Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Response Team Podcasts

show episodes
 
Artwork
 
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Artwork

1
Cloud Security Podcast

Cloud Security Podcast Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
  continue reading
 
Artwork

1
Cyber Work

Infosec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
  continue reading
 
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
  continue reading
 
Artwork

1
Security Masterminds

Security Masterminds

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Artwork
 
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
  continue reading
 
Behind the Shield is a monthly webinar hosted by Virtual Guardian, an ESI family company. Our team of experts are veteran threat smashers, ethical hackers, and experienced security professionals who speak in terms of lessons learned – and how identification, protection, response and resilience help organizations stay ahead of digital criminals. After each live webinar, the content is reproduced as a podcast for your listening enjoyment. Check out virtualguardian.com/events to register to par ...
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Artwork

1
The Digital Forensics Files Podcast

Tyler Hatch, B.A., LL.B.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
  continue reading
 
Artwork

1
Church Security Roll Call

Sheepdog Church Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hi, I'm Kris P. Moloney. I am a Police Officer with over 18 years of experience in Law Enforcement and a retired Army Captain and Company Commander. On my podcast, we talk about Church Security. Including discussions about Active Shooter Response, Deescalating Disruptive Persons, Protecting Children from Abuse, and various other challenges that our places of worship face. My company Sheepdog Church Security is a Private Online Academy that provides both Distance and Self-Paced Learning to Sa ...
  continue reading
 
Artwork

1
REAL AF with Andy Frisella

Andy Frisella #100to0

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Entrepreneur Andy Frisella and his guests discuss, debate, and laugh their way through trending topics and hot-button issues. (This is also the home of Andy's other show, the top-ranked MFCEO Project Podcast)
  continue reading
 
In our age of digital transformation, everything is moving to the cloud, including the management of devices, users and applications. The Infoblox ThreatTalk podcast brings you the latest thinking on how to tap the full potential of the cloud while making the most of your existing network security solutions. In each episode, leading cybersecurity experts share insights and practical advice on how to raise network security and automation to the next level across diverse on-premises, virtual a ...
  continue reading
 
Artwork
 
The Echo Valor Podcast is where courage meets storytelling. Hosted by David Burnell—a U.S. military veteran, special operations team leader, and rescue operator—the show dives into the real stories of those who serve in the shadows and on the front lines. With a high-threat security and humanitarian response background, David brings raw insight and deep respect to each episode. Through powerful interviews, battlefield reflections, and original tribute music, Echo Valor honors the warriors, m ...
  continue reading
 
In an increasingly unpredictable world, knowledge and preparation are your best defense. Brought to you by the Preparedness Protocol Experts (P.P.E Team), this is an educational podcast delivering expert insights on Chemical, Biological, Radiological, and Nuclear (CBRN) threats, cutting-edge survival tactics, and comprehensive disaster preparedness strategies for today's complex risk landscape. Each episode features in-depth analysis of historical disasters, emerging threats, practical survi ...
  continue reading
 
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
  continue reading
 
Artwork

1
American Truth Project

American Truth Project

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The American Truth Project, a non-profit (501c3) organization was launched because America’s national security is being threatened as never before. Our republic and the rights guaranteed by our constitution are facing dangerous new enemies, both foreign and domestic. The facts are clear: We are under attack! Our solution is to educate the public on the truths regarding critical security risks facing America, as well as our most strategic ally, Israel. There are few quality sources dedicated ...
  continue reading
 
Artwork
 
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
  continue reading
 
Artwork
 
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
  continue reading
 
Artwork

1
Sworn Statement

Sworn Statement Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Collier County Sheriff's Office is a law enforcement agency in Southwest Florida. Under the direction of Sheriff Kevin Rambosk, we are launching this podcast to communicate with residents and the public at large on a new and different type of platform. In this podcast, we'll discuss local issues and those affecting public safety on a larger scale. To learn more about our agency and the podcast, visit www.colliersheriff.org/news/sworn-statement
  continue reading
 
Artwork
 
When it comes to securing your home or business, LockSmith And Door is the best locksmith in Tampa, FL. Renowned for their fast response times and expert services, they offer everything from emergency lockouts to high-security system installations. Whether you’re locked out, need a lock rekeyed, or want to upgrade your security, LockSmith And Door has you covered. With a team of certified technicians, they deliver top-notch service tailored to your specific needs. In addition to their except ...
  continue reading
 
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
  continue reading
 
Discovering Responsible Wealth will help you discover the principles of Responsible Wealth – principles that can change your life, to be good stewards of all the God has blessed us with, and to live life to its fullest potential.Frank’s message is simple: Finances have an impact on every aspect of your life. However, to have the life that God desires for us, your life must be in balance and money must be placed in the proper context. Discovering Responsible Wealth focuses on life’s “Wealth B ...
  continue reading
 
The AI CEO Podcast Host: Seema Alexander, Co-founder & President of Virgent AI | Co-Chair, DC Startup & Tech Week AI isn’t just another tool—it’s the next frontier of business. The AI CEO Podcast explores the intersection of AI, business strategy, and leadership, equipping CEOs, founders, and executives with the insights they need to navigate and leverage AI effectively. Hosted by Seema Alexander, Co-founder & President of Virgent AI—a company specializing in AI-powered solutions and AI agen ...
  continue reading
 
Loading …
show series
 
New Oracle E-Business Suite Patches Oracle released one more patch for the e-business suite. Oracle does not state if it is already exploited, but the timing of the patch suggests that it should be expedited. https://www.oracle.com/security-alerts/alert-cve-2025-61884.html Widespread Sonicwall SSLVPN Compromise Huntress Labs observed the widespread…
  continue reading
 
How do you perform incident response on a Kubernetes cluster when you're not even on the same network? In this episode, Damien Burks, Senior Security engineer breaks down the immense challenges of container security and why most commercial tools are failing at automated response. While many CNAPPs provide runtime detection, they lack a "sophisticat…
  continue reading
 
On today’s episode, Andy & DJ are joined in the studio by Author, speaker, and former Force Recon Marine and DoD Contractor, Chad Robichaux. They discuss Trump telling The Post that he’ll visit the Middle East after the ceasefire agreement, Candace Owens discussing Charlie Kirk's last text messages, and Trump considering invoking the Insurrection A…
  continue reading
 
When finance leaders push for measurable savings and supply chain leaders prioritize continuity and resilience, technology adoption often gets caught in the middle. Procurement teams, operating with risk-averse cultures and outdated tools, face growing complexity while pressure mounts from both sides of the business. In this episode of the AI in Bu…
  continue reading
 
On this episode of the AI in Business podcast, Emerj Editorial Director Matthew DeMello speaks with Ben Ninio, Principal in Strategy at Deloitte, about how enterprises are rethinking the fundamentals of scientific discovery in the AI era. Ben explains why language itself has become the “hack” for unifying frameworks across R&D domains—from pharmace…
  continue reading
 
Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to…
  continue reading
 
Today’s guest is Steve Taczala, VP of Service Operations at Impact Networking. Impact Networking is a managed service provider founded in 1999, with more than 20 US offices, supporting organizations in IT, cybersecurity, and applying AI to business operations. Taczala brings extensive experience in managing MSP service operations and improving IT w…
  continue reading
 
Today’s guest is Sunitha Rao, SVP and General Manager for Hybrid Cloud Business at Hitachi Vantara. Hitachi Vantara is a wholly owned subsidiary of Hitachi, Ltd. that provides data infrastructure foundations that help leading innovators manage and leverage their data at scale. Through data storage, infrastructure systems, cloud management, and digi…
  continue reading
 
The evolving role of technology in modern defense environments, highlighting innovations in communications, automation, and open-source frameworks. Drawing from personal experience, the conversation emphasizes how real-world conflicts are reshaping how tech is deployed, adopted, and understood across military operations. This week, Dave, Esmee, and…
  continue reading
 
Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnerability A user cloning a git repository may be tricked into executing arbitrary code via…
  continue reading
 
Got a question or comment? Message us here! What’s the real difference between a penetration test and a red team engagement, and how can each benefit your SOC? In this episode, Andrew is joined by Tanner, to unpack how pentests uncover vulnerabilities, how red teams stress-test defenders, and why every organization should be leveraging these exerci…
  continue reading
 
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. In this episode, founder and President Joseph Kirkpatrick shares the why behind the mission of delivering quality audits and what sets KirkpatrickPrice apart. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecur…
  continue reading
 
Oracle E-Business Suite 0-Day CVE-2025-61882 Last week, the Cl0p ransomware gang sent messages to many businesses stating that an Oracle E-Business Suite vulnerability was used to exfiltrate data. Initially, Oracle believed the root cause to be a vulnerability patched in June, but now Oracle released a patch for a new vulnerability. https://www.ora…
  continue reading
 
The AI CEO is a podcast where business leaders, entrepreneurs, and innovators uncover how artificial intelligence is transforming strategy, leadership, and growth. Each episode breaks down complex AI trends into clear insights, helping CEOs and decision-makers stay ahead in the age of disruption. ----------------------------------------------------…
  continue reading
 
"The next five years are gonna be wild." That's the verdict from Forrester Principal Analyst Allie Mellen on the state of Security Operations. This episode dives into the "massive reset" that is transforming the SOC, driven by the rise of generative AI and a revolution in data management. Allie explains why the traditional L1, L2, L3 SOC model, lon…
  continue reading
 
On today’s episode, Andy & DJ discuss prosecutors hammering the Charlie Kirk assassination suspect with DNA, gun, text and rooftop evidence, the government shutdown, and Netflix showcasing young students coming together to set up and celebrate their teacher’s gay wedding in a cartoon.
  continue reading
 
More .well-known scans Attackers are using API documentation automatically published in the .well-known directory for reconnaissance. https://isc.sans.edu/diary/More%20.well-known%20Scans/32340 RedHat Patches Openshift AI Services A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, fo…
  continue reading
 
Today’s guest is Shandon Quinn, Vice President of Patent Intelligence, Search and Analytics at Clarivate. Quinn joins Emerj Editorial Director Matthew DeMello to examine how AI-powered workflows are helping IP leaders deliver strategic impact, smarter decision-making, and tangible results for data-centric enterprises. Shandon also shares proven cha…
  continue reading
 
Before Siri had sass and Alexa started judging your music taste, the original virtual assistant was quietly revolutionizing the '90s—powered by many patents and a whole lot of foresight. Now, as AI goes from buzzword to boss, we ask, will it transform your job, your home… or just steal your knowledge? This week, Dave, Esmee and Rob speak with Kevin…
  continue reading
 
Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/…
  continue reading
 
Episode Summary: Joe Sullivan returns to The Professional CISO Show for a wide-ranging discussion with host David Malicoat. Together, they unpack the Salesforce hack, SaaS application blind spots, identity and access management, AI noise versus real use cases, and how security teams must evolve. Joe also shares candid lessons from crisis leadership…
  continue reading
 
Got a question or comment? Message us here! Ransomware is evolving faster than ever, from double extortion tactics to lightning-fast attack chains. In this episode, we break down how these threats work, why every organization is a target, and the layered defenses SOCs can use to detect and stop attacks early. Support the show Watch full episodes at…
  continue reading
 
On today's episode, Andy & DJ discuss Trump's N-word joke falls flat as America's top generals laugh awkwardly at gag about firing them, Trump vowing border patrol agents will take no nonsense as feds march into downtown Chicago, and the grieving dad slamming lawmakers for crime policies that freed daughter's suspected career criminal killer.…
  continue reading
 
Sometimes you don t even need to log in Applications using simple, predictable cookies to verify a user s identity are still exploited, and relatively recent vulnerabilities are still due to this very basic mistake. https://isc.sans.edu/diary/%22user%3Dadmin%22.%20Sometimes%20you%20don%27t%20even%20need%20to%20log%20in./32334 Western Digital My Clo…
  continue reading
 
Today’s guest is Faithe Toomy, Director of Voice of the Customer and Insights at Insulet. Insulet is a medical device company specializing in wearable drug delivery systems for diabetes care, combining engineering, clinical research, and digital health capabilities to develop automated therapeutic solutions. Faithe joins Emerj Editorial Director Ma…
  continue reading
 
Apple Patches Apple released patches for iOS, macOS, and visionOS, fixing a single font parsing vulnerability https://isc.sans.edu/diary/Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400/32330 Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400). Our honeypots detected an increase in scans for a Palo Alto Global Prot…
  continue reading
 
Converting Timestamps in .bash_history Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This new tool converts these timestamps into a more readable format. https://isc.sans.edu/diary/New%20tool%3A%20convert-ts-bash-history.py/32324 Cisco ASA/FRD Compromises Ex…
  continue reading
 
Guest bio: Elaine Helm is communications professional and former journalist who lives and works in the Seattle area. She was the military reporter for the Kitsap Sun and the founder and editor of the pioneering Northwest Navy News site. Links:https://www.linkedin.com/in/elainehelm/By Elaine Helm, J Overton
  continue reading
 
In this special weekend edition of the ‘AI in Business’ podcast’s AI Futures series, Emerj CEO and Head of Research Daniel Faggella speaks with Stuart Russell, Distinguished Professor of Computational Precision Health and Computer Science at the University of California and President of the International Association for Safe & Ethical AI. Widely co…
  continue reading
 
On today's episode, Andy & DJ discuss Anti-ICE gunman Joshua Jahn carefully plotting the fatal Dallas shooting, Former FBI director James Comey indicted for lying to congress, and the California HS girls' volleyball team with a trans athlete forfeiting games amid growing controversy.
  continue reading
 
Webshells Hiding in .well-known Places Our honeypots registered an increase in scans for URLs in the .well-known directory, which appears to be looking for webshells. https://isc.sans.edu/diary/Webshells%20Hiding%20in%20.well-known%20Places/32320 Cisco Patches Critical Exploited Vulnerabilities Cisco released updates addressing already-exploited vu…
  continue reading
 
We’re back! In this Season 5 premiere, the team reunites after their summer break to kick off an exciting new chapter. Join us as we catch up, share bold predictions for the year ahead, and explore big questions, like whether 2026 will be the year of the autonomous organization. Expect candid reflections, lively discussion, and a sneak peek at what…
  continue reading
 
Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send credentials as part of the URL. https://isc.sans.edu/diary/Exploit%20Attempts%20Against%20Older%20Hikvision%20Camera%20Vulnerability/323…
  continue reading
 
Got a question or comment? Message us here! In this episode of The #SOCBrief, we break down the rising FileFix attack, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proacti…
  continue reading
 
On today's episode, Andy & DJ discuss Erika Kirk forgiving her husband Charlie Kirks assassin at his memorial service, Trump calling out the United Nations for doing nothing, and the Dominican Republic saying it seized 377 packages of cocaine on a speedboat destroyed by the US Navy.
  continue reading
 
Distracting the Analyst for Fun and Profit Our undergraduate intern, Tyler House analyzed what may have been a small DoS attack that was likely more meant to distract than to actually cause a denial of service https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Distracting%20the%20Analyst%20for%20Fun%20and%20Profit/32308 GitHub s plan for a more secur…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play