Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Operations Podcasts

show episodes
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Hacked

Hacked

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
  continue reading
 
Artwork

1
Ubuntu Security Podcast

Ubuntu Security Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
  continue reading
 
Artwork
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Artwork

1
Reality 2.0

Katherine Druckman and Doc Searls

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
  continue reading
 
Artwork

1
Mac Admins Podcast

Mac Admins Podcast LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
  continue reading
 
Artwork
 
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
  continue reading
 
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Artwork
 
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
  continue reading
 
Artwork

1
Malicious Life

Malicious Life

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
  continue reading
 
Artwork

1
SpyTalk

SpyTalk, Jeff Stein

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
  continue reading
 
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
  continue reading
 
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
  continue reading
 
Artwork

1
Mean Time To Insight

Enterprise Management Associates + APMdigest

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Entry & Exit is a podcast about building, scaling, and exiting security and alarm businesses. Hosts Stephen Olmon and Collin Trimble share their journey growing Alarm Masters through acquisitions and organic growth, along with the lessons they’ve learned along the way. From recurring revenue strategies to sales, operations, and M&A, Entry & Exit gives business owners and entrepreneurs an inside look at what it takes to succeed in the security industry. Whether you’re starting your first comp ...
  continue reading
 
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
  continue reading
 
Artwork

1
Covert Operations and National Security

Circle Of Insight Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to covert actions and national security podcast. Welcome to covert and national security podcast. A podcast where we discuss a spectrum of activities concerning covert operations, intelligence, counterintelligence, unconventional warfare, assassination issues, espionage spy craft technology and more. Enter the operational world with Dr. Carlos
  continue reading
 
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
  continue reading
 
Artwork

1
Now in Android

Now in Android

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android’s a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
  continue reading
 
Artwork

1
Connect

Axis Communications

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
  continue reading
 
Artwork

1
Building the Base

Building the Base

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"Building the Base" - an in-depth series of conversations with top entrepreneurs, innovators, and leaders from tech, financial, industrial, and public sectors. Our special guests provide their unique perspectives on a broad selection of topics such as: shaping our future national security industrial base, the impact of disruptive technologies, how new startups can increasingly contribute to national security, and practical tips on leadership and personal development whether in government or ...
  continue reading
 
Artwork

1
Purpose & Protection

Commissionaires Nova Scotia

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Commissionaires Nova Scotia proudly presents Purpose & Protection, a podcast dedicated to the people behind Canada’s security: veterans, their families, civilians and all those dedicated to keeping our communities safe. Each episode explores the lived experiences of those who’ve served, those who support them, and those shaping the future of Canada’s security landscape. From the frontlines to the home front, you’ll hear stories of resilience, leadership and purpose. As the largest private em ...
  continue reading
 
Artwork

1
The Elara Edge

Regia Multimedia Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
  continue reading
 
Artwork

1
The Cognitive Crucible

Information Professionals Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
  continue reading
 
Artwork

1
All Things Secured | Online Privacy & Security on Odysee

All Things Secured | Online Privacy & Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
  continue reading
 
T-Minus Space Daily from N2K CyberWire delivers critical daily intelligence on what powers, protects, and connects the space industry and innovation. N2K CyberWire’s space team makes visible the global connections that facilitate connectivity and commerce through space networks. We cover the news of the day and regularly feature experts covering space’s role in critical infrastructure and national security, space operations and intelligence, data and cybersecurity in space, domestic and inte ...
  continue reading
 
Artwork
 
Midweek Sitrep with Jerry Fowler is your biweekly briefing on what’s happening in the world of national security—decoded for everyday listeners. From classified documents and sanctions to cyberattacks, foreign interference, and spycraft, Jerry breaks down the headlines, the history, and the hidden forces shaping global power today. Whether it’s a presidential executive order, a new war in a far-off region, or a tech ban making waves in Washington, Jerry gives you the background and context t ...
  continue reading
 
Artwork

1
Midrats

Midrats

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Navy Milbloggers Sal from "CDR Salamander" and EagleOne from "EagleSpeak" discuss leading issues and developments for the Navy, Marine Corps, Coast Guard and related national security issues.
  continue reading
 
If you wish to know what it’s really like to make the life and death decisions portrayed in the movies by James Bond or on TV by Homeland's, Cary Matherson, then Black Spy Podcast is the show for you. If you're interested in the clandestine world of secret intelligence, espionage, counter-terrorism and national security, then this definitely your must listen Podcast! Every week, along with a different successful or famous guest who's always been interested in the secret services, ex officer, ...
  continue reading
 
Loading …
show series
 
A bit of a boo-hiss story about a medical imaging group losing personally identifiable information on tens of thousands of patients. That’s not the boo-hiss part. We’ll tell you what is. First though - the FBI says someone’s impersonating the FBI. And you know it’s true because… it came from the FBI? Good advice from the Federal Bureau of Investiga…
  continue reading
 
For the past few months, the EU has been on a mission to break privacy and end-to-end encryption in the name of child safety. Here's what this means for you, even if you're not an EU citizen. Learn how to build better personal privacy and security online with our free 7-day email course: https://www.allthingssecured.com/email-course/ ▶ Special than…
  continue reading
 
*Declassified Club exclusive: ⁠SUBSCRIBE⁠ to listen to the full interview* This week Gordon and David are joined by Kent Walker, Google's President of Global Affairs, to discuss the Aurora cyber attacks, his thoughts on the future of Artificial Intelligence, and what it was like to grow up in Silicon Valley before it became the world's technology h…
  continue reading
 
DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment…
  continue reading
 
Stoke Space has raised $510 million in Series D funding. Muon Space has been awarded $44.6 million by the US Space Force for environmental monitoring. Momentus has been selected for two NASA demonstration flights, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instag…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-dark-side-of-gpt-how-nlp-tools-are-being-used-for-phishing-scams-and-misinformation. Explore how GPT and NLP tools are fueling phishing, scams, and misinformation. Learn how AI-powered attacks are becoming more sophisticated and dangerous. Check more stories related to…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/beyond-phishing-how-agentic-ai-is-weaponizing-the-human-element-in-next-gen-cyberattacks. Security expert analyzes how Agentic AI moves beyond simple phishing to autonomously exploit the human element. Check more stories related to cybersecurity at: https://hackernoon.com/…
  continue reading
 
You write tests - but are they valuable tests? Carl and Richard talk to Egil Hansen about his approach to creating tests for applications. Egil discusses the types of testing and who they impact. Testing isn't only for you! Valuable tests are also durable, being able to persist between changes where it makes sense, and help to understand when updat…
  continue reading
 
The new 26 OSes are here! How has the first week gone so far? Hosts: Tom Bridge - @[email protected] Marcus Ransom - @marcusransom Selina Ali - LinkedIn Links: Looking for deferral profile collisions - https://github.com/ninxsoft/LowProfile https://lowendmac.com/2025/farewell-firewire-macos-tahoe-drops-support/ Sponsors: Kandji 1Password M…
  continue reading
 
Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setu…
  continue reading
 
Verizon signs deal with AST SpaceMobile to deliver cellular service from space. Space Capital’s Q3 2025 Space IQ report shows a $5.8 billion surge in private space investment. Blue Origin awarded a $78.25M Space Force contract to expand launch processing at Canaveral. Remember to leave us a 5-star rating and review in your favorite podcast app. Be …
  continue reading
 
In this episode of Reality 2.0, Katherine Druckman talks with Lori Lorusso from the Rust Foundation about the critical importance of sustainable stewardship for open source infrastructure. They discuss a joint statement from the OpenSSF, the Rust Foundation, and other community organizations emphasizing the need for financial support of package man…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/ine-security-releases-wired-together-the-case-for-cross-training-in-net-working-and-cybersecurity. The report documents operational challenges created by this convergence and presents cross-training as the strategic solution. Only 33% feel well-prepared to ha Check more st…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/building-resilient-operations-through-itil-based-incident-management. ITIL 4 transforms cloud incident management with automation, observability, and adaptive governance—cutting MTTR by 47% and boosting resilience. Check more stories related to cybersecurity at: https://ha…
  continue reading
 
Brigadier-General Mark Parsons, CD, from the 5th Canadian Division, joins host Colonel Barry Pitcher, CEO of Commissionaires Nova Scotia and a senior officer in the Primary Army Reserve, for a compelling conversation about the vital role of the Canadian Reserve Force in national security and community support. Often referred to as “citizen soldiers…
  continue reading
 
Columbia Technology Partners (CTP) fosters a vibrant, competitive culture that blends professional growth with a fun, engaging workplace, shares Allen Scott, the Director of People & Culture. CTP seeks cleared professionals, particularly those with CISSP and ISSEP certifications, for roles in cybersecurity, cloud engineering, and systems engineerin…
  continue reading
 
Welcome to Entry & Exit — the new Owned and Operated series for builders in the security & life-safety world. Hosts Stephen Olmon and Collin Trimble share how they grew Alarm Masters from under $2M to ~3× revenue, including +50% RMR growth in Year 1. From recurring revenue (RMR) to acquisitions and organic growth, this episode breaks down what it r…
  continue reading
 
A critical zero-day in Oracle E-Business Suite is under active exploitation. ICE plans a major expansion of its social media surveillance operations. Discord confirms a third-party data breach. A critical vulnerability in the Unity game engine could allow arbitrary code execution. New variants of the XWorm remote access trojan spread through phishi…
  continue reading
 
ABUSED? STALKED? - Demand Women get Tech Protection! (Part 1) The Black Spy Podcast 213, Season 22, Episode 0004 In this and the next episode of The Black Spy Podcast, Carlton King and Firgas Esack delve deeply into one of society’s most urgent and under-addressed crises — the protection of women, girls, and others from domestic violence and stalki…
  continue reading
 
The DataTribe Challenge is a launchpad for elite cybersecurity and cyber-adjacent startups ready to break out. 2025 marks the 8th annual edition of the event with a change in venue and some exciting new updates. We take you on a journey from inception with Leo Scott, Managing Director and Chief Innovation Officer at DataTribe, and 3 past DataTribe …
  continue reading
 
Please enjoy this encore of Career Notes. Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down.…
  continue reading
 
Assaf Dahan, Director of Threat Research, Cortex XDR, at Palo Alto Networks, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified Phantom Taurus, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middl…
  continue reading
 
Space has long been considered bi-partisan domain in the US, but is it becoming more political? Our guest is Kevin Kelly. Kevin is a former Senate appropriations staffer who oversaw funding for NASA, the NSF, and 25 other agencies. Now a partner at Actum, he advises some of the most influential players in science and defense. His career has spanned…
  continue reading
 
The acclaimed spy thriller author and ex-CIA analyst talks about his new novel, “The Persians,” set in the clandestine war between Israel and Iran. DAVID MCCLOSKEY Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk on Twitter: https://twitter.com/talk_spy Subscri…
  continue reading
 
A fast-spreading malware campaign is abusing WhatsApp as both lure and launchpad. Carmaker Renault suffers a data breach. DrayTek patches a critical router flaw. CISA alerts cover a range of vulnerabilities. A new phishing kit lowers the bar for convincing lures. A Catholic hospital network pays $7.6 million to settle data breach litigation. A majo…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play