Podcasts about cybersecurity

The protection of computer systems from theft or damage

  • 11,319PODCASTS
  • 62,125EPISODES
  • 30mAVG DURATION
  • 10+DAILY NEW EPISODES
  • Sep 17, 2025LATEST
cybersecurity

POPULARITY

20172018201920202021202220232024

Categories




    Best podcasts about cybersecurity

    Show all podcasts related to cybersecurity

    Latest podcast episodes about cybersecurity

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Wednesday, September 17th, 2025: Phishing Resistants; More npm Attacks; ChatGPT MCP abuse

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Sep 17, 2025 8:47


    Why You Need Phishing-Resistant Authentication NOW. The recent compromise of a number of high-profile npmjs.com accounts has yet again shown how dangerous a simple phishing email can be. https://isc.sans.edu/diary/Why%20You%20Need%20Phishing%20Resistant%20Authentication%20NOW./32290 S1ngularity/nx Attackers Strike Again A second wave of attacks has hit over a hundred npm-related GitHub repositories. The updated payload implements a worm that propagates itself to other repositories. https://www.aikido.dev/blog/s1ngularity-nx-attackers-strike-again ChatGPT s Calendar Integration Can Be Exploited to Steal Emails ChatGPT s new MCP integration can be used, via prompt injection, to affect software connected to ChatGPT via MCP. https://www.linkedin.com/posts/eito-miyamura-157305121_we-got-chatgpt-to-leak-your-private-email-activity-7372306174253256704-xoX1/

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Tuesday, September 16th, 2025: Apple Updates; Rust Phishing; Samsung 0-day

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Sep 16, 2025 6:42


    Apple Updates Apple released major updates for all of its operating systems. In addition to new features, these updates patch 33 different vulnerabilities. https://isc.sans.edu/diary/Apple%20Updates%20Everything%20-%20iOS%20macOS%2026%20Edition/32286 Microsoft End of Life October 14th, support for Windows 10, Exchange 2016, and Exchange 2019 will end. https://support.microsoft.com/en-us/windows/windows-10-support-ends-on-october-14-2025-2ca8b313-1946-43d3-b55c-2b95b107f281#:~:text=As%20a%20reminder%2C%20Windows%2010,one%20that%20supports%20Windows%2011. https://techcommunity.microsoft.com/blog/exchange/t-9-months-exchange-server-2016-and-exchange-server-2019-end-of-support/4366605 Phishing Targeting Rust Developers Rust developers are reporting similar phishing emails as the emails causing the major NPM compromise last week. https://github.com/rust-lang/crates.io/discussions/11889#discussion-8886064 Samsung Patches 0-Day Samsung released its monthly updates for its flagship phones fixing, among other vulnerability, an already exploited 0-day. https://security.samsungmobile.com/securityUpdate.smsb

    The Tech Blog Writer Podcast
    3422: Meet Symphion and the Print Fleet Cybersecurity as a Service

    The Tech Blog Writer Podcast

    Play Episode Listen Later Sep 16, 2025 21:57


    I've spent years talking about endpoint security, yet printers rarely enter the conversation. Today, that blind spot takes center stage. I'm joined by Jim LaRoe, CEO of Symphion, to unpack why printers now represent one of the most exposed corners of the enterprise and what can be done about it. Jim's team protects fleets that range from a few hundred devices to tens of thousands, and the picture he paints is stark. In many organizations, printers make up 20 to 30 percent of endpoints, and almost all of them are left in a factory default state. That means open ports, default passwords, and little to no monitoring. Pair that with the sensitive data printers receive, process, and store, plus the privileged connections they hold to email and file servers, and you start to see why attackers love them. We trace Symphion's path from a configuration management roots story in 1999 to a pivot in 2015 when a major printer manufacturer invited the company behind the curtain. What they found was a parallel universe to mainstream IT. Brand silos, disparate operating systems, and a culture that treated printers as cost items rather than connected computers. Add in the human factor, where technicians reset devices to factory defaults after service as second nature, and you have a recipe for recurring vulnerabilities that never make it into a SOC dashboard. Jim explains how Symphion's Print Fleet Cybersecurity as a Service tackles this mess with cross-brand software, professional operations, and proven processes delivered for a simple per-device price. The model is designed to remove operational burden from IT teams. Automated daily monitoring detects drift, same-day remediation resets hardened controls, and comprehensive reporting supports regulatory needs in sectors like healthcare where compliance is non-negotiable. The goal is steady cyber hygiene for printers that mirrors what enterprises already expect for servers and PCs, without cobbling together multiple vendor tools, licenses, and extra headcount to operate them. We also talk about the hidden costs of DIY printer security. Licensing multiple management platforms for different brands, training staff who already have full plates, and outages caused by misconfigurations all add up. Jim shares real-world perspectives from organizations that tried to patch together a solution before calling in help. The pattern is familiar. Costs creep. Vulnerabilities reappear. Incidents push the topic onto the CISO's agenda. Symphion's pitch is straightforward. Treat print fleets like any other class of critical infrastructure in the enterprise, and measure outcomes in risk reduction, time saved, and fewer surprises. If you are commuting while listening and now hearing alarm bells, you are not alone. Think about the printers scattered across your offices and clinics. Consider the data that passes through them every day. Then picture an attacker who finds default credentials in minutes and uses a printer to move across your network.  Tune in for a fast, practical look at a risk hiding in plain sight, and learn how Symphion's Print Fleet Cybersecurity as a Service can help you close a gap that attackers know too well. ********* Visit the Sponsor of Tech Talks Network: Land your first job  in tech in 6 months as a Software QA Engineering Bootcamp with Careerist https://crst.co/OGCLA  

    Packet Pushers - Full Podcast Feed
    PP078: Using Free Tools for Detection Engineering

    Packet Pushers - Full Podcast Feed

    Play Episode Listen Later Sep 16, 2025 49:25


    You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management. Matt has over 15 years... Read more »

    Positive Philter Podcast
    Dreams, Shadows, and Service: A Trailblazing Journey in Education (featuring Dr. Emma Violand Sanchez)

    Positive Philter Podcast

    Play Episode Listen Later Sep 16, 2025 57:47


    In this episode of Positive Philter, I sit down with Dr. Emma Violand-Sanchez, a fellow Mount Vernon High School alum, immigrant, and first-generation scholar. Her journey—from arriving in the U.S. as a teenager with limited English to becoming the first Latina to chair a Virginia school board and founding The Dream Project—is nothing short of inspiring. Dr. Violand-Sanchez's story highlights resilience, leadership, and a lifelong commitment to immigrant and refugee communities. This conversation was so impactful that a follow-up episode may be on the horizon. Don't miss it! Shout Outs and Plugs Link to Dr. Emma Violand-Sanchez's Website: emmaviolandsanchez.com Connect with Dr. Emma Violand-Sanchez on LinkedIn: https://www.linkedin.com/in/emmaviolandsanchez/ If you have a question for the podcast call 571-336-6560 or leave a question via this Google Form. Five Minute Journal by Intelligent Change Affiliate Code: https://www.intelligentchange.com/?rfsn=4621464.017186 Tappy Card “Electronic Business Card” Affiliate Code:  https://tappycard.com?ref:philip-wilkerson Please leave a rating/review of the Podcast https://lovethepodcast.com/positivephilter Intro music provided by DJ BIGyoks. Check out his Instagram and Soundcloud channel can be found here:  https://www.instagram.com/beats.byyoks/ https://soundcloud.com/dj-bigyoks Outro music provided by Ryan Rosemond. Check out his Soundcloud channel here: https://soundcloud.com/brothersrosemond/albums  Purchase "Forty Years of Advice" by Philip Wilkerson: https://a.co/d/2qYMlqu Leave Your Feedback by filling out this audience survey: https://forms.gle/ncoNvWxMq2A6Zw2q8 Sign up for Positive Philter Weekly Newsletter: http://eepurl.com/g-LOqL Please follow Positive Philter: Positive Philter Facebook Page Positive Philter Twitter Positive Philter Instagram  If you would like to support the podcast, please consider donating to the Positive Philter Patreon page: https://www.patreon.com/positivephilter Positive Philter was selected by FeedSpot as Top 20 Positive Thinking Podcasts on the web. https://blog.feedspot.com/positive_thinking_podcasts/ Jeff's Anti-Hunger Fund The Positive Philter Podcast is dedicated to Jeff Kirsch. A long-time supporter of the show and a major influence on this show's growth. Please support the careers of future advocates by donating to the Jeff Kirsch Fund for Anti-Hunger Advocacy. This fund was named after Jeff Kirsch for his decades of service in fighting hunger and inequality. Link to fund: https://frac.org/kirschfund Pats for Patriots  If you are a member of the #MasonNation, please consider sending a Pats for Patriots. Pats for Patriots are a free and easy way to thank, recognize, show appreciation for a Mason colleague or student who has taken the time to do something kind, generous or thoughtful towards others. For more information, visit: https://forms.office.com/r/HRZGvhdJEA We have received more than 2,000 nominations from the Mason community so far. Keep those nominations coming in! Steam Pilots, Inc. is a Virginia-based 501(c)(3) tax-exempt organization. Their goal is to improve the state of STEAM education in America. STEAM stands for Science, Technology, Engineering, Art, and Math. They achieve this through pro bono programs delivered to K-12 students and institutions in the Washington, D.C. metropolitan area. Steam Pilots is hoping to raise funds for STEAM kits, supplies, and modest stipends for the interns who work with me. Currently, they have an urgent need for 3D Printers, Robotics Kits, and Cybersecurity teaching tools. Link to GoFundMe:  https://gofund.me/38eeaed2    

    The Just Security Podcast
    What Just Happened: CISA and the Fate of U.S. Cybersecurity

    The Just Security Podcast

    Play Episode Listen Later Sep 16, 2025 27:14


    The Cybersecurity Information Sharing Act (CISA) of 2015 is set to expire at the end of this month on September 30, 2025. The Act removes barriers to companies sharing information about cyber threats, addressing privacy concerns and requires the federal government to share threat information. Many consider CISA one of the foundations of U.S. cybersecurity efforts.   As Congress considers whether or not to reauthorize CISA, former Deputy Assistant Director of the FBI cyber division, Cynthia Kaiser, joins David Aaron to discuss the importance of the legislation and highlight the risks of failing to reauthorize it. Show Note: “The Next Cyber Breach Will Not Wait: Why Congress Must Reauthorize CISA 2015” by Simin Kargar for Just Security  Just Security's CISA coverage Just Security's Cybersecurity coverage

    Packet Pushers - Fat Pipe
    PP078: Using Free Tools for Detection Engineering

    Packet Pushers - Fat Pipe

    Play Episode Listen Later Sep 16, 2025 49:25


    You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management. Matt has over 15 years... Read more »

    Random but Memorable
    How cyber warfare really works with Hayley Benedict | DISRUPT CONFLICT RISK SYSTEM

    Random but Memorable

    Play Episode Listen Later Sep 16, 2025 69:41


    What does cyberwarfare really look like behind the headlines? This week, Roo sits down with Hayley Benedict, a cyber intelligence analyst at RANE, to explore the evolving world of digital conflict. From hacktivists to disinformation specialists, Hayley shares how nation states, criminals, and ideologically driven groups are blurring lines — and why data theft, disruption, and doubt remain the weapons of choice.

    Afternoon Cyber Tea with Ann Johnson
    Modernizing Cybersecurity with Matt Rowe

    Afternoon Cyber Tea with Ann Johnson

    Play Episode Listen Later Sep 16, 2025 32:03


    Matt Rowe, Chief Security Officer at Lloyds Bank, joins Ann on this week's episode of Afternoon Cyber Tea to explore the future of cybersecurity. They discuss the accelerating pace of change in the industry, from AI and automation to data-driven security practices and identity management. Matt shares how Lloyds Bank is modernizing its approach by reducing friction, upskilling teams, and fostering a growth mindset, while also laying foundations for resilience and agility across the financial ecosystem. The conversation highlights why now is the moment to rethink security strategies and how optimism, creativity, and collaboration can help defenders stay ahead.    Resources:   View Matt Rowe on LinkedIn     View Ann Johnson on LinkedIn        Related Microsoft Podcasts:   Microsoft Threat Intelligence Podcast   The BlueHat Podcast    Uncovering Hidden Risks            Discover and follow other Microsoft podcasts at microsoft.com/podcasts       Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of N2K media network.  

    Tech Disruptors
    Cyera's Role in Cybersecurity, Data Protection

    Tech Disruptors

    Play Episode Listen Later Sep 16, 2025 46:08


    Data and identity security continues to grow in importance as enterprises face more sophisticated cyberattacks from expanding AI agents that are expanding their reach and tools. Bloomberg Intelligence's Global Head of Technology Research Mandeep Singh speaks with Cyera cofounder and CEO Yotam Segev about his company's position in the evolving cybersecurity space, especially with more consolidation on the horizon following Palo Alto Network's announced deal for CyberArk and Google's acquisition of Wiz.

    Cybercrime Magazine Podcast
    Cybercrime Wire For Sep. 16, 2025. Ransomware Attack Hits Luxury Retailer Kering. WCYB Digital Radio

    Cybercrime Magazine Podcast

    Play Episode Listen Later Sep 16, 2025 1:22


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    BakerHosts
    Universities and Cybersecurity Incidents

    BakerHosts

    Play Episode Listen Later Sep 16, 2025 26:47


    Counsel Ben Wanger from BakerHostetler's Digital Risk Advisory and Cybersecurity team is joined by Paul Davis (AJ Gallagher) and Tom O'Neill (Assured Partners) to discuss the resources available to universities in preparing for and dealing with cybersecurity incidents. Questions & Comments: bwanger@bakerlaw.com

    IoT Security Podcast
    Hacking Culture, Community, and Curiosity: Evolving Security Research in a Modern World

    IoT Security Podcast

    Play Episode Listen Later Sep 16, 2025 36:01


    The dynamic evolution of hacker culture, the ongoing transformation of cybersecurity conferences, and the importance of resilience and curiosity among security researchers are all topics covered in this episode through stories of past and present with Dhillon Kannabhiran, CEO and Founder of Hack In The Box (HITB) and Out Of The Box.  He and Phillip Wylie examine the shift from open knowledge sharing and exploration to the monetization and commercialization of cybersecurity exploits. Dhillon offers insights into the unique approaches Hack In The Box and Out of the Box conferences have taken, encouraging people the valuing of persistence and the collaborative spirit that push the community forward.Dhillon Kannabhiran on LinkedIn: https://www.linkedin.com/in/l33tdawg/Dhillon Kannabhiran on X: https://x.com/l33tdawgKey Points/Topics Covered:Evolution of hacker culture and the foundational role of resilience and curiosityHistory, mission, and format of Hack In The Box and Out of the Box conferencesShifts in conference and research communities post-COVID and the influence of commercialization on sharingThe continuing need for community, knowledge sharing, and supporting new talent in cybersecurityThe changing landscape of security research and bug hunting with the advent of AI and new technology Let's connect about IoT Security!Follow Phillip Wylie at https://www.linkedin.com/in/phillipwyliehttps://youtube.com/@phillipwylieThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonAllow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform at https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Monday, September 15th, 2025: More Archives; Salesforce Attacks; White Cobra; BSides Augusta

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Sep 15, 2025 6:06


    Web Searches For Archives Didier observed additional file types being searched for as attackers continue to focus on archive files as they spider web pages https://isc.sans.edu/diary/Web%20Searches%20For%20Archives/32282 FBI Flash Alert: Salesforce Attacks The FBI is alerting users of Salesforce of two different threat actors targeting Salesforce. There are no new vulnerabilities disclosed, but the initial access usually takes advantage of social engineering or leaked data from the Salesdrift compromise. https://www.ic3.gov/CSA/2025/250912.pdf VSCode Cursor Extensions Malware Koe Security unmasked details about a recent malicious cursor extension campaign they call White Cobra. https://www.koi.security/blog/whitecobra-vscode-cursor-extensions-malware BSides Augusta https://bsidesaugusta.org/

    Cyber Security Today
    NPM Attack Leave Hackers Empty Handed: Cybersecurity Today with David Shipley

    Cyber Security Today

    Play Episode Listen Later Sep 15, 2025 8:40 Transcription Available


    Cybersecurity Today: NPM Attack, Void Proxy Phishing, and Major Business Disruptions In this episode of Cybersecurity Today, host David Shipley discusses a recent massive NPM attack that, despite causing significant disruption, left hackers with minimal gains. We also cover a new, highly sophisticated phishing service called Void Proxy, which targets Microsoft and Google accounts. Additionally, we delve into the severe repercussions of cyber attacks on major companies like Jaguar Land Rover and Marks and Spencer, highlighting the wide-ranging impacts on supply chains and leadership. Join us for the latest updates and insights from the world of cybersecurity. 00:00 Introduction and Headlines 00:35 Massive NPM Attack: What Happened? 02:53 Void Proxy: A New Phishing Threat 05:31 Jaguar Land Rover Cyber Attack Impact 06:59 Marks and Spencer Leadership Change 08:04 Conclusion and Final Thoughts

    The Daily Scoop Podcast
    ​​DHS watchdog finds mismanagement in cyber talent program; Pentagon CIO working to break down disparate IT networks

    The Daily Scoop Podcast

    Play Episode Listen Later Sep 15, 2025 4:39


    The Department of Homeland Security failed to effectively implement a critical retention incentive program for cyber talent, according to a new report from the agency's inspector general, which found that federal funds meant for the Cybersecurity and Infrastructure Security Agency were used incorrectly. In 2015, the agency implemented the Cyber Incentive program. The goal, the inspector general said, was to provide extra incentives to employees that might otherwise leave the federal government. More than $100 million has been spent on the program in recent years. The program “was designed to help CISA retain mission-critical cybersecurity talent needed to execute its mission,” the report noted, and was meant to consider a series of qualifications to guide who received the retention benefit. The government hoped to keep in-demand technology experts in government. The watchdog wrote that “CISA's implementation of the program wasted taxpayer funds and invites the risk of attrition of cyber talent, thereby leaving CISA unable to adequately protect the Nation from cyber threats.” Instead of being targeted toward valuable talent likely to transition to the private sector, the payments were disbursed generally, with many ineligible employees receiving tens of thousands of dollars in payment. The Pentagon's chief information officer is undertaking yet another reform of the Defense Department's IT enterprise — this time focusing on streamlining its classified networks to enhance data sharing and interoperability. Katie Arrington, who is performing the duties of CIO, plans to introduce a new program dubbed “Mission Network-as-a-Service” that aims to reduce the number of disparate data fabrics used by combatant commands into a single, unified network. Speaking last week during the Billington Cybersecurity Summit, Arrington said the program will be key to realizing the department's vision for Combined Joint All-Domain Command and Control, or CJADC2. Broadly speaking, CJADC2 seeks to connect the U.S. military's sensors and weapons under a single network, enabling rapid data transfer between warfighting systems and domains. The Pentagon also wants to be able to quickly share relevant information with international partners and allies during conflicts, adding another layer of difficulty to realizing the construct. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast  on Apple Podcasts, Soundcloud, Spotify and YouTube.

    CISO Tradecraft
    #250 - Understanding Vulnerabilities, Exploits, and Cybersecurity

    CISO Tradecraft

    Play Episode Listen Later Sep 15, 2025 46:48 Transcription Available


    Join host G Mark Hardy on CISO Tradecraft as he welcomes Patrick Garrity from VulnCheck and Tod Beardsley from Run Zero to discuss the latest in cybersecurity vulnerabilities, exploits, and defense strategies. Learn about their backgrounds, the complexities of security research, and strategies for effective communication within enterprises. The discussion delves into vulnerabilities, the significant risks posed by ransomware, and actionable steps for CISOs and security executives to protect their organizations. Stay tuned for invaluable insights on cybersecurity leadership and management.  Chapters 00:00 Introduction and Guest Welcome 00:57 Meet Patrick Garrity: Security Researcher and Skateboard Enthusiast 02:12 Meet Todd Beardsley: From Hacker to Security Research VP 03:58 The Evolution of Vulnerabilities and Patching 07:06 Understanding CVE Numbering and Exploitation 14:01 The Role of Attribution in Cybersecurity 16:48 Cyber Warfare and Global Threat Landscape 20:18 The Rise of International Hacking 22:01 Delegation of Duties in Offensive Warfare 22:25 The Role of Companies in Cyber Defense 23:00 Attack Vectors and Exploits 24:25 Real-World Scenarios and Threats 28:46 The Importance of Communication Skills for CISOs 31:42 Ransomware: A Divisive Topic 38:39 Actionable Steps for Security Executives 45:58 Conclusion and Final Thoughts

    Cybercrime Magazine Podcast
    Cybercrime Wire For Sep. 15, 2025. Ransomware Attack On Uvalde Schools In Texas. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Sep 15, 2025 1:17


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    The Shared Security Show
    Best of Shared Security (2020) History Repeats Itself: Cybersecurity Challenges that Still Haunt Us

    The Shared Security Show

    Play Episode Listen Later Sep 15, 2025 5:29


    In this “best of” episode of the Shared Security Podcast, we revisit a discussion from September 2020 that's just as relevant today as it was then. First, we cover how ransomware attacks forced several school districts—including Hartford, CT and Toledo, OH—to delay or shut down classes on the very first day of school. Then we […] The post Best of Shared Security (2020) History Repeats Itself: Cybersecurity Challenges that Still Haunt Us appeared first on Shared Security Podcast.

    Security Unfiltered
    Hack Your Way to Achievement: One Small Step at a Time

    Security Unfiltered

    Play Episode Listen Later Sep 15, 2025 42:50 Transcription Available


    Send us a textTed Harrington shares insights about achieving difficult goals through disciplined habits rather than relying on fleeting inspiration. He explains how the hacker mindset—being curious, non-conforming, committed, and creative—can help anyone overcome challenges and find overlooked opportunities.• Breaking big goals into smaller, manageable pieces makes difficult tasks achievable• Inspiration only gets you started; habits and consistency are what help you finish• The four traits of the hacker mindset: curiosity, non-conformity, commitment, and creativity• Focus on genuinely helping others rather than self-promotion in professional interactions• Applying the hacker mindset can reveal opportunities others miss in any field• AI is changing both attack and defense strategies in cybersecurity, but fundamental principles remain the sameCheck out Ted's new book "Inner Hacker" to learn how to apply the hacker mindset to achieve your own goals and find hidden opportunities in your life.Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonAllow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform at https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    Inside the Network
    Sumit Dhawan: Leading Proofpoint's AI evolution and building toward $5B in ARR

    Inside the Network

    Play Episode Listen Later Sep 15, 2025 53:58 Transcription Available


    In this episode of Inside the Network, we sit down with Sumit Dhawan, CEO of Proofpoint, one of the largest private cybersecurity companies in the world. With over $2 billion in ARR, Proofpoint protects 85 of the Fortune 100 and is on a bold path toward $5 billion in revenue by 2030.Sumit's journey is a masterclass in modern leadership. Having graduated with degrees in engineering and business from IIT Roorkee, the University of Minnesota, and the University of Florida, Sumit led major business lines at Citrix and VMware, including overseeing VMware's $70 billion divestiture to Broadcom, before making the leap to cybersecurity. In 2023, he joined Proofpoint as CEO and began executing an ambitious strategy: consolidate the sprawl of human-centric security, go deep instead of broad, and prepare the company for its next chapter of growth.In our conversation, Sumit shares why he believes empathy is the most underrated CEO trait, how acting like a founder, even inside large enterprises, shaped his leadership, and what it means to have “Apple Watch governance” under Thoma Bravo. He explains how Proofpoint has evolved from email security leader to a broader platform for human and data protection, including its acquisitions of Tessian (AI-native email protection), Hornetsecurity (MSP-focused email security), and Normalyze (DSPM).Sumit also pulls back the curtain on the AI threat landscape, including how prompt injection attacks are already targeting copilots and agents, why AI is both supercharging attackers and empowering defenders, and how Proofpoint built intent-based detection models to defend against sophisticated zero-link phishing. Finally, he lays out three categories of viable cybersecurity startups today: gap-fillers, AI defenders, and category disruptors, and why the last two are more likely to be successful.Whether you're scaling a cyber startup, selling into the enterprise, or navigating PE-backed growth, this episode is full of hard-earned wisdom from a leader who's operated at every level of the stack.

    Tech Gumbo
    Computer Literacy I 2025, UK Ransomware Ban Plans, Cybersecurity Concierges, Windows 10's $7B Price Tag

    Tech Gumbo

    Play Episode Listen Later Sep 15, 2025 22:05


    News and Updates: In 2025, “computer literacy” means more than navigating systems — it's about collaborating with AI, exercising critical thinking, and adapting to rapid change. While most job postings still only ask for basic skills, AI fluency is emerging as the new digital divide. Experts warn that overreliance on tools like ChatGPT risks eroding foundational skills, but argue AI can strengthen capability when paired with judgment and training. Continuous upskilling is now seen as essential for career resilience. The UK government is consulting on legislation to ban ransomware payments by the public sector and critical national infrastructure, alongside mandatory reporting for other organizations. The goal is to disrupt cybercriminals' business model and improve intelligence sharing. While 72% of respondents back the ban, experts warn it could push attacks toward private firms, raise remediation costs, and leave public bodies vulnerable unless security investments increase. Wealthy and high-profile individuals are turning to “cybersecurity concierges” — digital bodyguards offering tailored protection against hacking, identity theft, and reputational risk. Services range from $1,000 to $50,000+ per year and often include data scrubbing, dark-web monitoring, and personalized cyber hygiene plans. While some argue similar protection can be achieved with off-the-shelf tools, demand is rising as clients seek peace of mind and 24/7 access to experts. Enterprises clinging to Windows 10 face steep costs as Microsoft phases out support. Nexthink research shows extended support could exceed $7.3 billion globally, with fees starting at $61 per device in year one and doubling annually. Despite a 33% drop in Windows 10 usage this summer, 121 million devices may still run it after the October 14 cutoff. Analysts warn delays heighten security risks and create fragmented employee experiences, urging businesses to accelerate upgrades.

    The Jason Cavness Experience

    Sponsored by Sentry Computing Keeping the technology essential to your business safe and performing optimally can be challenging! With Sentry Computing — the IT partner of choice for businesses of all sizes — you get thoughtful human interaction and innovative professional IT services. Boost productivity and eliminate financial risks with Managed IT, Cybersecurity, AI Consulting, Cloud Consulting, and Business Automation.

    Technology Tap
    Cybersecurity Fundamentals : Hacking Humans: The Art of Social Engineering Chapter 2 Part 2

    Technology Tap

    Play Episode Listen Later Sep 14, 2025 23:16 Transcription Available


    professorjrod@gmail.comCybersecurity isn't just about firewalls and antivirus software—it's about understanding the complex interplay between technical systems and human psychology. In this continuation of our Security+ series, we explore the multifaceted world of attack surfaces, threat vectors, and social engineering techniques that cybercriminals employ.We start by breaking down what constitutes an attack surface—those vulnerable points where unauthorized users might attempt to breach your systems. From physical hardware and network components to applications and human elements, each represents a potential entry point for attackers. We then explore the pathways attackers use to exploit these vulnerabilities, from vulnerable software and network vectors to more devious approaches like lure-based and message-based vectors.The episode takes a deep dive into social engineering—the art of manipulating human behavior rather than exploiting technical flaws. Through real-world examples, including my own experience with an attempted password reset scam, we demonstrate how attackers use techniques like impersonation, pretexting, phishing, and business email compromise to bypass even the most sophisticated security systems. One of my students shared how his sister's company lost $10,000 when an attacker impersonated the vacationing CEO and requested a wire transfer—a stark reminder that human vulnerabilities often pose the greatest security risk.Whether you're studying for Security+ certification or simply want to better protect yourself and your organization, this episode provides essential insights into the psychological aspects of cybersecurity. Understanding these concepts is crucial not just for IT professionals, but for everyone who uses digital technology. Have you ever encountered a social engineering attempt? How did you recognize and respond to it?Support the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

    Aperture: A Claroty Podcast
    Bob Maley on Resource Challenges in Cybersecurity

    Aperture: A Claroty Podcast

    Play Episode Listen Later Sep 14, 2025 32:41


    Bob Maley, Chief Security Officer at Black Kite and former CISO for the Commonwealth of Pennsylvania, joins the Nexus Podcast to discuss how critical infrastructure operators and state and local governments are meeting cybersecurity resourcing challenges. Whether it's budgets, workforce shortages, or technical debt, security leaders are facing volatile times in protecting critical sectors. Listen and subscribe to the Nexus Podcast.

    Cyber Security Today
    The Godfather of Zero Trust - A Discussion with John Kindervag

    Cyber Security Today

    Play Episode Listen Later Sep 13, 2025 59:42 Transcription Available


    Inside Zero Trust: John Kindervag and the Evolution of Cybersecurity In this episode of Cybersecurity Today: Weekend Edition, host Jim Love speaks with John Kindervag, the pioneer behind the Zero Trust model of cybersecurity. With over 25 years of industry experience, John delves into how the concept originated from his early work with firewalls, advocating for a system where no packet is trusted by default. He discusses the fundamental principles of Zero Trust, including defining protect surfaces, mapping transaction flows, and implementing microsegmentation. The conversation also touches on overcoming cultural and organizational challenges in cybersecurity, the inadequacies of traditional risk models, and adapting Zero Trust methodologies in the evolving landscape, including AI. Through thoughtful discourse and practical insights, John underscores the importance of strategic and tactical implementations in building resilient and secure systems. 00:00 Introduction to Cybersecurity Today 00:25 Meet John Kindervag: The Godfather of Zero Trust 01:50 The Birth of Zero Trust 04:08 Challenges and Evolution of Zero Trust 06:03 From Forrester to Practical Implementations 11:40 The Concept of Protect Surfaces 17:30 Risk vs. Danger in Cybersecurity 30:54 Farmers and Technology 31:48 The Importance of IT in Business 32:26 Introduction to Zero Trust 32:41 Five Steps to Zero Trust 33:14 Mapping Transaction Flows 34:25 Custom Architecture for Zero Trust 34:55 Defining Policies with the Kipling Method 36:04 Monitoring and Maintaining Zero Trust 36:28 The Concept of Anti-Fragile Systems 38:47 Challenges and Success Stories in Zero Trust 42:02 Microsegmentation and Protect Surfaces 45:39 AI and Zero Trust 49:22 Advice for Implementing Zero Trust 50:37 Military Insights and Decision Making 57:19 The Future of Zero Trust 59:07 Conclusion and Final Thoughts

    Cybercrime Magazine Podcast
    Cybercrime Wire For Sep. 13-14, 2025. Weekend Update. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Sep 13, 2025 1:01


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    Thoughts on the Market
    How Cybersecurity Is Reshaping Portfolios

    Thoughts on the Market

    Play Episode Listen Later Sep 12, 2025 3:40


    Online crime is accelerating, making cybersecurity a fast-growing and resilient investment opportunity. Our Cybersecurity and Network and Equipment analyst Meta Marshall discusses the key trends driving this market shift.Read more insights from Morgan Stanley.----- Transcript ----- Welcome to Thoughts on the Market. I'm Meta Marshall, Morgan Stanley's Cybersecurity and Network and Equipment Analyst. Today – the future of digital defense against cybercrime. It's Friday, September 12th, at 10am in New York.Imagine waking up to find your bank account drained, your business operations frozen, or your personal data exposed – all because of a cyberattack. Today, cybersecurity isn't an esoteric tech issue. It impacts all of us, both as consumers and investors. As the digital landscape grows increasingly complex, the scale and severity of cybercrime expand in tandem. This means that even as companies spend more, the risks are multiplying even faster. For investors, this is both a warning and an opportunity.Cybersecurity is now a $270 billion market. And we expect it to grow at 12 percent per year through 2028. That's one of the fastest growth rates across software. And here's another number worth noting: Chief Information Officers we surveyed expect cybersecurity spending to grow 50 percent faster than software spending as a whole. This makes cybersecurity the most defensive area of IT budgets—meaning it's least likely to be cut, even in tough times.This hasn't been lost on investors. Security software has outperformed the broader market, and over the past three years, security stocks have delivered a 58 percent return, compared to just 22 percent for software overall and 79 percent for the NASDAQ. We expect this outperformance against software to continue as AI expands the number of ways hackers can get in and the ways those threats are evolving.Looking ahead, we see a handful of interconnected mega themes driving investment opportunities in cybersecurity. One of the biggest is platformization – consolidating security tools into a unified platform. Today, major companies juggle on average 130 different cyber security tools. This approach often creates complexity, not clarity, and can leave dangerous gaps in protection particularly as the rise of connected devices like robots and drones is making unified security platforms more important than ever.And something else to keep in mind: right now, security investments make up only 1 percent of overall AI spending, compared to 6 percent of total IT budgets—so there's a lot of room to grow as AI becomes ever more central to business operations. In today's cybersecurity race, it's not enough to simply pile on more tools or chase the latest buzzwords. We think some of the biggest potential winners are cybersecurity providers who can turn chaos into clarity. In addition to growing revenue and free cash flow, these businesses are weaving together fragmented defenses into unified, easy-to-manage platforms. They want to get smarter, faster, and more resilient – not just bigger. They understand that it's key to cut through the noise, make systems work seamlessly together, and adapt on a dime as new threats emerge. In cybersecurity, complexity is the enemy—and simplicity is the new superpower. Thanks for listening. If you enjoy the show, please leave us a review wherever you listen and share Thoughts on the Market with a friend or colleague today.

    The CyberWire
    WhatsAppened to Samsung?

    The CyberWire

    Play Episode Listen Later Sep 12, 2025 27:36


    Samsung patches a critical Android zero-day vulnerability. Microsoft resolves a global Exchange Online outage. CISA reaffirms its commitment to the CVE program. California passes a bill requiring web browsers to let users automatically send opt-out signals. Apple issues spyware attack warnings. The FTC opens an investigation into AI chatbots on how they protect children and teens. A hacker convicted of attempting to extort more than 20,000 psychotherapy patients is free on appeal. Our guest is Dave Lewis, Global Advisory CISO at 1Password, discussing how security leaders can protect M&A deal value and integrity. Schools face insider threats from students. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today's guest is Dave Lewis, Global Advisory CISO at 1Password, discussing how security leaders can protect deal value and integrity.Selected Reading Samsung patches actively exploited zero-day reported by WhatsApp (Bleeping Computer) Microsoft fixes Exchange Online outage affecting users worldwide (Bleeping Computer) CISA looks to partners to shore up the future of the CVE Program (Help Net Security) California legislature passes bill forcing web browsers to let consumers automatically opt out of data sharing (The Record) Apple warns customers targeted in recent spyware attacks (Bleeping Computer) FTC to AI Companies: Tell Us How You Protect Teens and Kids Who Use AI Companions (CNET) Defence, Space and Cybersecurity. Why the General Assembly in Frascati matters (Decode39) DSEI Takeaways: Space and Cyber and the Invisible Front Line (Via Satellite)  Hacker convicted of extorting 20,000 psychotherapy victims walks free during appeal (The Record) Children hacking their own schools for 'fun', watchdog warns (BBC) - kicker Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Friday, September 12th, 2025: DShield SIEM Update; Another Sonicwall Warning; Website Keystroke Logging

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Sep 12, 2025 6:38


    DShield SIEM Docker Updates Guy updated the DShield SIEM which graphically summarizes what is happening inside your honeypot. https://isc.sans.edu/diary/DShield%20SIEM%20Docker%20Updates/32276 Again: Sonicwall SSL VPN Compromises The Australian Government s Signals Directorate noted an increase in compromised Sonicwall devices. https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/ongoing-active-exploitation-of-sonicwall-ssl-vpns-in-australia Website Keystroke Logging Many websites log every keystroke, not just data submitted in forms. https://arxiv.org/pdf/2508.19825

    ITSPmagazine | Technology. Cybersecurity. Society
    The Problem With Threat Modeling in Application Security: Too Slow, Too Theoretical, Not Agile | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 2 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Sep 12, 2025 3:58


    Threat modeling is often called the foundation of secure software design—anticipating attackers, uncovering flaws, and embedding resilience before a single line of code is written. But does it really work in practice?In this episode of AppSec Contradictions, Sean Martin explores why threat modeling so often fails to deliver:It's treated as a one-time exercise, not a continuous processResearch shows teams who put risk first discover 2x more high-priority threatsYet fewer than 4 in 10 organizations use systematic threat modeling at scaleDrawing on insights from SANS, Forrester, and Gartner, Sean breaks down the gap between theory and reality—and why evolving our processes, not just our models, is the only path forward.

    The Automotive Troublemaker w/ Paul J Daly and Kyle Mountsier
    The State of Dealership Cybersecurity, Chevy's EV Affordability, 100 Years of Goodyear's Blimp

    The Automotive Troublemaker w/ Paul J Daly and Kyle Mountsier

    Play Episode Listen Later Sep 12, 2025 13:51


    Shoot us a Text.Episode #1144: Dealers face rising cyber threats, Chevy launches big EV incentives, and the Goodyear Blimp marks 100 years over Detroit.Show Notes with links:Proton Dealership IT's Cybersecurity 2025 report shows auto retailers are still being hit hard by organized cyberattacks. Activity remains 150–250% higher than before mid-2024's massive outage, with new tactics targeting dealership websites, employees, and customer data.December 2024 saw a 110% year-over-year increase in dealership cyberattacks.A March 2025 supply chain breach slipped malware into dealership website photos.Criminals time attacks around holidays and off-hours, boosting ransom success.Stolen passwords and remote access put payroll, banking, and OEM systems at risk.Proton urges dealers to enforce MFA, deploy Managed Detection & Response, and train staff against phishing.“Attacks are targeting dealerships every single day. How well those dealerships are protected makes a difference,” Proton warns.Chevrolet is going all-in on affordability this month with new incentives across its Equinox, Blazer, and Silverado EVs—just in time before the federal EV tax credit dries up.The Equinox EV, dubbed “America's most affordable 315+ mile range EV,” now leases for as low as $249/month.Chevy is offering up to $3,000 in customer cash on the Equinox and up to $4,000 on the Silverado EV.Costco members can save an additional $1,250 on top of existing offers.Financing deals include 0% APR for 60 months or the $7,500 tax credit applied at the point of sale.Senior Vice President and President, North America, Duncan Aldred: “We will almost certainly see a smaller EV market for a while, and we won't overproduce. Still, we believe GM can continue to grow EV market share.”​​If you spotted the Goodyear Blimp flying over Detroit this week, it wasn't covering a touchdown or home run—it was celebrating a milestone.The Goodyear Blimp “Wingfoot One” was in town for the 2025 Automotive News Congress in Detroit.Goodyear and Automotive News are both celebrating their 100th anniversaries this year.Rides were offered to Congress attendees from Willow Run Airport on Sept. 10. And on Sept. 11, the blimp soared over the city in honor of the industry event.Join Paul J Daly and Kyle Mountsier every morning for the Automotive State of the Union podcast as they connect the dots across car dealerships, retail trends, emerging tech like AI, and cultural shifts—bringing clarity, speed, and people-first insight to automotive leaders navigating a rapidly changing industry.Get the Daily Push Back email at https://www.asotu.com/ JOIN the conversation on LinkedIn at: https://www.linkedin.com/company/asotu/

    T-Minus Space Daily
    ESA pushes for space, defense, and cybersecurity autonomy.

    T-Minus Space Daily

    Play Episode Listen Later Sep 12, 2025 24:11


    The European Space Agency's (ESA's) Director General (DG) Josef Aschbacher delivered the opening remarks at the ‘General Assembly Defence, Space and Cybersecurity'. Satlink is partnering with Rivada Space Networks to provide a network with the necessary security and performance to support Spanish enterprises and Defense Forces. Armada AI and Sophia Space have launched a fully integrated Earth-to-space scalable compute infrastructure platform, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. T-Minus Guest Elysia Segal brings us the Space Traffic Report from NASASpaceflight.com. Selected Reading ESA Director General's opening remarks at the General Assembly on Defence, Space & Cybersecurity Satlink Partners with Rivada for Next Generation Defense Connectivity Armada and Sophia Space Unveil First-Of-Its-Kind, Fully Integrated Earth-to-Space Edge AI Platform Slingshot LinkedIn Post Redwire Establishes Rapid Capabilities Facility in Albuquerque to Advance Space-Based Defense Systems ReOrbit, a Leading Provider of Sovereign Satellites and Connected Systems, Expands into the United Kingdom DSEI Takeaways: Space and Cyber and the Invisible Front Line Intellian and Eutelsat Developing Ultra-Portable Military-Grade LEO Manpack Terminal Planet Releases First Light Image From Pelican-3; Multiple Pelican Launches Slated for the Next Year Telekom Srbija Expands and Extends Partnership with SES Share your feedback. What do you think about T-Minus Space Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

    Cybercrime Magazine Podcast
    Cybercrime News For Sep. 12, 2025. Cyberattack Hits Vietnam Nat'l Credit Center. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Sep 12, 2025 1:10


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    Cybercrime Magazine Podcast
    Ransomware Minute. Hackers to Use Stolen Art for AI. Scott Schober, WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Sep 12, 2025 3:12


    The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.

    Cybercrime Magazine Podcast
    Life Of A Cybersecurity Czar. Understanding Risk. Dr Eric Cole, Secure Anchor

    Cybercrime Magazine Podcast

    Play Episode Listen Later Sep 12, 2025 16:45


    A world renowned cybersecurity expert with more than 30 years of network security experience, Dr. Eric Cole – founder and CEO of Secure Anchor – helps organizations curtail the risk of cyber threats. He has worked with a variety of clients ranging from Fortune 50 companies, to top international banks, to the CIA, for which he was a professional hacker. In this episode, Dr. Cole and host Scott Schober discuss risk, including why it's misunderstood, how cyber risk differs from business risk, and more. To learn more about our sponsor, visit https://drericcole.org

    DisrupTV
    Chip-Level Security: How Hackers, AI Risks & Space Cybersecurity Threaten Enterprises | Ep. 410

    DisrupTV

    Play Episode Listen Later Sep 12, 2025 49:00


    Why listen: Critical vulnerabilities are lurking in the chips that power our devices, AI isn't just a tool—it's a weapon, and space-based systems are now front-lines in the war for cyber dominance. If you care about enterprise security, national infrastructure, or future tech risk, this conversation will change the way you think. In this episode, you'll discover: What chip-level vulnerabilities really mean for enterprise security—and how one weak link can compromise entire systems The double-edged nature of AI: how it can strengthen defenses and create new attack vectors Emerging threats in space cybersecurity, including satellite networks, communication infrastructure, and regulatory gaps Concrete strategies from experts for anticipating and mitigating these risks Featuring Angela Brescia (CEO, Synderys), Trent Teyema (Founder & President, CSG Strategies), and Dr. David Bray (Distinguished Chair, Accelerator, Stimson Center) — leaders at the intersection of tech, defense, and policy. Tune in every Friday at 11 AM PT / 2 PM ET for DisrupTV — your weekly deep dive into enterprise technology, innovation, and digital transformation. If you find value in this episode, please subscribe, rate & review, and share with someone who cares about the future of security.

    CRECo.ai's FriedonTech Meets FriedOnBusiness
    PRACTICAL AI GUIDE ON THE OPPORTUNITY AND RISKS FOR REAL ESTATE, CYBER SECURITY AND MARKETING

    CRECo.ai's FriedonTech Meets FriedOnBusiness

    Play Episode Listen Later Sep 12, 2025 61:05


    Send us a textJoin us as we unpack the rapid pace of AI-driven change across real estate, cybersecurity, and marketing operations. Everything you need to know from opportunity and risk: AI accelerates productivity and compliance, while simultaneously amplifying cyber threats and data misuse vectors.ABOUT: CRECo.ai Roundtable is a premier  live-streamed industry podcast showcasing the latest trends and transformations across commercial real estate. Hosted by top innovators and technology pioneers—including Andreas Senie, Saul Klein, Rebekah Carlson, Darren Hayes, Chris Abel, and Dan Wagner—the show provides unmatched, actionable insights on technology, brokerage, marketing, government policy, capital, construction, and cybersecurity in the real estate space.## Our Roundtable HostsAndreas Senie: Third-generation developer, founder of CRE Collaborative Inc., and experienced broker. Known for enabling agent success and deploying advanced real estate tech across CT, NY, and MA.Saul Klein: CEO of San Diego MLS, tech pioneer, nationally recognized “Internet Evangelist,” and founding executive at REALTOR.com. Advocates for cross-market collaboration and data transparency.Rebekah Carlson: CEO of Carlson Integrated, expert in real estate marketing and strategic communications, former NICAR president.Professor Darren Hayes: Cybersecurity expert, forensic computer examiner, and founder of Code Detectives. Advises on digital investigations and best practices in real estate security.Professor Darren Hayes, a nationally acclaimed forensic computer examiner and cybersecurity specialist, safeguards real estate clients and organizations against digital threats. As founder of Code Detectives, frequent federal expert witness, and media commentator, Darren brings unmatched expertise in digital forensics and security policy. He advises on both civil and criminal investigations, shaping best practices to protect sensitive commercial real estate information against an ever-evolving threat landscape.ABOUT: CRECo .ai Roundtable Each episode delivers actionable insights on technology, brokerage, government policy, construction, capital flows,  and cybersecurity essentials—all via a unique three-part format.- Industry introductions and updates from sector leaders- In-depth focus on recent news, innovations, and paradigm shifts- Practical takeaways—what these changes mean for real estate professionals and businesses in the next 30 days- This three-part show consists of:- Part I: Introductions and what's new for each panelist and the business sector- Part II: Sector Focus on the past month's most prominent news and paradigm shifts- Part III: What does all this mean for real estate businesses, and what you can do for the next 30 days- Learn more at [https://welcome.creco.ai/reroundtable]Replays also available on Youtube, LinkedIn, Facebook, TwitterPlease share, rate and review us it really does help!Don't forget to subscribe to our YouTube channel where there is a host of additional great content and to visit CRECo.ai the Commercial Real Estate Industry's all-in-one dashboard to connect, research, execute, and collaborate online CRECo.ai. Please be sure to share, rate, and review us it really does help! Learn more at : https://welcome.creco.ai/reroundtable

    The Ranveer Show हिंदी
    Dark Side Of Smartphones - Cyber Security, AI Threats & Chinese Influence | TRS Hindi

    The Ranveer Show हिंदी

    Play Episode Listen Later Sep 12, 2025 81:22


    Buy AI+Smartphone from the link below :https://www.flipkart.com/ai-pulse-black-64-gb/p/itm42a123557bad4?pid=MOBHDDQXWA6PBGZJ https://www.flipkart.com/ai-nova-5g-purple-128-gb/p/itm6116e1e30cc63?pid=MOBHDDQXJVZXFCWPCheck out BeerBiceps SkillHouse's YouTube 1O1 Course - https://youtube.beerbicepsskillhouse.in/youtube-101Share your guest suggestions hereMail - connect@beerbiceps.comLink - https://forms.gle/aoMHY9EE3Cg3Tqdx9BeerBiceps SkillHouse को Social Media पर Follow करे :-YouTube : https://www.youtube.com/channel/UC2-Y36TqZ5MH6N1cWpmsBRQ Instagram : https://www.instagram.com/beerbiceps_skillhouseWebsite : https://beerbicepsskillhouse.inFor any other queries EMAIL: support@beerbicepsskillhouse.comIn case of any payment-related issues, kindly write to support@tagmango.comLevel Supermind - Mind Performance App को Download करिए यहाँ से

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonAllow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform at https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    The Conference Room with Simon Lader
    Ep. 169- The Best of The Second Half of 2025

    The Conference Room with Simon Lader

    Play Episode Listen Later Sep 11, 2025 25:33


    Welcome to a special episode of The Conference Room, where we revisit some of the most insightful conversations from 2025. This episode features a dynamic panel of experts sharing their unique perspectives on business growth, innovation, marketing, and cybersecurity.Key Moments:Successful market entry requires thorough analysis of market fit, financial potential, and execution capability.The U.S. market is more receptive to innovation and offers higher revenue potential compared to Europe.Email marketing success depends on strategy, segmentation, and nurturing the customer journey over time.Authenticity and passion are critical when speaking publicly to build trust and attract ideal clients.Cybersecurity marketing demands respect for the audience's privacy and a deep understanding of technical products and culture.Featured Guests:Uriel Cohen – VP of Product at a leading cybersecurity vendorLuigi Lenguito – Co-founder and CEO of Bfore Dot AIEvelina Kagan – High-conversion fashion copywriterKimberley Crowe – International inspirational public speaker and TEDx speakerGianna Whitver – CEO of the Cybersecurity Marketing SocietyYOUR HOST - SIMON LADER    Simon Lader is the host of The Conference Room, Co-Founder of global executive search firm Salisi Human Capital, and lead generation consultancy Flow and Scale. Since 1997, Simon has helped cybersecurity vendors to build highly effective teams, and since 2022 he has helped people create consistent revenue through consistent lead generation.      Get to know more about Simon at:    Website: https://simonlader.com/  Twitter: https://twitter.com/simonlader  LinkedIn: https://www.linkedin.com/in/headhuntersimonlader/    The Conference Room is available onSpotifyApple podcastsAmazon MusicIHeartRadio

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Thursday, September 11th, 2025: BASE64 in DNS; Google Chrome, Ivantii and Sophos Patches; Apple Memory Integrity Feature

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Sep 11, 2025 7:12


    BASE64 Over DNS The base64 character set exceeds what is allowable in DNS. However, some implementations will work even with these invalid characters. https://isc.sans.edu/diary/BASE64%20Over%20DNS/32274 Google Chrome Update Google released an update for Google Chrome, addressing two vulnerabilities. One of the vulnerabilities is rated critical and may allow code execution. https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_9.html Ivanti Updates Ivanti patched a number of vulnerabilities, several of them critical, across its product portfolio. https://forums.ivanti.com/s/article/September-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-and-Neurons-for-Secure-Access-Multiple-CVEs Sophos Patches Sophos resolved authentication bypass vulnerability in Sophos AP6 series wireless access point firmware (CVE-2025-10159) https://www.sophos.com/en-us/security-advisories/sophos-sa-20250909-ap6 Apple Introduces Memory Integrity Enforcement With the new hardware promoted in yesterday s event, Apple also introduced new memory integrity features based on this new hardware. https://security.apple.com/blog/memory-integrity-enforcement/

    The Bid Picture - Cybersecurity & Intelligence Analysis

    Send Bidemi a Text Message!In this episode, host Bidemi Ologunde presented six stories about secrecy versus privacy.Support the show

    The Buzz with ACT-IAC
    Fellows Speaker Series: Small Business

    The Buzz with ACT-IAC

    Play Episode Listen Later Sep 11, 2025 74:38 Transcription Available


    Fellows-only panel focused on small business success in the GovCon space. Whether you're looking to grow, partner, or simply gain deeper insight into the current landscape, this episode is your chance to learn from leaders who have built, scaled, and sold small businesses in today's evolving environment. Featured Speakers:Kim Hayes, KBR (Former Owner, The Ambit Group)Pawla Ghaleb, CEO, PBGRaza S. Latif, CEO, NuAxisJanis Garcia Keating, CEO/President, Wilco GroupModerated by: Mitzi Mead, CEO/President, Anakim ConsultingThe conversation highlighted the importance of trusting one's intuition, building strong banking relationships, and the emotional toll of significant business decisions. Despite the hardships, every panelist affirmed they would choose to start their businesses again, pointing to the fulfilling aspects of entrepreneurship. Subscribe on your favorite podcast platform to never miss an episode! For more from ACT-IAC, follow us on LinkedIn or visit http://www.actiac.org.Learn more about membership at https://www.actiac.org/join.Donate to ACT-IAC at https://actiac.org/donate. Intro/Outro Music: See a Brighter Day/Gloria TellsCourtesy of Epidemic Sound(Episodes 1-159: Intro/Outro Music: Focal Point/Young CommunityCourtesy of Epidemic Sound)

    Business, Brains & the Bottom Line
    Ep. 132: The START Formula: Building a Winning Digital Marketing Plan with Corey Morris

    Business, Brains & the Bottom Line

    Play Episode Listen Later Sep 11, 2025 34:09


    Corey Morris, CEO of Voltage and author of The Digital Marketing Success Plan, joins the show to share his proven framework for creating powerful digital marketing strategies. With over two decades of experience helping brands thrive online, Corey developed the START process, a simple yet comprehensive approach built around Strategy, Tactics, Application, Review, and Transformation.In this conversation, Corey breaks down how START can help any business cut through the noise, align their marketing efforts with business goals, and achieve measurable growth. Whether you're a business owner, marketer, or leader looking to sharpen your digital edge, this episode offers a practical roadmap to success.

    Serious Privacy
    Fireside Chat with a UK DPO (with Jordan Hall)

    Serious Privacy

    Play Episode Listen Later Sep 11, 2025 33:35


    Send us a textOn this episode of Serious Privacy, while both Paul Breitbarth and Ralph O'Brien of Reinbo Consulting are out, Dr. K Royal connects with Jordan Hall, a DPO based in the UK. Discussion centers around scope of DPO, where the field has developed, and thoughts on current events. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

    Cybercrime Magazine Podcast
    Cybercrime Magazine Update: The $10.5T Shadow Economy & Cybersecurity Gold Rush. Key Takeaways.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Sep 11, 2025 3:35


    According to Cybersecurity Ventures, by 2025, global cybercrime damages are projected to hit $10.5 trillion annually—a figure that eclipses the combined profits of the global drug trade and the cost of natural disasters. This isn't just a tech problem; it's a financial tsunami, according to AInvest, a New York-based financial platform for investors. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Magazine Update airs weekly and covers the latest news, interviews, podcasts, reports, videos, and special productions from Cybercrime Magazine, published by Cybersecurity Ventures. For more on cybersecurity, visit us at https://cybersecurityventures.com

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Wednesday, September 10th, 2025: Microsoft Patch Tuesday;

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Sep 10, 2025 8:25


    Microsoft Patch Tuesday As part of its September patch Tuesday, Microsoft addressed 177 different vulnerabilities, 86 of which affect Microsoft products. None of the vulnerabilities has been exploited before today. Two of the vulnerabilities were already made public. Microsoft rates 13 of the vulnerabilities are critical. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20September%202025/32270 Adobe Patches Adobe released patches for nine products, including Adobe Commerce, Coldfusion, and Acrobat. https://helpx.adobe.com/security/security-bulletin.html SAP Patches SAP patched vulnerabilities across its product portfolio. Particularly interesting are a few critical vulnerabilities in Netweaver, one of which scored a perfect 10.0 CVSS score. https://onapsis.com/blog/sap-security-notes-september-2025-patch-day/