show episodes
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork
 
Get the edge with Hidden Forces where media entrepreneur and financial analyst Demetri Kofinas gives you access to the people and ideas that matter, so you can build financial security and always stay ahead of the curve.
  continue reading
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
“Pod Save America” cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obama’s National Security Council. On “Pod Save the World,” he and former deputy national security adviser Ben Rhodes break down the latest global developments and bring you behind the scenes with the people who were there. New episodes every Wednesday. To get access to extended ad-free Pod Save The World episodes, sign up to be a Friends of ...
  continue reading
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
  continue reading
 
Artwork

1
Cloud Security Podcast

Cloud Security Podcast Team

Unsubscribe
Unsubscribe
Weekly
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
Security Masterminds

Security Masterminds

Unsubscribe
Unsubscribe
Monthly
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
Artwork

1
Adam Carolla Show

PodcastOne / Carolla Digital

Unsubscribe
Unsubscribe
Daily
 
Welcome to the new home for Adam's rantings and ravings. This is the #1 Daily Downloaded Podcast in the World. GET IT ON as Adam shares his thoughts on current events, relationships, airport security, specialty pizzas, politics, and anything else he can complain about. Five days a week and completely uncensored, Adam welcomes a wide range of guests to join him in studio for in depth interviews and a front row seat to his unparalleled ranting. Let's not forget Bryan Bishop (Bald Bryan) on sou ...
  continue reading
 
Artwork
 
If you're looking for a bunch of us security nerds to get together and talk shop, then Paul’s Security Weekly is for you. This show features interviews with folks in the security community; technical segments, which are just that, very technical; and security news, which is an open discussion forum for the hosts to express their opinions about the latest security headlines, breaches, new exploits and vulnerabilities, “not” politics, “cyber” policies and more. The topics vary greatly and the ...
  continue reading
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

Unsubscribe
Unsubscribe
Monthly+
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
  continue reading
 
Artwork

1
SpyTalk

SpyTalk, Jeff Stein

Unsubscribe
Unsubscribe
Monthly+
 
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
  continue reading
 
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
  continue reading
 
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

Unsubscribe
Unsubscribe
Weekly+
 
If you're looking for a bunch of us security nerds to get together and talk shop, then Paul’s Security Weekly is for you. This show features interviews with folks in the security community; technical segments, which are just that, very technical; and security news, which is an open discussion forum for the hosts to express their opinions about the latest security headlines, breaches, new exploits and vulnerabilities, “not” politics, “cyber” policies and more. The topics vary greatly and the ...
  continue reading
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Artwork

1
Berlin Security Beat

David Backovsky, Centre for International Security at the Hertie School

Unsubscribe
Unsubscribe
Monthly
 
The Berlin Security Beat is an original podcast produced by the Centre for International Security at the Hertie School in Berlin. It delves into the intricate world of international security, examining its ties to research, academia, and various career paths, spanning areas from nuclear to cyber security. The show features interviews with top specialists in international security. The Berlin Security Beat is currently in its third season focusing on cyber security. The podcast is hosted and ...
  continue reading
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Listen to the latest happenings in Healthcare IT in this series of interviews with leading experts in healthcare technology. Whether you're trying to understand EMR and EHR, healthcare communications, security and privacy, analytics, telehealth and telemedicine, and much more, these interviews will dive into what's really happening on the front lines of healthcare. Learn more at: https://www.healthcareittoday.com
  continue reading
 
Artwork

1
In Good Company with Nicolai Tangen

Norges Bank Investment Management

Unsubscribe
Unsubscribe
Monthly+
 
The CEO of the largest single investor in the world, Norges Bank Investment Management, interviews leaders of some of the largest companies in the world. You will get to know the leader, their strategy, leadership principles, and much more. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Planet: Critical is the podcast for a world in crisis. We face severe climate, energy, economic and political breakdown. Journalist Rachel Donald interviews those confronting the crisis, revealing what's really going on—and what needs to be done. www.planetcritical.com
  continue reading
 
Buck Sexton breaks down the latest headlines with a fresh and honest perspective! He speaks truth to power, and cuts through the liberal nonsense coming from the mainstream media. Interact with Buck by emailing him at teambuck@iheartmedia.com
  continue reading
 
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler, and Sean Metcalf. If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been ...
  continue reading
 
Artwork

1
Business Breakdowns

Colossus | Investing & Business Podcasts

Unsubscribe
Unsubscribe
Weekly
 
Learn how companies work from the people who know them best. We do deep research and interview industry veterans, investment professionals, and corporate executives to explain the inner workings of public stocks and private businesses. For each company, we break down their history, business model, financial statements, secret sauce, and bull/bear case. We believe every business has lessons to teach us and Breakdowns is here to highlight them. Learn more and stay up to date at www.joincolossu ...
  continue reading
 
Loading …
show series
 
Associate Professor of Computer Information Systems at the University of Tulsa Sal Aurigemma shares how his interest in how things worked shaped his career path in nuclear power and computers, Being introduced to computers in high school and learning about the Chernobyl event led Sal to study nuclear engineering followed by time in the Navy as a su…
  continue reading
 
As Russia and North Korea's outcast autocrats put on a splashy show of mutual back-scratching, how will America’s next president challenge the anti-US axis? Biden and Trump insiders make their case. Then from the Amanpour Archive, the time The Star-Spangled Banner rang out in North Korea, in a bygone age for musical diplomacy. Also this hour, the d…
  continue reading
 
Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week. Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith's testimony and the lingering …
  continue reading
 
Germany and China: How Entanglement Undermines Freedom, Prosperity and Security (Bloomsbury, 2024) is a groundbreaking book, of which the findings have significant implications both for German-China relations and also in understanding the rising influence of autocratic China on liberal democracies globally. In today's interview, Associate Professor…
  continue reading
 
#1 ACS #829 (feat. Teresa Strasser, Chris Laxamana, Alison Rosen and Bryan Bishop) (2012)#2 ACS #991 (feat. Jim Jefferies, Alison Rosen and Bryan Bishop) (2013)#3 ACS #1031 (feat. Peter Mehlman, Alison Rosen and Bryan Bishop) (2013)#4 ACS #1156 (feat. Dwight Yoakam, David Wild, Alison Rosen and Bryan Bishop)#5 ACS #1329 (feat. Jo Koy, Bill Courtney…
  continue reading
 
Germany and China: How Entanglement Undermines Freedom, Prosperity and Security (Bloomsbury, 2024) is a groundbreaking book, of which the findings have significant implications both for German-China relations and also in understanding the rising influence of autocratic China on liberal democracies globally. In today's interview, Associate Professor…
  continue reading
 
Kerri Shafer-Page from Arctic Wolf joins us to discuss their work on "Lost in the Fog: A New Ransomware Threat." Starting in early May, Arctic Wolf's Incident Response team investigated Fog ransomware attacks on US education and recreation sectors, where attackers exploited compromised VPN credentials to access systems, disable Windows Defender, en…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
Buck Sexton is joined by David Harsanyi, senior editor at The Federalist, to delve into the contentious debate of democracy versus republic. They explore the implications of majoritarian views, the push to eliminate the Electoral College, and the importance of federalism and state rights. The discussion also touches on the Biden administration's pe…
  continue reading
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Biden bans Kaspersky over security concerns. Accenture says reports of them being breached are greatly exaggerated. SneakyChef targets diplomats in Africa, the Middle East, Europe and Asia. A serious firmware flaw affects Intel CPUs. More headaches for car dealerships relying on CDK Global. CISA Alerts Over 100,000 Individuals of Potential Data Bre…
  continue reading
 
Today, the US Supreme Court offered a boost to the Biden administration by backing a federal gun ban for domestic abusers. But all eyes are on some key decisions which are yet to be released. These include whether former President Trump is protected from prosecution for actions taken while he was president, whether the prosecution of January 6th ri…
  continue reading
 
In this episode of Cyber Safety, Scott Schober, author of "Hacked Again," talks to listeners about car security, including how to make sure your vehicle stays protected from cyber threats, and more. To learn more about https://ransomware and more about cybersecurity, visit us at https://cybersecurityventures.com…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityVivek Ramachandran is a security researcher, author, speaker/trainer, and serial entrepreneur with over two decades of experience in offensive cybersecurity. He is currently the founder of⁠ SquareX⁠, building a browser-native security product focused on detecting, mitigating, and threat-hunting web attacks. …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
  continue reading
 
Patricia Murphy is the Vice President, EMEA & LATAM Ecosystems, Strategic Alliances and Channel at Palo Alto Networks. In this episode, she joins host Heather Engel to discuss the evolution of the threat landscape in the age of AI, including how organizations can leverage Precision AI to solve complex issues, her perspective on copilots, and more. …
  continue reading
 
Jeffrey Wheatman is the SVP, Cyber Risk Evangelist at Black Kite. In this episode of Hidden Risk, he joins host Charlie Osborne to discuss the advantages of mitigating risk, as opposed to the widely-adopted practice of mitigating damage, including how companies can be proactive, first steps to take, and more. An award-winning intelligence platform,…
  continue reading
 
In early May, CNN reported that LinkedIn was adding a variety of games to its platform, aimed at making connections among users. In this episode, host Paul John Spaulding is joined by Kyle Haglund, Senior Audio Engineer at Cybercrime Magazine, Sam White, Video Producer at Cybercrime Magazine, Taylor Fox, Media Coordinator at Cybercrime Magazine, an…
  continue reading
 
Is capitalism broken? A growing number of Americans think so amid declining social mobility and rising inequality. According to investor Ruchir Sharma, author of What Went Wrong With Capitalism, the United States has gone on a decades-long debt binge, with too many regulations and a culture of bailouts, which he says has weakened dynamism in the ec…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
Cassie Crossley, author of the book “Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware,” is the VP, Supply Chain Security, Cybersecurity & Product Security Office at Schneider Electric. In this episode, she joins host Steve Morgan to discuss what CISOs and security teams should look for when b…
  continue reading
 
According to Rich Eels, VP of Innovation & Integration at United Digestive, the company is committed to continuous improvement. This trait works well with eClinicalWorks in the cloud, given the ability of a cloud service to introduce new features quickly. Running on Microsoft Azure also provides access to many resources and features.United Digestiv…
  continue reading
 
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
  continue reading
 
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
  continue reading
 
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
  continue reading
 
Vivek Ramachandran is a security researcher, author, speaker/trainer, and serial entrepreneur with over two decades of experience in offensive cybersecurity. He is currently the founder of SquareX, building a browser-native security product focused on detecting, mitigating, and threat-hunting web attacks. Prior to that, he was the founder of Pentes…
  continue reading
 
Buck Sexton is joined by Josh Hammer, senior counsel at the Article III Project and host of "America on Trial with Josh Hammer." They delve into imminent Supreme Court decisions, focusing on the Trump immunity issue and its potential outcomes. Josh explains the expected Solomonic split that may balance presidential duties and criminal liability. Th…
  continue reading
 
Oritse J. Uku is the Business Information Security Officer (BISO) and IT Governance Risk and Compliance at Northwestern Mutual. In this episode, he joins Oz Alashe, founder and CEO at CybSafe, and host Heather Engel to discuss security awareness training and human risk management, particularly phishing simulation and what it can do for organization…
  continue reading
 
Over 15,000 car dealerships hit the brakes after a software supplier cyber incident. The EU’s Chat Control gets put on hold. A hacker leaks contact details of over 33,000 Accenture employees. A major forklift manufacturer shuts down operations in the wake of a ransomware attack. IntelBroker claims to have leaked source code from Apple. An investiga…
  continue reading
 
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
  continue reading
 
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
  continue reading
 
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
  continue reading
 
Israel’s military appears to be countering Prime Minister Benjamin Netanyahu's goals for the war in Gaza. In an interview, IDF spokesman Rear Admiral Daniel Hagari acknowledged what many observers have been arguing for months, saying, “Hamas is an idea. Those who think we can make Hamas disappear are wrong.” Israeli Doctor Yuval Bitton agrees; he p…
  continue reading
 
Loading …

Quick Reference Guide