SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Security Operations Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Your Weekly Source for Linux GNews from the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
A podcast made by people who love running Linux.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
Welcome to Ragnar365 Nuggets, Ragnar Heil's short news and personal insights about Microsoft 365 Intelligent Workplace. Focus Areas: Microsoft Teams, SharePoint, Outlook, OneDrive, Copilot, Microsoft Viva, Employee Experience, Governance, Compliance, Power Platform etc)
…
continue reading
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Entry & Exit is a podcast about building, scaling, and exiting security and alarm businesses. Hosts Stephen Olmon and Collin Trimble share their journey growing Alarm Masters through acquisitions and organic growth, along with the lessons they’ve learned along the way. From recurring revenue strategies to sales, operations, and M&A, Entry & Exit gives business owners and entrepreneurs an inside look at what it takes to succeed in the security industry. Whether you’re starting your first comp ...
…
continue reading
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Welcome to covert actions and national security podcast. Welcome to covert and national security podcast. A podcast where we discuss a spectrum of activities concerning covert operations, intelligence, counterintelligence, unconventional warfare, assassination issues, espionage spy craft technology and more. Enter the operational world with Dr. Carlos
…
continue reading
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
…
continue reading
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android’s a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
…
continue reading
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
…
continue reading
"Building the Base" - an in-depth series of conversations with top entrepreneurs, innovators, and leaders from tech, financial, industrial, and public sectors. Our special guests provide their unique perspectives on a broad selection of topics such as: shaping our future national security industrial base, the impact of disruptive technologies, how new startups can increasingly contribute to national security, and practical tips on leadership and personal development whether in government or ...
…
continue reading
Commissionaires Nova Scotia proudly presents Purpose & Protection, a podcast dedicated to the people behind Canada’s security: veterans, their families, civilians and all those dedicated to keeping our communities safe. Each episode explores the lived experiences of those who’ve served, those who support them, and those shaping the future of Canada’s security landscape. From the frontlines to the home front, you’ll hear stories of resilience, leadership and purpose. As the largest private em ...
…
continue reading
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
…
continue reading
A podcast about all things energy, brought to you by the Australian Energy Market Operator.
…
continue reading
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading

1
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
T-Minus Space Daily from N2K CyberWire delivers critical daily intelligence on what powers, protects, and connects the space industry and innovation. N2K CyberWire’s space team makes visible the global connections that facilitate connectivity and commerce through space networks. We cover the news of the day and regularly feature experts covering space’s role in critical infrastructure and national security, space operations and intelligence, data and cybersecurity in space, domestic and inte ...
…
continue reading
Midweek Sitrep with Jerry Fowler is your biweekly briefing on what’s happening in the world of national security—decoded for everyday listeners. From classified documents and sanctions to cyberattacks, foreign interference, and spycraft, Jerry breaks down the headlines, the history, and the hidden forces shaping global power today. Whether it’s a presidential executive order, a new war in a far-off region, or a tech ban making waves in Washington, Jerry gives you the background and context t ...
…
continue reading
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
Navy Milbloggers Sal from "CDR Salamander" and EagleOne from "EagleSpeak" discuss leading issues and developments for the Navy, Marine Corps, Coast Guard and related national security issues.
…
continue reading
Inside the FBI highlights news, cases, and people from around the Bureau—in audio form. For more information, visit fbi.gov.
…
continue reading
If you wish to know what it’s really like to make the life and death decisions portrayed in the movies by James Bond or on TV by Homeland's, Cary Matherson, then Black Spy Podcast is the show for you. If you're interested in the clandestine world of secret intelligence, espionage, counter-terrorism and national security, then this definitely your must listen Podcast! Every week, along with a different successful or famous guest who's always been interested in the secret services, ex officer, ...
…
continue reading
By Circle Of Insight Productions
…
continue reading

1
Checklist 444 - Spoofing the FBI and Doctors without Manners
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47A bit of a boo-hiss story about a medical imaging group losing personally identifiable information on tens of thousands of patients. That’s not the boo-hiss part. We’ll tell you what is. First though - the FBI says someone’s impersonating the FBI. And you know it’s true because… it came from the FBI? Good advice from the Federal Bureau of Investiga…
…
continue reading

1
EU War Against Privacy Explained (Chat Control)
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47For the past few months, the EU has been on a mission to break privacy and end-to-end encryption in the name of child safety. Here's what this means for you, even if you're not an EU citizen. Learn how to build better personal privacy and security online with our free 7-day email course: https://www.allthingssecured.com/email-course/ ▶ Special than…
…
continue reading

1
EXCLUSIVE: Google's President of Global Affairs on AI, Cyber Attacks and Silicon Valley
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26*Declassified Club exclusive: SUBSCRIBE to listen to the full interview* This week Gordon and David are joined by Kent Walker, Google's President of Global Affairs, to discuss the Aurora cyber attacks, his thoughts on the future of Artificial Intelligence, and what it was like to grow up in Silicon Valley before it became the world's technology h…
…
continue reading

1
Cyber defenders pulled into deportation duty.
29:49
29:49
Play later
Play later
Lists
Like
Liked
29:49DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment…
…
continue reading
Stoke Space has raised $510 million in Series D funding. Muon Space has been awarded $44.6 million by the US Space Force for environmental monitoring. Momentus has been selected for two NASA demonstration flights, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instag…
…
continue reading

1
The Dark Side of GPT: How NLP Tools Are Being Used for Phishing, Scams, and Misinformation
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41This story was originally published on HackerNoon at: https://hackernoon.com/the-dark-side-of-gpt-how-nlp-tools-are-being-used-for-phishing-scams-and-misinformation. Explore how GPT and NLP tools are fueling phishing, scams, and misinformation. Learn how AI-powered attacks are becoming more sophisticated and dangerous. Check more stories related to…
…
continue reading

1
Beyond Phishing: How Agentic AI Is Weaponizing the Human Element in Next-Gen Cyberattacks
10:34
10:34
Play later
Play later
Lists
Like
Liked
10:34This story was originally published on HackerNoon at: https://hackernoon.com/beyond-phishing-how-agentic-ai-is-weaponizing-the-human-element-in-next-gen-cyberattacks. Security expert analyzes how Agentic AI moves beyond simple phishing to autonomously exploit the human element. Check more stories related to cybersecurity at: https://hackernoon.com/…
…
continue reading
You write tests - but are they valuable tests? Carl and Richard talk to Egil Hansen about his approach to creating tests for applications. Egil discusses the types of testing and who they impact. Testing isn't only for you! Valuable tests are also durable, being able to persist between changes where it makes sense, and help to understand when updat…
…
continue reading
The new 26 OSes are here! How has the first week gone so far? Hosts: Tom Bridge - @[email protected] Marcus Ransom - @marcusransom Selina Ali - LinkedIn Links: Looking for deferral profile collisions - https://github.com/ninxsoft/LowProfile https://lowendmac.com/2025/farewell-firewire-macos-tahoe-drops-support/ Sponsors: Kandji 1Password M…
…
continue reading
Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setu…
…
continue reading
Verizon signs deal with AST SpaceMobile to deliver cellular service from space. Space Capital’s Q3 2025 Space IQ report shows a $5.8 billion surge in private space investment. Blue Origin awarded a $78.25M Space Force contract to expand launch processing at Canaveral. Remember to leave us a 5-star rating and review in your favorite podcast app. Be …
…
continue reading

1
Episode 159: Building Sustainable Open Source: Keeping the Lights On
27:31
27:31
Play later
Play later
Lists
Like
Liked
27:31In this episode of Reality 2.0, Katherine Druckman talks with Lori Lorusso from the Rust Foundation about the critical importance of sustainable stewardship for open source infrastructure. They discuss a joint statement from the OpenSSF, the Rust Foundation, and other community organizations emphasizing the need for financial support of package man…
…
continue reading

1
INE Security Releases "Wired Together: The Case For Cross-Training In Net working And Cybersecurity"
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:02This story was originally published on HackerNoon at: https://hackernoon.com/ine-security-releases-wired-together-the-case-for-cross-training-in-net-working-and-cybersecurity. The report documents operational challenges created by this convergence and presents cross-training as the strategic solution. Only 33% feel well-prepared to ha Check more st…
…
continue reading

1
Building Resilient Operations Through ITIL-Based Incident Management
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00This story was originally published on HackerNoon at: https://hackernoon.com/building-resilient-operations-through-itil-based-incident-management. ITIL 4 transforms cloud incident management with automation, observability, and adaptive governance—cutting MTTR by 47% and boosting resilience. Check more stories related to cybersecurity at: https://ha…
…
continue reading

1
Empowering Service with Brigadier-General Mark Parsons
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55Brigadier-General Mark Parsons, CD, from the 5th Canadian Division, joins host Colonel Barry Pitcher, CEO of Commissionaires Nova Scotia and a senior officer in the Primary Army Reserve, for a compelling conversation about the vital role of the Canadian Reserve Force in national security and community support. Often referred to as “citizen soldiers…
…
continue reading

1
Columbia Technology Partners: Upskilling From Certifications to Cornhole
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30Columbia Technology Partners (CTP) fosters a vibrant, competitive culture that blends professional growth with a fun, engaging workplace, shares Allen Scott, the Director of People & Culture. CTP seeks cleared professionals, particularly those with CISSP and ISSEP certifications, for roles in cybersecurity, cloud engineering, and systems engineerin…
…
continue reading

1
#1 How to Build, Scale & Sell a Security/Fire Business
52:12
52:12
Play later
Play later
Lists
Like
Liked
52:12Welcome to Entry & Exit — the new Owned and Operated series for builders in the security & life-safety world. Hosts Stephen Olmon and Collin Trimble share how they grew Alarm Masters from under $2M to ~3× revenue, including +50% RMR growth in Year 1. From recurring revenue (RMR) to acquisitions and organic growth, this episode breaks down what it r…
…
continue reading

1
89. China vs Google: The Battle That Shaped the Internet (Ep 2)
32:58
32:58
Play later
Play later
Lists
Like
Liked
32:58By Goalhanger
…
continue reading

1
#234 Robert Thibadeau on a Million Identities and Computational Cognitive Neuroscience
1:11:15
1:11:15
Play later
Play later
Lists
Like
Liked
1:11:15
…
continue reading

1
Critical GoAnywhere bug fuels ransomware wave.
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23By N2K Networks
…
continue reading
By N2K Networks
…
continue reading
By F5
…
continue reading

1
Episode 220: The $5,000 Mistake: Inside a Facebook Scam
45:18
45:18
Play later
Play later
Lists
Like
Liked
45:18By DeleteMe
…
continue reading

1
Oracle zero-day serves up persistent access.
23:47
23:47
Play later
Play later
Lists
Like
Liked
23:47A critical zero-day in Oracle E-Business Suite is under active exploitation. ICE plans a major expansion of its social media surveillance operations. Discord confirms a third-party data breach. A critical vulnerability in the Unity game engine could allow arbitrary code execution. New variants of the XWorm remote access trojan spread through phishi…
…
continue reading

1
438: Jill's Treasure Hunt, Google vs F-Droid, Samsung Ads on Refrigerators
1:46:15
1:46:15
Play later
Play later
Lists
Like
Liked
1:46:15By TuxDigital Network
…
continue reading

1
Firefly fuels growth with an acquisition.
25:14
25:14
Play later
Play later
Lists
Like
Liked
25:14By N2K Networks
…
continue reading
…
continue reading

1
S2E4: The Startup Security Playbook: AI That Keeps Up with AI — with Francesco Piccoli (Almanax).
45:08
45:08
Play later
Play later
Lists
Like
Liked
45:08By Andy Walsh
…
continue reading

1
ABUSED? STALKED? - Demand Women get Tech Protection! (Part 1)
51:23
51:23
Play later
Play later
Lists
Like
Liked
51:23ABUSED? STALKED? - Demand Women get Tech Protection! (Part 1) The Black Spy Podcast 213, Season 22, Episode 0004 In this and the next episode of The Black Spy Podcast, Carlton King and Firgas Esack delve deeply into one of society’s most urgent and under-addressed crises — the protection of women, girls, and others from domestic violence and stalki…
…
continue reading

1
88. China vs Google: When Beijing Took on Silicon Valley (Ep 1)
41:52
41:52
Play later
Play later
Lists
Like
Liked
41:52By Goalhanger
…
continue reading

1
2025 DataTribe Challenge: Forging the future of cyber. [Special Edition]
1:00:42
1:00:42
Play later
Play later
Lists
Like
Liked
1:00:42The DataTribe Challenge is a launchpad for elite cybersecurity and cyber-adjacent startups ready to break out. 2025 marks the 8th annual edition of the event with a change in venue and some exciting new updates. We take you on a journey from inception with Leo Scott, Managing Director and Chief Innovation Officer at DataTribe, and 3 past DataTribe …
…
continue reading

1
Sloane Menkes: What is the 2%? [Consultant] [Career Notes]
10:11
10:11
Play later
Play later
Lists
Like
Liked
10:11Please enjoy this encore of Career Notes. Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down.…
…
continue reading

1
China’s stealthiest spy operation yet. [Research Saturday]
22:52
22:52
Play later
Play later
Lists
Like
Liked
22:52Assaf Dahan, Director of Threat Research, Cortex XDR, at Palo Alto Networks, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified Phantom Taurus, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middl…
…
continue reading
Space has long been considered bi-partisan domain in the US, but is it becoming more political? Our guest is Kevin Kelly. Kevin is a former Senate appropriations staffer who oversaw funding for NASA, the NSF, and 25 other agencies. Now a partner at Actum, he advises some of the most influential players in science and defense. His career has spanned…
…
continue reading
The acclaimed spy thriller author and ex-CIA analyst talks about his new novel, “The Persians,” set in the clandestine war between Israel and Iran. DAVID MCCLOSKEY Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk on Twitter: https://twitter.com/talk_spy Subscri…
…
continue reading
A fast-spreading malware campaign is abusing WhatsApp as both lure and launchpad. Carmaker Renault suffers a data breach. DrayTek patches a critical router flaw. CISA alerts cover a range of vulnerabilities. A new phishing kit lowers the bar for convincing lures. A Catholic hospital network pays $7.6 million to settle data breach litigation. A majo…
…
continue reading