Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Cybersecurity is more than tools and threats — it’s the people who choose this path, and I’d love to hear how you found yours. Suppose you’re a student, early-career professional, veteran, career changer, or seasoned practitioner. In that case, you’re invited to share your story for a short, relaxed conversation that will be featured across Bare Metal Cyber channels. Use the form below to tell me a bit about your background, where you are in your journey, and what you’d like to talk about, a ...
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference.
…
continue reading
This is a podcast about my journey into information security it will be full of things that I've learned over the years and also things that I have researched and find interesting and want to present to you the audience.
…
continue reading
James McQuiggan brings inspiring stories of cybersecurity practitioners "break-into-industry" stories across all dimensions of cybersecurity.
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
The purpose of "FounderStoriez Channel" is to interview Entrepreneurs from around the world to share their story, experience, and wisdom with you so you can learn from them and be inspired.
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
…
continue reading
Junior Dev's log - personal journey to become Junior Software Developer... and maybe beyond. Weekly entries to a journal of a guy in Manchester England set on a long voyage to a coding job. Let's see where it takes us. ...Cyber space, the final frontier.
…
continue reading
Cyber Balance is a unique podcast designed for cybersecurity professionals who want to achieve financial security while maintaining mental well-being. Each week, we dive into topics that blend financial management, mental health strategies, and career development in the fast-paced world of cybersecurity.
…
continue reading
CyBytes is a podcast that features bite-sized conversations with tech and cybersecurity pros - sharing insights, stories, and actionable advice to help you navigate and thrive in the industry
…
continue reading
Chicago, IL - Where conversation flows...and life is explored -- that’s where the new podcast, Rhythm of Life, begins. Initial episodes include a fascinating conversation Steve Ordower has with filmmaker, Bob Hercules about his illustrious career, including his most recent Peabody Award winning documentary, Maya Angelou: And Still I Rise. They touch on the power of forgiveness in this project as well as in another potent film Hercules directed, Forgiving Dr. Mengele. We also hear from the ac ...
…
continue reading
In today's interconnected world, the lines between cybersecurity and safety are more crucial than ever. Join us on "Cyber Safety: The Life-Saving Distinction," where we delve into the critical differences that could protect your digital life and personal well-being. Hosted by cybersecurity enthusiast Allison Cutts (AJ), this podcast explores the nuances of staying secure in a fast-paced digital age. Each episode offers insightful discussions, expert interviews, and practical advice to help y ...
…
continue reading
The Cyber Consulting Room Podcast and Meetup Network is your gateway to a world of knowledge and collaboration in the ever-evolving realm of cyber security and consulting. Our podcast, hosted by Gordon Draper, brings you in-depth interviews with industry leaders, experts, and trailblazers, offering invaluable insights, strategies, and experiences. From award-winning professionals to those paving the way for diversity in the field, we delve into the most pressing issues and emerging trends. B ...
…
continue reading
In a rapidly evolving world, it’s never been more important to remember the human side of technology. Amplify is a new podcast from Six Degrees. Each episode we’ll explore the latest developments in cloud computing, cyber security and diversity, speaking to authentic voices who will offer their insights and provide practical take home advice that you can apply in both your personal and work lives.
…
continue reading
Welcome to Security Happy Hour, where we interview new and established members of the cybersecurity community. In this show we cover where guests have come from and where they want to go, as well as current events and other security related items.
…
continue reading
A is for Artificial Intelligence, B is for Blockchain, C is for Cyber Security. Follow our journey through an alphabet of technology trends with PwC's technologists and special guests.
…
continue reading
We Cover the Cyberspace.
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
We are a Police led not for profit company. We offer simple, free and easily understood cyber security guidance for small and medium sized businesses. Remember it doesnt have to be complicated or expensive to give your business the cyber protection and peace of mind that you need. All this from industry experts who partner with us in the cyber security arena.
…
continue reading
Come join us on our journey!!! ... working towards an accessible and meaningful glimpse into the universe of Likutei Moharan with a group of growth-oriented people; Also available at: http://www.jewishheritagefoundation.org/audio_shiurim.html Please feel free to reach out from cyber space: [email protected] and let me know how you are enjoying the shiurim, or just to say hello. Would love to hear from you!!!
…
continue reading
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
…
continue reading
Cybercrimeology is a podcast about cybercrime, its research and its researchers. We talk to top researchers from around the world to learn about different forms of cybercrime and their research. We learn about cybercrime theory, organized crime online, Darknet drug markets, cybercrime awareness and crime prevention, technology-facilitated intimate partner violence and much more. The podcast has been running since November of 2019 and there is still so much to learn. I am happy to have you al ...
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
.
…
continue reading
Dipanshu Parashar is a Blogger || influencer || Author || digital marketer. He brings out the best tech stories and shares the difficult moments which made his journey a huge success. He is currently India's youngest Cybersecurity author and security analyst.
…
continue reading
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
…
continue reading
SheCanCode’s ‘Spilling the T’ podcast offers conversations with top female voices in the tech sector, as we plunge into the latest topics that have captured our imagination recently. Learn about a range of tech disciplines and how to establish a career in them - from coding, AI, cyber, starting a business, career transitions and even diversity in space, we lay it out bare and Spill the T on everything you need to know.
…
continue reading
Vibing in the Cloud with Natina Michelle on Cloud Sesh Podcast. If you’re looking to transition your career into IT, Cyber, or Cloud Computing start your journey here! Our main focus is AWS Cloud for beginners. Learn, Study, & Build with us. If you are new to AWS or to IT in general this is the podcast for you.
…
continue reading
Professor Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists’ eyes. Joined by a panel of scientists, experts and celebrity science enthusiasts they investigate life, the universe and everything in between on The Infinite Monkey Cage from the BBC. From the smallest building blocks of life to the furthest stars, the curious monkeys pull apart the latest science to reveal fascinating and often bizarre insights into the world around us and what lies beyond. Ca ...
…
continue reading
Making Freedom Ring In Cyber” podcast is a powerful forum focusing on cyber security awareness, and the intersection of technology, justice, and civil liberties. Listeners are invited to embark on a journey towards understanding their rights and the resources available for their protection. With each episode, Dr. Sewell aims to ignite conversations that elevate the importance of justice and civil liberty preservation in the digital age. Tune in to make your voice heard and join this vital di ...
…
continue reading
YASH cyber security solutions are helping global corporations address a plethora of cyber risks proactively and reactively. We help our customers to grow their business securely, we understand your world.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, geopolitics, and business, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Send feedback and show ideas to [email protected]. Each discussion delves into the intersection of technology advancement, market dynamics, and the founder journey, offering insigh ...
…
continue reading
This podcast features interviews of CTOs and other technical leadership figures and topics range from technology (AI, blockchain, cyber, DevOps, Web Architecture, etc.) to management (e.g. scaling, structuring teams, mentoring, technical recruiting, product etc.). Guests from leading tech companies share their best practices and knowledge. The goal is to support other CTOs on their journey through tech and engineering, inspire and allow a sneak-peek into other successful companies to underst ...
…
continue reading
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
…
continue reading
Emerge is business industry-focused. We are a resource for all stages of businesses; from start-up business owners to CEOs. We provide solutions and advice through our articles on how to prepare a business, start a business, grow your business, and be a leader. A weekly show about entrepreneurship, business, and the lifestyle we live. Tune in as hosts Tiffany Boyle, DaShana Kemp-Garnett, and Dorthya Shuler interview entrepreneurs from around the world to learn about their businesses, entrepr ...
…
continue reading
EUAudio provides automation professionals with a seamless way to listen in on the biggest manufacturing trends, anytime, anywhere. Covering the industry’s most relevant topics from environmental issues to predictive maintenance, cyber security to supply chain management, each series is carefully curated allowing listeners to develop their knowledge and skill set along the way. Your journey to becoming an automation expert starts here.
…
continue reading
What would you do if you were starting today? To help, here are half-baked startup ideas, growth marketing tactics, and stories from founders and creators - including my own journey as a bootstrapped business owner. All of the content is centered around helping founders, creators, and investors starting today.
…
continue reading
Hosted by two former federal agents who investigated computer crime, this is a technology Podcast covering Computer Security, Computer Crime and Computer Forensics Topics.
…
continue reading
1
Breaking into Cybersecurity: Brian Carbaugh's Journey from CIA to Cyber Startup
29:46
29:46
Play later
Play later
Lists
Like
Liked
29:46Breaking into Cybersecurity: Brian Carbaugh's Journey from CIA to Cyber StartupIn this episode of Breaking into Cybersecurity, Brian Carbaugh shares his extensive journey from serving in the Marines and the CIA to becoming a leader in the cybersecurity industry. Brian talks about his career evolution, the challenges he faced, and the valuable lesso…
…
continue reading
1
CCT 311: Practice CISSP Questions and AI In The SOC (Domain 3)
28:42
28:42
Play later
Play later
Lists
Like
Liked
28:42Send us a text Ready to turn CISSP Domain 3.5 into practical moves you can deploy on Monday? We unpack how real SOC teams apply microsegmentation, identity-aware controls, and targeted inspection to crush lateral movement without dragging performance. Along the way, we demystify AI’s role: where detection engineering benefits from crisp use cases, …
…
continue reading
1
Systematically Improving Cybersecurity Training
49:19
49:19
Play later
Play later
Lists
Like
Liked
49:19Notes: Julia Prümmer describes her transition from legal psychology into cybersecurity research and how psychological methods shape her approach to cybersecurity training. The discussion explores the role of systematic reviews in mapping what a research field actually knows, rather than relying on highly visible or frequently cited studies. Finding…
…
continue reading
Predictions and challenges in the technology and cybersecurity space for 2026, with a focus on Microsoft ecosystem changes, licensing, security, and the impact of AI and Copilot. I had a chance to catch up with Shay Cohen of Optimize365.io this week, and I think you will find his insights on the future of CoPilot and other unique changes we can exp…
…
continue reading
1
The Influencer Marketing Playbook - with Lily Comba, Founder & CEO of Superbloom
1:16:54
1:16:54
Play later
Play later
Lists
Like
Liked
1:16:54This week, we’re joined by Lily Comba, Founder & CEO of Superbloom, who opens up about how she got her start in influencer marketing and why she approaches influencer through a performance lens. Lily shares her journey from building in-house programs to launching Superbloom, and what she learned scaling influencer across some of the most recognizab…
…
continue reading
1
Unsecurity Episode 254: Journey to Becoming A CISO with Ted Peterson
33:48
33:48
Play later
Play later
Lists
Like
Liked
33:48A slow-rolling holiday episode featuring CISO at DataSite, Ted Peterson! Transitioning from a Director Role, Ted shares his journey to the CISO title and how his unique background informs his work approach. Tune in for insights on: Realities to navigating organizational leadership as a CISO Importance of diverse perspectives and backgrounds in the …
…
continue reading
1
CCT 310: Wi-Fi Hopping And Database Defense - CISSP Training
43:57
43:57
Play later
Play later
Lists
Like
Liked
43:57Send us a text A neighboring Wi‑Fi, a handful of stolen credentials, and a quiet leap into a high‑value network—the kind of pivot that sounds cinematic until you realize how practical it is. We unpack that playbook and turn it into concrete defenses you can deploy across your environment, from client endpoints and browsers to databases, servers, an…
…
continue reading
1
Ori Barzilay (Team8): Winning Mentality, Humility, and Founder Excellence
57:37
57:37
Play later
Play later
Lists
Like
Liked
57:37In this episode, we sit down with Ori Barzilay, Partner at Team8, to explore what truly drives exceptional founders and investors. Ori shares his journey from elite military service and competitive sports to becoming one of the youngest partners at a tier-1 venture firm. We discuss winning mentality, humility, intuition in investing, founder-team d…
…
continue reading
1
The LastPass Breach That Never Ended: How Weak Passwords Still Cost Millions
9:19
9:19
Play later
Play later
Lists
Like
Liked
9:19In this journey from Darnley’s Cyber Café, we explore the chilling aftermath of one of the most talked-about data breaches in modern history: the LastPass incident. But this isn’t just a story about what happened. It’s about what never stopped. From crypto wallets vanishing in silence to digital vaults bleeding secrets over years, this slow-burn na…
…
continue reading
1
CCT 309: Practice CISSP Questions and React-To-Shell (Domain 7.6)
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35Send us a text One unauthenticated request should not be all it takes to compromise your app—but with React-To-Shell, that’s the reality many teams are facing. We unpack what this vulnerability hits across React server components and Next.js app router setups, why default configs can be enough to fall, and how active threat actors are already abusi…
…
continue reading
1
The Biggest Professional Data Leak You’ve Never Heard Of (And Why It Matters)
10:10
10:10
Play later
Play later
Lists
Like
Liked
10:10A massive, unsecured database exposed billions of professional records such as names, emails, job roles, work history, and more...now quietly sitting open on the internet. In this episode of Darnley’s Cyber Café, we unpack how a leak this size changes the game for phishing, social engineering, and AI-powered scams, why professionals are now prime t…
…
continue reading
1
The North Pole Unwrapped - Russell Kane, Felicity Aston and Lloyd Peck
42:22
42:22
Play later
Play later
Lists
Like
Liked
42:22In this Christmas episode of The Infinite Monkey Cage, Brian Cox and Robin Ince head to the North Pole to explore the dazzling science behind the northern lights, the extreme adaptations that help animals - and even Santa Claus - survive the Arctic cold, and how the Earth’s magnetic field might just guide him home. Joining the monkeys are comedian …
…
continue reading
1
The Razorwire Christmas Special 2025: Looking Back, Looking Forward
1:15:41
1:15:41
Play later
Play later
Lists
Like
Liked
1:15:41What happens when you gather some of the sharpest minds in cybersecurity for an end-of-year chat about where we've been and where we're heading? Welcome to Razorwire's Christmas special. Today I’m chatting with some of our favourite guests from 2025: clinical traumatologist Eve Parmiter, cyber futurist Oliver Rochford, CISO and podcast host Marius …
…
continue reading
In 2026, AI will increasingly integrate into business processes, emphasizing strong data quality and security as prerequisites for success. AI agents, distinct from chatbots, will operate with machine identities to automate tasks while supporting, rather than replacing, human decision-making. This is just a glimpse of the insights Ben Wilcox of Pro…
…
continue reading
1
Setting 2026 Goals, Incrementality Lessons from BFCM and Amazon Brand Bidding
1:07:00
1:07:00
Play later
Play later
Lists
Like
Liked
1:07:00This week, the team breaks down what recent platform moves signal for operators heading into 2026 — starting with Shopify’s Winter Editions and the growing role of Sidekick inside the Shopify ecosystem. They discuss how tools like Sidekick are democratizing data access, reducing operational friction, and changing how lean growth teams analyze perfo…
…
continue reading
A manufacturer gets hit with ransomware. A hospital too. Learn how Threatlocker stops these types of attacks. This episode is brought to you by Threatlocker. Sponsors This episode is sponsored by ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allo…
…
continue reading
1
CCT 308: Scripted Sparrow BEC and CISSP Incident Response - Domain 7.6
46:54
46:54
Play later
Play later
Lists
Like
Liked
46:54Send us a text A single convincing email can move real money. We break down how Scripted Sparrow and other BEC crews spoof reply chains, impersonate trusted service providers, and slip under approval thresholds to nudge finance teams into wiring funds. The threat isn’t flashy malware; it’s pressure, process gaps, and the illusion of internal approv…
…
continue reading
1
The PornHub Data Exposure: What Was Leaked, Who’s at Risk, and Why It Matters Now
7:49
7:49
Play later
Play later
Lists
Like
Liked
7:49A major data exposure tied to PornHub has raised serious questions about privacy, trust, and how personal information can surface in ways users never expect. In this episode of Darnley’s Cyber Café, we break down what happened, why it matters beyond adult websites, and what this incident reveals about data handling in the modern internet economy. I…
…
continue reading
1
Unsecurity Episode 253: The Human Element of Cybersecurity with Kyle Waters
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10Kyle “caboose” Waters of Cyber Unicorns enlightens this extended episode! Having a combined passion for people and security, Kyle demonstrates how to effectively educate the masses. Steering away from typical training and using unique approaches, this talk explores how to break through the barriers that create vulnerabilities. Like, subscribe, and …
…
continue reading
1
CCT 307: Practice CISSP Questions - Security Policies and Procedures
20:17
20:17
Play later
Play later
Lists
Like
Liked
20:17Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Headlines say the talent shortage is easing, yet nearly half of UK busine…
…
continue reading
1
When AI Learns to Hack: OpenAI’s Warning and the Future of Cybersecurity
14:18
14:18
Play later
Play later
Lists
Like
Liked
14:18Artificial intelligence is evolving fast and even the people building it are raising red flags. In this episode of Darnley’s Cyber Café, we unpack OpenAI’s recent warning that upcoming AI models could pose high cybersecurity risks, including the potential to assist in zero-day exploits and advanced intrusion operations. We explore what this really …
…
continue reading
1
Monkey Business - Robin Dunbar, Dave Gorman and Jo Setchell
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30In perhaps the monkiest Infinite Monkey Cage episode there’s ever been, Brian Cox and Robin Ince attempt to uncover the secrets of love, lust and friendship in primates. Swinging by to offer a hand (or tail) are evolutionary psychologist Robin Dunbar, anthropologist Jo Setchell, and comedian Dave Gorman. Together the panel explores Dunbar’s number …
…
continue reading
Looking ahead to 2026 trends and challenges in the MSP (Managed Service Provider) space, focusing on AI, automation, security, risk management, and social engineering. In a conversation with Josh Hohbein of Centrex IT, we discussed the key challenges and opportunities as we enter 2026.
…
continue reading
1
Zohar Einy Founder Port.io: Building a $800M Company with Belief and Discipline
1:07:29
1:07:29
Play later
Play later
Lists
Like
Liked
1:07:29In this deeply personal and wide-ranging conversation, Zohar Einy, Founder & CEO of Port.io, shares the real story behind building one of the fastest-growing developer platforms in the world. Zohar opens up about raising a $100M Series C at an $800M valuation, one week before his wedding, how partnership (both personal and professional) became an a…
…
continue reading
1
What Grüns, Marty Supreme, and TikTok Shop Teach Us About Modern Marketing
59:49
59:49
Play later
Play later
Lists
Like
Liked
59:49This episode is a grab-bag of highly tactical operator insights - starting with a breakdown of why Grüns’ transactional SMS and subscription flows work so well, and what smart lifecycle design looks like when you’re trying to prevent churn, drive upgrades, and increase LTV. From there, we dive into one of the most impressive brand marketing plays o…
…
continue reading
1
CCT 306: CISSP Domain 1.5: Understanding Legal, Regulatory, and Compliance Requirements
51:31
51:31
Play later
Play later
Lists
Like
Liked
51:31Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv What happens when cybersecurity meets the engine room of the business? We…
…
continue reading
1
#133 - Build the Learning Machine: AI Adoption, Flow Metrics, and the Future of the CTO Role with Eric Bowman
57:00
57:00
Play later
Play later
Lists
Like
Liked
57:00From “dangerously skip permissions” to the Andon cord: voluntary adoption, flow metrics, and how agents change what CTOs optimize for PartnerTradegate Direct: Europe’s most direct online broker – trade for free, efficiently, and directly on the stock exchange. Trade directly here TOPdesk: Discover the future of internal IT in the DACH region with t…
…
continue reading
This time of Year is special for so many reasons… Through the lens of a business owner, though, this time of year hones in on the customer experience… as a business owner, Customer Service is something that you probably think about year-round… not just during the holidays… But we're going to take a moment to share a few tips to either up your game …
…
continue reading
1
The Path Toward AGI and Its Impact on CMMC and GRC Platforms
4:16
4:16
Play later
Play later
Lists
Like
Liked
4:16Thank you for visiting our podcasts on CMMC Cybersecurity! Explore more insights, updates, and expert discussions on our blog: https://cybercomply.us/blog-list Luis G. Batista C.P.M., CPSM Founder & CEO, Armada Cyber Defense | CyberComply [email protected] Office: (305) 306-1800 Ext. 800 CAGE: 9QG33 UEI: K6UZHLE1WUA7 Schedule Introduction: https:…
…
continue reading
1
CCT 305: Practice CISSP Questions - Chrome Zero Days And Domain Eight Deep Dive
19:56
19:56
Play later
Play later
Lists
Like
Liked
19:56Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Headlines about eight Chrome zero days aren’t just noise—they’re a prompt…
…
continue reading
1
A Conversation With Asia Kuykendall
1:11:35
1:11:35
Play later
Play later
Lists
Like
Liked
1:11:35What happens when healthcare, capitalism, and personal empowerment collide? In this surprising conversation, Steve Ordower and Asia Kuykendall expose the system-level incentives that shape everyday life—from corporate personhood and profit-driven healthcare, to how our money habits quietly shape our identity, values, and health. Asia introduces the…
…
continue reading
1
Holiday Hackers: Why Cybercrime Spikes in December, And How to Stay Safe
13:23
13:23
Play later
Play later
Lists
Like
Liked
13:23Cybercrime doesn’t take holidays off. December is one of the busiest months for hackers. In this festive special of Darnley’s Cyber Café, we dig into why cyberattacks surge during the holidays, how scammers exploit online shopping hype, and why distracted employees and understaffed IT teams make the perfect storm for breaches. We also unpack the ps…
…
continue reading
1
Head in the Clouds - Owain Wyn Evans, Gavin Pretor-Pinney, Amanda Maycock
42:24
42:24
Play later
Play later
Lists
Like
Liked
42:24Robin Ince and Brian Cox look up to the heavens as they try to ‘de-mistify’ the foggy science of clouds. They’re joined by Cloud Appreciation Society founder Gavin Pretor-Pinney, climate scientist Amanda Maycock, and former weather presenter and drummer Owain Wyn Evans, for a whirlwind tour of our too often-overlooked aerial realm. The panel explor…
…
continue reading
1
Burnout in Cybersecurity: Preparing Cyber Staff for the Reality, Not Just the Role
1:07:34
1:07:34
Play later
Play later
Lists
Like
Liked
1:07:34Is burnout in cybersecurity inevitable, or are we finally learning how to prevent it? Welcome to Razorwire. In this episode, I sit down with clinical traumatologist Eve Parmiter and occupational psychologist Bec McKeown to talk about what's really happening in high pressure cyber roles. This isn't about vague wellness advice or corporate tick-box e…
…
continue reading
Predictions for the Managed Service Provider (MSP) cybersecurity landscape in 2026, with a focus on risk management, the continued importance of basic cyber hygiene, open-source adoption, and the strategic use of risk registers. Did I say Risk Register? Dom Kirby brings it home: the importance of the Risk Register and its role as we enter 2026. He …
…
continue reading
1
How Early-Stage Startups Win Funding: Insights from VC Matt Gittleman
37:46
37:46
Play later
Play later
Lists
Like
Liked
37:46Send us a text In this episode of Secure Insights, we sit down with Matt Gittleman Investment Director of JHH VC an early-stage, family-run venture capital firm that has been backing founders for more than 30 years. Investing from £25k to £250k across pre-seed, seed, and Series A, JHH VC now supports over 145 active portfolio companies. Matt shares…
…
continue reading
1
Tech Journeys & Future Frontiers: A Wise Women in Tech Roundtable
36:49
36:49
Play later
Play later
Lists
Like
Liked
36:49Join us as we delve into the inspiring journeys of women in tech with Wise. From their unique introductions to the tech world to personal stories of triumph and challenge, discover how their technical roots shape pivotal product and team decisions today. Explore the industry's current landscape and future outlook as these trailblazers adapt to emer…
…
continue reading
1
Brian Lockard: Making $1.5M in 7 Days Launching His Shoe Brand - The Shopify Growth Show (#22)
37:43
37:43
Play later
Play later
Lists
Like
Liked
37:43Imagine launching a brand and making a million in sales in just a week. In today’s episode, you’ll hear from Brian Lockard, who launched a brand that aims to bring nurses shoes that make them feel like the respected professionals they are. Listen to the episode to hear what Brian has to say about founding BALA shoes: why he decided to market to nur…
…
continue reading
1
Black Friday Cyber Monday Recap & The Forecasting Process Behind Ecom Profit - with Richie Mashiko
1:24:48
1:24:48
Play later
Play later
Lists
Like
Liked
1:24:48This week, we’re joined by Richie Mashiko - Head of Beacon at Iris Finance for a full breakdown of how BFCM played out across their businesses. Together, the group recaps what actually drove performance this year, from media-mix diversification and top-of-funnel investment to traffic dynamics, conversion-rate behavior, and how different brand sizes…
…
continue reading
1
The Truth About Identity Risk and What Companies Are Missing
33:58
33:58
Play later
Play later
Lists
Like
Liked
33:58Send us a text In this episode of Secure Insights, we speak with Ian Forrest, VP of Solutions Architecture and Sales Engineering at Andromeda Security, and Ashish Shah, Andromeda Security’s Co-Founder. They unpack why identity has become the new security perimeter, the challenges organisations face with growing permission sprawl, and why manual pro…
…
continue reading
1
CCT 304: Software Development Security (CISSP Domain 8)
45:29
45:29
Play later
Play later
Lists
Like
Liked
45:29Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A single malicious insider flipped Disney menus to Wingdings and tampered…
…
continue reading
1
The Psychology of Ignoring Cybersecurity: Why We Think It Won’t Happen to Us
10:30
10:30
Play later
Play later
Lists
Like
Liked
10:30Why do people ignore cybersecurity until it’s too late? In this episode of Darnley’s Cyber Café, we dive into the psychology behind cyber neglect, the illusion of “it won’t happen to me,” and why privacy still matters in a world where everything feels exposed. Using real data and relatable examples (including one about bathroom stalls…), we break d…
…
continue reading
1
💡 AI & Cyber Safety: Staying Grounded in a Digital World
3:30
3:30
Play later
Play later
Lists
Like
Liked
3:30💡 AI & Cyber Safety: Staying Grounded in a Digital World In 2019, I experienced a cybercrime that shook me to my core. It wasn’t just financial — it challenged my confidence, my trust, and my sense of safety online. Today, with AI creating content faster and more convincingly than ever, the digital world can feel overwhelming. Deepfakes, manipulate…
…
continue reading
1
💛 Rebounding & Rebalancing After a Cybercrime
3:21
3:21
Play later
Play later
Lists
Like
Liked
3:21💛 Rebounding & Rebalancing After a Cybercrime 3 Steps to Rebuilding Confidence in a Digital World Today, I’m sharing one of the most personal videos I’ve ever created. When I experienced a cybercrime in 2019, it didn’t just impact my finances — it shook my confidence, my identity, and my sense of safety. What I learned through that season is that h…
…
continue reading
1
Unsecurity Episode 252: Bridging the Gap Between CISO & CFO - Executive Panel
29:11
29:11
Play later
Play later
Lists
Like
Liked
29:11A live panel from Hacks & Hops featuring FRSecure's CFO, Vanae Pearson, Information Security Consultant, Greg Cloon, and Director of IT at Miner's Inc., Tyree Johnson. Veterans in the field discuss consulting, translating security needs to executive teams, and advocating for the best budget practices. Like, subscribe, and share with your network to…
…
continue reading
1
Why Context Is the Missing Piece in Cybersecurity (Ft. Tonic Security CEO)
36:55
36:55
Play later
Play later
Lists
Like
Liked
36:55Send us a text Today we’re joined by Sharon Isaaci, Co-founder and CEO of Tonic Security. With over 25 years of cybersecurity, intelligence, and operational leadership Sharon brings deep experience from both boardrooms and high-pressure environments. His vision for Tonic was shaped by years as a CISO and consultant to Fortune 500 companies, where h…
…
continue reading