Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Think Cyber Secure Podcasts

show episodes
 
Artwork

1
Think Cyber Secure

Think Cyber Secure

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Artwork

1
Cyber Security Interviews

Douglas A. Brush | Weekly Interviews w/ InfoSec Pros

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
  continue reading
 
Artwork

1
Security Guy'd

Security Guy'd

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to The Security Guy’d — the podcast where safety meets strategy! With your host, Rafee, each week we dive deep into the world of security, leadership, and everything in between. Whether you’re running a company, managing a team, or just passionate about keeping people safe — this show is your guide to smarter, stronger security. Expect real talk, expert guests, and practical tips to help you stay ahead of the game. Let’s lock in and level up — This is The Security Guy’d
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork

1
Ahead of the Threat

Federal Bureau of Investigation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
  continue reading
 
Artwork

1
jon atack, family and friends

jon atack, family and friends

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Become a Paid Subscriber: https://podcasters.spotify.com/pod/show/jon-atack-family--friends/subscribe Become a Paid Subscriber: https://anchor.fm/jon-atack-family--friends/subscribe jon atack, along with his son sam, present a series of educational podcasts on how to spot, avoid, and overcome unethical manipulation of all kinds - from destructive cults and abusive relationships, to advertising, groupthink, bullying and more. join us in our hope to create a world where people are taught from ...
  continue reading
 
Artwork

1
Alongside

NorthStandard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
NorthStandard‘s podcast features thought-provoking discussions on news and topics in the maritime industry. We talk with experts from the club and special guests in the field from around the world
  continue reading
 
Artwork

1
Hack the Plant

Bryson Bort

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
  continue reading
 
Artwork
 
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. ...
  continue reading
 
Artwork

1
Grumpy Old Geeks

Jason DeFillippo & Brian Schulmeister with Dave Bittner

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
  continue reading
 
Artwork

1
MAD Warfare Podcast

STP Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
MAD Warfare™️ is a science-driven deep dive into the wild, weird, and sometimes wicked world of the "weaponization of everything." But don't worry—IT WILL BE FUN. Think of it as your covert ops manual for spotting how cyber hackers, rogue AI agents, and shady "bad actors" (who'd be terrible in a buddy comedy) are messing with our minds. Often in ways that evade detection… until it's too late. With expert interviews from unexpected places and plenty of offbeat insights, this podcast reveals t ...
  continue reading
 
Artwork
 
Screaming in the Cloud with Corey Quinn features conversations with domain experts in the world of Cloud Computing. Topics discussed include AWS, GCP, Azure, Oracle Cloud, and the "why" behind how businesses are coming to think about the Cloud.
  continue reading
 
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
  continue reading
 
Artwork

1
Heavy Strategy

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Johna Till Johnson & John Burke bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions a ...
  continue reading
 
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
  continue reading
 
Pathways-2-Partnership (P2P) delivers expert insights, real-world success stories, and actionable strategies from MoveAmerica—the premier think tank for public-private collaboration. Each episode will explore innovations, partnerships, and policies that strengthen the defense industrial base, secure supply chains, and drive mission success. Created for entrepreneurs, industry executives, government leaders, and policy makers, P2P helps you navigate the acquisition processes, ethically influe ...
  continue reading
 
Artwork

1
Industrial Cybersecurity Insider

Industrial Cybersecurity Insider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
Bask in the simple joys of being right. The Michael Knowles Show cuts through the madness of our politics and culture, analyzing the top stories of the day. Monday through Friday. If you like The Michael Knowles Show, become a Daily Wire member TODAY with promo code: KNOWLES and enjoy the exclusive benefits for 25% off at https://utm.io/ueEss
  continue reading
 
Artwork

1
Security Voices

Security Voices

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
  continue reading
 
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
  continue reading
 
The Ambitious Bookkeeper podcast is for bookkeepers & accountants who are growing or aspiring to start their own business. Our mission is to elevate the bookkeeping profession by providing support and resources for new and experienced firm owners. We share actionable tips on running a successful bookkeeping business, tools and resources, plus guest expert interviews that will help you elevate your business. Where you can find us: Website: https://www.ambitiousbookkeeper.com BBA: https://www. ...
  continue reading
 
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
  continue reading
 
Welcome to the Re-Thinking the Human Factor podcast. It's a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
  continue reading
 
Artwork

1
Out of the Woods: The Threat Hunting Podcast

Out of the Woods: The Threat Hunting Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Intel 471's podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, all over a cocktail ...
  continue reading
 
The Bare Metal Cyber CCISO Audio Course is your complete, executive-level training companion for mastering the Certified Chief Information Security Officer (CCISO) certification. Built for experienced cybersecurity professionals and strategic leaders, this Audio Course delivers over seventy focused episodes covering every domain, concept, and competency area tested on the official EC-Council exam. From governance, risk, and compliance to strategic planning, vendor oversight, and technical co ...
  continue reading
 
Artwork

1
The Hack Podcast

Leon McQuade Paul Longley Dean Bulfield

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Hack Podcast, straight-talk smart tech. Leon McQuade, Paul Longely and Dean Bulfeild bring a leader’s eye over technology drivers shaping the world back to East Yorkshire. We now live in a dazzling world of screens that continues to revolutionise how we live, work and play. The futures arriving faster than ever before, it's time to Think Different. We talk transformation and change focusing on People, Process and Technology. Originally Inspired By Pete Lindsay and Mark Bawden's Book “Pig ...
  continue reading
 
Artwork

1
Just Lookin' Out!

SafeHer Studios LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Just Lookin’ Out is the first podcast from online safety advocate Kalie Nitzsche who was inspired to create this show after being spectacularly duped by a guy she met on the dating apps. It’s a safe place to share, relate, commiserate, and get practical tips about how to survive this fast-paced digital first world. How do we protect ourselves from a scam? What good or bad traits should we be on the lookout for if we're meeting people for the first time online? How can Kalie and her guests he ...
  continue reading
 
Artwork
 
Wait Just an Infosec is a weekly hour-long cybersecurity-focused broadcast produced by SANS Institute, streamed live on LinkedIn and YouTube, Tuesdays at 10am ET and available to listen to in podcast format on Wednesdays. Our hosts and invited guests are a rotating lineup of SANS faculty members and experts across all infosec domains – some of the brightest minds in cybersecurity, with decades of experience as practitioners. Each week will offer thought-provoking, rich content for a full ran ...
  continue reading
 
When the threats are real and the stakes are high — what actually works? Right now, as you're reading this, someone's watching your family, your business rivals are digging through your digital history, and a disgruntled employee knows exactly where your vulnerabilities are. While you're focused on your day job, they're building a plan. This podcast exists because ignoring threats doesn't make them disappear. I'm Philip Grindell — former Scotland Yard detective, behavioural threat specialist ...
  continue reading
 
Artwork

1
RAISING HER CONFIDENTLY | Connecting with Teens, Parenting Styles, Family Communication, Raising Teen Daughters

Jeannie Baldomero | Parenting Teens Coach Inspired by Brene Brown, Mark Gregston, Gary Chapman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Do you want to have open communication with your teen daughter? Do you find yourself up late at night constantly thinking about how to talk to your teen or why she’s not opening up to you? Do you wake up with confident intentions only to feel confused and frustrated when you get 1-word answers from your daughter or instead of the deep conversations you hoped to have, you end up in a yelling match? Hi, I’m Jeannie. I think back to when I was 13. I was that teenage girl you are googling about! ...
  continue reading
 
Loading …
show series
 
The provided text is a transcript of a Twitter Spaces discussion where participants explored the significant threats posed by misinformation and disinformation in the context of cyber culture and societal stability. The conversation clarifies that disinformation is the deliberate spreading of false information, often for financial or political gain…
  continue reading
 
Today we’re going to talk about four ways to connect with your teenage daughter in ways that feel natural, authentic, and not forced. Ways that feel like exhaling, not performing. And then at the end, I’m going to give you a couple of really helpful conversation tools — so you can connect in a way where she feels seen and safe, rather than judged, …
  continue reading
 
Michael's Producers and subscribers compete in three rounds to see who can make Michael laugh the hardest with their feed. - - - Today's Sponsor: Hillsdale College - Start learning today. Go to https://hillsdale.edu/knowles to sign up for over 40 free online courses. - - - Privacy Policy: https://www.dailywire.com/privacy Learn more about your ad c…
  continue reading
 
Why do people ignore cybersecurity until it’s too late? In this episode of Darnley’s Cyber Café, we dive into the psychology behind cyber neglect, the illusion of “it won’t happen to me,” and why privacy still matters in a world where everything feels exposed. Using real data and relatable examples (including one about bathroom stalls…), we break d…
  continue reading
 
In this emotional and eye-opening episode of Michael &, Michael Knowles sits down with Sabatina James — a woman who was given away as a child bride and forced into marriage with a man twice her age. Sabatina courageously recounts her harrowing experience, her fight for freedom, and how she ultimately found redemption through faith in Jesus Christ. …
  continue reading
 
This is your final opportunity to get a new DailyWire+ annual membership for 50% off, including upgrades and gift memberships. Unlock our entire slate of premium entertainment, uncensored, ad-free daily shows, and the upcoming seven-part epic series, The Pendragon Cycle: Rise of the Merlin. Join now at ⁠⁠⁠https://dailywire.com/subscribe - - - Priva…
  continue reading
 
FOLLOW UP starts with the realization that Spotify Wrapped thinks we are 82 years old, which honestly feels accurate, followed by a massive shout out to Bama Bryan on Bluesky for listening to us for over 3,000 minutes. We look at the grim stats from the Department of Government Efficiency regarding USAID deaths, then move to IN THE NEWS where the K…
  continue reading
 
The FBI finally arrests the J6 pipe bomber suspect, the Left continues to justify violence against conservatives, and Qatar takes a bunch of American influencers on vacation. Ep.1869 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlri - - - Today's Sponsors: Hillsdale College - Start learning today. Go to https:…
  continue reading
 
Top Headlines: securelist.com | The Tsundere botnet uses the Ethereum blockchain to infect its targets: https://securelist.com/tsundere-node-js-botnet-uses-ethereum-blockchain/117979/ Group-IB | Bloody Wolf: A Blunt Crowbar Threat To Justice: https://www.group-ib.com/blog/bloody-wolf/ welivesecurity.com | MuddyWater: Snakes by the riverbank: https:…
  continue reading
 
Send us a text Cybercrime is exploding in South Africa — and most victims aren’t careless… they’re unaware. In this episode of The Security Guy’d, we break down 7 essential cyber security steps that will protect your money, phone, identity, banking apps, and digital life in 2025 and beyond. These tips are simple, practical, and powerful enough for …
  continue reading
 
the provided text examines the modern struggle for freedom and justice in Uruguay by comparing the plight of traditional political prisoners with the challenges faced by the contemporary "digital prisoner." This extensive analysis focuses on Alberto Daniel Hill, the country's first incarcerated "hacker," whose wrongful prosecution following an ethi…
  continue reading
 
A liberal journalist has been charged with leading an international satanic child sexual abuse material ring, a man goes viral for protecting passengers on a New York subway, and leftists finally admit mass migration is being used as ethnic cleansing against Americans. Ep.1868 - - - Click here to join the member-exclusive portion of my show: https:…
  continue reading
 
In the season five finale of the Cyber Security Mentors podcast, hosts Steve and John reflect on the season's highlights, featuring insightful discussions with various cybersecurity experts. They recap key lessons learned, including leadership during crises, negotiation tactics, and the importance of community support. The episode also addresses li…
  continue reading
 
Bienvenidos al CyberMidnight Club. Esta noche, arrancamos la interfaz brillante de tus aplicaciones favoritas para revelar el vientre oscuro, húmedo y lleno de cables de internet. Estamos investigando "La Fabricación de la Realidad": una economía sumergida multimillonaria donde el consenso online se fabrica, se compra y se vende a escala industrial…
  continue reading
 
Welcome to the CyberMidnight Club. Tonight, we strip away the glossy interface of your favorite apps to reveal the humid, cable-strewn underbelly of the internet. We are investigating "The Fabrication of Reality"—a multi-billion dollar shadow economy where online consensus is manufactured, bought, and sold on an industrial scale. You look at your s…
  continue reading
 
Welcome to the CyberMidnight Club. Tonight, we strip away the glossy interface of your favorite apps to reveal the humid, cable-strewn underbelly of the internet. We are investigating "The Fabrication of Reality"—a multi-billion dollar shadow economy where online consensus is manufactured, bought, and sold on an industrial scale. You look at your s…
  continue reading
 
The combined sources present a critical analysis of the October 2025 cybersecurity incident impacting Uruguay’s Plataforma GURI, the education system's central data repository for millions of citizens, including minors. Security analysts confirm this incident is part of a systemic cyber campaign targeting the Uruguayan public sector, concurrent wit…
  continue reading
 
Basado en la transcripción del "Twitter Space" de 2021 y el análisis psicológico proporcionado, este resumen aborda la dinámica de la desinformación y el perfil de su anfitrión, Alberto Daniel Hill. Perfil del Anfitrión: Alberto Daniel HillAlberto Daniel Hill es perfilado como un experto en ciberseguridad con un coeficiente intelectual estimado de …
  continue reading
 
In this episode of Screaming in the Cloud, Corey Quinn sits down with Rubrik’s GM of AI, Dev Rishi, to unpack the real story behind enterprise AI adoption, the rise of agentic systems, and why most organizations are still stuck in read-only mode. Dev breaks down how Rubrik’s Agent Rewind brings safety, observability, and resilience to AI-driven act…
  continue reading
 
The collected materials explore pressing issues across digital security, online communities, and geopolitical corruption. A foundational research report examines how trust and reputation are built and managed in unfiltered online spaces, using a user’s cyber-harassment crisis as a case study. Complementing this, other documents analyze the grave th…
  continue reading
 
The public narrative surrounding Jeffrey Epstein's 2008 prosecution is well-established, painting a picture of a powerful man who used his wealth and connections to escape serious federal charges. However, a detailed, first-person account written by Epstein himself offers a meticulously constructed counter-narrative—an attempt to dismantle the publ…
  continue reading
 
The collected sources examine the controversies surrounding Uruguay's sophisticated electronic surveillance system, "El Guardián," acquired by the Ministry of the Interior to intercept communications like mobile calls, landlines, and social media traffic. While government officials emphasize that the system operates strictly under judicial authoriz…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analysts Alex and Hayden as they discuss: Scattered Lapsus$ Hunters Targeting Zendesk (1:14) Microsoft Teams Guest Access Phishing Bypass (3:37) Dark AI Tools Enhancing Threat Actors (6:08) Silver Fox’s Campaign: Chinese APT Spotlight (10:05) John Dilgen: Cyber Threat…
  continue reading
 
Got a question or comment? Message us here! In this episode of the #SOCBrief, we dig into how world events can trigger cyber fallout that lands directly on the desks of security teams. From ransomware crews capitalizing on instability to hacktivists launching DDoS attacks and opportunistic actors going after vulnerable sectors, we talk through why …
  continue reading
 
President Trump goes full drunk-uncle against Somalis, Sabrina Carpenter disavows the White House, and cops storm in to arrest a female sexual-assault victim for calling her attacker a poof. Ep.1867 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlri - - - Today's Sponsors: Balance of Nature - Go to https://bala…
  continue reading
 
Para los oyentes del CyberMidnight Club, la conclusión forense es clara: las redes sociales han desplegado un exploit "Zero-Day" contra la unidad fundamental de la sociedad: la relación romántica. Estamos ante un cambio criminológico donde el smartphone actúa como un atacante "Man-in-the-Middle", interceptando la intimidad y reemplazándola con vali…
  continue reading
 
Para los oyentes del CyberMidnight Club, la conclusión forense es clara: las redes sociales han desplegado un exploit "Zero-Day" contra la unidad fundamental de la sociedad: la relación romántica. Estamos ante un cambio criminológico donde el smartphone actúa como un atacante "Man-in-the-Middle", interceptando la intimidad y reemplazándola con vali…
  continue reading
 
For listeners of the CyberMidnight Club, the forensic conclusion is stark: Social media has deployed a massive "Zero-Day" exploit against the foundational unit of human society—the romantic relationship. We are witnessing a criminological shift where the smartphone acts as a "Man-in-the-Middle" attacker, intercepting intimacy and replacing it with …
  continue reading
 
A major breach hits SmartTube, the popular third-party YouTube app for smart TVs and suddenly millions of living rooms may have quietly become surveillance hubs. In this episode, we break down how the malicious update happened, what the hidden malware was doing behind the scenes, and why smart TVs are quickly becoming one of the biggest cybersecuri…
  continue reading
 
Send us a text In this episode, I'm chatting with my friend Kelsey Silver about something so many of you have been asking about - how the heck are we supposed to use AI without compromising our clients' security? Kelsey has a super unique background and she breaks down exactly what we need to look for when evaluating AI tools for our firms. Plus, s…
  continue reading
 
A Stranger Things star is grateful her parents aborted her sibling, a Republican senator wants to end dual-citizenship, and the FDA admits the Fauci Ouchie killed kids. Ep.1866 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlri - - - Today's Sponsors: Birch Gold - Text KNOWLES to 989898 for your free informatio…
  continue reading
 
Former U.S. Secret Service Special Agent Richard LaTulip joins Craig Duckworth to reveal the hidden world of cyber criminal networks and infrastructure attacks. Drawing from his undercover work infiltrating dark web forums and catching some of the world's most sophisticated threat actors, Richard breaks down why traditional security approaches fail…
  continue reading
 
Got a question or comment? Message us here! 📱 This #SecureAF episode covers the everyday questions and concerns people have when they think something unusual is happening with their devices or accounts. Hickman and Peters talk through typical scenarios, common misunderstandings, and the foundational steps that help people regain control of their ac…
  continue reading
 
Anand Oswal, Executive Vice President at Palo Alto Networks, joins Johna Johnson and John Burke for a wide-ranging exploration of two emerging focal points of enterprise risk: cryptographically relevant quantum computing, and browser-mediated agentic AI. The looming arrival of quantum computers that can break legacy encryption has already created t…
  continue reading
 
Ben Shapiro, Matt Walsh, and Michael Knowles break down the National Guard shooting and the dangerous reminder it gives the country about Biden’s disastrous immigrations admissions policies. Who got in, who is still out there, and what needs to happen next. Plus, the escalating tensions between the United States and Venezuela. The wartime crime acc…
  continue reading
 
An Afghani "refugee" shoots two National Guardsmen in D.C., a lib congressman says white supremacists should be deported, and President Trump calls Tim Walz retarded. Ep.1865 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlri - - - Today's Sponsors: Mizzen + Main - Get 20% off your first purchase by using code …
  continue reading
 
Send us a text What’s the worst thing a guy can do before you meet him for a first date? Our guest this week has the answer! Catherine Berra, shares crazy tales from her book These Stories Are True ... I Sh#t You Not!: A Humorous Look at Online Dating for the Unsuspecting Older Human, detailing both her own wild experiences and those of her male an…
  continue reading
 
Wondering why can't your teen girl keep herself organized? Frustrated by her lack of skills in areas you know your teenage daughter should already know? Dr Anna Levy-Warren, clinical psychologist, founder of Organizational Tutors and mom of teens, talks about navigating the teen years: executive functioning-based strategies for thriving through mor…
  continue reading
 
What happens when the information environment becomes too loud for the human brain to handle? And why does it feel like everyone — kids, adults, institutions, governments — is getting overwhelmed at the same time? We sit down with John Bicknell, former Marine and host of The Cognitive Crucible, to talk about the cognitive overload shaping modern li…
  continue reading
 
Send us a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how Bo…
  continue reading
 
Andrew Klavan joins Michael to discuss literature, the arts, and Drew's newest book, After That, The Dark. Give it a read today! Purchase your copy of "After That, the Dark" here: https://amzn.to/47D4WEE Once a year, every year, we give you our best deal of the year. And it’s happening right now. DailyWire+ memberships are 50% off. https://getdwplu…
  continue reading
 
In this episode of Darnley’s Cyber Café, we dive into the fascinating, and slightly unsettling, world of biorobotics, where human biology meets advanced robotics and neural technology. From groundbreaking innovations like Neuralink, next-gen prosthetics, and brain-computer interfaces, to the hidden cybersecurity risks of merging technology directly…
  continue reading
 
Michael Knowles dives deep into the internet’s darkest corners, is own Reddit hater threads. From unhinged rants to oddly specific insults, he reads and reacts to what Reddit really thinks about him (and maybe has a few thoughts of his own).Watch as Michael breaks down the funniest, harshest, and most ridiculous comments the internet has to offer, …
  continue reading
 
After surviving Thanksgiving and the subsequent biting cold, we jumped into the FOLLOW UP with news that Malaysia is joining the trend by taking steps to ban social media for children under 16, mirroring similar actions in Australia and Denmark—it seems the world is finally realizing the internet is a toxic wasteland for the kids. We also discussed…
  continue reading
 
YES or NO: Michael Knowles Vs. Read Choi Once a year, every year, we give you our best deal of the year. And it’s happening right now. DailyWire+ memberships are 50% off. https://getdwplus.com/blackfridayMICHAELYT - - - Today's Sponsor: Balance of Nature - Go to https://balanceofnature.com/pages/podcasters and use promo code KNOWLES for 35% off you…
  continue reading
 
Send us a text South Africa’s security industry is facing one of its biggest challenges yet — and most people have no idea what’s really happening behind the scenes. In this powerful episode of the Security Guy’d Podcast, Rafee Moosagie sits down with veteran Close Protection Officer and Law Enforcement Training Manager Mario Firmstone to break dow…
  continue reading
 
The Promise and Peril of a Global Conversation Imagine trying to tell your friends about something important you just saw online. You start to speak, “You guys are not going to believe what Trump just tweeted…”—but before you can finish, your phone buzzes. And again. And again. The constant stream of notifications, arguments, and alerts becomes so …
  continue reading
 
In this episode of the Cyber Security Mentals podcast, hosts Steve and John delve into effective strategies for studying cybersecurity. They discuss the importance of structured learning, hands-on labs, and consistent practice, while exploring the challenges of self-paced learning. The episode highlights the benefits of programs like ACI Learning a…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play