Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Threat Modeling Podcasts
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
A Cyber Security Podcast, focussed on Threat Research and the interesting people behind it.
…
continue reading
Chris Romeo is going on a journey. A journey to understand threat modeling at the deepest levels. He thought he understood threat modeling but realized he could go deeper. Chris shares his findings and talks with some of the best-known experts in the space to experience continuous learning. Join along for the ride -- you will learn something. Chris Romeo is the CEO of Devici (THE Threat Modeling Company) and a General Partner at Kerr Ventures.
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading
Australia's leading business, marketing, tech and entrepreneurship podcast.
…
continue reading
Welcome to the Marvel Cinematic Rewind. The podcast that rewatches, reviews, and responds to every movie, show and one-shot in the Marvel Cinematic Universe.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading

1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Sam Prince is your host of The Creativitorium Podcast. Every weekend Sam will bring you behind the scenes as your guide to improve your career in acting, film, entertainment, play and screenwriting, and production in the performing arts. AND ACTION!
…
continue reading
Join mathematician and broadcaster Professor Hannah Fry as she goes behind the scenes of the world-leading research lab to uncover the extraordinary ways AI is transforming our world. No hype. No spin, just compelling discussions and grand scientific ambition.
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Each episode, Paul Spain and guests discuss what's happening in the world of technology, gadgets and telecommunications around the world and in New Zealand.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
A podcast which focuses on current trends in data mining, user privacy and cybersecurity. We wish to enlighten users and move users to become more aware of their data.
…
continue reading
Hosted by Yonatan Adiri and Michal Lev-Ram, What’s Your Number? is a weekly podcast from Ark Media, looking at the Israeli economy through a global lens.
…
continue reading
The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.
…
continue reading
Join Matias Madou for the interview series that brings the world's leading cybersecurity experts, educators, and academics to your living room. Chatting about all things software security, secure coding and the industry at large, it's the podcast for security enthusiasts everywhere.
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Signal Jam is a podcast about regaining and maintaining privacy in the face of pervasive corporate and government surveillance. Co-hosts, Jay and Michael, discuss practical steps that anyone can take toward achieving that outcome— no matter how 'tech-savvy' they may be.
…
continue reading
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
Step into the intellectual hub of Privacy Engineering, AI Governance, Leadership, and Security - the PALS Parlor Podcast. In this arena, we will dive deep. We unravel industry insights, latest trends, and best practices with the pioneers in these critically emerging fields.
…
continue reading
A New Angle is a current affairs Montana Public Radio program and podcast celebrating cool people doing awesome things in and around Montana. We live in the College of Business at the University of Montana. New episodes drop every Thursday. Recent and upcoming guests include Academy Award-winning actor J.K. Simmons, US Senator Jon Tester, Montana Governor Greg Gianforte, Cheryl Strayed (best-selling author of Wild), NYT Columnist Maureen Dowd, and many others. www.anewanglepodcast.com
…
continue reading
Insightful conversations with leading experts in the field of health care, medical research, policy, and more from the New England Journal of Medicine (NEJM). Each episode examines the many complexities found at the junction of medicine and society.
…
continue reading
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
…
continue reading
The Tech.eu Podcast is a show discussing the most interesting stories from the European technology scene.
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
Humans are the key to solving our cybersecurity challenges…but first we need them to be Well Aware. The Well Aware Security Show is hosted by George Finney, CISO for SMU and author of the award winning book, Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future. Security is in your DNA…so be Well Aware!
…
continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
continue reading
Dr. Carlos is an adjunct Professor in Forensic Psychology and Criminal psychopathology. He discusses concepts in the world of forensic psychology. He discusses legal issues pertaining to forensic psychology, psychology disorders, the criminal justice system and more
…
continue reading
Cybersecurity Innovation Podcast is the show that experts in their field share the lessons they've learned, the tactics they use, and all other things that are driving innovation in the field.
…
continue reading
The official podcast of the Florida Gators blog inallkindsofweather.com, featuring host Dustin Smith, founder Neil Shulman and contributor Casey Hampton.
…
continue reading
Talking the beat to cover what matters to you as an LEO. Join deputy chief Jim Dudley (ret.) every weekly as he sits down with law enforcement leaders and criminal justice experts to discuss strategy, challenges and trends in policing.
…
continue reading
Pharmacists and healthcare industry leaders Rob ‘Hoopi’ Nahoopii PharmD, MS, ACE and Greg Wilson PharmD, BCPS, ACE dive deeply into the complicated and contentious 340B Program as well as other pressing Pharmacy matters. Special guests and industry experts pop in frequently to add insights from all sides of the discussion. If you serve in the pharmacy sector, this podcast is a must-listen!
…
continue reading
Artificial Intelligence is transforming how we live, work and interact. The pace of change is relentless—and it’s increasingly difficult to keep up. Through conversations with leaders across industries and professions, we explore how to harness the technology’s potential and prepare for an AI-first future. Whether you’re building a business, navigating the future of work, or simply trying to make sense of what comes next, this is for you. Discover more episodes, tools and frameworks at notat ...
…
continue reading
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading

1
Safebooks AI’s Ahikam Kaufman on Why CFOs Need Company-Specific AI Models for Fraud Detection
27:27
27:27
Play later
Play later
Lists
Like
Liked
27:27Unlike CISOs who work with consistent vulnerabilities across cloud environments, CFOs face company-specific financial processes that change constantly, making automation historically complex to solve before the AI era. Ahikam Kaufman, CEO & CFO of Safebooks AI, explains why machine learning is the only viable solution to detect sophisticated embezz…
…
continue reading

1
The Problem With Threat Modeling in Application Security: Too Slow, Too Theoretical, Not Agile | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 2 | A Musing On the Future of Cybersecurity ...
3:58
3:58
Play later
Play later
Lists
Like
Liked
3:58Threat modeling is often called the foundation of secure software design—anticipating attackers, uncovering flaws, and embedding resilience before a single line of code is written. But does it really work in practice? In this episode of AppSec Contradictions, Sean Martin explores why threat modeling so often fails to deliver: It’s treated as a one-…
…
continue reading

1
The Once and Future Rules of Cybersecurity | A Black Hat SecTor 2025 Conversation with HD Moore | On Location Coverage with Sean Martin and Marco Ciappelli
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine’s on-location event coverage, Moore breaks …
…
continue reading

1
Beyond Phishing: Cyber Threats in the Age of AI with Four Flynn
46:30
46:30
Play later
Play later
Lists
Like
Liked
46:30Further reading: CodeMender: https://deepmind.google/discover/blog/introducing-codemender-an-ai-agent-for-code-security/ Cybersecurity at Google: https://blog.google/technology/safety-security/ai-security-frontier-strategy-tools/ Threat intelligence report: https://cloud.google.com/blog/topics/threat-intelligence/adversarial-misuse-generative-ai Th…
…
continue reading

1
Inside the FBI National Academy: How 10 weeks at Quantico shapes police leaders
49:32
49:32
Play later
Play later
Lists
Like
Liked
49:32Born from a push to professionalize policing, the FBI National Academy has evolved into a 10-week residential program where law enforcement leaders sharpen their fitness, academics and communication while building a global network. On this episode of Policing Matters, host Jim Dudley and two recent FBI NA graduates explore what the experience looks…
…
continue reading

1
The impact of AI on the workforce: A state-level case study
44:04
44:04
Play later
Play later
Lists
Like
Liked
44:04Daniel sits down with Chelsea Linder, VP of Innovation and Entrepreneurship at TechPoint, to explore the what AI innovation and impact look like on the ground. They discuss Chelsea's journey from the VC world into economic development/ innovation, the growth of an AI innovation network in Indiana (funded by the SBA), lessons learned from fostering …
…
continue reading

1
Patch or Perish: Navigating the Windows 10 EOL Minefield
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12The impending end-of-life (EOL) for operating systems like Windows 10 creates an immediate and permanent security vulnerability, essentially transforming these unpatched systems into prime targets for sophisticated cyber threats and ransomware attacks. This failure to maintain supported software leads to massive financial liabilities, including pot…
…
continue reading

1
Warrior culture with Donnie Wetzel Jr., part two
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06This week’s guest is Donnie Wetzel Jr., tribal liaison for the Montana Department of Labor and Industry. Donnie is also the founder of Identity, Inc., which houses the Montana Indian Athletic Hall of Fame. Donnie and his colleagues are working to promote the virtues of warrior culture through sport. In part two of this two-part episode, Donnie disc…
…
continue reading

1
When the Coders Don’t Code: What Happens When AI Coding Tools Go Dark? | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35In this issue of the Future of Cyber newsletter, Sean Martin digs into a topic that’s quietly reshaping how software gets built—and how it breaks: the rise of AI-powered coding tools like ChatGPT, Claude, and GitHub Copilot. These tools promise speed, efficiency, and reduced boilerplate—but what are the hidden trade-offs? What happens when the tool…
…
continue reading

1
Dev Engagement in Security: From Content Strategy to Community Strategy with Alyssa Miles
18:44
18:44
Play later
Play later
Lists
Like
Liked
18:44In this episode of the Security Repo Podcast, we chat with Alyssa Miles, a product marketing leader at CyberArk, about building authentic developer communities in the security space. She shares her journey from agency marketing to driving developer engagement, along with insights from Hacker Summer Camp and strategies for enabling community-driven …
…
continue reading

1
the_psychology_of_an_instigator_the_person_who_hires_a_hitman_case_study_diala_dippolito_1
14:37
14:37
Play later
Play later
Lists
Like
Liked
14:37By Circle Of Insight Productions
…
continue reading

1
NEJM Interview: Andrew Gabrielson on cuts to the U.S. research agency charged with safeguarding workers’ health.
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57Andrew Gabrielson is a pediatric urology fellow at Lurie Children's Hospital of Chicago. Stephen Morrissey, the interviewer, is the Executive Managing Editor of the Journal. A.T. Gabrielson and C. Corwin. Occupational Health and Safety on the Chopping Block — What’s at Stake? N Engl J Med 2025;393:1353-1355.…
…
continue reading

1
The PSYOP Industrial Complex: Hacking Human Trust in the Fifth Generation War
43:26
43:26
Play later
Play later
Lists
Like
Liked
43:26Modern conflict, often characterized as Fifth Generation Warfare (5GW), targets the consciousness and subconsciousness of civil populations through invisible, non-attributable cyber and informational attacks. We explore the looming "PSYOP industrial complex," which fuses military psychological operations techniques with hyper-personalized digital m…
…
continue reading

1
API Security: An Emerging Concern in Zero Trust Implementations
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41Application programing interfaces, more commonly known as APIs, are the engines behind the majority of internet traffic. The pervasive and public nature of APIs have increased the attack surface of the systems and applications they are used in. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), McKinley Sconie…
…
continue reading

1
Don’t Forget the Beauty of Simplicity: Exploring Shifts in Software Development
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43We’re debating the concepts of 'Shift Left' and 'Shift Down' in the world of cybersecurity. We explore the intricacies of developer responsibility, the impact of modern AI on code security, and the delicate balance between innovation and secure coding practices. Join us for a thought-provoking discussion that ranges from keeping our digital world s…
…
continue reading

1
AI Governance Essentials: Navigating Security and Compliance in Enterprise AI with Walter Haydock
31:05
31:05
Play later
Play later
Lists
Like
Liked
31:05AI Governance in an Era of Rapid Change In this episode of Cyber Sentries, John Richards talks with Walter Haydock, founder of StackAware, about navigating the complex landscape of AI governance and security. Walter brings unique insights from his background as a Marine Corps intelligence officer and his extensive experience in both government and …
…
continue reading

1
#66 The #1 Thing That Makes Pentesting Fun (Not Stressful) ft. Trent Miller
37:36
37:36
Play later
Play later
Lists
Like
Liked
37:36In this episode of The Hacker’s Cache, I sit down with penetration tester and security researcher Trent Miller (AzureAD) to talk about the one thing that makes pentesting fun instead of stressful: genuine friendships and community. We discuss how learning from other hackers, sharing experiences, and joining groups like DEF CON DC608 can accelerate …
…
continue reading

1
How AI is changing the marketing landscape
53:39
53:39
Play later
Play later
Lists
Like
Liked
53:39
…
continue reading

1
Florida Stuns #9 Texas in The Swamp | Dallas Wilson Dominates, Defense Delivers
1:06:35
1:06:35
Play later
Play later
Lists
Like
Liked
1:06:35Florida shocks the college football world with a stunning upset over the No. 9 Texas Longhorns, pulling off their biggest win of the Billy Napier era. Adrian Perez and Neil Shulman join the show to break it all down — from the elite play of 5-star freshman Dallas Wilson, who hauled in two touchdowns, to a ferocious Gator defense that racked up six …
…
continue reading

1
Revolutionising Access to Space: Stefan Powell on Dawn Aerospace’s Unique Approach
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40
…
continue reading

1
AI, CaaS, and Cronos: Inside the Industrialization of Cybercrime in 2024
11:02
11:02
Play later
Play later
Lists
Like
Liked
11:02By CISO Marketplace
…
continue reading

1
The DeepSeek AI Paradox: Security Catastrophe, CCP Censorship, and the High Cost of 'Cheap' Models
16:21
16:21
Play later
Play later
Lists
Like
Liked
16:21By CISO Marketplace
…
continue reading

1
Ultimate Penultimate - Jessica Jones S3 12: AKA A Lotta Worms
1:02:03
1:02:03
Play later
Play later
Lists
Like
Liked
1:02:03In this episode we chat about Netflix's Marvel's Jessica Jones! Season 3 Episode 12 - AKA A Lotta Worms You can find the complete plot on Wikipedia hereBy Tony Camarena
…
continue reading

1
The Cybersecurity and Privacy Divide: CISO vs. DPO in the Age of GDPR
16:31
16:31
Play later
Play later
Lists
Like
Liked
16:31We break down the crucial differences between the Chief Information Security Officer (CISO), who is responsible for protecting information assets against cyber threats, and the Data Protection Officer (DPO), whose primary focus is ensuring compliance with privacy laws and regulations. The roles face an inherent conflict of interest because the DPO …
…
continue reading

1
Stop the Attack Cycle: Play Ransomware, Phishing, and the Power of MFA
13:41
13:41
Play later
Play later
Lists
Like
Liked
13:41Ransomware groups, such as Play (also known as Playcrypt), were among the most active groups in 2024 and use advanced methods like double extortion, first exfiltrating data and then encrypting systems, often targeting critical infrastructure globally. Initial access frequently begins with human elements, as phishing remains the top entry point for …
…
continue reading

1
The Hidden Cost of Too Many Cybersecurity Tools (Most CISOs Get This Wrong) | A Conversation with Pieter VanIperen | Redefining CyberSecurity with Sean Martin
52:20
52:20
Play later
Play later
Lists
Like
Liked
52:20⬥GUEST⬥ Pieter VanIperen, CISO and CIO of AlphaSense | On Linkedin: https://www.linkedin.com/in/pietervaniperen/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ Real-World Principles for Real-…
…
continue reading

1
Cyber Security Resilience 2025: Taking Control in an Expanding Threat Landscape
14:37
14:37
Play later
Play later
Lists
Like
Liked
14:37This episode explores why cyber insureds are demonstrating enhanced resilience, evidenced by an overall decline in claims severity by more than 50% and a 30% drop in large loss frequency during 1H, 2025. We detail the shifting attacker tactics, including the migration of ransomware to less protected mid-sized firms and the emergence of data exfiltr…
…
continue reading

1
Billy Napier is a dead man walking… but can he beat Texas anyway?
49:20
49:20
Play later
Play later
Lists
Like
Liked
49:20Neil Shulman and Adrian Perez join the show to preview Florida’s massive showdown with Texas. The guys share their takes on Billy Napier’s future, break down the keys to the game, and give their score predictions for the matchup. They also provide the latest update from the Forecaster model, including the new Top 25, Games of the Week, and Florida …
…
continue reading

1
Phishing, Ransomware, and Geopolitical Spies: Inside the EU's 2025 Cyber Frontline
29:35
29:35
Play later
Play later
Lists
Like
Liked
29:35This episode dissects the latest ENISA Threat Landscape, revealing how cybercriminal operations remain potent, fueled by resilient Ransomware-as-a-Service (RaaS) models and highly effective vectors like phishing (60%) and vulnerability exploitation (21.3%). We explore how geopolitical conflicts drive state-aligned cyberespionage, particularly from …
…
continue reading

1
Warrior culture with Donnie Wetzel Jr., part one
29:21
29:21
Play later
Play later
Lists
Like
Liked
29:21This week’s guest is Donnie Wetzel Jr., tribal liaison for the Montana Department of Labor and Industry. Donnie is also the founder of Identity, Inc., which houses the Montana Indian Athletic Hall of Fame. Donnie and his colleagues are working to promote the virtues of warrior culture through sport. In this conversation, Donnie explains the qualiti…
…
continue reading

1
Security Awareness for the Connected Generation
1:02:07
1:02:07
Play later
Play later
Lists
Like
Liked
1:02:07In this episode of Unspoken Security, host A.J. Nash sits down with Marley Salveter, Director of Marketing at Unspoken Security. They explore how digital privacy and security awareness look different for younger generations who have grown up in a world where sharing personal data is routine, not a choice. Marley shares her perspective on adapting t…
…
continue reading

1
SBOMs in Application Security: From Compliance Trophy to Real Risk Reduction | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 3 | A Musing On the Future of Cybersecurity with Sean Martin and ...
2:33
2:33
Play later
Play later
Lists
Like
Liked
2:33SBOMs were supposed to be the ingredient label for software—bringing transparency, faster response, and stronger trust. But reality shows otherwise. Fewer than 1% of GitHub projects have policy-driven SBOMs. Only 15% of developer SBOM questions get answered. And while 86% of EU firms claim supply chain policies, just 47% actually fund them. So why …
…
continue reading

1
When the world turned on cops, she listened
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48For more than a decade, Abby Ellsworth has been listening to police officers, first through interviews in the Seattle area and later through her podcast, On Being a Police Officer. She launched the show in 2020, at a moment when policing was under intense scrutiny and officers faced both public criticism and personal strain from COVID restrictions …
…
continue reading

1
Beyond Controls: Building Trust and Communication in Security – Featuring AriaDear
19:59
19:59
Play later
Play later
Lists
Like
Liked
19:59In this episode of the Security Repo Podcast, Aria Langer returns to share deep insights from her work in privileged access management and the challenges of implementing security controls without alienating coworkers. She and Dwayne dive into the often-overlooked importance of empathy in cybersecurity, exploring how human connection can make securi…
…
continue reading

1
NEJM Interview: Steven Lipstein on the drivers and the benefits of mergers and consolidation, from the perspective of a health care system leader.
11:33
11:33
Play later
Play later
Lists
Like
Liked
11:33Steven Lipstein is the former chief executive officer of BJC HealthCare. Stephen Morrissey, the interviewer, is the Executive Managing Editor of the Journal. S. Lipstein. Insight into Corporate Governance — What Motivates Hospitals and Delivery Systems. N Engl J Med 2025;393:1249-1251.
…
continue reading

1
More Cowbell: Security and Speed in Agile
48:37
48:37
Play later
Play later
Lists
Like
Liked
48:37We’re diving into the relevance and execution of threat modeling within agile development environments. We dissect the claims, explore the true integration of agile practices with threat modeling, and address the misconceptions and challenges commonly faced. Check out the episode to find out if threat modeling is indeed slowing down agile processes…
…
continue reading

1
The Global Tech Tangle: AI, Censorship, and the 2025 Compliance Crisis
15:03
15:03
Play later
Play later
Lists
Like
Liked
15:03This year marks a high-stakes moment for digital governance as major legislation like the EU AI Act, DORA, and India's DPDPA see major enforcement, imposing new obligations on enterprises worldwide. We analyze how algorithmic logic and frameworks like the EU Digital Services Act (DSA) are compelling global censorship by targeting "misleading" or "h…
…
continue reading

1
Why Are 94% of CISOs Worried About AI, and Is Zero Trust the Only Answer?
15:50
15:50
Play later
Play later
Lists
Like
Liked
15:50Identity fabric, a contemporary, flexible identity and access management (IAM) architecture, should “be involved at every stage of authentication and authorisation,” says Stephen McDermid, CSO, EMEA at Okta Security. According to CISCO’s VP, 94 per cent of CISOs believe that complexity in identity infrastructure decreases their overall security. In…
…
continue reading

1
#65 Why You Can’t Find a Job After Passing OSCP
38:40
38:40
Play later
Play later
Lists
Like
Liked
38:40Struggling to land a cybersecurity job after passing the OSCP? In this episode of The Hacker’s Cache, I break down why the OSCP certification alone isn’t enough to secure a penetration testing role. From the importance of starting in entry-level IT positions and gaining real-world technical experience, to building soft skills, showcasing work ethic…
…
continue reading

1
Fast, Safe, and Automated: Bridging DevOps and SecOps in the Age of Engineering Excellence
27:24
27:24
Play later
Play later
Lists
Like
Liked
27:24Enterprises can no longer afford the old trade-off between speed and safety. Developers are under constant pressure to release code faster. At the same time, security teams face an endless stream of new threats. The middle ground is clear, and that is software must be secure and resilient from the start, without slowing innovation. This is the phil…
…
continue reading

1
Is Israel's Business Model Sustainable? - with Eugene Kandel
46:42
46:42
Play later
Play later
Lists
Like
Liked
46:42Israel’s Strategic Futures Institute: israelstrategicfutures.org/en Find us on: 📺 YouTube 📸 Instagram 💼 LinkedIn 𝕏 Michal on X 𝕏 Yonatan on X 📩 Write to us here 📈Our WYNDEX update for today: It’s the 6th week of positive WYNDEX in a row. To be more exact, for the period between September 15th and September 27th, the WYNDEX grew by 1.95%, beating th…
…
continue reading

1
Playboy models ‘tortured’ in BDSM sex dungeon in NYC penthouse: feds
1:43
1:43
Play later
Play later
Lists
Like
Liked
1:43By Circle Of Insight Productions
…
continue reading

1
Investors don't understand AI, says founder of OpenAI safety adviser
36:49
36:49
Play later
Play later
Lists
Like
Liked
36:49In this Tech.eu podcast, Faculty AI founder Marc Warner talks AI and the work undertaken by Faculty AI.By Tech.eu
…
continue reading

1
Artificial Power: Brussels, Silicon Valley, and the Global Compliance Fight
12:53
12:53
Play later
Play later
Lists
Like
Liked
12:532025 marks a high-stakes year for enterprises navigating rapidly shifting obligations as global compliance accelerates across continents, driven by major enactments like India's DPDPA (effective July 2025) and sweeping EU frameworks. We analyze the core tensions between the EU's binding, risk-based frameworks, such as the EU AI Act banning unaccept…
…
continue reading