Attack on a computer system
POPULARITY
Categories
Cybersecurity is essential for every practice that relies on technology. In this episode, guest Kaitlin Upchurch, Senior Vice President and Cyber & Tech Practice Leader at Lockton, addresses the cybersecurity questions practices are—and are not—thinking about. She explains why cybersecurity risks are often misunderstood, what makes health care a prime target, and why insurance alone is not enough. Tune in to understand your cyber exposure, the biggest threats facing practices today, and the first steps to strengthen your protection beyond buying a policy. Chapters00:00 Intro00:47 Banter04:25 Guest background10:20 Tell us about Lockton.13:40 Do medical practices need cybersecurity?18:40 What are cybersecurity misconceptions?20:48 What are some cybersecurity threats?25:00 How can medical practices avoid cybersecurity issues?26:37 Access+27:16 Legal Takeaways28:45 OutroWatch full episodes of our podcast on our YouTube channel: https://www.youtube.com/@byrdadatto Stay connected for the latest business and health care legal updates:WebsiteFacebookInstagramLinkedIn
Cybercrime Magazine was a media partner at Black Hat Europe 2025, where we met with leaders from some of the industry's hottest companies, including OX Security. In this episode, host Amanda Glassner is joined by Chris Lindsey, Field CTO at OX, to discuss the company's presence at the London-based event and his perspective on cybersecurity in Europe and across the globe. • For more on cybersecurity, visit us at https://cybersecurityventures.com
Lawmakers in the US have reintroduced a bipartisan bill to help commercial satellite owners and operators defend against growing cybersecurity threats to satellites. Satellite manufacturer K2 Space has raised $250 million in Series C funding at a $3 billion valuation. Fortastra has emerged from stealth and has raised over $8 million in seed financing, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. T-Minus Guest Elysia Segal brings us the Space Traffic Report from NASASpaceflight.com. Selected Reading Lawmakers revive satellite cybersecurity bill to shield commercial space systems from rising threats - Industrial Cyber K2 Space Raises $250M at $3B Valuation to Roll Out a New Class of High-Capability Satellites Strength Among the Stars: Fortastra Emerges to Build Maneuverable Spacecraft for National Security New Orders Signed With MBDA For Over 35m€- Avio NASA Selects Two Heliophysics Missions for Continued Development NASA JPL Unveils Rover Operations Center for Moon, Mars Missions Share your feedback. What do you think about T-Minus Space Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
"Spear phishing is a direct attack." Connect With Our SponsorsGreyFinch - https://greyfinch.com/jillallen/A-Dec - https://www.a-dec.com/orthodonticsSmileSuite - https://getsmilesuite.com/ Summary In this conversation, Gary Salman, CEO of Black Talon Security, discusses the critical importance of cybersecurity in the dental and orthodontic fields. He shares insights on the evolution of cyber threats, particularly focusing on social engineering and phishing attacks. Gary emphasizes the need for comprehensive training for dental staff to recognize and prevent these threats. He also highlights the significance of understanding cyber risk ratings and the role of AI in enhancing cybersecurity measures. The discussion concludes with practical advice for practices to safeguard patient data and navigate the complexities of modern cybersecurity challenges. Connect With Our Guest Black Talon Security - https://www.blacktalonsecurity.com/ Takeaways Gary has over 33 years of experience in dental technology.He emphasizes the importance of cybersecurity in practices.Social engineering is a major threat, often leading to phishing attacks.Training staff is crucial as 60% of cyber attacks result from human error.Spear phishing is a targeted attack that can compromise email accounts.Antivirus software may not detect legitimate software used by hackers.Cybersecurity requires a proactive approach, similar to healthcare.Understanding cyber risk ratings is essential for practices.AI can enhance cybersecurity but requires due diligence.Practices must be aware of their vulnerabilities and take action.Chapters 00:00 Introduction02:02 Gary Salman's Background and Black Talon Security06:33 Understanding Social Engineering Attacks14:14 Preventative Measures and Training25:58 Understanding Cyber Risk in Dental Practices27:52 The Importance of Cyber Risk Ratings28:19 Known Exploitable Vulnerabilities and Network Security33:13 AI in Healthcare: Benefits and Risks36:09 Best Practices for Using AI in Practices38:49 Final Thoughts and Contact Information Episode Credits: Hosted by Jill AllenProduced by Jordann KillionAudio Engineering by Garrett LuceroAre you ready to start a practice of your own? Do you need a fresh set of eyes or some advice in your existing practice?Reach out to me- www.practiceresults.com. If you like what we are doing here on Hey Docs! and want to hear more of this awesome content, give us a 5-star Rating on your preferred listening platform and subscribe to our show so you never miss an episode. New episodes drop every Thursday!
Ekco, one of Europe's leading security-first managed service providers, has announced the results of new research which reveals that one-in-five (22%) consumers in Ireland are purchasing fewer items online because they fear cyberattacks. For the same reason, 19% say they have started to pay in-person, in cash, when they can. The research, commissioned by Ekco and carried out by Censuswide, surveyed 1,000 adults in the Republic of Ireland, exploring their attitudes to online spending as the volume of cyberattacks and scams continues to rise. It comes at a time when major fashion retailers are considering a return to the high street after declining footfall, exacerbated by the pandemic, drove both shoppers and retailers online. The research suggests that cyber fears could drive more to physical stores this festive season. Despite year-on-year growth in online spending, just 30% of those surveyed believe they know how to check if a retailer's website is safe or not. In fact, in the last 12 months, more than one-in-10 (14%) have entered their payment details on a fraudulent website, thinking it was legitimate, while 26% have found themselves on a fake website which was attempting to mirror a real one. Ekco's research suggests that the constant desire for convenience could be making consumers less focused on security. When offered, 31% opt to store payment details on websites to save time during the check-out process, and the same percentage have payment details stored on multiple websites. However, many consumers are unforgiving when retailers suffer a cyberattack. In the last 12 months, a quarter (25%) of consumers have avoided purchasing from, or using the services of, a retailer because it suffered a cyberattack. Two-thirds (66%) say they would stop shopping with a retailer permanently if their data was stolen in a breach, even if no money was taken. Conor Scolard, Director of Cyber Resilience at Ekco, said: "Our research shows that while consumers want a hassle-free shopping experience - with conveniences such as having their payment details stored - they are also concerned about the security of their information. It is vital that retailers have the robust infrastructure in place that enables them to assure customers that their data is safe, regardless of how they choose to pay: in-person in cash, or online (with or without stored card details). "As we have entered the busiest time of the year for shopping, retailers need to ensure that their systems can both stay onlineand protect customers' data from cyberattacks. Our research highlights that a cyberattack will not only have a negative impact on operations, but it can also cause lasting damage to a business's reputation. In addition, shoppers evidently lack confidence in identifying safe websites from compromised or fraudulent ones, which will undoubtedly lead to hesitation. The retail sector must consider this and its own role in providing convenience and confidence." See more stories here.
Carl Quintanilla, Sara Eisen, and Michael Santoli kicked off the hour with a debate on where the Fed stands when it comes to a possible rate cut this afternoon - before former Fed Vice Chair and current Wharton Professor Alan Blinder gave his take. Plus: hear a wide-ranging interview with Ares CEO Michael Arougheti, spanning markets to what he calls a strong outlook for M&A... Also in focus: the team checked in with the CEO of one company that just partnered with the Department of Defense to stop growing AI cyber threats - and got the latest from Washington as GOP members sound the alarm on Nvidia's China sales. And last in the hour: catch an interview with the CEO of Magnum Ice Cream, talking demand and growth ahead on the heels of a new listing at the New York Stock Exchange. Squawk on the Street Disclaimer Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Welcome back to "Forcepoint," a podcast where we dive deep into the critical and evolving world of cybersecurity. In today's riveting episode, hosts Vince Spina and Rachael Lyon sit down with Maggie Miller, a cybersecurity reporter for Politico, to unpack some of the most pressing cyber threats we face today. From the notorious Ticketmaster hack during Taylor Swift's ticket sales to the geopolitical cyber issues involving heavyweights like China and Israel, Maggie provides a comprehensive overview of the current cyber landscape. We'll explore the bipartisan effort needed to safeguard US infrastructure, including the vulnerabilities of our satellite systems, and the intricate dynamics of election security poised to affect the upcoming U.S. presidential election. Maggie also sheds light on the disinformation campaigns waged by nation-states and the role of AI in shaping public perception. And, with her unique background and serendipitous journey into cybersecurity journalism, we'll get a glimpse into her fascinating career path. To cap it off, we'll discuss the UN's controversial cyber treaty and its global implications. Don't miss out on this engaging episode brimming with insights and expert opinions on the state of cybersecurity. Stick around until the end for some light-hearted moments and a reminder to subscribe to "Forcepoint." For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e362
Lori Gorman, deputy insurance commissioner, North Carolina, said harder markets and emerging risks are spurring companies to seek customized coverage. Gorman spoke with AM Best TV at the Vermont Captive Insurance Association Conference, Burlington.
This episode of Cybersecurity Today, hosted by Jim Love, delves into various cybersecurity threats and latest news. Topics include 'living off the land' attacks using Microsoft's native utilities, spoofing Calendly invites for phishing Google and Meta credentials, a significant breach at the University of Pennsylvania linked to Oracle E-Business Suite vulnerabilities, and findings on AI jailbreaks tied to syntactic patterns by researchers from MIT, Northeastern University, and Meta. The episode emphasizes the ongoing challenges and evolving strategies in cybersecurity. 00:00 Introduction and Sponsor Message 00:43 Living Off the Land Attacks Explained 03:41 Fake Calendly Invites and Phishing Campaigns 05:47 Oracle Breach and Its Implications 07:55 AI Jailbreaks and Syntax Hacking 11:27 Conclusion and Final Thoughts
In this episode of Darnley's Cyber Café, we dive into the fascinating, and slightly unsettling, world of biorobotics, where human biology meets advanced robotics and neural technology. From groundbreaking innovations like Neuralink, next-gen prosthetics, and brain-computer interfaces, to the hidden cybersecurity risks of merging technology directly with the human body, this episode explores both the promise and the peril of becoming interconnected beings.We break down real-world examples, ethical concerns, emerging vulnerabilities, and the security challenges of implants, smart prosthetics, and bio-integrated devices. The future is closer than ever, and with every upgrade comes a new responsibility to protect our autonomy, privacy, and safety.Grab a coffee, settle in, and discover what humanity looks like when technology becomes part of who we are... and why cybersecurity urgently must evolve alongside it.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
A new report out of ETH Zürich that sheds light on a spike in cyber activity targeting space-related organizations during the Gaza War. A Soyuz rocket has been rolled out to its launch pad at the Baikonur Cosmodrome in Kazakhstan to begin counting down to a Thanksgiving Day liftoff. South Korea's Nuri rocket is scheduled to lift off at approximately 12:55 am on Thursday, according to the Korea Aerospace Administration, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. Selected Reading New Report Warns Space Sector Faces Rising Cyber Threats Amid Modern Conflicts - Orbital Today Soyuz Rocket Rolls Out as Cygnus Parks Away from Station - NASA First nighttime Nuri rocket launch creates excitement throughout Jeolla as local businesses benefit Professor Chan Heum Park's Team at Hallym University Chuncheon Sacred Heart Hospital Sends Their Self-Developed "BioCabinet" to Space Aboard Nuri Rocket AST SpaceMobile Expands Manufacturing Footprint in Both Texas and Florida, Accelerates Next-Generation BlueBird Production Intuitive Machines Expands Manufacturing Capabilities at Houston Spaceport Supporting Growing Space Infrastructure Programs Vast and the Colombian Space Agency Sign Memorandum of Understanding (MOU) to Advance Space Cooperation in Latin America Vast and the Maldives Space Research Organisation Sign Memorandum of Understanding to Engage Republic of Maldives Space Industry Spire Global's Hyperspectral Microwave Sounder Completes Environmental Testing BlackSky Quickly Delivers First Very High-Resolution Images from Third Gen-3 Satellite Less Than 24 Hours Following Launch Amentum Reports Strong Fourth Quarter and Fiscal Year 2025 Results Share your feedback. What do you think about T-Minus Space Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of Darnley's Cyber Café, we dive into the real story behind CrowdStrike's recent insider scandal, and what it teaches us about the hidden dangers brewing inside modern companies. We break down how a “bad apple” employee allegedly leaked internal information to a notorious hacking collective, why insider threats are so hard to detect, and how businesses can spot warning signs before damage is done.If you've ever wondered how hackers exploit trust, how companies uncover hidden risks, or how one employee can change everything, pull up a chair. This episode might make you look at your workplace… and your latte… a little differently.Tune in to find out what's really simmering beneath the surface.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
Aon's Brent Rieth discusses the ripple effects of the Cyber Information Security Act (CISA) not being renewed, warning that insurers now face a major data gap in assessing … Read More » The post EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt appeared first on Insurance Journal TV.
Aon's Brent Rieth discusses the ripple effects of the Cyber Information Security Act (CISA) not being renewed, warning that insurers now face a major data gap in assessing … Read More » The post EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt appeared first on Insurance Journal TV.
Aon's Brent Rieth discusses the ripple effects of the Cyber Information Security Act (CISA) not being renewed, warning that insurers now face a major data gap in assessing … Read More » The post EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt appeared first on Insurance Journal TV.
The rise of artificial intelligence (AI) in cyber attacks is prompting small and medium-sized businesses (SMBs) to adopt managed detection and response (MDR) services and explore autonomous security operations centers (SOCs). Research from TechAisle indicates that awareness of MDR among SMBs increased from 39% in 2023 to 61% in 2025, with 89% of mid-market firms prioritizing cyber resilience. This shift is driven by the need for effective security operations that do not rely on in-house expertise, as AI-driven threats evolve faster than traditional defenses can respond.A report from UpGuard highlights the prevalence of shadow AI, revealing that 68% of security leaders use unauthorized AI tools, with 90% of them bypassing corporate governance. This disconnect between security protocols and employee behavior underscores the need for organizations to adapt their governance strategies. Additionally, a significant cyber attack attributed to a Chinese state-sponsored group demonstrated AI's capability to autonomously conduct reconnaissance and data exfiltration, marking a shift in threat actor tactics.Retail executives are increasingly concerned about their employees' ability to identify genuine cyber threats, with 44% reporting a rise in cyber attacks. Despite this awareness, only 25% feel prepared for AI-driven incidents. The report emphasizes the necessity for retailers to adopt a resilience-focused approach, including improved application security and identity controls, to mitigate risks associated with sophisticated cyber threats. This highlights a broader trend across industries where reliance on employee training alone is insufficient to combat evolving threats.For Managed Service Providers (MSPs), these developments present both challenges and opportunities. The increasing complexity of cyber threats necessitates a shift towards operational models that prioritize continuous verification and behavioral analysis over traditional detection methods. MSPs can leverage this moment to guide organizations in developing effective cybersecurity strategies that address the preparedness gap, ensuring that clients are equipped to handle the evolving landscape of AI-driven attacks. Four things to know today00:00 AI-Powered Attacks Accelerate as SMB Security Transitions Toward Autonomous SOC Models, Exposing a Governance Gap Around Shadow AI06:43 Retail Executives Report Rising AI-Driven Threats and Low Preparedness, Underscoring the Shift from User Training to Resilience08:50 Stealthier North Korean Campaigns and a Fragmented Ransomware Ecosystem Signal Rising Detection Challenges for MSPs11:49 Cork's New Vantage Platform Targets Unified MSP Risk Validation — But Its Visibility Metrics Demand Scrutiny This is the Business of Tech. Supported by: https://mailprotector.com/mspradio/
In this episode of the Cyber Uncut podcast, David Hollingworth catches up with Proofpoint's chief strategy officer, Ryan Kalember, and vice president of systems engineering for the APJ region, Adrian Covich, while attending the Proofpoint Protect Tour in Melbourne. The three talk about the high-level trends and concerns they're seeing from CISOs both in Australia and abroad and the very real challenges of dealing with a fast-paced and ever-evolving threat landscape. Enjoy the episode, The Cyber Uncut team
In this episode of The Digital Executive, host Brian Thomas welcomes Yakir Golan, CEO and Co-founder of Kovrr, a global leader in cyber and AI risk quantification. Drawing from his early career in Israeli intelligence and later roles in software, hardware, and product management, Yakir explains how his background shaped his holistic approach to understanding complex, interconnected risk systems.Yakir breaks down why quantifying AI and cyber risk—rather than relying on subjective, color-coded scoring—is becoming essential for enterprise leaders, boards, and regulators. He explains how Kovrr's new AI Risk Assessment and Quantification module helps organizations model real financial exposure, understand high-impact “tail risks,” and align security, GRC, and finance teams around a shared, objective language.Looking ahead, Yakir discusses how global regulation, including the EU AI Act, is accelerating the need for measurable, defensible risk management. He outlines a future where AI risk quantification becomes a board-level expectation and a foundation for resilient, responsible innovation. Through Kovrr's mission, Yakir aims to equip enterprises with the same level of intelligence-driven decision making once reserved for national security—now applied to the rapidly evolving digital risk landscape.If you liked what you heard today, please leave us a review - Apple or Spotify.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In this episode of Compliance Unfiltered, The CU Guys dive into the challenges and strategies for retailers as they gear up for the holiday season. With cyber threats on the rise, particularly AI-driven attacks, the duo discusses the importance of proactive measures, employee training, and maintaining PCI compliance. They also explore the impact of seasonal hiring and the need for vigilance in protecting sensitive data. Tune in to learn how retailers can navigate the bustling holiday period while safeguarding their operations.
Cyberthreats are everywhere, and while they may be inevitable, their impact can be manageable. Institutions who are prepared for cybersecurity disruptions are proactive and collaborative about their response. This episode of the Forward Thinking Podcast features FCCS SVP of Marketing and Communications Stephanie Barton, Lisa Parrinello, FCCS VP of Risk Management & Insurance Services and Naomi Baumann, FCCS VP of Claims & Insurance Services. Together they discuss how Farm Credit's Captive Insurance Company is helping institutions strengthen their cyberdefenses and what boards of directors need to know to stay ahead of the cybersecurity game. Episode Insights Include: The bigger picture of cyberthreats Cyberthreats used to be considered an IT-only problem, but that isn't the case anymore. These enterprise-wide issues demand board-level attention. Ransomware, extortion, targeted financial systems and AI deep-fake impersonations are some of today's biggest cyberthreats. The goal today isn't just protection, it's resilience. A prepared institution can respond and recover from cyberthreats no matter where they hit. The role of Farm Credit's Captive Insurance Company As the captive, they provide institutions cyber insurance and management services that go beyond what commercial insurance markets can offer. They offer tailored protection designed specifically for the unique cooperative structure of Farm Credit. Collaborative claims management proactively responds to any incident or threat of incident. Their strategic access to commercial markets allows them to purchase insurance as well. Over the years, Captive has saved an average of $50 million in insurance coverage. Consistent system-wide learning whenever instances occur. Resilience tools and strategies Resilience requires a multi-layered approach based on assents and security needs. Threat detection and response pinpoint vulnerability, endpoint detection, and tabletop exercises. Human-centric risk management and ongoing employee training are critical for cyber risk management. Employees and people are always going to be the weakest link in cybersecurity. Data protection and resilience in communications in sensitive information need to be encrypted and backup tested. Cybersecurity is not an impenetrable armor, it is an anatomy with multiple systems working together to respond and continue operating in a culture of proactive risk management. The pivotal role of the board Directors need to prioritize an approved annual cyber risk manual. Ongoing development and maintenance of a robust program is essential. Boards should receive quarterly reports on threats, vulnerabilities and mitigation actions. Cyber oversight needs to be integrated into business technology planning. FCA should be notified within 36 hours of any cyber incident. The culture of cybersecurity Institutions build resilience when everyone is involved. Third party oversight and engagement with cyber-focused legal counsel is crucial. Most breeches don't happen in bad systems, they happen when good people let down their guard. Muscle memory kicks in when crisis hits, but only when preparation has occurred. Ultimately, cybersecurity is everyone's business. This podcast is powered by FCCS. Resources Connect with Lisa Parrinello — Lisa Parrinello Connect with Naomi Baumann — Naomi Baumann Get in touch info@fccsconsulting.com "The goal isn't just protection – it's resilience." — Naomi Baumann "The Captive provides consistent system-wide learning whenever instances occur." — Lisa Parrinello "Human-centric risk management and ongoing employee training are critical for cyber risk management." — Naomi Baumann "Employees and people are always going to be the weakest link in cybersecurity." — Naomi Baumann "Even without a deep technical knowledge, boards can strengthen resilience by asking the right questions and staying engaged." — Lisa Parrinello "Institutions build resilience when everyone is involved." — Naomi Baumann Resilience is just as much about people as it is about systems." — Naomi Baumann
In this episode of Cybersecurity Today, host David Shipley covers the latest threats in the cybersecurity landscape. Highlights include the emergence of the quantum root redirect (QRR) phishing kit, a sophisticated automated phishing platform targeting Microsoft 365 credentials across 90 countries. The hospitality industry is also being hit with a new 'click fix' phishing campaign, compromising booking systems and targeting hotel guests. Researchers discover new vulnerabilities in ChatGPT, exposing private data via indirect prompt injection attacks. Additionally, the University of Pennsylvania confirms a massive data breach, highlighting the risks of not implementing comprehensive MFA protocols. Stay informed with the latest cybersecurity news and insights to protect your organization. Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst 00:00 Introduction and Sponsor Message 00:46 Quantum Root Redirect: A New Phishing Threat 03:47 Click Fix Phishing Attacks on Hotels 07:58 ChatGPT Vulnerabilities and AI Security Risks 11:37 University of Pennsylvania Data Breach 15:12 Conclusion and Call to Action
We speak with Deepen Desai, Chief Security Officer & Executive Vice President of Cyber & AI Engineering at Zscaler on the latest zero trust and AI innovations empowering organisations to secure their digital transformation journeys and stay ahead of evolving threats.With nearly two decades of expertise in cybersecurity, Deepen is regarded as a pioneer in advancing threat intelligence, secure product development, and enterprise protection. Beyond his scope of leading cyber and AI engineering, Deepen also oversees the ThreatLabz team, a world-class security research group focused on identifying emerging threats, analyzing vulnerabilities, and delivering actionable insights to protect organizations at Zscaler. Under his leadership, Zscaler's award-winning zero-trust architecture continues to evolve, providing businesses with robust defenses against sophisticated attack vectors like ransomware, phishing, and advanced malware.Before joining Zscaler, Deepen held key security leadership positions at Dell SonicWALL, where he helped develop cutting-edge security solutions and strategies for businesses navigating an increasingly complex threat landscape. His breadth of experience in fields like security operations, threat research, and compliance has established him as a respected authority in the industry.#ZL2025 #zerotrustsecurity #mysecuritytv #zscaler
The conversation explores how cybersecurity is integral to space operations, drawing parallels with traditional air defense strategies. Blount discusses the historical context of cybersecurity in space, the role of international law, and the challenges posed by non-state actors. He emphasizes the need for a holistic approach to cybersecurity that includes both space-based and terrestrial components, and the importance of international cooperation in addressing these challenges.Blount warns of the increasing threats from cyber-attacks on space assets and the need for robust legal frameworks to ensure accountability and security. He calls for the development of comprehensive cybersecurity strategies that integrate space and cyberspace, ensuring resilience against a wide range of threats.How can nations protect their space assets from cyber threats? What role does international law play in governing space cybersecurity? How should countries collaborate to enhance global space security?Episode ContributorsP. J. Blount is assistant professor of space law at Durham University. He is also a visiting scholar at Mae Fah Luang University in Chiang Rai, Thailand. Previously, he served as a Lecturer in Law at Cardiff University, an adjunct professor for the LL.M. in the Air and Space Law at the University of Mississippi School of Law, a Postdoctoral Researcher at the University of Luxembourg, an adjunct professor at Montclair State University, and a Visiting Scholar at the Beijing Institute of Technology School of Law. Tejas Bharadwaj is a senior research analyst with the Technology and Society Program at Carnegie India. He focuses on space law and policies and also works on areas related to AI in military domain, Defence tech and Cybersecurity. Every two weeks, Interpreting India brings you diverse voices from India and around the world to explore the critical questions shaping the nation's future. We delve into how technology, the economy, and foreign policy intertwine to influence India's relationship with the global stage.As a Carnegie India production, hosted by Carnegie scholars, Interpreting India, a Carnegie India production, provides insightful perspectives and cutting-edge by tackling the defining questions that chart India's course through the next decade.Stay tuned for thought-provoking discussions, expert insights, and a deeper understanding of India's place in the world.Don't forget to subscribe, share, and leave a review to join the conversation and be part of Interpreting India's journey.
The Cyber Security and infrastructure security agency has been sounding the alarm about cyber threats to us critical infrastructure like power and water systems. CISA officials are particularly concerned about hackers targeting so called operational technology or OT systems. Targeting of those systems could pose major health and safety risks. For more on what the agency is doing to combat those threats. Federal News Network's Justin Doubleday spoke with the OT cyber lead at CISA, Matt Rogers.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Today, we've got Amadou Kane of VicOne live from Austin, TX, at the NMFTA Cybersecurity Conference to talk about the real risks facing transportation, from hackers targeting ELDs and Class 8 trucks to supply chain vulnerabilities that could disrupt the entire freight network! We dive into how attackers manipulate GPS data, hijack vehicle controls, and even exploit EV chargers to threaten infrastructure, how fleets can fight back with onboard intrusion detection systems, real-time monitoring, and tighter OEM and supplier vetting through Software Bills of Materials (SBOMs), why vehicle security isn't just IT security, how cost-cutting at the OEM level creates risk, and what proactive measures the industry must take to protect drivers, assets, and national security! About Amadou Kane Amadou Kane is a Sr. Solution Engineer and the North America Technical Lead at VicOne. With extensive experience in the automotive industry, previously spearheaded Wistron NeWeb's V2X programs in North America and served as the Automotive Business Development Manager, specializing in connectivity and ADAS. Amadou brings a wealth of expertise in developing innovative solutions to address the evolving challenges in automotive technology. He holds a Bachelor of Electrical Engineering and a Master's of Electrical and Computer Engineering, as well as an MBA from the University of Detroit Mercy. Connect with Amadou Website: https://vicone.com/ LinkedIn: https://www.linkedin.com/in/amadoukn/
In this episode of Cybersecurity Today, host Jim Love sits down with Graham Barrie a CISO and white hat hacker, to discuss the critical importance of cybersecurity for small and medium-sized businesses. From the moment Berry fell in love with technology through a Tandy TRS 80 to his current role helping businesses secure their data, this conversation covers the evolution of cybersecurity. They delve into how Berry assists businesses in understanding cybersecurity risks, communicating effectively with clients, and preparing for and recovering from cyber incidents. This episode is packed with insightful stories, practical advice, and a deep dive into the realities of cybersecurity for businesses of all sizes. 00:00 The Urgency of Cybersecurity 00:33 Introduction to the Podcast 01:00 Meet Graham Berry: A White Hat Hacker 01:31 Graham's Journey into Technology 04:04 From Technology to Cybersecurity 05:49 The Reality of Cyber Threats for Small Businesses 10:44 The Importance of Cyber Insurance 14:23 Engaging with Clients on Cybersecurity 17:08 Turning Around a Reluctant Client 20:10 The Growing Demand for Cyber Coverage 22:12 Third Party Risk Management 22:50 Effective Tabletop Exercises 23:58 Engaging Executives in Cybersecurity 26:43 Importance of Cyber Insurance 28:33 Successful Recovery Stories 34:16 Challenges with AI in Security 38:57 Looking Forward in Security 40:21 Conclusion and Farewell
How secure is your trucking operation against cyberattacks? Are you confident your team could spot a phishing email or fake shipper domain before it costs you thousands? Today, listen to cybersecurity expert Melanie Padron speaking about the growing threat landscape in transportation! We discuss why small and mid-sized carriers are prime targets, often hit hardest because they lack dedicated security resources, how AI-powered tools are helping companies stay ahead of evolving cyber risks, and practical solutions: employee training, incident response plans, vendor vetting, and partnering with cybersecurity professionals who understand trucking operations. The key message? “Trust but verify.” As National Cybersecurity Awareness Month reminds us, education and consistency are your best defense. Whether you run one truck or a 500-unit fleet, acquire strategies from this episode to secure your business and protect the future of the industry. About Melanie Padron Melanie Padron is a risk management expert and cybersecurity speaker who has made it her mission to protect trucking companies from cyber threats. She's been right there in the trenches when ransomware attacks hit, helping pick up the pieces after systems are encrypted and ransom demands arrive. After spending over 20 years in the insurance industry helping businesses recover from disasters, Melanie has shifted her focus to something she's even more passionate about: stopping those disasters from happening in the first place through proactive cybersecurity. Her connection to trucking is personal. Growing up working in her family's convenience stores, she watched the steady stream of trucks that kept their gas tanks filled and shelves stocked. Her uncle and aunt were owner-operators who crossed the country delivering freight, giving her firsthand insight into the dedication and sacrifice required to build a trucking business. Working with veteran-owned IT Architeks, Melanie helps trucking leaders secure their fleets and leverage AI to become more efficient and profitable. Her approach is simple: when trucking companies truly understand their risk, real protection begins. One company at a time, she's working to build cyber resilience in the trucking industry. Connect with Melanie Website: https://www.itarchiteks.com/ LinkedIn: https://www.linkedin.com/in/melanie-padron/
____________Podcast Redefining Society and Technology Podcast With Marco Ciappellihttps://redefiningsocietyandtechnologypodcast.com ____________Host Marco CiappelliCo-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybersecurity #Society
Water systems—once considered too small or obscure to be hacked—are now squarely in the crosshairs of cyber actors. In recent months, Bluefield Research has tracked a surge of cyber activity targeting water and wastewater utilities around the world, from the U.S. Cybersecurity and Infrastructure Security Agency's (CISA) release of 32 new control system advisories to Poland's launch of a national cybersecurity framework for water utilities. In this episode of The Future of Water, Bluefield's Barcelona-based Maria Cardenal and Boston-based Leigh Ramsey join host Reese Tisdale to unpack one of the most pressing—and overlooked—threats facing the water sector: cybersecurity. Our water experts explore where these threats are emerging, how utilities are responding, and what the next phase of digital resilience looks like. Key discussion points include: What's really at stake when critical infrastructure is under attack The biggest vulnerabilities in today's water systems—from legacy hardware to weak IT–OT segmentation Real-world examples from the U.S., Norway, and Poland that show how cyberattacks on operational assets are evolving How governments are responding—including Poland's US$1.1 billion cybersecurity initiative for water and wastewater systems How smaller utilities are managing cybersecurity with limited resources The role of new regulations—from the EU's NIS2 Directive to state-level initiatives in the U.S. Why cybersecurity must become part of asset management and workforce training, not an afterthought If you enjoy listening to The Future of Water Podcast, please tell a friend or colleague, and if you haven't already, please click to follow this podcast wherever you listen. If you'd like to be informed of water market news, trends, perspectives and analysis from Bluefield Research, subscribe to Waterline, our weekly newsletter published each Wednesday. Related Research & Analysis: Poland Strengthens Cybersecurity in the Water Sector Cybersecurity Alerts Highlight Water HMI Vulnerabilities
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Carter Zupancich. Chris and Carter explore the evolving landscape of social engineering threats, focusing on the rise of vishing attacks and the role of AI in enhancing these tactics. Their discussion underscores the importance of empowering employees as a human firewall and the need for continuous education and testing to strengthen organizational security. [Oct 20, 2025] 00:00 - Intro 00:31 - Carter Zupancich Intro - Website: https://carterzupancich.com/ 01:30 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:35 - Tools, Tactics and Procedures 05:19 - Tech Advances 08:16 - The Classics 10:01 - The Need for Testing 12:16 - Callback Phishing 17:26 - Setting Expectations 21:56 - Approved Language 23:56 - Verify! 25:16 - Empowerment 26:17 - And Now a Horrible Story 28:47 - Investing In Employees 31:19 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Michael chats with Russell Teague, Chief Information Security Officer (CISO) at Fortified Health Security. Together, they discuss how the role of CISO is evolving amid today's cyber threat landscape and regulatory environment, areas in which healthcare needs to improve cyber resilience, why experience is so important in the clinical environment when selecting a vendor or SOC service partner, how CISOs can mitigate massive cyber disruptions and risks, and much more. To learn more about Fortified Health Security, visit FortifiedHealthSecurity.com.
In the fourth instalment in our Expert Insights series on cyber threats and security for 2025, we are joined once again by Edward Millington, of CariSec Global, which is headquartered in Barbados. In this conversation, Edward discusses, among other things: * current trends in cybersecurity; * whether there are well-defined paths to pursue specific cybersecurity-related disciplines or specialities; * availability of suitable talent in the security job market; and * tactics Caribbean countries should be employing to be more prepared and resilient to cyber threats. The episode, show notes and links to some of the things mentioned during the episode can be found on the ICT Pulse Podcast Page (www.ict-pulse.com/category/podcast/) Enjoyed the episode? Do rate the show and leave us a review! Also, connect with us on: Facebook – https://www.facebook.com/ICTPulse/ Instagram – https://www.instagram.com/ictpulse/ Twitter – https://twitter.com/ICTPulse LinkedIn – https://www.linkedin.com/company/3745954/admin/ Join our mailing list: http://eepurl.com/qnUtj Music credit: The Last Word (Oui Ma Chérie), by Andy Narrell Podcast editing support: Mayra Bonilla Lopez ---------------
How is the transition to passkeys going in 2025?
The Export-Import Bank of the United States (EXIM) facilitates trades of exports of goods and services and, in doing so, deals with massive troves of data. From the Billington Cybersecurity Summit, EXIM CISO, Chief Privacy Officer, and Deputy Chief AI Officer Darren Death tells CyberCast that his agency is centralizing data about user access and behavior to detect potential cyber threats. Death says that balancing cybersecurity with privacy remains a challenge, especially in complex IT ecosystems involving financial institutions. He stresses the need to “shift left” by embedding privacy and security requirements early in the development lifecycle and include business leaders in conversations about cybersecurity, privacy and usability. He also says that the EXIM is using generative AI to simulate incident response scenarios, escalating threats to test team readiness. Death adds that EXIM is positioning AI as a force multiplier rather than a job threat.
In this episode of Cybersecurity Today, host David Shipley discusses several major events, including the FBI's takedown of the Breach Forums portal. This site was associated with a significant Salesforce data breach and extortion campaign led by groups like Shiny Hunters and Scattered Lapses Hunters. Oracle users are also warned about a new critical vulnerability in the E-Business Suite, which could allow unauthorized data access without requiring login credentials. Additionally, the resurgence of the Asuru botnet, leveraging compromised IoT devices to execute large-scale DDoS attacks, raises concerns. The episode emphasizes the need for immediate patching and robust security measures by organizations and consumers alike. A positive note highlights a cybersecurity awareness initiative by the Indiana Toll Road. 00:00 FBI Takes Down Breach Forums 03:42 Oracle E-Business Suite Vulnerability 07:39 Massive Botnet Threatening US Networks 11:04 Community Cybersecurity Awareness 11:47 Conclusion and Sign-Off
Manufacturers are operating in a world where insurance markets are anything but stable, and the stakes have never been higher. In this episode, Risk Management Consultant Katie Hensley joins host Leisa Fox to demystify the shifting Property & Casualty landscape. From the shrinking property market to nuclear liability verdicts, Katie explains how manufacturers can adapt, update valuations, manage open recommendations, and strengthen communication to protect themselves against emerging risks. The conversation ranges from property, business interruption, and E&O, to workers' compensation, fleet, cyber, and management liability. Katie emphasizes proactive risk management, smarter use of data, and a team-based approach to claims and compliance. Whether you're a business owner, risk manager, or operations leader, you'll leave this episode with actionable insights to help your company weather today's insurance challenges while positioning for tomorrow's opportunities. Find this show on your favorite app: https://iowapodcast.com/katie-hensley
Cyber breaches are never far from the news and, as Nokia releases its latest Threat Intelligence Report, Kal De, SVP of Product and Engineering for Cloud and Network Services at Nokia, talks to the Network Effect about the current threat landscape and what businesses should focus on right now.
In this episode of 'Cybersecurity Today: Our Month in Review,' host Jim welcomes a panel including Tammy Harper from Flair, Laura Payne from White Tuque, and David Shipley, CEO of Beauceron Securities. The discussion kicks off with an overview of their plans for Cybersecurity Month, including reviving the MapleSEC show and the CIO of the Year awards. David shares his experiences at SECTOR, Canada's largest cybersecurity conference, discussing the importance of security awareness training and the risks of irresponsible tech journalism on public perception. The panel also delves into the resurgence of the Clop ransomware group, their shift to data extortion, and their exploitation of vulnerabilities in Oracle EBS applications. Laura highlights a concerning case of insider threats at RBC, emphasizing the importance of process-driven controls. The episode also touches on the human side of cybersecurity, particularly the impact of romance scams and the growing violence in cybercrime. The panelists underscore the need for improved security awareness and the role of AI in identifying scams. Tammy, Laura, and David conclude by discussing the role of insider threats and the ethical boundaries in cybercrime, sharing insights from recent real-world cases. 00:00 Introduction and Panelist Introductions 00:43 Cybersecurity Month Initiatives 02:46 Security Awareness and Phishing Training 04:03 Impact of Irresponsible Tech Journalism 08:27 AI and Cybersecurity: Hype vs. Reality 10:43 Conference Experiences and Networking 18:33 Clop Ransomware and Data Extortion 23:45 Tammy's Insights on Clop's Tactics 24:58 Scattered Lasus and Cyber Warfare 26:32 Media Savvy Cybercriminals 31:36 Human Impact of Cyber Scams 37:17 Insider Threats and Security Awareness 43:21 Physical Security and Cyber Threats 48:33 Cybercrime Targeting Children 50:58 Conclusion and Upcoming Topics
Send us a textIn this episode of Investors Coffee Shop, Brian Harte sits down with Joe Soeka, a cybersecurity and digital forensics expert with over a decade of hands-on experience in identifying and analyzing cyber threats. Joe has worked extensively in digital forensics and incident response, holding advanced certifications that allow him to tackle complex technical challenges head-on.Joe shares insights on:The most pressing cyber threats facing individuals and businesses todayHow digital forensics uncovers the truth hidden within systems and dataPractical steps anyone can take to strengthen their personal and organizational cybersecurity postureListeners will also walk away with tools and resources to stay ahead of evolving threats. One highlighted resource is Have I Been Pwned, a free service where you can check if your email or phone number has been part of a data breach.Whether you're an investor, entrepreneur, or just someone who wants to better understand how to protect your digital identity, this episode is packed with valuable knowledge.Support the show
As artificial intelligence reshapes workplaces and business strategies, firms increasingly depend on AI providers, making AI a tool of geopolitical influence. We'll discuss the impact across industries, as digital currencies affect monetary control and cyber threats challenge operational resilience. Host: William Foster, Senior Vice President, Sovereign Risk Group, Moody's Ratings Guests: Vincent Gusdorf, Associate Managing Director, Digital Finance and AI Analytics, Moody's Ratings; Leroy Terrelonge, Vice President-Analyst, Cyber Credit Risk, Moody's Ratings Related research:Artificial Intelligence – Global – Nations push for AI sovereignty to capture economic, geopolitical gains 30 September 2025 Sovereigns - Global – Digital currency growth, inconsistent regulation amplify countries' financial risks 25 September 2025Artificial Intelligence – Corporates – Pace of AI advances, regional disparities will steer credit trends across industries 23 September 2025 Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Small businesses have become the number one target for cyber attacks, yet most entrepreneurs don't realize how vulnerable they are until it's too late. One attack could wipe out years of growth and instantly damage customer trust. In this episode, presented by Bitdefender, Ramon explains why cybersecurity is essential for small business owners and how they can protect their business from today's digital threats without hiring an IT team or becoming a tech expert. In this episode, Hala and Ramon will discuss: (00:00) Introduction (03:03) Entrepreneurship Lessons and Personal Branding (06:09) Public Speaking Strategies to Build Influence (09:51) Why Small Businesses are at Risk of Cyber Threats (12:21) Common Cyber Attacks and How to Prevent Them (18:37) Cyber Attack Scenarios and What to Do (28:49) How Creator Entrepreneurs Build Audience Trust (33:15) How Entrepreneurs Profit by Embracing Failure Ramon Ray is a serial entrepreneur, bestselling author, keynote speaker, and small business expert. He is the publisher of ZoneofGenius.com and has spoken to global audiences on major stages, including SXSW, VeeCon, and the Aspire Tour. As Bitdefender's Small Business Ambassador, Ramon helps entrepreneurs protect their businesses against cybersecurity threats. Sponsored By: Bitdefender Ultimate Small Business Security: Save 30% when you go to bitdefender.com/profiting Resources Mentioned: Ramon's Book, The Celebrity CEO: bit.ly/CelebCEO Ramon's Website: zoneofgenius.com Active Deals - youngandprofiting.com/deals Key YAP Links Reviews - ratethispodcast.com/yap YouTube - youtube.com/c/YoungandProfiting LinkedIn - linkedin.com/in/htaha Instagram - instagram.com/yapwithhala Social + Podcast Services: yapmedia.com Transcripts - youngandprofiting.com/episodes-new Disclaimer: This episode is a paid partnership with Bitdefender. Sponsored content helps support our podcast and continue bringing valuable insights to our audience. Entrepreneurship, Entrepreneurship Podcast, Business, Business Podcast, Self Improvement, Self-Improvement, Personal Development, Starting a Business, Strategy, Investing, Sales, Selling, Psychology, Productivity, Entrepreneurs, AI, Artificial Intelligence, Technology, Marketing, Negotiation, Money, Finance, Side Hustle, Startup, Mental Health, Career, Leadership, Mindset, Health, Growth Mindset, Passive Income, Online Business, Solopreneur, Founder, Networking
Send us a textIn this episode of Joey Pinz Discipline Conversations, Joey sits down with Scott Fuhriman, cybersecurity veteran and leader at Inveri, live from the MSP Summit in Orlando.Scott shares his 25+ years of cybersecurity experience, explaining how Inveri's runtime integrity technology, born from NSA research, helps MSPs and MSSPs detect hidden in-memory attacks, rootkits, and advanced threats that traditional tools miss. He highlights why protecting this overlooked layer is crucial to preserving revenue, preventing churn, and maintaining customer trust.The conversation also touches on Scott's personal discipline journey — from starting as a young PC tech overwhelmed by information to building a career through self-study, mentorship, and consistency. He and Joey discuss how MSPs can choose the right vendors, strengthen their security stacks, and enable long-term resilience in a competitive market.
Show Featured Sponsor: Precision Holsters:These guys have a lifetime, no questioned asked 100% guarantee. They are makers of high-quality holsters, belts, and magazine pouches. Visit them at: Precision Holsters and use code “seekAWS” for a discount. In this episode of the American Warrior Show, Rich Brown is joined by Andrew Frisbie (Practical Cyber Defense) to dig into the threats America faces in cyberspace—and how we must respond.
Cybersecurity has been on the Government Accountability Office's (GAO) high-risk list since 1997. Federal agencies struggle with issues like cyber hygiene, cyber workforce shortages and strategic execution. While agencies put strategies in place to secure their systems, the implementation and execution can be ineffective, according to GAO Managing Director of IT and Cybersecurity Nick Marinos. Marinos says that evolving threats have reshaped the cybersecurity landscape over the years in government, making evolution a moving target. Agencies are adjusting their workforces accordingly, he says, but is is difficult to keep pace with emerging technology. He underscores the urgency of streamlining federal hiring processes to prevent losing top talent to faster-moving private sector opportunities.
Terry Ray is the Vice President of Product Strategy at Varonis. In this episode, he joins host Paul John Spaulding to discuss database security, including defense against modern cyber threats, risks associated with over-permissioned users and applications, and more. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://www.Varonis.com.
Alexander Schlager, CEO of Aiceberg.ai, discusses the intersection of artificial intelligence (AI) and cybersecurity, emphasizing the importance of securing AI-powered workflows. Aiceberg employs traditional machine learning techniques to safeguard generative AI systems, providing a deterministic and explainable approach to security. This method allows organizations to understand how their AI systems operate and ensures that they can trace and audit the decisions made by these systems, which is crucial in an era where AI incidents may lead to legal challenges.The conversation highlights the need for organizations to establish robust governance frameworks as they adopt AI technologies. Schlager points out that many businesses are still grappling with basic cybersecurity measures, which complicates their ability to implement effective AI governance. He stresses that organizations must assess their existing security postures and ensure that they are prepared for the rapid deployment of agentic AI, which allows non-technical users to create and manage AI workflows independently.Schlager provides concrete examples of how Aiceberg's technology is integrated into real-world applications, such as in the banking sector, where AI workflows may involve third-party interactions. He explains that Aiceberg monitors these interactions to classify and respond to potential security threats, ensuring that organizations can demonstrate compliance and safety in the event of an incident. This proactive approach to security is essential for maintaining trust and accountability in AI systems.Finally, the discussion touches on the broader implications of AI adoption, including the potential for improved customer experiences across various industries. Schlager notes that while AI can enhance service delivery, organizations must navigate the challenges of user expectations and the maturity of their AI implementations. By focusing on customer service and experience, companies can unlock significant value from their AI investments, but they must also prioritize security and governance to mitigate risks. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
➡ Stay Ahead of Cyber Threats with AI-Driven Vulnerability Management with Maze:https://mazehq.com/ In this conversation, I speak with Harry about how AI is transforming vulnerability management and application security. We explore how modern approaches can move beyond endless reports and generic fixes, toward real context-aware workflows that actually empower developers and security teams. We talk about: The Real Problem in Vulnerability ManagementWhy remediation—not just prioritization—remains the toughest challenge, and how AI can help bridge the gap between vulnerabilities and the developers who need to fix them. Context, Ownership, and VelocityHow linking vulnerabilities to the right applications and teams inside their daily tools (like GitHub) reduces friction, speeds up patching, and improves security without slowing developers down. AI Agents and the Future of SecurityWhy we should think of AI agents as “extra eyes and hands,” and how they’re reshaping everything from threat detection to system design, phishing campaigns, and organizational defense models. Attackers Move FirstHow attackers are already building unified world models of their targets using AI, and why defenders need to match (or exceed) this intelligence to stay ahead. From Days to MinutesWhy the tolerance for vulnerability windows is shrinking fast, and how automation and AI are pushing us toward a future where hours—or even minutes—make the difference. Subscribe to the newsletter at:https://danielmiessler.com/subscribe Join the UL community at:https://danielmiessler.com/upgrade Follow on X:https://x.com/danielmiessler Follow on LinkedIn:https://www.linkedin.com/in/danielmiessler Chapters: 00:00 – Welcome and Harry’s Background01:07 – The Real Problem: Remediation vs. Prioritization04:31 – Breaking Down Vulnerability Context and Threat Intel05:46 – Connecting Vulnerabilities to Developers and Workflows08:01 – Why Traditional Vulnerability Management Fails10:29 – Startup Lessons and The State of AI Agents13:26 – DARPA’s AI Cybersecurity Competition14:29 – System Design: Deterministic Code vs. AI16:05 – How the Product Works and Data Sources18:01 – AI as “Extra Eyes and Hands” in Security20:20 – Breaking Barriers: Rethinking Scale with AI23:22 – Building World Models for Defense (and Attack)25:22 – Attackers Move Faster: Why Context Matters27:04 – Phishing at Scale with AI Agents31:24 – Shrinking Windows of Vulnerability: From Days to Minutes32:47 – What’s Next for Harry’s Work34:13 – Closing ThoughtsBecome a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.
Today's guest is Kyle Ryan, Senior Engineering Manager and Principal Engineer at Dune Security. Founded in 2023, Dune Security's User Adaptive Risk Management solution automatically prevents insider threats in real time. With 90% of breaches starting from human error, traditional phishing simulations and compliance training often fail to reduce real-world risk. Dune addresses this with a unified platform that continuously monitors behavior, tailors interventions and adapts protections around high-risk users.Kyle is highly skilled in AI & Machine Learning research and development, with a specialization in building secure, robust and scalable systems for cutting-edge cybersecurity solutions. He is currently developing advanced technologies to prevent AI-powered social engineering attacks and enable real-time, dynamic risk profiling of employees. Kyle believes that as threat actors evolve, organizations must adapt using data-driven methods to reduce the attack surface and strengthen defenses.In this episode, Kyle talks about:0:00 His journey from early chatbot work to founding engineer at Dune2:19 How Dune Security simulates advanced phishing attacks to train users4:45 How his role evolved from generalist to AI R&D8:17 Delivering authentic threat simulations and risk visibility for organizations11:20 Why future threats will be hyper-personalised, cross-channel and AI-driven14:58 His key advice to stay on AI's cutting edge and solve hard problemsTo find out more about all the great work happening at Dune Security, check out the website www.dune.security
- Anniversary of Japanese Surrender and U.S. Occupation (0:10) - Trump's Tariffs and the International Emergency Economic Powers Act (2:34) - Impact of Trump's Tariffs on U.S. Allies and Global Relations (9:21) - Challenges of Shifting Manufacturing to the U.S. (10:02) - AI and Knowledge Mining (14:07) - Trump's Criticism of Operation Warp Speed and Vaccines (24:27) - The Future of Medicine and AI (30:09) - Economic and Political Implications of Trump's Policies (48:20) - Interview with Don Brown on Power Grid Security (48:40) - Strategies for Securing the Power Grid (1:16:29) - Challenges of Depending on Foreign Manufacturers (1:19:14) - Rising Domestic Tensions and Power Grid Vulnerabilities (1:23:35) - Legislation and Cyber Threats (1:30:16) - Protecting Against EMP and Solar Threats (1:32:37) - Preparedness and Personal Responsibility (1:37:42) - Final Thoughts and Recommendations (1:41:12) For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com
Considering how often we utilize technology, we don't spend as nearly as much time as we should protecting ourselves against the inherent vulnerabilities and bad actors who would exploit the very tools designed to improve our lives. The fact of the matter is, cybersecurity has become a huge issue (only to become more relevant as technology advances). My guest today, Dr. Eric Cole, has spent decades learning, understanding, and teaching people how to protect themselves and their loved ones from cyber-threats. Today, we talk about the apps that are more dangerous than others, how best to keep your children safe from online predators, what he calls, cyber-hygiene, why passwords are dead and what to do about it, and why social media will never fully protect children. SHOW HIGHLIGHTS 00:00 - Introduction 00:21 - Welcoming Dr. Eric Cole 00:26 - Importance of Cybersecurity for Families 01:24 - Dangers of Sharing Personal Information Online 02:47 - Targeting Vulnerable Individuals 04:26 - Impact of Technology on Parenting 05:45 - Prevalence of Child Exploitation 08:12 - Monitoring Kids' Online Interactions 10:00 - Social Media Security Measures 12:16 - Identifying Suspicious Accounts 15:00 - Limiting Kids' Access to Smartphones 19:09 - Balancing Technology Use 22:32 - Monitoring Social Media Comments 26:00 - Risks of Location Tracking in Photos 30:06 - Moving Beyond Passwords 32:31 - Avoiding Malicious Links 35:13 - Value of Online Protection Services 37:51 - Cell Phones and Privacy Concerns 43:03 - Importance of Software Updates 45:20 - Benefits of Using VPNs 46:43 - Upgrading Technology Safely 49:20 - AI as a Tool, Not a Replacement 52:43 - Practical Cybersecurity Tips 54:24 - Closing Remarks Battle Planners: Pick yours up today! Order Ryan's new book, The Masculinity Manifesto. For more information on the Iron Council brotherhood. Want maximum health, wealth, relationships, and abundance in your life? Sign up for our free course, 30 Days to Battle Ready