The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Security Intelligence Podcasts
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Canada's intelligence landscape is as unique as the country itself. In an evolving global threat environment, fostering informed discussions on intelligence has become increasingly vital to the national security discourse. Secure Line Podcast is designed to influence and inform the national dialogue on security and intelligence in Canada, and internationally. Secure Line is brought to you by the Canadian Association for Security & Intelligence Studies (CASIS).
…
continue reading
âPod Save Americaâ cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obamaâs National Security Council. On âPod Save the World,â he and former deputy national security adviser Ben Rhodes break down the latest global developments and bring you behind the scenes with the people who were there. New episodes every Wednesday. Subscribe to Friends of the Pod! Your subscription makes Crookedâs work possible and gives ...
…
continue reading
Small bites on Transatlantic Security, NATO, the EU, Russia, and all things Europe. Hosted by Andrea Kendall-Taylor and Jim Townsend at the Center for a New American Security.
…
continue reading
Artificial Intelligence has too much hype. In this podcast, linguist Emily M. Bender and sociologist Alex Hanna break down the AI hype, separate fact from fiction, and science from bloviation. They're joined by special guests and talk about everything, from machine consciousness to science fiction, to political economy to art made by machines.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael âRooâ Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
…
continue reading
Decoding Geopolitics is a podcast that tries to make sense of today's dangerous world by talking with real experts on international relations, strategy and security.
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
…
continue reading
Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI). Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers.
…
continue reading
Welcome to AI News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about machine learning, robotics, automation, natural language processing, AI ethics, and more. Whether you're a tech enthusiast, AI researcher, or simply curious about the future of technology, this podcast is your go-to source for AI news. T ...
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether youâre a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the weekâs top cybersecurity news and share knowledg ...
…
continue reading
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
…
continue reading
Welcome to âUnderstandable Insights: Information to Intelligence with Sue Gordonâ â the national security podcast that provides you an elemental understanding of the world as it is, not how you prefer it to be. Each week, Eric â a former Marine, father, and entrepreneur â sits down with the Honorable Sue Gordon, the nationâs former top career intelligence officer. Together, they break down the headlines shaping our world and ask what they really mean for citizens, leaders, and institutions. ...
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Dive into the exciting world of web creation with artificial intelligence tools. In *"Developing My Website with Artificial Intelligence"*, we explore step by step how to design, optimize, and manage websites efficiently, even if you're a beginner. From choosing the best hosting and domain to implementing advanced strategies like SEO, security, and monetization, each episode is packed with practical tips, innovative tools, and techniques to transform your ideas into a successful website. Whe ...
…
continue reading
Welcome to the Global Intelligence Knowledge Network Podcast, where real-world intelligence expertise meets insightful analysis. Join your host, Neil Bisson, a former Intelligence Officer with the Canadian Security Intelligence Service, for a weekly deep dive into the world of espionage, national security, foreign interference, terrorism, and all matters spy and intelligence related. With over 25 years of experience in intelligence and law enforcement, both domestically and internationally, ...
…
continue reading
âAt the Boundaryâ is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we donât produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
The Artificial Intelligence Show (formerly The Marketing AI Show) is the podcast that helps your business grow smarter by making AI approachable and actionable. The AI Show podcast is brought to you by the creators of the Marketing AI Institute, AI Academy for Marketers, and the Marketing AI Conference (MAICON). Hosts Paul Roetzer, founder and CEO of Marketing AI Institute, and Mike Kaput, Chief Content Officer, break down all the AI news that matters and give you insights and perspectives t ...
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalkâs roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. Thereâs nothing quite like itâa place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
1
Global Security Briefing by Factal and Emergent Risk International
Factal and Emergent Risk International
Held live every two weeks on Thursdays, the Global Security Briefing is now the industry's largest virtual event of its kind. We examine security threats, supply chain impacts and geopolitical developments for global security and risk intelligence professionals. Since the earliest days of COVID, Factal and Emergent Risk International have held an essential hour-long briefing for global security and resilience professionals.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
…
continue reading
The Long Game is a weekly national security podcast hosted by Jake Sullivan, President Bidenâs National Security Advisor, and Jon Finer, his Principal Deputyâsenior aides who sat in on the classified Presidential Daily Brief each morning and translated raw intelligence into policy advice. Each week, Jake and Jon will pull back the curtain on how power really works helping you make sense of the national security stories unfolding today. Part of the Vox Media Podcast Network.
…
continue reading
Podcast by John White & Jason Himmelstein
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what's new and what's next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
1
From Punk Rock Anarchist to Bank Security Leader: An Unlikely Journey in Threat Intelligence | SecureTalk with Joe Rossi
51:25
51:25
Play later
Play later
Lists
Like
Liked
51:25Most threat intelligence programs can't prove their value. Joe Rossi's team at Zions Bank did the oppositeâpreventing $3 million in fraud annually while actually attracting new customers to the bank. In this episode, former punk rock kid turned threat intelligence leader Joe Rossi reveals why your most valuable security intelligence isn't from expeâŚ
…
continue reading
1
From Statistics to Metrics: Jim McConnell's Guide to Measuring Security's Effectiveness
31:13
31:13
Play later
Play later
Lists
Like
Liked
31:13In this episode of the Connected Intelligence Podcast, Jim McConnell shares insights from more than three decades in corporate and critical infrastructure security, exploring the evolution of converged security and safety metrics. Together with Manish, he discusses how organizations can move beyond silos to create unified, data-driven security straâŚ
…
continue reading
1
The Zero Trust Conundrum: How Intelligent Friction Boosts Business Velocity
20:05
20:05
Play later
Play later
Lists
Like
Liked
20:05In this episode of The Security Strategist podcast, host Jonathan Care, Lead Analyst at KuppingerCole Analysts, speaks with Sudhir Reddy, the Chief Technology Officer (CTO) of Esper, about how to build trust in âZero Trust.â. They explore this paradox in Zero Trust systems, where human trust is essential for the system to function effectively. ReddâŚ
…
continue reading
1
Seeing the unseen: why geospatial intelligence is important
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57What are the origins of the Australian Geospatial-Intelligence Organisation (AGO), and how has the organisation developed within the National Intelligence Community? How does AGO contribute to the broader remit of Australian statecraft, the work done by other NIC agencies, and the Five Eyes partnership? What makes innovation in the geospatial intelâŚ
…
continue reading
1
EP 150 AI Changes the Game â but Humans Still Write the Rules with Julian Fisher Espionage Specialist and Gavin Stone Former British Intelligence
1:20:57
1:20:57
Play later
Play later
Lists
Like
Liked
1:20:57Send us a text đď¸ Episode Summary AI changes the game â but humans still write the rules with Julian Fisher & Gavin Stone In this powerful episode of The Security Circle, former British intelligence specialists Julian Fisher and Gavin Stone pull back the curtain on the shifting landscape of espionage, AI, and global security. We explore the criticaâŚ
…
continue reading
1
Can Brett Johnson Help You SPOT Fraud Before it's Too Late?
48:40
48:40
Play later
Play later
Lists
Like
Liked
48:40Question? Text our Studio direct. Can Brett Johnson Help You SPOT Fraud Before it's Too Late? Brett Johnson joins us to talk about spotting fraud before its too late. We discuss how to limit cyber risk for small business, ways to identify refund fraud, AI implications in cyber security today, best policies to limit cyber liability and how can we spâŚ
…
continue reading
1
Lawfare Archive: Zelenskyâs Victory Plan, with Anastasiia Lapatina and Eric Ciaramella
43:14
43:14
Play later
Play later
Lists
Like
Liked
43:14From October 18, 2024: Following Ukrainian President Volodymyr Zelenskyâs speech to the Ukrainian Parliament outlining his victory plan, Lawfare Editor-in-Chief Benjamin Wittes sat down with Lawfare Ukraine Fellow Anastasiia Lapatina and Eric Ciaramella of the Carnegie Endowment for International Peace. They talked about the components of the plan,âŚ
…
continue reading
1
Former Deputy DNI Sue Gordon: âit is conceivable that the world order has already been brokenâ
26:16
26:16
Play later
Play later
Lists
Like
Liked
26:16Washington is trimming budgets⌠and bleeding digital expertise. So what happens when national security is run by agencies living in the past? Sue Gordon, former Principal Deputy Director of National Intelligence, helps us break it down. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading
1
Pass the intel, please. [Only Malware in the Building]
38:06
38:06
Play later
Play later
Lists
Like
Liked
38:06Please enjoy this encore of Only Malware in the Building. Welcome in! Youâve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about todayâs most interesting threats. Your host is â â â â â Selena Larsonâ â â â â , â â â â â Proofpointâ â â â â intelligence analyst and host of their podcast â â â â â DISCARDEDâ â â â â . Inspired by the râŚ
…
continue reading
1
Espionage and Intelligence - What Cybersecurity Professionals Can Learn
47:41
47:41
Play later
Play later
Lists
Like
Liked
47:41The Intersection of Espionage Techniques and Cybersecurity Threats This episode explores the parallels between espionage and cybersecurity, particularly focusing on social engineering tactics used in both domains. Hosted by Jim Love, the podcast features insights from Neil Bisson, a retired intelligence officer from CSIS, and David Shipley, CEO of âŚ
…
continue reading
This is todayâs cyber news for November 28th, 2025. Todayâs brief opens with millions of phones still following abandoned calendar links that attackers can quietly reclaim, turning old sync feeds into tracking and phishing channels. We move through an analytics vendor breach exposing OpenAI developer account details, a ransomware hit on Asahi affecâŚ
…
continue reading
1
HP Slashes 6000 Jobs in AI Shakeup, Italy Probes Meta AI Clampdown, Wipro IISc Propel 6G AI Quantum, Viral GTA 6 Leaks Trigger Regulation Push, and more...
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50(0:10): HP Inc. to Cut 6,000 Jobs in AI-Driven Restructuring by 2028 (1:45): Italy Expands Meta Probe Over Alleged AI Chatbot Competition Clampdown on WhatsApp (3:55): Wipro and IISc Join Forces to Propel AI and Quantum Innovations for 6G and Beyond (6:04): Viral Fake GTA 6 Leaks Highlight Urgent Need for AI Content Regulation and Clearer Labeling âŚ
…
continue reading
*Declassified Club exclusive: â â â SUBSCRIBEâ â â â â â to listen to the full series* Vladimir Putin is on the cusp of becoming Russia's all-powerful leader, but how did a humble boy from St Petersburg reach such elite heights? Listen as David and Gordon are once again joined by one of the world's leading experts on Russian organised crime, Mark Galeotti,âŚ
…
continue reading
1
Your website in one click with Hostinger's AI?
7:48
7:48
Play later
Play later
Lists
Like
Liked
7:48Summary:- The episode introduces Hostingerâs AI website builder that lets you create a functional, fast, SEO-friendly site with minimal effort. It guides users from defining goals and keywords to generating a complete draft, then refining content and visuals. The approach emphasizes clear design, quick performance, trust signals, and the option to âŚ
…
continue reading
1
From Promises to Procurement: Can Canada Actually Spend $81.8 Billion?
35:38
35:38
Play later
Play later
Lists
Like
Liked
35:38In this episode of Secure Line, Leah West and Stephanie Carvin break down the most consequential defence budget Canada has seen in generationsâjoined by special guest Philippe LagassĂŠ, Chair in International Affairs at NPSIA and author of Debating Canadian Defence. With Jess Davis away this week, Leah and Stephanie dive into the headline-grabbing $âŚ
…
continue reading
1
Lawfare Archive: AI Regulation and Free Speech: Navigating the Governmentâs Tightrope
1:23:10
1:23:10
Play later
Play later
Lists
Like
Liked
1:23:10From November 25, 2024: At a recent conference co-hosted by Lawfare and the Georgetown Institute for Law and Technology, Georgetown law professor Paul Ohm moderated a conversation on "AI Regulation and Free Speech: Navigating the Governmentâs Tightrope,â between Lawfare Senior Editor Alan Rozenshtein, Fordham law professor Chinny Sharma, and EugeneâŚ
…
continue reading
1
Hacker Movies Then vs Now [Threat Vector]
47:06
47:06
Play later
Play later
Lists
Like
Liked
47:06We dive into a nostalgic yet revealing journey through classic hacker films, from WarGames to The Net and beyond, to assess what they got right, what they wildly imagined, and what those stories say about culture, fears, and cyber reality today. David Moulton, Senior Director of Thought Leadership for Unit 42 talks with Ben Hasskamp, Global ContentâŚ
…
continue reading
1
Identifying vulnerabilities in space with Bigbear.ai. [Deep Space]
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Please enjoy this encore of T-Minus Deep Space. BigBear.ai is at the forefront of innovation for national security, and is committed to supporting the critical infrastructure driving Americaâs competitive edge. The company deploys cutting-edge Al, machine learning, and computer vision solutions to defend critical operations and win with decision adâŚ
…
continue reading
1
Cybersecurity Update: Incorrect Company Naming, Major Breaches, and New Malware Campaigns
12:58
12:58
Play later
Play later
Lists
Like
Liked
12:58In this episode, the host addresses a previous mistake in naming a company involved in a breach, correcting SitusAMC for Ascensus, and extends apologies. Key topics include US banks assessing a breach fallout from financial tech vendor SitusAMC, ransomware group CioP targeting Broadcom through Oracle's vulnerabilities, a new malware campaign hidingâŚ
…
continue reading
Report sheds light on cyber activity targeting space-related organizations during the Gaza War. Russian threat actor targets US civil engineering firm. FBI says $262 million has been stolen in account takeover scams this year. HashJack attack tricks AI browser assistants. London councils disrupted by cyberattacks. Russiaâs Gamaredon and North KoreaâŚ
…
continue reading
Investigative reporter Ron Kessler and retired former senior CIA officer John Sipher on the GOP plan to give Tulsi Gabbard control of neutralizing spies and terrorists. John Sipher https://www.thecipherbrief.com/ Risking a National Security Disaster by Ronald Kessler https://www.spytalk.co/p/risking-a-national-security-disaster Follow Jeff Stein onâŚ
…
continue reading
1
Are Cyber Predictions Worth It? Plus Chinese AI Attacks, IoT Takeovers
27:53
27:53
Play later
Play later
Lists
Like
Liked
27:53Resources: https://linktr.ee/ReliaQuestShadowTalk Do you really need predictions to tackle cyber threats? Join host Kim along with intelligence analyst John & special guest CISO Rafal Baran as they discuss: New NPM Supply Chain Threat (1:13) China Manipulates AI for Initial Access (4:46) Cloud Gaps Bring IoT Takeover (7:29) 2026 Cyber-Threat PredicâŚ
…
continue reading
The Virginia Republican discusses the Pentagon's acquisition reforms, the defense secretary's legislative-affairs bottleneck, and his priorities for the upcoming spending bills. Guest: Rep. Rob Wittman, R-Va., chairman of the House Armed Services Subcommittee on Tactical Air and Land Forces, in conversation with Defense One Executive Editor BradleyâŚ
…
continue reading
1
Inside the Adversary Mindset: Building Smarter Protection in a Connected World
28:24
28:24
Play later
Play later
Lists
Like
Liked
28:24On this episode of the Connected Intelligence Podcast, Manish Mehta sits down with Chris Wingfield, SVP of Innovations at 360Privacy, to explore the evolving landscape of digital targeting and executive protection. Chris shares how his background in intelligence and signals analysis informs his approach to building proactive, AI-driven cyber threatâŚ
…
continue reading
This is todayâs cyber news for November 26th, 2025. Todayâs rundown connects a cyberattack that silenced emergency alerts, critical flaws in a tiny cloud logging agent, and fresh warnings that secure messaging apps can still be turned into surveillance tools when phones are compromised. We also cover long-running credential leaks from online code hâŚ
…
continue reading
1
Lawfare Daily: Anastasiia Lapatina and Eric Ciaramella Talk Russia, Ukraine, and Trump
56:14
56:14
Play later
Play later
Lists
Like
Liked
56:14Lawfare Ukraine Fellow Anastasiia Lapatina and Eric Ciaramella of the Carnegie Endowment for International Peace join Editor in Chief Benjamin Wittes to discuss the last week's machinations surrounding a potential Russia-Ukraine peace deal. What is the actual American position? Is the United States abandoning Ukraine? Or is it now backing off the 2âŚ
…
continue reading
1
EP 153 No Tech Just Cyber - Why Defensive Security Isnât Enough Anymore with Terry Cutler International Award-Winning Cybersecurity Expert
52:14
52:14
Play later
Play later
Lists
Like
Liked
52:14Send us a text đ§ Episode Summary â âWhy Defensive Security Isnât Enough Anymoreâ In this episode, cybersecurity author, keynote speaker and ethical hacker Terry Cutler joins The Security Circle to unpack the harsh realities of todayâs cyber threat landscape. Terry discusses the shift organisations are experiencing as budgets tighten while attacks aâŚ
…
continue reading
1
Unpacking Trumpâs Ukraine âPeace Dealâ
1:15:30
1:15:30
Play later
Play later
Lists
Like
Liked
1:15:30Tommy and Ben unpack Trumpâs rapidly changing âpeace dealâ to end the war between Russia and Ukraine. They explain how the plan has changed since the first draft leaked last week, the confusion over where the plan came from and why many people believe the Russians authored it, what it tells us about which Trump officials are actually driving the poâŚ
…
continue reading
1
Major US Bank Data Linked Through Breach At SitusAMC
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32In today's episode of Cybersecurity Today, hosted by Jim Love, several major cybersecurity incidents are discussed. US banks are assessing the impact of a security breach at SitusAMC, where the ALFV ransomware group claimed to have stolen three terabytes of data. CIOP has targeted Broadcom through Oracle's E-Business Suite vulnerabilities. A new maâŚ
…
continue reading
1
NaviSense Transforms Real Time Vision, Felo LiveDoc Boosts Productivity, AI Vision Platform Transforms Robots, Burry Debuts Cassandra Unchained, and more...
10:36
10:36
Play later
Play later
Lists
Like
Liked
10:36(0:10): NaviSense App Revolutionizes Real-Time Object Recognition for Visually Impaired (2:17): Felo's LiveDoc Launches: AI-Powered Document Workspace Promises Tenfold Productivity Boost (4:35): AI-Powered Vision Platform Revolutionizes Autonomous Mobile Robots in Industrial Settings (6:36): Michael Burry Debuts 'Cassandra Unchained', Critiques AI âŚ
…
continue reading
1
103. Putin's Secret Army: The Coup That Almost Brought Down Russia (Ep 6)
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07Could this have been the day when Putin fell from power? In June 2023, Prigozhin marched on Moscow, threatening to bring Putinâs authoritarian regime to its knees. In their final episode on the dramatic rise and fall of Yevgeny Prigozhin, David and Gordon take us back to the coup that almost toppled Putin and how the autocratic leader carried out tâŚ
…
continue reading
1
Christmas Gifts for SysAdmins with Joey Snow and Rick Claus
36:57
36:57
Play later
Play later
Lists
Like
Liked
36:57The seasonal gift show is back - Joey Snow and Rick Claus bring their lists of great gifts for sysadmins. You know they're impossible to buy for, so we are making it easier for you with a range of prices and seriousness for your favorite sysadmin. Useful gadgets, upgrades to older devices, and some fun stuff that reminds the sysadmins in your life âŚ
…
continue reading
1
A Practical Look at Incident Handling: How a Sunday Night Bug Bounty Email Triggered a Full Investigation | A Screenly Brand Spotlight Conversation with Co-founder of Screenly, Viktor Petersson
17:48
17:48
Play later
Play later
Lists
Like
Liked
17:48This episode focuses on a security incident that prompts an honest discussion about transparency, preparedness, and the importance of strong processes. Sean Martin speaks with Viktor Petersson, Founder and CEO of Screenly, who shares how his team approaches digital signage security and how a recent alert from their bug bounty program helped validatâŚ
…
continue reading
CISA warns of spyware targeting messaging apps. CodeRED, this is not a test. Infostealer campaign spreads via malicious Blender files. Shai-Huludâs second coming. Real estate finance firm SitusAMC investigates breach. Dartmouth College discloses Oracle EBS breach. Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss theâŚ
…
continue reading
1
Inside the Economics That Shape Modern Cybersecurity Innovations: How the Cybersecurity Startup Engine Really Works | A Conversation with Investor and Author, Ross Haleliuk | Redefining CyberSecurity with ...
47:10
47:10
Play later
Play later
Lists
Like
Liked
47:10⏼EPISODE NOTES⏼ Understanding the Startup Engine Behind Cybersecurity This episode brings Sean Martin together with Ross Haleliuk, author, investor, product leader, and creator of Venture Insecurity, for a candid look at the forces shaping cybersecurity startups today. Ross shares how his decade of product leadership and long involvement in the secâŚ
…
continue reading
1
Ransomware Attacks Can Be DEADLY What Makes You SAFE?
57:25
57:25
Play later
Play later
Lists
Like
Liked
57:25Question? Text our Studio direct. We discuss How ransomware can kill and ways to build security resilience with Chris Loehr, SVP of Solis Security. Ransomware Attacks Can Be DEADLY What Makes You SAFE? Season 8 is officially here â and itâs the most unhinged, hilarious, and dangerously educational season weâve ever done with full cyber chaos: đĽ IntâŚ
…
continue reading
1
Ep. 19 Substitution or Sovereignty? Chinaâs Capital, Nuclear Loans, & State vs. Federal Power
57:54
57:54
Play later
Play later
Lists
Like
Liked
57:54In this episode of Understandable Insights, Sue and Eric trace how seemingly ordinary deals can reshape American security, starting with a Chinese-linked insurance acquisition that offers a window into the âholy grailâ of intelligenceâintent. Some foreign capital is about substitution, not partnership. From there, they turn to energy in the AI era,âŚ
…
continue reading
1
Securing Assets in a Complex IT Landscape: Deterministic Automation in ITAM
21:44
21:44
Play later
Play later
Lists
Like
Liked
21:44Modern enterprises face a growing challenge in managing thousands of devices, applications, and identities across increasingly complex IT environments. Unmanaged assets, shadow IT, and inconsistent processes can quietly create security gaps that expose organisations to significant risk. In this episode of Security Strategist, Syed Ali, Chief ExecutâŚ
…
continue reading
1
Avoid Black Friday scams and shop safely online with Simon Miller | BLACK FRIDAY HOLIDAY SCAMS
1:03:47
1:03:47
Play later
Play later
Lists
Like
Liked
1:03:47Black Friday season is upon us! đď¸ This week, weâre joined by Simon Miller from Cifas, the UKâs leading fraud prevention service, to unpack the latest online scams. He shares essential tips to help you stay safe online and protect your hard-earned cash while shopping online this holiday season. đłđ In Watchtower Weekly, we dive into why weak passworâŚ
…
continue reading
1
#182: Gemini 3, Nano Banana Pro, GPT-5.1 Pro, Nvidia Earnings, Karen Hao Book Controversy & Entry-Level Unemployment
1:06:21
1:06:21
Play later
Play later
Lists
Like
Liked
1:06:21Google released Gemini 3, its most advanced model yet, along with Nano Banana Pro, a leading image generation and editing model. On this week's episode, Paul and Mike go deeper on those topics and other top news this week, including GPT-5.1 Pro, controversy around a popular AI book, Nvidia earnings, and more. Show Notes: Access the show notes and sâŚ
…
continue reading
1
Lawfare Daily: Inside the Law Letting Senators Sue Over Phone Data
46:56
46:56
Play later
Play later
Lists
Like
Liked
46:56Lawfare Editor-in-Chief Benjamin Wittes talks with Executive Editor Natalie Orpett and Senior Editor Michael Feinberg about their recent Lawfare article examining a little-noticed piece of legislation that was slipped into the deal to end the government shutdownâone that gives senators a civil right of action to sue the U.S. government when their pâŚ
…
continue reading
This is todayâs cyber news for November 25th, 2025. The brief follows a sweeping set of stories: a self-spreading JavaScript supply-chain attack leaking developer secrets, AI clusters hijacked through exposed orchestration tools, and quiet flaws in cloud logging and Windows update infrastructure that can turn basic plumbing into a takeover path. WeâŚ
…
continue reading
We tend to picture cyberattacks as distant battlesâstate hackers, big targets, glowing maps of global chaos. But often, the frontlines are more local: a water plant, a 911 system, the power lines outside your window. In this CyberMonday crossover with WAMUâs 1A, we examine a small-town breach, the fragility of our digital infrastructureâand what itâŚ
…
continue reading
1
A midseason takeaway. [CISO Perspectives]
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from a security standpoint and from an attacker's view. Whether you're catcâŚ
…
continue reading