Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Experian's DataTalk is a fun show featuring data science leaders and technologists from around the world. We talk about artificial intelligence, machine learning, deep learning, computer vision, data visualizations, data ethics, data philanthropy, and much more. Hosted by Mike Delgado
…
continue reading
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Smooth Scaling: System Design for High Traffic focuses on all things scalability, reliability, and performance. Tune in for expert advice on how to scale systems, control costs, boost availability, optimize performance, and get the most out of your tech stack. Host Jose Quaresma is the VP of Technical Engagement at Queue-it, working on the frontlines with some of the world’s biggest businesses on their busiest days, from Ticketmaster to Zalando to Home Office U.K. He’ll be joined by experts ...
…
continue reading
This show is designed to keep you up to date on the latest trends happening in data, digital, outsourcing and software. Just 20-30 minutes long, each podcast session provides insight on legal issues relating to technology transactions and touches on relevant and timely topics.
…
continue reading
Rowing Chat is the podcast network dedicated to rowing. We have many shows hosted from around the world on specialist topics from Strength Training to USA news, from interviews to data analysis. Produced by Rebecca Caroe, it brings rowing news, coaching advice and interviews to you. Go to https://rowing.chat/ for links to the latest episodes & subscribe in your favourite podcast software.
…
continue reading
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Software testing is the most important part of software development, but it is especially significant for healthcare software. Healthcare software applications manage patient data, offer medical services, and ensure compliance with various standards and regulations. Defects or errors in healthcare software can have consequences for patient security, data protection, and functional efficiency.
…
continue reading
Techlore Talks brings you in-depth conversations with the experts at the forefront of privacy, security, and digital rights. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode features meaningful discussions with the people building, researching, and advocating for digital freedom. From cybersecurity researchers and privacy tool developers to open-source advocates and digital rights activists—if they're shaping how we protect ourselves online, the ...
…
continue reading
Welcome to Avero GovTech Insights, your go-to podcast for the latest trends, insights, and innovations in government technology. Each episode brings you expert analysis and discussions on a wide range of topics, from data analytics to digital transformation and public sector ERP systems. Join us as we explore the technologies shaping the future of public services and discover how you can leverage them to drive efficiency, transparency, and better outcomes for your community.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
…
continue reading
Follow Veeam Podcasts to stay on top of the recent virtualization news and VMware and Hyper-V data-protection best practices. Join us now to become an Always-On Business™!
…
continue reading
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
…
continue reading
1
Federal Tech Podcast: for innovators, entrepreneurs, and CEOs who want to increase reach and improve brand awareness
John Gilroy
The federal government spends $90 billion on technology every year. If you are a tech innovator and want to expand your share of the market, this is the podcast for you to find new opportunities for growth. Every week, Federal Tech Podcast sits down with successful innovators who have solved complex computer system problems for federal agencies. They cover topics like Artificial Intelligence, Zero Trust, and the Hybrid Cloud. You can listen to the technical issues that concern federal agenci ...
…
continue reading
Listen to articles handpicked by our editors, and stay updated on top technology news from TechCrunch.
…
continue reading
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
Welcome to TMChats, the Innovation & Community Podcast powered by Coforge! We are a digital services and solutions provider and an Elite ServiceNow Partner in Australia. Here at Coforge, we feel we’ve got so much to share with the ServiceNow community, whether you’re an experienced developer or a new platform customer. We welcome you to relevant, insightful, and useful content to help you continue along your ServiceNow journey.
…
continue reading
Welcome to the HR Uprising Podcast. This engaging podcast explores HR ‘hot’ topics and challenges through conversations with relevant experts and real-life HR; O.D. or L&D professionals. HR Uprising is about creating an inclusive forum that enables us to share and learn from experts and everyday professionals. Hosted by Actus CEO Lucinda Carney a Business Psychologist; Chartered Psychologist; Experienced HR Change Agent; Entrepreneur; Speaker and Coach. There are two types of show formats: T ...
…
continue reading
Join us for wide-ranging interviews with water monitoring professionals, who share everything from nitty-gritty project details to big-picture perspective. These conversations between guests and our own groundwater and surface water experts offer fascinating insight into the world of water science and the incredible work being done to protect our precious water resources. Presented to you by In-Situ. We specialize in the manufacture and design of equipment and software used to solve water mo ...
…
continue reading
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
…
continue reading
Every real estate investing coach, influencer, and figure head will tell you they have the answers to financial freedom. The goal of REsimpli’s podcast is to remove the redundant discourse and discuss the realities of the REI space. Host Sharad Mehta speaks to a range of investors in different niches about their wins, losses, and best practices. Through open and honest discussions, our guests provide high level strategies for RE investors at every level. REsimpli is a leading all-in-one inve ...
…
continue reading
"Expedient: The Podcast" is your gateway to the inner workings of technology and innovation, presented with unparalleled clarity and expertise. Each episode is an invitation to join the luminaries of Expedient along with special guests from the forefront of the tech industry. We delve into the latest advancements in cloud computing, the evolution of data centers, cybersecurity trends, and groundbreaking developments in AI and machine learning. This podcast strips away the complexity of the t ...
…
continue reading
Welcome to Be a Smarter Homeowner podcast, where hosts, Beth Dodson and John Bodrozic are dedicated to helping you save money and get organized while managing, maintaining, protecting, improving, and eventually buying or selling your largest financial asset and biggest expense, your home. Discover how easy it is to be a smarter homeowner. Having worked with homeowners for over 20 years, your co-hosts are two of the three co-founders of HomeZada, a digital home management software platform th ...
…
continue reading
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep network visibility to not only protect against sophisticated cyber- ...
…
continue reading
Has your antivirus just screamed "Threat Found!" and left you asking, "Now what?!" As a UK small business owner or sole trader, a cyber-attack can feel like a direct threat to your business livelihood, your reputation, and everything you've worked hard for. Don't panic! My Antivirus Says "Threat Found!" – Now What? is your essential Malware Alert First Aid Kit, designed specifically for UK SMEs who need practical, immediate cyber security advice to protect what matters most. This podcast cut ...
…
continue reading
Employing an outside company to handle all payroll-related duties is known as outsourcing payroll services in a business. The main reasons for using payroll management services are to cut costs and free up time when handling payroll-related financial operations. Employing a third party to handle payroll operations frees up a company from having to recruit and educate a sizable in-house payroll team, buy suitable payroll software, and keep up with complicated tax regulations. All business typ ...
…
continue reading
Lenovo Customer Care +1(415)547-0376 Support Phone Number Facing any problem while dealing with your Lenovo device? Want to know various services provided by Lenovo? Or Want to access Lenovo Support Service? Click here!! Lenovo Support In today’s world of cut and throw competition, any firm which is ruling the market will keep ruling till their customers were satisfied. And having a satisfied customer is only possible with two things, i.e., Good Quality Product and best Customer Support Serv ...
…
continue reading
Welcome to AI Automation Minute – Your Shortcut to Smarter Workflows Step into the fast-paced world of AI and automation in healthcare with Dr. Teri Fisher in AI Automation Minute. Designed for busy professionals, each bite-sized daily episode delivers powerful insights, practical tools, and the latest trends to help you streamline your practice, save time, and enhance patient care— all in just one minute. Whether you're a cosmetic injector, doctor, nurse, dentist, or any healthcare provider ...
…
continue reading
A monthly podcast with a focus on the use and application of T and B cell receptor repertoires in diagnostics and other clinical settings.
…
continue reading
If you’re looking to improve your trading skills and make smarter decisions in the market, you’re in the right place! Funding Pips is offering a 20% discount on your first purchase when you use the exclusive coupon code “c9995e01”. Whether you’re just beginning your trading journey or looking for advanced strategies and tools, this limited-time offer will help you access top-tier resources at a fraction of the price. In the competitive world of trading, having the right tools, educational re ...
…
continue reading
1
Fortinet VPN exploit, Google gmail change, Aflac breach update
7:48
7:48
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
7:48Active exploitation of Fortinet VPN bypass utility observed Google possibly allowing users to change default gmail address June Aflac attack resulted in data theft Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintai…
…
continue reading
1
Building a Hacking Lab in 2025 - PSW #906
1:03:21
1:03:21
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:03:21The crew makes suggestions for building a hacking lab today! We will tackle: What is recommended today to build a lab, given the latest advancements in tech Hardware hacking devices and gadgets that are a must-have Which operating systems should you learn Virtualization technology that works well for a lab build Using AI to help build your lab Visi…
…
continue reading
1
How would the Netflix-Warner Bros. deal reshape Hollywood?
5:59
5:59
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
5:59The $82.7 billion deal to acquire Warner Bros., and the acquisition has already been described as sending Hollywood into “full-blown panic mode,” “possibly a death blow to theatrical filmmaking,” and maybe even “the end of Hollywood” itself. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading
1
Scams target MENA region, pen testers accused of blackmail, DDoS protection faces fresh challenges
7:34
7:34
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
7:34Coordinated scams target MENA region Pen Test Partners accused of 'blackmail' Hackers steal record $2.7B in crypto in 2025 Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join u…
…
continue reading
1
Defensive Security Podcast Episode 334
1:07:21
1:07:21
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:07:21Want to be the first to hear our episodes each week? Become a Patreon donor here. Merry Christmas and Happy Holidays! Links to this week’s stories: https://krebsonsecurity.com/2025/12/most-parked-domains-now-serving-malicious-content/ https://thehackernews.com/2025/12/russia-linked-hackers-use-microsoft-365.html?m=1 https://cybersecuritynews.com/am…
…
continue reading
1
OK, what’s going on with LinkedIn’s algo?
9:46
9:46
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
9:46TechCrunch's Dominic-Madori Davis writes about women who ran an experiment to see if LinkedIn's new algo was being sexist and thought they proved it. But experts say there's more complexity involved. Learn more about your ad choices. Visit podcastchoices.com/adchoicesOleh TechCrunch
…
continue reading
1
Cybercrime News For Dec. 24, 2025. Don't Miss The Cybercrime Wire Daily Newsfeed. WCYB Digital Radio
0:47
0:47
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
0:47The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
The CISO Holiday Party 2025: Leadership Lessons from the Year That Was - BSW #427
49:27
49:27
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
49:27Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
…
continue reading
1
ServiceNow to acquire cybersecurity startup Armis, MacSync Stealer adopts quieter installation, Nissan customer data stolen in Red Hat raid
6:54
6:54
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
6:54ServiceNow to acquire cybersecurity startup Armis MacSync Stealer adopts quieter installation Nissan customer data stolen in Red Hat raid Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real envir…
…
continue reading
1
Holiday Special Part 1: You’re Gonna Click the Link - Rob Allen - SWN #540
35:34
35:34
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
35:34It’s the holidays, your defenses are down, your inbox is lying to you, and yes—you’re gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won’t save you, and why the real job is surviving after the click. From phishing and sm…
…
continue reading
1
Black Hat Europe 2025. Mend.io On Securing Applications. Amir Shahmiri, Senior Sales Engineer.
5:38
5:38
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
5:38Cybercrime Magazine has a new podcast series coming soon, brought to you by Mend.io, whose mission is to make application security frictionless for developers and scalable for security teams – without compromise. Deputy editor Amanda Glassner caught up with Amir Shahmiri, senior sales engineer, at Black Hat Europe 2025. This episode was brought to …
…
continue reading
1
Pirate group Anna’s Archive says it has scraped 86 million songs from Spotify; plus, OpenAI says AI browsers may always be vulnerable to prompt injection attacks
8:17
8:17
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
8:17Pirate group Anna’s Archive says it has scraped 86 million songs from Spotify. Also, OpenAI says prompt injections will always be a risk for AI browsers with agentic capabilities, like Atlas. But the firm is beefing up its cybersecurity with an 'LLM-based automated attacker.' Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading
1
Microsoft on Women In Cybersecurity at Black Hat Europe 2025 with Alex Zoldova.
3:50
3:50
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
3:50Cybercrime Magazine met with Alex Zoldova, Board Member, Women In Cybersecurity at Microsoft when we were at Black Hat Europe 2025 in London. She spoke with us about the state of women in cybersecurity today, as well as the value of mentoring, the imperative to increase STEM education opportunities for young people, and more. Connect with Alex Zold…
…
continue reading
1
Black Hat Europe 2025. Cybercrime & Cybersecurity: The European Perspective.
4:42
4:42
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
4:42Cybercrime Magazine was a media partner at Black Hat Europe 2025, marking a new chapter for our reporting. Conversations centered around familiar topics – including ransomware, artificial intelligence, and cloud security – but being on location in Europe, there was one unavoidable question: how do today’s cybersecurity challenges look from a Europe…
…
continue reading
1
Public Sector Cyber Brief. 2026 Scope. Michael Centrella, SecurityScorecard & Anton Chuvakin, Google
16:05
16:05
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
16:05Michael Centrella is the Head of Public Policy at SecurityScorecard. In this episode, he joins host Paul Spaulding and Anton Chuvakin, Security Advisor at Office of the CISO, Google Cloud, to reflect back on 2025 and look ahead to 2026 in terms of cybersecurity. SecurityScorecard's mission is to make the world a safer place by transforming the way …
…
continue reading
1
Cybercrime Wire For Dec. 23, 2025. Spotify Music Library Scraped By Cyber Pirate. WCYB Digital Radio
1:25
1:25
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:25The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Cybercrime News For Dec. 23, 2025. DOJ Charges 54 in ATM Jackpotting Scheme. WCYB Digital Radio.
2:40
2:40
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:40The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
Data Security. Conduent Anticipates $25M Data Breach Cost. Scott Schober, Author, "Hacked Again."
16:57
16:57
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
16:57Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss the recent data breach at Conduent, including the company's anticipated cost of the incident, their next steps, and more. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-ti…
…
continue reading
Love a hot take? 🔥 You’re in luck! We’re back with a special end-of-year treat: a rapid-fire round of cybersecurity hot takes guaranteed to start arguments in your group chats and hijack at least one Slack thread. 💬 The team weighs in on bold claims like “Passwords will finally die in 2026” and “AI will solve more cybersecurity problems than it cau…
…
continue reading
1
The Merging Worlds of AI, Cybersecurity, and Physical Threats with David Saunders
27:55
27:55
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
27:55Welcome to another episode of the To the Point Cybersecurity Podcast! This week, hosts Rachael Lyon and Jonathan Knepher are kicking off the holiday season with a fascinating conversation featuring David Saunders, Director of Forcepoint Security Lab and a seasoned cybersecurity professional with more than two decades of experience. The discussion d…
…
continue reading
1
Mastering Cyber. Protect Smart Homes & Gadgets. Alissa “Dr Jay” Abdullah, Deputy CSO, Mastercard.
1:39
1:39
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:39Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/…
…
continue reading
1
Alphabet to buy Intersect Power to bypass energy grid bottlenecks; also, Trump admin halts 6 GW of offshore wind leases again
4:42
4:42
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
4:42Alphabet is set to pay $4.75 billion in cash, plus debt, for the data center and clean energy developer. Also, the move is the latest attempt by the Trump administration to delay the construction of 6 gigawatts of offshore wind near a hotspot of data center development. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading
1
Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, Dustin Lehr, James Manico, Adam Shostack - ASW #362
1:07:52
1:07:52
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:07:52Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
…
continue reading
1
Spotify music library scraped, DDoS disrupts French postal services, Fake delivery sites hit holiday shoppers
6:49
6:49
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
6:49Spotify music library scraped DDoS disrupts France's postal and banking services Fake delivery websites hit holiday shoppers Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join…
…
continue reading
1
Department of Know: President signs defense bill, time flies at NIST, Italian ferry malware
36:47
36:47
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
36:47Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Jason Taule, CISO, Luminis Health, and Chris Ray, Field CTO, GigaOm Thanks to our show sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zer…
…
continue reading
1
New York Governor Kathy Hochul signs RAISE Act to regulate AI safety; plus, Sequoia partner spreads debunked Brown shooting theory
6:33
6:33
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
6:33The bill will require large AI developers to publish information about their safety protocols and report safety incidents to the state within 72 hours. Also, the newest episode raises questions about whether Sequoia's new leadership -- managing partners Alfred Lin and Pat Grady, who took over last month -- can or will rein in Maguire's social media…
…
continue reading
1
Resiliency Unleashed. Securing The Software Supply Chain. Cassie Crossley, Author.
24:28
24:28
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
24:28Cassie Crossley is an internationally recognized cybersecurity and technology executive, and author of “Software Supply Chain Security." In this episode, she joins host Kris Lovejoy, Global Security and Resilience Practice Leader at Kyndryl, to discuss software supply chain security, including how to navigate compliance, automation, ecosystem resil…
…
continue reading
1
The Power of Threat Intelligence. Brand Protection In Cybersecurity. Ahmad Halabi, Resecurity.
10:43
10:43
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
10:43Ahmad Halabi is the managing director at Resecurity. In this episode, he joins host Scott Schober to discuss brand protection in cybersecurity and why it is important for organizations today, as well as what types of threats can impact brands, look-alike domains, and more. The Power of Threat Intelligence, a Cybercrime Magazine podcast series broug…
…
continue reading
1
Cyber Social. Women In Cybersecurity On X. Taylor Fox, Cybercrime Magazine.
2:08
2:08
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:08@WomenKnowCyber on X, curated by Cybercrime Magazine Media Coordinator Taylor Fox, is chock full of inspiring stories, people, and resources. In this episode, Fox joins host Amanda Glassner to discuss why it's important to elevate women in cybersecurity, how the daily stories are chosen, and more. • For more on cybersecurity, visit us at https://cy…
…
continue reading
1
Cybercrime Wire For Dec. 22, 2025. Ransomware Attack Strikes NetStar Australia. WCYB Digital Radio.
1:21
1:21
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:21The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Cybercrime News For Dec. 22, 2025. Google Sues Group Behind U.S. Text Scam Ring. WCYB Digital Radio.
2:51
2:51
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:51The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
Software Contracts: How to Negotiate With Confidence and Clarity
13:12
13:12
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
13:12Once you sign a software contract, your leverage is gone. In this GovTech episode, Megan and Billie break down what public-sector teams must understand before finalizing a software agreement—especially when implementation timelines, payment terms, and post-go-live support are on the line. You’ll learn: Why you should define “go-live” and every majo…
…
continue reading
1
As EU waters down 2035 EV goals, electric startups express concern
5:50
5:50
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
5:50The future may be electric, but that future is being postponed. The European Commission, citing the need for flexibility, has softened its ambitious plan to ban the sale of gas-powered cars by 2035. Learn more about your ad choices. Visit podcastchoices.com/adchoicesOleh TechCrunch
…
continue reading
1
Internal threats are the hole in Cybersecurity’s donut - Frank Vukovits - ESW #438
1:57:05
1:57:05
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:57:05Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There’s a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn’t infringe on any individual organization’s privacy. That’s why we hear the i…
…
continue reading
1
President's cyber bill, Iranian APT resurfaces, Kimwold DDoS attack
7:20
7:20
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
7:20President signs defense bill funding Cyber Command, Pentagon phone security Iranian APT Infy resurfaces with new malware Massive Android botnet Kimwolf launches DDoS attack Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement an…
…
continue reading
1
Defensive Security Podcast Episode 333
1:11:50
1:11:50
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:11:50Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.theregister.com/2025/12/09/hypervisor_ransomware_attacks_increasing https://www.bleepingcomputer.com/news/security/react2shell-flaw-exploited-to-breach-30-orgs-77k-ip-addresses-vulnerable https://www.infosecurity-magazine.com/…
…
continue reading
1
Cybercrime Wire For Dec. 20-21, 2025. Weekend Update. WCYB Digital Radio.
1:02
1:02
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:02The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Auld Lang Syne, Ghostpairing, Centerstack, WAFS, React2Shell, Crypto, Josh Marpet... - SWN #539
32:10
32:10
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
32:10Auld Lang Syne, Ghostpairing, Centerstack, OneView, WAFS, React2Shell Redux, Crypto, Josh Marpet, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-539
…
continue reading
1
Netflix acquires gaming avatar maker Ready Player Me; plus, Meta is developing a new image and video model for a 2026 release
6:45
6:45
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
6:45The gaming startup will allow Netflix subscribers to create avatars that can extend across gaming titles. Also, Meta is working on an image and video model and new text-based model, which aids with coding. Learn more about your ad choices. Visit podcastchoices.com/adchoicesOleh TechCrunch
…
continue reading
1
Quantum Minute. 2025 Declared Year of Quantum Science & Technology. Sponsored by Applied Quantum.
1:43
1:43
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:43Despite AI dominating headlines, Network World notes that 2025 proved to be a landmark year for quantum computing, with the UN declaring it the International Year of Quantum Science and Technology. Quantinuum launched the Helios quantum computer in November, claiming it's the most accurate commercial system available, while the industry raised $3.7…
…
continue reading
1
Black Hat Europe 2025. Clover On AI & Reinventing Product Security. Or Chen, Co-Founder & CPO.
2:32
2:32
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:32As a media sponsor at Black Hat Europe 2025, Cybercrime Magazine caught up with leaders from across the cybersecurity sector, including Or Chen, co-founder and CPO at Clover Security. In this episode, Chen discussed the company's approach to reinventing product security, artificial intelligence, and more. • For more on cybersecurity, visit us at ht…
…
continue reading
1
Australia's Teen Social Media Ban. What To Know. David Braue, Editor-At-Large, Cybercrime Magazine.
19:40
19:40
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
19:40David Braue, Editor-At-Large for Cybercrime Magazine, joins host Scott Schober in this episode to discuss Austrlia's world-first teen social media ban, which went into effect this month. Together, they discuss how the ban is sitting with teens and parents across the country, the new rules platforms must follow, and more. • For more on cybersecurity…
…
continue reading
1
Artificial Intelligence Provisions in Technology Contracting: Keeping Up With the Evolving Regulatory Landscape
34:15
34:15
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
34:15In this Tech Talks episode, Mayer Brown partners Ana Bruder, Julian Dibbell, Gabriela Kennedy, Arsen Kourinian, and Oliver Yaros put four AI regimes head to head: the European Union's risk based Act, the United Kingdom's light touch approach, Asia's mixed models, and the United States' state by state patchwork. Their contracting playbook: lock down…
…
continue reading
1
Cybercrime Wire For Dec. 19, 2025. Cyberattack Hits NHS England Tech Provider. WCYB Digital Radio.
0:55
0:55
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
0:55The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Cybercrime News For Dec. 19, 2025. Chinese Hackers Exploit Cisco Zero-Day. WCYB Digital Radio.
2:58
2:58
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:58The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
Instacart to pay $60M to settle FTC claims it deceived consumers; plus Apple becomes a debt collector
8:25
8:25
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
8:25The FTC alleged Instacart misled consumers with unlawful tactics, causing them to pay higher fees while also denying refunds. Also, Apple says it can now collect any money a developer owes the tech giant at any time. Learn more about your ad choices. Visit podcastchoices.com/adchoicesOleh TechCrunch
…
continue reading
1
Windows RemoteApp problems, ferry malware arrest, Senator's open-source warning
8:34
8:34
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
8:34Recent Windows updates break RemoteApp connections France arrests threat actors for installing malware on Italian ferry Senate Intel chair urges safeguard against open-source software threats Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Security …
…
continue reading
1
The Law That Protects Your Online Speech Is Under Attack
41:31
41:31
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
41:31This week's Surveillance Report covers the internet's free speech protections under attack as a US Senator moves to repeal Section 230. Plus: ransomware attacks escalate with React2Shell exploitation, India orders government access to encrypted messaging, AI "superintelligence" fear is being used to justify actual corporate manipulation happening r…
…
continue reading
1
With AI Nothing Is Safe - PSW #905
2:13:54
2:13:54
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:13:54This week in the security news: Linux process injection Threat actors need training too A Linux device "capable of practically anything" The Internet of webcams Hacking cheap devices Automating exploitation with local AI models Lame C2 Smallest SSH backdoor Your RDP is on the Internet These are not the high severity bugs you were looking for Low ha…
…
continue reading