The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Join in on weekly podcasts that aim to illuminate how AI transforms cybersecurity—exploring emerging threats, tools, and trends—while equipping viewers with knowledge they can use practically (e.g., for secure coding or business risk mitigation).
…
continue reading
Join Senator Ted Cruz and co-host Ben Ferguson as they break down the most important news stories of the day and reveal what they mean for you. On "Verdict with Ted Cruz,” you will go behind the scenes of the political debates that define our country. "Verdict with Ted Cruz" is being brought to you by Jobs, Freedom, and Security PAC, a political action committee dedicated to supporting conservative causes, organizations, and candidates across the country. In 2022, Jobs, Freedom, and Security ...
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Welcome to 'Risk Grustlers,' where we celebrate the extraordinary journeys of modern-day Risk Leaders who embrace the art of 'Grustle'—a powerful fusion of Grind and Hustle. Our podcast dives into the innovative strategies and bold decisions taken by these risk-takers, shaping the future of cybersecurity and risk management. Join us as we explore their inspiring stories, insightful advice, and cutting-edge technologies that define the alternative GRC landscape.
…
continue reading
Your dose of tips about all things Information Security, ICT Legislation and Risk. South African podcast.
…
continue reading
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Two CISOs and a security-minded friend discuss and debate topics of security and privacy, with a focus on looking at the topic from various angles, both that they support and those they don't. Sign up for our newsletter to be notified when new episodes drop, or when new projects are announced https://newsletter.greatsecuritydebate.net
…
continue reading
1
Global Security Briefing by Factal and Emergent Risk International
Factal and Emergent Risk International
Held live every two weeks on Thursdays, the Global Security Briefing is now the industry's largest virtual event of its kind. We examine security threats, supply chain impacts and geopolitical developments for global security and risk intelligence professionals. Since the earliest days of COVID, Factal and Emergent Risk International have held an essential hour-long briefing for global security and resilience professionals.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
…
continue reading
Soterion’s SAP Security & GRC podcast with host Dudley Cartwright, helping you on your journey to effective access risk management in SAP.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Stay informed with Just Security: Out Loud. A selection of our written content, delivered daily, in a clear, automated voice for easy listening on the go. Each weekday, we bring you the Early Edition—your trusted, curated guide to the most important news and developments in national security, law, and global affairs over the past 24 hours. Plus, listen to select articles from Just Security’s expert authors. Whether you’re catching up on headlines or diving deeper into critical analysis, Just ...
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC). Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy. It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates. Security & GRC ...
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
1
What's next after Venezuela? Iran's economic protests; PizzInt and tradecraft
1:12:54
1:12:54
Play later
Play later
Lists
Like
Liked
1:12:54In the first Global Security Briefing of 2026 Factal editor Jaime Calle Moreno took a deep dive into what happened in Venezuela as well as what editors are watching for next. Hannah Poppy, Global Head of Risk Intelligence for Emergent Risk International, turned to the economic protest in Iran, including why these are different than the Woman.Life.F…
…
continue reading
1
"Trump’s New Year Foreign Policy: The Risk that the Bold and the Bad Outweigh the Constructive" by Ambassador Dan Fried
17:14
17:14
Play later
Play later
Lists
Like
Liked
17:14"Trump’s New Year Foreign Policy: The Risk that the Bold and the Bad Outweigh the Constructive" by Ambassador Dan Fried Published on January 8th, 2026 on Just Security, an essential resource for those shaping a just and secure world.By Just Security
…
continue reading
1
SANS Stormcast Tuesday, January 6th, 2026: IPKVM Risks; Tailsnitch; Net-SNMP Vuln;
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08Risks of OOB Access via IP KVM Devices Recently, cheap IP KVMs have become popular. But their deployment needs to be secured. https://isc.sans.edu/diary/Risks%20of%20OOB%20Access%20via%20IP%20KVM%20Devices/32598 Tailsnitch Tailsnitch is a tool to review your Tailscale configuration for vulnerabilities https://github.com/Adversis/tailsnitch Net-SNMP…
…
continue reading
1
EP 158 A Continent in Motion: Eva Nolle on Security, Risk, and the Future of Security Risk in Africa
45:05
45:05
Play later
Play later
Lists
Like
Liked
45:05Send us a text 🎙️ Episode Summary A Continent in Motion: Eva Noelle on Security, Risk, and the Future of Security Risk in Africa In this powerful year-end conversation, Eva Noelle brings rare depth, context, and realism to what it truly means to operate in security, intelligence, and risk across the African continent. Drawing on extensive experienc…
…
continue reading
1
AI-Era AppSec: Transparency, Trust, and Risk Beyond the Firewall - Felipe Zipitria, Steve Springett, Aruneesh Salhotra, Ken Huang - ASW #363
1:06:43
1:06:43
Play later
Play later
Lists
Like
Liked
1:06:43In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely d…
…
continue reading
1
The Hidden Risk in Your Stack [Data Security Decoded]
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik. In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and w…
…
continue reading
1
SN 1057: GhostPoster - Free VPNs, Hidden Risks
2:20:19
2:20:19
Play later
Play later
Lists
Like
Liked
2:20:19What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer c…
…
continue reading
1
255 - Shadow AI-The Invisible Security Risk Already Inside Your Organization
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30Enjoying the content? Let us know your feedback! Today, we're tackling one of the fastest-emerging threats of 2025—one that's probably already active in your organization right now, whether you know it or not. We're talking about Shadow AI, and the statistics are alarming: That means right now, as you're listening to this, someone in your organizat…
…
continue reading
1
Risk Grustlers | EP 19 | Securing agentic AI ecosystems ft. Sounil Yu
24:23
24:23
Play later
Play later
Lists
Like
Liked
24:23In this episode of Risk Grustlers, Aayush Ghosh Choudhury, CEO and Co-Founder of Scrut, sits down with Sounil Yu, Chief AI Officer at Knostic and author of the ‘Cyber Defense Matrix,’ to talk about what it really means to run agentic AI safely, starting from “basic” security hygiene and identity hardening, all the way to drawing hard boundaries aro…
…
continue reading
1
New Year's Resolutions plus Minnesota Shooting, Riots & Fraud
34:01
34:01
Play later
Play later
Lists
Like
Liked
34:011. New Year’s Resolutions The first part of the discussion is lighthearted and personal. Both hosts share their resolutions for 2026: Ted Cruz’s resolutions: Lose 30 pounds (from 236 lbs to 206 lbs) through diet and exercise. Complete a “Dry January” (no alcohol for the month). Read the Bible daily throughout the year. Ben Ferguson’s resolutions: F…
…
continue reading
1
From 2020Partners 2025 – KB On The Go | Paul Maddison and Jeff Lindholm (Part 2)
42:49
42:49
Play later
Play later
Lists
Like
Liked
42:49The 2020 Partners Dialogue sits at the edge of possibility, where security meets technological ambition. In this special bonus episode, KB explores how nations can move beyond simply consuming innovation to actively co-creating strategic dominance. Anchored by AUKUS and empowered by cross-sector collaboration, this conversation features insights fr…
…
continue reading
1
SANS Stormcast Friday, January 9th, 2026: Gephi Analysis; zlib vuln; GnuPG Vulns; Cisco/Cloudflare DNS Issue
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12Analysis using Gephi with DShield Sensor Data Gephi is a neat tool to create interactive data visualizations. It can be applied to honeypot data to find data clusters. https://isc.sans.edu/diary/Analysis%20using%20Gephi%20with%20DShield%20Sensor%20Data/32608 zlib v1.3.1.2 Global Buffer Overflow in TGZfname() of zlib untgz Utility The untgz utility …
…
continue reading
This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting we…
…
continue reading
The US withdraws from global cybersecurity institutions. A maximum-severity vulnerability called Ni8mare allows full compromise of a workflow automation platform. Cisco patches ISE. Researchers uncover a sophisticated multi-stage malware campaign targeting manufacturing and government organizations in Italy, Finland, and Saudi Arabia. The growing r…
…
continue reading
1
Bonus: Daily Review with Clay and Buck - Jan 8 2026
1:03:14
1:03:14
Play later
Play later
Lists
Like
Liked
1:03:14Meet my friends, Clay Travis and Buck Sexton! If you love Verdict, the Clay Travis and Buck Sexton Show might also be in your audio wheelhouse. Politics, news analysis, and some pop culture and comedy thrown in too. Here’s a sample episode recapping four takeaways. Give the guys a listen and then follow and subscribe wherever you get your podcasts.…
…
continue reading
1
Do We Even Need Operational Technology-Specific Threat Intelligence?
1:11:55
1:11:55
Play later
Play later
Lists
Like
Liked
1:11:55In this episode of Unspoken Security, host AJ Nash sits down with Danielle Jablanski from STV to break down the hard truths of operational technology (OT) security. Danielle explains why critical infrastructure - from water and transportation to manufacturing - remains vulnerable, tracing the challenge back to legacy systems, vendor complexity, and…
…
continue reading
1
S18 E04 (VIDEO) Adopting an AI First Mindset
50:19
50:19
Play later
Play later
Lists
Like
Liked
50:19#SecurityConfidential #DarkRhiinoSecurityGrant Asplund is a cybersecurity evangelist with over 25 years of experience helping organizations defend against sophisticated cyber threats. He travels globally, speaking at major conferences like RSA, engaging with analysts, partners, and media to advance security across cloud, mobile, and infrastructure.…
…
continue reading
1
Navigating 2026: Exam Readiness, AI Risk, and Vendor Strategy for Financial Institutions
58:10
58:10
Play later
Play later
Lists
Like
Liked
58:10In this insightful panel episode, host Keaton Tanzer & Lucas Hathaway at Rivial Security are joined by Darrin Moorer, Senior VP and Information Security Officer at NBKC Bank, and Mike Sloan, Associate VP and ISO at the University of Kentucky Federal Credit Union, for a practical, forward-looking discussion on information security and compliance in …
…
continue reading
1
When AI Ships the Code, Who Owns the Risk with Varun Badhwar and Henrik Plate
35:00
35:00
Play later
Play later
Lists
Like
Liked
35:00AI isn’t quietly changing software development… it’s rewriting the rules while most security programs are still playing defense. When agents write code at machine speed, the real risk isn’t velocity, it’s invisible security debt compounding faster than teams can see it. In this episode, Ron Eddings sits down with Varun Badhwar, Co-Founder & CEO of …
…
continue reading
Your curated weekday guide to the biggest national security and foreign policy developments over the past 24 hours. Compiled by the Just Security team and read by an automated voice, The Early Edition is an essential resource for anyone shaping a just and secure world. Published January 8th, 2026, on Just Security. ICYMI: Yesterday on Just Security…
…
continue reading
AI Security Ops | Episode 35 – 2026 Predictions In this episode, the BHIS panel looks into the crystal ball and shares bold predictions for AI in 2026—from energy constraints and drug development breakthroughs to agentic AI risks and cybersecurity threats. Chapters (00:00) - Intro & Sponsor Shoutouts (01:14) - Prediction: Grid Power Becomes the Bot…
…
continue reading
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Ejona Preci, group CISO, LINDAL Group. In this episode: Consequence, not…
…
continue reading
1
BONUS POD: Woman Killed After Attempting to Ram ICE Officer
20:25
20:25
Play later
Play later
Lists
Like
Liked
20:25Incident Overview ICE agents were conducting operations in Minneapolis when a woman blocked their vehicles and refused repeated commands to exit her car. She allegedly accelerated toward an ICE agent, prompting the officer to fire through the windshield, resulting in her death. The shooting is described as defensive and necessary to prevent harm to…
…
continue reading
1
SANS Stormcast Thursday, January 8th, 2026: HTML QR Code Phishing; n8n vulnerability; Powerbank Feature Creep
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23A phishing campaign with QR codes rendered using an HTML table Phishing emails are bypassing filters by encoding QR codes as HTML tables. https://isc.sans.edu/diary/A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table/32606 n8n vulnerabilities In recent days, several new n8n vulnerabilities were disclosed. Ensure that …
…
continue reading
Grant Asplund is a cybersecurity evangelist with over 25 years of experience helping organizations defend against sophisticated cyber threats. He travels globally, speaking at major conferences like RSA, engaging with analysts, partners, and media to advance security across cloud, mobile, and infrastructure. Grant has held leadership roles across s…
…
continue reading
Jaguar Land Rover reveals the fiscal results of last year’s cyberattack. A Texas gas station chain suffers a data spill. Taiwan tracks China’s energy-sector attacks. Google and Veeam push patches. Threat actors target obsolete D-Link routers. Sedgwick Government Solutions confirms a data breach. The U.S. Cyber Trust Mark faces an uncertain future. …
…
continue reading
1
"A NATO Promise Not to Enlarge? No, Not Even According to Putin 1.0" by Amb. Steven Pifer
13:20
13:20
Play later
Play later
Lists
Like
Liked
13:20"A NATO Promise Not to Enlarge? No, Not Even According to Putin 1.0" by Ambassador Steven Pifer Published on January 7th, 2026 on Just Security, an essential resource for those shaping a just and secure world.By Just Security
…
continue reading
Your curated weekday guide to the biggest national security and foreign policy developments over the past 24 hours. Compiled by the Just Security team and read by an automated voice, The Early Edition is an essential resource for anyone shaping a just and secure world. Published January 7th, 2026, on Just Security. ICYMI: Yesterday on Just Security…
…
continue reading
1
EP 159 Inside the Polygraph Room: What the Body Reveals When Words Lie with Alan Saquella
1:01:41
1:01:41
Play later
Play later
Lists
Like
Liked
1:01:41Send us a text 🎙️ Episode Summary Inside the Polygraph Room: What the Body Reveals When Words Lie with Alan Saquella “A polygraph isn’t a lie detector — it’s a physiological monitor. The body reacts long before words do.” — Alan Saquella Polygraph tests are often misunderstood — portrayed as simple “lie detectors” with jerking needles and dramatic …
…
continue reading
1
CISO Lessons from a Children's Novel as Cybersecurity Outgrows IT and Building Talent - Tom Arnold - BSW #429
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you're a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
…
continue reading
1
CISO Lessons from a Children's Novel as Cybersecurity Outgrows IT and Building Talent - Tom Arnold - BSW #429
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you're a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
…
continue reading
1
CISO Lessons from a Children’s Novel as Cybersecurity Outgrows IT and Building Talent - Tom Arnold - BSW #429
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you’re a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
…
continue reading
1
The Wired Data Breach and Why “Non-Sensitive” Data Puts You at Risk
11:57
11:57
Play later
Play later
Lists
Like
Liked
11:57In this episode of Darnley’s Cyber Café, we slow things down and look at a recent data leak involving Wired to understand what these incidents actually mean for everyday people. Millions of records. No passwords. No credit cards. And yet, there is real risk. Using a real-world breach as the starting point, this conversation explores how seemingly h…
…
continue reading
1
Venezuela Victory part 2-Historically Transforming Latin America & What Happens Next
43:21
43:21
Play later
Play later
Lists
Like
Liked
43:21Cilia Flores’ Role: Far from being a symbolic first lady, Flores is a mastermind behind corruption and drug trafficking. She was sanctioned by the U.S. Treasury and linked to major criminal activities, including her nephews’ cocaine smuggling. Western Hemisphere Strategy: The discussion emphasizes the Monroe Doctrine and its modern interpretation u…
…
continue reading
1
From 2020Partners 2025 – KB On The Go | Neha Idnani, James Tennant, and Simon Hodgkinson (Part 1)
1:04:09
1:04:09
Play later
Play later
Lists
Like
Liked
1:04:09The 2020 Partners Dialogue sits at the edge of possibility, where security meets technological ambition. In this special bonus episode, KB explores how nations can move beyond simply consuming innovation to actively co-creating strategic dominance. Anchored by AUKUS and empowered by cross-sector collaboration, this conversation features insights fr…
…
continue reading
1
SN 1059: MongoBleed - Code Signing Under Siege
3:16:33
3:16:33
Play later
Play later
Lists
Like
Liked
3:16:33Why are code signing certificates suddenly getting shorter, pricier, and more restrictive? Steve Gibson and Leo Laporte expose the "cabal" rewriting the rules for everyone who builds software—and what it means for your security and your wallet. Code-signing certificate lifetimes shortened by two years. Sadly, ChatGPT is heading toward an advertisin…
…
continue reading
1
SN 1059: MongoBleed - Code Signing Under Siege
3:16:33
3:16:33
Play later
Play later
Lists
Like
Liked
3:16:33Why are code signing certificates suddenly getting shorter, pricier, and more restrictive? Steve Gibson and Leo Laporte expose the "cabal" rewriting the rules for everyone who builds software—and what it means for your security and your wallet. Code-signing certificate lifetimes shortened by two years. Sadly, ChatGPT is heading toward an advertisin…
…
continue reading
1
SANS Stormcast Wednesday, January 7th, 2026: Tailsnitch Review; D-Link DSL EoL Vuln; TOTOLINK Unpatched Vuln
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44Tool Review: Tailsnitch Tailsnitch is a tool to audit your Tailscale configuration. It does a comprehensive analysis of your configuration and suggests (or even applies) fixes. https://isc.sans.edu/diary/Tool%20Review%3A%20Tailsnitch/32602 D-Link DSL Command Injection via DNS Configuration Endpoint A new vulnerability in very old D-Link DSL modems …
…
continue reading
1
Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy , Aaran Leyland, and More - SWN #544
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy in Rhode Island, Aaran Leyland, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-544
…
continue reading
Grok’s non-consensual imagery draws scrutiny from the European Commission. Researchers link several major data breaches to a single threat actor. The UK unveils a new Cyber Action Plan. A stealthy ClickFix campaign targets the hospitality sector. VVS Stealer malware targets Discord users. Covenant Health and AFLAC report data leaks. Google silences…
…
continue reading
1
Bonus: Daily Review with Clay and Buck - Jan 6 2026
1:03:46
1:03:46
Play later
Play later
Lists
Like
Liked
1:03:46Meet my friends, Clay Travis and Buck Sexton! If you love Verdict, the Clay Travis and Buck Sexton Show might also be in your audio wheelhouse. Politics, news analysis, and some pop culture and comedy thrown in too. Here’s a sample episode recapping four takeaways. Give the guys a listen and then follow and subscribe wherever you get your podcasts.…
…
continue reading
1
Cybersecurity resolutions you’ll actually stick to in 2026
40:14
40:14
Play later
Play later
Lists
Like
Liked
40:14Happy New Year! 🎉✨ We’re kicking off 2026 with cybersecurity resolutions you’ll actually stick to — no cold plunges, no green juice cleanse, just a handful of tiny ten-minute wins that make a big difference to your privacy and security. We’ve turned the best advice from last season’s guests into a simple, practical checklist. On this episode, you’l…
…
continue reading