The protection of computer systems from theft or damage
POPULARITY
Categories
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
George Noory and professor Anne Foerst discuss cybersecurity concerns amid rapid advances in artificial intelligence. See omnystudio.com/listener for privacy information.
Raj Koo, CTO at DTEX, joins The Tech Trek for a sharp conversation on insider risk, shadow AI, and why security teams need a more modern way to think about intent. This episode is worth your time if you are trying to understand how AI is changing cyber risk, why non malicious behavior can still create major exposure, and what it takes to protect the business without slowing down innovation. Raj explains why the old approach of blocking known bad behavior is no longer enough. As employees bring personal AI tools into the workplace, security teams are dealing with a new reality, one where productivity gains, agentic workflows, and data exposure are all colliding at once. In this episodeWhy DTEX focuses on inferring intent, not just catching exfiltrationWhy shadow AI is different from shadow IT, and harder to controlHow non malicious employee behavior can become the biggest insider risk categoryWhy agentic AI raises the stakes for visibility and governanceHow mature insider risk programs are shrinking response times even as costs rise Timestamped highlights00:00 Raj Koo on inferring intent in cybersecurity01:59 Why early warning signals matter more than the exfiltration point04:38 The rising cost of insider risk06:25 How shadow AI became a major non malicious risk08:13 Why shadow AI is more complex than shadow IT17:53 Detection times are improving, but the cost problem is getting worse Standout lineSecurity has a chance to stop being seen as the function that blocks productivity and start being seen as the function that helps the business adopt better tools safely. Practical takeawayIf your team is dealing with AI adoption in the wild, start with visibility before judgment. Understand which tools people are using, what they are using them for, and where the real risk sits before defaulting to blanket restrictions. Link to 2026 Cost of Insider Risks Global Report: https://ponemon.dtex.ai/Follow The Tech Trek for more conversations with builders, operators, and technology leaders shaping how modern companies work.
Anjali Bastianpillai breaks down the state of the AI market and cybersecurity concerns. She stresses the need for cybersecurity to catch up to agentic AI's abilities. As demographics change and countries worry about having enough workers, AI will fill in the gaps, Anjali notes. She thinks the software pullback creates opportunities for long-term investments. A “great tailwind” is the infrastructure buildout, which is “really critical” for the AI era. ======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Paulette Perhach, freelance writer and writing coach, shares tips on how to prevent your aging relatives from getting scammed. Plus, we take calls from listeners with their stories and questions about protecting yourself and loved ones against financial fraud. => "How to Prevent Aging Parents and Relatives From Making Financial Mistakes" (New York Times, January 2026) photo: A woman over 90 years old makes a phone call with an iphone on 16.03.2025 in Norden (Lower Saxony). Photo: Matthias Balk/dpa (Photo by Matthias Balk/picture alliance via Getty Images)
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In this special Joint episode Andy Jabbour and Toni Pepper connect at the 6th Annual Cybersecurity Summit in Jacksonville, Florida to talk Tribal-ISAC, key insights and takeaways, and other fun conversations along the way.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
IPv4 Mapped IPv6 Addresses https://isc.sans.edu/diary/IPv4%20Mapped%20IPv6%20Addresses/32804 More IP KVM Vulnerabilities https://eclypsium.com/blog/your-kvm-is-the-weak-link-how-30-dollar-devices-can-own-your-entire-network/ AWS Bedrock AgentCore Code Interpreter DNS Leak https://www.beyondtrust.com/blog/entry/pwning-aws-agentcore-code-interpreter
Most travel advisors don't think about cybersecurity… until something goes wrong. By then, it's too late. In this episode, I'm joined by cybersecurity expert Jesse to talk about the very real (and often overlooked) risks facing travel advisors today. Because the truth is, you are not a small target. You are a high-value one. You hold client payment details, passport information, travel plans, and access to multiple systems. Hackers aren't just looking for individuals, they're looking for volume. Inside this conversation, we break down the simple, practical steps you can take to protect your business, your clients, and your reputation. This isn't about fear, it's about responsibility and about building a business that your clients can trust. In This Episode, We Cover: Why public wifi is one of the biggest risks for travel advisors What a VPN actually does and why it's essential The truth about saved passwords and browser security Why password reuse is more dangerous than you think How hackers target travelers in airports and hotels The hidden risks of USB charging stations Why travel advisors are high-value targets for cyberattacks How urgency and busy seasons make you more vulnerable The most common email and social media scams Simple steps you can take today to protect your business The more overwhelmed and distracted you are, the more vulnerable you become. Cybersecurity isn't about being tech-savvy, it's about being intentional. Resources + Links Mentioned Connect with Jesse: FreedomCRM.biz fmsit.net Connect Instagram: http://instagram.com/artofsellingtravel Website: https://artofsellingtravel.com Facebook Group: https://www.facebook.com/groups/travelagentobjections
In this episode of The Other Side of Campus, hosts Stephanie Seidel Holmsten and Jen Moon sit down with Francesca “Chessie” Lockhart, Program Lead of the Cybersecurity Clinic at UT Austin's Strauss Center for International Security and Law. Drawing on her experience in state-level intelligence at the Texas Department of Public Safety, Lockhart shares how her career in counterterrorism, cybersecurity, and critical infrastructure protection led her back to the university — and how she's now helping shape the next generation of public-minded technologists and security strategists.At the heart of the conversation is the Cybersecurity Clinic itself: an innovative, hands-on two-semester program where students apply classroom learning directly in partnerships with nonprofits, small businesses, and local governments to address real cybersecurity challenges. Lockhart explains how this model transforms learning — moving beyond the lecture hall to cultivate technical skills, ethical responsibility, and a deep sense of public purpose.We also hear from Kareem Chavez-Escobedo, now a UT law student and a member of the clinic's inaugural cohort, who reflects on what it was like to work with real clients as an undergraduate. Her experience highlights how applied learning can build not only expertise, but confidence, agency, and a clearer sense of how students can contribute to the public good.Together, the episode explores broader questions about the role of higher education in an age of rapid technological change: What responsibilities do universities have in strengthening cybersecurity at the local and national level? How can experiential learning better prepare students to navigate complex, real-world problems? And what gives educators hope about the next generation stepping into these critical roles? As always, thanks for joining us on The Other Side of Campus.
In episode 179 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager conclude their discussion of 2026 cybersecurity predictions from seven CIS experts, as shared on the CIS website.Here are some highlights from our episode:01:09. How threat actors' adoption of Agentic AI is reshaping the defender's dilemma06:28. Public confidence: The primary focus for attackers seeking to undermine U.S. elections10:43. The surge in threat actors targeting operational technology and critical infrastructure12:29. Responsibility and the cost of fixing flawed things instead of secure by design16:29. Secure by design: An invitation to rethink architecture and plan for future adaptability17:24. Meeting cloud service prioritization with a foundation of defense for all things25:44. Supporting state and local cybersecurity maturity with both competence and character41:00. Feedback: The key to adapting security controls to evolving threats and technology use50:23. Embedding security into the heart of a businessResourcesEpisode 169: 2026 Cybersecurity Predictions from CIS — Pt 1Episode 174: 2026 Cybersecurity Predictions from CIS — Pt 2Multi-State Information Sharing and Analysis Center®CIS Critical Security Controls®How to Defend Against Iran's Cyber Retaliation PlaybookEpisode 178: Appropriate Defense to Iranian Threat ActivitySecure by DesignCollective SLTT Cyber DefenseEpisode 144: Carrying on the MS-ISAC's Character and CultureMonitoring and Support During the CrowdStrike Falcon OutageEpisode 110: How Security Culture and Corporate Culture MeshIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
A real-world phishing incident. Real financial impact. Real lessons for MSPs.In this episode, we unpack a phishing attack that led to unauthorized access to an Azure subscription and significant financial loss for an MSP client. The conversation goes beyond the incident itself to examine where policy gaps, weak controls, and unclear ownership increased liability, and what changed when the MSP committed to cybersecurity maturity.Joined by Chad Holstead, we walk through how pursuing the GTIA Cybersecurity Trustmark helped transform the MSP's security posture, improve privileged access controls, and dramatically change the insurance conversation, lowering costs while increasing coverage. This isn't about adding more tools; it's about leadership, governance, and proving maturity before advising clients.If you're an MSP talking cybersecurity to customers, this episode makes one thing clear: secure your own house first.For more GTIA On location interviews, head over to YouTube and just search GTIA On Location or use this link
On this episode of Culture & Compliance Chronicles, Amanda Raad and Nitish Upadhyaya from Ropes & Gray's Insights Lab, and Richard Bistrong of Front-Line Anti-Bribery, are joined by neuropsychologist Sarah Zheng to explore the human factor in cybersecurity. The conversation delves into the psychology behind hacking, the role of emotions and context in falling for scams, and the evolving risks posed by emerging technologies like AI and brain-computer interfaces. Sarah shares insights from her research at the Dawes Centre for Future Crime and her book, The Psychology of Cybersecurity, highlighting the importance of operational resilience and creative approaches to cyber awareness. Listeners will learn practical strategies for building a culture of psychological safety and reporting, as well as actionable steps to enhance organizational cyber resilience.
Morgan Stanley MUFG 's Japan Equity Strategist Sho Nakazawa talks about the sectors that are leading the current rebound of Japanese stocks and why these gains may be more than a cyclical shift.Read more insights from Morgan Stanley.----- Transcript -----Welcome to Thoughts on the Market. I'm Sho Nakazawa, Japan Equity Strategist at Morgan Stanley MUFG Securities.Today: How Japan's Takaichi administration could define Japan's stock market for years to come.It's Tuesday, March 17th, at 3 PM in Tokyo.Sanae Takaichi became Japan's first female prime minister on October 21, 2025. She leads a conservative administration that emphasizes defense spending and economic resilience. When Takaichi took office in February, this signaled the start of a structural pivot in Japan's economy. And markets have responded quickly. Over the past several months, stocks with high exposure to the administration's 17 strategic domains have outperformed TOPIX by 15 percentage points. That kind of divergence suggests something bigger than a cyclical rebound. Capital is positioned to a structural shift. First, there's the Japanese government's increased emphasis on economic security and supply chain resilience. This reflects a philosophical shift. For years efficiency ruled: just-in-time supply chains and global optimization. The pandemic and the reorientation towards a multipolar world changed that workflow. Now the emphasis is on redundancy and autonomy – and this has implications for Defense & Space, Advanced Materials & Critical Minerals, Shipbuilding, and Cybersecurity. The second pillar of Japan's structural market shift is AI and the compute revolution. Yes, some investors worry about overinvestment in AI, but we believe in [the] possibility of nonlinear returns as AI breakthroughs occur. And, keep in mind, AI isn't just software. It requires data-center cooling, communications networks, expanded power grids, and critical minerals. This is a full industrial stack upgrade. Looking further out, the global humanoid robotics market could reach US$7.5 trillion annually by 2050 according to our global robotics team estimates. That's roughly three times the combined 2024 revenue of the world's top 20 automakers at about US$2.5 trillion. The third force reshaping Japan's market is infrastructure. The 2026 budget slated towards national resilience initiatives exceeds ¥5 trillion. With aging infrastructure and intensifying natural disasters, resilience spending relates directly to economic security. Ports, logistics, and communications systems are increasingly becoming strategic assets. Our work suggests the long-term construction cycle is entering an expansion phase as bubble-era buildings from the late 1980s reach replacement timing. That points to durable demand rather than a temporary spike. With all of this said, what's also important is how stock market leadership spreads. It tends to move from upstream to downstream – from materials and power infrastructure, to AI, to defense and communications, and eventually to applications like drug discovery, quantum technologies, cybersecurity, and content. Right now, the strongest three-month returns are in Advanced Materials and Critical Minerals, and in Next-Gen Power and Grid Infrastructure. Meanwhile, areas like Cybersecurity and Content have lagged but remain tightly connected in the network. If leadership broadens, those linkages matter. The real constraint isn't political opposition. It's [the] market itself. If investors decide this is a temporary stimulus rather than sustainable earnings growth, valuations might adjust. But we do believe that Japan's equity market isn't simply rallying. It is reorganizing around economic security, AI infrastructure, and national resilience.Thanks for listening. If you enjoy Thoughts on the Market, please leave us a review wherever you listen and share the podcast with a friend and colleague today.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
/proxy/ URL scans with IP addresses https://isc.sans.edu/forums/diary/proxy+URL+scans+with+IP+addresses/32800/ Local Network Address Restrictions https://learn.microsoft.com/en-us/deployedge/ms-edge-local-network-access#how-to-mitigate-impact-for-cross-origin-iframes https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnote-stable-channel European Security Vendor Targeted by Hackers Fronting as Cisco Domain https://specopssoft.com/blog/phishing-campaign-cisco/
On today’s news roundup we assess the White House’s new US cyber strategy (bellicose, bombastic, and boiler-plate), discuss a cyberattack attributed to Iran that used Windows to wipe thousands of devices, and dig into a Microsoft update on Entra passkeys. JJ isn’t impressed with new research that bypasses Wi-Fi client isolation, corporate spyware gets a... Read more »
On today’s news roundup we assess the White House’s new US cyber strategy (bellicose, bombastic, and boiler-plate), discuss a cyberattack attributed to Iran that used Windows to wipe thousands of devices, and dig into a Microsoft update on Entra passkeys. JJ isn’t impressed with new research that bypasses Wi-Fi client isolation, corporate spyware gets a... Read more »
A world renowned cybersecurity expert with more than 30 years of network security experience, Dr. Eric Cole – founder and CEO of Secure Anchor – helps organizations curtail the risk of cyber threats. He has worked with a variety of clients ranging from Fortune 50 companies, to top international banks, to the CIA, for which he was a professional hacker. In this episode, Dr. Cole and host Scott Schober discuss AI-powered attacks and how they're being carried out today. To learn more about our sponsor, visit https://drericcole.org
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SmartApeSG campaign uses ClickFix page to push Remcos RAT https://isc.sans.edu/diary/SmartApeSG%20campaign%20uses%20ClickFix%20page%20to%20push%20Remcos%20RAT/32796 A React-based phishing page with credential exfiltration via EmailJS https://isc.sans.edu/diary/32794 Google Chrome announced two zero-day fixes, then removed one. https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html AdGuard Vulnerability https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.73
In this week's MBA Admissions podcast we began by discussing the current state of the MBA admissions season. We are now getting close to the end of the interview invite season for Round 2 as top MBA programs begin to release their final decisions. This upcoming week, IESE, UVA / Darden, Emory / Goizueta, Yale SOM, Dartmouth / Tuck, INSEAD, Georgetown / McDonough and Georgia / Terry are releasing their Round 2 decisions. A few MBA programs are also beginning their next admissions rounds, including Oxford / Said, Notre Dame / Mendoza, Imperial Business School, Emory / Goizueta and Johns Hopkins / Carey. Graham highlighted upcoming MBA webinar events. On Thursday, we are hosting a series of panel discussions focused on international students who are targeting the top MBA programs in the United States. On May 11, Clear Admit is hosting our in-person MBA Fair in Atlanta. We are also hosting several online Application Overview events in May. Signups for all of these events are here: https://www.clearadmit.com/events And finally, Clear Admit will also be livestreaming a “Decision Day Watch Party” on March 25, you can subscribe here: https://www.youtube.com/@ClearAdmitMBA In the news & notes section of the show, Graham mentioned an MBA admissions tip that focuses on the Round 2 wait list and showcased more entries from our Real Humans Alumni series. This week focuses on three alumni from Fuqua / Netflix, Haas / Google and Johnson / Deloitte. For this week, for the candidate profile review portion of the show, Alex selected two ApplyWire entries and one DecisionWire entry: This week's first MBA admissions candidate is seeking to pivot from banking to MBB consulting and wants to use an executive MBA program to make that pivot. This week's second MBA applicant appears to have a strong career in cybersecurity and wants to pivot to consulting in digital strategy. They still need to take the GRE. This week's final MBA candidate is deciding between Fuqua and Ross, and possibly Johnson too. This episode was recorded in Paris, France and Cornwall, England. It was produced and engineered by the fabulous Dennis Crowley in Philadelphia, USA. Thanks to all of you who've been joining us and please remember to rate and review this show wherever you listen!
What does it look like when a cybersecurity founder who built a $2.5 billion company decides to level up, again? Dean Sysman, co-founder of Axonius, sits down with Ron Eddings to pull back the curtain on what it really took to go from zero to $100M ARR in four and a half years, and what came next. Dean breaks down the founder mindset, the emotional weight of tying your identity to your company, and why he stepped into the Executive Chairman role while simultaneously pursuing a PhD in AI systems at Columbia University. He gets into how boxing taught him what solo performance reveals about leadership, why vulnerability is a non-negotiable skill at scale, and what it means to care about something bigger than yourself. This one hits differently if you're building, leading, or figuring out what your next chapter looks like. Impactful Moments 00:00 – Introduction 05:00 – Boxing for charity: raising $55K 08:00 – Competitive by nature, born to build 10:00 – Solo performance sharpens team leadership 13:00 – Axonius: zero to $100M ARR in 4.5 years 15:00 – Founder identity tied to company success 21:00 – Purpose bigger than yourself fuels resilience 25:00 – Self-awareness as the #1 growth tool 28:00 – Executive Chairman + Columbia PhD pursuit 33:00 – Ron's personal reflection on founder identity Links Connect with our guest, Dean Sysman, on LinkedIn: https://www.linkedin.com/in/deansysman/ Check out our upcoming events: https://www.hackervalley.com/livestreams Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Sensei Liam is back. He brought the subject of Strength and Power with him. We enjoyed it so much, we've added Part 2 for next week. Today's show focuses on the external applications. But, as usual, we're all over the map. One thing we do is refer to a couple of the other times Sensei Liam joined us. He was on in 2021 talking about the relationship between Obligation and Opportunity. Here it is in case you missed it:https://www.buzzsprout.com/477379/episodes/9763317One of my favorite episodes with Sensei Liam happened when he applied his Martial Arts to Cyber-Security. Here's that link:https://www.buzzsprout.com/477379/episodes/15836335Please get in touch. Sensei Liam added a quiz that is full of opinions. He wold love it if you shared your opinions!While you're in a giving mood, don't forget our link below - any amount is SO appreciated. Thanks in advance. Support the showThanks so much for listening and sharing the podcast with friends. Reach us all over the web. Facebook and twitter are simply wildcatdojo. However, insta is wildcatdojo conversations. (There's a story there.)On YouTube (where we are now airing some of our older episodes - complete with a slideshow that I tweak constantly) https://www.youtube.com/@wildcatdojo9869/podcastsAnd for our webpage, where you can also find all the episodes and see some info about the dojo: http://wildcatdojo.com/025-6/podcast.html . And of course, we love it when you support our sponsor Honor Athletics. Here is their link:https://honor-athletics.com/Thank you for listening.
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Simple 6 signup link https://simple6.co/r/CFUR98 Stryker suffers data wiper attack https://www.bleepingcomputer.com/news/security/medtech-giant-stryker-offline-after-iran-linked-wiper-malware-attack/ Medics in war: https://www.youtube.com/watch?v=Ljm-mXN0Z84 NSA contractor hiring mistakes https://www.forbes.com/sites/the-wiretap/2025/11/26/nsa-contractor-groomed-teenage-girls-on-reddit-doj-alleges/ https://www.cnbc.com/2026/01/26/trump-tax-records-treasury-cancels-booz-allen-contracts.html Blackmailing Conti ransomware group https://www.bitdefender.com/en-us/blog/hotforsecurity/ransomware-gang-blackmailed-fake-fsb-officer Cybersecurity interview tips Dad Joke of the Week (DJOW) Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Glenn - https://www.linkedin.com/in/glennmedina/ Ben - https://www.linkedin.com/in/benjamincorll/
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Kory Daniels, Chief Security and Trust Officer at LevelBlue, discusses the multifaceted cybersecurity challenges in the healthcare industry and the risks posed by legacy systems not designed for secure internet connectivity. Artificial intelligence is being used successfully to defend against cyber attacks, while threat actors are using AI without ethical constraints to launch sophisticated attacks. Managing cybersecurity includes using digital twins to model vulnerabilities and to develop strategies for identity and access management for human and non-human identities, such as robots and AI agents. Kory explains, "We must recognize that we're not starting from a clean slate - we have a lot of decades-old systems operating both within the physical footprint of the healthcare and hospital facility and in record retention and data management. Many organizations are looking at how to get ahead in identifying what needs to happen to embrace new technology and much of the innovation. At the same time, being conscious and cognizant of opportunities to retrofit, taking what's there already today and making it internet-connected as an example, making it Internet of Things-connected so that devices that weren't purpose-built to communicate to the internet now can communicate to the internet, but it creates some risks and it poses some challenges." "We highlighted that some of these legacy systems or initial systems that have been in the organization for years, some 10 years or more, were not necessarily purpose-built or designed at the time of manufacturing, nor with the software needed for those tools to operate with current speed, expectations, and requirements. Healthcare entities are engaging both patients and supporting care doctors and patient care professionals in 2026 and beyond." #LevelBlue #HealthcareCybersecurity #DigitalTransformation #AIinHealthcare #LegacySystems #PatientSafety #CyberThreats #HealthTech #DataSecurity #MedicalDevices #DigitalHealth #HealthcareIT #CyberDefense #HealthcareInnovation #RiskManagement #ComplianceMatters LevelBlue.com Listen to the podcast here
Kory Daniels, Chief Security and Trust Officer at LevelBlue, discusses the multifaceted cybersecurity challenges in the healthcare industry and the risks posed by legacy systems not designed for secure internet connectivity. Artificial intelligence is being used successfully to defend against cyber attacks, while threat actors are using AI without ethical constraints to launch sophisticated attacks. Managing cybersecurity includes using digital twins to model vulnerabilities and to develop strategies for identity and access management for human and non-human identities, such as robots and AI agents. Kory explains, "We must recognize that we're not starting from a clean slate - we have a lot of decades-old systems operating both within the physical footprint of the healthcare and hospital facility and in record retention and data management. Many organizations are looking at how to get ahead in identifying what needs to happen to embrace new technology and much of the innovation. At the same time, being conscious and cognizant of opportunities to retrofit, taking what's there already today and making it internet-connected as an example, making it Internet of Things-connected so that devices that weren't purpose-built to communicate to the internet now can communicate to the internet, but it creates some risks and it poses some challenges." "We highlighted that some of these legacy systems or initial systems that have been in the organization for years, some 10 years or more, were not necessarily purpose-built or designed at the time of manufacturing, nor with the software needed for those tools to operate with current speed, expectations, and requirements. Healthcare entities are engaging both patients and supporting care doctors and patient care professionals in 2026 and beyond." #LevelBlue #HealthcareCybersecurity #DigitalTransformation #AIinHealthcare #LegacySystems #PatientSafety #CyberThreats #HealthTech #DataSecurity #MedicalDevices #DigitalHealth #HealthcareIT #CyberDefense #HealthcareInnovation #RiskManagement #ComplianceMatters LevelBlue.com Download the transcript here
Gus Serino, President of I&C Secure, joins the Nexus Podcast to discuss the formation and evolution of an ongoing water utility cybersecurity collaborative that leans on a collective defense model to share resources and threat intelligence among six water & wastewater companies in the commonwealth. Serino helped put together this coalition, and he explains how a feasibility study came together resulting in a shared grant that member utilities can use to improve their security programs. Gus talks about the origins of this collaborative and how other utilities can follow this model to improve cybersecurity in this struggling, resource-strapped critical infrastructure sector.Subscribe and listen to the Nexus Podcast here.
As RSAC 2026 approaches, Michael Parisi of Steel Patriot Partners sits down with Marco Ciappelli and Sean Martin to talk about what it means to show up to the world's largest cybersecurity conference with a business-first mindset. For Parisi — a 20-plus year veteran of professional services, federal compliance, and cybersecurity — RSA is less about the show floor and more about the quiet corners where real conversations happen. Steel Patriot Partners operates on a simple but powerful premise: business owners first, engineers second, compliance professionals third. That philosophy shapes everything from how they engage clients to how they show up at industry events. At RSAC, Parisi's calendar is already full — and intentionally so. The value isn't in the booths. It's in the bilateral trust that forms between peers who cut through the noise to share what's actually working. And the noise, this year, is particularly loud. AI dominates the conversation in ways that create as much anxiety as excitement — especially for federal cybersecurity professionals whose institutional knowledge feels suddenly uncertain. Parisi addresses this head-on: the question isn't just whether AI will replace jobs, it's whether leaders are having honest conversations with their teams about what's changing and why. The fog of marketing has thickened into what he calls a "fog of truth" — a marketplace where it's increasingly hard to know who actually delivers versus who just pitches well. This conversation is a preview of what Steel Patriot Partners will be listening for, talking about, and connecting around at RSAC 2026 — from retaining trusted people amid AI disruption, to whether tried-and-true solutions still hold their own against the wave of AI-native platforms. Parisi and the SPP team will also be sitting down with Marco and Sean live on the floor for a deeper follow-up conversation. Loved this conversation? Share it with someone heading to RSAC 2026 and make sure to connect with Michael Parisi and the Steel Patriot Partners team in San Francisco. GUEST Michael Parisi Chief Growth Officer, Steel Patriot Partners https://www.linkedin.com/in/michael-parisi-4009b2261/ https://www.steelpatriotpartners.com RESOURCES Steel Patriot Partners: https://www.steelpatriotpartners.com RSAC Conference 2026: https://www.rsaconference.com ✨ A special thank you to our sponsors and supporters: https://itspm.ag/telecom-ts630 _____________________________ Are you interested in telling your story?
Gemini in Google Workspace, Agentic AI, and Managing AI Anxiety (with Accenture's Krish Banerjee) Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst In a special edition of Project Synapse shared with Cybersecurity Today, host Jim Love and co-host John Pinard (a VP and CSO at a Canadian financial institution) speak with Krish Banerjee, Accenture's managing director and partner leading AI in Canada. They discuss Google integrating Gemini into Workspace and how AI assistants like Gemini and Microsoft Copilot are converging, along with recent moves around agent platforms and the business models of AI, including Meta and Nvidia's evolving strategies and Nvidia's push toward enterprise agent infrastructure amid rapidly rising compute demand. The conversation explores why AI adoption lags capability, emphasizing task-based redesign, human-in-the-loop guardrails, and not "AI-washing" broken processes. They also address AI anxiety, training and culture change, impacts on education and jobs, and practical ways to use agents to stay informed and productive. 00:00 Sponsor Message 00:20 Show Intro and Guests 01:12 Gemini Comes to Workspace 03:38 AI Tool Leapfrogging 05:06 Agent Network Acquisitions 07:53 Nvidia Bets on Enterprise Agents 11:08 Why AI Adoption Lags 14:27 Agentic AI and Process Redesign 16:19 Security Guardrails and Human Oversight 24:05 Accenture Transformation and Training 26:55 AI Anxiety in the Workplace 30:22 Tasks Not Jobs 32:12 Outcome First Thinking 34:15 Personal AI Assistants 37:24 Building Agents Together 38:35 Executive Learning Curve 44:31 Kids And AI Natives 50:15 Critical Thinking And Trust 54:15 Company Advice Focus Value 55:58 Wrap Up And Sponsor
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
When your IoT Device Logs in as Admin, It s too Late! https://isc.sans.edu/diary/When%20your%20IoT%20Device%20Logs%20in%20as%20Admin%2C%20It%3Fs%20too%20Late!%20%5BGuest%20Diary%5D/32788 Apple Patches https://support.apple.com/en-us/100100 Veeam Patches https://www.veeam.com/kb4830
Independent investigative journalism, broadcasting, trouble-making and muckraking with Brad Friedman of BradBlog.com
Independent investigative journalism, broadcasting, trouble-making and muckraking with Brad Friedman of BradBlog.com
Send me a text (I will personally respond)Are you struggling to navigate strategic partnerships with hyperscalers like AWS? Wondering when and how to build your company's platform story to stand out in a crowded cyber market? Curious about the real value of industry relationships and communities for sales growth? This episode tackles these challenges head-on, drawing insights from a leader who's been at the heart of cybersecurity's evolving ecosystem.In this conversation we discuss:
Despite an earnings miss, Lennar (LEN) shares soared at Friday's open following its 1Q print. Diane King Hall dives into the print in which the CEO says was defined by the "same persistent headwinds" challenging the housing market. On the cybersecurity front, SentinelOne (S) delivered mixed earnings but shares hovered around the unchanged line to start the day. Then, Diane looks at news that Meta Platforms (META) will delay its upcoming "Avocado" AI model to at least May. ======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Analyzing "Zombie Zip" Files (CVE-2026-0866) https://isc.sans.edu/diary/Analyzing%20%22Zombie%20Zip%22%20Files%20%28CVE-2026-0866%29/32786 How "Strengthening Crypto" Broke Authentication: FreshRSS and bcrypt's 72-Byte Limit https://pentesterlab.com/blog/freshrss-bcrypt-truncation-auth-bypass
In this episode, Lamar Garrett from Redbird Security delves into the critical importance of agency-specific cybersecurity tailored for insurance businesses. He discusses how proactive hardware and software maintenance can significantly reduce downtime, while the integration of AI streamlines operations and enhances security protocols. Lamar highlights the differences between general IT providers and insurance-specific MSPs, emphasizing the need for compliance with state and federal data regulations. He also shares best practices for integrating new technology, managing shiny objects, and preventing breaches through layered security and cyber awareness training. Additionally, Lamar addresses the impact of legacy hardware on security vulnerabilities and the importance of building strong relationships and trust within the insurance industry, along with strategies to improve communication about cybersecurity to agency owners.Lamar emphasizes that tailored cybersecurity, proactive hardware management, and clear communication are crucial for insurance agencies to protect their data and scale efficiently. His insights highlight that investing in industry-specific IT solutions is not just smart but necessary in today's digital landscape.Timestamps:00:00 - Introduction to Lamar Garrett and Redbird Security06:25 - The importance of insurance-specific IT solutions08:41 - How cybersecurity breaches impact large organizations and why agencies are at risk12:48 - Common misconceptions about insurance cybersecurity needs16:41 - Optimizing agency tech stacks for efficiency and compliance24:23 - Response times and minimizing downtime for agency management systems28:40 - How AI is transforming insurance IT security and operations32:38 - The hidden costs of aging hardware and legacy systems37:40 - Final thoughts on securing agency data and building industry trustResources & Links:Redbird SecurityRedbird Security on LinkedInApplied Epic MSP PartnershipMicrosoft CopilotEZLinks SoftwareCybersecurity Awareness CartoonsBook: "The Art of Cybersecurity" by David S. TanenbaumConnect with Lamar Garrett:LinkedIn - Lamar GarrettRedbird SecuritySponsors:MavCanopy ConnectGOLI
From skyrocketing state budgets to bizarre taxpayer-funded projects, today's episode breaks down the latest in South Carolina politics, the SAFE Act showdown, and the power of viral social media in holding politicians accountable. Join us as we unpack government spending, lewd art exhibits, and how public pressure is pushing Senator John Thune on the SAFE Act—all while exposing the myths mainstream media keeps pushing. Summary / Segment Breakdown: Segment 1: Columbia Math & Budget Madness South Carolina plans to spend 8.75% more this year, despite a population growth of only 1.5%. Discussion of lobbyists, corporate welfare, and unusual funding priorities under a Republican supermajority. How taxpayer dollars fund projects like LGBTQ+ podcasts, lewd art exhibits, drag shows, and climate research. Insight on the state's budget committee and the role of Democrats in controlling subcommittees despite the GOP supermajority. Segment 2: The Lesbian Podcast Controversy Grant funding of a six-episode lesbian history podcast through the Arts Commission. Questions raised about why conservative voices rarely receive similar support. Broader discussion on government funding for content with no market demand and the process for allocating grants. Segment 3: Public Pressure on John Thune & the SAFE Act John Thune facing unprecedented public scrutiny via viral posts on X. Debate over the vote count for the SAFE Act: 51 votes secured vs. Thune's claims of needing 60. The role of social media in holding elected officials accountable and debunking false narratives. Influence of Dave Rubin and other commentators in mobilizing public action to sway Senate votes. Segment 4: Mainstream Media Misfires & Cyber Threats Examples of CNN and other outlets spreading misinformation about protests and attacks, later corrected by social media. Highlighting the reach of social media corrections, sometimes surpassing traditional media audiences. Updates on Iranian and Chinese cyber threats, DHS shutdown, and the importance of coordinated government cybersecurity measures. Discussion on the blurred line between Democrat policies and national security vulnerabilities. Segment 5: Taxpayer Spending Debates Misconceptions about Pentagon spending on luxury items like lobster and ribeye. Historical context: comparable spending under past administrations including Obama and Bush. Discussion on public perception versus media narrative. Key Takeaways: South Carolina's budget increases vastly outpace population growth, with questionable allocations. Taxpayer dollars fund niche projects, while core infrastructure and conservative initiatives receive minimal attention. Social media is now a primary tool for political accountability, particularly on issues like the SAFE Act. Mainstream media often fails to accurately report events, but virality and community corrections mitigate misinformation. National security threats from cyber attacks are exacerbated by bureaucratic shutdowns and political gridlock. CTA (Call to Action): Follow us on X to stay updated with viral accountability posts. Check out Freedom Caucus research for real-time budget analysis. Subscribe to Battleground America and AmperWave Daily for ongoing coverage of government spending, media oversight, and legislative updates. Custom Labels: South Carolina, Budget, SAFE Act, John Thune, LGBTQ Funding, Arts Commission, Viral Accountability, Social Media, Cybersecurity, Government Spending
Are America's security agencies being crippled at the worst possible time? Today's episode dives into alarming claims about sleeper cells entering the U.S., rising cyber threats from Iran and China, and a political battle in Washington that could impact funding for the Department of Homeland Security. Tara and Lee connect the dots between border policy, national security warnings, and escalating geopolitical tensions. As cyberattacks increase and intelligence officials warn about foreign threats, the debate intensifies over whether political gridlock is putting Americans at risk. Summary Tara and Lee examine claims that border policies allowed large numbers of military-aged men from high-risk regions to enter the United States through crossings such as Lukeville. The conversation highlights warnings from former FBI officials who previously raised concerns about the changing demographic patterns of migrants at the southern border. They also discuss the broader national security implications, including cyberattack threats attributed to Iran and China and the potential impact of political disputes over funding for the Department of Homeland Security and related cybersecurity infrastructure. The discussion ultimately centers on whether political gridlock is undermining America's ability to respond to foreign threats and protect critical infrastructure. Key Topics Border security and migration patterns Claims of Iranian sleeper cells in the U.S. Cybersecurity threats targeting U.S. infrastructure Political fight over Department of Homeland Security funding Intelligence warnings about national security risks Geopolitical tensions involving Iran and China Social Media Post
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Microsoft Patch Tuesday, March 2026 https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20March%202026/32782 Fortinet Updates https://fortiguard.fortinet.com/psirt Adobe Updates https://helpx.adobe.com/security.html Zoom Update https://www.instagram.com/direct/t/17848218473607233/
Send a textHow do we protect ourselves in a digital world where attackers face almost no real consequences?In this episode of Joey Pinz Discipline Conversations, Joey Pinz sits down with cybersecurity founder and inventor Mike Siers for a thought-provoking conversation that challenges everything we assume about online security, identity, and trust.Mike's journey begins in the Florida National Guard and a deployment to Afghanistan, where life-altering experiences shaped how he sees service, responsibility, and problem-solving. That same mindset later led him into healthcare innovation—and eventually into cybersecurity—after realizing that the internet lacks one critical element found in the physical world: real risk for bad actors.Inspired by military strategy and an MIT thesis on cyber power projection, Mike explains a radical idea: what if unauthorized access attempts cost money? Instead of defenders absorbing endless attacks, attackers would inherit the risk before they even try.This conversation explores how empathy fuels innovation, why most cybersecurity models are reactive by design, and how shifting incentives could dramatically change online behavior. It's a powerful look at leadership, responsibility, and building solutions not just for today—but for the next generation. ⭐ Top 3 Highlights
Send a textIn this episode of Joey Pinz Discipline Conversations, Joey Pinz sits down with Mark Hardy, a retired U.S. Navy Captain and longtime cybersecurity executive, for a powerful conversation on leadership, growth, and decision-making under pressure.Mark shares what it was like stepping into command on September 11th in Lower Manhattan, leading without resources, infrastructure, or certainty—and how those moments shaped his lifelong approach to people and leadership. From developing future leaders to creating environments where individuals can step up when it matters most, this conversation goes far beyond theory.They explore why logic alone rarely drives lasting change, why emotional triggers are often the real catalyst for transformation, and how high-performing professionals can unintentionally disconnect from the very feelings that help them grow. Mark also reflects on cybersecurity careers, executive credibility, and why protecting people—not breaking systems—is the real challenge.This episode blends real-world leadership, personal evolution, and hard-earned wisdom from decades in the Navy, consulting, and cybersecurity—making it a must-listen for leaders, builders, and anyone navigating high-stakes decisions. ⭐ Top 3 Highlights
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Encrypted Client Hello: Ready for Prime Time? https://isc.sans.edu/diary/Encrypted%20Client%20Hello%3A%20Ready%20for%20Prime%20Time%3F/32778 The ExifTool vulnerability: how an image can infect macOS systems https://www.kaspersky.com/blog/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102/55362/ Remote code execution in Nextcloud Flow via vulnerable Windmill version https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g7vj-98x3-qvjf
Israel claims a strike on Iran's cyber warfare headquarters. The Trump administration releases a new national cyber strategy. DHS shakes up its IT and cybersecurity leadership. Velvet Tempest uses ClickFix to drop loaders and RATs. Researchers uncover a Linux cryptocurrency clipboard hijacker. The DOJ brings a Ghanaian romance scammer to justice. Online advertising enables government tracking. Monday business breakdown. Our guest is Jon France, CISO from ISC2, sharing some insights and findings from their 2025 ISC2 Cybersecurity Workforce Study. An Apple II app gets audited by AI. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Joining us today is Jon France, CISO from ISC2, sharing some insights and findings from their 2025 ISC2 Cybersecurity Workforce Study. For further detail, you can also check out ISC2's just released Women in Cybersecurity report. Selected Reading Iranian cyber warfare HQ allegedly hit by Israel | brief (SC Media) Iran internet blackout reaches 6th day as rights groups call for end to digital shutdown (The Record) The long-awaited Trump cyber strategy has arrived (CyberScoop) DHS CISO, deputy CISO exit amid reported IT leadership overhaul (FedScoop) Termite ransomware breaches linked to ClickFix CastleRAT attacks (Bleeping Computer) ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered Via Bincrypter-Based Loader (Cyble) Ghanaian Pleads Guilty to Role in $100m Romance Scam (Infosecurity Magazine) The Government Uses Targeted Advertising to Track Your Location. Here's What We Need to Do. (Electronic Frontier Foundation) Zurich Insurance Group intends to acquire UK cyber insurer Beazley for approximately $11 billion. (N2K Pro Business Briefing) Microsoft Azure CTO says Claude found vulns in Apple II code (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices