Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
Legitimate Cybersecurity Podcast - designed to empower you with real-world cybersecurity information, stories, and advice.
…
continue reading
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and sta ...
…
continue reading
Cybersicherheit kann man auch hören, in unserem Podcast. Abonnieren sie uns und hören sie, was Experten aus der Branche zu sagen haben, ohne dass sie selbst ein Experte sein müssen, um es zu verstehen.
…
continue reading
theCUBEresearch principal Cybersecurity analyst Jon Oltsik hosts the newest SiliconANGLE podcast focusing on bridging the gap between Cybersecurity and all other parts of tech
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Der wöchentliche Podcast "Cybersecurity ist Chefsache" ist eine Plattform, auf der verschiedene Experten aus der Welt der Digitalisierung & Cybersecurity zusammenkommen, um über aktuelle Themen, Trends und praktische Anwendungen zu sprechen. Der Gastgeber Nico Freitag dazu Freunde, Kollegen oder gleichgesinnte aus allen Branche ein, um Ihre Erfahrungen und Meinungen zu teilen und um aktuelle Themen rund um Digitalisierung, Cybersecurity, OT-Sicherheit, Datenschutz und Informationssicherheit ...
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
1234, come la password che non dovreste mai scegliere. Come la password che la maggior parte degli utenti sceglie. Dalle truffe online agli intrighi internazionali, in ogni puntata approfondiamo la storia di cybersecurity del momento. A cura di Alberto Giuffrè
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Hear directly from the frontlines. Our podcast features candid conversations with our own experts as well as external experts driving cybersecurity forward. Real stories, real solutions, real impact.
…
continue reading

1
Cybersecurity Basement – der Podcast für echten Security-Content
suresecure GmbH, Michael Döhmen, Andreas Papadaniil
Herzlich Willkommen im Cybersecurity Basement. In unserem Podcast spricht Michael Döhmen alle 14 Tage mit spannenden Gästen über Themen aus dem Bereich Cybersecurity. Dabei legen wir großen Wert auf Objektivität gelegt. Kein suresecure-Feature-Fucking, sondern ein seriöser, authentischer und ehrlicher Austausch aus Theorie und Praxis. Der Podcast richtet sich an IT- und Security-Entscheider und alle, die es mal werden wollen. Hier gibts kein Blabla, sondern Security als Handwerk. Ehrlich auf ...
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven atta ...
…
continue reading
A bi-weekly podcast that helps you curb cybersecurity risk and tackle technology challenges
…
continue reading
In this episode, Tyler and Bob break down cybersecurity in a fun, human way—no tech jargon overload, just real tips and tricks to keep your business safe. From password tricks and phishing scams to the importance of backups and cloud security, they share easy-to-follow advice with plenty of humour and relatable insights. If you’ve ever ignored an update or used ”password123,” this one’s for you. Tune in, laugh a little, and learn how to become a cybersecurity rockstar!
…
continue reading
Framework is your go-to podcast for mastering cybersecurity frameworks, with a special focus on the NIST Cybersecurity Framework (CSF) and NIST 800-53. This series breaks down each function, category, and subcategory to help professionals, educators, and organizations understand their structure and real-world applications. Each episode delivers clear, practical insights with examples that make cybersecurity frameworks more accessible and actionable. Whether you're new to cybersecurity or loo ...
…
continue reading
This first-of-its-kind audio drama from Dell explores what it takes to navigate the perilous and shifting terrain of the modern cybersecurity landscape, and how to best prepare yourself for what may be lurking around the next corner. Whether you're a tech professional or simply curious about the security of your personal data, these stories will help strengthen your defenses against a new kind of enemy. One you may not be expecting.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
Discussion
…
continue reading
Today, software is the power that moves society. To stay in control over their intellectual property and remain competitive on the market software publishers and intelligent device manufacturers need to integrate top-notch protections against counterfeiting, reverse engineering, and tampering and implement an orchestration of license models that fully respond to the customer’s needs on a global scale. CodeMeter by Wibu-Systems is a comprehensive and award-winning suite of hardware-, software ...
…
continue reading
Cybersecurity Ally is Fortra’s cybersecurity podcast covering security, today’s cyber threats, and everything you need for cyber news today. Listen now!
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: [email protected] https://www.4s-ag.de
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading

1
The Cyber Go-To-Market podcast for cybersecurity sales and marketing teams. Save Cybr Donut!
Andrew Monaghan
The podcast for sales and marketing teams that tackles the question: How can Cybr Donut grow ARR to $10m by the end of 2025? We talk with cybersecurity CROs, CMOs, CEOs, as well as sales and marketing experts in our movement to Save Cybr Donut. Listen in, and you will get proven strategies to - help you get more leads - win more customers, and, - create your killer go-to-market growth engine. If you are a seller, marketer, leader, CEO, or founder at a cybersecurity company, you are in the ri ...
…
continue reading
Welcome to the Passwork Cybersecurity Webinars — a space for insightful conversations on digital security and the latest trends in the world of cybersecurity. Each episode, we bring together industry experts, thought leaders, and practitioners to share real-world stories, practical tips, and deep dives into the challenges and innovations shaping our digital lives. Join us as we unravel the complexities of cybersecurity and empower you to protect what matters most.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading

1
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
The Small Business Cyber Security Guy
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
…
continue reading

1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™
Startuprad.io – Europe’s Startup & VC Podcast Network
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Cybersecurity Thought Leader Kevin Greene, explores the latest news and developments in cybersecurity and information assurance on his debut podcast, "Cybersecurity Insights & Perspectives”... Follow him at @iamkevtorious
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Host John Bambenek discusses complex cybersecurity issues
…
continue reading

1
Exploring the Dark Web: A Conversation with Criminologist David Decary-Hetu
51:19
51:19
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
51:19In this episode, Jim Love interviews David Decary-Hetu, a criminologist at the University of Montreal, discussing the dark web and its impact on criminal activity and cybersecurity. They delve into what the dark web is, how it operates, its primary users, and its role in cybercrime. They also explore the dynamics of online criminal networks, challe…
…
continue reading

1
The Vanguard Crisis: Why $10.5 Trillion in Cyber Costs Can’t Buy Enough Talent
33:10
33:10
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:10The global annual costs associated with cybersecurity are forecasted to reach a staggering 10.5 trillion by the end of 2025. Despite this immense financial backdrop, 80% of Chief Information Security Officers (CISOs) believe they operate with insufficient budgets to ensure robust security measure, contributing to an overwhelming 88% of CISOs functi…
…
continue reading

1
Building the Cybersecurity Workforce: Eric Stride's Perspective
26:32
26:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:32Breaking into Cybersecurity with Eric Stride: From Air Force to Private Sector In this episode of Breaking into Cybersecurity, host Christoph interviews Eric Stride from Huntress Security. Eric shares his journey from being a Communications Computer Systems Officer in the Air Force to becoming the Chief Security Officer at Huntress. He discusses hi…
…
continue reading

1
Cybersecurity Awesomeness Podcast - Episode 130
16:15
16:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
16:15Chris Steffen and Ken Buckler from EMA discuss mobile device protection and public Wi-Fi concerns for Cybersecurity Awareness Month.بقلم Enterprise Management Associates + DEVOPSdigest
…
continue reading

1
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
32:30
32:30
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:30Explores various facets of network security and performance, providing practical guidance for hardening systems and optimizing network elements. It covers topics such as client and server security configurations, including detailed steps for Windows and Linux environments, and the benefits of virtualization for disaster recovery and elastic perform…
…
continue reading

1
Turning Sheep Into Wolves: Brian Brushwood’s Plan to Defend Against the Scampocalypse
52:00
52:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
52:00Magician, podcaster, and World’s Greatest Con creator Brian Brushwood joins us to talk about the coming Scampocalypse, where AI-powered deception meets human vulnerability. We dive into how magic, psychology, and “deceptive role play” can transform security awareness from boring quizzes into hands-on human defense training. Learn why Brian says it’…
…
continue reading

1
The Silent Risk in AI-Powered Business Automation: Why No-Code Needs Serious Oversight | A Conversation with Walter Haydock | Redefining CyberSecurity with Sean Martin
38:21
38:21
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
38:21⬥GUEST⬥ Walter Haydock, Founder, StackAware | On Linkedin: https://www.linkedin.com/in/walter-haydock/ ⬥HOST⬥ Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ No-Code Meets AI: Who’s Really in Control? As A…
…
continue reading

1
Cosa c'è sul dark web, tra leggende e realtà
19:29
19:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
19:29Cosa c'è nella parte sommersa del web? In cosa consiste il lavoro dell’hacker etico nell’era dei grandi e piccoli gruppi di cybercriminali alla ricerca del profitto. Di questo e altro parliamo nella nuova puntata di 1234. Con Marco Balduzziبقلم Sky TG 24
…
continue reading

1
Satellite Internet Data Is Discovered To Be Unencrypted And Easy To Intercept
10:44
10:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
10:44This episode of Cybersecurity Today, hosted by Jim Love, covers several critical topics in the realm of cybersecurity. Researchers found that unencrypted data from satellites is accessible with cheap equipment, leading to potential eavesdropping on sensitive information worldwide. A new botnet campaign is aggressively scanning for unsecured RDP ser…
…
continue reading

1
Managed SOC erleben statt nur darüber reden: Proof of Value im Cybersecurity Month
22:23
22:23
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
22:23Der Oktober steht jedes Jahr im Zeichen des European Cybersecurity Month und die aktuelle Bedrohungslage zeigt einmal mehr, wie wichtig schnelle Reaktionsfähigkeit ist. Michael und Andreas sprechen über aktuelle Sicherheitsvorfälle, die SonicWall-Schwachstelle, NIS2 und darüber, wie Unternehmen echte Angriffserkennung erleben können, statt nur darü…
…
continue reading

1
Guard Duty: A Conversation on Cyber Defense and Digital Resilience
26:39
26:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:39LBMC’s Mark Burnette and Bill Dean talk about some of the most common technical security issues that are discovered in penetration testing, as well as some tactics for improving cyber defenses.
…
continue reading
In this thrilling episode of The Cybersecurity Tapes, a state-of-the-art stadium faces a high-stakes cyberattack during a live event. As facial recognition systems falter and chaos looms, a dedicated team races to uncover the breach and restore order. With time running out, the team must act fast to prevent a technological disaster.…
…
continue reading

1
Obscura Ransomware: Unmasking a Stealthy New Threat ⚠️
12:25
12:25
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
12:25Got a question or comment? Message us here! In this week’s #SOCBrief, Hickman and Peters break down Obscura ... a new ransomware variant making waves with aggressive evasion tactics, process terminations, and domain controller targeting. We cover what’s known so far, the risks it poses to businesses, and the key defenses every SOC should prioritize…
…
continue reading

1
Episode 157: How a Modern, Mission-Driven CIRT Operates
38:53
38:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
38:53In episode 157 of Cybersecurity Where You Are, Sean Atkinson sits down with Matthew Grieco, Cyber Incident Response Team (CIRT) Principal Analyst at the Center for Internet Security® (CIS®), and Dustin Cox, CIRT Analyst at CIS. Together, they explore the unpredictable world of cyber incident response. From ransomware investigations to digital foren…
…
continue reading

1
LockBit 5.0: Return of the Ransomware Giants - Ep 171
16:09
16:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
16:09LockBit is back—and stronger than ever. After multiple takedowns and sanctions, the ransomware-as-a-service giant has resurfaced with LockBit 5.0, a version designed to hit harder, spread faster, and target virtualization at scale. In this episode of Reimagining Cyber, Tyler Moffitt unpacks what’s changed, why LockBit 5.0 matters, and what organiza…
…
continue reading

1
The Data Use, Retention and Disposal Episode
47:48
47:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
47:48Show Notes: The Data Use, Retention and Disposal Episode KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. In this episode, Vice President of Privacy Assurance Services, Mark Hinely shares the ins and outs of data use, retention and disposal. Join Our Cybersecurity Mission: https://www.li…
…
continue reading

1
Industrial Cybersecurity: The Gap Between Investment and Cyber Event Prevention
33:54
33:54
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:54In this episode, Craig and Dino address why manufacturers still suffer incidents after spending millions on OT security tools. They discuss how to convert those investments into measurable risk reduction. You'll learn why buying tools isn't a strategy. Get insights into how to validate asset visibility on the floor (not just the network map), pract…
…
continue reading

1
Evolving Past Whack-a-Mole: Building Resilient Security Strategies for Modern Supply Chain Threats with Chris Hurst
44:26
44:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
44:26On this episode of To the Point Cybersecurity, hosts Rachael Lyon and Jonathan Knepher are joined by Chris Hurst, CTO and Co - Founder of Blackwired, to unpack the rapidly evolving landscape of supply chain attacks, credential theft, and the future of cyber defense strategies. Drawing from his extensive experience in military-grade intelligence and…
…
continue reading

1
The Power of “Why” – Communicating Cybersecurity Effectively
24:14
24:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
24:14In this episode of Cyberside Chats, Matt Durrin and his guest explore what makes cybersecurity communication effective — whether you’re leading a sales presentation, a training session, or a tabletop exercise. The discussion dives into how to move beyond technical jargon and statistics to tell stories that resonate. Listeners will learn how underst…
…
continue reading
One unlocked phone can unravel the defenses of a billion-dollar enterprise—because in cybersecurity, small mistakes don’t stay small for long. Attackers can read notes, steal IDs, or impersonate you on WhatsApp. A reused password can launch a remote tool that looks completely legitimate. Rob Maas (Field CTO, ON2IT) and Luca Cipriano (Cyber Threat I…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading

1
Flow State Rituals for Founders: Deep Work, Distraction Hacks & AI Focus
47:44
47:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
47:44In this episode, Steven Puri, CEO of The Sukha Company and former Hollywood VFX executive (Independence Day, Godzilla, Transformers Prime), shares the rituals, behavioral frameworks, and AI-powered systems he uses to help founders reach deep work in distraction-heavy environments. Steven’s journey from blockbuster sets to startup leadership reveals…
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Highlight reel of the 2025 Verizon DBIR. Organized into 10 clear areas of focus, to help you quickly identify data points that you can use to quickly build business cases and focus on risk areas. Dive into our recap of Black Hat, DEF CON and BSides Las Vegas fr…
…
continue reading

1
From Sales to Security: SAP Entitlement Management & Wibu-Systems CodeMeter
5:29
5:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:29In this joint interview, SAP and Wibu-Systems explain how entitlement management and licensing protection work hand-in-hand to empower ISVs and device manufacturers.Key takeaways include: Why SAP Entitlement Management (EMS) is central to SAP’s Suite-as-a-Service strategy and the quote-to-cash process. How EMS defines rights and entitlements — from…
…
continue reading

1
Global Cyber Circle im Gespräch: Warum Cybersecurity nicht Aufgabe der IT ist
1:05:06
1:05:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:05:06Erweitere dein Wissen über digitale Sicherheit mit "Cybersecurity ist Chefsache". In der neuesten Episode begrüßt Nico Freitag Fabian Flock, CEO vom Global Cyber Circle. In dieser spannenden Folge geht es um den Cyber Resilience Act – und wie dieser neue EU-Act die Spielregeln für Unternehmen radikal verändert. Besonderer Fokus: Die neue Rolle von …
…
continue reading

1
294 | Breaking Analysis | The Zero-Loss Enterprise - Data Resilience as an AI Service Layer
39:12
39:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
39:12Breaking Analysis with Dave Vellante and theCUBE Researchبقلم SiliconANGLE
…
continue reading

1
AI Won’t Save You: James Gustafson on Junior Talent, Button-ology, and Real Risk Reduction
39:01
39:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
39:01Why train when you can just hire?” In this episode, BlueVoyant Senior Vulnerability & Risk Analyst James Gustafson explains why that mindset—and the myth that AI can replace fundamentals—is putting orgs at risk. From Army “combat cable guy” to enterprise VM leader, James breaks down how to move from scan → prioritize → fix, how to develop junior ta…
…
continue reading

1
SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads& Malicious Link Distribution
4:55
4:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:55This story was originally published on HackerNoon at: https://hackernoon.com/squarex-shows-ai-browsers-fall-prey-to-oauth-attacks-malware-downloadsand-malicious-link-distribution. The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or relea Check mor…
…
continue reading

1
🌐 Cybersecurity Unmasked 🌐 EP 25: TELUS's $70 Billion Investment: Opportunities and Challenges
14:54
14:54
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
14:54Telus just announced a massive $70 billion investment in Canada's digital infrastructure over the next few years. In this episode of Cybersecurity Unmasked, we unpack what this means for small and medium-sized businesses—the opportunities are huge, but so are the cybersecurity risks. This infrastructure boom promises faster fiber networks, rural co…
…
continue reading

1
Volunteer Work in Cybersecurity Nonprofits | Interview with Aruneesh Salhotra
36:04
36:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
36:04بقلم Dejan Kosutic
…
continue reading
بقلم Alexander Busse | Cybervize
…
continue reading

1
Field Notes: Coffee, Gliders & Trademark Scams
24:55
24:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
24:55Ever wonder what the hosts of The Audit talk about when the mics are rolling but the formal interview isn't happening? This Field Notes episode gives you exactly that—unfiltered conversations covering everything from coffee preferences and glider flying to trademark scams targeting cybersecurity professionals. Nick and Eric dive into Eric's latest …
…
continue reading

1
E50 - Beyond the Sales Pitch: Evaluating Tech Products and Preparing for 2026
50:31
50:31
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
50:31Beyond the Sales Pitch: Evaluating Tech Products and Preparing for 2026 In this episode, join Anthony and Tanner as they share their experiences and insights on evaluating tech products, from avoiding long-term contracts based on sales pitches to the importance of defining specific needs and conducting rigorous proof of concepts. They discuss their…
…
continue reading

1
Copilot Chat for Everyone, AI Agents Everywhere in Teams, and Fighting “Workslop” – Practical 365 Podcast S04E44
1:03:02
1:03:02
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:03:02Join Steve Goodman and Paul Robichaux as they discuss Microsoft’s latest AI updates – from Copilot Chat coming to all Microsoft 365 apps (no license required) to Teams getting AI agents in meetings, channels, and communities. They also warn about the rise of “AI-generated workslop” cluttering our workflows, and dig into why many Copilot pilot proje…
…
continue reading

1
Break Through the Noise: How Advocates Can Transform Your Pipeline – Braydan Young, CEO, SlashExperts
34:02
34:02
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:02Send me a text (I will personally respond) Are you struggling to generate enough top-of-funnel opportunities in today’s noisy cybersecurity sales landscape? Are your deals getting stuck or taking forever to close, despite your best efforts? Have you tapped into the real power of your customer advocates—not just for references late in the sales cycl…
…
continue reading

1
Experian’s AI Fraud Report: SIM Swaps, Voice Cloning, and Smarter Countermeasures
28:36
28:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:36Experian’s Chief Product Officer for Identity and Fraud in the UK and Ireland, Paul Weathersby, joins me to unpack how criminals are using generative tools to fabricate documents, clone voices, perfect phishing at scale, and stitch together synthetic identities. We dig into the sharp rise in SIM swap attacks, why eSIM provisioning can accelerate ta…
…
continue reading

1
Government Pledges Remuneration for JLR Cyber Attack Victims
3:28
3:28
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:28- Government Pledges Remuneration for JLR Cyber Attack Victims . - Dutch Cyber Attack: Latest Updates and Global Repercussions - African Banks Tighten Defenses Amid Rising Ransomware Threats. - UN Warns of Escalating Cybersecurity Risks in Developing Nations. - Experts Debate: Is Africa Ready for AI-Driven Cyber Threats? Support the show Remember..…
…
continue reading

1
68. The ADA Website Lawsuit Trap That's Bankrupting Small Businesses
31:35
31:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:35Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ | Mario Zaki - https://www.mazteck.com/ Small businesses making under $500K are the #1 target for ADA website compliance lawsuits - and most business owners have never heard of this threat. In this eye-opening episode, Justin and Mario break down the "digital ambulance chasing" epidemic tha…
…
continue reading

1
Closing The Gaps: How Security Baselines Make The Difference
26:37
26:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:37In this episode of The Collective Podcast, host Jordy Decock sits down with security consultants Thor Nicolaï and Jasper Baes to explore the hidden challenges of maintaining strong security baselines in Microsoft environments. They dive into why small gaps appear, how drift monitoring and exception management can make or break your security posture…
…
continue reading