Podcasts about cybersecurity

The protection of computer systems from theft or damage

  • 11,488PODCASTS
  • 64,109EPISODES
  • 30mAVG DURATION
  • 10+DAILY NEW EPISODES
  • Dec 30, 2025LATEST
cybersecurity

POPULARITY

20192020202120222023202420252026

Categories




    Best podcasts about cybersecurity

    Show all podcasts related to cybersecurity

    Latest podcast episodes about cybersecurity

    The CyberWire
    The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report [Microsoft Threat Intelligence Podcast]

    The CyberWire

    Play Episode Listen Later Dec 30, 2025 47:29


    While our team is out on winter break, please enjoy this episode of The Microsoft Threat Intelligence Podcast from our partners at Microsoft. In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a comprehensive look at how the cyber threat landscape is accelerating through AI, automation, and industrialized criminal networks.  They explore how nation-state operations and cybercrime have fused into a continuous cycle of attack and adaptation, with actors sharing tooling, infrastructure, and even business models. The conversation also examines AI's growing impact, from deepfakes and influence operations to the defensive promise of AI-powered detection, and how identity compromise has become the front door to most intrusions, accounting for over 99% of observed attacks.  Listeners will gain perspective on:  How AI is shaping both attacker tradecraft and defensive response.  Why identity remains the cornerstone of global cyber risk.  What Microsoft's telemetry—spanning 600 million daily attacks—reveals about emerging threats and evolving defender strategies.  Questions explored:  How are threat actors using AI to scale deception and influence operations?  What does industrialized cybercrime mean for organizations trying to defend at scale?  How can defenders harness AI responsibly without overreliance or exposure?    Resources:   Download the report and executive summary  Register for Microsoft Ignite  View Chloé Messdaghi on LinkedIn  View Crane Hassold on LinkedIn  View Sherrod DeGrippo on LinkedIn   Related Microsoft Podcasts:                    Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast  Uncovering Hidden Risks        Discover and follow other Microsoft podcasts at microsoft.com/podcasts     Get the latest threat intelligence insights and guidance at Microsoft Security Insider    The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  Learn more about your ad choices. Visit megaphone.fm/adchoices

    HRM-Podcast
    Cybersecurity ist Chefsache: Ausbildung in der Cybersecurity: Wege, Stolpersteine und Chancen

    HRM-Podcast

    Play Episode Listen Later Dec 29, 2025 47:35


    In dieser Folge von „Cyber Security ist Chefsache“ spricht Nico mit Ralf Kleinfeld, Division Manager Information Governance bei OTTO und Vorstandsmitglied der CISO Alliance, über das zentrals Thema Cybersecurity-Ausbildung in Deutschland.Ralf erklärt, warum die klassischen Ausbildungswege heute oft zu unübersichtlich sind und kaum junge Talente frühzeitig für Security begeistern. Er beschreibt, wie vielfältig die heutigen Studien- und Ausbildungswege im IT-Bereich geworden sind und wie wichtig es ist, Cybersecurity als echten Berufsweg sichtbar zu machen – sowohl für Schulabgänger als auch für Quereinsteiger.Ein zentraler Punkt ist, dass keine Ausbildung allein alle Kompetenzen vermitteln kann. Neben technischem Wissen gehören auch Kommunikation, Empathie und Resilienz zu den Fähigkeiten, die Sicherheitsexperten wirklich brauchen. Ralf betont, dass Unternehmen und Ausbilder mehr Praxis-Bezug schaffen sollten – etwa durch duale Ausbildungsplätze mit Cybersecurity-Stationen im Betrieb.Im Gespräch geht es außerdem um:• Die Notwendigkeit eines sichtbaren Ausbildungsberufs im Bereich Cybersecurity• Herausforderungen beim Einführen neuer Ausbildungswege in Deutschland• Die Bedeutung von Mentorship und Praxiswissen• Wie junge Menschen motiviert werden können, früh in die Cyberwelt einzusteigen• Unterschiede zwischen technischen und nicht-technischen Rollen in der SecurityRalf und Nico geben praktische Einblicke, wie Unternehmen und Ausbildungsinstitutionen gemeinsam Talente fördern können und warum Cybersecurity kein einmaliges Projekt, sondern ein kontinuierlicher Entwicklungsprozess ist.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Sunday, December 28th, 2025: MongoDB Unauthenticated Memory Leak CVE-2025-14847

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Dec 28, 2025 5:50


    MongoDB Unauthenticated Attacker Sensitive Memory Leak CVE-2025-14847 Over the Christmas holiday, MongoDB patched a sensitive memory leak vulnerability that is now actively being exploited https://www.mongodb.com/community/forums/t/important-mongodb-patch-available/332977 https://github.com/mongodb/mongo/commit/505b660a14698bd2b5233bd94da3917b585c5728 https://www.ox.security/blog/attackers-could-exploit-zlib-to-exfiltrate-data-cve-2025-14847/ https://github.com/joe-desimone/mongobleed/

    The Bid Picture - Cybersecurity & Intelligence Analysis
    436. "...against all enemies, foreign and domestic."

    The Bid Picture - Cybersecurity & Intelligence Analysis

    Play Episode Listen Later Dec 28, 2025 31:21


    Send Bidemi a Text Message!In this episode, host Bidemi Ologunde takes you from a single, unforgettable line in the U.S. military oath: "against all enemies, foreign and domestic," to a hotel-room phone call that ended with two words: "stand by." What follows is a first-person journey into intelligence analysis operations across military installations in [redacted] and [redacted], and a front-row view of how surveillance technology has evolved since 2016. How do phones, IP addresses, and device “fingerprints” shape what platforms believe about us — and what happens when they get it wrong?Support for The Bid Picture Podcast comes from Uncommon Goods, an online marketplace filled with unique, independently made gifts. From clever gadgets to handcrafted home goods, Uncommon Goods helps you find something thoughtful for everyone on your list. Learn more at uncommongoods.com.Support for The Bid Picture Podcast comes from GymShark, performance apparel designed for people who take their training seriously. With gym-ready fits that move with you, GymShark helps you stay focused from warm-up to cooldown. Explore their latest drops at gymshark.com.Support for The Bid Picture Podcast comes from Skylight Calendar—the family-friendly digital calendar that helps everyone stay on the same page. With a quick setup and an easy-to-read display in a shared space, Skylight makes it simple to keep track of school events, practices, appointments, and family plans—so mornings run smoother and everyone knows what's next. Make your home the place where schedules finally make sense. Skylight Calendar—because family life works better when it's shared. Learn more at myskylight.com.Support the show

    Podcasts – TechSpective
    Shadow AI, Cybersecurity, and the Evolving Threat Landscape

    Podcasts – TechSpective

    Play Episode Listen Later Dec 28, 2025 58:10


    The cybersecurity landscape never sits still—and neither do the conversations I aim to have on the TechSpective Podcast. In the latest episode, I sit down with Etay Maor, Chief Security Strategist at Cato Networks and a founding member of Cato […] The post Shadow AI, Cybersecurity, and the Evolving Threat Landscape appeared first on TechSpective.

    @BEERISAC: CPS/ICS Security Podcast Playlist
    The Hidden Reason Most Manufacturing Cybersecurity Programs Fail

    @BEERISAC: CPS/ICS Security Podcast Playlist

    Play Episode Listen Later Dec 27, 2025 30:59


    Podcast: Industrial Cybersecurity InsiderEpisode: The Hidden Reason Most Manufacturing Cybersecurity Programs FailPub date: 2025-12-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with cybersecurity expert Wil Klusovsky to discuss the massive gap between IT security practices and OT reality. With 26 years of experience, Wil shares his unconventional journey into operational technology and reveals why most security tools end up as shelfware on plant floors.They dive deep into the communication breakdown between CISOs and plant operations, the critical role of system integrators and OEMs that IT leaders often ignore, and why the "air gap" myth continues to put manufacturing facilities at risk.Wil breaks down his framework for speaking to boards in language they understand, emphasizing business impact over technical jargon. The conversation covers everything from the challenges of MFA implementation in OT environments to why patching isn't always the answer. They discuss how organizations can build effective OT security programs by making cybersecurity everyone's responsibility - not just IT's problem.Chapters:(00:00:00) - Opening: The $50K Security Investment That Nobody Uses(00:01:00) - Will's Unconventional Journey Into OT Cybersecurity(00:03:45) - The Communication Gap Between IT and OT Teams(00:07:15) - Why Asset Visibility Tools Miss 135% of Your Equipment(00:10:30) - Speaking Board Language: Revenue Loss vs. Technical Jargon(00:13:25) - The Missing Third Leg: System Integrators and OEMs(00:17:30) - Making Cybersecurity Everyone's Job, Not Just IT's Problem(00:21:15) - Why Patching Isn't Always the Answer in OT Environments(00:25:45) - The Reality Check: Physical Security in Manufacturing Plants(00:28:30) - Building a Cybersecurity Program as a Journey, Not a DestinationLinks And Resources:Wil Online LinktreeWil Klusovsky on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    The CyberWire
    Beyond cyber: Securing the next horizon. [Special Edition]

    The CyberWire

    Play Episode Listen Later Dec 26, 2025 60:13


    While our team is out on winter break, please enjoy this Special Edition episode. Cybersecurity is no longer confined to the digital world or just a technical challenge, it's a global imperative. The ⁠NightDragon Innovation Summit⁠ convened a group of industry leaders to discuss how public and private entities can work together to address emerging threats and harness the power of AI, cybersecurity, and innovation to strengthen national defense. In this special edition podcast, we capture a glimpse into the knowledge and expertise shared at the NightDragon Innovation Summit. We are joined by ⁠NightDragon⁠ Founder and CEO ⁠Dave DeWalt⁠, ⁠DataBee⁠ CEO ⁠Nicole Bucala⁠, ⁠Liberty Mutual Insurance⁠ EVP and CISO ⁠Katie Jenkins⁠, Sophos CEO ⁠Joe Levy⁠, and ⁠Dataminr⁠ VP of Sales Engineering ⁠Michael Mastrole⁠. Learn more about your ad choices. Visit megaphone.fm/adchoices

    Business of Tech
    MSP Cybersecurity: Exploring Digital Identity and Misinformation in Tech Thrillers with Robbie Bach

    Business of Tech

    Play Episode Listen Later Dec 26, 2025 19:58


    Robbie Bach, former president of Microsoft's Entertainment and Devices Division, discusses his transition from technology executive to author of political techno-thrillers, focusing on his latest book, The Blockchain Syndicate. The narrative explores themes of digital identity, misinformation, and the vulnerabilities of modern institutions, emphasizing that technology itself is neutral; it can be used for both beneficial and harmful purposes. Bach highlights the character of Tamika Smith, a military veteran, as a lens through which to examine leadership in a complex landscape of technology and public trust.Bach elaborates on the psychological and technical aspects of his story, particularly the implications of digital identity and authenticity. He notes that the plot involves a blackmail scenario linked to a character presumed dead, raising questions about the authenticity of digital communications. This reflects broader concerns about cybersecurity, where vulnerabilities are often exploited rather than created anew. Bach emphasizes the importance of grounding his narrative in real-world technology and experiences, blending factual research with creative storytelling.The conversation also touches on the governance of technology, critiquing current regulatory approaches that tend to be reactive rather than proactive. Bach argues that effective governance requires forward-thinking leadership capable of anticipating future challenges, particularly in areas like AI and blockchain. He stresses the need for businesses, including small and medium-sized enterprises, to engage with these issues beyond mere compliance, advocating for a broader sense of responsibility that includes stakeholder value.For Managed Service Providers (MSPs) and IT service leaders, Bach's insights underscore the critical role they play in navigating the complexities of technology governance and cybersecurity. By understanding the vulnerabilities inherent in digital systems and advocating for responsible practices, MSPs can better support their clients in mitigating risks associated with misinformation and identity fraud. The episode serves as a reminder of the importance of ethical considerations in technology deployment and the need for proactive engagement in shaping a secure digital future.

    Security Conversations
    Quiet Wins, Loud Failures: A Year-End Cybersecurity Reckoning

    Security Conversations

    Play Episode Listen Later Dec 26, 2025 199:04


    (Presented by ThreatLocker (https://threatlocker.com/threebuddyproblem): Allow what you need. Block everything else by default, including ransomware and rogue code.) Three Buddy Problem - Episode 78: We close out the year with a no-budget, no-permission awards show, spotlighting the cybersecurity stories that actually mattered. Plus, a bizarre polygraph scandal at CISA, Chinese APT research dumps, ransomware pre-notification hiccups, foreign drone bans, and the growing gap between cyber theater and real operational value. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonStop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    @BEERISAC: CPS/ICS Security Podcast Playlist
    Legacy Tech, AI Hype & Cyber Risk: What IT and OT Leaders Must Get Right

    @BEERISAC: CPS/ICS Security Podcast Playlist

    Play Episode Listen Later Dec 26, 2025 53:02


    Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Legacy Tech, AI Hype & Cyber Risk: What IT and OT Leaders Must Get RightPub date: 2025-12-22Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAI promises transformation - but legacy technology, process gaps, and cyber risk often stand in the way. In this episode of Protect It All, host Aaron Crow sits down with veteran IT and cybersecurity leader Neil D. Morris, who brings over 30 years of experience across aerospace, defense, and energy sectors. Together, they cut through the hype to explore what really matters when modernizing technology and managing cyber risk in complex, real-world environments. Neil shares candid insights on why legacy systems still power critical operations, why replacing them isn't as simple as it sounds, and how organizations can unlock real value from AI without increasing risk. The conversation dives into tech debt, regulation, ROI, and the often-overlooked role of process in successful transformation. You'll learn: Why legacy systems aren't going away anytime soon The hidden risks of chasing AI without strong foundations How to balance security, usability, and business value Why process and governance matter more than tools How IT leaders can communicate cyber and AI value in business terms Where AI creates opportunity - and where it creates new attack paths Whether you're leading digital transformation, managing cyber risk, or advising the business on AI adoption, this episode delivers real talk and practical wisdom from the front lines of IT and OT leadership. Tune in to learn how to modernize responsibly, manage risk intelligently, and separate AI reality from hype only on Protect It All. Key Moments:  00:00 "Legacy Tech in Modern Firms" 06:22 "Technology, Change, and Customer Focus" 09:51 "Challenges in Articulating Cybersecurity Value" 12:27 "Tech Solutions Must Drive Value" 15:43 Sell Ideas Beyond the Code 19:03 "Ransomware Risks in Acquisitions" 24:02 Government, Services, and Compliance Debate 25:35 Balancing AI, Cybersecurity, and Regulation 30:33 BlackBerry's Downfall: Ignored Innovation 32:06 "Evolution and Misuse of AI" 34:45 "Opportunity to Lead Change" 37:52 "AI Without Guidance Backfires" 41:07 "AI: Smart but Context-Lacking" 46:45 "AI Empowering Business Transformation" 50:30 "Effortless Tech-Fueled Imitation" About the guest :  Neil D. Morris is a senior enterprise technology leader with 25+ years of experience in digital transformation, cybersecurity, and AI at scale. He currently serves as Head of IT at Redaptive and previously held CIO roles at Ball Aerospace and Maxar Technologies. Neil is known for guiding organizations through complex modernization efforts while balancing security, risk, and business value. How to connect Neil: https://www.linkedin.com/in/neildmorris/ Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast  To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

    Caveat
    Caveat Live: FBI and KU Cybersecurity Conference.

    Caveat

    Play Episode Listen Later Dec 25, 2025 54:53


    While our team is out on winter break, please enjoy this episode of Caveat. We've got something special for you this week! We are excited to share our very first Caveat Live event. Host ⁠Ben Yelin⁠ recently headed to the FBI and KU Cybersecurity Conference at the University of Kansas for a live session of Caveat. During the episode, Ben covered the importance of public/private partnerships with ⁠Dr. Perry Alexander⁠. Ben and Professor ⁠John Symons ⁠spoke about the philosophical issues in AI and how those should impact policy decisions. Be sure to tune in for some great conversations. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney.  Please take a moment to fill out an ⁠audience survey⁠! Let us know how we are doing! Links related to our show this week: ⁠FBI and KU Cybersecurity Conference⁠ ⁠Guest Dr. Perry Alexander, University of Kansas⁠ ⁠Guest John Symons, University of Kansas⁠ ⁠Review Essay: Social and Political Aspects of the Ethics of Artificial Intelligence⁠. Journal of Moral Philosophy Get the weekly Caveat Briefing delivered to your inbox. Like what you heard? Be sure to check out and subscribe to our ⁠Caveat Briefing⁠, a weekly newsletter available exclusively to ⁠N2K Pro⁠ members on ⁠N2K CyberWire's⁠ website. N2K Pro members receive our Thursday wrap-up covering the latest in privacy, policy, and research news, including incidents, techniques, compliance, trends, and more. This week's Caveat Briefing covers the story of the ⁠firing of the NSA Director⁠. Read about the firing as well as the other moves the administration has made to reduce the federal governments cyber defense programs and capabilities. Curious about the details? Head over to the ⁠Caveat Briefing⁠ for the full scoop and additional compelling stories. Got a question you'd like us to answer on our show? You can send your audio file to ⁠caveat@thecyberwire.com⁠. Hope to hear from you. Learn more about your ad choices. Visit megaphone.fm/adchoices

    The Buzz with ACT-IAC
    2025: Year in Review

    The Buzz with ACT-IAC

    Play Episode Listen Later Dec 25, 2025 12:47


    This episode reviews the standout moments in government innovation and leadership from 2025. Key themes include the humanization of technology, the evolution of government contact centers, reimagined leadership in a hybrid world, the integration of AI in procurement, and the future of value creation through digital networks. Discussions highlight the importance of mission-first thinking, leveraging human-first design, embracing networks, and investing in emerging talent.Subscribe on your favorite podcast platform to never miss an episode! For more from ACT-IAC, follow us on LinkedIn or visit http://www.actiac.org.Learn more about membership at https://www.actiac.org/join.Donate to ACT-IAC at https://actiac.org/donate. Intro/Outro Music: See a Brighter Day/Gloria TellsCourtesy of Epidemic Sound(Episodes 1-159: Intro/Outro Music: Focal Point/Young CommunityCourtesy of Epidemic Sound)

    Cyber 9/11 with Dr. Eric Cole
    How AI, Cloud Outages, and Data Protection Will Define Cybersecurity in 2026

    Cyber 9/11 with Dr. Eric Cole

    Play Episode Listen Later Dec 25, 2025 31:07


    As we close out 2025 and prepare for 2026, Dr. Eric Cole breaks down what it truly takes to be a world-class CISO in the year ahead. In this episode of Life of a CISO, Dr. Cole shares hard-earned lessons on leadership, health, resilience, and why taking care of yourself is foundational to protecting your organization. From personal reflection to executive-level strategy, this episode goes far beyond technical controls. Dr. Cole then dives deep into the three forces reshaping cybersecurity in 2026: artificial intelligence, cloud reliability, and ransomware, all centered around one core principle that too many organizations ignore: data protection. You will learn why AI is an augmentation tool, not a replacement for humans, how unrestricted AI use is creating massive new risks, why recent cloud outages are a warning sign for every executive, and how CISOs can regain trust, influence, and a permanent seat at the boardroom table. This episode is essential listening for CISOs, security leaders, executives, and anyone responsible for protecting critical data in an increasingly unstable digital world. Part two of this series continues next week.  

    Unspoken Security
    Can We Social Engineer the Bad Guys to Shut Them Down? (Encore of Ep 32)

    Unspoken Security

    Play Episode Listen Later Dec 25, 2025 66:54 Transcription Available


    In this encore presentation of Unspoken Security Episode 32 (originally published on 3 April 2025), host AJ Nash sits down with Chris Birch, an intelligence practitioner with nearly 30 years of experience, to discuss the ever-evolving landscape of social engineering. Chris's unique perspective comes from leading teams that actively engage with threat actors, turning the tables on those who typically exploit vulnerabilities.Chris details how social engineering is simply human manipulation, a skill honed from birth. He explains how attackers leverage fear and greed, the fastest and cheapest ways to manipulate individuals. He also dives into how attacks have evolved, highlighting the dangers of increasingly sophisticated tactics like deepfakes and the blurring lines between legal and illegal applications of social engineering.The conversation also explores the crucial role of organizational culture in cybersecurity. Chris emphasizes that awareness, not just education, is key to defense. He advocates for sharing threat intelligence widely within organizations and across industries, empowering everyone to become a sensor against social engineering attempts. Chris also shares a surprising personal fear, offering a lighthearted end to a serious discussion.Send us a textSupport the show

    Cybersecurity Where You Are
    Episode 167: Volunteers as a Critical Cybersecurity Resource

    Cybersecurity Where You Are

    Play Episode Listen Later Dec 24, 2025 41:44


    In Episode 167 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager sit down with Kelley Misata, Ph.D., Chief Trailblazer and Founder at Sightline Security. Together, they discuss how volunteers constitute a critical cybersecurity resource for the Center for Internet Security® (CIS®). Along the way, they explore the nature of volunteerism, the role of volunteers at CIS, and how CIS is looking to mature its engagement with volunteers going forward.Here are some highlights from our episode:01:37. Introductions to Kelley and her experience with cybersecurity volunteers03:09. Kelley's use of research, expertise, and an open mind to check in with CIS volunteers04:50. How volunteers have deepened their passion and dedication with CIS for 25 years06:55. Volunteers as a critical cybersecurity resource for "One CIS" going forward10:51. Commitment, conflict resolution, and openness to formal process in CIS Communities14:39. The use of directionality and accolades to encourage different types of contributors19:43. The importance of flexibility in management to meet volunteers where they are20:30. Leadership, storytelling, and recruitment as opportunities for volunteerism at CIS24:37. The risk of volunteer burnout and how to protect against it26:00. Collaboration with employers to treat volunteerism as a growth experience30:09. A balancing act of making volunteers useful without depleting the mission34:51. Sean's take: volunteer management as the original Large Language Model (LLM)38:32. Other observations and final thoughtsResources25 Years of Creating Confidence in the Connected WorldCIS CommunitiesEpisode 160: Championing SME Security with the CIS ControlsStoryCorpsIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

    Cyber Security Headlines
    ServiceNow to acquire cybersecurity startup Armis, MacSync Stealer adopts quieter installation, Nissan customer data stolen in Red Hat raid

    Cyber Security Headlines

    Play Episode Listen Later Dec 24, 2025 6:54


    ServiceNow to acquire cybersecurity startup Armis MacSync Stealer adopts quieter installation Nissan customer data stolen in Red Hat raid Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com.

    Cyber Crime Junkies
    CHAOS | Cybersecurity Predictions You Need to Know NOW

    Cyber Crime Junkies

    Play Episode Listen Later Dec 24, 2025 36:10 Transcription Available


    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonStop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    AI Briefing Room
    EP-438 Servicenow's $7.75b Cybersecurity Dive

    AI Briefing Room

    Play Episode Listen Later Dec 24, 2025 2:31


    i'm wall-e, welcoming you to today's tech briefing for wednesday, december 24th. dive into today's top tech stories: servicenow acquires armis: servicenow boosts its cybersecurity offerings by acquiring armis for $7.75 billion, enhancing its portfolio amid a challenging ipo environment. aflac data breach: aflac confirms a data breach impacting 22.6 million customers, with federal investigations into potential links with the hacking group scattered spider. amazon expands alexa+: amazon integrates alexa+ with platforms like angi and expedia, aiming to streamline user interactions by 2026. fcc bans new foreign-made drones: a ban on new foreign-made drones, impacting dji, is imposed citing national security concerns aligning with efforts to bolster u.s. industry competitiveness. writers sue ai companies: authors, including john carreyrou, sue major ai firms over claims of unauthorized use of their books for ai training, pushing the debate on creative rights vs. technological advancement. that's all for today. we'll see you back here tomorrow!

    Beurswatch | BNR
    Kan Google de bizarre comeback in het AI-gevecht doorzetten?

    Beurswatch | BNR

    Play Episode Listen Later Dec 24, 2025 28:29


    De Grote Tech Show en BNR Beurs slaan de handen ineen. Samen met Joe van Burik kijken we wat je als belegger zeker moet onthouden van het jaar 2025. Dat zat natuurlijk weer vol met de woorden 'Artificial' en 'Intelligence'. Je hoort dan ook van Joe of de piek al bereikt is bij bedrijven als Nvidia, hun klanten, én de klanten van hún klanten. Wie is er nu het beste gepositioneerd om de winsten te gaan pakken, en ook écht geld te gaan verdienen aan al die AI-modellen? En als al die bedrijven datacenters uit de grond stampen, hebben we dan straks ook leegstaande datacenterhallen á la Chinese vastgoedcrisis? Daarnaast hebben we het ook nog over twee techbedrijven die geen AI nodig hebben om de liefde van beleggers te winnen. Netflix doet dat gewoon met een smeuïge overnamedeal. En Nintendo heeft een harde kern met fans die genieten van hun nieuwe spelcomputer. We kijken hoe die twee bedrijven het jaar uit gaan. En Joe denkt dat elektrische autobouwer Rivian nog wel eens voor verbazing kan gaan zorgen.See omnystudio.com/listener for privacy information.

    MSP Unplugged
    Larry Meador and Cavelo: Elevating MSP Channel Success with Cybersecurity Innovation

    MSP Unplugged

    Play Episode Listen Later Dec 24, 2025 35:37


    Discover how industry veteran Larry Meador, Cavelo's new Channel Chief, is transforming the MSP channel. Cavelo empowers Managed Service Providers with a unified Attack Surface Management and Data Security Posture Management platform—offering automated data discovery, classification, vulnerability management, and compliance-ready solutions. Built for MSPs and MSSPs, Cavelo helps partners reduce cyber risk, streamline operations, and deliver scalable, data-first security services that boost profitability and client trust.   Full Video Podcast Link: https://youtu.be/D6xFmrlUXDY --------------------------------------------------- Connect with us! --------------------------------------------------- MSP Unplugged https://mspunplugged.com/ Paco Lebron from ProdigyTeks:Powered by MSP Owners Group Email: paco@mspunplugged.com Rick Smith from Renactus Technology  Email: rick@mspnplugged.com Justin Gilliam from Bacheler Technologies https://www.linkedin.com/in/justin-gilliam-96288a56

    WSJ Tech News Briefing
    TNB Tech Minute: ServiceNow to Acquire Cybersecurity Startup Armis

    WSJ Tech News Briefing

    Play Episode Listen Later Dec 23, 2025 2:54


    Plus: China's BYD logs another month of strong sales growth in Europe. And the U.S. bans new China-made drones. Julie Chang hosts. Learn more about your ad choices. Visit megaphone.fm/adchoices

    Command Control Power: Apple Tech Support & Business Talk
    649: Wired for Success, Concrete Solutions With Andy Espo of Call Andy Consulting

    Command Control Power: Apple Tech Support & Business Talk

    Play Episode Listen Later Dec 23, 2025 55:58


    In this episode of Command Control Power, Andy Espo from Call Andy Mac Consulting joins the discussion once again. The conversation kicks off with humorous banter about appearances and jackets before delving into serious tech talk. Andy shares the complexities of installing and upgrading network infrastructure in high-end residential projects, especially in challenging environments like old houses and concrete structures. He emphasizes the importance of discerning client relationships, meticulous planning, and ensuring proper execution by contractors. Andy also discusses strategies for building trust with clients, effective communication, and the shift towards managed services amid growing cybersecurity concerns. The episode concludes with insights on the importance of networking and building strategic partnerships with clients.   00:00 Introduction and Guest Welcome 00:41 High-End Residential Work 01:55 Challenges in Network Installations 04:47 WiFi Planning and Intuition 09:18 Client Education and Expectations 10:57 Working with Contractors 17:07 Common Wiring Issues 20:35 Ensuring Quality and Client Satisfaction 29:05 The Importance of Redundancy in Wiring 29:27 Challenges with Daisy Chaining and Switches 29:56 The Frustration of Poor Wiring in High-End Homes 31:01 The Impact of Construction Materials on WiFi Performance 32:42 The Shift to Managed Services and Cybersecurity 34:40 The Importance of Cyber Insurance 40:56 Efficiency Loss and Productivity in IT 45:30 The Art of Communicating Value to Clients 50:36 Building Strategic Partnerships 52:42 Conclusion and Final Thoughts

    Boardroom Governance with Evan Epstein
    David Berger: Year-End Reflections on Corporate Governance and the Road Ahead

    Boardroom Governance with Evan Epstein

    Play Episode Listen Later Dec 23, 2025 53:24


    (0:00) Intro(1:31) About the podcast sponsor: The American College of Governance Counsel.(2:18) Start of interview. *Reference to prior episodes with David (E24 from Nov 2020 and E159 from Dec 2024)(3:22) 2025 highlights from the American College of Governance Counsel(4:55) The Rome Conference on AI, Ethics, and the Future of Corporate Governance(6:52) The Dual-Class Share Debate (reference to his paper Performance Leads Governance)(12:06) Emerging Governance Structures in AI companies, including Public Benefit Corporations (PBCs) "mission driven"(23:02) The AI Bubble Debate ("from a technology standpoint, I don't think we're in a bubble. From a valuation standpoint, we may be very well in a bubble.") Reference to my article on AI Washing Goes Criminal.(27:00) Big Tech vs. Little Tech Dynamics "We're going to have, at some point, a shakeout. It's impossible for all of these companies to be successful."(29:55) The Shift to Private Markets(34:15) Delaware's Governance Challenges (*reference to E194 on Silicon Valley 150 Report) "Since TripAdvisor, about 50 companies have left Delaware."(39:45) AI and Cybersecurity in the Boardroom(40:42) On Mandatory Arbitration(42:03) Biggest winner in business in 2025: Tech broadly, Silicon Valley particular.(43:40) Biggest loser in business in 2025: Delaware(45:15) Biggest business surprise in 2025(47:19) Best corporate governance trend from 2025: Renewed and strong focus on ethics.(50:00) Worst corporate governance trend from 2025: Partisanship(50:58) What's the biggest corporate governance trend to watch out for in 2026: the role of politics in the boardroom(51:35) One piece of advice for directors heading into 2026: the role of AI in the boardroom and in the companyDavid Berger is a partner at Wilson Sonsini and the President of the American College of Governance Counsel. You can follow Evan on social media at:X: @evanepsteinLinkedIn: https://www.linkedin.com/in/epsteinevan/ Substack: https://evanepstein.substack.com/__To support this podcast you can join as a subscriber of the Boardroom Governance Newsletter at https://evanepstein.substack.com/__Music/Soundtrack (found via Free Music Archive): Seeing The Future by Dexter Britain is licensed under a Attribution-Noncommercial-Share Alike 3.0 United States License

    To The Point - Cybersecurity
    The Merging Worlds of AI, Cybersecurity, and Physical Threats with David Saunders

    To The Point - Cybersecurity

    Play Episode Listen Later Dec 23, 2025 27:55


    Welcome to another episode of the To the Point Cybersecurity Podcast! This week, hosts Rachael Lyon and Jonathan Knepher are kicking off the holiday season with a fascinating conversation featuring David Saunders, Director of Forcepoint Security Lab and a seasoned cybersecurity professional with more than two decades of experience. The discussion dives into the complex convergence of AI, cyber, and physical security, exploring how the rapid rise of artificial intelligence is reshaping the threat landscape—including emerging trends like attacks on backups, the growing sophistication of phishing campaigns powered by LLMs, and the ongoing challenge of keeping security ahead of attackers' innovation. As the conversation unfolds, listeners will hear candid insights on everything from the future of backup strategies to the evolving tactics used by adversaries—all with actionable takeaways to help organizations and individuals stay a step ahead. So grab your favorite holiday treat and get ready for a timely, thought-provoking look at the forces shaping cybersecurity in 2025 and beyond! For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e364

    Scam Rangers
    Scam Prevention in 2026: Moving from Recommendations to Urgent Execution, A Conversation with Ken Palla, Former Cybersecurity Executive at MUFG Union Bank

    Scam Rangers

    Play Episode Listen Later Dec 23, 2025 53:31


    In the final Scam Rangers episode of 2025, Ayelet Biger-Levin is joined by industry veteran Ken Palla for a deep year-in-review of the global scam prevention landscape.This conversation examines what actually happened in 2025 across regulation, enforcement, and industry action, and why 2026 must move decisively from research and recommendations to urgent execution.From mandatory reimbursement in the UK, to Australia's Scam Prevention Framework, emerging collaboration in Canada, and fragmented efforts in the United States, the episode cuts through policy language to focus on real-world impact.The discussion also outlines concrete actions financial institutions, telcos, and digital platforms can take now to better protect consumers, reduce losses, and treat scams as the organized crime and national security threat they are.This episode closes the year with a clear message. The research is done. The problem is understood. Now the industry must act.Topics Covered What 2025 revealed about the effectiveness of global scam regulation Where reimbursement models succeed and where they fall short Australia, the UK, Canada, and the US, lessons from different approaches Why execution, not new task forces or studies, is the real gap Urgent actions banks can take to prevent scams before money moves The role of telcos and digital platforms in stopping scams upstream Government, law enforcement, and the need for coordinated leadership Why 2026 must be treated as a year of action Guest :Ken PallaFormer cybersecurity executive at MUFG Union Bank, longtime industry advisor, and recipient of the Legends of Fraud Award. Ken has spent decades focused on online security, fraud prevention, and consumer protection, and is a leading voice on scam regulation and industry accountability. You can find Ken on LinkedIn: https://www.linkedin.com/in/ken-palla-09b585/Australian Scam Prevention Framework – Analysis of the November 2025 Treasury Consultancy https://www.gasa.org/post/assessment-of-the-november-2025-australian-treasury-scam-prevention-framework-consultancy

    Cybercrime Magazine Podcast
    Microsoft on Women In Cybersecurity at Black Hat Europe 2025 with Alex Zoldova.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Dec 23, 2025 3:50


    Cybercrime Magazine met with Alex Zoldova, Board Member, Women In Cybersecurity at Microsoft when we were at Black Hat Europe 2025 in London. She spoke with us about the state of women in cybersecurity today, as well as the value of mentoring, the imperative to increase STEM education opportunities for young people, and more. Connect with Alex Zoldova on LinkedIn at https://www.linkedin.com/in/hacker-z-35aa92a7. For more of our media, and more coverage from Black Hat Europe 2025, visit our website at https://CybersecurityVentures.com.

    Cybercrime Magazine Podcast
    Black Hat Europe 2025. Cybercrime & Cybersecurity: The European Perspective.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Dec 23, 2025 4:42


    Cybercrime Magazine was a media partner at Black Hat Europe 2025, marking a new chapter for our reporting. Conversations centered around familiar topics – including ransomware, artificial intelligence, and cloud security – but being on location in Europe, there was one unavoidable question: how do today's cybersecurity challenges look from a European perspective? For more of our media, and more coverage from Black Hat Europe 2025, visit our website at https://CybersecurityVentures.com.

    Cybercrime Magazine Podcast
    Cybercrime Wire For Dec. 23, 2025. Spotify Music Library Scraped By Cyber Pirate. WCYB Digital Radio

    Cybercrime Magazine Podcast

    Play Episode Listen Later Dec 23, 2025 1:25


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    Automation World Gets Your Questions Answered
    Why Manufacturers Can't Delay Industrial Cybersecurity

    Automation World Gets Your Questions Answered

    Play Episode Listen Later Dec 23, 2025 13:15


    A look at how manufacturers are fighting ransomware and supply chain threats with AI-powered defenses, OT-IT collaboration, and new industrial cybersecurity technologies. Access the source documents for this podcast by visiting this podcast on the Automation Word site at https://www.automationworld.com/55338375

    Speak Like a Leader
    Confessions of a Hacker with Jeremiah Baker

    Speak Like a Leader

    Play Episode Listen Later Dec 23, 2025 50:14


    In this episode, we cover:✅ How Jeremiah went from bootstrapping websites during the dot-com boom to building a global cybersecurity business.✅ Why most cybercrime isn't about “hacking systems,” it's about hacking humans.✅ The emotional tricks scammers use, and how to spot them before you get duped.✅ Real-world stories of cybercrime that cost companies hundreds of thousands of dollars in seconds.✅ The single most important (and shockingly simple) thing you can do to protect yourself today. Jeremiah also shares powerful insights from his keynote, Confessions of a Hacker, including why it's often too late once the money is gone, and how you can take smart, preventative action without expensive software or technical know-how. 

    NZ Tech Podcast
    2025 in Review: Autonomy, Cybersecurity, AI and Startups - with Ben O'Brien

    NZ Tech Podcast

    Play Episode Listen Later Dec 23, 2025 50:45


    Hear from Paul Spain and Ben O'Brien as they unpack the latest tech news including NZ Police's redaction glitch, a new Government Digital Delivery Agency, smart TV privacy concerns, James Powell's transition from Dawn Aerospace and Waymo's outage pause and the future of autonomous vehicles. Plus, Ben O'Brien shares insights from his upcoming book for founders. A must-listen for tech enthusiasts and entrepreneurs!We'd love to get your feedback, please fill in our short survey and go into the draw for some great tech giveaways. Audience Survey - December 2025 - NZ Tech PodcastThanks to our Partners One NZ, Workday, 2degrees, HP, Spark and Gorilla Technology

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonStop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    The Other Side Of The Firewall
    From Air Force Technology to Cyber CEO: Lessons in Risk, AI, and Leadership Ft. Ahmad Austin

    The Other Side Of The Firewall

    Play Episode Listen Later Dec 23, 2025 41:51


    On this week's Ask a CISSP special episode of The Other Side of the Firewall, I talk with Air Force veteran and cybersecurity leader Ahmad Rashaan Austin about his journey from zero computer skills to founder of Cy3 Security, LLC. We explore risk management, responsible AI adoption, leadership communication, and his new book, The Boundaryless Enterprise. If you're building a cyber career or leading tech teams, this episode delivers actionable insights straight from the front lines. Check it out on your favorite podcast platform! Buy Ahmad R. Austin's The Boundaryless Enterprise: Redesigning Oversight for the Age of Intelligent Systems https://a.co/d/dfCToig Please LISTEN

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Dec 22, 2025 6:00


    DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. But an attacker must be on the same network. https://www.freebsd.org/security/advisories/FreeBSD-SA-25:12.rtsold.asc NIST Time Server Problems The atomic ensemble time scale at the NIST Boulder campus has failed due to a prolonged utility power outage. One impact is that the Boulder Internet Time Services no longer have an accurate time reference. https://tf.nist.gov/tf-cgi/servers.cgi https://groups.google.com/a/list.nist.gov/g/internet-time-service/c/o0dDDcr1a8I

    Paul's Security Weekly
    Internal threats are the hole in Cybersecurity's donut - Frank Vukovits - ESW #438

    Paul's Security Weekly

    Play Episode Listen Later Dec 22, 2025 117:05


    Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There's a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn't infringe on any individual organization's privacy. That's why we hear the industry discuss external threats more, though internally-triggered incidents far outnumber external ones. Internal threats, on the other hand, can get personal. Accidental leaks are embarassing. Malicious insiders are a sensitive topic that internal counsel would erase from company memory if they could. Even when disclosure is required, the lawyers are going to minimize the amount of detail that gets out. I was chief incident handler for 5 years of my enterprise career, and never once had to deal with an external threat. I managed dozens of internal cases over those 5 years though. In this interview, we discuss the need for strong internal controls with Frank Vukovits from Delinea. As systems and users inside and outside organizations become increasingly connected, maintaining strong security controls is essential to protect data and systems from both internal and external threats. In this episode, we will explore the importance of strong internal controls around business application security and how they can best be integrated into a broader security program to ensure true enterprise security. This segment is sponsored by Delinea. Visit https://securityweekly.com/delinea to learn more about them! Topic Segment: Personal Disaster Recovery Many of us depend on service providers for our personal email, file storage, and photo storage. The line between personal accounts and work accounts often blur, particularly when it comes to Apple devices. We're way more dependent on our Microsoft, Apple, Meta, and Google accounts than we used to be. They're necessary to use home voice assistants, to log into other SaaS applications (Log in with Google/Apple/FB), and even manage our wireless plans (e.g. Google Fi). Getting locked out of any of these accounts can bring someone's personal and/or work life to a halt, and there are many cases of this happening. I'm not sure if we make it past sharing stories about what can and has happened. Getting into solutions might have to be a separate discussion (also, we may not have any solutions…) Friend of the show and sometimes emergency co-host Guillaume posted about this recently A romance author got locked out of her books A 79 year old got locked out of her iPad with all her family photos. Sadly, this is one of the most common scenarios. Someone either forgets their pin and locks out the device permanently, or a family member dies and didn't tell anyone their passwords or pins, so the surviving family can't access data, pay the bills, etc. Google example: Claims of CSAM material after father documents toddler at doctor's request https://www.theguardian.com/technology/2022/aug/22/google-csam-account-blocked Dec 2025 Apple example: she tried to redeem a gift card that had been tampered with: https://hey.paris/posts/appleid/ Google example: developer lost all his work, because he was working on preventing revenge porn and other sensitive cases, and was building a better model to detect NSFW images: https://medium.com/@russoatlarge_93541/i-built-a-privacy-app-google-banned-me-over-a-dataset-used-in-ai-research-66bc0dfb2310 My partner's mom's Instagram account got hacked. Meta locked out all of it (Whatsapp, Instagram, Facebook) and she couldn't get it reinstated. They wouldn't even let her open a NEW account. Weekly Enterprise News Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-438

    The Cybersecurity Defenders Podcast
    #279 - 2025 Predictions for the Future of Cybersecurity with all our guests

    The Cybersecurity Defenders Podcast

    Play Episode Listen Later Dec 22, 2025 55:55


    On this episode of The Cybersecurity Defenders Podcast, we revisit the 2025 predictions shared by our guests throughout the year. From attackers and defenders to AI and the broader security industry, these forecasts capture what experts expected was coming next. Rather than judging accuracy - which is still too early to assess -we're examining the predictions themselves: where they aligned, how they clustered, and what those patterns reveal about the industry's mindset as this year came to a close. Free from hindsight bias, this episode explores what remained uncertain as we entered 2026.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.

    Cyber Security Today
    Arrests In 0365 Scheme: Cybersecurity Today With David Shipley

    Cyber Security Today

    Play Episode Listen Later Dec 22, 2025 13:09


    Global Cybercrime Crackdowns and Rising Threats This episode of 'Cybersecurity Today' hosted by David Shipley covers significant cybersecurity news. Nigerian police arrested three suspects linked to a Microsoft 365 phishing platform known as Raccoon O365. U.S. prosecutors charged 54 individuals in an ATM malware scheme tied to a Venezuelan criminal organization. Two incident responders pleaded guilty to conducting ransomware attacks while employed to help victims of such attacks. Denmark officially blamed Russia for a cyber attack on a water utility, exacerbating geopolitical tensions. Each segment highlights the intricate and international nature of modern cybercrime and the ongoing challenges in cybersecurity. 00:00 Introduction and Sponsor Message 00:20 Nigerian Police Arrest Phishing Suspects 03:28 US ATM Malware Scheme Uncovered 05:46 Insider Ransomware Attackers Plead Guilty 08:21 Denmark Blames Russia for Cyber Attack 11:08 Conclusion and Holiday Wishes 12:20 Sponsor Message and Closing

    That Real Blind Tech Show
    Episode 193 - A Conversation with Dr. Kirk Adams: Talking Careers, Leadership, and Cyber Security

    That Real Blind Tech Show

    Play Episode Listen Later Dec 22, 2025 53:05


    It's an all new That Real Blind Tech show as Brian is joined by Dr. Kirk Adams to discuss Kirk's background, the state of accessibility, employment, and Kirk's Cyber security training program.   Brian kicks the interview off getting Kirk's opinion about the state of accessibility as 2025 comes to an end.   We then discuss some of Kirk's career highlights.   This rolls us in to discussing the still staggering unemployment rate of the blind, and raises the question of how important is braille in 2025.   Next we discuss Kirk's consulting business Innovative Impact. Kirk then tells us about the Apex Program.   We then discuss the failure of some blind organizations promoting blind individuals to the executive level.   And finally we dive in to some career advice for those blind students out there and what they may want to think about as far as career paths.   You can reach out to Dr. Kirk Adams on Linkedin.   To contact That Real Blind Tech Show, you can email us at ThatRealBlindTechShow@gmail.com, join our Facebook Group That Real Blind Tech Show, join us on the Twitter @BlindTechShow , or leave us an old school phone message at 929-367-1005.    

    Backup Central's Restore it All
    Building Your Cyber Security Team: Blue Teams, Red Teams, and Cyber Insurance

    Backup Central's Restore it All

    Play Episode Listen Later Dec 22, 2025 31:09 Transcription Available


    Building a cyber security team isn't optional anymore; it's the difference between recovering from ransomware and going out of business. In this episode, Curtis and Prasanna explain why hardening your backup infrastructure is only half the battle. You need professionals who know how to configure XDR systems without drowning you in false positives, blue teams to defend your environment, and red teams to test whether your defenses actually work. They cover the role of MSSPs, incident response planning, cyber insurance requirements, and why attempting ransomware response on your own is like those old TV warnings: "Don't try this at home." If you've been following their series on backup basics and system hardening, this episode ties it all together with the human element that makes or breaks your recovery plan.

    Enterprise Security Weekly (Audio)
    Internal threats are the hole in Cybersecurity's donut - Frank Vukovits - ESW #438

    Enterprise Security Weekly (Audio)

    Play Episode Listen Later Dec 22, 2025 117:05


    Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There's a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn't infringe on any individual organization's privacy. That's why we hear the industry discuss external threats more, though internally-triggered incidents far outnumber external ones. Internal threats, on the other hand, can get personal. Accidental leaks are embarassing. Malicious insiders are a sensitive topic that internal counsel would erase from company memory if they could. Even when disclosure is required, the lawyers are going to minimize the amount of detail that gets out. I was chief incident handler for 5 years of my enterprise career, and never once had to deal with an external threat. I managed dozens of internal cases over those 5 years though. In this interview, we discuss the need for strong internal controls with Frank Vukovits from Delinea. As systems and users inside and outside organizations become increasingly connected, maintaining strong security controls is essential to protect data and systems from both internal and external threats. In this episode, we will explore the importance of strong internal controls around business application security and how they can best be integrated into a broader security program to ensure true enterprise security. This segment is sponsored by Delinea. Visit https://securityweekly.com/delinea to learn more about them! Topic Segment: Personal Disaster Recovery Many of us depend on service providers for our personal email, file storage, and photo storage. The line between personal accounts and work accounts often blur, particularly when it comes to Apple devices. We're way more dependent on our Microsoft, Apple, Meta, and Google accounts than we used to be. They're necessary to use home voice assistants, to log into other SaaS applications (Log in with Google/Apple/FB), and even manage our wireless plans (e.g. Google Fi). Getting locked out of any of these accounts can bring someone's personal and/or work life to a halt, and there are many cases of this happening. I'm not sure if we make it past sharing stories about what can and has happened. Getting into solutions might have to be a separate discussion (also, we may not have any solutions…) Friend of the show and sometimes emergency co-host Guillaume posted about this recently A romance author got locked out of her books A 79 year old got locked out of her iPad with all her family photos. Sadly, this is one of the most common scenarios. Someone either forgets their pin and locks out the device permanently, or a family member dies and didn't tell anyone their passwords or pins, so the surviving family can't access data, pay the bills, etc. Google example: Claims of CSAM material after father documents toddler at doctor's request https://www.theguardian.com/technology/2022/aug/22/google-csam-account-blocked Dec 2025 Apple example: she tried to redeem a gift card that had been tampered with: https://hey.paris/posts/appleid/ Google example: developer lost all his work, because he was working on preventing revenge porn and other sensitive cases, and was building a better model to detect NSFW images: https://medium.com/@russoatlarge_93541/i-built-a-privacy-app-google-banned-me-over-a-dataset-used-in-ai-research-66bc0dfb2310 My partner's mom's Instagram account got hacked. Meta locked out all of it (Whatsapp, Instagram, Facebook) and she couldn't get it reinstated. They wouldn't even let her open a NEW account. Weekly Enterprise News Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-438

    Cybercrime Magazine Podcast
    Cyber Social. Women In Cybersecurity On X. Taylor Fox, Cybercrime Magazine.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Dec 22, 2025 2:08


    @WomenKnowCyber on X, curated by Cybercrime Magazine Media Coordinator Taylor Fox, is chock full of inspiring stories, people, and resources. In this episode, Fox joins host Amanda Glassner to discuss why it's important to elevate women in cybersecurity, how the daily stories are chosen, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com.

    Cybercrime Magazine Podcast
    The Power of Threat Intelligence. Brand Protection In Cybersecurity. Ahmad Halabi, Resecurity.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Dec 22, 2025 10:43


    Ahmad Halabi is the managing director at Resecurity. In this episode, he joins host Scott Schober to discuss brand protection in cybersecurity and why it is important for organizations today, as well as what types of threats can impact brands, look-alike domains, and more. The Power of Threat Intelligence, a Cybercrime Magazine podcast series brought to you by Resecurity, which offers real-time threat monitoring, dark web surveillance, and predictive analytics to identify risks before digital threat actors victimize your company and customers, ensuring your business remains secure. To learn more about our sponsor, visit https://resecurity.com

    Cybercrime Magazine Podcast
    Cybercrime Wire For Dec. 22, 2025. Ransomware Attack Strikes NetStar Australia. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Dec 22, 2025 1:21


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    The Shared Security Show
    Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting

    The Shared Security Show

    Play Episode Listen Later Dec 22, 2025 12:42


    In this episode, Tom Eston discusses the unique challenges in the current cybersecurity job market, emphasizing the importance of networking. Tom provides practical tips on how to enhance networking skills, such as attending conferences, volunteering for open source projects, creating a blog, and seeking mentors. He also addresses misconceptions about the job shortage in cybersecurity and encourages listeners to start building their professional networks early. Tune in for valuable insights to help you advance your cybersecurity career. ** Links mentioned on the show ** Connect with Tom on LinkedIn https://www.linkedin.com/in/tomeston/ ** Watch this episode on YouTube ** https://youtu.be/tC_LqtdW4V0 ** Become a Shared Security Supporter ** Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Become a supporter today! https://patreon.com/SharedSecurity ** Thank you to our sponsors! ** SLNT Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”. Click Armor To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor's gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity ** Subscribe and follow the podcast ** Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social Follow us on Mastodon: https://infosec.exchange/@sharedsecurity Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/ Visit our website: https://sharedsecurity.net Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe Leave us a rating and review: https://ratethispodcast.com/sharedsecurity Contact us: https://sharedsecurity.net/contact The post Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting appeared first on Shared Security Podcast.

    Stanford Legal
    Best of Stanford Legal: Suing DOGE

    Stanford Legal

    Play Episode Listen Later Dec 22, 2025 28:38


    A coalition of privacy defenders led by Lex Lumina and the Electronic Frontier Foundation filed a lawsuit on February 11 asking a federal court to stop the U.S. Office of Personnel Management (OPM) from disclosing millions of Americans' private, sensitive information to Elon Musk and his “Department of Government Efficiency” (DOGE). As the federal government is the nation's largest employer, the records held by OPM represent one of the largest collections of sensitive personal data in the country.Is this a big deal? Should we care? Joining Pam today is Stanford Law Professor Mark Lemley, an expert in intellectual property, patent law, trademark law, antitrust, the law of robotics and AI, video game law, and remedies. Lemley is of counsel with the law firm Lex Lumina and closely involved in the DOGE case. In this episode, Lemley overviews urgent privacy concerns that led to this lawsuit, laws such as the Privacy Act, and legal next steps for this case. The conversation shifts to the current political landscape, highlighting the unprecedented influence of Silicon Valley, particularly under the Musk administration. Lemley contrasts the agile, authoritative management style of Silicon Valley billionaires with the traditionally slow-moving federal bureaucracy, raising concerns about legality and procedural adherence. The conversation also touches on the demise of the Chevron doctrine and the possible rise of an imperial presidency, drawing parallels between the Supreme Court's and the executive branch's power grabs—and how Lemley's 2022 paper, "The Imperial Supreme Court," predicted the Court's trend towards consolidating power. This episode offers a compelling examination of how technological and corporate ideologies are influencing American law.Links:Mark Lemley >>> Stanford Law page“The Imperial Supreme Court” >>> Stanford Law publication pageConnect:Episode Transcripts >>> Stanford Legal Podcast WebsiteStanford Legal Podcast >>> LinkedIn PageRich Ford >>>  Twitter/XPam Karlan >>> Stanford Law School PageStanford Law School >>> Twitter/XStanford Lawyer Magazine >>> Twitter/X(00:00:00) The Rise of Executive Power(00:07:22) Concerns About Data Handling and Privacy(00:08:41) The Impact of Silicon Valley's Ethos on Government(00:14:01) The Musk Administration's Approach(00:18:01) The Role of the Supreme Court(00:24:43) Silicon Valley's Influence on Washington Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Dec 19, 2025 4:37


    Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn t quite clean for ISC, but SSL2 and SSL3 systems have been cut down by about half. https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ranges%20from%20the%20year%202025/32584 Hewlett-Packard Enterprise OneView Software, Remote Code Execution HPs OneView Software allows for unauthenticated code execution https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04985en_us&docLocale=en_US#vulnerability-summary-1 Trufflehog Detecting JWTs with Public Keys Trufflehog added the ability to detect JWT tokens and validate them using public keys. https://trufflesecurity.com/blog/trufflehog-now-detects-jwts-with-public-key-signatures-and-verifies-them-for-liveness

    The Naked Scientists Podcast
    MI6 pushes cyber security, and WHO warns of fat jab shortage

    The Naked Scientists Podcast

    Play Episode Listen Later Dec 19, 2025 30:35


    This week, defence analyst, Michael Clarke, explains the significance of the MI6 agency's scientific shift. Will it help counter Russia's technological threat? Plus, the University of Glasgow's Naveed Sattar tells us why weight loss medicine could be a silver bullet for global obesity, Ellie Diamant at Bard College on beaky birds during COVID, and the Institute of Astronomy's Matt Bothwell on NASA's new space telescope... Like this podcast? Please help us by supporting the Naked Scientists