show episodes
 
Artwork

51
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
Artwork

1
Cyber Journeys

Dr Jason Edwards

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Cybersecurity is more than tools and threats — it’s the people who choose this path, and I’d love to hear how you found yours. Suppose you’re a student, early-career professional, veteran, career changer, or seasoned practitioner. In that case, you’re invited to share your story for a short, relaxed conversation that will be featured across Bare Metal Cyber channels. Use the form below to tell me a bit about your background, where you are in your journey, and what you’d like to talk about, a ...
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Artwork

1
MSP 1337

Chris Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference.
  continue reading
 
This is a podcast about my journey into information security it will be full of things that I've learned over the years and also things that I have researched and find interesting and want to present to you the audience.
  continue reading
 
Artwork
 
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
  continue reading
 
Artwork

1
Founder Storiez

ephraim yarmak

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The purpose of "FounderStoriez Channel" is to interview Entrepreneurs from around the world to share their story, experience, and wisdom with you so you can learn from them and be inspired.
  continue reading
 
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
  continue reading
 
Artwork

1
2 Cyber Chicks

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
  continue reading
 
Artwork

1
CMMC Academy

Armada Cyber Defense LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
  continue reading
 
Artwork

1
Cyber Security Interviews

Douglas A. Brush | Weekly Interviews w/ InfoSec Pros

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
  continue reading
 
Artwork

1
Cyber Trek

Mati Kos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Junior Dev's log - personal journey to become Junior Software Developer... and maybe beyond. Weekly entries to a journal of a guy in Manchester England set on a long voyage to a coding job. Let's see where it takes us. ...Cyber space, the final frontier.
  continue reading
 
Artwork

1
CyBytes

Nik Mohanlal

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
CyBytes is a podcast that features bite-sized conversations with tech and cybersecurity pros - sharing insights, stories, and actionable advice to help you navigate and thrive in the industry
  continue reading
 
Artwork

1
Rhythm of Life

Rhythm & Light

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Chicago, IL - Where conversation flows...and life is explored -- that’s where the new podcast, Rhythm of Life, begins. Initial episodes include a fascinating conversation Steve Ordower has with filmmaker, Bob Hercules about his illustrious career, including his most recent Peabody Award winning documentary, Maya Angelou: And Still I Rise. They touch on the power of forgiveness in this project as well as in another potent film Hercules directed, Forgiving Dr. Mengele. We also hear from the ac ...
  continue reading
 
Artwork

1
Cybersafe with AJ

Allison Cutts (AJ)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In today's interconnected world, the lines between cybersecurity and safety are more crucial than ever. Join us on "Cyber Safety: The Life-Saving Distinction," where we delve into the critical differences that could protect your digital life and personal well-being. Hosted by cybersecurity enthusiast Allison Cutts (AJ), this podcast explores the nuances of staying secure in a fast-paced digital age. Each episode offers insightful discussions, expert interviews, and practical advice to help y ...
  continue reading
 
Artwork
 
The Cyber Consulting Room Podcast and Meetup Network is your gateway to a world of knowledge and collaboration in the ever-evolving realm of cyber security and consulting. Our podcast, hosted by Gordon Draper, brings you in-depth interviews with industry leaders, experts, and trailblazers, offering invaluable insights, strategies, and experiences. From award-winning professionals to those paving the way for diversity in the field, we delve into the most pressing issues and emerging trends. B ...
  continue reading
 
In a rapidly evolving world, it’s never been more important to remember the human side of technology. Amplify is a new podcast from Six Degrees. Each episode we’ll explore the latest developments in cloud computing, cyber security and diversity, speaking to authentic voices who will offer their insights and provide practical take home advice that you can apply in both your personal and work lives.
  continue reading
 
Artwork

1
Security Happy Hour

The Cyber Warrior

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Security Happy Hour, where we interview new and established members of the cybersecurity community. In this show we cover where guests have come from and where they want to go, as well as current events and other security related items.
  continue reading
 
A is for Artificial Intelligence, B is for Blockchain, C is for Cyber Security. Follow our journey through an alphabet of technology trends with PwC's technologists and special guests.
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Artwork

1
South West Cyber Beat

South West Cyber Resilience Centre

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We are a Police led not for profit company. We offer simple, free and easily understood cyber security guidance for small and medium sized businesses. Remember it doesnt have to be complicated or expensive to give your business the cyber protection and peace of mind that you need. All this from industry experts who partner with us in the cyber security arena.
  continue reading
 
Artwork

1
Likutei Moharan

Moshe Rubin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Come join us on our journey!!! ... working towards an accessible and meaningful glimpse into the universe of Likutei Moharan with a group of growth-oriented people; Also available at: http://www.jewishheritagefoundation.org/audio_shiurim.html Please feel free to reach out from cyber space: [email protected] and let me know how you are enjoying the shiurim, or just to say hello. Would love to hear from you!!!
  continue reading
 
Artwork

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
  continue reading
 
Artwork

1
Cybercrimeology

Cybercrimeology

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cybercrimeology is a podcast about cybercrime, its research and its researchers. We talk to top researchers from around the world to learn about different forms of cybercrime and their research. We learn about cybercrime theory, organized crime online, Darknet drug markets, cybercrime awareness and crime prevention, technology-facilitated intimate partner violence and much more. The podcast has been running since November of 2019 and there is still so much to learn. I am happy to have you al ...
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Artwork

1
The Cyber Hub

Techie Pedias

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Dipanshu Parashar is a Blogger || influencer || Author || digital marketer. He brings out the best tech stories and shares the difficult moments which made his journey a huge success. He is currently India's youngest Cybersecurity author and security analyst.
  continue reading
 
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
  continue reading
 
SheCanCode’s ‘Spilling the T’ podcast offers conversations with top female voices in the tech sector, as we plunge into the latest topics that have captured our imagination recently. Learn about a range of tech disciplines and how to establish a career in them - from coding, AI, cyber, starting a business, career transitions and even diversity in space, we lay it out bare and Spill the T on everything you need to know.
  continue reading
 
Artwork

1
AWS CLOUD the Basics

Natina Michelle

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Vibing in the Cloud with Natina Michelle on Cloud Sesh Podcast. If you’re looking to transition your career into IT, Cyber, or Cloud Computing start your journey here! Our main focus is AWS Cloud for beginners. Learn, Study, & Build with us. If you are new to AWS or to IT in general this is the podcast for you.
  continue reading
 
Professor Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists’ eyes. Joined by a panel of scientists, experts and celebrity science enthusiasts they investigate life, the universe and everything in between on The Infinite Monkey Cage from the BBC. From the smallest building blocks of life to the furthest stars, the curious monkeys pull apart the latest science to reveal fascinating and often bizarre insights into the world around us and what lies beyond. Ca ...
  continue reading
 
Making Freedom Ring In Cyber” podcast is a powerful forum focusing on cyber security awareness, and the intersection of technology, justice, and civil liberties. Listeners are invited to embark on a journey towards understanding their rights and the resources available for their protection. With each episode, Dr. Sewell aims to ignite conversations that elevate the importance of justice and civil liberty preservation in the digital age. Tune in to make your voice heard and join this vital di ...
  continue reading
 
Artwork

1
Cybersecurity

Senthilvel Kumar

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
YASH cyber security solutions are helping global corporations address a plethora of cyber risks proactively and reactively. We help our customers to grow their business securely, we understand your world.
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Artwork

4
TechSurge: Deep Tech Podcast

Celesta Capital | Deep Tech Venture Capital Firm

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, geopolitics, and business, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Send feedback and show ideas to [email protected]. Each discussion delves into the intersection of technology advancement, market dynamics, and the founder journey, offering insigh ...
  continue reading
 
Artwork

1
alphalist.CTO Podcast - For CTOs and Technical Leaders

Tobias Schlottke - alphalist CTO Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This podcast features interviews of CTOs and other technical leadership figures and topics range from technology (AI, blockchain, cyber, DevOps, Web Architecture, etc.) to management (e.g. scaling, structuring teams, mentoring, technical recruiting, product etc.). Guests from leading tech companies share their best practices and knowledge. The goal is to support other CTOs on their journey through tech and engineering, inspire and allow a sneak-peek into other successful companies to underst ...
  continue reading
 
Artwork

1
ThreatCast

Threatscape

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
  continue reading
 
Emerge is business industry-focused. We are a resource for all stages of businesses; from start-up business owners to CEOs. We provide solutions and advice through our articles on how to prepare a business, start a business, grow your business, and be a leader. A weekly show about entrepreneurship, business, and the lifestyle we live. Tune in as hosts Tiffany Boyle, DaShana Kemp-Garnett, and Dorthya Shuler interview entrepreneurs from around the world to learn about their businesses, entrepr ...
  continue reading
 
Artwork

1
EUAudio

EU Automation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
EUAudio provides automation professionals with a seamless way to listen in on the biggest manufacturing trends, anytime, anywhere. Covering the industry’s most relevant topics from environmental issues to predictive maintenance, cyber security to supply chain management, each series is carefully curated allowing listeners to develop their knowledge and skill set along the way. Your journey to becoming an automation expert starts here.
  continue reading
 
Artwork
 
What would you do if you were starting today? To help, here are half-baked startup ideas, growth marketing tactics, and stories from founders and creators - including my own journey as a bootstrapped business owner. All of the content is centered around helping founders, creators, and investors starting today.
  continue reading
 
Loading …
show series
 
Breaking into Cybersecurity: Brian Carbaugh's Journey from CIA to Cyber StartupIn this episode of Breaking into Cybersecurity, Brian Carbaugh shares his extensive journey from serving in the Marines and the CIA to becoming a leader in the cybersecurity industry. Brian talks about his career evolution, the challenges he faced, and the valuable lesso…
  continue reading
 
Send us a text Ready to turn CISSP Domain 3.5 into practical moves you can deploy on Monday? We unpack how real SOC teams apply microsegmentation, identity-aware controls, and targeted inspection to crush lateral movement without dragging performance. Along the way, we demystify AI’s role: where detection engineering benefits from crisp use cases, …
  continue reading
 
Notes: Julia Prümmer describes her transition from legal psychology into cybersecurity research and how psychological methods shape her approach to cybersecurity training. The discussion explores the role of systematic reviews in mapping what a research field actually knows, rather than relying on highly visible or frequently cited studies. Finding…
  continue reading
 
Predictions and challenges in the technology and cybersecurity space for 2026, with a focus on Microsoft ecosystem changes, licensing, security, and the impact of AI and Copilot. I had a chance to catch up with Shay Cohen of Optimize365.io this week, and I think you will find his insights on the future of CoPilot and other unique changes we can exp…
  continue reading
 
This week, we’re joined by Lily Comba, Founder & CEO of Superbloom, who opens up about how she got her start in influencer marketing and why she approaches influencer through a performance lens. Lily shares her journey from building in-house programs to launching Superbloom, and what she learned scaling influencer across some of the most recognizab…
  continue reading
 
A slow-rolling holiday episode featuring CISO at DataSite, Ted Peterson! Transitioning from a Director Role, Ted shares his journey to the CISO title and how his unique background informs his work approach. Tune in for insights on: Realities to navigating organizational leadership as a CISO Importance of diverse perspectives and backgrounds in the …
  continue reading
 
Send us a text A neighboring Wi‑Fi, a handful of stolen credentials, and a quiet leap into a high‑value network—the kind of pivot that sounds cinematic until you realize how practical it is. We unpack that playbook and turn it into concrete defenses you can deploy across your environment, from client endpoints and browsers to databases, servers, an…
  continue reading
 
In this episode, we sit down with Ori Barzilay, Partner at Team8, to explore what truly drives exceptional founders and investors. Ori shares his journey from elite military service and competitive sports to becoming one of the youngest partners at a tier-1 venture firm. We discuss winning mentality, humility, intuition in investing, founder-team d…
  continue reading
 
In this journey from Darnley’s Cyber Café, we explore the chilling aftermath of one of the most talked-about data breaches in modern history: the LastPass incident. But this isn’t just a story about what happened. It’s about what never stopped. From crypto wallets vanishing in silence to digital vaults bleeding secrets over years, this slow-burn na…
  continue reading
 
Send us a text One unauthenticated request should not be all it takes to compromise your app—but with React-To-Shell, that’s the reality many teams are facing. We unpack what this vulnerability hits across React server components and Next.js app router setups, why default configs can be enough to fall, and how active threat actors are already abusi…
  continue reading
 
A massive, unsecured database exposed billions of professional records such as names, emails, job roles, work history, and more...now quietly sitting open on the internet. In this episode of Darnley’s Cyber Café, we unpack how a leak this size changes the game for phishing, social engineering, and AI-powered scams, why professionals are now prime t…
  continue reading
 
In this Christmas episode of The Infinite Monkey Cage, Brian Cox and Robin Ince head to the North Pole to explore the dazzling science behind the northern lights, the extreme adaptations that help animals - and even Santa Claus - survive the Arctic cold, and how the Earth’s magnetic field might just guide him home. Joining the monkeys are comedian …
  continue reading
 
What happens when you gather some of the sharpest minds in cybersecurity for an end-of-year chat about where we've been and where we're heading? Welcome to Razorwire's Christmas special. Today I’m chatting with some of our favourite guests from 2025: clinical traumatologist Eve Parmiter, cyber futurist Oliver Rochford, CISO and podcast host Marius …
  continue reading
 
In 2026, AI will increasingly integrate into business processes, emphasizing strong data quality and security as prerequisites for success. AI agents, distinct from chatbots, will operate with machine identities to automate tasks while supporting, rather than replacing, human decision-making. This is just a glimpse of the insights Ben Wilcox of Pro…
  continue reading
 
This week, the team breaks down what recent platform moves signal for operators heading into 2026 — starting with Shopify’s Winter Editions and the growing role of Sidekick inside the Shopify ecosystem. They discuss how tools like Sidekick are democratizing data access, reducing operational friction, and changing how lean growth teams analyze perfo…
  continue reading
 
A manufacturer gets hit with ransomware. A hospital too. Learn how Threatlocker stops these types of attacks. This episode is brought to you by Threatlocker. Sponsors This episode is sponsored by ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allo…
  continue reading
 
Send us a text A single convincing email can move real money. We break down how Scripted Sparrow and other BEC crews spoof reply chains, impersonate trusted service providers, and slip under approval thresholds to nudge finance teams into wiring funds. The threat isn’t flashy malware; it’s pressure, process gaps, and the illusion of internal approv…
  continue reading
 
A major data exposure tied to PornHub has raised serious questions about privacy, trust, and how personal information can surface in ways users never expect. In this episode of Darnley’s Cyber Café, we break down what happened, why it matters beyond adult websites, and what this incident reveals about data handling in the modern internet economy. I…
  continue reading
 
Kyle “caboose” Waters of Cyber Unicorns enlightens this extended episode! Having a combined passion for people and security, Kyle demonstrates how to effectively educate the masses. Steering away from typical training and using unique approaches, this talk explores how to break through the barriers that create vulnerabilities. Like, subscribe, and …
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Headlines say the talent shortage is easing, yet nearly half of UK busine…
  continue reading
 
Artificial intelligence is evolving fast and even the people building it are raising red flags. In this episode of Darnley’s Cyber Café, we unpack OpenAI’s recent warning that upcoming AI models could pose high cybersecurity risks, including the potential to assist in zero-day exploits and advanced intrusion operations. We explore what this really …
  continue reading
 
In perhaps the monkiest Infinite Monkey Cage episode there’s ever been, Brian Cox and Robin Ince attempt to uncover the secrets of love, lust and friendship in primates. Swinging by to offer a hand (or tail) are evolutionary psychologist Robin Dunbar, anthropologist Jo Setchell, and comedian Dave Gorman. Together the panel explores Dunbar’s number …
  continue reading
 
In this deeply personal and wide-ranging conversation, Zohar Einy, Founder & CEO of Port.io, shares the real story behind building one of the fastest-growing developer platforms in the world. Zohar opens up about raising a $100M Series C at an $800M valuation, one week before his wedding, how partnership (both personal and professional) became an a…
  continue reading
 
This episode is a grab-bag of highly tactical operator insights - starting with a breakdown of why Grüns’ transactional SMS and subscription flows work so well, and what smart lifecycle design looks like when you’re trying to prevent churn, drive upgrades, and increase LTV. From there, we dive into one of the most impressive brand marketing plays o…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv What happens when cybersecurity meets the engine room of the business? We…
  continue reading
 
From “dangerously skip permissions” to the Andon cord: voluntary adoption, flow metrics, and how agents change what CTOs optimize for PartnerTradegate Direct: Europe’s most direct online broker – trade for free, efficiently, and directly on the stock exchange. Trade directly here TOPdesk: Discover the future of internal IT in the DACH region with t…
  continue reading
 
This time of Year is special for so many reasons… Through the lens of a business owner, though, this time of year hones in on the customer experience… as a business owner, Customer Service is something that you probably think about year-round… not just during the holidays… But we're going to take a moment to share a few tips to either up your game …
  continue reading
 
Thank you for visiting our podcasts on CMMC Cybersecurity! Explore more insights, updates, and expert discussions on our blog: https://cybercomply.us/blog-list Luis G. Batista C.P.M., CPSM Founder & CEO, Armada Cyber Defense | CyberComply [email protected] Office: (305) 306-1800 Ext. 800 CAGE: 9QG33 UEI: K6UZHLE1WUA7 Schedule Introduction: https:…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Headlines about eight Chrome zero days aren’t just noise—they’re a prompt…
  continue reading
 
What happens when healthcare, capitalism, and personal empowerment collide? In this surprising conversation, Steve Ordower and Asia Kuykendall expose the system-level incentives that shape everyday life—from corporate personhood and profit-driven healthcare, to how our money habits quietly shape our identity, values, and health. Asia introduces the…
  continue reading
 
Cybercrime doesn’t take holidays off. December is one of the busiest months for hackers. In this festive special of Darnley’s Cyber Café, we dig into why cyberattacks surge during the holidays, how scammers exploit online shopping hype, and why distracted employees and understaffed IT teams make the perfect storm for breaches. We also unpack the ps…
  continue reading
 
Robin Ince and Brian Cox look up to the heavens as they try to ‘de-mistify’ the foggy science of clouds. They’re joined by Cloud Appreciation Society founder Gavin Pretor-Pinney, climate scientist Amanda Maycock, and former weather presenter and drummer Owain Wyn Evans, for a whirlwind tour of our too often-overlooked aerial realm. The panel explor…
  continue reading
 
Is burnout in cybersecurity inevitable, or are we finally learning how to prevent it? Welcome to Razorwire. In this episode, I sit down with clinical traumatologist Eve Parmiter and occupational psychologist Bec McKeown to talk about what's really happening in high pressure cyber roles. This isn't about vague wellness advice or corporate tick-box e…
  continue reading
 
Predictions for the Managed Service Provider (MSP) cybersecurity landscape in 2026, with a focus on risk management, the continued importance of basic cyber hygiene, open-source adoption, and the strategic use of risk registers. Did I say Risk Register? Dom Kirby brings it home: the importance of the Risk Register and its role as we enter 2026. He …
  continue reading
 
Send us a text In this episode of Secure Insights, we sit down with Matt Gittleman Investment Director of JHH VC an early-stage, family-run venture capital firm that has been backing founders for more than 30 years. Investing from £25k to £250k across pre-seed, seed, and Series A, JHH VC now supports over 145 active portfolio companies. Matt shares…
  continue reading
 
Join us as we delve into the inspiring journeys of women in tech with Wise. From their unique introductions to the tech world to personal stories of triumph and challenge, discover how their technical roots shape pivotal product and team decisions today. Explore the industry's current landscape and future outlook as these trailblazers adapt to emer…
  continue reading
 
Imagine launching a brand and making a million in sales in just a week. In today’s episode, you’ll hear from Brian Lockard, who launched a brand that aims to bring nurses shoes that make them feel like the respected professionals they are. Listen to the episode to hear what Brian has to say about founding BALA shoes: why he decided to market to nur…
  continue reading
 
This week, we’re joined by Richie Mashiko - Head of Beacon at Iris Finance for a full breakdown of how BFCM played out across their businesses. Together, the group recaps what actually drove performance this year, from media-mix diversification and top-of-funnel investment to traffic dynamics, conversion-rate behavior, and how different brand sizes…
  continue reading
 
Send us a text In this episode of Secure Insights, we speak with Ian Forrest, VP of Solutions Architecture and Sales Engineering at Andromeda Security, and Ashish Shah, Andromeda Security’s Co-Founder. They unpack why identity has become the new security perimeter, the challenges organisations face with growing permission sprawl, and why manual pro…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A single malicious insider flipped Disney menus to Wingdings and tampered…
  continue reading
 
Why do people ignore cybersecurity until it’s too late? In this episode of Darnley’s Cyber Café, we dive into the psychology behind cyber neglect, the illusion of “it won’t happen to me,” and why privacy still matters in a world where everything feels exposed. Using real data and relatable examples (including one about bathroom stalls…), we break d…
  continue reading
 
💡 AI & Cyber Safety: Staying Grounded in a Digital World In 2019, I experienced a cybercrime that shook me to my core. It wasn’t just financial — it challenged my confidence, my trust, and my sense of safety online. Today, with AI creating content faster and more convincingly than ever, the digital world can feel overwhelming. Deepfakes, manipulate…
  continue reading
 
💛 Rebounding & Rebalancing After a Cybercrime 3 Steps to Rebuilding Confidence in a Digital World Today, I’m sharing one of the most personal videos I’ve ever created. When I experienced a cybercrime in 2019, it didn’t just impact my finances — it shook my confidence, my identity, and my sense of safety. What I learned through that season is that h…
  continue reading
 
A live panel from Hacks & Hops featuring FRSecure's CFO, Vanae Pearson, Information Security Consultant, Greg Cloon, and Director of IT at Miner's Inc., Tyree Johnson. Veterans in the field discuss consulting, translating security needs to executive teams, and advocating for the best budget practices. Like, subscribe, and share with your network to…
  continue reading
 
Send us a text Today we’re joined by Sharon Isaaci, Co-founder and CEO of Tonic Security. With over 25 years of cybersecurity, intelligence, and operational leadership Sharon brings deep experience from both boardrooms and high-pressure environments. His vision for Tonic was shaped by years as a CISO and consultant to Fortune 500 companies, where h…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play