Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Humans Of InfoSec Podcasts
CYBR.HAK.CAST is the official podcast of CYBR.HAK.CON., where cybersecurity professionals, hackers, and thought leaders come together to share their stories, insights, and lessons from the front lines of the infosec world. Hosted by Michael Farnum and Phillip Wylie, the show dives deep into topics shaping the modern cybersecurity landscape - from red teaming and ethical hacking to threat intelligence, blue team tactics, and the human side of security. Each episode brings candid conversations ...
…
continue reading
Voices of the Vigilant is where bold conversations meet unflinching purpose. Hosted by Jess Vachon, cybersecurity leader, Buddhist minister, and founder of Vigilant Violet LLC, this podcast explores the front lines of digital resilience, ethical leadership, and equitable transformation in tech. Through authentic dialogue with boundary-pushers, disruptors, and unsung heroes, each episode dives deep into the human side of cybersecurity—where strategy meets values, and innovation is grounded in ...
…
continue reading
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
…
continue reading
Unusually in-depth conversations about the world's most pressing problems and what you can do to solve them. Subscribe by searching for '80000 Hours' wherever you get podcasts. Hosted by Rob Wiblin and Luisa Rodriguez.
…
continue reading
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
…
continue reading
Bringing cyber security professionals together to share their expertise. CyberTech Talks is a podcast hosted by CREST.
…
continue reading
NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With decades of real-world IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Do you know who has access to what?
…
continue reading
Tripwire's cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire's VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
1
The Rise of Citizen OSINT, and What to Do About It
42:43
42:43
Play later
Play later
Lists
Like
Liked
42:43In this episode, hosts Robert Vamosi and AJ Nash engage with Neil Ysart, a seasoned expert in cyber investigations and open source intelligence (OSINT). They discuss the Coalition of Cyber Investigators, its role in promoting OSINT, and the importance of establishing standards in the field. The conversation delves into the challenges and risks asso…
…
continue reading
1
The Death of Passwords: The Future of Authentication
55:19
55:19
Play later
Play later
Lists
Like
Liked
55:19Is passwordless authentication finally ready for prime time, or are we just replacing one set of problems with another? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I'm Jim and in this episode, we're tackling one of the oldest chall…
…
continue reading
1
Rob & Luisa chat kids, the 2016 fertility crash, and how the 50s invented parenting that makes us miserable
1:59:09
1:59:09
Play later
Play later
Lists
Like
Liked
1:59:09Global fertility rates aren’t just falling: the rate of decline is accelerating. From 2006 to 2016, fertility dropped gradually, but since 2016 the rate of decline has increased 4.5-fold. In many wealthy countries, fertility is now below 1.5. While we don’t notice it yet, in time that will mean the population halves every 60 years. Rob Wiblin is al…
…
continue reading
In this episode of CYBR.HAK.CAST, hosts Michael and Phil dive into the latest cybersecurity news and trends, including major cloud outages, the impact of automation and AI on security, and recent high-profile attacks. They discuss lessons learned from real-world incidents, the importance of securing IoT devices, and the evolving tactics of threat a…
…
continue reading
1
#387 - InfoSec World 2025 - Trust, Transparency, and Technology: Building Better MSP Partnerships
50:06
50:06
Play later
Play later
Lists
Like
Liked
50:06Jim McDonald and Jeff Steadman sit down with Mike Reiring of RSM at InfoSec World 2025 to explore how managed service providers are reshaping IT and identity operations. They dig into the differences between MSPs and MSSPs, how to choose the right partner, and how AI is transforming help desks, problem management, and security monitoring. The conve…
…
continue reading
How we can use an output-based system to judge whether or not different kinds of technology achieve understanding or intelligence. Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.By Daniel Miessler
…
continue reading
1
Fear into Fluency: Building Real Cyber Literacy
42:27
42:27
Play later
Play later
Lists
Like
Liked
42:27Panic is not a security strategy. We sit down with Craig Taylor, co-founder of Cyberhoot and longtime virtual CISO, to unpack a people-first blueprint that replaces shame and fear with positive reinforcement, practical safeguards, and repeatable habits. Craig draws on his psychology background to explain why short, gamified exercises build muscle m…
…
continue reading
1
#228 – Eileen Yam on how we're completely out of touch with what the public thinks about AI
1:43:24
1:43:24
Play later
Play later
Lists
Like
Liked
1:43:24If you work in AI, you probably think it’s going to boost productivity, create wealth, advance science, and improve your life. If you’re a member of the American public, you probably strongly disagree. In three major reports released over the last year, the Pew Research Center surveyed over 5,000 US adults and 1,000 AI experts. They found that the …
…
continue reading
1
#386 - InfoSec World 2025 - CISO Tradecraft for IAM
1:01:49
1:01:49
Play later
Play later
Lists
Like
Liked
1:01:49In this episode of the Identity at the Center podcast, hosts Jeff and Jim broadcast from InfoSec World 2025, sharing lively discussions on identity management, AI security, and identity's evolving role in information security. They are joined by Ross Young and G Mark Hardy, co-hosts of the CISO Tradecraft podcast, who share their journeys into cybe…
…
continue reading
How humans and AI models both share the weakness of deterioration without novel inputs. Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.By Daniel Miessler
…
continue reading
This episode is sponsored by Nexis. Visit nexis-secure.com/idac to learn more. In this sponsored episode of *Identity at the Center*, host Jim McDonald sits down with Dr. Heiko Klarl, CEO of Nexis, to explore how the company is advancing authorization governance for modern enterprises. Dr. Klarl explains how Nexis builds visibility and control acro…
…
continue reading
In this episode, Michael DeBolt joins Robert Vamosi and AJ Nash to dive into the world of Cyber HUMINT — the application of traditional human intelligence (HUMINT) tradecraft in cyberspace. They discuss how investigators use digital personas (sometimes called “sock puppets”) to infiltrate online threat actor communities, collect intelligence, and e…
…
continue reading
1
How to Build Effective & Affordable Cyber Defences for SMEs
48:26
48:26
Play later
Play later
Lists
Like
Liked
48:26How can small and medium businesses protect themselves from cyber threats without spending a fortune or just ticking boxes for compliance? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I’m Jim and in this episode, we’re taking a look…
…
continue reading
1
OpenAI: The nonprofit refuses to be killed (with Tyler Whitmer)
1:56:06
1:56:06
Play later
Play later
Lists
Like
Liked
1:56:06Last December, the OpenAI business put forward a plan to completely sideline its nonprofit board. But two state attorneys general have now blocked that effort and kept that board very much alive and kicking. The for-profit’s trouble was that the entire operation was founded on the premise of — and legally pledged to — the purpose of ensuring that “…
…
continue reading
1
#384 - The FIDO Alliance's Next Frontier: Digital Credentials and Wallets
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36Live from Authenticate 2025, Jeff Steadman and Jim McDonald sit down with the Cal Ripken of IDAC, Andrew Shikiar, Executive Director and CEO of the FIDO Alliance. Andrew shares exciting updates on the incredible progress of Passkeys, revealing that over 3 billion are now in use securing accounts. We discuss the key themes of the conference, includi…
…
continue reading
1
Calm Under Fire: The Psychology of Thriving in Cybersecurity
40:37
40:37
Play later
Play later
Lists
Like
Liked
40:37Ever wonder why your brain feels sharp at 2 p.m. triaging alerts but foggy by 7 p.m. at home? We sit down with psychologist and behavioral scientist Dr. Sara Rabinovich to unpack the hidden cost of constant vigilance—and the small, evidence-based resets that bring your nervous system back online. Sara works with high-stress sectors like cybersecuri…
…
continue reading
1
Darn Whipper Snappers – Stay off my Internet! with Len Noe
50:10
50:10
Play later
Play later
Lists
Like
Liked
50:10We’re thrilled to announce the launch of CYBR.HAK.CAST., a new spinoff from our popular CYBR.SEC.CAST. feed! Hosted by Michael Farnum and co-hosted by renowned penetration tester and ethical hacker Phillip Wylie, CYBR.HAK.CAST. dives deep into the world of hacking. From real-world exploits and red team tactics to the human stories behind the hacker…
…
continue reading
1
#227 – Helen Toner on the geopolitics of AGI in China and the Middle East
2:20:02
2:20:02
Play later
Play later
Lists
Like
Liked
2:20:02With the US racing to develop AGI and superintelligence ahead of China, you might expect the two countries to be negotiating how they’ll deploy AI, including in the military, without coming to blows. But according to Helen Toner, director of the Center for Security and Emerging Technology in DC, “the US and Chinese governments are barely talking at…
…
continue reading
1
#383 - Navigating Identity and AI with IDPro at Authenticate 2025
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07Live from Authenticate 2025, Jeff Steadman and Jim McDonald sit down with Dr. Tina Srivastava, an IDPro board member and co-founder of Badge Inc., for a crucial discussion on the rapidly evolving landscape of identity and authentication. Tina shares her insights on the conference, the evolution from physical hacks to sophisticated AI-driven threats…
…
continue reading
1
#226 – Holden Karnofsky on unexploited opportunities to make AI safer — and all his AGI takes
4:30:19
4:30:19
Play later
Play later
Lists
Like
Liked
4:30:19For years, working on AI safety usually meant theorising about the ‘alignment problem’ or trying to convince other people to give a damn. If you could find any way to help, the work was frustrating and low feedback. According to Anthropic’s Holden Karnofsky, this situation has now reversed completely. There are now large amounts of useful, concrete…
…
continue reading
1
Dealing with AI Slop in OSINT Investigations
57:44
57:44
Play later
Play later
Lists
Like
Liked
57:44In this episode, AJ Nash and Robert Vamosi discuss the challenges posed by misinformation and the rise of AI-generated content. They explore the evolution of journalism, the impact of social media on information consumption, and the importance of critical thinking and media literacy. The conversation also touches on the role of AI in content creati…
…
continue reading
This episode is sponsored by HYPR. Visit hypr.com/idac to learn more. In this episode from Authenticate 2025, Jim McDonald and Jeff Steadman are joined by Bojan Simic, Co-Founder and CEO of HYPR, for a sponsored discussion on the evolving landscape of identity and security. Bojan shares his journey from software engineer to cybersecurity leader and…
…
continue reading
1
How Cybercriminals are using AI - and How to Defend Against It
57:02
57:02
Play later
Play later
Lists
Like
Liked
57:02What happens when the dark side gets its hands on cutting-edge AI and why might even seasoned defenders find themselves playing catch-up? Welcome back to Razorwire, where I’m joined by Oliver Rochford and Richard Cassidy to discuss how criminals are using AI, what's actually working and how the threat landscape is changing. We explore how adversari…
…
continue reading
1
#225 – Daniel Kokotajlo on what a hyperspeed robot economy might look like
2:12:01
2:12:01
Play later
Play later
Lists
Like
Liked
2:12:01When Daniel Kokotajlo talks to security experts at major AI labs, they tell him something chilling: “Of course we’re probably penetrated by the CCP already, and if they really wanted something, they could take it.” This isn’t paranoid speculation. It’s the working assumption of people whose job is to protect frontier AI models worth billions of dol…
…
continue reading
1
#381 - Beyond Human: Taming the Wild West of Non-Human Identities with Steve Rennick
1:14:36
1:14:36
Play later
Play later
Lists
Like
Liked
1:14:36In this episode, Jim McDonald and Jeff Steadman are joined by Steve Rennick, Senior Leader for IAM Architecture at Ciena, for a wide-ranging discussion on the most pressing topics in identity today. The conversation kicks off with a practical look at vendor demos, sharing best practices for cutting through the slideware and getting to the heart of …
…
continue reading
1
Why I Think Karpathy is Wrong on the AGI Timeline
9:54
9:54
Play later
Play later
Lists
Like
Liked
9:54Karpathy is confusing LLM limitations with AI system limitations, and that makes all the difference. Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.By Daniel Miessler
…
continue reading
1
#380 - Unpacking Bias and AI in Identity Systems with Sebastian Rohr
1:03:54
1:03:54
Play later
Play later
Lists
Like
Liked
1:03:54In this episode of the Identity at the Center podcast, Jim McDonald interviews Sebastian Rohr, the Chief Troublemaker at Umbrella Labs. They discuss the evolution of identity management, the challenges of digital identity, and the importance of national ID systems. Sebastian shares his personal journey into the identity field, the impact of digital…
…
continue reading
1
The Groundbreaker: Lessons from the Many Layers of Cyber
48:08
48:08
Play later
Play later
Lists
Like
Liked
48:08Careers aren’t linear, and the most resilient defenders are forged in the messy middle. We sit down with Andreae Pohlman—Air Force veteran, former Microsoft incident responder, and enterprise security advisor—to trace a path from identity trenches to global ransomware recovery and back to the architecture that holds it all together. Andreae opens t…
…
continue reading
1
Novelty Exploration vs. Pattern Exploitation
3:44
3:44
Play later
Play later
Lists
Like
Liked
3:44How going from exploration to exploitation can help you as both a consumer and creator of everything. Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.By Daniel Miessler
…
continue reading
In this episode of NeedleStack, hosts AJ Nash and Robert Vamosi engage with James Villenueve, a geospatial intelligence expert, to explore the world of GEOINT and its intersection with open source intelligence (OSINT). They discuss the importance of understanding geospatial data, the ethical implications of its use, and the challenges of protecting…
…
continue reading
1
What Actually Works in Cybersecurity (And What Doesn't)
41:06
41:06
Play later
Play later
Lists
Like
Liked
41:06Are you making career moves in cybersecurity or is cybersecurity making moves around you? Welcome to Razorwire. In this episode, I sit down with Marius Poskus - CISO, consultant, podcaster and all-round cyber expert - to how to succeed in cybersecurity. We discuss career paths, why security culture fails in most organisations and the risks of rushi…
…
continue reading
Some thoughts on how novelty and attention magnify the time that we have. Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.By Daniel Miessler
…
continue reading
1
#379 - The Strategic Importance of Identity Security in Enterprises with Eve Maler
48:16
48:16
Play later
Play later
Lists
Like
Liked
48:16In this episode of the Identity at the Center Podcast, Eve Maler, founder and CEO of Venn Factory joins host Jim McDonald. They discuss the significance of identity in the corporate world; detailing Eve's new book aimed at educating CEOs on the importance of treating identity as a strategic asset rather than mere infrastructure. They explore concep…
…
continue reading
1
#378 - Death and the Digital Estate (DADE)
1:02:05
1:02:05
Play later
Play later
Lists
Like
Liked
1:02:05This episode of the Identity at the Center podcast delves into the complex topic of death and the digital estate (DADE). Jim McDonald hosts Dean Saxe, Heather Flanagan, and Mike Kiser, who discuss the importance of planning for digital assets after death, the cultural implications of digital identity, and the evolving role of technology in managing…
…
continue reading
1
#224 – There's a cheap and low-tech way to save humanity from any engineered disease | Andrew Snyder-Beattie
2:31:11
2:31:11
Play later
Play later
Lists
Like
Liked
2:31:11Conventional wisdom is that safeguarding humanity from the worst biological risks — microbes optimised to kill as many as possible — is difficult bordering on impossible, making bioweapons humanity’s single greatest vulnerability. Andrew Snyder-Beattie thinks conventional wisdom could be wrong. Andrew’s job at Open Philanthropy is to spend hundreds…
…
continue reading
Jason Baker from the Guidepoint Research & Intelligence Team (GRIT) shares his background and provides insights into ransomware attribution, the challenges of defending against ransomware, and the implications of AI in ransomware operations.
…
continue reading
This episode is sponsored by Hush Security. Visit hush.security/idac to learn more. In this sponsored episode of Identity at the Center, hosts Jeff Steadman and Jim McDonald spotlight Hush Security, a company emerging from stealth with an innovative approach to machine identity and access management. CEO and co-founder Micha Rave explains why tradi…
…
continue reading
1
The Hidden Costs of Security Stack Consolidation (That Vendors Don't Mention)
48:15
48:15
Play later
Play later
Lists
Like
Liked
48:15Is your security stack making you safer or just adding to the chaos? Welcome to Razorwire, the podcast where we unravel the mess, myths and market realities behind today’s cybersecurity challenges. I’m your host Jim and in this episode, I’m joined by our favourite regulars Oliver Rochford and Richard Cassidy to tackle a topic that irritates every C…
…
continue reading
1
#376 - Understanding Device Identity in a Zero Trust Framework with Shea McGrew
1:14:23
1:14:23
Play later
Play later
Lists
Like
Liked
1:14:23In this episode of the Identity at the Center podcast, hosts Jeff and Jim dive into the concept of device identity within a Zero Trust framework. They are joined by Shea McGrew, CTO of Maricopa County Arizona, who provides insights into the importance of managing not just human but also device identities. The discussion explores the philosophical d…
…
continue reading
1
Inside the Biden admin’s AI policy approach | Jake Sullivan, Biden’s NSA | via The Cognitive Revolution
1:05:58
1:05:58
Play later
Play later
Lists
Like
Liked
1:05:58Jake Sullivan was the US National Security Advisor from 2021-2025. He joined our friends on The Cognitive Revolution podcast in August to discuss AI as a critical national security issue. We thought it was such a good interview and we wanted more people to see it, so we’re cross-posting it here on The 80,000 Hours Podcast. Jake and host Nathan Labe…
…
continue reading
1
A Conversation With Harry Wetherald CO-Founder & CEO At Maze
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03➡ Stay Ahead of Cyber Threats with AI-Driven Vulnerability Management with Maze: https://mazehq.com/ In this conversation, I speak with Harry about how AI is transforming vulnerability management and application security. We explore how modern approaches can move beyond endless reports and generic fixes, toward real context-aware workflows that act…
…
continue reading
Join Jeff Steadman and Jim McDonald for the September 2025 mailbag episode of Identity at the Center! This episode features listener questions from around the world about digital identity, trust, technology challenges, inclusion, biometrics, and even a candid discussion on air travel etiquette. Whether you're new to IAM or a veteran, you'll find pr…
…
continue reading
1
The Mentor’s Map: Empowering Pathways to Cyber
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46Chris Lemon's cybersecurity journey defies conventional paths. As Director of Security Engineering at Secure Yeti and an educator at City Colleges of Chicago, she's building bridges between education and employment while championing diversity in tech. What makes Chris's perspective so valuable is her unique background. Before entering cybersecurity…
…
continue reading
1
A Conversation With Grant Lee CO-Founder & CEO At Gamma
21:48
21:48
Play later
Play later
Lists
Like
Liked
21:48➡ Upgrade your presentations with Gamma, the best AI presentation maker: https://gamma.app In this conversation, I speak with Grant, co-founder of Gamma, about how their platform is transforming presentations and idea-sharing. Instead of starting with slides, Gamma helps you focus on the story first—then builds the visuals, structure, and delivery …
…
continue reading