Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
They steal billions: Cyber Hack investigates the alleged cyber gangs and the heists and hacks they’re accused of carrying out. No one is said to be safe. From Hollywood studios, to international banks, from crypto exchanges to small businesses and health care companies, law enforcement agencies say they cause chaos around the globe. Who will be next? And where is the money going? Latest season: Evil Corp. The Russian Evil Corp is accused of being a family crime gang, responsible for stealing ...
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Introducing the new podcast series from the National Cyber Security Centre (NCSC). Join us as we dive deep into the ever-evolving world of cyber security, bringing you discussions on topical issues, emerging trends, and expert insights from our in-house experts and external guests. Each episode offers a comprehensive exploration of a specific topic, providing listeners with valuable knowledge and actionable advice. Visit ncsc.gov.uk to find out more about the topics discussed, access additio ...
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Russia knows our weaknesses. But do you? A major five-part series from Sky News and Tortoise which imagines how a Russian attack on the UK could play out – and invites real-life former ministers, military chiefs and other experts to figure out how to defend the country. Written and presented by Sky News' security and defence editor, Deborah Haynes.This is Deborah's second podcast series for Sky News. In her first series, Into The Grey Zone, Deborah explores the murky evolution of warfare.Wha ...
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading
Your Favorite Existentialist-Anarchist Internet Badass Commentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
We are going to teach you how to defend yourself against cybercrime, privacy abuse, vehicle hacking, bomb drones and cyber warfare, REGARDLESS of your proficiency with computers. Because you don't have to be technical to survive the Digital Age!
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
Breaking Cyber Barriers dives deep into the world of Cybersecurity, uncovering trends and exploring its limitless potential. Join host Liz Vagenas as she speaks with top leaders about the current challenges and opportunities within the industry, as well as strategies for success.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
A podcast for anyone and everyone interested in leadership in the cybersecurity industry - we talk about the challenges impacting our industry & how leadership can address that and gain insights, advice and the occasional anecdote from experienced leaders who are happy to share their stories with us!
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
Cyber Insurance Leaders is dedicated to keeping cyber insurance and security professionals up to date on the latest developments, best practices, and thought leadership from leading voices in the industry. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Cyber Security Compliance and IT Jobs
…
continue reading
Cyber Sitrep brings you all the latest cybersecurity news, commentary, and threat intelligence. Focused on small to midsize businesses who we feel have been left behind. Hosted by Eric from Corvus Technologies and Mike from Digital Beachhead who bring their unique perspective based on their military and cybersecurity experience. If you want to understand more about how cybersecurity is important to your organization, enjoy funny tales or just want to learn more about the field of cybersecuri ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Are you ready to explore the future of cybersecurity? Join us on Cyber Talks by Devoteam the videocast where industry experts, thought leaders, and practitioners share their insights, experiences, and strategic perspectives. Hosted by Rui Shantilal, VP of Devoteam Cyber Trust, each episode delves into key cybersecurity topics—from Offensive Security and DORA Compliance to Third-Party Risk Management and IAM. Whether you're a seasoned security leader, a CISO navigating complex challenges, or ...
…
continue reading
1
Google's remote-wipe weapon, Qilin ransomware activity surges, GootLoader is back
8:08
8:08
Play later
Play later
Lists
Like
Liked
8:08Google's Find Hub turns into remote-wipe weapon Qilin ransomware activity surges GootLoader is back Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ....or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta.…
…
continue reading
This is today’s cyber news for November 12th, 2025. A massive credential trove lands in Have I Been Pwned, pushing account takeover risk sharply higher. Microsoft’s monthly patches close sixty-three flaws, including one already exploited in the wild. Triofox is under live attack via a setup-route bypass, SAP fixes hardcoded credentials in SQL Anywh…
…
continue reading
Your devices may be giving away more than you think. In this episode of Reimagining Cyber, security expert Tyler Moffitt explores the hidden world of side-channel attacks — where everyday sensors reveal information you never intended to share. From Android apps that can infer your two-factor codes without screenshots, to gaming mice that “hear” spe…
…
continue reading
1
Episode 472 - Secure and Simplify with Zero Trust Everywhere
8:46
8:46
Play later
Play later
Lists
Like
Liked
8:46We speak with Dhawal Sharma, Executive Vice President & Head of Product Strategy at Zscaler on the latest innovations in zero trust to enhance security, simplify access management, and significantly reduce legacy infrastructure costs. Dhawal Sharma is a visionary leader and expert in cloud security who currently serves as Executive Vice President a…
…
continue reading
1
TCW Episode 84: From the Military to Freelance Cybersecurity
39:45
39:45
Play later
Play later
Lists
Like
Liked
39:45Summary In this episode, Hugh Shepherd Jr shares his extensive journey in cybersecurity, detailing his transition from military service to a successful freelance career. He discusses the importance of adaptability, continuous learning, and building relationships in the field. Hugh emphasizes the value of volunteering as a stepping stone to paid opp…
…
continue reading
1
The Church of Script Kiddies: A Divine Comedy of Code
30:51
30:51
Play later
Play later
Lists
Like
Liked
30:51The sources present two contrasting yet connected narratives within the cybersecurity world, focusing on ethical integrity and satirical commentary. One primary source details the real-life case of **Alberto Daniel Hill**, an ethical Uruguayan hacker who faced **incarceration** after responsibly reporting a severe vulnerability in a medical system,…
…
continue reading
1
SANS Stormcast Wednesday, November 12th, 2025: Microsoft Patch Tuesday; Gladinet Triofox Vulnerability; SAP Patches
6:03
6:03
Play later
Play later
Lists
Like
Liked
6:03Microsoft Patch Tuesday for November 2025 https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+for+November+2025/32468/ Gladinet Triofox Vulnerability Triofox uses the host header in lieu of proper access control, allowing an attacker to access the page managing administrators by simply setting the host header to localhost. https://cloud.google.com/b…
…
continue reading
Nick Wolf, the sales leader who steered startups like Datto and SKOUT to massive acquisition success, is here to talk about his next big move. As Director of Partner Acquisition at Cork, Nick shares his insights on driving explosive channel growth and the critical emerging role of Cyber Warranty for MSPs. Learn the strategies you need to scale your…
…
continue reading
1
The Hidden Dangers in Your Supply Chain with SecurityScorecard's Aleksandr Yampolskiy
37:19
37:19
Play later
Play later
Lists
Like
Liked
37:19SecurityScorecard CEO Aleksandr Yampolskiy joins Cyber Focus to warn that third-party risk is now the dominant cybersecurity epidemic. With just 150 companies responsible for 90% of the global attack surface, a single compromise can ripple across sectors and continents. He and host Frank Cilluffo explore the cascading risks of software dependencies…
…
continue reading
1
Cyber Defense Radio – Chandra Shekhar Pandey – CEO – Seceon – Hotseat Podcast II – 2025
32:06
32:06
Play later
Play later
Lists
Like
Liked
32:06🚨 New Episode of Cyber Defense Radio is LIVE! 🎙️ Hosted by Annabelle Thomas, Cybersecurity Champion of @CyberDefenseMag In this electrifying episode, Chandra Shekhar Pandey, CEO of Seceon, steps into the Hotseat Podcast to reveal how Seceon’s AI-powered AIOps platform is transforming cybersecurity with real-time threat detection, autonomous respons…
…
continue reading
1
🔴 Nov 11’s Top Cyber News NOW! - Ep 1003
1:30:46
1:30:46
Play later
Play later
Lists
Like
Liked
1:30:46The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
…
continue reading
1
Resilient Cyber w/ Kamal Shah - The State of AI in SecOps
29:19
29:19
Play later
Play later
Lists
Like
Liked
29:19In this episode of Resilient Cyber, I sit down with Kamal Shah, Cofounder and CEO at Prophet Security, to discuss the State of AI in SecOps. There continues to be a tremendous amount of excitement and investment in the industry around AI and cybersecurity, with Security Operations (SecOps) arguably seeing the most investment among the various cyber…
…
continue reading
1
Tommy Bavel co-founder & CEO @Cyzea on manage risk cyber and metrics for meeting objectives, & AI
43:01
43:01
Play later
Play later
Lists
Like
Liked
43:01מתאר האיום משתנה בתדירות גבוהה ומתקפות הסייבר מתגלות כיותר מתקדמות מיכולות ההגנה, כניסת הבינה המלאכותית משנה שוב את מתאר האיום ומעלה את הרף בצורה אקספוננציאלית (מעריכית). נחשון פינקו מארח את טומי באבל מייסד-שותף ומנכ"ל סיזאה, אחד מאנשי הסייבר המוכרים והמוערכים בענף הסייבר בישראל ולא רק בשיחה על ניהול סיכונים בארגון ומה המקום של סייבר, איך יכולו הנה…
…
continue reading
1
Rebooting the government, one cyber law at a time.
29:54
29:54
Play later
Play later
Lists
Like
Liked
29:54Ending the government shutdown revives an expired cybersecurity law. The DoD finalizes a new model for building U.S. military cyber forces. A North Korean APT exploits Google accounts for full device control. The EU dials back AI protections in response to pressure from Big Tech companies and the U.S. government. Researchers discover a critical vul…
…
continue reading
Last week we discussed a weird email sent to students, staff, alumni, or basically anyone associated with the University of Pennsylvania. This week some new developments in the case occurred that could leave data at risk, but the attacker's motivations and actions seem odd. Sources: https://pastebin.com/GDKhPmrE…
…
continue reading
1
This New Rule Can DESTROY Your Sales Overnight: CMMC's Wide Reach
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41CMMC 2.0 explained in plain English — what it means for small businesses, defense contractors, and vendors across the DoD supply chain. Learn about Level 1 vs Level 2, self-attestation risks, C3PAO shortages, compliance deadlines, and how to stay audit-ready before 2025. Don't miss out on crucial information about the CMMC 2025 deadline. The Cybers…
…
continue reading
1
Measuring and Managing Technical Debt with Dr. Ken Knapton
43:37
43:37
Play later
Play later
Lists
Like
Liked
43:37Guest Introduction Dr. Ken Knapton is the Chief Information Officer at Win Brands, the parent company of Costa Vida Fresh Mexican Grill and FatCats Entertainment. With more than 30 years of experience in technology strategy and digital transformation, Ken was hired to bring together two very different brands under a single IT vision. Costa Vida ope…
…
continue reading
A cyber-crime kingpin in a US prison speaks for the first time. How did he dodge the FBI when they came to his home? And how did he and his alleged crime gang steal millions of dollars from their victims? We learn that Jabber Zeus boss Tank had friends in high political places in Ukraine – and a budding young business associate in Russia. Hosted by…
…
continue reading
1
23. The Dark Web and Cyber Crime - LIVE Podcast with Federal Agent and Cyber Intel Expert
54:13
54:13
Play later
Play later
Lists
Like
Liked
54:13Crime as we know it is changing and the kids are keeping up, faster than we are. In this episode, GTC is on stage at the SXSW conference, discussing how the average age of cyber criminals is becoming younger and younger. Joined by our panelists AFP Federal Agent, Amy Phelps and Cyber Intelligence Expert Leah Pinto, we unpack how the dark web is fue…
…
continue reading
1
Ghosts in the Chat: The Teams Message Manipulation Flaw
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45Researchers have uncovered flaws that allow Microsoft Teams messages to be manipulated, letting hackers impersonate executives, forge notifications, and alter private chats. In this episode of Darnley’s Cyber Café, we explore how these vulnerabilities work, why they exist, and how to protect yourself from deception hiding behind familiar names. For…
…
continue reading
1
Episode 156: Post-Exploitation Tactics That Still Work in 2025
28:53
28:53
Play later
Play later
Lists
Like
Liked
28:53In this episode Spencer and Tyler discuss post-exploitation tactics that still work in 2025. The guys discuss everything from credential access techniques to defense evasion, lateral movement and even exfiltration. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on soc…
…
continue reading
1
How Modern Threats Are Redefining the Rules of Defense with Paul Chichester
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37In this episode, Ciaran and James are joined by Paul Chichester CMG, MBE, Director of Operations at the UK’s National Cyber Security Centre, to explore how cyber threats have evolved over the decades. Drawing on more than 30 years experience at GCHQ, Paul reflects on the progression, from early digital espionage to major nation-state attacks and th…
…
continue reading
1
Lumify Work's Louis Cremen talks about AI risks and opportunities, staff training, and how to protect data
43:11
43:11
Play later
Play later
Lists
Like
Liked
43:11In this episode of the Cyber Uncut podcast, host Liam Garman is joined by Lumify Work's lead cyber security instructor, Louis Cremen, for a talk about all things AI, from how best to protect sensitive data to managing AI governance. The pair start things off with a discussion about how AI is rapidly transforming workplaces and how organisations mus…
…
continue reading
1
Teaching girls to find confidence and community in hacking with Bianca (BiaSciLab) Lewis
27:26
27:26
Play later
Play later
Lists
Like
Liked
27:26Welcome to a new episode of Clearly Cyber, the PRPR podcast. We're really excited to bring you this new episode with Bianca, aka BiaSciLab, founder of Girls Who Hack. Bianca talks about how she first entered the world of cyber at age 11, and the challenges she faced being a girl in a male-dominated environment. She also reflects on her mission to i…
…
continue reading
1
teissTalk: Getting the board’s ‘aye’ on your cyber-security investments
45:29
45:29
Play later
Play later
Lists
Like
Liked
45:29Bridging the CISO-board disconnect which hinders your cyber-security progress Measuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investments Focusing on governance and compliance – how to answer when asked “are we compliant? Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Zia …
…
continue reading
1
AI & Cybersecurity – A Double-Edged Sword
22:48
22:48
Play later
Play later
Lists
Like
Liked
22:48AI doesn’t sleep, doesn’t forget, and doesn’t forgive. Are you prepared? Join Hugo Mestre, Executive Director & Head of Cyber Trust Portugal and co-host Rui Shantilal as we explore how AI is revolutionising cybersecurity, but also supercharging cybercrime. Listen to this episode to learn about: How AI is transforming threat detection & response. Th…
…
continue reading
In this episode of The Cyber Sitrep, Eric and Mike pull back the curtain on their first-hand experiences using AI in real-world work scenarios. This isn’t another “AI for productivity” guide — it’s a field report. The crew discusses what worked, what didn’t, and the unexpected moments where AI either impressed… or completely fell flat. From draftin…
…
continue reading
1
S2 E7: ICS/OT Security Operations Centers
25:56
25:56
Play later
Play later
Lists
Like
Liked
25:56The growing need for visibility and response in industrial environments is driving more organizations to consider ICS/OT Security Operations Centers — but what does that actually look like for small and medium-sized operations? In this episode of Simply ICS Cyber, Don and Tom sit down with Dan Gunter, CEO and founder of Insane Cyber, to discuss how…
…
continue reading
1
Episode 35: AI and Cyber Security— how the EU AI Act is Changing the Game
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57In this episode of It’s Cyber Up North we are live from CyberFest 2025 exploring the hot topic of AI and Cyber Security—and how the EU AI Act is changing the game. Jon Holden (CyberNorth) is joined by Lucy Batley, owner at Traction Industries, and an absolute powerhouse recognised on the AI 100 UK List 2025, which celebrates individuals and organis…
…
continue reading
Want to be the first to hear our episodes each week? Become a Patreon donor here. Links we discuss this week: https://thehackernews.com/2025/10/self-spreading-glassworm-infects-vs.html?m=1 https://www.cybersecuritydive.com/news/artificial-intelligence-security-risks-ey-report/803490/ https://www.cybersecuritydive.com/news/ai-augment-security-identi…
…
continue reading
1
What You Get Wrong About Bakunin - SEDI Hosts Mark Leier
1:05:34
1:05:34
Play later
Play later
Lists
Like
Liked
1:05:34On October 26, 2025, the Sam and Esther Dolgoff Institute (SEDI) hosted historian Mark Leier for a rich and provocative discussion on Mikhail Bakunin—philosopher, agitator, exile, and one of the most misunderstood revolutionaries of the nineteenth century. Drawing on his biography Bakunin: The Creative Passion, Leier unraveled the myths that have l…
…
continue reading
1
Episode XII - Trusted Collaboration in the Age of AI
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47CEO & Founder of eShare Nicholas Stamos discusses the groundbreaking work he has done in his field, and why governance needs to evolve before AI outpaces policy.
…
continue reading
1
Mobile Phone Security-Danger In Your Pocket
17:38
17:38
Play later
Play later
Lists
Like
Liked
17:38Send us a text Mobile phones are dangerous. First, we'll review how hackers can abuse their features to upload malware, steal your data, eavesdrop or harvest your home address and common convenience features that can get you breached. Then, you'll learn the simple countermeasures that you can take to keep attackers out of your data and away from yo…
…
continue reading
✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/contact-us/ ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @secdefllc for real-time tweets. Follow our CEO Shawn Waldman for his…
…
continue reading
1
Episode 19- Building Resilient Cyber Communities in Healthcare: A Conversation with Drex DeFord
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17Dan Dodson hosts Drex DeFord, a leader in healthcare cybersecurity, to discuss the evolution and current state of cybersecurity in healthcare. Drex shares his career journey from a hospital administrator in the Air Force to leading roles in various healthcare organizations and consulting for tech companies. He describes how the rapid digitization o…
…
continue reading
Send us a text Ep. 99 of the Cyber Law Revolution is live! In this episode, we discuss the importance of a good managed service provider (“MSP”) and how a bad MSP can cripple you. We walk through the different aspects that define both a good and bad MSP. Also, we touch on the recent AWS outage and how we are all dependent on these large cloud-based…
…
continue reading
In this episode of Cyber Series, we explore the foundations of effective cyber security with experts Mary Haigh (BAE Systems), Emma Philpott (IASME Consortium), and Chris Ensor (NCSC). They discuss the purpose of Cyber Essentials, the five core technical controls, and why “getting the basics right” remains a challenge for organisations of all sizes…
…
continue reading
1
Ep. 58 – From Forms to Data Precision: Telemetry’s Role in Cyber Underwriting – with Alex Jomaa
38:21
38:21
Play later
Play later
Lists
Like
Liked
38:21Telemetry is changing the underwriting game, enabling a shift from clunky forms to real-time, verifiable risk data. In this episode, host Anthony Hess sits down with Alex Jomaa, Chief Underwriting Officer at Onda, to explore how real-time data is transforming cyber underwriting, and why it’s time the industry stopped relying on outdated processes t…
…
continue reading
1
NCSC Annual Review 2025: Crisis in the Boardroom, AI driven threats and Supply Chain Resilience Roadmap
33:14
33:14
Play later
Play later
Lists
Like
Liked
33:14Trish and Tom take a deep dive into the NCSC Annual Review for 2025 and unpack practical tips for business leaders. We're tearing open the most critical report of the year: the NCSC Annual Review 2025. The message from GCHQ is crystal clear: Cyber risk is no longer just an IT issue—it’s a boardroom priority. Forget those old assumptions—the threats…
…
continue reading