POPULARITY
Categories
While our team is out on winter break, please enjoy this episode of Cyber Things from our partners at Armis. Welcome to Episode 2 of Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire in an homage to Stranger Things. Host Rebecca Cradick, VP of Global Communications at Armis, is joined by Curtis Simpson, CISO at Armis, to dive deep into the rise of the “Hive Mind”: the collective, connected threat ecosystem where attackers share tools, data, and tactics across the dark web, evolving faster than ever through AI-powered reconnaissance and automation. This is essential listening for anyone seeking to better understand how today's adversaries no longer operate alone, but as a distributed learning network that observes, adapts, and strikes with speed and precision. Tune in now to learn how organizations can think upside down, harness AI, and build defenses that move at the speed of today's threats - before the shadows reach your network. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this New Year's episode of Life of a CISO, Dr. Eric Cole reflects on the challenges of 2025 and delivers a powerful reset framework for CISOs entering 2026. Drawing from real-world coaching, executive leadership principles, and personal experience, Dr. Cole challenges security leaders to stop thinking like technologists and start acting like true chief officers. This episode breaks down three essential pillars every world-class CISO must define: who you need to become, your single top priority, and your North Star. Dr. Cole explains why consistency, discipline, and executive alignment matter more than tools, why most CISOs struggle with focus, and how habits, planning, and accountability can rapidly transform your impact and credibility. From redefining the CISO role as a future CEO pipeline, to practical strategies like executive one-on-ones, time blocking, and choosing a guiding North Star such as Zero Trust or data protection, this episode provides a clear roadmap to leadership growth. If you want to reset your mindset, elevate your influence, and lead cybersecurity as a business function in 2026, this episode is a must-listen.
CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of the CISO. In part 1, we discuss the increased pressures CISOs face. We all know them, but how are they impacting our daily lives, both at work and at home. In part 2, we discuss detection and prevention techniques to help avoid burnout, including: Detecting the signs of stress Acknowledging there is a problem Asking for help Techniques to deal with stress Industry and community support This is a serious problem in our industry and one we want to continue to focus on as we head into another stressful 2026. Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-428
Send us a textJoin your hosts on this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien, and Dr. K Royal as they close out 2025 with favorite moments and episodes, state law review, and predictions. And of course, a little bit about EU data protection. We'll be back January 28, global privacy / data protection day! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of the CISO. In part 1, we discuss the increased pressures CISOs face. We all know them, but how are they impacting our daily lives, both at work and at home. In part 2, we discuss detection and prevention techniques to help avoid burnout, including: Detecting the signs of stress Acknowledging there is a problem Asking for help Techniques to deal with stress Industry and community support This is a serious problem in our industry and one we want to continue to focus on as we head into another stressful 2026. Show Notes: https://securityweekly.com/bsw-428
CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of the CISO. In part 1, we discuss the increased pressures CISOs face. We all know them, but how are they impacting our daily lives, both at work and at home. In part 2, we discuss detection and prevention techniques to help avoid burnout, including: Detecting the signs of stress Acknowledging there is a problem Asking for help Techniques to deal with stress Industry and community support This is a serious problem in our industry and one we want to continue to focus on as we head into another stressful 2026. Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-428
Podcast: ICS Arabia PodcastEpisode: Securing the Food Industry | 63Pub date: 2025-12-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this insightful episode, host Dr Sulaiman Alhasawi sits down with Adnan Ahmad, CISO at Ornua, the global dairy cooperative behind Kerrygold, operating 11 factories across Europe, the US, and Saudi Arabia.They dive into the unique world of OT security in food manufacturing, where:
CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of the CISO. In part 1, we discuss the increased pressures CISOs face. We all know them, but how are they impacting our daily lives, both at work and at home. In part 2, we discuss detection and prevention techniques to help avoid burnout, including: Detecting the signs of stress Acknowledging there is a problem Asking for help Techniques to deal with stress Industry and community support This is a serious problem in our industry and one we want to continue to focus on as we head into another stressful 2026. Show Notes: https://securityweekly.com/bsw-428
How are defenders supposed to keep up when attackers move at the speed of AI? In this episode of Security Matters, host David Puner welcomes Rick McElroy, founder and CEO of Nexasure, for a candid conversation about cybersecurity's breaking point. Together, they unpack the realities of defending organizations in an era of identity sprawl, machine risk, agentic AI, and relentless automation. Rick shares hard-won insights from decades on the front lines, challenging the myth of perfect defense and revealing why identity remains at the root of most breaches. Whether you're a CISO, IT leader, or cybersecurity professional, you'll get actionable advice on managing machine identities, rethinking risk, and building resilience for a future where change is the only constant.
AI can supercharge your security team. But it can also supercharge attackers. So how do you stay ahead in an AI-powered threat landscape? Let's find out in our special 200th episode! Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. Kip's keynote address -- https://youtu.be/DNRNbT0IaKM "Fire Doesn't Innovate: Thriving in the Face of Evolving Cyber Risks" In this ROCon 2025 keynote, Kip Boyle challenges audiences to rethink how they approach modern threats in the age of AI. Using the metaphor of fire — a static risk that hasn't changed for millennia — Kip explores how cyber adversaries are innovating daily while many organizations remain trapped in outdated mindsets. He closes with a compelling call to action: adapt like firefighters did with fire — or risk being left behind.
Happy Holidays! In this Best Moments of 2025 episode, we revisit standout discussions, sharp takes, and memorable moments from the year – covering ransomware, vulnerability management, automation, zero trust, and the evolving role of the CISO. Whether you're leading security strategy or working hands-on in IT, these highlights capture the ideas that shaped the year in cybersecurity.
In this episode of CISO Tradecraft, hosts G Mark Hardy and Ross Young discuss the extensive redesign at CISO Tradecraft and introduce a series of free cybersecurity tools and templates available on their website. The tools, created with the help of AI, range from a Cybersecurity Budget Template and Gen AI Risk Assessment to a Personal Values Exercise and Process Improvement exercise. They also cover topics such as AI coding, CMMC Compliance, Cloud Security Alliance's AI Control Matrix, and the Cyber Six Pack for improving vulnerability management. Additionally, they share insights on tools rationalization exercises, such as the cybersecurity murder board, and the importance of aligning tasks with personal values. Tune in for detailed walkthroughs of these innovative resources designed to enhance your cybersecurity strategies without breaking the bank. Templates can be found here: https://www.cisotradecraft.com/freetemplates
A slow-rolling holiday episode featuring CISO at DataSite, Ted Peterson! Transitioning from a Director Role, Ted shares his journey to the CISO title and how his unique background informs his work approach.Tune in for insights on:Realities to navigating organizational leadership as a CISOImportance of diverse perspectives and backgrounds in the security space Establishing pathway to career goalsLike, subscribe, and share with your network to stay informed about the latest in cybersecurity! We want to hear from you! Reach out at unsecurity@frsecure.com and follow us for more:LinkedIn: https://www.linkedin.com/company/frsecure/ Instagram: https://www.instagram.com/frsecureofficial/ Facebook: https://www.facebook.com/frsecure/ BlueSky: https://bsky.app/profile/frsecure.bsky.social About FRSecure: https://frsecure.com/FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start or looking for a team of experts to collaborate with you, we are ready to serve.
In this special year-end episode, Joshua Schmidt revisits the most mind-bending moments from The Audit's 2025 season. From Justin Marciano and Paul Vann demonstrating live deepfakes in real-time (yes, they actually did it on camera) to Bill Harris explaining how Google's quantum experiments suggest parallel universes, to Alex Bratton's urgent warning about the AI adoption crisis happening right now in boardrooms everywhere. What You'll Learn: How adversaries are using free tools to create convincing deepfakes for job interviews and social engineering attacks—and why this represents a national security threat Why NASA shut down its quantum computer after getting results that "challenge contemporary thinking" (and the wild theories circulating about what they discovered) The critical mistake companies are making with AI integration: racing ahead without governance, security frameworks, or responsible use policies How the Pi-hole community exemplifies open-source security at its best—enterprise-grade protection at fractions of the cost Why IT teams saying "no" to AI isn't realistic, and what responsible AI adoption actually looks like This isn't just a recap—it's a wake-up call. These conversations reveal the inflection points where standing still means falling behind. Whether you're a CISO, security analyst, IT auditor, or business leader trying to navigate AI adoption, these clips offer the perspective you need heading into 2026. Don't wait until 2026 to realize you missed the critical shift. Subscribe now for cutting-edge cybersecurity insights that keep you ahead of evolving threats. #cybersecurity #deepfake #quantumcomputing #AI #infosec #ethicalhacking #cyberdefense #2025yearinreview
A inteligência artificial está mudando completamente o jogo da cibersegurança, tanto para quem ataca quanto para quem tenta se defender. No novo relatório Cybersecurity Forecast 2026, o Google Cloud aponta que a IA deixou de ser exceção e passou a ser padrão nas mãos dos cibercriminosos, impulsionando golpes mais sofisticados, deepfakes realistas e ataques em escala. Neste episódio do Podcast Canaltech, Fernanda Santos conversa com Jorge Blanco, Diretor para Ibéria e América Latina no Office of the CISO do Google Cloud, sobre os principais alertas do estudo. A conversa aborda desde o uso de IA em golpes de voz e vídeo, passando pelo risco dos chamados Shadow Agents dentro das empresas, até novos pontos cegos na infraestrutura digital, como ataques à camada de virtualização. O episódio também traz recomendações práticas para empresas e pessoas comuns se protegerem em um cenário cada vez mais complexo, em que phishing, engenharia social e fraudes digitais se tornam mais difíceis de identificar. Você também vai conferir: Samsung anuncia eletrodomésticos com IA Gemini para 2026, chefe do Instagram fala sobre vídeos longos e conteúdo pago e brasileiros ainda usam senhas fracas em 2025, aponta estudo. Este podcast foi roteirizado e apresentado por Fernada Santos e apresentado e contou com reportagens de André Leonardo, João Melo e Lilian Sibila, sob coordenação de Anaísa Catucci. A trilha sonora é de Guilherme Zomer, a edição de Jully Cruz e a arte da capa é de Erick Teixeira.See omnystudio.com/listener for privacy information.
Send us a textOn this week of Serious Privacy, Ralph O'Brien, and Dr. K Royal connect with Charlie Silver of permission.io to discuss data ownership and trackable permission for online data. Of course, while Paul Breitbarth is out, Raph and K cannot help but challenge some of the positions - revoking #consent, #democracy, and #optimism. Somehow, we also wound up discussing #cryptocurrency. Join us.Please subscribe in your favorite podcast app - sharing is caring! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
As we close out 2025 and prepare for 2026, Dr. Eric Cole breaks down what it truly takes to be a world-class CISO in the year ahead. In this episode of Life of a CISO, Dr. Cole shares hard-earned lessons on leadership, health, resilience, and why taking care of yourself is foundational to protecting your organization. From personal reflection to executive-level strategy, this episode goes far beyond technical controls. Dr. Cole then dives deep into the three forces reshaping cybersecurity in 2026: artificial intelligence, cloud reliability, and ransomware, all centered around one core principle that too many organizations ignore: data protection. You will learn why AI is an augmentation tool, not a replacement for humans, how unrestricted AI use is creating massive new risks, why recent cloud outages are a warning sign for every executive, and how CISOs can regain trust, influence, and a permanent seat at the boardroom table. This episode is essential listening for CISOs, security leaders, executives, and anyone responsible for protecting critical data in an increasingly unstable digital world. Part two of this series continues next week.
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-427
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Show Notes: https://securityweekly.com/bsw-427
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-427
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Show Notes: https://securityweekly.com/bsw-427
In the digital era, cybersecurity plays a critical role in business, especially banking, as transactions, data, and customer interactions increasingly rely on technology. Beyond protecting financial and personal information from growing cyber threats, cybersecurity teams help build secure yet seamless systems that enable smooth transactions and support long-term customer trust.When implemented effectively, cybersecurity moves beyond being a passive defense function and becomes a strategic enabler, helping banks improve customer experience and maintain competitiveness in a digital-first environment.To explore this role further, Vietnam Innovators Podcast – Episode 371 features a conversation with Sandro Bucchianeri, Group Chief Security Officer at NAB.With more than 25 years of experience in cybersecurity, including 15 years in executive leadership roles such as CISO and CSO, Sandro has worked with multinational organizations, led global teams, and delivered large-scale strategic transformation programs. Combining deep expertise in risk management, security, and legal frameworks with an innovative mindset, he shares a clear and practical perspective on why cybersecurity matters—not only for organizations, but also for customer trust and experience in the digital age.Listen to this episode on YouTubeAnd explore many amazing articles about the pioneers at: https://vietcetera.com/vn/bo-suu-tap/vietnam-innovatorFeel free to leave any questions or invitations for business cooperation at hello@vni-digest.com
Michael Centrella is the Head of Public Policy at SecurityScorecard. In this episode, he joins host Paul Spaulding and Anton Chuvakin, Security Advisor at Office of the CISO, Google Cloud, to reflect back on 2025 and look ahead to 2026 in terms of cybersecurity. SecurityScorecard's mission is to make the world a safer place by transforming the way organizations understand, mitigate, and communicate cybersecurity risk to their boards, employees, and vendors. Learn more about our sponsor at https://securityscorecard.com
Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Jason Taule, CISO, Luminis Health, and Chris Ray, Field CTO, GigaOm Thanks to our show sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com. All links and the video of this episode can be found on CISO Series.com
Federal agencies are increasingly data-driven, but the challenge lies in integrating, securing and operationalizing vast amounts of information. In this episode, experts explore how AI and analytics are transforming decision-making, enhancing situational awareness and improving mission readiness. Kurt Steege, CTO ThunderCat Technology, Bart Larango, Federal Strategic Industry Advisor at Splunk, Daniel Buchholz, Red Cell Section Chief for the U.S. Department of State and Mark Canter, CISO at the U.S. Government Accountability Office discuss data security risks, ethical AI considerations and real-world use cases where agencies are leveraging AI for operational success.
Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accused of money laundering. SonicWall highlights an exploited zero-day. Researchers earn $320,000 for demonstrating critical remote code execution flaws in cloud infrastructure components. A U.S. Senator urges electronic health record vendors to give patients greater control over who can access their medical data. Our guest is Larry Zorio, CISO from Mark43, discussing first responders and insider cyber risks. A right-to-repair group puts cash on the table. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Larry Zorio, CISO from Mark43, to discuss first responders sounding the alarm on insider cyber risks. To see the full report, check it out here. Selected Reading HPE warns of maximum severity RCE flaw in OneView software (Bleeping Computer) China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear (SecurityWeek) Google Chrome patches two high severity vulnerabilities in emergency update (Beyond Machines) France arrests 22-year-old over Interior Ministry hack (The Record) France arrests Latvian for installing malware on Italian ferry (Bleeping Computer) FBI dismantles alleged $70M crypto laundering operation (The Register) SonicWall Patches Exploited SMA 1000 Zero-Day (SecurityWeek) Zeroday Cloud hacking event awards $320,0000 for 11 zero days (Bleeping Computer) Senator Presses EHR Vendors on Patient Privacy Controls (Govinfosecurity) A nonprofit is paying hackers to unlock devices companies have abandoned (TechSpot) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
All links and images can be found on CISO Series. Check out this post by Binoy Koonammavu of Secusy AI for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is best-selling cybersecurity author Peter Gregory. His upcoming study guide on AI governance can be pre-ordered here. In this episode: Speaking the language of leadership Beyond translation: the trust factor Making risk tangible When translation isn't enough Huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that's easy to manage and built to scale. Stop threats before they execute and reduce operational noise without adding complexity. See how simple prevention can be at ThreatLocker.com/CISO.
In this episode of Life of a CISO, Dr. Eric Cole explains why world-class CISOs must think like chief officers—not technicians. Drawing from boardroom experience and real-world cyber events, he breaks down the three threats executives are most concerned about heading into 2026: ransomware, cloud failures, and AI. Dr. Cole unpacks why the Land Rover Jaguar ransomware attack marked a turning point in cybersecurity, showing how a single breach can impact an entire national economy. He also highlights the growing over-reliance on cloud providers, referencing major AWS and Microsoft outages, and warns that organizations are rolling out AI without understanding data leakage, hallucinations, or business risk. At the core of the discussion is a powerful, concise definition of cybersecurity—and why most organizations still get it wrong. Dr. Cole explains why not knowing your critical data is the root cause behind ransomware exposure, cloud outages, and reckless AI adoption. He closes with what he believes should be the #1 cybersecurity priority for 2026: a complete data and asset inventory. This episode is a must-watch for CISOs, executives, and board members who want clarity, credibility, and control in an increasingly risky digital world.
Send us a textOn this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien, and Dr. K Royal connect with Val Ilchenko, Eric Sendelbach, and Ian Runyon of TrustArc to discuss the launch of the Arc. Join us as we discuss the factors that went into developing the Arc, challenges for privacy and data protection professionals, and how AI is baked in to give professionals the tools they need at their fingertips. Please subscribe in your favorite podcast app - sharing is caring! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Your next security teammate might not be a traditional hire — it could be a Digital Security Teammate (DST),” says Secure.com CEO Uzair Gadit. In this sponsored episode, Uzair explains the concept of a DST and how it differs from an AI SOC. He highlights the operational and business benefits of deploying DST, including improved... Read more »
All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Brett Conlon, CISO, American Century Investments. Joining them are Ryan Barras, CISO, Mount Sinai Medical Center. In this episode: Nobody understands what we do Someone else should fix this Make the audience care Speaking CEO Huge thanks to our sponsor, Dropzone AI Dropzone AI autonomously investigates every security alert—no playbooks needed. This AI SOC analyst queries your CrowdStrike, Splunk, threat intel feeds, and 60+ other tools to build complete investigations in 5 minutes. Unlike black-box automation, it shows every query, finding, and decision. See it work yourself—explore the self-guided demo at dropzone.ai.
Your next security teammate might not be a traditional hire — it could be a Digital Security Teammate (DST),” says Secure.com CEO Uzair Gadit. In this sponsored episode, Uzair explains the concept of a DST and how it differs from an AI SOC. He highlights the operational and business benefits of deploying DST, including improved... Read more »
How has GenAI turned phishing Into a speed war? And what should we do about it? Let's find out with your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates.
Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China's Great Firewall. Across both parts, you break down thousands of leaked documents, source code repositories, diagrams, packet captures, and telemetry that reveal how systems like the Traffic Secure Gateway, MAAT, Redis-based analytics, and modular DPI engines work together to censor, surveil, and fingerprint users at scale. Taken together, the research shows how the Great Firewall functions not just as a technical system, but as a living censorship-industrial complex that adapts, learns, and coordinates across government, telecoms, and security vendors. The research can be found here: Inside the Great Firewall Part 1: The Dump Inside the Great Firewall Part 2: Technical Infrastructure Learn more about your ad choices. Visit megaphone.fm/adchoices
Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China's Great Firewall. Across both parts, you break down thousands of leaked documents, source code repositories, diagrams, packet captures, and telemetry that reveal how systems like the Traffic Secure Gateway, MAAT, Redis-based analytics, and modular DPI engines work together to censor, surveil, and fingerprint users at scale. Taken together, the research shows how the Great Firewall functions not just as a technical system, but as a living censorship-industrial complex that adapts, learns, and coordinates across government, telecoms, and security vendors. The research can be found here: Inside the Great Firewall Part 1: The Dump Inside the Great Firewall Part 2: Technical Infrastructure Learn more about your ad choices. Visit megaphone.fm/adchoices
S1E6: Beyond the 'Department of No': How CISOs are Shaping Healthcare's Future Steven Hajny is joined by Drex DeFord, President of 229 Cyber & Risk at This Week Health and host of “UnHack (the Podcast)” and “Two-Minute Drill.” Together, they discuss the evolving role of the Chief Information Security Officer (CISO) in the healthcare landscape. The conversation highlights how the CISO position has transitioned from an isolated "department of no" to a strategic, executive role that bridges security, technology, and business innovation. Drex offers real-world insights into the growing responsibilities of CISOs, the balance between innovation and protection, and the challenges posed by generative AI and trust issues in an increasingly complex digital world. To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen
All links and images can be found on CISO Series. Check out this post by Nick Nolen of Redpoint Cyber for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Erika Dean, former CSO, Robinhood. In this episode: Delegation requires accountability The reality of daily decision-making The gap between theory and practice Beyond the advisory role Huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that's easy to manage and built to scale. Stop threats before they execute and reduce operational noise without adding complexity. See how simple prevention can be at ThreatLocker.com/CISO
In this powerful episode of Life of a CISO, Dr. Eric Cole shifts the focus from strategy, roadmaps, and organizational security, and puts the spotlight directly on YOU. Instead of asking what you want or why you want it, Dr. Cole explains that the real key to becoming a world-class CISO is asking: Who do you need to become? Dr. Cole breaks down the three types of CISOs, the difference between tactical and true strategic leadership, and what it really means to operate as a corporate officer. From proximity and communication to compensation models, risk tolerance, leadership habits, and even physical health, this episode lays out a blueprint for designing the ultimate version of yourself, the version capable of sitting with executives, influencing business outcomes, and driving organizational success. If you're ready to elevate from technical expert to business leader, this episode will give you the mindset, targets, and tools to build your future.
Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins Business Security Weekly to discuss the security challenges of Salesforce. Justin will discuss how proactive oversight and a strong security posture in Salesforce requires additional capabilities, including: Continuous monitoring of your Salesforce environment, Strict access controls of Salesforce users, and Automated backup of sensitive data. Think your data in Salesforce is safe and secure, think again. This segment is sponsored by AutoRABIT. Visit https://securityweekly.com/autorabit to learn more about them! In the leadership and communications segment, Boards Have a Digital Duty of Care, The CISO's greatest risk? Department leaders quitting, The 15 Habits of Highly Empathetic People, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-425
Send us a textJoin us for a rip-roaring week in privacy on this episode of Serious Privacy, where co-hosts Paul Breitbarth and Dr. K Royal (Ralph O'Brien is off this week) cover quality, not quantity - although there is no shortage of current events. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
AI agents are moving fast, and security teams are scrambling to keep up.Join us as Heather Ceylan, SVP & Chief Information Security Officer at Box, who has spent the last several years leading security teams through rapid change from the explosive growth years at Zoom to her current work shaping Box's AI posture.Heather shares what it actually feels like to run security at a time when agents can be created in minutes, permissions matter more than ever, and governance committees are struggling to keep pace. She explains why treating agents as identities fundamentally changes the model, how MCP servers introduce new exposure points, and why her team is embedding AI directly into SOC work, design reviews, and vulnerability remediation.It's a grounded look at how a CISO makes sense of AI while everything around the role continues to shift.In this episode, you'll learn:Why agents need their own identities and permissions rather than inheriting access from the people who create themHow SOC teams can shift from constant alert triage to real threat hunting with the help of AI agentsHow AI can speed up vulnerability remediation by creating pull requests that engineers only need to review and mergeThings to listen for: (00:00) Meet Heather Ceylan(00:58) Career path from healthcare to Zoom to Box(03:58) Risks of AI agents accessing unstructured content(05:18) Why agent identity and permissions are the new priority(06:50) The challenge of discovering and governing ephemeral agents(08:16) How sandboxes and policies support safe experimentation(09:20) AI governance gaps and the need for dedicated ownership(13:10) Defining AI governance across technical and legal domains(16:17) The rise of MCP servers and new exposure points(18:05) Four AI bets transforming Box's SOC and security workflows(23:31) KPIs and measuring AI's impact on security teams(25:27) Resource trade-offs when adopting AI in security(27:58) Managing the complexity of model selection and trust(29:58) Should companies form dedicated AI security teams?
Organizations worldwide scramble to address the critical React2Shell vulnerability. Major insurers look to exclude artificial intelligence risks from corporate policies. Three Chinese hacking groups converge on the same Sharepoint flaws. Ransomware crews target hypervisors. A UK hospital asks the High Court to block publication of data stolen by the Clop gang. The White House approves additional Nvidia AI chip exports to China. The ICEBlock app creator sues the feds over app store removal. The FBI warns of virtual kidnapping scams. The FTC upholds a ban on a stalkerware maker. Dave Lindner, CISO of Contrast Security, discusses nation-state adversaries targeting source code to infiltrate the government and private sector. Craigslist's founder pledges support for cybersecurity, veterans and pigeons. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Dave Lindner, CISO of Contrast Security, discusses nation-state adversaries targeting source code to infiltrate the government and private sector. Selected Reading Researchers track dozens of organizations affected by React2Shell compromises tied to China's MSS (The Record) Insurers retreat from AI cover as risk of multibillion-dollar claims mounts (Financial Times) Three hacking groups, two vulnerabilities and all eyes on China (The Record) Researchers spot 700 percent increase in hypervisor ransomware attacks (The Register) UK Hospital Asks Court to Stymie Ransomware Data Leak (Bank Infosecurity) Trump says Nvidia can sell more powerful AI chips to China (The Verge) ICEBlock developer sues Trump administration over App Store removal (The Verge) New FBI alert urges vigilance on virtual kidnapping schemes (SC Media) FTC upholds ban on stalkerware founder Scott Zuckerman (TechCrunch) Craigslist founder signs the Giving Pledge, and his fortune will go to military families, fighting cyberattacks—and a pigeon rescue (Fortune) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
As you wind down 2025, what should you be planning to do for 2026? The Heavy Strategy team breaks it down for you with eight resolutions for the new year. From setting an AI strategy to cloud optimization, Johna and John can help you enter the new year prepared for what’s next. Other resolutions include... Read more »
All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Mike Johnson, CISO, Rivian. Joining them is their sponsored guest, Danny Jenkins, CEO, ThreatLocker. In this episode: AI for AI's sake Stop selling, start protecting Stop calling everything sophisticated Least privilege, rebranded Huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that's easy to manage and built to scale. Stop threats before they execute and reduce operational noise without adding complexity. See how simple prevention can be at ThreatLocker.com/CISO.
Transitioning a mature organization from an API-first model to an AI-first model is no small feat. In this episode, Yash Kosaraju, CISO of Sendbird, shares the story of how they pivoted from a traditional chat API platform to an AI agent platform and how security had to evolve to keep up.Yash spoke about the industry's obsession with "Zero Trust," arguing instead for a practical "Multi-Layer Trust" approach that assumes controls will fail . We dive deep into the specific architecture of securing AI agents, including the concept of a "Trust OS," dealing with new incident response definitions (is a wrong AI answer an incident?), and the critical need to secure the bridge between AI agents and customer environments .This episode is packed with actionable advice for AppSec engineers feeling overwhelmed by the speed of AI. Yash shares how his team embeds security engineers into sprint teams for real-time feedback, the importance of "AI CTFs" for security awareness, and why enabling employees with enterprise-grade AI tools is better than blocking them entirely .Questions asked:Guest Socials - Yash's LinkedinPodcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Security PodcastQuestions asked:(00:00) Introduction(02:20) Who is Yash Kosaraju? (CISO at Sendbird)(03:30) Sendbird's Pivot: From Chat API to AI Agent Platform(05:00) Balancing Speed and Security in an AI Transition(06:50) Embedding Security Engineers into AI Sprint Teams(08:20) Threats in the AI Agent World (Data & Vendor Risks)(10:50) Blind Spots: "It's Microsoft, so it must be secure"(12:00) Securing AI Agents vs. AI-Embedded Applications(13:15) The Risk of Agents Making Changes in Customer Environments(14:30) Multi-Layer Trust vs. Zero Trust (Marketing vs. Reality) (17:30) Practical Multi-Layer Security: Device, Browser, Identity, MFA(18:25) What is "Trust OS"? A Foundation for Responsible AI(20:45) Balancing Agent Security vs. Endpoint Security(24:15) AI Incident Response: When an AI Gives a Wrong Answer(29:20) Security for Platform Engineers: Enabling vs. Blocking(30:45) Providing Enterprise AI Tools (Gemini, ChatGPT, Cursor) to Employees(32:45) Building a "Security as Enabler" Culture(36:15) What Questions to Ask AI Vendors (Paying with Data?)(39:20) Personal Use of Corporate AI Accounts(43:30) Using AI to Learn AI (Gemini Conversations)(45:00) The Stress on AppSec Engineers: "I Don't Know What I'm Doing"(48:20) The AI CTF: Gamifying Security Training(50:10) Fun Questions: Outdoors, Team Building, and Indian/Korean Food
⬥EPISODE NOTES⬥Artificial intelligence is reshaping how public health organizations manage data, interpret trends, and support decision-making. In this episode, Sean Martin talks with Jim St. Clair, Vice President of Public Health Systems at a major public health research institute, Altarum, about what AI adoption really looks like across federal, state, and local agencies.Public health continues to face pressure from shifting budgets, aging infrastructure, and growing expectations around timely reporting. Jim highlights how initiatives launched after the pandemic pushed agencies toward modernized systems, new interoperability standards, and a stronger foundation for automated reporting. Interoperability and data accessibility remain central themes, especially as agencies work to retire manual processes and unify fragmented registries, surveillance systems, and reporting pipelines.AI enters the picture as a multiplier rather than a replacement. Jim outlines practical use cases that public health agencies can act on now, from community health communication tools and emergency response coordination to predictive analytics for population health. These approaches support faster interpretation of data, targeted outreach to communities, and improved visibility into ongoing health activity.At the same time, CISOs and security leaders are navigating a new risk environment as agencies explore generative AI, open models, and multi-agent systems. Sean and Jim discuss the importance of applying disciplined data governance, aligning AI with FedRAMP and state-level controls, and ensuring that any model running inside an organization's environment is treated with the same rigor as traditional systems.The conversation closes with a look at where AI is headed. Jim notes that multi-agent frameworks and smaller, purpose-built models will shape the next wave of public health technology. These systems introduce new opportunities for automation and decision support, but also require thoughtful implementation to ensure trust, reliability, and safety.This episode presents a realistic, forward-looking view of how AI can strengthen the future of public health and the cybersecurity responsibilities that follow.⬥GUEST⬥Jim St. Clair, Vice President, Public Health Systems, Altarum | On LinkedIn: https://www.linkedin.com/in/jimstclair/⬥HOST⬥Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥RESOURCES⬥N/A⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast:
As you wind down 2025, what should you be planning to do for 2026? The Heavy Strategy team breaks it down for you with eight resolutions for the new year. From setting an AI strategy to cloud optimization, Johna and John can help you enter the new year prepared for what’s next. Other resolutions include... Read more »
Rob Israel, a versatile leader whose journey spans from the Navy to healthcare leadership, joins us for a compelling discussion on Sales Lead Dog. Rob opens up about the essential principles that have bolstered his career, emphasizing the strength in empowering and supporting team members, surrounding oneself with intelligent peers, and championing employee growth. One notable story features a leader who successfully took a year off from her business, demonstrating the transformative power of trust and autonomy in leadership. Rob shares how these experiences have influenced his current path, transitioning from a Chief Information Officer to embracing the challenges of a sales role, inspired by his father's legacy and his own pursuit of new challenges. Trust and transparency form the bedrock of Rob's approach to sales leadership. Highlighting the importance of honesty, he advises against bluffing when faced with tough questions, advocating instead for a candid approach that builds lasting client relationships. Rob underscores the significance of nurturing these connections even after the sale is complete, ensuring client satisfaction and opening doors for future opportunities. For those stepping into leadership roles, Rob shares insights on leveraging networks for guidance, fostering a culture of learning, and the nuances of understanding team motivators. As we navigate through the evolving landscape of sales, Rob discusses the critical role of AI and CRM systems. While AI holds the promise of revolutionizing efficiency and decision-making, Rob stresses the importance of maintaining the human element and critical thinking in processes. He brings a balanced perspective on CRM systems, acknowledging their potential benefits when used correctly, but also pointing out common pitfalls such as inefficiencies and depersonalization. Rob concludes with optimism about integrating AI to streamline CRM tasks, ultimately enhancing communication and driving sales success. Don't miss the chance to connect with Rob Israel on LinkedIn and explore additional resources shared on our website. Rob Israel is an accomplished sales and cybersecurity leader with a unique blend of executive technology, healthcare, and strategic account expertise. With a career that includes serving as both CIO and CISO in the healthcare sector, Rob brings a deep understanding of clinical, operational, and regulatory realities that few sales leaders possess. This firsthand experience enables him to connect more meaningfully with executive stakeholders and translate complex security challenges into practical, outcome-driven strategies. As a Regional Sales Manager at DeepSeas, Rob partners with enterprise leaders to strengthen their security posture, drive measurable business outcomes, and align world-class threat intelligence and MDR capabilities with each organization's mission. He is known for his customer-first philosophy, trusted-advisor approach, and ability to guide clients through high-stakes decisions with clarity and confidence. Prior to joining DeepSeas, Rob held senior sales leadership roles at industry-leading technology organizations, consistently ranking among top performers and elevating client engagement across complex environments. His earlier tenure as a healthcare CIO and CISO continues to shape his perspective, allowing him to bridge the gap between technology, cybersecurity, and business operations. Outside of work, Rob is an avid hiker, scuba diver, and skier who enjoys exploring the outdoors with his family. He brings the same curiosity, discipline, and sense of adventure to his work helping clients anticipate risk, embrace innovation, and advance their strategic objectives. Rob is an experienced international speaker on both CyberSecurity and Information Technology, and has routinely helped organizations both streamline processes and save money on critical infrastructure programs. Quotes: "Empowering your team means developing them to the point where you can step away, and the business not only survives but thrives." "In sales, honesty and transparency aren't just virtues; they're necessities for building lasting client relationships." "AI has the potential to revolutionize sales efficiency, but we mustn't lose sight of the human element and critical thinking it cannot replace." "To lead effectively, surround yourself with people smarter than you, and always champion their growth and success." "Don't be afraid to admit when you don't know something. It's a sign of strength, not weakness, and it builds trust with your clients." Links: Rob's LinkedIn - https://www.linkedin.com/in/rob-israel-a410831/ Find this episode and all other Sales Lead Dog episodes at https://empellorcrm.com/salesleaddog/
In this episode, Kim Jones sits down with Eric Nagel, a former CISO with a rare blend of engineering, legal, and patent expertise, to unpack what responsible AI really looks like inside a modern enterprise. Eric breaks down the difference between traditional machine learning and generative AI, why nondeterministic outputs can be both powerful and risky, and how issues like bias, hallucinations, and data leakage demand new safeguards—including AI firewalls. He also discusses what smaller organizations can do to manage AI risk, how tools like code-generation models change expectations for developers, and the evolving regulatory landscape shaping how companies must deploy AI responsibly. Want more CISO Perspectives? Check out a companion blog post by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. Learn more about your ad choices. Visit megaphone.fm/adchoices