Podcasts about cybersecurity

The protection of computer systems from theft or damage

  • 11,497PODCASTS
  • 64,179EPISODES
  • 30mAVG DURATION
  • 10+DAILY NEW EPISODES
  • Jan 7, 2026LATEST
cybersecurity

POPULARITY

20192020202120222023202420252026

Categories




    Best podcasts about cybersecurity

    Show all podcasts related to cybersecurity

    Latest podcast episodes about cybersecurity

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Wednesday, January 7th, 2026: Tailsnitch Review; D-Link DSL EoL Vuln; TOTOLINK Unpatched Vuln

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jan 7, 2026 5:44


    Tool Review: Tailsnitch Tailsnitch is a tool to audit your Tailscale configuration. It does a comprehensive analysis of your configuration and suggests (or even applies) fixes. https://isc.sans.edu/diary/Tool%20Review%3A%20Tailsnitch/32602 D-Link DSL Command Injection via DNS Configuration Endpoint A new vulnerability in very old D-Link DSL modems is currently being exploited. https://www.vulncheck.com/advisories/dlink-dsl-command-injection-via-dns-configuration-endpoint TOTOLINK EX200 firmware-upload error handling can activate an unauthenticated root telnet service TOTOLINK extenders may start a telnet server and allow unauthenticated access if a firmware update fails. https://kb.cert.org/vuls/id/295169

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Tuesday, January 6th, 2026: IPKVM Risks; Tailsnitch; Net-SNMP Vuln;

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jan 6, 2026 6:08


    Risks of OOB Access via IP KVM Devices Recently, cheap IP KVMs have become popular. But their deployment needs to be secured. https://isc.sans.edu/diary/Risks%20of%20OOB%20Access%20via%20IP%20KVM%20Devices/32598 Tailsnitch Tailsnitch is a tool to review your Tailscale configuration for vulnerabilities https://github.com/Adversis/tailsnitch Net-SNMP snmptrapd vulnerability A new vulnerability in snmptrapd may lead to remote code execution https://github.com/net-snmp/net-snmp/security/advisories/GHSA-4389-rwqf-q9gq

    WIFI & WATER
    10 Cybersecurity Tips For 2026 Featuring Addie LaMarr | E053

    WIFI & WATER

    Play Episode Listen Later Jan 6, 2026 64:20


    In this episode, Addie LaMarr joins Jarrett to dive into 10 cybersecurity tips that everyone can learn from in 2026. The 10 tips are:CHAPTERS00:00 Intro00:18 Addie Joins The Pod01:28 (1) Social Engineering / Phishing05:30 (2) AI Deep Fakes10:55 (3) AI Chatbots & Companions15:35 (4) DMs Aren't Private19:43 (5) Data Brokers & Shadow Identities25:36 (6) Password Managers30:36 (7) VPNs36:26 (8) Smarthome Surveillance41:52 (9) Quantum50:13 (10) Biometric Lockin01:56:27 Analog MovementWatch on YouTube https://youtu.be/gH-Ptypd30MAddie on IG - https://www.instagram.com/addielamarr.sh/Addie's Website - https://www.lamarrlabs.com/Future Signal is a podcast hosted and produced by Jarrett Carpenter that explores tomorrow's tech today.All of Future Signal's content is not financial advice but rather edu-tainment. All of our episodes are available here on YT as well as wherever you listen to podcasts.Follow us on Social Media :X - https://www.twitter.com/futuresignalxyzInstagram - https://www.instagram.com/futuresignalxyz/Facebook - https://www.facebook.com/futuresignalxyzLinkedIn - https://www.linkedin.com/company/future-signal-xyz/Twitch - https://www.twitch.tv/futuresignalxyzFor more info on the podcast, please check out https://www.futuresignal.xyz/Episode's music by @Txmmy_Beats - https://www.youtube.com/c/TxmmyBeatsTo learn more about Future Signal's Host - https://www.jarrettcarpenter.com/#cybersecurity #vpn #cyber

    Cybercrime Magazine Podcast
    Cybercrime Wire For Jan. 6, 2026. WhiteDate's Site Is Deleted, And Data Dumped. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Jan 6, 2026 1:20


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    The I.T. Career Podcast
    109: Breaking Into Cybersecurity: The Path Most People Get Wrong

    The I.T. Career Podcast

    Play Episode Listen Later Jan 6, 2026 43:46


    Meter: Visit https://meter.com/itcareer to book a demoIf you're trying to break into cyber security and finding it challenging, this conversation is for you. Many individuals are working hard to start a cyber security career, but often lack clear direction. We'll discuss how to navigate the cybersecurity career path and offer career advice to help you find entry level cybersecurity jobs, focusing on what truly works in today's job market.Check Out Kenneth Ellington:Ellington Cyber Academy: https://kenneth-ellington-s-school.teachable.com/LinkedIn: https://www.linkedin.com/in/kenneth-ellington/

    Saul Searching
    Ep. 72 - IT Certs Made Simple: Smarter Ways to Pick and Prep for IT Certs! with Aaron Spiteri

    Saul Searching

    Play Episode Listen Later Jan 6, 2026 56:34


    ** Always looking for fantastic guests for upcoming shows - feel free to buzz me on 0414659800 to chat or

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Monday, January 5th, 2026: MongoBleed/React2Shell Recap; Crypto Scams; DNS Stats; Old Fortinet Vulns

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jan 5, 2026 6:57


    Cryptocurrency Scam Emails and Web Pages As We Enter 2026 Scam emails are directing victims to confidence scams attempting to steal cryptocurrencies. https://isc.sans.edu/diary/Cryptocurrency%20Scam%20Emails%20and%20Web%20Pages%20As%20We%20Enter%202026/32594 Debugging DNS response times with tshark tshark is a powerful tool to debug DNS timing issues. https://isc.sans.edu/diary/Debugging+DNS+response+times+with+tshark/32592/ Old Fortinet Devices Have not been updated Over 10,000 Fortinet devices are still vulnerable to a five year old vulnerability https://www.bleepingcomputer.com/news/security/over-10-000-fortinet-firewalls-exposed-to-ongoing-2fa-bypass-attacks/

    Paul's Security Weekly
    Why are cybersecurity predictions so bad? - ESW #440

    Paul's Security Weekly

    Play Episode Listen Later Jan 5, 2026 89:41


    For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In the final segment, we discuss 2026, drop some of our own predictions, and talk about what we hope to see this year. SPOILER: Please fix session hijacking, okay tech industry? Segment resources: A great site for better understanding logical fallacies and cognitive biases Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-440

    Identity At The Center
    #393 - Breaking the Tyranny of Joiner, Mover, Leaver with Ian Glazer

    Identity At The Center

    Play Episode Listen Later Jan 5, 2026 57:38


    Join Jeff, Jim, and special guest Ian Glazer at the Gartner IAM Summit 2025 as they discuss the Identity and Access Management (IAM) industry, the evolution of IAM practices, and the exciting new concepts like Continuous Identity. They delve into topics such as the impact of AI, shared signals framework, and the struggles and triumphs of identity practitioners. Plus, hear about the Digital Identity Advancement Foundation's mission and enjoy some lighter moments with tales of 'chuckles' and supper clubs. Don't miss this insightful and entertaining episode of the Identity at the Center podcast.Connect with Ian: https://www.linkedin.com/in/iglazer/Connect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at http://idacpodcast.comTimestamps00:00 Introduction and Casual Banter00:50 Conference Highlights and Podcast Milestones03:00 Introducing Ian Glazer05:43 Digital Identity Advancement Foundation (DIF)08:09 Challenges in Identity Governance and Administration (IGA)13:28 Continuous Identity: A Paradigm Shift22:31 Real-World Applications and Organizational Impact31:51 Realistic Security Measures32:28 Maturity of Identity and Access Management34:54 Skills and Challenges in IAM36:44 Metrics and Outcomes in IAM40:23 Identity Practitioner Skills41:19 Solving Problems with AI46:21 Continuous Identity and Future Trends48:45 Identity Salon and Community54:19 Wrapping Up and Future EventsKeywordsIan Glazer, Continuous Identity, Shared Signals Framework, CAEP, Gartner IAM Summit, Identity Security, Joiner Mover Leaver, IGA, Access Certification, Identity Salon, IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, IAM, Cybersecurity, Non-Human Identity, Identity Practitioner, DIAF

    Cyber Security Today
    Infrastructure Under Attack: Cybersecurity Today for Monday January 5, 2026

    Cyber Security Today

    Play Episode Listen Later Jan 5, 2026 11:57


    In this episode of 'Cybersecurity Today', host David Shipley discusses significant cyber events and their implications. The podcast explores hints by President Donald Trump regarding the use of cyber tactics in a U.S. operation that resulted in a power outage in Venezuela. The episode also delves into the April 2025 data breach at Nova Scotia Power, detailing the company's efforts to keep incident specifics confidential and the extensive recovery measures taken. Lastly, it updates listeners on the Trust Wallet compromise linked to the Sha-Hulud supply chain attack, elucidating how the breach occurred and its aftermath. The episode underscores the growing cyber threat landscape and the critical need for enhanced cybersecurity measures. 00:00 Introduction and Sponsor Message 00:46 US Cyber Operations in Venezuela 03:13 Implications for Cybersecurity Professionals 04:37 Nova Scotia Power Breach Details 08:52 Trust Wallet Hack Update 10:46 Conclusion and Final Thoughts

    Federal Employee Financial Planning Podcast
    Episode 108: Good Financial Hygiene: Cybersecurity, Addressing Scams, and Staying Financially Protected

    Federal Employee Financial Planning Podcast

    Play Episode Listen Later Jan 5, 2026 46:04


    What if getting hacked isn't a question of if, but when? In this episode, Tommy Blackburn and John Mason break down the real-world cybersecurity risks they're seeing—not in theory, but from personal experience. After being compromised multiple times in a single year, John shares why even people with strong security habits can still be targeted, as well as what that means for retirees, business owners, and anyone managing meaningful assets. Access the full show notes at Mason & Associates, LLC Resources Mentioned: Mason & Associates: LinkedIn Tommy Blackburn:  LinkedIn John Mason: LinkedIn

    Enterprise Security Weekly (Audio)
    Why are cybersecurity predictions so bad? - ESW #440

    Enterprise Security Weekly (Audio)

    Play Episode Listen Later Jan 5, 2026 89:41


    For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In the final segment, we discuss 2026, drop some of our own predictions, and talk about what we hope to see this year. SPOILER: Please fix session hijacking, okay tech industry? Segment resources: A great site for better understanding logical fallacies and cognitive biases Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-440

    Cybercrime Magazine Podcast
    Cybercrime Wire For Jan. 5, 2026. Breach Confirmed By European Space Agency. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Jan 5, 2026 1:20


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    Paul's Security Weekly TV
    Why are cybersecurity predictions so bad? - ESW #440

    Paul's Security Weekly TV

    Play Episode Listen Later Jan 5, 2026 89:41


    For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In the final segment, we discuss 2026, drop some of our own predictions, and talk about what we hope to see this year. SPOILER: Please fix session hijacking, okay tech industry? Segment resources: A great site for better understanding logical fallacies and cognitive biases Show Notes: https://securityweekly.com/esw-440

    Security Unfiltered
    Your Next Hire Might Be a Deepfake With Brian Long CEO of Adaptive Security

    Security Unfiltered

    Play Episode Listen Later Jan 5, 2026 44:24 Transcription Available


    Send us a textIn this episode, Joe sits down with Brian Long, CEO of Adaptive Security, to delve into the evolving landscape of cybersecurity, focusing on the alarming rise of AI-powered social engineering attacks. Brian shares insights from his extensive experience, highlighting the sophisticated tactics used by attackers, including deep fake technology and AI agents. They discuss the challenges organizations face in adapting to these threats and the importance of awareness and robust security controls. Tune in to learn about the future of cybersecurity and how companies can better prepare for the next wave of digital threats.00:00 Introduction to Security Challenges04:08 AI-Powered Social Engineering Threats09:45 The Opaque Nature of Cybersecurity Incidents14:08 Deep Fakes and Their Evolution18:48 Hiring Risks in the Age of Deep Fakes23:00 The Future of Cyber Threats and Anarchy28:04 The Arms Race: AI Detection vs. Deepfakes32:49 Preparing for the Future: Awareness and Training39:26 The Evolving Threat Landscape: Beyond Traditional Securityhttps://www.adaptivesecurity.com/https://www.linkedin.com/in/brianclong/Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Finding Genius Podcast
    AI At Scale: Ephraim Ebstein On Supercharging Business Operations

    Finding Genius Podcast

    Play Episode Listen Later Jan 3, 2026 43:27


    How is artificial intelligence transforming the way businesses operate? Can cutting-edge technology be the key to scaling success? In this episode, Ephraim Ebstein, Founder and CEO of Fit Solutions, sits down to share his insights… Fit Solutions is a $30 million IT and cybersecurity firm that helps thousands of businesses increase efficiency, reduce IT costs, and protect against cyber threats. Ephraim is also the Co-Founder of AI Integrators, a venture focused on leveraging AI to streamline business operations and optimize performance. With over 15 years in the tech industry, Ephraim has a background in managed IT services, network engineering, and cybersecurity consulting. Before founding Fit Solutions, he served as Senior Systems Engineering Team Lead at All Covered, a division of Konica Minolta. He holds a Bachelor's degree in Management Information Systems and has a proven track record in scaling tech businesses while fostering a strong company culture. In this discussion, we cover: The difference between an enterprise and a medium-sized business.  How AI "employees" are transforming customer service and operational efficiency. Why company culture and leadership systems are essential to business growth. How AI and automation are reducing costs while driving revenue. Find out more about Fit Solutions and their AI initiatives by visiting their website!

    ITSPmagazine | Technology. Cybersecurity. Society
    It Fractured, Then Rebuilt Itself: The CISO Role Changed More in Five Years Than Ever Before, Setting the Stage for 2026 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Jan 3, 2026 15:42


    Across dozens of conversations centered on the CISO experience, one reality keeps surfacing: the role no longer exists to protect systems in isolation. It exists to protect the business itself.Today's CISO operates at the intersection of operational risk, executive decision-making, and organizational trust. The responsibility is not just to identify threats, but to help leadership understand which risks matter, when they matter, and why they deserve attention. This shift changes what success looks like. It also changes how pressure is felt.During the early years of this transition, CISOs carry accountability without authority. They are expected to influence outcomes without always having control over budgets, priorities, or timelines. That tension forces a new skill set to the forefront. Technical knowledge is assumed. The differentiator becomes communication, translation, and relationship-building across the business.As organizations mature, the conversation evolves again. Security stops being framed around individual threats and starts being framed as an operational discipline. CISOs focus on prioritization, tradeoffs, and clarity rather than coverage for everything. This requires judgment more than tooling.The role also becomes deeply human. Fear shows up quietly. Fear of pushing too hard. Fear of slowing the business. Fear of being seen as the blocker. CISOs who succeed do not eliminate that fear. They learn how to manage it while building credibility with executive peers.AI enters the picture not as a replacement, but as a force multiplier. Automation supports scale, but judgment remains human. Security programs increasingly deny by default and permit intentionally, which demands a deep understanding of how the business actually works. That understanding cannot be automated.What emerges is a clearer definition of modern security leadership. The CISO is no longer a gatekeeper. This is a risk advisor, a translator, and a strategist who helps the organization focus its limited resources where they matter most.The role has not become easier. It has become more meaningful.Read the full article: TBA________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn: https://itspm.ag/future-of-cybersecuritySincerely, Sean Martin and TAPE9________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of the On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Would you like Sean to work with you on a topic/series to help you tell your story? Visit his services page to learn more: https://www.seanmartin.com/servicesWant to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website.Keywords: sean martin, marco ciappelli, steve katz, tim brown, jessica robinson, rob allen, rohit ghai, rich seiersen, steven j speer, chris pierson, mark lambert, jim manico, robin bylenga, redefining cybersecurity, cybersecurity podcast, redefining cybersecurity podcast, ciso, risk, leadership, ai, resilience, strategy Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Cyber Security Today
    Final Encore Episode - Research, Cybersecurity Awareness and Training

    Cyber Security Today

    Play Episode Listen Later Jan 3, 2026 83:55


    In this episode, host Jim Love discusses the importance of cybersecurity awareness and training, featuring insights from Michael Joyce of the Human-Centric Cybersecurity Partnership at the University of Montreal and David Shipley of Beauceron Security. They explore the impact of cybersecurity awareness programs, the decay of sustained vigilance post-training, and the nuances between phishing reporting and clicking behaviors. The conversation also critiques recent research claims that question the efficacy of phishing training, emphasizing the need for continuous, empirically supported approaches in cybersecurity education. The episode highlights the value of balanced, layered defenses involving both technical solutions and informed user behavior. 00:00 Introduction and Podcast Announcement 00:14 Sponsorship Acknowledgment 00:35 The Nature of Cybersecurity Awareness 01:09 Introduction to the Research Show 01:21 Guest Introductions 02:15 Human-Centric Cybersecurity Partnership 03:46 The Importance of Canadian Research 04:40 Cybersecurity and Culture 05:27 The Role of Research in Cybersecurity 07:12 David's Research and Collaboration with Michael 08:46 The Value of Independent Research 13:33 Cybersecurity Awareness Month Impact 17:23 Phishing Simulation and Reporting 23:49 Awareness Decay and Vigilance 30:55 The Importance of Reporting and Feedback Loops 40:00 Optimal Frequency for Cybersecurity Training 40:27 Critiques and Misconceptions in Phishing Training 42:00 Empirical Data and Training Effectiveness 43:19 Insights from Phishing Simulations 47:14 Understanding Why People Click 52:43 Challenges in Cybersecurity Research 01:04:06 The Importance of Layered Defenses 01:17:17 Concluding Thoughts on Cybersecurity Training

    Your Car Is a Data Goldmine—Cybersecurity Expert Warns Drivers Are Exposed

    Play Episode Listen Later Jan 2, 2026 40:42 Transcription Available


    Your car doesn't just drive anymore.It stores data, connects to your phone, tracks locations, and communicates with the cloud. And according to cybersecurity expert Robert Siciliano, that makes modern vehicles—and the dealerships that sell and service them—prime targets for criminals. In this episode, we sit down with one of the most trusted voices in personal and digital security to unpack a reality most drivers aren't prepared for: cars are now computers on wheels.Robert has spent over 30 years investigating crime, identity theft, and cyber threats. He's appeared on CNN, CNBC, ABC, NBC, Fox News, and more—but today, the focus is on what every car owner, buyer, and dealer needs to understand right now. In this conversation, we break down:What data modern vehicles collectHow hackers exploit connected car systemsWhy dealerships are attractive cyber targetsThe hidden risks tied to apps, EVs, and remote accessSimple steps drivers can take to protect themselvesIf you own a car, plan to buy one, or work in the auto industry, this conversation isn't optional—it's essential.

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Stop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://www.threatlocker.com/dailycyber Check out Flare.io Academy at https://simplycyber.io/flare Embrace Enterprise AI and try Airia for free today: https://airia.com/register/?utm_source=daily_cyber_threat_brief&utm_medium=podcast&utm_campaign=q12026 Check out Pay-What-You-Can Antisyphon Training: https://simplycyber.io/antisyphon SC Academy - The Place for Cyber Careers: https://zpr.io/mYV5232V66Qn Join SC Discord: https://SimplyCyber.io/Discord News: https://cisoseries.com Follow SC: https://simplycyber.io/socials

    Paul's Security Weekly
    Breaking Into Cybersecurity - PSW #907

    Paul's Security Weekly

    Play Episode Listen Later Jan 1, 2026 65:11


    Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that work. The field needs people at all levels, and you don't need a four-year degree to break in. We'll discuss all the details, including a list of projects for beginners in Cybersecurity, plus plenty of non-technical suggestions! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-907

    ITSPmagazine | Technology. Cybersecurity. Society
    Five Patterns From 152 Episodes That Reshaped How I Think About Security, Technology, and Work Heading into 2026 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Jan 1, 2026 13:26


    Across 152 conversations this year, a set of recurring patterns kept surfacing, regardless of whether the discussion focused on application security, software supply chain risk, AI systems, or creative work. The industries varied. The roles varied. The challenges did not.One theme rises above the rest: visibility remains the foundation of everything else, yet organizations continue to accept blind spots as normal. Asset inventories are incomplete. Build systems are poorly understood. Dependencies change faster than teams can track them. The issue is not a lack of tools. It is a willingness to tolerate uncertainty because discovery feels hard or disruptive.Another pattern is equally consistent. Integration matters more than novelty. New features, including AI-driven ones, sound compelling until they fail to connect with what teams already rely on. Security programs fracture when tools operate in isolation. Coverage looks strong on paper while gaps quietly expand in practice. When tools fail to integrate into existing environments, they create complexity instead of reducing risk.Security also continues to struggle with how it shows up in daily work. Programs succeed when security is embedded into workflows, automated where possible, and invisible until it matters. They fail when security acts as a gate that arrives after decisions are already made. Teams either adopt security naturally or route around it entirely. There is no neutral middle ground.Context repeatedly separates effective leadership from noise. Risk only becomes meaningful when it is framed in terms of business operations, delivery speed, and real tradeoffs. Leaders who understand how the business actually functions communicate risk clearly and make better decisions under pressure.Finally, creativity remains undervalued in security conversations. Automation should remove repetitive tasks so people can focus on judgment, problem solving, and design. The same mindset that produces elegant guitars, photographs, or products applies directly to building resilient security programs.These five patterns are not independent ideas. Together, they describe a shift toward security that is visible, integrated, contextual, workflow-driven, and human-centered.Read the full article: https://www.linkedin.com/pulse/five-patterns-from-152-podcast-episodes-2025-changed-i-martin-cissp-st1ge________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn: https://itspm.ag/future-of-cybersecuritySincerely, Sean Martin and TAPE9________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of the On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Would you like Sean to work with you on a topic/series to help you tell your story? Visit his services page to learn more: https://www.seanmartin.com/servicesWant to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Business, Brains & the Bottom Line
    Ep. 140: How Authors Turn Books into Client-Attraction Engines with Henry DeVries

    Business, Brains & the Bottom Line

    Play Episode Listen Later Jan 1, 2026 37:35


    Most business owners think a book is about selling copies. Henry DeVries knows better.In this episode, Henry DeVries, publisher of Indie Books International, host of Agency Rainmaker TV, and ghostwriter/editor of more than 200 business books, including a McGraw-Hill international bestseller, breaks down how a book can become one of the most powerful tools for attracting ideal clients.Henry shares the simple, repeatable framework he teaches agency owners and entrepreneurs to use their book as a positioning asset—not a commodity. We explore how the right book establishes instant credibility, opens doors to paid speaking opportunities, and generates a steady flow of inbound leads without requiring prospecting.If you've ever thought about writing a book—or already have one but aren't seeing results, this conversation will change how you think about authorship, authority, and growth.

    Paul's Security Weekly TV
    Breaking Into Cybersecurity - PSW #907

    Paul's Security Weekly TV

    Play Episode Listen Later Jan 1, 2026 65:11


    Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that work. The field needs people at all levels, and you don't need a four-year degree to break in. We'll discuss all the details, including a list of projects for beginners in Cybersecurity, plus plenty of non-technical suggestions! Show Notes: https://securityweekly.com/psw-907

    Paul's Security Weekly (Podcast-Only)
    Breaking Into Cybersecurity - PSW #907

    Paul's Security Weekly (Podcast-Only)

    Play Episode Listen Later Jan 1, 2026 65:11


    Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that work. The field needs people at all levels, and you don't need a four-year degree to break in. We'll discuss all the details, including a list of projects for beginners in Cybersecurity, plus plenty of non-technical suggestions! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-907

    Redefining CyberSecurity
    Five Patterns From 152 Episodes That Reshaped How I Think About Security, Technology, and Work Heading into 2026 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9

    Redefining CyberSecurity

    Play Episode Listen Later Jan 1, 2026 13:26


    Across 152 conversations this year, a set of recurring patterns kept surfacing, regardless of whether the discussion focused on application security, software supply chain risk, AI systems, or creative work. The industries varied. The roles varied. The challenges did not.One theme rises above the rest: visibility remains the foundation of everything else, yet organizations continue to accept blind spots as normal. Asset inventories are incomplete. Build systems are poorly understood. Dependencies change faster than teams can track them. The issue is not a lack of tools. It is a willingness to tolerate uncertainty because discovery feels hard or disruptive.Another pattern is equally consistent. Integration matters more than novelty. New features, including AI-driven ones, sound compelling until they fail to connect with what teams already rely on. Security programs fracture when tools operate in isolation. Coverage looks strong on paper while gaps quietly expand in practice. When tools fail to integrate into existing environments, they create complexity instead of reducing risk.Security also continues to struggle with how it shows up in daily work. Programs succeed when security is embedded into workflows, automated where possible, and invisible until it matters. They fail when security acts as a gate that arrives after decisions are already made. Teams either adopt security naturally or route around it entirely. There is no neutral middle ground.Context repeatedly separates effective leadership from noise. Risk only becomes meaningful when it is framed in terms of business operations, delivery speed, and real tradeoffs. Leaders who understand how the business actually functions communicate risk clearly and make better decisions under pressure.Finally, creativity remains undervalued in security conversations. Automation should remove repetitive tasks so people can focus on judgment, problem solving, and design. The same mindset that produces elegant guitars, photographs, or products applies directly to building resilient security programs.These five patterns are not independent ideas. Together, they describe a shift toward security that is visible, integrated, contextual, workflow-driven, and human-centered.Read the full article: https://www.linkedin.com/pulse/five-patterns-from-152-podcast-episodes-2025-changed-i-martin-cissp-st1ge________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn: https://itspm.ag/future-of-cybersecuritySincerely, Sean Martin and TAPE9________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of the On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Would you like Sean to work with you on a topic/series to help you tell your story? Visit his services page to learn more: https://www.seanmartin.com/servicesWant to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Cybercrimeology
    Systematically Improving Cybersecurity Training

    Cybercrimeology

    Play Episode Listen Later Jan 1, 2026 49:19


    Notes:Julia Prümmer describes her transition from legal psychology into cybersecurity research and how psychological methods shape her approach to cybersecurity training.The discussion explores the role of systematic reviews in mapping what a research field actually knows, rather than relying on highly visible or frequently cited studies.Findings from a large-scale systematic review of cybersecurity training methods are discussed, highlighting the diversity of training approaches used across the literature.The episode examines results from a meta-analysis assessing the overall effectiveness of cybersecurity training and the gap between improvements in precursors such as knowledge and intentions versus observable behaviour.Julia explains why many cybersecurity training programmes lack explicit behavioural theory and rely on trial-and-error design choices.A key theme is the distinction between cybersecurity behaviours that require active engagement, such as phishing detection, and behaviours that may benefit from habit formation, such as screen locking or password management.The conversation draws on research into email habits and phishing susceptibility to illustrate how habitual behaviour can increase vulnerability in certain contexts.Julia discusses the use of psychological theory, including habit formation and implementation intentions, to design and evaluate cybersecurity training interventions.The episode concludes with reflections on the future of cybersecurity training research and the need for behaviour-specific, theory-informed models.About our Guest:Julia Prümmerhttps://www.universiteitleiden.nl/medewerkers/julia-prummer#tab-1https://www.linkedin.com/in/julia-prümmer-376778159/Papers or resources mentioned in this episode Prümmer, J., van Steen, T., & van den Berg, B. (2024). A systematic review of current cybersecurity training methods. Computers & Security, 136, 103585.https://doi.org/10.1016/j.cose.2023.103585Prümmer, J. (2024). The role of cognition in developing successful cybersecurity training programs: Passive vs. active engagement. In D. D. Schmorrow & C. M. Fidopiastis (Eds.), Augmented cognition. HCII 2024 (Lecture Notes in Computer Science, Vol. 14695, pp. 185–199). Springer.https://scholarlypublications.universiteitleiden.nl/handle/1887/4093101Prümmer, J., van Steen, T., & van den Berg, B. (2025). Assessing the effect of cybersecurity training on end-users: A meta-analysis. Computers & Security, 150, 104206.https://doi.org/10.1016/j.cose.2024.104206Vishwanath, A. (2015). Examining the distinct antecedents of e-mail habits and its influence on the outcomes of a phishing attack. Journal of Computer-Mediated Communication, 20(5), 570–584.https://doi.org/10.1111/jcc4.12126Other If this topic of training as an intervention to reduce susceptibility to cybercrime, you might also enjoy the recent Episodes 123, 116, 110, 106, 60, and 59 that are all on related topics. If you are brave you can even go right back to Episodes 6, 7 and 8, there is a lot to listen to.  

    TD Ameritrade Network
    Geopolitical Shifts Fuel Defense, Tech and A.I. Growth

    TD Ameritrade Network

    Play Episode Listen Later Dec 31, 2025 7:27


    Garrett Smith discusses how geopolitical shifts and policy changes have radically transformed the defense and A.I. industries over the past few years. European defense Exchange Traded Funds have seen significant gains, and Smith anticipates continued growth in private markets as A.I. competition, particularly between China and the U.S., intensifies. Cybersecurity remains an evergreen opportunity, and Smith believes that deploying cutting-edge technology will deter conflict.======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about

    Cybersecurity Where You Are
    Episode 168: Institutionalizing Good Cybersecurity Ideas

    Cybersecurity Where You Are

    Play Episode Listen Later Dec 31, 2025 37:56


    In Episode 168 of Cybersecurity Where You Are, Tony Sager sits down with Tony Rutkowski, one of the CIS Critical Security Controls® (CIS Controls®) Ambassadors of the Center for Internet Security® (CIS®). Together, they discuss what Tony Rutkowski has learned in his efforts to institutionalize good cybersecurity ideas like the CIS Controls.Here are some highlights from our episode:01:48. Introductions to Tony Rutkowski and his career in technology06:06. The evolution of the CIS Controls and how Tony Rutkowski came to advocate for them12:50. The "Fog of More" as a metaphor to focus attention, not create new solutions17:50. How institutionalizing good cybersecurity ideas is like conducting an orchestra21:44. The use of timing and the right security content to help people clarify their intentions24:25. The value of industry mappings in reducing duplicate implementation efforts26:41. Secure by design: a 2025 example of creating a new formal global technical standardResourcesEpisode 160: Championing SME Security with the CIS ControlsEpisode 167: Volunteers as a Critical Cybersecurity ResourceReasonable Cybersecurity GuideCybersecurity at Scale: Piercing the Fog of MoreMapping and Compliance with the CIS ControlsSecure by Design: A Guide to Assessing Software Security PracticesEpisode 164: Secure by Design in Software DevelopmentCIS Critical Security Controls Implementation GroupsIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

    DrZeroTrust
    The Cost of Complacency: Cybersecurity Lessons from 2025

    DrZeroTrust

    Play Episode Listen Later Dec 31, 2025 27:37


    In this conversation, I break down the state of cybersecurity heading into 2025—and it's not pretty. Ransomware isn't “ramping up,” it's eating the market alive, while too many organizations are still betting their future on outdated controls, checkbox compliance, and the fantasy that perimeter security is a strategy. I call out the continued failure of traditional security models, the uncomfortable reality of high-profile vendor missteps, and the industry's habit of confusing tool sprawl with actual risk reduction.My bottom line is simple: Zero Trust isn't a buzzword; it's the only approach that aligns with how modern environments actually operate—cloud-first, identity-driven, and constantly under attack. If you want real improvement, start treating identity like the control plane, tighten your cloud and endpoint fundamentals, get serious visibility into what's connecting and what's executing, and stop pretending “prevention” alone is a plan. Initial access is going to happen—so engineer for containment and resiliency. I wrap up with practical steps you can apply immediately to harden posture and quit treating cyber defense like a yearly renewal rather than a continuous operational discipline.TakeawaysRansomware incidents surged in 2025, impacting critical infrastructure.Traditional defenses are failing to contain ransomware attacks.Using a password manager is essential for security.Cybercrime costs are projected to reach $10 trillion by 2025.Misconfigurations in cloud services are a major risk factor.Identity management is a solvable problem that needs attention.Vendors in cybersecurity are not immune to breaches.Organizations should partner with service providers for cybersecurity.Research and data should guide cybersecurity strategies.A proactive approach is necessary to mitigate cyber threats.

    Reimagining Cyber
    The Human Side of Cybersecurity: 2025 in Review - Ep 182

    Reimagining Cyber

    Play Episode Listen Later Dec 31, 2025 13:51


    In part two of the 'Best of 2025' series of Reimagining Cyber, hosted by Rob Aragao, the focus is on the human elements influencing cybersecurity. The episode explores the challenges of burnout in the cybersecurity workforce as explained by Dr. Andrew Reeves, a cyber psychology expert. Betsy Cooper of the Aspen Policy Academy emphasizes the importance of integrating personal experiences and community voices in shaping cybersecurity policy. Lynn Dohm, Executive Director of Women in Cybersecurity (WiCyS), shares inspiring stories of individuals transitioning into cybersecurity careers. Finally, Craig Taylor of CyberHoot discusses a more effective approach to training that leverages positive reinforcement over punishment. The episode underlines that cybersecurity is not just about technology but also about understanding and supporting the people behind it.00:00 Introduction to Reimagining Cyber00:24 The Human Side of Cybersecurity: Burnout04:43 Shaping Cybersecurity Policy with Personal Experience07:00 Opening Doors: Women in Cybersecurity10:27 Effective Cybersecurity Training: Positive Reinforcement12:51 Conclusion: The Future of CybersecurityIt's 5 years since Reimagining Cyber began. Thanks to all of our loyal listeners!As featured on Million Podcasts' Best 100 Cybersecurity Podcasts Top 50 Chief Information Security Officer CISO Podcasts Top 70 Security Hacking Podcasts This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonStop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    The Other Side Of The Firewall
    Agriculture Under Attack, Holiday Hacker Tactics, and AI's Kill Switch Problem

    The Other Side Of The Firewall

    Play Episode Listen Later Dec 31, 2025 57:18


    In this episode, Ryan Williams Sr. and Shannon Tynes discuss the increasing cyber threats to agriculture, particularly in the context of recent attacks on food companies. They highlight the need for improved cybersecurity measures in the agricultural sector, especially as technology becomes more integrated into farming practices. The conversation shifts to the risks associated with holiday cybersecurity, noting that hackers often exploit the downtime during holidays when organizations are less vigilant. Finally, they discuss the complexities and potential dangers of AI, emphasizing the need for caution as AI systems become more advanced and integrated into various sectors. Articles: Hackers are targeting US farms and food companies. Lawmakers say it's time to act https://www.wpr.org/news/hackers-targeting-us-farms-food-companies-cyber-security?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExTGk2SlVkT0ptTjFuWjlKcnNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR5Mf1WK2BFmaJlNEHIdZajV3dJphSkPILyNmKP3rkeilFpJC-bthLxEaU_NtQ_aem_TR6HOOO6Z7L8UX0L1TYJxw Why hackers love the holidays https://www.axios.com/2025/12/25/holidays-hackers-corporate-security-teams?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExTGk2SlVkT0ptTjFuWjlKcnNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR5Mf1WK2BFmaJlNEHIdZajV3dJphSkPILyNmKP3rkeilFpJC-bthLxEaU_NtQ_aem_TR6HOOO6Z7L8UX0L1TYJxw AI's Big Red Button Doesn't Work, And The Reason Is Even More Troubling https://www.yahoo.com/news/articles/ais-big-red-button-doesnt-110021493.html?guccounter=1 Pick up the eBook version of my book, THE OTHER SIDE OF THE FIREWALL: The Real-Life Stories of Movers, Shakers & Glass Ceiling Breakers, for FREE on Smashwords: https://lnkd.in/ee7bEPXT Use code SW100 at checkout for 100% off. Offer valid through January 1, 2026. Please LISTEN

    The Andrew Parker Podcast
    Episode 447, The Andrew Parker Show - Tucker Carlson Is Wrong: Why Israel Strengthens America and Is Its Greatest Ally

    The Andrew Parker Podcast

    Play Episode Listen Later Dec 31, 2025 62:25 Transcription Available


    Tucker Carlson argues that Israel is a liability to the United States. He's wrong. In Episode 447 of The Andrew Parker Show, Andrew Parker explains—point by point—why Israel is not only a critical ally, but America's strongest and most reliable partner on the world stage. From national security and intelligence sharing to battlefield-tested military innovation, economic return on investment, and shared democratic values, this episode dismantles the claim that the U.S.–Israel relationship is one-sided or harmful.Andrew explores how Israel strengthens American security without requiring U.S. troops, acts as a force multiplier against shared enemies, and delivers technological and medical innovations that save American lives. He also contrasts Israel's commitment to freedom, rule of law, and liberal democracy with the authoritarian regimes surrounding it—raising serious questions about why Israel alone is singled out as expendable.This is a clear-eyed, data-driven defense of one of America's most consequential alliances—and a warning about the cost of getting it wrong.Support the showThe Andrew Parker Show - Politics, Israel & The Law. Follow us on Facebook, LinkedIn, YouTube and X. Subscribe to our email list at www.theandrewparkershow.com Copyright © 2025 The Andrew Parker Show - All Rights Reserved.

    IT Privacy and Security Weekly update.
    fLocked and fLoaded. The IT Privacy and Security Weekly update for the week ending December 30th., 2025.

    IT Privacy and Security Weekly update.

    Play Episode Listen Later Dec 31, 2025 19:15


    EP 272In this last update for 2025, we span the fAce of the globe and find out we've gotten fLocked and fLoaded!Cybersecurity researchers from DARKNAVY have revealed a critical vulnerability allowing commercially available humanoid robots to be hijacked via simple voice commands, with exploits rapidly propagating to nearby machines.Fraudsters in China are increasingly exploiting AI-generated photos and videos of damaged goods to secure illegitimate refunds on e-commerce platforms, challenging merchant trust and platform policies.A sophisticated campaign dubbed Zoom Stealer, attributed to Chinese threat actor DarkSpectre, has deployed malicious browser extensions to harvest sensitive corporate meeting data from millions of users.Western intelligence reports indicate Russia is advancing a novel "zone-effect" anti-satellite weapon designed to release dense pellet clouds in orbit, potentially targeting SpaceX's Starlink constellation.A 29-year-old Lithuanian national has been extradited to South Korea and charged for distributing trojanized KMSAuto software that infected 2.8 million systems with cryptocurrency clipboard hijacking malware.A vast network of roadside cameras tracking vehicles across Uzbekistan was inadvertentlyInsurance giant afLac is notifying approximately 22.65 million individuals of a major data breach stemming from a June 2025 cyber intrusion that exposed sensitive personal information.Find the full transcript here.

    The CyberWire
    The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report [Microsoft Threat Intelligence Podcast]

    The CyberWire

    Play Episode Listen Later Dec 30, 2025 47:29


    While our team is out on winter break, please enjoy this episode of The Microsoft Threat Intelligence Podcast from our partners at Microsoft. In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a comprehensive look at how the cyber threat landscape is accelerating through AI, automation, and industrialized criminal networks.  They explore how nation-state operations and cybercrime have fused into a continuous cycle of attack and adaptation, with actors sharing tooling, infrastructure, and even business models. The conversation also examines AI's growing impact, from deepfakes and influence operations to the defensive promise of AI-powered detection, and how identity compromise has become the front door to most intrusions, accounting for over 99% of observed attacks.  Listeners will gain perspective on:  How AI is shaping both attacker tradecraft and defensive response.  Why identity remains the cornerstone of global cyber risk.  What Microsoft's telemetry—spanning 600 million daily attacks—reveals about emerging threats and evolving defender strategies.  Questions explored:  How are threat actors using AI to scale deception and influence operations?  What does industrialized cybercrime mean for organizations trying to defend at scale?  How can defenders harness AI responsibly without overreliance or exposure?    Resources:   Download the report and executive summary  Register for Microsoft Ignite  View Chloé Messdaghi on LinkedIn  View Crane Hassold on LinkedIn  View Sherrod DeGrippo on LinkedIn   Related Microsoft Podcasts:                    Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast  Uncovering Hidden Risks        Discover and follow other Microsoft podcasts at microsoft.com/podcasts     Get the latest threat intelligence insights and guidance at Microsoft Security Insider    The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  Learn more about your ad choices. Visit megaphone.fm/adchoices

    ITSPmagazine | Technology. Cybersecurity. Society
    When AI Guesses and Security Pays: Choosing the Right Model for the Right Security Decision | A Brand Story Highlight Conversation with Michael Roytman, CTO of Empirical Security

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Dec 30, 2025 7:58


    In this Brand Highlight, we talk with Michael Roytman, CTO of Empirical Security, about a problem many security teams quietly struggle with: using general purpose AI tools for decisions that demand precision, forecasting, and accountability.Michael explains why large language models are often misapplied in security programs. LLMs excel at summarization, classification, and pattern extraction, but they are not designed to predict future outcomes like exploitation likelihood or operational risk. Treating them as universal problem solvers creates confidence gaps, not clarity.At Empirical, the focus is on preventative security through purpose built modeling. That means probabilistic forecasting, enterprise specific risk models, and continuous retraining using real telemetry from security operations. Instead of relying on a single model or generic scoring system, Empirical applies ensembles of models tuned to specific tasks, from vulnerability exploitation probability to identifying malicious code patterns.Michael also highlights why retraining matters as much as training. Threat conditions, environments, and attacker behavior change constantly. Models that are not continuously updated lose relevance quickly. Building that feedback loop across hundreds of customers is as much an engineering and operations challenge as it is a data science one.The conversation reinforces a simple but often ignored idea: better security outcomes come from using the right tools for the right questions, not from chasing whatever AI technique happens to be popular. This episode offers a grounded perspective for leaders trying to separate signal from noise in AI driven security decision making.Note: This story contains promotional content. Learn more.GUESTMichael Roytman, CTO of Empirical Security | On LinkedIn: https://www.linkedin.com/in/michael-roytman/RESOURCESLearn more about Empirical Security: https://www.empiricalsecurity.com/LinkedIn Post: https://www.linkedin.com/posts/bellis_a-lot-of-people-are-talking-about-generative-activity-7394418706388402178-uZjB/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKeywords: sean martin, michael roytman, ed beis, empirical security, cybersecurity, ai, machinelearning, vulnerability, risk, forecasting, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Trust Issues
    EP 22 - Security at the speed of innovation: Breaking down legacy barriers

    Trust Issues

    Play Episode Listen Later Dec 30, 2025 43:30


    How are defenders supposed to keep up when attackers move at the speed of AI? In this episode of Security Matters, host David Puner welcomes Rick McElroy, founder and CEO of Nexasure, for a candid conversation about cybersecurity's breaking point. Together, they unpack the realities of defending organizations in an era of identity sprawl, machine risk, agentic AI, and relentless automation. Rick shares hard-won insights from decades on the front lines, challenging the myth of perfect defense and revealing why identity remains at the root of most breaches. Whether you're a CISO, IT leader, or cybersecurity professional, you'll get actionable advice on managing machine identities, rethinking risk, and building resilience for a future where change is the only constant.

    To The Point - Cybersecurity
    The Merging Worlds of AI, Cybersecurity, and Physical Threats with David Saunders Part 2

    To The Point - Cybersecurity

    Play Episode Listen Later Dec 30, 2025 25:37


    Welcome back to Forcepoint's "To the Point Cybersecurity Podcast!" In this episode, hosts Rachael Lyon and Jonathan Knepher are joined once again by expert guest David Saunders to dive even deeper into today's ever-evolving cybersecurity landscape. From the accelerating sophistication of phishing attacks and the dual role of AI in offense and defense, to the ongoing challenges of supply chain and insider risk, this episode explores what cybersecurity professionals are up against in 2024—and what they should prepare for in the years ahead. You'll hear practical insights on zero trust, the importance of data visibility, and why understanding your backup and recovery processes is more critical than ever. Plus, David Saunders shares where he sees AI's role heading next and offers advice on staying resilient in the face of uncertainty. Whether you're a seasoned practitioner or just getting started in cybersecurity, tune in for actionable strategies, forward-looking predictions, and a few laughs about the realities of life on the digital front lines. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e365

    The Money Show
    SMME realities, access to opportunity and emerging risks facing South African businesses

    The Money Show

    Play Episode Listen Later Dec 30, 2025 93:08 Transcription Available


    Nokukhanya Mntambo speaks to Arthur Goldstuck, Author & Journalist, about what the latest SMME data reveals on where small businesses across South Africa are growing, where they are failing, and why the sector remains both a national priority and a persistent struggle. In other interviews, Jordan Hertz, Chief Commercial Officer of Sourcefin, discusses the launch of TenderCentral and whether access to public-sector opportunities is enough for SMMEs facing funding and late-payment challenges; entrepreneurs Surprise Mankge of Silverspoon and Kabelo Kungwane of Kasiflavour10 share insights into building sustainable businesses in hospitality and township fashion; while Dr Angela Deh, Clinical Psychologist, and Themba Ndubane, Managing Director at Horizon Seven, unpack emerging risks around AI-driven mental-health tools and the security of personal documents stored in the cloud. The Money Show is a podcast hosted by well-known journalist and radio presenter, Stephen Grootes. He explores the latest economic trends, business developments, investment opportunities, and personal finance strategies. Each episode features engaging conversations with top newsmakers, industry experts, financial advisors, entrepreneurs, and politicians, offering you thought-provoking insights to navigate the ever-changing financial landscape.    Thank you for listening to a podcast from The Money Show Listen live Primedia+ weekdays from 18:00 and 20:00 (SA Time) to The Money Show with Stephen Grootes broadcast on 702 https://buff.ly/gk3y0Kj and CapeTalk https://buff.ly/NnFM3Nk For more from the show, go to https://buff.ly/7QpH0jY or find all the catch-up podcasts here https://buff.ly/PlhvUVe Subscribe to The Money Show Daily Newsletter and the Weekly Business Wrap here https://buff.ly/v5mfetc The Money Show is brought to you by Absa     Follow us on social media   702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/CapeTalk 702 on YouTube: https://www.youtube.com/@radio702   CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/Radio702 CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567 See omnystudio.com/listener for privacy information.

    The Tea on Cybersecurity
    Boost Your Cybersecurity with Continuous Threat Exposure Management (CTEM)

    The Tea on Cybersecurity

    Play Episode Listen Later Dec 30, 2025 11:32


    Your business is constantly evolving. But how do you know where the weak spots are or which ones actually matter? In a fast-moving environment, understanding your vulnerabilities before attackers do is critical.In this episode, Anh Pham, Director of Penetration Testing and Security at Trava, breaks down why more businesses are moving toward Continuous Threat Exposure Management (CTEM). Anh explains the five key components of CTEM, how to tell if your business is ready to implement it, and what's pushing organizations to take a more active, ongoing approach to cybersecurity.Key takeaways:Why CTEM outperforms traditional point-in-time testingThe five components of CTEM and how they work togetherHow evolving threats and expanding attack surfaces demand continuous validationReady to dive deeper into the continuous process? Get more info on CTEM and why it's important here: https://travasecurity.com/ctem-explainedEpisode highlights:(00:00) CTEM explained simply(02:38) How CTEM differs from point-in-time testing(04:29) The five components of a CTEM approach(09:25) When to adopt CTEMConnect with the host:Jara Rowe's LinkedIn - @jararoweConnect with the guest:Anh Pham's LinkedIn - https://www.linkedin.com/in/anhpham11/Connect with Trava:Website - www.travasecurity.comBlog - www.travasecurity.com/learn-with-trava/blogLinkedIn - @travasecurityYouTube - @travasecurity

    Hanging With The Hoopers
    From Tech to Trusted Partner: Sam Chawkat on Cybersecurity in Title | FNF Energize

    Hanging With The Hoopers

    Play Episode Listen Later Dec 30, 2025 31:21


    On this FNF Energize sponsor spotlight episode of Hanging With The Hoopers, Andrew sits down with Sam Chawkat from Dynamic Network Solutions... a long time listener and first time guest of the podcast.Sam's story is classic IT in the best way... started in tech at 15, went from government projects to building a real company from a basement, and scaled Dynamic into a 45 plus person team operating across multiple states... with deep roots in the title and mortgage world.In this conversation, Andrew and Sam get into what matters right now for title company owners, ops leaders, and anyone responsible for protecting a business in a fast changing landscape• Why AI is making phishing more believable and more dangerous... not just misspelled “obvious” scams anymore• How fraud is evolving through AI written emails, cloned landing pages, automation agents, and even voice AI• The real #1 cybersecurity threat for small and mid sized businesses... and why your staff is also your biggest asset• Why once a year training is not enough anymore... and how simulated phishing builds real muscle memory• A real world story of a client avoiding a $150,000 theft by using the “trust but verify” process• Leadership lessons from growing a business... relationships, communication, calculated risk, and working on the business instead of in it• How Dynamic approaches IT differently... enterprise grade solutions without enterprise grade pricing, with a heavy focus on employee experience and client experienceSam also breaks down what a smart IT review cadence looks like... what should happen annually, what data should be visible monthly, and why every owner needs a provider who will talk policy, training, and business process... not just hardware upgrades and tech speak.If you're coming to FNF Energize Maryland, Sam will be there in person. Stop by, ask about AI driven fraud trends, phishing simulations, and what your team should be doing right now to stay protected without breaking the bank.Timestamps00:00 Welcome and Energize sponsor spotlight00:35 Sam's background... starting IT at 15 and scaling Dynamic04:02 Why title and mortgage became Dynamic's roots05:28 Enterprise grade IT without enterprise pricing06:42 How AI is changing phishing and fraud tactics10:49 Training, reinforcement, and the $150K save story14:53 Leadership lessons... people, risk, and client experience24:12 How often to audit IT security and systems29:33 Why Dynamic is sponsoring Energize Maryland31:13 Final thoughts and what to ask Sam at the conferenceConnect with Sam and Dynamic Network Solutions• Find Sam Chawkat on LinkedIn• Learn more about Dynamic Network Solutions at Energize MarylandConnect with Hanging With The Hoopers• Subscribe for more conversations on leadership, growth, and the real estate trifecta• Follow Andrew and Tim on LinkedIn for more Energize sponsor spotlights and conference content

    Autonomous IT
    CISO IT – Just Secure IT: Best of 2025

    Autonomous IT

    Play Episode Listen Later Dec 30, 2025 28:32


    Happy Holidays! In this Best Moments of 2025 episode, we revisit standout discussions, sharp takes, and memorable moments from the year – covering ransomware, vulnerability management, automation, zero trust, and the evolving role of the CISO. Whether you're leading security strategy or working hands-on in IT, these highlights capture the ideas that shaped the year in cybersecurity.

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonStop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    PEBCAK Podcast: Information Security News by Some All Around Good People
    Bonus Episode 16 - Spotify Wrapped, 2026 Fitness Challenge, Cybersecurity Year Recap, Celebrity Passings, Top Movies

    PEBCAK Podcast: Information Security News by Some All Around Good People

    Play Episode Listen Later Dec 29, 2025 56:49


    Welcome to this week's bonus episode of the PEBCAK Podcast!  We've got some amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   Felix Baumgartner's Crash https://www.independent.co.uk/news/world/europe/felix-baumgartner-skydiver-cause-death-paragliding-crash-b2840975.html   Spy Game https://www.imdb.com/title/tt0266987/   Dad Joke of the Week (DJOW)   Please share this podcast with someone you know!  It helps us grow the podcast and we really appreciate it!   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/ Ben - https://www.linkedin.com/in/benjamincorll/

    UNSECURITY: Information Security Podcast
    Unsecurity Episode 254: Journey to Becoming A CISO with Ted Peterson

    UNSECURITY: Information Security Podcast

    Play Episode Listen Later Dec 29, 2025 33:48


    A slow-rolling holiday episode featuring CISO at DataSite, Ted Peterson! Transitioning from a Director Role, Ted shares his journey to the CISO title and how his unique background informs his work approach.Tune in for insights on:Realities to navigating organizational leadership as a CISOImportance of diverse perspectives and backgrounds in the security space Establishing pathway to career goalsLike, subscribe, and share with your network to stay informed about the latest in cybersecurity! We want to hear from you! Reach out at unsecurity@frsecure.com and follow us for more:LinkedIn: https://www.linkedin.com/company/frsecure/ Instagram: https://www.instagram.com/frsecureofficial/ Facebook: https://www.facebook.com/frsecure/ BlueSky: https://bsky.app/profile/frsecure.bsky.social About FRSecure: https://frsecure.com/FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start or looking for a team of experts to collaborate with you, we are ready to serve.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Sunday, December 28th, 2025: MongoDB Unauthenticated Memory Leak CVE-2025-14847

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Dec 28, 2025 5:50


    MongoDB Unauthenticated Attacker Sensitive Memory Leak CVE-2025-14847 Over the Christmas holiday, MongoDB patched a sensitive memory leak vulnerability that is now actively being exploited https://www.mongodb.com/community/forums/t/important-mongodb-patch-available/332977 https://github.com/mongodb/mongo/commit/505b660a14698bd2b5233bd94da3917b585c5728 https://www.ox.security/blog/attackers-could-exploit-zlib-to-exfiltrate-data-cve-2025-14847/ https://github.com/joe-desimone/mongobleed/

    The Bid Picture - Cybersecurity & Intelligence Analysis
    436. "...against all enemies, foreign and domestic."

    The Bid Picture - Cybersecurity & Intelligence Analysis

    Play Episode Listen Later Dec 28, 2025 31:21


    Send Bidemi a Text Message!In this episode, host Bidemi Ologunde takes you from a single, unforgettable line in the U.S. military oath: "against all enemies, foreign and domestic," to a hotel-room phone call that ended with two words: "stand by." What follows is a first-person journey into intelligence analysis operations across military installations in [redacted] and [redacted], and a front-row view of how surveillance technology has evolved since 2016. How do phones, IP addresses, and device “fingerprints” shape what platforms believe about us — and what happens when they get it wrong?Support for The Bid Picture Podcast comes from Uncommon Goods, an online marketplace filled with unique, independently made gifts. From clever gadgets to handcrafted home goods, Uncommon Goods helps you find something thoughtful for everyone on your list. Learn more at uncommongoods.com.Support for The Bid Picture Podcast comes from GymShark, performance apparel designed for people who take their training seriously. With gym-ready fits that move with you, GymShark helps you stay focused from warm-up to cooldown. Explore their latest drops at gymshark.com.Support for The Bid Picture Podcast comes from Skylight Calendar—the family-friendly digital calendar that helps everyone stay on the same page. With a quick setup and an easy-to-read display in a shared space, Skylight makes it simple to keep track of school events, practices, appointments, and family plans—so mornings run smoother and everyone knows what's next. Make your home the place where schedules finally make sense. Skylight Calendar—because family life works better when it's shared. Learn more at myskylight.com.Support the show

    The CyberWire
    Beyond cyber: Securing the next horizon. [Special Edition]

    The CyberWire

    Play Episode Listen Later Dec 26, 2025 60:13


    While our team is out on winter break, please enjoy this Special Edition episode. Cybersecurity is no longer confined to the digital world or just a technical challenge, it's a global imperative. The ⁠NightDragon Innovation Summit⁠ convened a group of industry leaders to discuss how public and private entities can work together to address emerging threats and harness the power of AI, cybersecurity, and innovation to strengthen national defense. In this special edition podcast, we capture a glimpse into the knowledge and expertise shared at the NightDragon Innovation Summit. We are joined by ⁠NightDragon⁠ Founder and CEO ⁠Dave DeWalt⁠, ⁠DataBee⁠ CEO ⁠Nicole Bucala⁠, ⁠Liberty Mutual Insurance⁠ EVP and CISO ⁠Katie Jenkins⁠, Sophos CEO ⁠Joe Levy⁠, and ⁠Dataminr⁠ VP of Sales Engineering ⁠Michael Mastrole⁠. Learn more about your ad choices. Visit megaphone.fm/adchoices