprofit organizations, an…
…
continue reading
1
Are Your Keys Safe? Why HSMs Are Now Essential for Cloud, Quantum, and AI Security
19:19
19:19
Play later
Play later
Lists
Like
Liked
19:19"You have to think about how the online world really operates and how we make sure that data is secure. How can we trust each other in the digital world?" Robert Rogenmoser, the CEO of Securosys, asks. The answer is "encryption and digital signature." According to Robert Rogenmoser, the CEO of Securosys, storing keys insecurely creates immediate ri…
…
continue reading
1
On (Military) Pride and Prejudice and Why We Can't Engineer War
16:46
16:46
Play later
Play later
Lists
Like
Liked
16:46Pride goeth before the fall War starts with a bluster. Whether it is with sacrifices in the temples, parades or press conferences, young men are sent to battle with pomp and ceremony. Then, they storm the forts or the beaches or the hilltops. They die, usually horribly, foolishly, from mistakes historians will later describe as avoidable. Lessons a…
…
continue reading
1
A Systems-Level Guide to High-ROI AI Impact w/ Laura Tacho #234
44:23
44:23
Play later
Play later
Lists
Like
Liked
44:23Businesses are spending millions on AI tools hoping to accelerate time-to-market but aren't seeing organizational-level results. Laura Tacho (CTO @ DX) explains why an "individual productivity" mindset fails and how AI merely accelerates the condition of the system it enters. She provides a framework for leaders to shift to a systems-level approach…
…
continue reading
1
3469: Inside Boston Consulting Group (BCG)'s Global Research on AI at Work
23:50
23:50
Play later
Play later
Lists
Like
Liked
23:50What if the biggest barrier to AI adoption isn't the technology itself, but our ability to learn, adapt, and reskill? That question sits at the heart of my conversation with Sagar Goel, Managing Director and Partner at Boston Consulting Group, who leads the firm's global work on digital workforce development and reskilling. Speaking from Singapore,…
…
continue reading
1
Episode 126: The Future of Materials Discovery with Scott Genin
39:22
39:22
Play later
Play later
Lists
Like
Liked
39:22In Episode 126, Scott Genin, Vice President of Materials Discovery at OTI Lumionics, discusses the advancements and challenges in quantum materials discovery. The conversation covers the limitations of current material simulation methods, the role of AI, and the importance of training the next generation of quantum programmers. Scott emphasizes the…
…
continue reading
WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden’s power grid operator confirms a cyberattack. Italian spyware targets …
…
continue reading
1
SE Radio 692: Sourabh Satish on Prompt Injection
1:04:36
1:04:36
Play later
Play later
Lists
Like
Liked
1:04:36Sourabh Satish, CTO and co-founder of Pangea, speaks with SE Radio's Brijesh Ammanath about prompt injection. Sourabh begins with the basic concepts underlying prompt injection and the key risks it introduces. From there, they take a deep dive into the OWASP Top 10 security concerns for LLMs, and Sourabh explains why prompt injection is the top ris…
…
continue reading
1
The secret world of car hacking with Joseph Cox | VEHICLE SWAPPING VIDEO GAME
1:00:38
1:00:38
Play later
Play later
Lists
Like
Liked
1:00:38Ever wondered how easy it is to hack a car? 🚗💻 This week, returning guest Joseph Cox, a journalist at 404 Media, joins the podcast to dive into the secret world of car hacking. Joseph explains how modern vehicles have become rolling computers, what that means for your privacy, and the surprising ways criminals are breaking into them. In Crash Cours…
…
continue reading
1
The X-Plane Flight Simulator with Ben Supnik
56:26
56:26
Play later
Play later
Lists
Like
Liked
56:26X-Plane is a popular flight simulator developed by Laminar Research. It features a first-principles physics engine, realistic aircraft systems, and a wide variety of aircraft. We wanted to understand the engineering that goes into creating a flight simulator so we invited Ben Supnik on the show. Ben is a software engineer at Laminar and he’s been w…
…
continue reading
1
Identity access management (IAM) (noun) [Word Notes]
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management Audio reference link: “The Wrath of Khan (1982) ‘Kirk’s Response,’” by Russell, YouTube, 16 May 2017.…
…
continue reading
1
The impact of data privacy on cyber. [CISO Perspectives]
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In t…
…
continue reading
1
The Amp Hour #707 - Welding with an HDMI Cable
50:41
50:41
Play later
Play later
Lists
Like
Liked
50:41
…
continue reading
Thanks to our sponsor Blues this week! Visit the Blues store and use the code AMPHOUR to get 10% off your first order of a kit. Capacitors go pop on Dave’s audio setup, the Presonus monitors Ground loops causing HDMI cable sparking Chris was watching Jetman videos and got an ‘Is that real?’ from the kid. We find ourselves asking the same with all t…
…
continue reading
1
3468 From Upwork to Acquisition: How Eden Data Turned Cybersecurity into a Growth Engine
28:11
28:11
Play later
Play later
Lists
Like
Liked
28:11What if your cybersecurity strategy could become your biggest sales advantage? In this episode, I sit down with Taylor Hersom, Founder and CEO of Eden Data, to explore how startups can transform compliance from a box-ticking exercise into a true growth engine. Taylor's journey is remarkable: a former Deloitte executive who quit his job the week bef…
…
continue reading
1
The UN’s big push for global cybercrime rules.
24:41
24:41
Play later
Play later
Lists
Like
Liked
24:41The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of G…
…
continue reading
1
Ep. 326 - The 4th Monday Series - Back From The Dead with Carrie Hatton
29:50
29:50
Play later
Play later
Lists
Like
Liked
29:50Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Carrie Hatton. Carrie lives in Nor…
…
continue reading
1
Securing Your Attack Path with SpecterOps
15:22
15:22
Play later
Play later
Lists
Like
Liked
15:22All links and images can be found on CISO Series. Identity has become the Gordian knot of cybersecurity. Threat actors no longer need to break in. They log in. As organizations manage increasingly complex ecosystems spanning cloud, on-premises, and hybrid environments, the challenge isn't just understanding who has access to what. It's about unders…
…
continue reading