Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
…
continue reading
The Cyber-Savvy Boardroom, a Google Cloud Office of the CISO podcast, offers monthly 15-20 minute episodes featuring security leaders, board members, and thought leaders. Hosted by David Homovich and rotating Office of the CISO members, experts share insights for strategic clarity and improved organizational security. Guests include board members, Google Cloud/Google executives, Office of the CISO Board Insights team members, board advisors, and industry thought leaders.
…
continue reading
Each episode, Angela and Vince dig into the key issues facing organizations when it comes to cybersecurity and CPS (Cyber-Physical Systems). Sponsored by Viakoo, the leader in CPS vulnerability remediation.
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. Join Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute, and CEO of NCX Group with over 24 years of expertise, for weekly, no-nonsense insights tailored to CEOs, CFOs, and business leaders. From data breaches to actionable cybersecurity and data privacy strategies, we deliver practical steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk into oppor ...
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Breaking Cyber Barriers dives deep into the world of Cybersecurity, uncovering trends and exploring its limitless potential. Join host Liz Vagenas as she speaks with top leaders about the current challenges and opportunities within the industry, as well as strategies for success.
…
continue reading
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
…
continue reading
Introducing The Cyber Translator, a 10-minute podcast designed for busy business leaders who want to bridge the gap between cybersecurity, technology, and business strategy. Hosted by Sean Hanna, this podcast cuts through the complexity of cyber technology, risk, and governance, translating it into practical, actionable insights that drive real business value. Each episode helps business leaders understand "technology speak" and shows them how to turn cybersecurity and compliance into opport ...
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber®
…
continue reading
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
…
continue reading

1
RCR 160: Physical Meets Digital: Security's Evolving Frontier - Vendor Focus (Haystack.com)
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14The boundary between physical and cybersecurity is rapidly disappearing, creating both challenges and opportunities for security professionals across domains. This eye-opening conversation with Casey Rash from Secure Passage explores how modern physical security devices have evolved into sophisticated IoT endpoints generating valuable security data…
…
continue reading

1
Mastering Cyber Risk: Matthew Alderman on Cybersecurity, Leadership & Building CyberSaint
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16Send us a text Join Joe as he reconnects with Matthew Alderman, Chief Product Officer at CyberSaint, in this insightful episode of the podcast! With over 250 episodes under his belt, Joe dives deep with Matthew, a cybersecurity veteran, podcast host, and advisor, to explore: CyberSaint’s Game-Changing Approach: How CyberSaint uses historical loss d…
…
continue reading

1
Fortinet Exploits, Windows INET Folder, and AI Code Risks: Cyber Security Today for April 14
6:46
6:46
Play later
Play later
Lists
Like
Liked
6:46In this episode of Cybersecurity Today, host David Shipley discusses several pressing concerns in the cybersecurity landscape. Attackers have been exploiting Fortinet VPN devices to maintain access even after patches were applied; administrators are urged to upgrade and follow recovery guidance. Microsoft has created a new INET Pub folder through i…
…
continue reading

1
Balancing Risk, Resilience and AI in Security - Ep 144
26:25
26:25
Play later
Play later
Lists
Like
Liked
26:25In this episode of Reimagining Cyber, host Tyler Moffitt welcomes Tim Armandpour from PagerDuty to explore how organizations can assess and manage their cyber risk in an era of rapid technological change. They discuss the importance of continuous risk evaluation, building a culture of resilience, and the impact of AI on security practices. Tim shar…
…
continue reading

1
13cabs cyber incident, more Trump administration security issues, and Luke Dembosky and Brenton Steenkamp on executive risk
1:02:44
1:02:44
Play later
Play later
Lists
Like
Liked
1:02:44In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft discuss local hacks and the rise of a whole new ransomware evolution. Clayton Utz’s Brenton Steenkamp and Debevoise & Plimpton’s Luke Dembosky also join in to talk about executive risk and governance. Hollingworth and Croft kick things off with a discussion of a fascina…
…
continue reading

1
Scaling Cyber at Fujitsu: Laura O'Neill on Strategy, Risk and Growth
44:14
44:14
Play later
Play later
Lists
Like
Liked
44:14Episode Summary In this episode of Secured, host Cole Cornford chats with Laura O'Neill from Fujitsu Cyber. Laura shares her journey from a pure maths and cryptography background through management consulting into the world of cybersecurity. She explains how she helped grow MF&A from a small team into a 70-person company before its acquisition by F…
…
continue reading

1
100 Days of Trump: The Ask-Me-Anything Edition
49:53
49:53
Play later
Play later
Lists
Like
Liked
49:53To mark the first 100 days of the second Trump White House, we have a special ask-me-anything episode. Amid a firehose of news, which policies will endure, and which are purely rhetorical? How does Foreign Policy find the signal in the noise? FP Live’s executive producer, Dana Sherne, turns the tables on host Ravi Agrawal as he assesses the implica…
…
continue reading

1
Liora Shimoni former Deputy Dir. @state Comptroller Audit Division on cyber auditing
43:53
43:53
Play later
Play later
Lists
Like
Liked
43:53משרד מבקר המדינה הוא גוף הביקורת הגדול בישראל עם כמות עצומה של נושאים בהם הוא נדרש לטפל. נושא הסייבר הפך להיות נושא מהותי לאור אין ספור המתקפות כנגד גופי מדינה והניסיון להשבית מערכות של גופי ממשל, בריאות, ביטחון ועוד. עו"ד הדס תמם בן אברהם סגנית הדיקן בקריה האקדמית אונו ונחשון פינקו אוונגליסט סייבר מארחים את ליאורה שמעוני לשעבר סגנית מבקר המדינה ומ…
…
continue reading

1
Cybersecurity News Roundup: Book Deals, Retail Attacks, Apple Spyware Alerts, and More
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32In this episode, host Jim Love discusses various cybersecurity topics including a book deal from CRC Press for those interested in cybersecurity, auditing, and leadership. Major cyber incidents involving two UK retailers, Co-op and Marks & Spencer's, are detailed, highlighting the challenges they face. Apple's notifications to users in 100 countrie…
…
continue reading

1
How to identify the cyber skills your team really needs, with Lumify’s Louis Cremen and Jeremy Daly
45:29
45:29
Play later
Play later
Lists
Like
Liked
45:29In this episode of the Cyber Uncut podcast, host Liam Garman is joined by Lumify lead cyber security instructor Louis Cremen and cyber security lead Jeremy Daly. Together, they unpack the essential cyber security skill sets different organisations need – and how businesses can ensure their teams stay ahead of evolving threats. The discussion kicks …
…
continue reading

1
Practical Steps to Achieve NIST 800-171 Compliance | Guide To NIST 800-171
16:22
16:22
Play later
Play later
Lists
Like
Liked
16:22Welcome to episode sixteen of our NIST 800-171 series ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/alerts/ to subscribe. ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @secd…
…
continue reading

1
From Compliance to SBOMs: Josh Bressers’ Take on Security
1:05:47
1:05:47
Play later
Play later
Lists
Like
Liked
1:05:47In this episode, Raj Krishnamurthy sits down with Josh Bressers, VP of Security at Anchore and longtime leader in the open source security space. With decades of experience, Josh brings a candid and compelling perspective on everything from the chaos of early cybersecurity days to the nuanced challenges of SBOMs and compliance in today’s world. Jos…
…
continue reading
🎙️ Episode Title: The Silent Threat to Your Bottom Line Podcast: Bite Size Security with Mike Fitzpatrick Episode Summary: In this episode, Mike Fitzpatrick, CEO of NCX Group, pulls back the curtain on one of the most underestimated risks to your business: the assumption that cybersecurity is “just an IT problem.” Mike shares real-world insights fr…
…
continue reading

1
Is Traditional Client-Based Access Obsolete? Rethinking Internal Security
29:08
29:08
Play later
Play later
Lists
Like
Liked
29:08"If you envision a world where what would be the most ideal way to make access management IAM decisions, to enable people to access internal things, you'd want to do a few things,” reflects Bobby DeSimone, Founder and CEO at Pomerium. In this episode of The Security Strategies Podcast, host Alejandro Leal, cybersecurity expert and senior analyst at…
…
continue reading

1
S17 E02 (VIDEO) Is Your Job Safe From AI?
46:55
46:55
Play later
Play later
Lists
Like
Liked
46:55#SecurityConfidential #DarkRhiinoSecurityAlex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and par…
…
continue reading
Alex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and participated in over 20 M&A transactions. Re…
…
continue reading

1
Surveillance Capitalism: You Are The Product
8:59
8:59
Play later
Play later
Lists
Like
Liked
8:59In this eye-opening kickoff to Season 6, Darnley dives into the hidden world of surveillance capitalism—where your clicks, swipes, and searches are turned into profit. You ARE the product. Discover how data profiling shapes your digital life, influences what you see, and quietly sells your behaviour to the highest bidder. Real-world examples, pract…
…
continue reading

1
teissTalk: DORA - A new law for a new dawn
44:58
44:58
Play later
Play later
Lists
Like
Liked
44:58What DORA is specifically asking of organisations Where the likely CTI gaps are when attempting to align with DORA Why innovation is key to aligning your CTI capabilities This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Benoit Heynderickx, Principal Analyst, Information Security Forum (ISF) https://www.linkedin.com/…
…
continue reading

1
CR096 TechnoVision 2025: Your gateway to cutting-edge innovation with Data-Powered Innovation Jam podcast
1:31:45
1:31:45
Play later
Play later
Lists
Like
Liked
1:31:45TechnoVision 2025 by Capgemini helps business leaders and technologists understand and prioritize emerging technologies. It provides a clear view of tech trends, guiding decision-makers to enhance organizational effectiveness. TechnoVision acts as a beacon in the evolving technology landscape. In this very special episode, Dave, Esmee, and Rob talk…
…
continue reading

1
How Hackers Think.🔥Chris Roberts🔥Latest AI Risks for Business
58:38
58:38
Play later
Play later
Lists
Like
Liked
58:38Rural Healthcare and small/midsized businesses are being tipped over the edge. Not by Tariffs or high interest rates, but by investments needed into protecting their people and systems from disruption. How can you protect yourself from something you don’t know? A risk you don’t understand. What if you could think like a hacker… and use that power t…
…
continue reading

1
From Cryptography to AppSec: Scott Contini on Building Practical Security
42:16
42:16
Play later
Play later
Lists
Like
Liked
42:16Episode Summary Scott Contini has a PhD in cryptography with more than a dozen research publications, and has spent the last 15 years focused on solving real-world security problems. After switching from academia to industry in 2008, Scott has identified hundreds of cryptographic implementation flaws across the world, written widely read blogs on c…
…
continue reading
Takeaways #ExposureManagement involves assessing multiple factors, not just single scans. Organisations must optimise their remediation capacity due to limited resources. Visibility is crucial, but finding the most important exposure is essential. #TraditionalVulnerability management programs are becoming ineffective. Exploitability is the key crit…
…
continue reading

1
Christiaan Beek on Ransomware's Evolution and Economics
30:05
30:05
Play later
Play later
Lists
Like
Liked
30:05Rapid7 Senior Director of Threat Analytics Christiaan Beek joins the Nexus Podcast to discuss the technical evolution and economic models that maintain ransomware's viability among threat actors. Ransomware became a for-profit threat more than a decade ago and has progressed into the No. 1 threat facing many critical infrastructure organizations. I…
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
Cybersecurity Incidents: Musk's Staffers, Canadian Power Utility Attack, and Massive Password Leak
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43In this episode of Cybersecurity Today, host Jim Love discusses several major cybersecurity events. Two members of Elon Musk's 'Department of Government Efficiency' reportedly gained access to classified US nuclear networks, though accounts were never activated. Nova Scotia Power faces a cyber attack affecting customer services but not critical inf…
…
continue reading

1
Episode 305 Deep Dive: Chris Peake | What's Ahead for Cyber Security in Australia and Its Impact on Businesses in 2025
37:21
37:21
Play later
Play later
Lists
Like
Liked
37:21In this episode, we sit down with Chris Peake, Chief Information Security Officer (CISO) and Senior Vice President of Security at Smartsheet, as he explores what lies ahead for cybersecurity in Australia and its impact on businesses in 2025. Chris discusses the evolving role of AI—both as a tool for cyber adversaries and as an advantage for defende…
…
continue reading

1
CYFIRMA Research- Hannibal Stealer: A Rebranded Threat Born from Sharp and TX Lineage
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Read CYFIRMA’s report on the Hannibal Stealer, a rebranded variant of SHARP and TX Stealers, which has re-emerged with expanded data exfiltration capabilities and an updated command-and-control infrastructure. Hannibal Stealer is built in C# on the .NET framework. It targets a wide range of data sources, including browsers, cryptocurrency wallets, …
…
continue reading

1
Deepfake Dilemma: Why Facial Recognition is Failing - Ep 147
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12In this eye-opening episode of Reimagining Cyber, host Tyler Moffitt is joined by Tom Tovar, co-creator of cybersecurity company Apto, to unpack one of the fastest-growing threats in mobile security—deepfakes and biometric bypass attacks. Tom explains why facial recognition, once considered a reliable security measure, was never designed to withsta…
…
continue reading

1
Security Gone Mad: The Fine Art of Overdoing It
41:41
41:41
Play later
Play later
Lists
Like
Liked
41:41Welcome to Razorwire, the podcast that challenges conventional thinking about cybersecurity with insight, humour and a dose of reality. In this brilliantly unfiltered episode, we're joined by security professionals Iain Pye and Chris Dawson for a no-holds-barred discussion about security measures that cross the line from prudent to preposterous. Fr…
…
continue reading
Why did a mysterious empty "inetpub" directory appear after April's Patch Tuesday? And what new Windows Update crashing hack did this also create? North Korea is now creating fake US companies to lure would-be employees. The "Inception" attack subverts all GPT conversational AIs. New information about data loss in unpowered SSD mass storage. Lots o…
…
continue reading

1
AI, Risk, and Reality: The CISO’s Guide to What’s Coming Next
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11Sponsor: Netskope (www.netskope.com) EP62 | Building Real Cybersecurity Communities + AI Clarity with Dr. Anand Singh (Live from CISO XC ATX) Sponsored by Netskope What happens when a CISO-led community takes root in a new city — and how do you cut through the noise around AI in cybersecurity? In this special episode recorded live from the inaugura…
…
continue reading

1
The Realist POV on Trump’s First 100 Days
46:48
46:48
Play later
Play later
Lists
Like
Liked
46:48April 29 marks the 100th day of U.S. President Donald Trump’s second term. What do foreign policy experts make of his administration’s performance so far, as it continues to wage a trade war, reshape long-standing diplomatic relationships with allies and alliances, and advance a new world order? FP columnist Emma Ashford sits down with Ravi Agrawal…
…
continue reading

1
CYFIRMA Research- Technical Malware Analysis Report: Python-based RAT Malware
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12A New Breed of Python-Based RATs is Abusing Discord for C2 The CYFIRMA research team has investigated an emerging class of Python malware that is turning popular platforms into weaponized control panels. One recent variant showcases just how accessible and disruptive these tools have become. This lightweight Remote Access Trojan (RAT) uses Discord …
…
continue reading

1
Season 1 - Episode 5 (Pedro Kertzman & Josh Darby MacLellan)
43:21
43:21
Play later
Play later
Lists
Like
Liked
43:21What does it take to succeed in cyber threat intelligence today? Josh Darby McLellan draws from his unique journey through geopolitical risk into the CTI space to reveal practical insights for both aspiring analysts and established professionals. The conversation opens with Josh's unexpected path into threat intelligence, highlighting a crucial rev…
…
continue reading

1
S34 Ep1: Threat Horizon 2027: Grasping for Control
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12Today, Steve talks about ISF's flagship foresight report "Threat Horizon 2027: Grasping for Control." In a world defined by disruption and acceleration, this report offers not just a forecast of cyber threats, but a blueprint for resilience, and Steve walks listeners through the key themes. Key Takeaways: 1 Flexibility will be key in an increasingl…
…
continue reading

1
Do You Have The Right Cybersecurity Stack?
31:02
31:02
Play later
Play later
Lists
Like
Liked
31:02Tools galore, shiny object syndrome, must there be a tool for that? Then we get caught up in our day-to-day, and perhaps we forget about a tool or a tool feature, and we begin looking to solve another challenge. I get to sit down with Augie Staab of TD Synnex. We have a great discussion around right sizing your tech stack as an MSP and what it mean…
…
continue reading

1
Inside the DARPA AI Cyber Challenge: Securing Tomorrow’s Critical Infrastructure Through AI and Healthy Competition | An RSAC Conference 2025 Conversation with Andrew Carney | On Location Coverage with ...
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35During RSAC Conference 2025, Andrew Carney, Program Manager at DARPA, and (remotely via video) Dr. Kathleen Fisher, Professor at Tufts University and Program Manager for the AI Cyber Challenge (AIxCC), guide attendees through an immersive experience called Northbridge—a fictional city designed to showcase the critical role of AI in securing infrast…
…
continue reading

1
Unpacking the UK Cyber Governance Code of Practice
12:40
12:40
Play later
Play later
Lists
Like
Liked
12:40Tune into this episode for a deep dive into the UK government's Cyber Governance Code of Practice. This Code is a crucial resource designed specifically for boards and directors. Understanding it can significantly benefit your organisation. By listening, you will gain insights into: • Why cyber governance is essential for modern businesses and orga…
…
continue reading

1
From Peacetime to Wartime: Is Your Cloud Secure?
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52Takeaways #Peacetimesecurity is no longer sufficient in modern cloud environments. AI and automation are essential for effective security management. Real-time security platforms can prevent breaches before they occur. Integrating security into the development process is crucial for success. Key metrics include mean time to detect and remediate vul…
…
continue reading

1
Cybersecurity Updates: CEO Legal Troubles, Global Cyber Rules, Microsoft Fix Issues, and AI at B-Side SF
8:49
8:49
Play later
Play later
Lists
Like
Liked
8:49In this episode of 'Cybersecurity Today', host David Shipley covers multiple key stories: Veritaco CEO Jeffrey Bowie is charged with attempting to infect a hospital with malware. Global Chief Information Security Officers (CISOs) call on world governments to harmonize cybersecurity regulations. Issues arise with Microsoft's recent 'Mystery Folder' …
…
continue reading

1
Are you at Risk? Personal Liability Cyber Breaches.
54:33
54:33
Play later
Play later
Lists
Like
Liked
54:33We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation …
…
continue reading

1
CONTESTED GROUND: Cyber war, global politics and the power of truth: Unpacking conflict in the Information Age
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28In this episode of the Contested Ground podcast, hosts Major General (Ret’d) Dr Marcus Thompson, Phil Tarrant and Liam Garman discuss the application of cyber and information in the modern threat environment, and how the White House is changing voting behaviours across the West. They begin the podcast by unpacking Thomas Rid's Cyber War Will Not Ta…
…
continue reading

1
🚨New FBI Alert🚨Got a DM from the “FBI” on Telegram?
1:47
1:47
Play later
Play later
Lists
Like
Liked
1:47📲 Got a DM from the “FBI” on Telegram? 🚨 Did someone named “Jaimie Quin” claim they run IC3? ⚠️ It’s a scam. Full stop. The FBI just issued an alert warning the public: They are NOT direct messaging victims on Telegram or any other social media app. A scammer posing as “Jaimie Quin” is pretending to be the head of the FBI’s Internet Crime Complaint…
…
continue reading

1
Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure
1:36:41
1:36:41
Play later
Play later
Lists
Like
Liked
1:36:41Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure 03:11 Vulnerabilities and Weaknesses in Critical Infrastructure 10:0…
…
continue reading