Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Operations Podcasts

show episodes
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
Ubuntu Security Podcast

Ubuntu Security Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
  continue reading
 
Artwork
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Artwork

1
Mac Admins Podcast

Mac Admins Podcast LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
  continue reading
 
Artwork

1
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Artwork

1
SpyTalk

SpyTalk, Jeff Stein

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
  continue reading
 
Artwork

1
Verdict with Ted Cruz

Premiere Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Join Senator Ted Cruz and co-host Ben Ferguson as they break down the most important news stories of the day and reveal what they mean for you. On "Verdict with Ted Cruz,” you will go behind the scenes of the political debates that define our country. "Verdict with Ted Cruz" is being brought to you by Jobs, Freedom, and Security PAC, a political action committee dedicated to supporting conservative causes, organizations, and candidates across the country. In 2022, Jobs, Freedom, and Security ...
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
  continue reading
 
Artwork

1
Now in Android

Now in Android

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android's a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
  continue reading
 
Artwork
 
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
  continue reading
 
Artwork

1
Destination Linux

Deviant Airwaves

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Destination Linux is a weekly show where Ryan, Jill, & guests share their passion for Linux & Open Source. Destination Linux is a show for all experience levels, whether you’re a beginner to Open Source or a Guru of Sudo, this is the podcast for you. Destination Linux covers a wide range of topics from the latest news, discussions on Linux & Open Source, gaming on Linux, unique in-depth interviews and much more!
  continue reading
 
Artwork

1
The Cognitive Crucible

Information Professionals Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
  continue reading
 
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Entry & Exit is a podcast about building, scaling, and exiting security and fire businesses. Hosts Stephen Olmon and Collin Trimble share their journey growing Alarm Masters through acquisitions and organic growth, along with the lessons they’ve learned along the way. From recurring revenue strategies to sales, operations, and M&A, Entry & Exit gives business owners and entrepreneurs an inside look at what it takes to succeed in the security industry. Whether you’re starting your first compa ...
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
Cyber Security America

Joshua R Nicholson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Artwork
 
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
  continue reading
 
Artwork

1
At The Boundary

Global and National Security Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
  continue reading
 
Artwork

1
IT Ops Query

Informa TechTarget

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
This podcast distills the signal from the noise about enterprise IT digital transformation and operations in the era of Agile, DevOps and distributed applications. Interviews feature expert guests in conversation with IT journalism veteran Beth Pariseau, Senior News Writer at Informa TechTarget.
  continue reading
 
Artwork

1
Purpose & Protection

Commissionaires Nova Scotia

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Commissionaires Nova Scotia proudly presents Purpose & Protection, a podcast dedicated to the people behind Canada’s security: veterans, their families, civilians and all those dedicated to keeping our communities safe. Each episode explores the lived experiences of those who’ve served, those who support them, and those shaping the future of Canada’s security landscape. From the frontlines to the home front, you’ll hear stories of resilience, leadership and purpose. As the largest private em ...
  continue reading
 
Artwork

1
Cyber Daily News

Digital Pipelines

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Cyber Daily News is a fast, no nonsense cybersecurity podcast designed for professionals, builders, and anyone who wants to stay ahead of real world threats. Each episode delivers a concise breakdown of the most important cyber incidents, vulnerabilities, exploits, and security trends shaping the day. You will hear clear explanations of breaches, ransomware campaigns, zero day vulnerabilities, nation state activity, and major security advisories, without hype or filler. The focus is on what ...
  continue reading
 
Artwork

1
The Elara Edge

Regia Multimedia Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
  continue reading
 
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
If you wish to know what it's really like to make the life and death decisions portrayed in the movies by James Bond or on TV by Homeland's, Cary Matherson, then Black Spy Podcast is the show for you. If you're interested in the clandestine world of secret intelligence, espionage, counter-terrorism and national security, then this definitely your must listen Podcast! Every week, along with a different successful or famous guest who's always been interested in the secret services, ex officer, ...
  continue reading
 
Artwork

1
Tales From The SOC

Tales From The SOC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
From going undercover on the dark web to hunting down ransomware that doesn’t want to be found, our co-hosts Duck and David bring a unique perspective to real-world cybersecurity. ”Tales from the SOC” is your go-to podcast for exploring the weird and wonderful world of the Security Operations Center. Join us on this journey, because understanding is the first step to securing your world. For more information about our human-led cybersecurity services, head to: https://solcyber.com/
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
Artwork

1
Day Two DevOps

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join hosts Ned Bellavance and Kyler Middleton as they dive deep into the challenges of DevOps from the perspective of seasoned practitioners. You'll hear from expert guests—technical leaders, trainers, and consultants with years of hands-on experience—discussing the nuances of DevOps. From AWS to Azure, networking to security, automation to modern cloud environments, each weekly episode equips you with the insights to confidently address tech and business challenges such as resilience, cost ...
  continue reading
 
Loading …
show series
 
Industrial enterprises are undergoing significant transformation as connected devices reshape the way they operate. IoT platforms provide new opportunities for automation, predictive maintenance, and more efficient device management. But these benefits come with challenges. In this episode of the Security Strategist podcast, host Trisha Pillay spea…
  continue reading
 
In this episode of Purpose & Protection, host Barry Pitcher, CEO of Commissionaires Nova Scotia, speaks with Honourary Colonel Doug Ruck, KC: a pioneer in Canadian public service and a champion for diversity, equity, and inclusion. Doug shares his inspiring journey of breaking barriers, the evolution of Commissionaires, and why representation matte…
  continue reading
 
Cyber Daily News January 8, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- New n8n Vulnerability (CVE-2026-21858) Allows Unauthenticated File Access and RCEhttps://thecyberexpress.com/cve-2026-21858-n8n-webhook-vulnerability/- Australian Insurer Prosura Confirms…
  continue reading
 
Incident Overview ICE agents were conducting operations in Minneapolis when a woman blocked their vehicles and refused repeated commands to exit her car. She allegedly accelerated toward an ICE agent, prompting the officer to fire through the windshield, resulting in her death. The shooting is described as defensive and necessary to prevent harm to…
  continue reading
 
You might recognize Rob Strechay from his appearances on TheCube livestreaming videos during industry conferences, but he's worn many hats in the industry over the years. In this wide-ranging discussion, he looks back at how AI data management evolved in 2025, and predicts that AI "governance, security and data quality are going to be all the rage …
  continue reading
 
A phishing campaign with QR codes rendered using an HTML table Phishing emails are bypassing filters by encoding QR codes as HTML tables. https://isc.sans.edu/diary/A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table/32606 n8n vulnerabilities In recent days, several new n8n vulnerabilities were disclosed. Ensure that …
  continue reading
 
Marina Wyss, Senior Applied Scientist at Twitch, joins Kyler and Ned to discuss her unique path from political science to AI Engineering. Wyss clarifies the difference between AI Engineering and Machine Learning Engineering and offers practical advice for aspiring engineers who want to incorporate data science, AI, and machine learning into their w…
  continue reading
 
Cyber Daily News January 7, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Hackers actively exploit critical RCE flaw in legacy D-Link DSL routershttps://securityaffairs.com/186616/hacking/hackers-actively-exploit-critical-rce-flaw-in-legacy-d-link-dsl-routers.h…
  continue reading
 
Avoid expensive post-close mistakes by running a calm, disciplined first 90 days after acquiring a security or life-safety business. In this episode of Entry & Exit, hosts Stephen Olmon and Collin Trimble break down what actually happens after you close—and why most buyers hurt themselves by moving too fast. Drawing from real acquisitions (and real…
  continue reading
 
Cilia Flores’ Role: Far from being a symbolic first lady, Flores is a mastermind behind corruption and drug trafficking. She was sanctioned by the U.S. Treasury and linked to major criminal activities, including her nephews’ cocaine smuggling. Western Hemisphere Strategy: The discussion emphasizes the Monroe Doctrine and its modern interpretation u…
  continue reading
 
In this episode, Fred Burton sits down with Rich Davis, former Chief Security Officer of United Airlines, to explore the evolution of aviation security and what it takes to manage risk at a truly global scale. Drawing on decades of leadership experience, Rich shares how collaboration, intelligence sharing, and a strong duty of care mindset have res…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love discusses the latest in cybersecurity threats including the rapidly growing Kim Wolf botnet affecting millions of devices, the rising threats to file-sharing environments, and the intersection of cybercrime with physical supply chains. He also covers an audacious hacktivist takedown of white sup…
  continue reading
 
Tool Review: Tailsnitch Tailsnitch is a tool to audit your Tailscale configuration. It does a comprehensive analysis of your configuration and suggests (or even applies) fixes. https://isc.sans.edu/diary/Tool%20Review%3A%20Tailsnitch/32602 D-Link DSL Command Injection via DNS Configuration Endpoint A new vulnerability in very old D-Link DSL modems …
  continue reading
 
President Trump is now “running Venezuela”, but how did we get to this point? Why would a US president want to control Latin America? And is it really all about drugs and oil? Listen as David and Gordon explore the reasons behind Trump’s attack on Venezuela and try to understand why this Latin American country holds so much potential for the future…
  continue reading
 
Meet my friends, Clay Travis and Buck Sexton! If you love Verdict, the Clay Travis and Buck Sexton Show might also be in your audio wheelhouse. Politics, news analysis, and some pop culture and comedy thrown in too. Here’s a sample episode recapping four takeaways. Give the guys a listen and then follow and subscribe wherever you get your podcasts.…
  continue reading
 
In this special documentary episode, Patrick Gray and Amberleigh Jack take a historical dive into hacking in the 1980s. Through the words of those that were there, they discuss life on the ARPANET, the 414s hacking group, the Morris Worm, the vibe inside the NSA and a parallel hunt for German hackers happening at a similar time to Cliff Stoll’s fam…
  continue reading
 
In this special documentary episode, Patrick Gray and Amberleigh Jack take a historical dive into hacking in the 1980s. Through the words of those that were there, they discuss life on the ARPANET, the 414s hacking group, the Morris Worm, the vibe inside the NSA and a parallel hunt for German hackers happening at a similar time to Cliff Stoll’s fam…
  continue reading
 
Cyber Daily News January 6, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- European Commission Investigates Grok AI After Explicit Images of Minors Surfacehttps://thecyberexpress.com/european-commission-investigates-grok-ai/- Critical n8n Vulnerability Allows Ar…
  continue reading
 
Coding pipelines are evolving and AI agents are taking the wheel. In this episode of Pop Goes the Stack, F5's Joel Moses teams up with Buu Lam to dive into “vibe coding”—where tools like Claude Code and GitHub Copilot plan, build, and optimize apps faster than humans can debate lint rules. But is faster better? While agentic AI unlocks game-changin…
  continue reading
 
Trump’s stance on Venezuela’s oil and U.S. role Trump is asserting the U.S. will “run” or strongly direct efforts in Venezuela, with U.S. oil companies going in to rebuild the country’s “broken” oil infrastructure. Trump is quoted saying elections should occur “at the right time” after stabilization. Venezuela’s oil reserves are worth trillions of …
  continue reading
 
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. John Boyd is well known to have formally written down …
  continue reading
 
Risks of OOB Access via IP KVM Devices Recently, cheap IP KVMs have become popular. But their deployment needs to be secured. https://isc.sans.edu/diary/Risks%20of%20OOB%20Access%20via%20IP%20KVM%20Devices/32598 Tailsnitch Tailsnitch is a tool to review your Tailscale configuration for vulnerabilities https://github.com/Adversis/tailsnitch Net-SNMP…
  continue reading
 
2026 has begun. Lets look forwards and no backwards and talk about what we have in hope for the year. What are we hoping to see from a hardware perspective? What are we hanging out for at WWDC this year? What predictions do we have for our favourite community projects, conferences, vendors and integrations? What do we resolve to do more, of, less o…
  continue reading
 
In response to evolving cyber threats that can manipulate and compromise a satellite’s data, the United States Space Force is heightening its focus on “space cyber,” or the cybersecurity of space systems on-orbit. One emerging solution toward this effort is the Cyber Reslience On-Orbit tool (CROO), a software program that focuses on not just securi…
  continue reading
 
In an uncertain world, it can be difficult to see past the next 48 hours. But future-proofing exercises can help security and business leaders get more strategic about what they want to achieve in the next few years and how to get there, says futurist Heather Vescent. She helps outline how to step back and take a different worldview to uncover emer…
  continue reading
 
video: https://youtu.be/wFDzItN6Ags Download as MP3 Support the Show Become a Patron = tuxdigital.com/membership Store = tuxdigital.com/store Chapters: 00:00 Intro 00:55 Arch Linux Kicks Off 2026 with New Release 02:59 Universal Blue Year in Review 03:39 Bazzite End of Year Update 04:49 Aurora Year in Review 05:46 Project Bluefin Year in Review 07:…
  continue reading
 
Cyber Daily News January 5, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Critical IBM API Connect Vulnerability Enables Authentication Bypasshttps://thecyberexpress.com/ibm-api-connect-security-vulnerability/- Sedgwick discloses data breach after TridentLocker…
  continue reading
 
Event Summary (WATCH: PRESIDENT TRUMP PRESS CON HERE) The U.S. military executed a highly complex and precise operation in Caracas, Venezuela, to apprehend Maduro. The mission involved over 150 aircraft, advanced coordination across multiple military branches, and cyber and space operations. The operation was completed without any American casualti…
  continue reading
 
In this episode of 'Cybersecurity Today', host David Shipley discusses significant cyber events and their implications. The podcast explores hints by President Donald Trump regarding the use of cyber tactics in a U.S. operation that resulted in a power outage in Venezuela. The episode also delves into the April 2025 data breach at Nova Scotia Power…
  continue reading
 
Cryptocurrency Scam Emails and Web Pages As We Enter 2026 Scam emails are directing victims to confidence scams attempting to steal cryptocurrencies. https://isc.sans.edu/diary/Cryptocurrency%20Scam%20Emails%20and%20Web%20Pages%20As%20We%20Enter%202026/32594 Debugging DNS response times with tshark tshark is a powerful tool to debug DNS timing issu…
  continue reading
 
What is actually happening between the US and Venezuela? Trump has captured President Maduro of Venezuela and extradited him to the US, but how was he able to pull off such a complex, and legally contentious, plot? Listen as David and Gordon take a look inside the raid that brought down Maduro and share the intelligence scoop on why it was so succe…
  continue reading
 
Cyber Daily News January 4, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- French authorities investigate AI ‘undressing’ deepfakes on Xhttps://securityaffairs.com/186460/ai/french-authorities-investigate-ai-undressing-deepfakes-on-x.html- President Trump blocks…
  continue reading
 
Cyber Daily News January 3, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Covenant Health data breach after ransomware attack impacted over 478,000 peoplehttps://securityaffairs.com/186439/data-breach/covenant-health-data-breach-after-ransomware-attack-impacted…
  continue reading
 
Daycare & Autism Centers Fraud Numerous daycare centers and autism facilities have received millions in state funding but have no children enrolled. Example: A daycare shut down for violations reopened under a new name and continued receiving funds. Home Healthcare Fraud A single building allegedly housed 14 Somali-owned healthcare companies, all b…
  continue reading
 
In this episode, host Jim Love discusses the importance of cybersecurity awareness and training, featuring insights from Michael Joyce of the Human-Centric Cybersecurity Partnership at the University of Montreal and David Shipley of Beauceron Security. They explore the impact of cybersecurity awareness programs, the decay of sustained vigilance pos…
  continue reading
 
(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 79: We cover MongoBleed (CVE‑2025‑14847), exposed MongoDB deployments, and the sad realization that zero-day attacks are a normal, ev…
  continue reading
 
Christine Kuehn talks about her shocking discovery in “Family of Spies" Family of Spies https://us.macmillan.com/books/9781250344465/familyofspies/ Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Karen Greenberg on Twitter https://x.com/KarenGreenberg3 Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk …
  continue reading
 
Cyber Daily News January 2, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- China’s New Cybersecurity Law Is Here — And It Changes Everything for Businesseshttps://thecyberexpress.com/china-cybersecurity-law-2026/- IBM warns of critical API Connect bug enabling r…
  continue reading
 
Government Waste and Reform Musk discusses shocking inefficiencies in the U.S. federal government, such as: Excessive software licenses and media subscriptions (often double the number of employees). Duplicate credit cards and unexplained payments. Fraudulent NGO funding (e.g., billions allegedly misused). He emphasizes that the government is essen…
  continue reading
 
Cyber Daily News January 1, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Shai-Hulud Supply Chain Attack Drained $8.5 Million from Trust Wallet Usershttps://thecyberexpress.com/shai-hulud-attack-trust-wallet/- Singapore CSA warns of maximun severity SmarterMail…
  continue reading
 
Objective of the Plan Lower healthcare costs for Americans. Extend expiring ACA subsidies temporarily while transitioning to a new system. Shift financial benefits from insurance companies to individuals. Proposed Measures Two-year extension of Enhanced Premium Tax Credits (originally expanded during COVID-19). Income eligibility cap for subsidies …
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play