Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Security Weekly Podcasts
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Prof G Markets breaks down the news that’s moving the capital markets, helping you build financial literacy and security. Join Scott Galloway and Ed Elson every weekday for no mercy, no malice insight on high flying stocks, booming sectors, and master of the universe CEOs. Like it or not, we live in a capitalist society. The key to navigating it? Talk about money. New episodes every Monday through Friday. Part of the Vox Media Podcast Network. Have a question or comment for us? Reach out to ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
On Mondays, Jon Stewart hosts The Daily Show, but on Thursdays, he's back in your ears with The Weekly Show -- a podcast featuring in-depth conversations with a range of special guests. From experts and advocates, to stakeholders and thought leaders, we discuss the challenges, changes, and ideas that are shaping our world.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 18:00 UTC.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Off The Wall is a weekly show on WUSB radio, Stony Brook - Long Island, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
To defend democracy, one has to believe in it. To believe in democracy, one has to understand it. Where it came from. How it works. What’s true. What’s not. What others did before you. How it could be better. How to make a difference. Each week, The David Frum Show digs deep into the big questions people have about our society, explains the progress Americans have made together, and reminds us that the American idea is worth defending.
…
continue reading
Americast is the authoritative US news and politics podcast from the BBC. Each week we provide audiences with the best analysis from across the BBC, with on-the-ground observations and big picture insights about the stories which are defining America right now. The podcast is hosted by trusted BBC journalists including the BBC’s North America editor, Sarah Smith, BBC Radio 4 presenter, Justin Webb, the BBC’s disinformation and social media correspondent, Marianna Spring, and BBC North Americ ...
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
Join Senator Ted Cruz and co-host Ben Ferguson as they break down the most important news stories of the day and reveal what they mean for you. On "Verdict with Ted Cruz,” you will go behind the scenes of the political debates that define our country. "Verdict with Ted Cruz" is being brought to you by Jobs, Freedom, and Security PAC, a political action committee dedicated to supporting conservative causes, organizations, and candidates across the country. In 2022, Jobs, Freedom, and Security ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
With two new shows each week, our experts dig into the game-tape for analysis rich in detail and information. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
Murray Kinsella and Gavan Casey reflect on a dramatic comeback win for the Lions in Australia. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Microsoft SharePoint zero-day exploited in RCE attacks, no patch availableBy Carl Franklin
…
continue reading

1
Total Recall, Steam, Storm-2063, Unmarker, Altair, Josh Marpet, and More... - SWN #497
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07Total Recall, Steam, Storm-2063, Unmarker, Altair, Josh Marpet, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-497
…
continue reading

1
Week in Review: Aruba’s hardcoded passwords, Clorox wipes supplier’s mess, AI tool deletes everything
29:32
29:32
Play later
Play later
Lists
Like
Liked
29:32Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Nick Espinosa, host, The Deep Dive Radio Show Thanks to our show sponsor, Nudge Security Nudge Security discovers new apps, accounts, and data-sharing in real-time and helps guide employees toward secure behaviors. Instead of trying t…
…
continue reading

1
Protecting G-Suite/MS365 and Security News - Abhishek Agrawal - PSW #884
2:11:14
2:11:14
Play later
Play later
Lists
Like
Liked
2:11:14We chat with Material Security about protecting G Suite and MS365. How else are you monitoring the most commonly used cloud environments and applications? In the security news: Google Sues Badbox operators Authenticated or Unauthenticated, big difference and my struggle to get LLMs to create exploits for me Ring cameras that were not hacked Malicou…
…
continue reading

1
Episode 460 - Contactless multimodal biometric software for digital identity
6:55
6:55
Play later
Play later
Lists
Like
Liked
6:55Blue Biometrics (Blue) was founded in Australia in September 2017, to develop world class contactless biometric technology, for dual use national security and commercial applications. Blue now also operates companies in the UK and the USA. Prior to founding Blue, the co-founders were involved in pioneering contactless technology. Blue Biometrics is…
…
continue reading

1
Getting Consensus as a CISO, While Calculating Cybersecurity ROI and Building a Team - Khaja Ahmed - BSW #405
1:03:11
1:03:11
Play later
Play later
Lists
Like
Liked
1:03:11How do we get security right? The answer varies by many factors, including industry, what you're trying to protect, and what the C Suite and Board care about. Khaja Ahmed, Advisor at CISO Forum, joins Business Security Weekly to discuss how to get consensus on your security program. CISOs, executives, and the Board need to be aligned on the risks a…
…
continue reading

1
Rise of Compromised LLMs - Sohrob Kazerounian - ASW #340
1:06:35
1:06:35
Play later
Play later
Lists
Like
Liked
1:06:35AI is more than LLMs. Machine learning algorithms have been part of infosec solutions for a long time. For appsec practitioners, a key concern is always going to be how to evaluate the security of software or a system. In some cases, it doesn't matter if a human or an LLM generated code -- the code needs to be reviewed for common flaws and design p…
…
continue reading

1
The Cyber Canon, ditching the SOC 2, and the weekly enterprise news - Helen Patton - ESW #416
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Segment 1 - Interview with Helen Patton: Introducing the Cybersecurity Canon Did you know that there’s a hall-of-fame for cybersecurity books? Over the past decade, the Cybersecurity Canon has published reviews on dozens of cybersecurity books and established a hall of fame. Hall of fame books are defined as titles that all cybersecurity profession…
…
continue reading

1
7MS #683: What I'm Working on This Week - Part 4
30:50
30:50
Play later
Play later
Lists
Like
Liked
30:50This week I’m working on a mixed bag of fun security and marketing things: A pentest I’m stuck on My latest lab CTF obsession: Ninja Hacker Academy A cool “about 7MinSec” marketing video that was recorded in a pro studio!
…
continue reading

1
Bonus: Hulk Holgan's Legacy - July 25th, The Sean Hannity Show
29:08
29:08
Play later
Play later
Lists
Like
Liked
29:08Sean mocks the media narrative blaming Trump for Stephen Colbert’s cancellation, chalking it up instead to bad ratings and bad jokes. He debates former Schumer aide Chris Hahn about why Democrats are terrified to criticize radical voices like “Mom Donnie” or the Squad. They discuss controversial race-based tax proposals and refusal to condemn globa…
…
continue reading

1
Final Six Victories in the 1BBB, Cartels Outpace U.S. Law Enforcement in the Skies & Gabbard Drops the Receipts Week In Review
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05🏛️ Final Six Victories in the Bill: Spectrum Auction Authority – Releasing 800 MHz of government-held spectrum to the private sector, expected to generate $100 billion and create hundreds of thousands of jobs. Air Traffic Control Modernization – $12.5 billion investment to upgrade outdated systems. Space Exploration – $10 billion for NASA’s Artemis…
…
continue reading

1
Why More Hackers Are Logging On Than Breaking In
33:04
33:04
Play later
Play later
Lists
Like
Liked
33:04We’ve heard it before – hacker tactics are not changing, but the hackers are getting a lot smarter in how they deploy their time-tested attacks. Additionally, honing in on the human element of cybersecurity is nothing new. We’ve spoken with numerous guests about getting buy-in, improving training, and how creating a cyber-receptive culture is key i…
…
continue reading

1
Total Recall, Steam, Storm-2063, Unmarker, Altair, Josh Marpet, and More... - SWN #497
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07Total Recall, Steam, Storm-2063, Unmarker, Altair, Josh Marpet, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-497
…
continue reading

1
7MS #685: The Time My Neighbor Almost Got Scammed Out of $13K
22:56
22:56
Play later
Play later
Lists
Like
Liked
22:56Today’s kind of a “story time with your friend Brian” episode: a tale of how my neighbor almost got scammed out of $13k. The story has a lot of red flags we can all keep in mind to keep ourselves (as well as kids/friends/parents/etc.) safer from these types of shenanigans.
…
continue reading
The U.S. dollar has declined by more than 10 percent this year. Is the fall just a normal fluctuation, or is it a sign of something much more worrying? How seriously should we take threats to the dollar’s dominance as the world’s reserve currency? Economist Kenneth Rogoff shares more. Rogoff is a former chief economist of the International Monetary…
…
continue reading

1
Microsoft Sharepoint security crisis: Faulty patches, Toolshell zero-days
1:55:13
1:55:13
Play later
Play later
Lists
Like
Liked
1:55:13Three Buddy Problem - Episode 55: A SharePoint zero-day exploit chain from Pwn2Own Berlin becomes a full-blown security crisis with Chinese nation-state actors exploiting vulnerabilities that Microsoft struggled to patch properly, leading to trivial bypasses and a cascade of new CVEs. The timeline is messy, the patches are faulty, and ransomware gr…
…
continue reading

1
Why Scott Invested In Vertical Aerospace — ft. Stuart Simpson
56:05
56:05
Play later
Play later
Lists
Like
Liked
56:05Stuart Simpson, CEO of Vertical Aerospace, joins the show to break down the competitive landscape of the eVTOL market and where Vertical Aerospace sits in that landscape. He explains what a fully adoptive world of eVTOLs looks like, explains why aviation has historically been a tough sector for investors, and shares his vision for the future of tra…
…
continue reading

1
Obama Admin Caught in a Bombshell LIE about the Russia Hoax plus ALL THE WINS in the One Big Beautiful Bill
38:43
38:43
Play later
Play later
Lists
Like
Liked
38:431. Tulsi Gabbard’s Allegations Against the Obama Administration Gabbard released a report alleging that President Obama and senior intelligence officials knowingly fabricated the Russia-Trump collusion narrative. Claims include deliberate misinformation, suppression of contrary intelligence, and coordination with media to undermine Donald Trump’s p…
…
continue reading

1
SonicWall releases patches, The Com warning, Compromised Amazon Q extension
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34SonicWall announces SMA 100 patches FBI warns about The Com Compromised Amazon Q extension deletes everything Huge thanks to our sponsor, Nudge Security Nudge Security discovers new apps, accounts, and data-sharing in real-time and helps guide employees toward secure behaviors. Instead of trying to control everything, we give IT and security teams …
…
continue reading

1
TNW 397: Meta's New Muscle-Reading Wristband - Meta's Prototype Wrist-Based Controllers
1:09:36
1:09:36
Play later
Play later
Lists
Like
Liked
1:09:36Dan Moren joins Mikah Sargent for this episode of Tech News Weekly! A zero-day bug was discovered in Microsoft's SharePoint. T-Mobile's new satellite texting service, T-Satellite. Apple announces AppleCare One. And Meta's Reality Labs published new papers on the latest advancements in its wrist-based controllers. Mikah shares details about the zero…
…
continue reading

1
Protecting G-Suite/MS365 and Security News - Abhishek Agrawal - PSW #884
2:11:14
2:11:14
Play later
Play later
Lists
Like
Liked
2:11:14We chat with Material Security about protecting G Suite and MS365. How else are you monitoring the most commonly used cloud environments and applications? In the security news: Google Sues Badbox operators Authenticated or Unauthenticated, big difference and my struggle to get LLMs to create exploits for me Ring cameras that were not hacked Malicou…
…
continue reading

1
Bonus: Daily Review with Clay and Buck - Jul 24 2025
58:51
58:51
Play later
Play later
Lists
Like
Liked
58:51Meet my friends, Clay Travis and Buck Sexton! If you love Verdict, the Clay Travis and Buck Sexton Show might also be in your audio wheelhouse. Politics, news analysis, and some pop culture and comedy thrown in too. Here’s a sample episode recapping four Thursday takeaways. Give the guys a listen and then follow and subscribe wherever you get your …
…
continue reading
Since returning to office Donald Trump has followed a familiar playbook when confronted with unfavourable stories in the press, often ending in a large lawsuit. That was exactly the case with the Wall Street Journal, subjected to a $10bn suit after they published a story about Trump’s relationship with Jeffrey Epstein. But even after the lawsuit, t…
…
continue reading

1
REACTION: Lions XV named as Ringrose ruled out
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48Murray Kinsella dials in from Australia to react to the Lions XV for this weekend's second test against the Wallabies. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem
28:40
28:40
Play later
Play later
Lists
Like
Liked
28:40All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is Jason Thomas, senior director, technology security, governance, and risk, Cystic Fibrosis Foundation. In th…
…
continue reading

1
BONUS POD: Gabbard Unveils Shocking Obama Intel Plot w Irrefutable Evidence
16:44
16:44
Play later
Play later
Lists
Like
Liked
16:44Criminal Referral and Allegations Against Obama: Tulsi Gabbard claims that Obama has been referred to the Department of Justice for a criminal investigation. She accuses the Obama administration of manufacturing intelligence to falsely suggest Russian interference in the 2016 election to benefit Trump. Intelligence Community Assessment (ICA): Gabba…
…
continue reading

1
Do Japan & the U.S. Have a Deal? Google’s Q2 Earnings & Home Prices Hit a Record (Again)
34:52
34:52
Play later
Play later
Lists
Like
Liked
34:52Ed and Scott break down the new U.S.-Japan trade agreement and what Wall Street’s reaction tells us about who really came out on top. Then, Ed digs into what’s pushing U.S. home prices to record highs. Finally, Ed and Scott Devitt, Managing Director of Equity Research at Wedbush Securities, break down the key takeaways from Google’s second-quarter …
…
continue reading
As Trump's pressure campaigns target universities, media outlets, and private companies, Jon is joined by former US Attorney Preet Bharara, host of "Stay Tuned with Preet," and Dan Pfeiffer, co-host of "Pod Save America" and author of "Message Box." Together, they examine the tools available to presidents to coerce independent institutions, explore…
…
continue reading

1
Goodbye toha, AI deletes live data, Adobe apps advisory activated
8:37
8:37
Play later
Play later
Lists
Like
Liked
8:37Goodbye toha, or as they say in Russian, Прощай “Trust the AI," they said. “What could go wrong?” they said Adobe apps advisory activated Huge thanks to our sponsor, Nudge Security Trying to squeeze a few more items into your budget? Nudge Security can help by discovering up to TWO YEARS of historical SaaS spend along with usage insights so you can…
…
continue reading

1
The clock’s ticking and the bots are clicking.
40:43
40:43
Play later
Play later
Lists
Like
Liked
40:43This week, Ben's story is on the looming expiration of the Cybersecurity Information Sharing Act (CISA 2015), a widely supported but currently stalled law that enables cyber threat data sharing between the private sector and government, now at risk of lapsing by September 30 due to congressional inaction and conflicting priorities. Dave’s got the s…
…
continue reading

1
Episode 459 - Providing cloud solutions in Malaysia
4:13
4:13
Play later
Play later
Lists
Like
Liked
4:13We speak with Hafis Murty, Head of Product Development with AVM Cloud as sponsors to the Cyber Security Asia 2025 Conference, Kuala Lumpur 21-22 April. Recognized as one of the premier cloud solution providers in Malaysia, AVM Cloud Sdn Bhd has been at the forefront of cloud computing services since 2010. Throughout the past decade, AVM Cloud has e…
…
continue reading

1
Episode 458 - Cloud Destinations global footprint reaching Southeast Asia
4:28
4:28
Play later
Play later
Lists
Like
Liked
4:28We speak with Siva Dharmaraj, CEO and Founder of Cloud Destinations, a Silicon Valley-based IT leader with partners in Malaysia. Cloud Destinations has expanded its global footprint, strengthening its presence in the Southeast Asian market and fostering international collaboration in the fields of Digital Transformation, Cloud Computing, Data Engin…
…
continue reading

1
Episode 457 - Rolling out Privileged Access Management
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03We speak with Aaron Tay, Technical Solutions Consultant with Manage Engine, as sponsors for the Cyber Security Asia 2025 conference in Kuala Lumpur, 21-22 April. ManageEngine is a division of Zoho Corporation that offers comprehensive on-premises and cloud-native IT and security operations management solutions for global organizations and managed s…
…
continue reading

1
Episode 456 - Introducing V Gallant CyberSecure at CSA 2025
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22We speak with Fabian Lim, Business Development Manager for V Gallant. As sponsors for the Cyber Security Asia 20205 conference in Kuala Lumpur, 21-22 April, VCI Global introduced V Gallant CyberSecure, an AI-driven, military-grade cybersecurity solution designed for enterprises. With encrypted backups, real-time threat detection, and AI-accelerated…
…
continue reading
We’ve now witnessed six months of Donald Trump’s second term in the White House. In that time he's dominated the world's media and international headlines, but how much has he actually achieved so far? And what could he improve on? Today, Sarah and Justin are conducting a mid-year appraisal of the president with someone who knows him well - Marc Sh…
…
continue reading

1
Getting Consensus as a CISO, While Calculating Cybersecurity ROI and Building a Team - Khaja Ahmed - BSW #405
1:03:11
1:03:11
Play later
Play later
Lists
Like
Liked
1:03:11How do we get security right? The answer varies by many factors, including industry, what you're trying to protect, and what the C Suite and Board care about. Khaja Ahmed, Advisor at CISO Forum, joins Business Security Weekly to discuss how to get consensus on your security program. CISOs, executives, and the Board need to be aligned on the risks a…
…
continue reading

1
Getting Consensus as a CISO, While Calculating Cybersecurity ROI and Building a Team - Khaja Ahmed - BSW #405
1:03:11
1:03:11
Play later
Play later
Lists
Like
Liked
1:03:11How do we get security right? The answer varies by many factors, including industry, what you're trying to protect, and what the C Suite and Board care about. Khaja Ahmed, Advisor at CISO Forum, joins Business Security Weekly to discuss how to get consensus on your security program. CISOs, executives, and the Board need to be aligned on the risks a…
…
continue reading

1
Will Anti-Woke Free Press Join CBS? Philip Morris Falls on ZYN Slowdown & Coke’s Cane Sugar Shift
23:41
23:41
Play later
Play later
Lists
Like
Liked
23:41Ed unpacks why Philip Morris’ stock stumbled after its second-quarter report, what Coca-Cola’s results reveal about the state of the junk food industry, and why Bari Weiss’ media startup, The Free Press, is considering a deal with Paramount. Check out our latest Prof G Markets newsletter Order "The Algebra of Wealth" out now Subscribe to No Mercy /…
…
continue reading

1
Hunter Melts Down, Targeting the Funders of Riots across America & Combating the Threat of Drone Attacks in Coming Decades
31:31
31:31
Play later
Play later
Lists
Like
Liked
31:31🔥 1. Hunter Biden’s Interview and Political Commentary The episode opens with a critical discussion of a recent, controversial interview with Hunter Biden, in which he allegedly expresses anger at Democratic elites and hints at a potential presidential run. Cruz and Ferguson mock the interview, describing it as a “meltdown” and using it to criticiz…
…
continue reading

1
Sharepoint hack linked to Chinese groups, NGOs targeted with phishing tactics, engineer admits US missile theft
6:49
6:49
Play later
Play later
Lists
Like
Liked
6:49Microsoft links Sharepoint ToolShell attacks to Chinese hackers Russian threat actors target NGOs with new OAuth phishing tactics Silicon Valley engineer admits theft of US missile tech secrets Huge thanks to our sponsor, Nudge Security Nudge Security discovers every SaaS app used in your org, secures configurations, enforces MFA, and manages app-t…
…
continue reading

1
Risky Business #799 -- Everyone's Sharepoint gets shelled
1:13:55
1:13:55
Play later
Play later
Lists
Like
Liked
1:13:55Risky Biz returns after two weeks off, and there sure is cybersecurity news to catch up on. Patrick Gray and Adam Boileau discuss: Microsoft tried to make outsourcing the Pentagon’s cloud maintenance to China okay (it was not) She shells Sharepoint by the sea-shore (by ‘she’ we mean ‘China’) Four (alleged) Scattered Spider members arrested (and bai…
…
continue reading
After three lead episodes we review the key outcomes from the series with our esteemed speakers: Zeynep Soylu - Sydney Chapter President Chirag Joshi - Sydney Chapter Board Member Abby Zhang (pending) - Auckland Chapter Board Member Bharat Bajaj - ISACA Melbourne Board Director Jason Wood - Auckland Chapter former President This week's State of Cyb…
…
continue reading