The protection of computer systems from theft or damage
POPULARITY
Categories
Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that work. The field needs people at all levels, and you don't need a four-year degree to break in. We'll discuss all the details, including a list of projects for beginners in Cybersecurity, plus plenty of non-technical suggestions! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-907
Across 152 conversations this year, a set of recurring patterns kept surfacing, regardless of whether the discussion focused on application security, software supply chain risk, AI systems, or creative work. The industries varied. The roles varied. The challenges did not.One theme rises above the rest: visibility remains the foundation of everything else, yet organizations continue to accept blind spots as normal. Asset inventories are incomplete. Build systems are poorly understood. Dependencies change faster than teams can track them. The issue is not a lack of tools. It is a willingness to tolerate uncertainty because discovery feels hard or disruptive.Another pattern is equally consistent. Integration matters more than novelty. New features, including AI-driven ones, sound compelling until they fail to connect with what teams already rely on. Security programs fracture when tools operate in isolation. Coverage looks strong on paper while gaps quietly expand in practice. When tools fail to integrate into existing environments, they create complexity instead of reducing risk.Security also continues to struggle with how it shows up in daily work. Programs succeed when security is embedded into workflows, automated where possible, and invisible until it matters. They fail when security acts as a gate that arrives after decisions are already made. Teams either adopt security naturally or route around it entirely. There is no neutral middle ground.Context repeatedly separates effective leadership from noise. Risk only becomes meaningful when it is framed in terms of business operations, delivery speed, and real tradeoffs. Leaders who understand how the business actually functions communicate risk clearly and make better decisions under pressure.Finally, creativity remains undervalued in security conversations. Automation should remove repetitive tasks so people can focus on judgment, problem solving, and design. The same mindset that produces elegant guitars, photographs, or products applies directly to building resilient security programs.These five patterns are not independent ideas. Together, they describe a shift toward security that is visible, integrated, contextual, workflow-driven, and human-centered.Read the full article: https://www.linkedin.com/pulse/five-patterns-from-152-podcast-episodes-2025-changed-i-martin-cissp-st1ge________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn: https://itspm.ag/future-of-cybersecuritySincerely, Sean Martin and TAPE9________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of the On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Would you like Sean to work with you on a topic/series to help you tell your story? Visit his services page to learn more: https://www.seanmartin.com/servicesWant to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that work. The field needs people at all levels, and you don't need a four-year degree to break in. We'll discuss all the details, including a list of projects for beginners in Cybersecurity, plus plenty of non-technical suggestions! Show Notes: https://securityweekly.com/psw-907
Notes:Julia Prümmer describes her transition from legal psychology into cybersecurity research and how psychological methods shape her approach to cybersecurity training.The discussion explores the role of systematic reviews in mapping what a research field actually knows, rather than relying on highly visible or frequently cited studies.Findings from a large-scale systematic review of cybersecurity training methods are discussed, highlighting the diversity of training approaches used across the literature.The episode examines results from a meta-analysis assessing the overall effectiveness of cybersecurity training and the gap between improvements in precursors such as knowledge and intentions versus observable behaviour.Julia explains why many cybersecurity training programmes lack explicit behavioural theory and rely on trial-and-error design choices.A key theme is the distinction between cybersecurity behaviours that require active engagement, such as phishing detection, and behaviours that may benefit from habit formation, such as screen locking or password management.The conversation draws on research into email habits and phishing susceptibility to illustrate how habitual behaviour can increase vulnerability in certain contexts.Julia discusses the use of psychological theory, including habit formation and implementation intentions, to design and evaluate cybersecurity training interventions.The episode concludes with reflections on the future of cybersecurity training research and the need for behaviour-specific, theory-informed models.About our Guest:Julia Prümmerhttps://www.universiteitleiden.nl/medewerkers/julia-prummer#tab-1https://www.linkedin.com/in/julia-prümmer-376778159/Papers or resources mentioned in this episode Prümmer, J., van Steen, T., & van den Berg, B. (2024). A systematic review of current cybersecurity training methods. Computers & Security, 136, 103585.https://doi.org/10.1016/j.cose.2023.103585Prümmer, J. (2024). The role of cognition in developing successful cybersecurity training programs: Passive vs. active engagement. In D. D. Schmorrow & C. M. Fidopiastis (Eds.), Augmented cognition. HCII 2024 (Lecture Notes in Computer Science, Vol. 14695, pp. 185–199). Springer.https://scholarlypublications.universiteitleiden.nl/handle/1887/4093101Prümmer, J., van Steen, T., & van den Berg, B. (2025). Assessing the effect of cybersecurity training on end-users: A meta-analysis. Computers & Security, 150, 104206.https://doi.org/10.1016/j.cose.2024.104206Vishwanath, A. (2015). Examining the distinct antecedents of e-mail habits and its influence on the outcomes of a phishing attack. Journal of Computer-Mediated Communication, 20(5), 570–584.https://doi.org/10.1111/jcc4.12126Other If this topic of training as an intervention to reduce susceptibility to cybercrime, you might also enjoy the recent Episodes 123, 116, 110, 106, 60, and 59 that are all on related topics. If you are brave you can even go right back to Episodes 6, 7 and 8, there is a lot to listen to.
Across 152 conversations this year, a set of recurring patterns kept surfacing, regardless of whether the discussion focused on application security, software supply chain risk, AI systems, or creative work. The industries varied. The roles varied. The challenges did not.One theme rises above the rest: visibility remains the foundation of everything else, yet organizations continue to accept blind spots as normal. Asset inventories are incomplete. Build systems are poorly understood. Dependencies change faster than teams can track them. The issue is not a lack of tools. It is a willingness to tolerate uncertainty because discovery feels hard or disruptive.Another pattern is equally consistent. Integration matters more than novelty. New features, including AI-driven ones, sound compelling until they fail to connect with what teams already rely on. Security programs fracture when tools operate in isolation. Coverage looks strong on paper while gaps quietly expand in practice. When tools fail to integrate into existing environments, they create complexity instead of reducing risk.Security also continues to struggle with how it shows up in daily work. Programs succeed when security is embedded into workflows, automated where possible, and invisible until it matters. They fail when security acts as a gate that arrives after decisions are already made. Teams either adopt security naturally or route around it entirely. There is no neutral middle ground.Context repeatedly separates effective leadership from noise. Risk only becomes meaningful when it is framed in terms of business operations, delivery speed, and real tradeoffs. Leaders who understand how the business actually functions communicate risk clearly and make better decisions under pressure.Finally, creativity remains undervalued in security conversations. Automation should remove repetitive tasks so people can focus on judgment, problem solving, and design. The same mindset that produces elegant guitars, photographs, or products applies directly to building resilient security programs.These five patterns are not independent ideas. Together, they describe a shift toward security that is visible, integrated, contextual, workflow-driven, and human-centered.Read the full article: https://www.linkedin.com/pulse/five-patterns-from-152-podcast-episodes-2025-changed-i-martin-cissp-st1ge________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn: https://itspm.ag/future-of-cybersecuritySincerely, Sean Martin and TAPE9________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of the On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Would you like Sean to work with you on a topic/series to help you tell your story? Visit his services page to learn more: https://www.seanmartin.com/servicesWant to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Heute mal ganz anders... Ein überraschender Einstige ins 2026! Diese Folge musst Du gehört haben.
Garrett Smith discusses how geopolitical shifts and policy changes have radically transformed the defense and A.I. industries over the past few years. European defense Exchange Traded Funds have seen significant gains, and Smith anticipates continued growth in private markets as A.I. competition, particularly between China and the U.S., intensifies. Cybersecurity remains an evergreen opportunity, and Smith believes that deploying cutting-edge technology will deter conflict.======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
In Episode 168 of Cybersecurity Where You Are, Tony Sager sits down with Tony Rutkowski, one of the CIS Critical Security Controls® (CIS Controls®) Ambassadors of the Center for Internet Security® (CIS®). Together, they discuss what Tony Rutkowski has learned in his efforts to institutionalize good cybersecurity ideas like the CIS Controls.Here are some highlights from our episode:01:48. Introductions to Tony Rutkowski and his career in technology06:06. The evolution of the CIS Controls and how Tony Rutkowski came to advocate for them12:50. The "Fog of More" as a metaphor to focus attention, not create new solutions17:50. How institutionalizing good cybersecurity ideas is like conducting an orchestra21:44. The use of timing and the right security content to help people clarify their intentions24:25. The value of industry mappings in reducing duplicate implementation efforts26:41. Secure by design: a 2025 example of creating a new formal global technical standardResourcesEpisode 160: Championing SME Security with the CIS ControlsEpisode 167: Volunteers as a Critical Cybersecurity ResourceReasonable Cybersecurity GuideCybersecurity at Scale: Piercing the Fog of MoreMapping and Compliance with the CIS ControlsSecure by Design: A Guide to Assessing Software Security PracticesEpisode 164: Secure by Design in Software DevelopmentCIS Critical Security Controls Implementation GroupsIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
In part two of the 'Best of 2025' series of Reimagining Cyber, hosted by Rob Aragao, the focus is on the human elements influencing cybersecurity. The episode explores the challenges of burnout in the cybersecurity workforce as explained by Dr. Andrew Reeves, a cyber psychology expert. Betsy Cooper of the Aspen Policy Academy emphasizes the importance of integrating personal experiences and community voices in shaping cybersecurity policy. Lynn Dohm, Executive Director of Women in Cybersecurity (WiCyS), shares inspiring stories of individuals transitioning into cybersecurity careers. Finally, Craig Taylor of CyberHoot discusses a more effective approach to training that leverages positive reinforcement over punishment. The episode underlines that cybersecurity is not just about technology but also about understanding and supporting the people behind it.00:00 Introduction to Reimagining Cyber00:24 The Human Side of Cybersecurity: Burnout04:43 Shaping Cybersecurity Policy with Personal Experience07:00 Opening Doors: Women in Cybersecurity10:27 Effective Cybersecurity Training: Positive Reinforcement12:51 Conclusion: The Future of CybersecurityIt's 5 years since Reimagining Cyber began. Thanks to all of our loyal listeners!As featured on Million Podcasts' Best 100 Cybersecurity Podcasts Top 50 Chief Information Security Officer CISO Podcasts Top 70 Security Hacking Podcasts This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
In this conversation, I break down the state of cybersecurity heading into 2025—and it's not pretty. Ransomware isn't “ramping up,” it's eating the market alive, while too many organizations are still betting their future on outdated controls, checkbox compliance, and the fantasy that perimeter security is a strategy. I call out the continued failure of traditional security models, the uncomfortable reality of high-profile vendor missteps, and the industry's habit of confusing tool sprawl with actual risk reduction.My bottom line is simple: Zero Trust isn't a buzzword; it's the only approach that aligns with how modern environments actually operate—cloud-first, identity-driven, and constantly under attack. If you want real improvement, start treating identity like the control plane, tighten your cloud and endpoint fundamentals, get serious visibility into what's connecting and what's executing, and stop pretending “prevention” alone is a plan. Initial access is going to happen—so engineer for containment and resiliency. I wrap up with practical steps you can apply immediately to harden posture and quit treating cyber defense like a yearly renewal rather than a continuous operational discipline.TakeawaysRansomware incidents surged in 2025, impacting critical infrastructure.Traditional defenses are failing to contain ransomware attacks.Using a password manager is essential for security.Cybercrime costs are projected to reach $10 trillion by 2025.Misconfigurations in cloud services are a major risk factor.Identity management is a solvable problem that needs attention.Vendors in cybersecurity are not immune to breaches.Organizations should partner with service providers for cybersecurity.Research and data should guide cybersecurity strategies.A proactive approach is necessary to mitigate cyber threats.
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonStop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials
In this episode, Ryan Williams Sr. and Shannon Tynes discuss the increasing cyber threats to agriculture, particularly in the context of recent attacks on food companies. They highlight the need for improved cybersecurity measures in the agricultural sector, especially as technology becomes more integrated into farming practices. The conversation shifts to the risks associated with holiday cybersecurity, noting that hackers often exploit the downtime during holidays when organizations are less vigilant. Finally, they discuss the complexities and potential dangers of AI, emphasizing the need for caution as AI systems become more advanced and integrated into various sectors. Articles: Hackers are targeting US farms and food companies. Lawmakers say it's time to act https://www.wpr.org/news/hackers-targeting-us-farms-food-companies-cyber-security?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExTGk2SlVkT0ptTjFuWjlKcnNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR5Mf1WK2BFmaJlNEHIdZajV3dJphSkPILyNmKP3rkeilFpJC-bthLxEaU_NtQ_aem_TR6HOOO6Z7L8UX0L1TYJxw Why hackers love the holidays https://www.axios.com/2025/12/25/holidays-hackers-corporate-security-teams?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExTGk2SlVkT0ptTjFuWjlKcnNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR5Mf1WK2BFmaJlNEHIdZajV3dJphSkPILyNmKP3rkeilFpJC-bthLxEaU_NtQ_aem_TR6HOOO6Z7L8UX0L1TYJxw AI's Big Red Button Doesn't Work, And The Reason Is Even More Troubling https://www.yahoo.com/news/articles/ais-big-red-button-doesnt-110021493.html?guccounter=1 Pick up the eBook version of my book, THE OTHER SIDE OF THE FIREWALL: The Real-Life Stories of Movers, Shakers & Glass Ceiling Breakers, for FREE on Smashwords: https://lnkd.in/ee7bEPXT Use code SW100 at checkout for 100% off. Offer valid through January 1, 2026. Please LISTEN
Tucker Carlson argues that Israel is a liability to the United States. He's wrong. In Episode 447 of The Andrew Parker Show, Andrew Parker explains—point by point—why Israel is not only a critical ally, but America's strongest and most reliable partner on the world stage. From national security and intelligence sharing to battlefield-tested military innovation, economic return on investment, and shared democratic values, this episode dismantles the claim that the U.S.–Israel relationship is one-sided or harmful.Andrew explores how Israel strengthens American security without requiring U.S. troops, acts as a force multiplier against shared enemies, and delivers technological and medical innovations that save American lives. He also contrasts Israel's commitment to freedom, rule of law, and liberal democracy with the authoritarian regimes surrounding it—raising serious questions about why Israel alone is singled out as expendable.This is a clear-eyed, data-driven defense of one of America's most consequential alliances—and a warning about the cost of getting it wrong.Support the showThe Andrew Parker Show - Politics, Israel & The Law. Follow us on Facebook, LinkedIn, YouTube and X. Subscribe to our email list at www.theandrewparkershow.com Copyright © 2025 The Andrew Parker Show - All Rights Reserved.
In this urgent and eye-opening interview, Rob McConnell speaks with Eric Schiffer about the growing threat of digital terrorism and its profound impact on global security, democracy, and everyday life. From cyberattacks and AI-driven disinformation to psychological warfare conducted through social media and digital infrastructure, Schiffer breaks down how modern conflicts are increasingly fought in the virtual realm. This conversation exposes how unseen digital battles can destabilize nations, manipulate populations, and redefine warfare in the 21st century—making it essential listening for anyone concerned about the future of technology, truth, and freedom.Become a supporter of this podcast: https://www.spreaker.com/podcast/the-x-zone-radio-tv-show--1078348/support.Please note that all XZBN radio and/or television shows are Copyright © REL-MAR McConnell Meda Company, Niagara, Ontario, Canada – www.rel-mar.com. For more Episodes of this show and all shows produced, broadcasted and syndicated from REL-MAR McConell Media Company and The 'X' Zone Broadcast Network and the 'X' Zone TV Channell, visit www.xzbn.net. For programming, distribution, and syndication inquiries, email programming@xzbn.net.We are proud to announce the we have launched TWATNews.com, launched in August 2025.TWATNews.com is an independent online news platform dedicated to uncovering the truth about Donald Trump and his ongoing influence in politics, business, and society. Unlike mainstream outlets that often sanitize, soften, or ignore stories that challenge Trump and his allies, TWATNews digs deeper to deliver hard-hitting articles, investigative features, and sharp commentary that mainstream media won't touch.These are stories and articles that you will not read anywhere else.Our mission is simple: to expose corruption, lies, and authoritarian tendencies while giving voice to the perspectives and evidence that are often marginalized or buried by corporate-controlled media
In dieser Folge von Shape of Tomorrow schauen wir auf die wichtigsten Tech‑Trends des Jahres 2026 – und warum dieses Jahr zum Wendepunkt der digitalen Welt werden könnte. Agentische KI wird zu echten digitalen Teammitgliedern, Hyperautomation verbindet RPA, KI und Prozess‑Mining zu vollständig automatisierten Geschäftsprozessen, und Edge‑ sowie On‑Device‑AI bringen Intelligenz direkt in Geräte, Maschinen und Fahrzeuge. Gleichzeitig erlebt die Cybersecurity ein KI‑Wettrüsten, während Unternehmen zunehmend auf KI‑native Plattformen setzen, um Daten souverän, nachhaltig und skalierbar zu nutzen. Eine Folge über die Technologien, die unsere Arbeitswelt, unsere Infrastruktur und unser Verständnis von Intelligenz neu definieren werden.
While our team is out on winter break, please enjoy this episode of The Microsoft Threat Intelligence Podcast from our partners at Microsoft. In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a comprehensive look at how the cyber threat landscape is accelerating through AI, automation, and industrialized criminal networks. They explore how nation-state operations and cybercrime have fused into a continuous cycle of attack and adaptation, with actors sharing tooling, infrastructure, and even business models. The conversation also examines AI's growing impact, from deepfakes and influence operations to the defensive promise of AI-powered detection, and how identity compromise has become the front door to most intrusions, accounting for over 99% of observed attacks. Listeners will gain perspective on: How AI is shaping both attacker tradecraft and defensive response. Why identity remains the cornerstone of global cyber risk. What Microsoft's telemetry—spanning 600 million daily attacks—reveals about emerging threats and evolving defender strategies. Questions explored: How are threat actors using AI to scale deception and influence operations? What does industrialized cybercrime mean for organizations trying to defend at scale? How can defenders harness AI responsibly without overreliance or exposure? Resources: Download the report and executive summary Register for Microsoft Ignite View Chloé Messdaghi on LinkedIn View Crane Hassold on LinkedIn View Sherrod DeGrippo on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Get the latest threat intelligence insights and guidance at Microsoft Security Insider The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this Brand Highlight, we talk with Michael Roytman, CTO of Empirical Security, about a problem many security teams quietly struggle with: using general purpose AI tools for decisions that demand precision, forecasting, and accountability.Michael explains why large language models are often misapplied in security programs. LLMs excel at summarization, classification, and pattern extraction, but they are not designed to predict future outcomes like exploitation likelihood or operational risk. Treating them as universal problem solvers creates confidence gaps, not clarity.At Empirical, the focus is on preventative security through purpose built modeling. That means probabilistic forecasting, enterprise specific risk models, and continuous retraining using real telemetry from security operations. Instead of relying on a single model or generic scoring system, Empirical applies ensembles of models tuned to specific tasks, from vulnerability exploitation probability to identifying malicious code patterns.Michael also highlights why retraining matters as much as training. Threat conditions, environments, and attacker behavior change constantly. Models that are not continuously updated lose relevance quickly. Building that feedback loop across hundreds of customers is as much an engineering and operations challenge as it is a data science one.The conversation reinforces a simple but often ignored idea: better security outcomes come from using the right tools for the right questions, not from chasing whatever AI technique happens to be popular. This episode offers a grounded perspective for leaders trying to separate signal from noise in AI driven security decision making.Note: This story contains promotional content. Learn more.GUESTMichael Roytman, CTO of Empirical Security | On LinkedIn: https://www.linkedin.com/in/michael-roytman/RESOURCESLearn more about Empirical Security: https://www.empiricalsecurity.com/LinkedIn Post: https://www.linkedin.com/posts/bellis_a-lot-of-people-are-talking-about-generative-activity-7394418706388402178-uZjB/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKeywords: sean martin, michael roytman, ed beis, empirical security, cybersecurity, ai, machinelearning, vulnerability, risk, forecasting, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
How are defenders supposed to keep up when attackers move at the speed of AI? In this episode of Security Matters, host David Puner welcomes Rick McElroy, founder and CEO of Nexasure, for a candid conversation about cybersecurity's breaking point. Together, they unpack the realities of defending organizations in an era of identity sprawl, machine risk, agentic AI, and relentless automation. Rick shares hard-won insights from decades on the front lines, challenging the myth of perfect defense and revealing why identity remains at the root of most breaches. Whether you're a CISO, IT leader, or cybersecurity professional, you'll get actionable advice on managing machine identities, rethinking risk, and building resilience for a future where change is the only constant.
Welcome back to Forcepoint's "To the Point Cybersecurity Podcast!" In this episode, hosts Rachael Lyon and Jonathan Knepher are joined once again by expert guest David Saunders to dive even deeper into today's ever-evolving cybersecurity landscape. From the accelerating sophistication of phishing attacks and the dual role of AI in offense and defense, to the ongoing challenges of supply chain and insider risk, this episode explores what cybersecurity professionals are up against in 2024—and what they should prepare for in the years ahead. You'll hear practical insights on zero trust, the importance of data visibility, and why understanding your backup and recovery processes is more critical than ever. Plus, David Saunders shares where he sees AI's role heading next and offers advice on staying resilient in the face of uncertainty. Whether you're a seasoned practitioner or just getting started in cybersecurity, tune in for actionable strategies, forward-looking predictions, and a few laughs about the realities of life on the digital front lines. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e365
Nokukhanya Mntambo speaks to Arthur Goldstuck, Author & Journalist, about what the latest SMME data reveals on where small businesses across South Africa are growing, where they are failing, and why the sector remains both a national priority and a persistent struggle. In other interviews, Jordan Hertz, Chief Commercial Officer of Sourcefin, discusses the launch of TenderCentral and whether access to public-sector opportunities is enough for SMMEs facing funding and late-payment challenges; entrepreneurs Surprise Mankge of Silverspoon and Kabelo Kungwane of Kasiflavour10 share insights into building sustainable businesses in hospitality and township fashion; while Dr Angela Deh, Clinical Psychologist, and Themba Ndubane, Managing Director at Horizon Seven, unpack emerging risks around AI-driven mental-health tools and the security of personal documents stored in the cloud. The Money Show is a podcast hosted by well-known journalist and radio presenter, Stephen Grootes. He explores the latest economic trends, business developments, investment opportunities, and personal finance strategies. Each episode features engaging conversations with top newsmakers, industry experts, financial advisors, entrepreneurs, and politicians, offering you thought-provoking insights to navigate the ever-changing financial landscape. Thank you for listening to a podcast from The Money Show Listen live Primedia+ weekdays from 18:00 and 20:00 (SA Time) to The Money Show with Stephen Grootes broadcast on 702 https://buff.ly/gk3y0Kj and CapeTalk https://buff.ly/NnFM3Nk For more from the show, go to https://buff.ly/7QpH0jY or find all the catch-up podcasts here https://buff.ly/PlhvUVe Subscribe to The Money Show Daily Newsletter and the Weekly Business Wrap here https://buff.ly/v5mfetc The Money Show is brought to you by Absa Follow us on social media 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/CapeTalk 702 on YouTube: https://www.youtube.com/@radio702 CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/Radio702 CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567 See omnystudio.com/listener for privacy information.
Happy Holidays! In this Best Moments of 2025 episode, we revisit standout discussions, sharp takes, and memorable moments from the year – covering ransomware, vulnerability management, automation, zero trust, and the evolving role of the CISO. Whether you're leading security strategy or working hands-on in IT, these highlights capture the ideas that shaped the year in cybersecurity.
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonStop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials
Podcast: ICS Arabia PodcastEpisode: Rail Cybersecurity & OT SOCs in the Middle East (Arabic) | 56Pub date: 2025-12-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this first-ever ICS Arabia Podcast episode focused on rail cybersecurity and OT Security Operations Centers (SOCs), I sit down with Omar Sherin, Consulting Partner at PwC Middle East and a pioneer in the region's critical infrastructure protection.We explore:1- Rail-specific cyber threats and how OT SOCs are built to defend them2- Real-world challenges in the Middle East's transportation sector3- National efforts to build security labs for firmware, SBOMs, and ICS hardware4- How Arab countries can strategically improve their OT cybersecurity postureThe podcast and artwork embedded on this page are from ICS ARABIA PODCAST, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: AI Isn't the Answer: Why Cybersecurity Fundamentals Still Decide OT and IT SuccessPub date: 2025-12-29Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAI is everywhere - but it won't fix broken cybersecurity foundations. In this end-of-year wrap-up episode of Protect It All, host Aaron Crow takes a hard look at the growing hype around AI in cybersecurity and explains why fundamentals still matter more than any shiny new tool, especially in OT environments. Drawing from real-world experience and industry observations, Aaron challenges the belief that AI can compensate for missing basics like asset inventory, network segmentation, and clear ownership. He reframes AI as a powerful assistant not a savior and warns against the risks of rushing into automation without understanding what you're protecting in the first place. You'll learn: Why basic cybersecurity hygiene still determines success or failure How AI fits best when foundations are already in place The dangers of shadow AI in OT and industrial environments Why asset visibility and segmentation remain non-negotiable How leaders should think about AI as a support tool - not a shortcut What OT and IT teams should prioritize heading into 2026Whether you're closing out the year or planning ahead, this episode delivers a grounded, experience-driven perspective on building resilient cybersecurity programs—without chasing hype. Tune in to hear why mastering the basics is still the smartest cyber strategy - only on Protect It All. Key Moments: 03:32 "Technology Complexity vs. Practicality" 09:33 "AI as an Entry-Level Intern" 12:29 "AI: A Powerful Team Tool" 16:24 "AI Alone Won't Fix Cyber" 19:34 "Mastering Basics Before AI Integration" 21:46 "Shadow AI and Resilience" 25:26 "Addressing Gaps and Ownership" 30:27 "Foundations Matter for Success" Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Cyber Security Expert and Founder of Fortalice Solutions joins Bo and Beth in studio to discuss her predictions from last year and get her Cyber Security and Tech predictions for 2026 and beyond. See omnystudio.com/listener for privacy information.
Good Morning BT with Bo Thompson and Beth Troutman | Tuesday, December 30th, 2025. 6:05 Beth’s Song of the Day 6:20 Falcons beat Rams, create new path to playoffs for Panthers 6:35 Replay: Mick Mulvaney - 2026 predictions 6:50 RAM Biz Update; Beth explains "Wishing wall" for NYC New Years Eve 7:05 Steph Curry to be honored at halftime of Davidson vs Duquesne | Bill Simmons floats idea of Steph Curry finishing career in Charlotte 7:20 Mark Garrison shares latest news surrounding peeping at South Park Mall dressing rooms 7:35 WBT text line shares dressing room concerns after South Park mall story 7:50 Guest: Chris Clunie (Davidson College Athletic Director) - Steph Curry honored by City of Davidson 8:05 Guest: Sean O'Connell (CBR Deputy Editor) - 2025 recap in Entertainment 8:20 WBT text line weighs in on dressing rooms cont. 8:35 Dirty Restaurant Tuesday with Mark Garrison 8:50 Guest: Theresa Payton joins Bo and Beth in studio! 9:05 In-Studio Guest: Theresa Payton (Cyber Security Expert) - Theresa's path to a career in Cyber Security 9:20 Theresa Payton cont. - Theresa shares her (thankfully) wrong predictions 9:35 Theresa Payton cont. - Theresa's predictions for 2026...and beyond 9:50 Theresa Payton cont. - Theresa's predictions for 2026...and beyond See omnystudio.com/listener for privacy information.
Nokukhanya Mntambo speaks to Themba Ndubane, Managing Director at Horizon Seven, about whether documents stored in the cloud are genuinely secure. They look at encryption gaps, poor password protection and how third-party platforms may leave South Africans more exposed than they think. The Money Show is a podcast hosted by well-known journalist and radio presenter, Stephen Grootes. He explores the latest economic trends, business developments, investment opportunities, and personal finance strategies. Each episode features engaging conversations with top newsmakers, industry experts, financial advisors, entrepreneurs, and politicians, offering you thought-provoking insights to navigate the ever-changing financial landscape. Thank you for listening to a podcast from The Money Show Listen live Primedia+ weekdays from 18:00 and 20:00 (SA Time) to The Money Show with Stephen Grootes broadcast on 702 https://buff.ly/gk3y0Kj and CapeTalk https://buff.ly/NnFM3Nk For more from the show, go to https://buff.ly/7QpH0jY or find all the catch-up podcasts here https://buff.ly/PlhvUVe Subscribe to The Money Show Daily Newsletter and the Weekly Business Wrap here https://buff.ly/v5mfetc The Money Show is brought to you by Absa Follow us on social media 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/CapeTalk 702 on YouTube: https://www.youtube.com/@radio702 CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/Radio702 CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567 See omnystudio.com/listener for privacy information.
Folge 99 – der letzte Ritt vor der magischen 100. Zwischen fleischlosem Weihnachten, kaputten 3D-Druckern und Konzert-Gänsehaut geht es diesmal quer durch Technik, IT-Security und digitale Absurditäten. Themen dieser Folge: Weihnachtsrückblick & Städtereisen Aufruf zur Folge 100: Hörer:innen als Gäste
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's bonus episode of the PEBCAK Podcast! We've got some amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Felix Baumgartner's Crash https://www.independent.co.uk/news/world/europe/felix-baumgartner-skydiver-cause-death-paragliding-crash-b2840975.html Spy Game https://www.imdb.com/title/tt0266987/ Dad Joke of the Week (DJOW) Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/ Ben - https://www.linkedin.com/in/benjamincorll/
A slow-rolling holiday episode featuring CISO at DataSite, Ted Peterson! Transitioning from a Director Role, Ted shares his journey to the CISO title and how his unique background informs his work approach.Tune in for insights on:Realities to navigating organizational leadership as a CISOImportance of diverse perspectives and backgrounds in the security space Establishing pathway to career goalsLike, subscribe, and share with your network to stay informed about the latest in cybersecurity! We want to hear from you! Reach out at unsecurity@frsecure.com and follow us for more:LinkedIn: https://www.linkedin.com/company/frsecure/ Instagram: https://www.instagram.com/frsecureofficial/ Facebook: https://www.facebook.com/frsecure/ BlueSky: https://bsky.app/profile/frsecure.bsky.social About FRSecure: https://frsecure.com/FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start or looking for a team of experts to collaborate with you, we are ready to serve.
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonStop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
MongoDB Unauthenticated Attacker Sensitive Memory Leak CVE-2025-14847 Over the Christmas holiday, MongoDB patched a sensitive memory leak vulnerability that is now actively being exploited https://www.mongodb.com/community/forums/t/important-mongodb-patch-available/332977 https://github.com/mongodb/mongo/commit/505b660a14698bd2b5233bd94da3917b585c5728 https://www.ox.security/blog/attackers-could-exploit-zlib-to-exfiltrate-data-cve-2025-14847/ https://github.com/joe-desimone/mongobleed/
Send Bidemi a Text Message!In this episode, host Bidemi Ologunde takes you from a single, unforgettable line in the U.S. military oath: "against all enemies, foreign and domestic," to a hotel-room phone call that ended with two words: "stand by." What follows is a first-person journey into intelligence analysis operations across military installations in [redacted] and [redacted], and a front-row view of how surveillance technology has evolved since 2016. How do phones, IP addresses, and device “fingerprints” shape what platforms believe about us — and what happens when they get it wrong?Support for The Bid Picture Podcast comes from Uncommon Goods, an online marketplace filled with unique, independently made gifts. From clever gadgets to handcrafted home goods, Uncommon Goods helps you find something thoughtful for everyone on your list. Learn more at uncommongoods.com.Support for The Bid Picture Podcast comes from GymShark, performance apparel designed for people who take their training seriously. With gym-ready fits that move with you, GymShark helps you stay focused from warm-up to cooldown. Explore their latest drops at gymshark.com.Support for The Bid Picture Podcast comes from Skylight Calendar—the family-friendly digital calendar that helps everyone stay on the same page. With a quick setup and an easy-to-read display in a shared space, Skylight makes it simple to keep track of school events, practices, appointments, and family plans—so mornings run smoother and everyone knows what's next. Make your home the place where schedules finally make sense. Skylight Calendar—because family life works better when it's shared. Learn more at myskylight.com.Support the show
And, what we can do about them!
Chris May, VP of Security and Growth at Advantage Technology, joins Pathmonk Presents to break down how cybersecurity directly impacts business growth in regulated industries. With decades of hands-on experience, Chris explains why healthcare systems, law firms, financial institutions, and defense contractors are prime targets for cybercrime. He shares how Advantage Technology positions itself as a managed security services provider built on senior engineering talent, not entry-level staffing models. The conversation explores why educating CEOs and CFOs is critical, how storytelling and website education drive inbound demand, and why cybersecurity is no longer optional for any business with sensitive data and a bank account.
Podcast: Industrial Cybersecurity InsiderEpisode: The Hidden Reason Most Manufacturing Cybersecurity Programs FailPub date: 2025-12-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with cybersecurity expert Wil Klusovsky to discuss the massive gap between IT security practices and OT reality. With 26 years of experience, Wil shares his unconventional journey into operational technology and reveals why most security tools end up as shelfware on plant floors.They dive deep into the communication breakdown between CISOs and plant operations, the critical role of system integrators and OEMs that IT leaders often ignore, and why the "air gap" myth continues to put manufacturing facilities at risk.Wil breaks down his framework for speaking to boards in language they understand, emphasizing business impact over technical jargon. The conversation covers everything from the challenges of MFA implementation in OT environments to why patching isn't always the answer. They discuss how organizations can build effective OT security programs by making cybersecurity everyone's responsibility - not just IT's problem.Chapters:(00:00:00) - Opening: The $50K Security Investment That Nobody Uses(00:01:00) - Will's Unconventional Journey Into OT Cybersecurity(00:03:45) - The Communication Gap Between IT and OT Teams(00:07:15) - Why Asset Visibility Tools Miss 135% of Your Equipment(00:10:30) - Speaking Board Language: Revenue Loss vs. Technical Jargon(00:13:25) - The Missing Third Leg: System Integrators and OEMs(00:17:30) - Making Cybersecurity Everyone's Job, Not Just IT's Problem(00:21:15) - Why Patching Isn't Always the Answer in OT Environments(00:25:45) - The Reality Check: Physical Security in Manufacturing Plants(00:28:30) - Building a Cybersecurity Program as a Journey, Not a DestinationLinks And Resources:Wil Online LinktreeWil Klusovsky on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
While our team is out on winter break, please enjoy this Special Edition episode. Cybersecurity is no longer confined to the digital world or just a technical challenge, it's a global imperative. The NightDragon Innovation Summit convened a group of industry leaders to discuss how public and private entities can work together to address emerging threats and harness the power of AI, cybersecurity, and innovation to strengthen national defense. In this special edition podcast, we capture a glimpse into the knowledge and expertise shared at the NightDragon Innovation Summit. We are joined by NightDragon Founder and CEO Dave DeWalt, DataBee CEO Nicole Bucala, Liberty Mutual Insurance EVP and CISO Katie Jenkins, Sophos CEO Joe Levy, and Dataminr VP of Sales Engineering Michael Mastrole. Learn more about your ad choices. Visit megaphone.fm/adchoices
Robbie Bach, former president of Microsoft's Entertainment and Devices Division, discusses his transition from technology executive to author of political techno-thrillers, focusing on his latest book, The Blockchain Syndicate. The narrative explores themes of digital identity, misinformation, and the vulnerabilities of modern institutions, emphasizing that technology itself is neutral; it can be used for both beneficial and harmful purposes. Bach highlights the character of Tamika Smith, a military veteran, as a lens through which to examine leadership in a complex landscape of technology and public trust.Bach elaborates on the psychological and technical aspects of his story, particularly the implications of digital identity and authenticity. He notes that the plot involves a blackmail scenario linked to a character presumed dead, raising questions about the authenticity of digital communications. This reflects broader concerns about cybersecurity, where vulnerabilities are often exploited rather than created anew. Bach emphasizes the importance of grounding his narrative in real-world technology and experiences, blending factual research with creative storytelling.The conversation also touches on the governance of technology, critiquing current regulatory approaches that tend to be reactive rather than proactive. Bach argues that effective governance requires forward-thinking leadership capable of anticipating future challenges, particularly in areas like AI and blockchain. He stresses the need for businesses, including small and medium-sized enterprises, to engage with these issues beyond mere compliance, advocating for a broader sense of responsibility that includes stakeholder value.For Managed Service Providers (MSPs) and IT service leaders, Bach's insights underscore the critical role they play in navigating the complexities of technology governance and cybersecurity. By understanding the vulnerabilities inherent in digital systems and advocating for responsible practices, MSPs can better support their clients in mitigating risks associated with misinformation and identity fraud. The episode serves as a reminder of the importance of ethical considerations in technology deployment and the need for proactive engagement in shaping a secure digital future.
(Presented by ThreatLocker (https://threatlocker.com/threebuddyproblem): Allow what you need. Block everything else by default, including ransomware and rogue code.) Three Buddy Problem - Episode 78: We close out the year with a no-budget, no-permission awards show, spotlighting the cybersecurity stories that actually mattered. Plus, a bizarre polygraph scandal at CISA, Chinese APT research dumps, ransomware pre-notification hiccups, foreign drone bans, and the growing gap between cyber theater and real operational value. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonStop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials
Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Legacy Tech, AI Hype & Cyber Risk: What IT and OT Leaders Must Get RightPub date: 2025-12-22Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAI promises transformation - but legacy technology, process gaps, and cyber risk often stand in the way. In this episode of Protect It All, host Aaron Crow sits down with veteran IT and cybersecurity leader Neil D. Morris, who brings over 30 years of experience across aerospace, defense, and energy sectors. Together, they cut through the hype to explore what really matters when modernizing technology and managing cyber risk in complex, real-world environments. Neil shares candid insights on why legacy systems still power critical operations, why replacing them isn't as simple as it sounds, and how organizations can unlock real value from AI without increasing risk. The conversation dives into tech debt, regulation, ROI, and the often-overlooked role of process in successful transformation. You'll learn: Why legacy systems aren't going away anytime soon The hidden risks of chasing AI without strong foundations How to balance security, usability, and business value Why process and governance matter more than tools How IT leaders can communicate cyber and AI value in business terms Where AI creates opportunity - and where it creates new attack paths Whether you're leading digital transformation, managing cyber risk, or advising the business on AI adoption, this episode delivers real talk and practical wisdom from the front lines of IT and OT leadership. Tune in to learn how to modernize responsibly, manage risk intelligently, and separate AI reality from hype only on Protect It All. Key Moments: 00:00 "Legacy Tech in Modern Firms" 06:22 "Technology, Change, and Customer Focus" 09:51 "Challenges in Articulating Cybersecurity Value" 12:27 "Tech Solutions Must Drive Value" 15:43 Sell Ideas Beyond the Code 19:03 "Ransomware Risks in Acquisitions" 24:02 Government, Services, and Compliance Debate 25:35 Balancing AI, Cybersecurity, and Regulation 30:33 BlackBerry's Downfall: Ignored Innovation 32:06 "Evolution and Misuse of AI" 34:45 "Opportunity to Lead Change" 37:52 "AI Without Guidance Backfires" 41:07 "AI: Smart but Context-Lacking" 46:45 "AI Empowering Business Transformation" 50:30 "Effortless Tech-Fueled Imitation" About the guest : Neil D. Morris is a senior enterprise technology leader with 25+ years of experience in digital transformation, cybersecurity, and AI at scale. He currently serves as Head of IT at Redaptive and previously held CIO roles at Ball Aerospace and Maxar Technologies. Neil is known for guiding organizations through complex modernization efforts while balancing security, risk, and business value. How to connect Neil: https://www.linkedin.com/in/neildmorris/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
While our team is out on winter break, please enjoy this episode of Caveat. We've got something special for you this week! We are excited to share our very first Caveat Live event. Host Ben Yelin recently headed to the FBI and KU Cybersecurity Conference at the University of Kansas for a live session of Caveat. During the episode, Ben covered the importance of public/private partnerships with Dr. Perry Alexander. Ben and Professor John Symons spoke about the philosophical issues in AI and how those should impact policy decisions. Be sure to tune in for some great conversations. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. Please take a moment to fill out an audience survey! Let us know how we are doing! Links related to our show this week: FBI and KU Cybersecurity Conference Guest Dr. Perry Alexander, University of Kansas Guest John Symons, University of Kansas Review Essay: Social and Political Aspects of the Ethics of Artificial Intelligence. Journal of Moral Philosophy Get the weekly Caveat Briefing delivered to your inbox. Like what you heard? Be sure to check out and subscribe to our Caveat Briefing, a weekly newsletter available exclusively to N2K Pro members on N2K CyberWire's website. N2K Pro members receive our Thursday wrap-up covering the latest in privacy, policy, and research news, including incidents, techniques, compliance, trends, and more. This week's Caveat Briefing covers the story of the firing of the NSA Director. Read about the firing as well as the other moves the administration has made to reduce the federal governments cyber defense programs and capabilities. Curious about the details? Head over to the Caveat Briefing for the full scoop and additional compelling stories. Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com. Hope to hear from you. Learn more about your ad choices. Visit megaphone.fm/adchoices
This episode reviews the standout moments in government innovation and leadership from 2025. Key themes include the humanization of technology, the evolution of government contact centers, reimagined leadership in a hybrid world, the integration of AI in procurement, and the future of value creation through digital networks. Discussions highlight the importance of mission-first thinking, leveraging human-first design, embracing networks, and investing in emerging talent.Subscribe on your favorite podcast platform to never miss an episode! For more from ACT-IAC, follow us on LinkedIn or visit http://www.actiac.org.Learn more about membership at https://www.actiac.org/join.Donate to ACT-IAC at https://actiac.org/donate. Intro/Outro Music: See a Brighter Day/Gloria TellsCourtesy of Epidemic Sound(Episodes 1-159: Intro/Outro Music: Focal Point/Young CommunityCourtesy of Epidemic Sound)
As we close out 2025 and prepare for 2026, Dr. Eric Cole breaks down what it truly takes to be a world-class CISO in the year ahead. In this episode of Life of a CISO, Dr. Cole shares hard-earned lessons on leadership, health, resilience, and why taking care of yourself is foundational to protecting your organization. From personal reflection to executive-level strategy, this episode goes far beyond technical controls. Dr. Cole then dives deep into the three forces reshaping cybersecurity in 2026: artificial intelligence, cloud reliability, and ransomware, all centered around one core principle that too many organizations ignore: data protection. You will learn why AI is an augmentation tool, not a replacement for humans, how unrestricted AI use is creating massive new risks, why recent cloud outages are a warning sign for every executive, and how CISOs can regain trust, influence, and a permanent seat at the boardroom table. This episode is essential listening for CISOs, security leaders, executives, and anyone responsible for protecting critical data in an increasingly unstable digital world. Part two of this series continues next week.
In this encore presentation of Unspoken Security Episode 32 (originally published on 3 April 2025), host AJ Nash sits down with Chris Birch, an intelligence practitioner with nearly 30 years of experience, to discuss the ever-evolving landscape of social engineering. Chris's unique perspective comes from leading teams that actively engage with threat actors, turning the tables on those who typically exploit vulnerabilities.Chris details how social engineering is simply human manipulation, a skill honed from birth. He explains how attackers leverage fear and greed, the fastest and cheapest ways to manipulate individuals. He also dives into how attacks have evolved, highlighting the dangers of increasingly sophisticated tactics like deepfakes and the blurring lines between legal and illegal applications of social engineering.The conversation also explores the crucial role of organizational culture in cybersecurity. Chris emphasizes that awareness, not just education, is key to defense. He advocates for sharing threat intelligence widely within organizations and across industries, empowering everyone to become a sensor against social engineering attempts. Chris also shares a surprising personal fear, offering a lighthearted end to a serious discussion.Send us a textSupport the show
In Episode 167 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager sit down with Kelley Misata, Ph.D., Chief Trailblazer and Founder at Sightline Security. Together, they discuss how volunteers constitute a critical cybersecurity resource for the Center for Internet Security® (CIS®). Along the way, they explore the nature of volunteerism, the role of volunteers at CIS, and how CIS is looking to mature its engagement with volunteers going forward.Here are some highlights from our episode:01:37. Introductions to Kelley and her experience with cybersecurity volunteers03:09. Kelley's use of research, expertise, and an open mind to check in with CIS volunteers04:50. How volunteers have deepened their passion and dedication with CIS for 25 years06:55. Volunteers as a critical cybersecurity resource for "One CIS" going forward10:51. Commitment, conflict resolution, and openness to formal process in CIS Communities14:39. The use of directionality and accolades to encourage different types of contributors19:43. The importance of flexibility in management to meet volunteers where they are20:30. Leadership, storytelling, and recruitment as opportunities for volunteerism at CIS24:37. The risk of volunteer burnout and how to protect against it26:00. Collaboration with employers to treat volunteerism as a growth experience30:09. A balancing act of making volunteers useful without depleting the mission34:51. Sean's take: volunteer management as the original Large Language Model (LLM)38:32. Other observations and final thoughtsResources25 Years of Creating Confidence in the Connected WorldCIS CommunitiesEpisode 160: Championing SME Security with the CIS ControlsStoryCorpsIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
ServiceNow to acquire cybersecurity startup Armis MacSync Stealer adopts quieter installation Nissan customer data stolen in Red Hat raid Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com.
Plus: China's BYD logs another month of strong sales growth in Europe. And the U.S. bans new China-made drones. Julie Chang hosts. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. But an attacker must be on the same network. https://www.freebsd.org/security/advisories/FreeBSD-SA-25:12.rtsold.asc NIST Time Server Problems The atomic ensemble time scale at the NIST Boulder campus has failed due to a prolonged utility power outage. One impact is that the Boulder Internet Time Services no longer have an accurate time reference. https://tf.nist.gov/tf-cgi/servers.cgi https://groups.google.com/a/list.nist.gov/g/internet-time-service/c/o0dDDcr1a8I