Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Security Risks And Solut Podcasts

show episodes
 
Artwork

1
Foreign Policy Live

Foreign Policy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
  continue reading
 
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
  continue reading
 
Artwork

1
Cyber security risks and solutions

Cyber security risks and solut

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
  continue reading
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
Artwork

1
Nuix

Nuix

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Nuix creates innovative software that empowers organizations to simply and quickly find the truth from any data in a digital world. We are a passionate and talented team, delighting our customers with software that transforms data into actionable intelligence. Using Nuix software, customers can overcome the challenges of litigation, investigation, risk, compliance, and security by asking the right questions and getting complete, timely answers. Our collaborative data analytics algorithms and ...
  continue reading
 
Artwork

1
The Cash News

The Cash News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Your hosts, Tom Meehan, CIO and CISO at CONTROLTEK and Shaun Ferrari, Global Cash Product Director at Currency Research share the latest information on the issues affecting the world of cash today. Featuring interviews with top industry experts and thought leaders, you’ll have a close look at trends, strategies, and technology influencing the world of cash. Stay informed on topics like cash security, payments technology, risks, the cash supply chain, and learn about strategies to support bet ...
  continue reading
 
Artwork

1
Beers & Bytes Podcast

Beers & Bytes Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Beer is one of the oldest and most widely consumed alcoholic drinks in the world, and the third most popular drink overall after water and tea. Cybersecurity is required today for businesses to protect themselves from the persistent threat of malware and ransomware. Hosts Chris Jordan, CEO of Fluency Security, and Jeremy Murtishaw, CEO of Fortify 24x7 discuss cybersecurity, information technology, and hockey with their guests while enjoying some of their favorite beers. Grab your favorite be ...
  continue reading
 
Artwork

1
Day 2 Day

Jonny Crosthwaite & Glen T

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We are obsessed with success and know that it’s a journey, not a destination. We are fascinated with successful individuals in all business sectors, who are working on their goals or bettering themselves on a day 2 day basis.
  continue reading
 
Loading …
show series
 
A recent report highlights cybersecurity as a pressing concern for businesses worldwide. Drawing insights from 1,200 business leaders across more than 20 countries, the report reveals that approximately 75% of respondents experienced heightened anxiety about cybersecurity and privacy over the past year. Malware, flagged by nearly half of those surv…
  continue reading
 
Conflict broke out between Israel and Iran on Friday, with Israel launching an attack on Iran’s nuclear and military facilities and Iran responding in turn. Vali Nasr, a Middle East expert and professor at Johns Hopkins University, sits down with Ravi Agrawal to discuss. Nasr is the author, most recently, of Iran’s Grand Strategy: A Political Histo…
  continue reading
 
Chinese exports of rare earths, a critical component in manufacturing high-end tech products, emerged as a key sticking point in this week’s trade talks between Beijing and Washington. Underpinning all of this is the race for artificial intelligence supremacy. Who is winning this competition? Who is best placed to control the supply chains of all t…
  continue reading
 
In this episode of The Cyber Threat Perspective, we highlight the pentest findings that, frankly, have no business showing up in 2025. From accounts with weak passwords and no MFA to plaintext credentials on file shares, we break down the common misconfigurations and oversights that attackers still abuse, despite years of seeing the same issues ove…
  continue reading
 
The Cybersecurity and Infrastructure Security Agency (CISA) has recently faced a substantial reduction in force, with approximately one-third of its workforce—about 1,000 employees—departing under the Trump administration’s 17% budget cuts and voluntary buyout offers. Despite this contraction, the private sector is stepping into the breach: cyberse…
  continue reading
 
Victoria’s Secret disclosed that a cybersecurity breach—detected on May 24, 2025—led to the precautionary shutdown of its U.S. corporate systems and e-commerce site by May 26, keeping it offline for several days. The outage disrupted online shopping and in‑store services like returns, frustrating customers during the busy Memorial Day weekend. The …
  continue reading
 
Drones are playing an increasingly decisive role in conflicts around the world. Coupled with artificial intelligence and other technological advances, the very nature of warfare is transforming in front of our eyes. Are countries and their policymakers prepared? Mara Karlin, former assistant secretary of defense under U.S. President Joe Biden, join…
  continue reading
 
A financially motivated threat actor, known as UNC6040, has been orchestrating a sophisticated vishing (voice phishing) and extortion campaign targeting Salesforce users securityweek.com bleepingcomputer.com. The attackers impersonate IT support staff and call English-speaking employees at organizations spanning sectors like education, hospitality,…
  continue reading
 
In this episode of The Cyber Threat Perspective, we dive into why a “A day in the life of an External Penetration Tester." What do we actually do, and how do the things we do affect the overall engagement? What's important? We answer all of these questions and more in this week's episode. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/…
  continue reading
 
Gen Z has come of age amid a pandemic, growing polarization, and deep distrust of bureaucratic institutions. How does this shape their political and economic views? Do they still believe in the American Dream? Economic analyst and author Kyla Scanlon joins FP Live to discuss. Suggested reading: Institute of Politics: Spring 2025 Harvard Youth Poll …
  continue reading
 
A recent study by Dimensional Research and SailPoint highlights growing concerns over the security implications of agentic AI—autonomous bots capable of executing complex tasks without human oversight. The research reveals that 82% of organizations have already integrated these AI agents into their operations, with projections estimating over 1.3 b…
  continue reading
 
Cybercriminals are increasingly leveraging AI-generated videos on platforms like TikTok to disseminate infostealer malware. These deceptive videos often masquerade as tutorials or promotional content, featuring AI-generated personas that appear trustworthy and familiar to viewers. Once engaged, users are directed to download malicious software such…
  continue reading
 
On May 29, 2025, the U.S. House Committee on Homeland Security convened a field hearing at Stanford University's Hoover Institution to address the nation's cybersecurity vulnerabilities. Chaired by Representative Mark Green of Tennessee, the session featured testimonies from cybersecurity experts, including former National Security Advisor H.R. McM…
  continue reading
 
(REPLAY) This is a recording of a webinar aimed at IT professionals, system administrators, and cybersecurity professionals eager to bolster their defenses against cyber threats. In this session, "How to Harden Active Directory to Prevent Cyber Attacks," our expert speakers will discuss comprehensive strategies and best practices for securing your …
  continue reading
 
Earlier this week, thousands of Palestinians stormed an aid distribution site in Gaza, underlining the ongoing humanitarian crisis there and prompting the question: Why isn’t the world doing more? Martin Griffiths served as the undersecretary-general for humanitarian affairs and emergency relief coordinator at the United Nations from 2021 until 202…
  continue reading
 
Why are IT Leaders Moving from Active Directory to ZTNA? IT security is evolving fast. If you're still relying on traditional Active Directory access controls to protect your Microsoft Server environment, it might be time to rethink your strategy. In this post, I talk about why IT leaders are choosing Zero Trust Network Access — or ZTNA — to stay a…
  continue reading
 
EDR is a cybersecurity tool that monitors devices like laptops and servers, detecting and responding to threats in real time. Unlike traditional antivirus, which uses known malware signatures, EDR watches for suspicious behavior, like a program rapidly encrypting files—a ransomware red flag. Think of it as a security guard for every device. In this…
  continue reading
 
The PRMA Insurance Thought Leaders Insight Series with Spencer Houldin, alongside leading thought leaders in the industry, aims to examine the insurance terrain, identify solutions to navigating the bumpy roads, and provide a roadmap that guides risk management professionals in the right direction. In this episode our host, Spencer Houldin, Managin…
  continue reading
 
Are Passkeys Secure? Yes, passkeys are secure—and arguably the future of login security. They offer a phishing-resistant, user-friendly alternative to passwords and are being widely adopted by tech giants like Google, Apple, Microsoft, and others. In this episode we discuss the 5 reasons why Passkeys really are the future of login security. Buzz My…
  continue reading
 
**Hello listeners, an earlier version of this episode contained glitches due to an upload error. If you hear breaks in the audio, please download the episode again for the corrected version. Thanks for listening, and we apologize for the mishap!** Is Trump’s Middle East Policy a Break From the Past? Last week, U.S. President Donald Trump visited th…
  continue reading
 
In this episode of The Cyber Threat Perspective, we dive into why a “we couldn’t get in” result on a pentest isn’t always the victory it seems—and why it can be a great sign if interpreted correctly. We break down the real defensive controls that prevented compromise, explore what might still be hiding under the surface, and share why even a clean …
  continue reading
 
In this episode of The Cyber Threat Perspective, we tackle the crucial first step in cybersecurity: preventing initial compromise. We'll dissect common attack vectors like phishing and exploitation and explore layered defenses ranging from MFA and patch management to DMZs and WAFs. Get actionable guidance to integrate these controls into your secur…
  continue reading
 
U.S. President Donald Trump came to office promising mass deportations of undocumented immigrants, but he hasn’t actually hit the numbers he said he would. Is that because it’s harder than it sounds, or are more plans in the works? And what will Trump’s immigration policy do to America’s standing in the world? Janet Napolitano, a former governor of…
  continue reading
 
In this episode of The Cash News Podcast, Tom Meehan and Shaun Ferrari dive into recent real-world disruptions—like the power outage in Spain—that reinforce the critical role of cash in our modern payment landscape. From personal stories of system failures at airports and restaurants to a broader discussion about payment choice, digital overdepende…
  continue reading
 
Two nuclear-armed countries, India and Pakistan, are locked in their most serious conflict in two decades. Early Wednesday morning, after weeks of pledging to retaliate for the deadliest terrorist attack in more than a decade, India launched missiles across its border into Pakistan. Meanwhile, Pakistan claims it took down Indian fighter jets and ha…
  continue reading
 
In this episode of The Cyber Threat Perspective, we break down how attackers steal credentials and hijack sessions to gain unauthorized access to systems and data. From phishing to cookie stealing to session token theft, we’ll explore the most common techniques and how to defend against them. Whether you're an IT admin or security pro, you’ll walk …
  continue reading
 
This week, The Cash News Podcast goes live from the IACOA Conference! Brad and Shaun bring listeners on-site updates from the event and sit down with Michael Gaul from Lowers Risk Group to discuss the evolving risk landscape, industry trends, and key takeaways from the conference. Tune in for fresh insights straight from the floor of one of the ind…
  continue reading
 
To mark the first 100 days of the second Trump White House, we have a special ask-me-anything episode. Amid a firehose of news, which policies will endure, and which are purely rhetorical? How does Foreign Policy find the signal in the noise? FP Live’s executive producer, Dana Sherne, turns the tables on host Ravi Agrawal as he assesses the implica…
  continue reading
 
In this episode Spencer and Brad review the M-Trends 2025 Report. M-Trends 2025 is Mandiant's annual report that shares frontline learnings from its global incident-response engagements—over 450 000 hours of investigations in 2024—providing sanitized, data-driven analysis of evolving attacker tactics, dwell times, industry and regional trends, and …
  continue reading
 
In this special episode of The Cash News Podcast, we're trying something new—an AI-generated deep dive into a timely topic. Inspired by a piece written by CONTROLTEK CFO Brian Gross, we explore how currency fluctuations affect global security product sourcing and share key risk management strategies from a CFO’s perspective. Tune in to hear our AI …
  continue reading
 
April 29 marks the 100th day of U.S. President Donald Trump’s second term. What do foreign policy experts make of his administration’s performance so far, as it continues to wage a trade war, reshape long-standing diplomatic relationships with allies and alliances, and advance a new world order? FP columnist Emma Ashford sits down with Ravi Agrawal…
  continue reading
 
Cybersecurity in 2025 is a battlefield. The threats are smarter, faster, and more relentless than ever before. Let’s break down the Top Cyber Threat Trends you need to know about emerging cybersecurity trends in 2025. Buzz My Biz provides a unified cybersecurity platform ideal for business, education, healthcare, and local governments. Give us a ca…
  continue reading
 
In this replay, Spencer and Brad dive into lateral movement, discussing various techniques like RDP, RATs, Impacket tools, PsExec, PTH, PTT, and PowerShell Remoting. They explain how attackers use these methods to gain unauthorized access, evade detection, and enable malicious activities. They also discuss precursors to lateral movement and strateg…
  continue reading
 
The rollout of the Trump administration’s tariffs has rattled markets, prompting questions of what these protectionist policies mean for the global economy moving forward. Two top experts on globalization join FP Live to share their thoughts. Elisabeth Braw is an FP columnist and the author of Goodbye Globalization: The Return of a Divided World. A…
  continue reading
 
In this episode, Tom, Shaun, and new co-host Brad dig into the evolving relationship between cash and digital payments. They break down a fresh study on generational payment preferences, explore how tech is reshaping the payment landscape, and reflect on why cash still holds its ground. The trio also dives into the role of AI in banking and the gro…
  continue reading
 
Opening Summary: In this episode, Brad Bussie and Mark Aksel unpack the key security takeaways from Google Cloud Next 2025. From AI-powered threat detection to innovative SecOps integrations and game-changing cyber insurance developments, this episode gives enterprise security leaders the insights they need to stay ahead. Topics Covered: Google’s U…
  continue reading
 
A concerning trend is emerging across the business landscape: cybercriminals are increasingly turning to invoice fraud as a tactic to exploit small and medium-sized businesses. Here's how to help prevent your business from falling victim to invoice fraud. Buzz My Biz provides a unified cybersecurity platform ideal for business, education, healthcar…
  continue reading
 
The U.S.-China trade war has rattled the global economy, and there’s little sign of de-escalation. What does this mean for their respective economies? Where does this end? The Council on Foreign Relations’ Zongyuan Zoe Liu and the Center for Strategic and International Studies’ Scott Kennedy join FP Live to discuss. We want to hear from you! Help u…
  continue reading
 
Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
  continue reading
 
In this episode, Tyler and Brad discuss DMARC and how the latest version of the PCI framework requires phishing protection. You'll also learn about DMARC, DKIM, and SPF and how to elevate them to help protect your organization from attacks like Business Email Compromise (BEC). Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreat…
  continue reading
 
The race is on to dominate the artificial intelligence economy, making the need for safeguards ever more pressing. Jared Cohen, the president of global affairs at Goldman Sachs, joins FP Live to discuss the potential risks and benefits of this growing market—and how so-called geopolitical swing states play an increasingly important role. This conve…
  continue reading
 
Two leading economists debate the potential trade-offs of the Trump administration’s tariffs that are now roiling markets. Oren Cass, the founder of American Compass, joins Kimberly Clausing, a professor at UCLA, to discuss what this all means for the United States and the global economy. We want to hear from you! Help us shape the future of FP Liv…
  continue reading
 
In this episode of The Cyber Threat Perspective, we explore the strategic integration of deception technology like canaries and honeypots into your cybersecurity defenses. Discover how these tools allow you to detect threat actors earlier in their attack sequence, disrupt malicious activities, and mitigate potential damage to your organization. Joi…
  continue reading
 
Legal scholars argue that the Trump administration’s push to curtail the power of the U.S. judiciary mirrors moves by several authoritarian governments around the world. What does this mean for the United States’ court system and the rule of law? And what can be learned from global advocacy and civil society defying these trends? Political scientis…
  continue reading
 
Several of the world’s wealthiest men stood behind Donald Trump as he was inaugurated for a second term, contradicting his image as a populist president. This prompts the question, how much influence do the wealthy have on U.S. politics? Democratic Sen. Chris Murphy joins FP Live to share his take on the state of U.S. democracy, and whether the Uni…
  continue reading
 
Threat reports can be goldmines for defenders — but only if we know how to extract and apply what matters. A good analysis can mean catching an attack early or missing it entirely. There's no shortage of threat intel out there. The real challenge is making sense of it without getting overwhelmed. In this episode we discuss: What makes up a threat r…
  continue reading
 
Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
  continue reading
 
The Trump administration has dramatically shifted the United States’ long-standing relationship with Europe, pushing it to shore up its own defense. How is the continent grappling with these changes? And what does it mean for its policies, both foreign and domestic? Suggested reading (FP links are paywall-free): Kishore Mahbubani: It’s Time for Eur…
  continue reading
 
In this episode, Brad and Sam discuss the most common security issues found on external penetration tests, how to find them yourself, and how to address them. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://go.spenceralessi.com/myli…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play