Podcasts about cybersecurity

The protection of computer systems from theft or damage

  • 11,438PODCASTS
  • 63,621EPISODES
  • 30mAVG DURATION
  • 10+DAILY NEW EPISODES
  • Nov 22, 2025LATEST
cybersecurity

POPULARITY

20172018201920202021202220232024

Categories




    Best podcasts about cybersecurity

    Show all podcasts related to cybersecurity

    Latest podcast episodes about cybersecurity

    Terminal Value
    Making the Invisible Visible: Cybersecurity, Reinvention, and the Real Risks Leaders Ignore

    Terminal Value

    Play Episode Listen Later Nov 22, 2025 31:00


    In this episode, we use cybersecurity as a lens to expose a truth that every leader forgets: the biggest threats to your company are the ones you can't see—until they take you down.Scott's career mirrors the evolution of tech itself—from software stores in the '80s to early network integration, to building one of the original managed services models before “MSP” was even a phrase. His latest book, Visible Ops for Cybersecurity, reframes the discipline not as an IT function, but as a visibility function: if you can't see it, you can't secure it… and if you can't secure it, you can't scale it.We break down why ransomware is now franchised, why even the best companies get breached, why cyber insurance is becoming a false safety net, and why every founder—yes, even a team-of-one startup—needs a security-first mindset.This isn't fear-mongering. It's leadership.TL;DR* Assume breach. The #1 mistake founders make is believing they're “too small” to be a target.* Backups are not backups unless they're encrypted, immutable, and air-gapped.* Cyber insurance is not protection—44% of claims were denied in 2024.* Reinvention is mandatory. Tech evolves, threats evolve, your systems must evolve.* Visibility beats bravado. Most failures come from what leaders think is secure, not what actually is.Memorable lines* “Security by obscurity died the day ransomware became a franchise.”* “If the best cybersecurity companies get hacked, your only strategy is resilience.”* “Backups aren't safety—they're hope, unless they're air-gapped.”* “Reinvention isn't optional in tech—it's the price of staying alive.”* “Make the invisible visible, or the invisible will make the decision for you.”Key Ideas We Unpack1. Reinvention as a Survival SkillScott turned retail software into network integration, then into managed services, then into cybersecurity leadership.The pattern:Visibility → Competence → Reinvention.Most founders skip the first step and collapse at the third.2. The Modern Threat Landscape Is IndustrializedRansomware now has:* franchises* training* support hotlines* experts who “close the deal” when an amateur hacker gets stuckThis is organized crime with a customer-service department.3. Backups Are the New LifeboatsThreat actors sit inside systems for 60–365 days before triggering an attack.If your backups are not:* encrypted* immutable* air-gappedyou don't have backups—you have illusions.4. Cyber Insurance Is Becoming a Mirage44% of claims denied.Policies are unregulated.Exclusions keep growing.Insurance is no longer a plan—it's paperwork.5. The Startup Founder Version of CybersecurityIf you're a team of one, your mantra is simple:Be good to your future self.Design tools, workflows, and systems with a security-first mindset from day one.The cheapest hack is the one that never becomes possible.6. Visibility Is a Leadership HabitYou can't manage what you can't see.And almost everything that destroys a business—breaches, failures, slow decay, talent risk—starts in the invisible layer.GuestScott Aldridge — President & CEO of IP Services.Cybersecurity author, technologist, MSSP leader, and early pioneer of managed services.Linkedin: https://www.linkedin.com/in/scott-alldridge-1a976/Website: https://ipservices.com/Why This MattersMost founders underestimate risk because they overestimate visibility.If you want a business that survives the next decade, the job is simple:Design for resilience.Assume breach.Back up reality, not hope.Reinvent before the market forces you to.And make the invisible visible—before someone else does.Call to ActionIf this conversation lit something up for you, don't just let it fade. Come join me inside the Second Life Leader community on Skool. That's where I share the frameworks, field reports, and real stories of reinvention that don't make it into the podcast. You'll connect with other professionals who are actively rebuilding and leading with clarity. The link is in the show notes—step inside and start building your Second Life today.https://secondlifeleader.com This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit www.dougutberg.com

    Business of Tech
    MSP Events Shift: From Mega Conferences to Micro Communities and the Rise of Cybersecurity Focus

    Business of Tech

    Play Episode Listen Later Nov 22, 2025 44:02


    MSP events are experiencing a notable shift, with a growing preference for smaller, localized gatherings over traditional mega-conferences. Jessica Davis, Principal Analyst at Omdia, highlights that this trend is driven by factors such as increased travel costs and a desire for more meaningful community interactions. Research indicates that MSPs are increasingly seeking value from events that foster peer connections and provide insights into vendor roadmaps, particularly in the realms of cybersecurity and automation. The acquisition of Channel Pro by Cyber Risk Alliance further underscores the industry's focus on cybersecurity, as it aims to integrate channel and cybersecurity insights.The analysis of 352 global channel events reveals that many MSPs are prioritizing local roadshows, which allow for easier access and more personalized engagement. The pandemic has also influenced this shift, as MSPs are eager to reconnect in person after extended periods of remote interaction. Davis notes that while larger events like IT Nation and Kaseya Connects have their place, the saturation of the event landscape has led to a dilution of value for attendees, prompting a reevaluation of which events are worth the investment of time and resources.In addition to the primary focus on event dynamics, the episode discusses the varying approaches vendors take to measure return on investment (ROI) from these events. While some vendors rely on gut feelings or anecdotal evidence, others employ systematic methods to assess lead generation and engagement quality. This disparity in measurement practices highlights the need for vendors to adopt more data-driven strategies to justify their event expenditures.For MSPs and IT service leaders, the evolving landscape of events presents both challenges and opportunities. As the industry transitions into what is termed MSP 3.0, there is a clear need for MSPs to align their event participation with their business goals, focusing on those that offer relevant insights and networking opportunities. Understanding the financial motivations behind events and seeking out vendor-neutral gatherings can enhance the value derived from these engagements, ultimately supporting better decision-making and growth strategies.

    Cyber Security Today
    Understanding Cybersecurity Threats: Insights from Intelligence Experts

    Cyber Security Today

    Play Episode Listen Later Nov 22, 2025 47:07


    In this episode of Cybersecurity Today, host Jim Love welcomes retired intelligence officer Neil Bisson and regular guest David Shipley for an in-depth discussion on current cybersecurity threats facing both Canada and the US. They explore the roles of major state actors like China, Russia, Iran, and North Korea in cyber espionage and sabotage, alongside the motivations driving such activities. The conversation delves into the challenges faced by corporations and critical infrastructure, the importance of understanding motivations behind cyber attacks, and the need for greater cooperation between the private sector and intelligence agencies. The episode also highlights the crucial steps individuals and organizations should take to protect themselves in this rapidly evolving cyber landscape. 00:00 Introduction and Sponsor Message 00:40 Meet Neil Bisson: A Retired Intelligence Officer 02:43 The Evolution of Intelligence Collection 04:29 The Role of Big Data in Modern Espionage 06:30 Corporate Espionage and Technological Advancements 11:45 National Security Threats and Private Sector Vulnerabilities 16:42 Global Players in Cybersecurity Threats 21:44 The Overlooked Cyber Capabilities of India 23:58 State-Sponsored Cybercrime: A Symbiotic Relationship 24:50 Critical Infrastructure Vulnerabilities 25:32 Cyber Attacks and International Relations 27:54 The Role of Intelligence Agencies 33:58 The Huawei Controversy 37:18 Balancing National Security and Economic Interests 41:55 The Future of Cybersecurity 45:39 Conclusion and Final Thoughts

    Cybercrime Magazine Podcast
    Cybercrime Wire For Nov. 22-23, 2025. Weekend Update. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Nov 22, 2025 1:09


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    Goldesel x Investflow - Aktientalk
    Märkte extrem volatil / Ersten Tenbagger gekauft / Diese Cybersecurity Aktie ist jetzt spannend

    Goldesel x Investflow - Aktientalk

    Play Episode Listen Later Nov 22, 2025 42:07


    The CyberWire
    AI meets the chain of command.

    The CyberWire

    Play Episode Listen Later Nov 21, 2025 27:52


    Cyber Command names a new head of AI. The UK introduces its long-delayed Cyber Security and Resilience Bill. Researchers highlight a critical Oracle Identity Manager flaw. Salesforce warns customers of a third-party data breach. Italy's state-owned railway operator leaks sensitive information. SonicWall patches firewalls and email security devices. The US charges four individuals with conspiring to illegally export restricted Nvidia AI chips to China. The SEC drops its lawsuit against SolarWinds. NSO group claims a permanent injunction could cause irreparable and potentially existential harm. Maria Varmazis of the T-Minus Space Daily show sits down with General Daniel Karbler (Ret.) to discuss his consulting work for A House of Dynamite, the newly released Netflix film. Roses are red, violets are blue, this poem just jailbroke your AI too. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Maria Varmazis of the T-Minus Space Daily show sits down with Lt. General Daniel Karbler (Ret.) to discuss his consulting work for A House of Dynamite, the newly released Netflix film. This is an excerpt of T-Minus Deep Space airing tomorrow in all of your favorite podcast app. Selected Reading Cyber Command Taps Reid Novotny as New AI Chief (MeriTalk) UK's New Cybersecurity Bill Takes Aim at Ransomware Gangs and State-Backed Hackers (Fortra) Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day (SecurityWeek) Salesforce alerts customers of data breach traced to a supply chain partner (CXOtoday) Massive data leak hits Italian railway operator Ferrovie dello Stato via Almaviva hack (Security Affairs) SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance (SecurityWeek) Four charged with plotting to sneak Nvidia chips into China (The Register) SEC voluntarily dismisses SolarWinds lawsuit (The Record) NSO Group argues WhatsApp injunction threatens existence, future U.S. government work (CyberScoop) Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models (Arxiv) Freesound Music Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

    TD Ameritrade Network
    Focusing on Cybersecurity & AI: ZS, CRWD, SNOW

    TD Ameritrade Network

    Play Episode Listen Later Nov 21, 2025 4:44


    Ian Tien spotlights cybersecurity and AI, saying governments and corporations are focusing on “sovereign” AI structures. “They see AI as a competitive advantage, and they want to own it…they don't want it off the shelf, they want it customized.” However, AI products have not been able to meet those expectations yet, he says, slowing growth. Ian highlights Zscaler (ZS), CrowdStrike (CRWD), and Snowflake (SNOW) as players in this sector.======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about

    Cybercrime Magazine Podcast
    Cybercrime Wire For Nov. 21, 2025. Breach Reported By Italy's Nat'l Railway Operator. WCYB Digital Radio

    Cybercrime Magazine Podcast

    Play Episode Listen Later Nov 21, 2025 1:21


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    Scaling Japan Podcast
    Episode 90: LinkedIn Advertising in Japan with Ignacio Davalos

    Scaling Japan Podcast

    Play Episode Listen Later Nov 21, 2025 58:10


    In this episode of the Scaling Japan Podcast, we welcome Ignacio Davalos, Content Strategy Director at AIM B2B (a Custom Media company) and an experienced marketer who has led full-funnel B2B and B2C programs for brands like L'Oréal, Gengo, and Lionbridge.Ignacio breaks down how LinkedIn is actually used in Japan, who the real users are, what types of campaigns perform well, and why Western lead-generation playbooks often fail when applied to the Japanese market. He shares practical insights on localization, targeting, tool integrations, and campaign structure, backed by multiple real case studies.If you're a marketer, consultant, or B2B advertiser looking to run LinkedIn campaigns in Japan, this episode gives you a tactical, Japan-specific guide to what works and what doesn't.This episode is sponsored by Custom Media, Tokyo's leading integrated marketing and PR agency since 2008, helping global brands expand across Japan and APAC.They can help you with:Localized storytelling to build trust in Asian marketsStrategic performance marketing (including LinkedIn Ads)Account-based marketing (ABM), paid media, GEO, and SEOHubSpot-certified CRM and marketing automationData-driven implementation with cultural expertiseLearn more about AIM B2B here: https://hi.switchy.io/h7TM 00:29 – Introduction 00:56 – Guest Introduction 03:03 – LinkedIn user numbers & growth 07:09 – User demographics in Japan 11:41 – Competitors to LinkedIn 14:10 – How Western companies use LinkedIn 15:50 – How Japan uses LinkedIn differently 18:34 – Japanese vs Western tool integrations 26:30 – French newspaper case study 28:50 – Strengths of LinkedIn as an ad platform 34:39 – Cybersecurity case study 37:29 – How to build a successful awareness-phase campaign 40:10 – Localization of messaging & targeting 48:23 – Japanese vs English ads 49:50 – Pitfall: MBA campaign with low results 51:16 – Common mistakes in follow-up and nurturingConnect with Ignacio Davalos on LinkedIn – linkedin.com/in/ignaciodavalos Link to GEO Strategy Online Webinar from AIM B2B: https://aim-b2b.com/lp/the-master-generative-engine-optimization-strategy/ Looking to take your business to the next level?Let our host Tyson Batino help you scale your company from $100,000 to $10,000,000 with personalized coaching and advisory.

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonAllow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform at https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    Drone News Update
    Drone News: Police Drone Injures Child, Drone Rescues Man in WI, Drone Proposal Lights Up Dallas

    Drone News Update

    Play Episode Listen Later Nov 21, 2025 4:23


    Welcome to your weekly UAS News Update. We have three stories for you this week: A UK police drone crash injures a child, a drone helps rescue a missing 85-year-old man in Wisconsin, and a viral drone show proposal lights up the Dallas skyline. Let's get to it.First up, a serious incident out of the United Kingdom, where a police drone crashed and injured a child. According to multiple sources, on August 2nd, police in Kent were responding to an alleged assault in Sheerness. An officer deployed a DJI Matrice 30T, but during the flight, the drone reportedly struck an overhead power line. It then fell and struck a child, causing severe hand injuries that required them to be taken to a hospital for treatment. The confirmation of the crash and injury didn't occur until a freedom of information request was submitted. There currently aren't any updates on the status of the child struck by the drone, and while we don't normally cover stories out of the United States, we wanted to cover this one to remind everyone that safety must come first in any operation. Next up, a drones-for-good story! In Juneau County, Wisconsin, deputies used a drone to find a missing 85-year-old man. The sheriff's office received a call shortly after 5 p.m. about a man who had wandered into a dense wooded area and was possibly injured. Multiple agencies, including the fire department and the Department of Natural Resources, joined the search. As daylight started to fade and temperatures dropped, the situation became more urgent.Shortly before 7 p.m., deputies launched a drone over the search area. Using its camera, the drone team spotted the man stuck in thick mud and unable to free himself. Ground crews could have spent hours searching that difficult terrain on foot, but the drone provided an immediate bird's-eye view. Rescuers were able to reach him quickly and bring him to safety. He was taken to a medical center for evaluation but is expected to be fine. While the report didn't specify the exact drone model, it's likely it was equipped with a thermal camera, which is a game-changer in search and rescue. And finally this week, a story that went viral and shows a much more creative use for drones. A man in Dallas used a massive drone light show to propose to his girlfriend. Cybersecurity engineer Travon Duncan planned the elaborate proposal for his girlfriend, Erica McDowell, who is a content creator. The video, which you've probably seen on social media, shows hundreds of drones lighting up the Dallas skyline. They spelled out "Will you marry me?" and created animations of hearts, a ring box, and an infinity symbol.To pull this off, Duncan said he had to get a permit to block off nearby streets, which is a great reminder for all of us that you can't just fly over moving cars, even for a grand romantic gesture. He said the proposal was a "major investment," and I can only imagine! It's not every day you see someone take over the airspace of a major city for a proposal. The couple's friends and family were on a rooftop to watch the whole thing unfold. It's a pretty amazing use of drone show technology, and I have to say, he really raised the bar for proposals everywhere!Be sure to check out our Black Friday deals and we'll see you on Post Flight, our Premium community show where we share our uncensored opinions that aren't always suitable for YouTube! Have a great weekend! https://dronexl.co/2025/11/19/police-crashed-dji-drone-into-child/https://www.axios.com/local/dallas/2025/11/19/a-dallas-drone-proposalhttps://dronexl.co/2025/11/19/drone-wisconsin-deputies-missing-85-old-man/

    The Daily Crunch – Spoken Edition
    CrowdStrike fires ‘suspicious insider,' X rolling out the ‘About this account' feature, and Trump's FCC votes to scrap cybersecurity rules

    The Daily Crunch – Spoken Edition

    Play Episode Listen Later Nov 21, 2025 8:40


    -Cybersecurity giant CrowdStrike denied it had been hacked following claims from a hacker group, which leaked screenshots from inside CrowdStrike's network. -X's new feature will show where users are based, how they're connected to X, and how many times they've changed their username. -Two Trump-appointed FCC officials voted to undo the telecom industry's cybersecurity rules. One Democratic commissioner dissented, saying the decision leaves the United States "less safe" at a time when threats are increasing. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Becker’s Healthcare Podcast
    Balancing Innovation and Protection: The Future of Healthcare Cybersecurity

    Becker’s Healthcare Podcast

    Play Episode Listen Later Nov 20, 2025 18:22


    This episode features Anthony Locascio, Chief Technology Officer for Hospital Patient Monitoring at Philips, and Benjamin Millmann, Lead Clinical Informaticist at M Health Fairview. They discuss how health systems can shift from a prevention mindset to one focused on resilience, strengthen cybersecurity across connected devices, and build partnerships between vendors, clinicians, and IT teams to safeguard patient care amid rising digital threats.This episode is sponsored by Philips.

    Business, Brains & the Bottom Line
    Ep.137: The Future of Law Is Human: Chris DiBella on Empathy, Growth, and Tech That Serves People

    Business, Brains & the Bottom Line

    Play Episode Listen Later Nov 20, 2025 38:39


    In this episode, Paul sits down with Chris DiBella, Founder and CEO of DiBella Law Offices, a nationally recognized personal injury firm known as much for its results as its humanity. Chris shares how he built a multi-office, high-growth firm by putting people at the center of every decision, from clients and staff to the communities he serves.Chris breaks down why empathy is the most underrated business skill in law, and how training his team to “listen before they litigate” has become DiBella Law's competitive edge. He explains the measurable outcomes of a client-first culture, happier clients, stronger referrals, and dramatically lower staff turnover, and recounts powerful moments when understanding a client's emotional state fundamentally changed strategy and even improved case outcomes.Chris also walks through his journey from solo practitioner to scalable brand, including the mindset shift from being the lawyer who does everything to becoming the leader who builds systems, culture, and trust.Looking ahead, Chris shares his perspective on the evolving legal landscape: why the future is tech-enabled, not tech-driven, and how AI and automation should enhance, not replace,  the human touch. Finally, he discusses why community engagement isn't just goodwill; it's a smart, long-term brand strategy.Whether you're in law, leadership, or any service business, this conversation offers a powerful blueprint for growth rooted in empathy, process, and genuine human connection.Visit them at https://dibellalawoffice.com "

    Cybercrime Magazine Podcast
    Ransomware Minute. Hackers Claim Massive Under Armour Data Breach. Scott Schober, WCYB Digital Radio

    Cybercrime Magazine Podcast

    Play Episode Listen Later Nov 20, 2025 3:30


    The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.

    Cybercrime Magazine Podcast
    Cybercrime Wire For Nov. 20, 2025. Big Russian Insurer Outages After Cyberattack. WCYB Digital Radio

    Cybercrime Magazine Podcast

    Play Episode Listen Later Nov 20, 2025 1:29


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    DrZeroTrust
    AI: The Double-Edged Sword in Cybersecurity

    DrZeroTrust

    Play Episode Listen Later Nov 20, 2025 25:39


    In this conversation, I discuss the evolving landscape of cybersecurity, particularly the impact of #ai on #cyberattacks. I highlight a recent AI-driven #cybersecurity campaign, its implications for businesses, and the importance of robust cybersecurity measures. The discussion also covers vendor security in the financial sector, lessons learned from a ransomware attack in Nevada, government cybersecurity strategies, and the recent Cloudflare outage. The conversation concludes with insights into new threat intelligence tools and the need for continuous vigilance in cybersecurity practices.TakeawaysAI models have become genuinely helpful for cybersecurity operations.The first documented case of a large-scale cyber attack executed with minimal human intervention has emerged.Businesses must take cybersecurity seriously as threats become more commoditized.Phishing training alone is insufficient as a cybersecurity control.Lateral movement and privilege escalation are critical cybersecurity vulnerabilities.Government strategies need to focus on shaping adversary behavior and public-private partnerships.The recent Cloudflare outage highlights systemic issues in internet infrastructure.New threat intelligence tools are emerging to help organizations stay secure.Cybersecurity is a shared responsibility that requires vigilance from all stakeholders.The landscape of cyber threats is evolving rapidly, necessitating continuous adaptation.

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonAllow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform at https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    Noon Business Hour on WBBM Newsradio
    Nvidia - Cyber Security & AI Power

    Noon Business Hour on WBBM Newsradio

    Play Episode Listen Later Nov 20, 2025 26:01


    Latest on Nvidia's key quarterly earnings, smart ways to protect your personal information during the hectic holiday season, and a look at the energy impact of artificial intelligence.

    The Daily Crunch – Spoken Edition
    How the classic anime ‘Ghost in the Shell' predicted the future of cybersecurity 30 years ago

    The Daily Crunch – Spoken Edition

    Play Episode Listen Later Nov 20, 2025 7:18


    Written by: Lorenzo Franceschi-Bicchierai The story of the Ghost in the Shell's main villain the Puppet Master hinted at a future where governments use hackers for espionage, at a time when most of the world had never connected to the internet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Wednesday, November 19th, 2025: Kong Tuke; Cloudflare Outage

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Nov 19, 2025 4:38


    KongTuke Activity This diary investigates how a recent Kong Tuke infections evolved all the way from starting with a ClickFix attack. https://isc.sans.edu/diary/KongTuke%20activity/32498 Cloudflare Outage Cloudflare suffered a large outage today after an oversized configuration file was loaded into its bot protection service https://x.com/dok2001 Google Patches Chrome 0-Day Google patched two vulnerabilities in Chrome. One of them is already being exploited. https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html

    Joey Pinz Discipline Conversations
    #774 Canalys Forum Chicago 2025 -Jordan Rackie:

    Joey Pinz Discipline Conversations

    Play Episode Listen Later Nov 19, 2025 40:27


    Send us a textIn this episode of Joey Pinz Discipline Conversations, Jordan Rackie, CEO of KeyFactor, opens up about leading a 600-person cybersecurity company while staying grounded as a dad, musician

    Business of Tech
    Microsoft's AI Agent 365 Launch, Vendor Integrations, and Cybersecurity Media Consolidation

    Business of Tech

    Play Episode Listen Later Nov 19, 2025 17:24


    Microsoft has launched Agent 365, a management platform designed for overseeing AI agents within enterprise environments. This platform, now available in early access, includes features such as the Microsoft Entra Registry for managing agent identities, risk-based access policies, and performance measurement tools. The introduction of Agent 365 signifies a shift towards integrating AI agents into standard business operations, allowing organizations to manage both Microsoft-built and third-party AI agents in a unified system. This development is part of a broader trend where AI governance and customer expectations are becoming increasingly critical for Managed Service Providers (MSPs).In conjunction with the launch of Agent 365, Microsoft has formed strategic partnerships with NVIDIA and Anthropic to enhance access to Anthropic's Cloud AI model, which will be scaled on Microsoft Azure. Anthropic has committed to purchasing $30 billion in Azure compute capacity, indicating a significant investment in cloud infrastructure. This partnership will allow Microsoft Foundry customers to access various versions of Anthropic's AI models, further solidifying Microsoft's position in the AI landscape. The implications of these partnerships extend to the operational costs and strategies of organizations that rely on AI, as the control of compute resources becomes a central factor in AI deployment.Additional announcements from Microsoft Ignite include new AI capabilities for Windows 11 and enhancements to Office applications, which will introduce free AI features aimed at improving user productivity. Vendors such as NinjaOne, Pax8, and Nerdio have also announced integrations and initiatives to align with Microsoft's evolving ecosystem, focusing on improving visibility, compliance, and modernization of virtual desktop infrastructure. These developments reflect a concerted effort by various companies to integrate more deeply into Microsoft's cloud and AI frameworks.For MSPs and IT service leaders, these advancements underscore the necessity of adapting to a rapidly changing technological landscape. The introduction of AI agents and the associated governance requirements will demand that MSPs develop frameworks for managing AI behavior and expectations. As AI features become standard in widely used applications, MSPs will need to address client expectations regarding AI functionality and reliability. The consolidation of media narratives around cybersecurity also highlights the importance of maintaining a balanced perspective on technology strategy, ensuring that MSPs focus on comprehensive solutions that address a range of client needs beyond just security. Three things to know today 00:00 Microsoft Signals Shift to an “Agentic OS” as Microsoft Deepens Anthropic Partnership and Expands AI Across Windows and Microsoft 36507:29 Ignite Highlights Vendor Rush Into Microsoft's Orbit, Raising Questions About MSP Differentiation and Over-Standardization11:57 CyberRisk Alliance Buys ChannelPro — and Shifts the MSP Storyline Toward Security This is the Business of Tech.     Supported by:  https://getflexpoint.com/msp-radio/https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship

    The Roundtable
    11/19/25 RT Panel

    The Roundtable

    Play Episode Listen Later Nov 19, 2025 87:30


    The Roundtable Panel: a daily open discussion of issues in the news and beyond. Today's panelists are Founder and Academic Director of the Hannah Arendt Center for Politics and Humanities and Professor of Politics, Philosophy, and Human Rights at Bard College Roger Berkowitz, Dean of the College of Emergency Preparedness, Homeland Security and Cybersecurity at the University at Albany Robert Griffin, and Associate Professor in the department of sociology at Vassar College Catherine Tan.

    ITSPmagazine | Technology. Cybersecurity. Society
    Beg Bounty: The New Wave of Unrequested Bug Claims and What They Mean | A Conversation with Casey Ellis | Redefining CyberSecurity with Sean Martin

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Nov 19, 2025 36:25


    ⬥EPISODE NOTES⬥Understanding Beg Bounties and Their Growing ImpactThis episode examines an issue that many organizations have begun to notice, yet often do not know how to interpret. Sean Martin is joined by Casey Ellis, Founder of Bugcrowd and Co-Founder of disclose.io, to break down what a “beg bounty” is, why it is increasing, and how security leaders should think about it in the context of responsible vulnerability handling.Bug Bounty vs. Beg BountyCasey explains the core principles of a traditional bug bounty program. At its core, a bug bounty is a structured engagement in which an organization invites security researchers to identify vulnerabilities and pays rewards based on severity and impact. It is scoped, governed, and linked to an established policy. The process is predictable, defensible, and aligned with responsible disclosure norms.A beg bounty is something entirely different. It occurs when an unsolicited researcher claims to have found a vulnerability and immediately asks whether the organization offers incentives or rewards. In many cases, the claim is vague or unsupported and is often based on automated scanner output rather than meaningful research. Casey notes that these interactions can feel like unsolicited street windshield washing, where the person provides an unrequested service and then asks for payment.Why It Matters for CISOs and Security TeamsSecurity leaders face a difficult challenge. These messages appear serious on the surface, yet most offer no actionable details. Responding to each one triggers incident response workflows, consumes time, and raises unnecessary internal concern. Casey warns that these interactions can create confusion about legality, expectations, and even the risk of extortion.At the same time, ignoring every inbound message is not a realistic long-term strategy. Some communications may contain legitimate findings from well-intentioned researchers who lack guidance. Casey emphasizes the importance of process, clarity, and policy.How Organizations Can PrepareAccording to Casey, the most effective approach is to establish a clear vulnerability disclosure policy. This becomes a lightning rod for inbound security information. By directing researchers to a defined path, organizations reduce noise, set boundaries, and reinforce safe communication practices.The episode highlights the need for community norms, internal readiness, and a shared understanding between researchers and defenders. Casey stresses that good-faith researchers should never introduce payment into the first contact. Organizations should likewise be prepared to distinguish between noise and meaningful security input.This conversation offers valuable context for CISOs, security leaders, and business owners navigating the growing wave of unsolicited bug claims and seeking practical ways to address them.⬥GUEST⬥Casey Ellis, Founder and Advisor at Bugcrowd | On LinkedIn: https://www.linkedin.com/in/caseyjohnellis/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥RESOURCES⬥Inspiring Post: https://www.linkedin.com/posts/caseyjohnellis_im-thinking-we-should-start-charging-bug-activity-7383974061464453120-caEWDisclose.io: https://disclose.io/⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast: 

    FINRA Unscripted
    Building Cybersecurity Resilience Through FINRA Forward

    FINRA Unscripted

    Play Episode Listen Later Nov 19, 2025 40:42


    Today's cybersecurity threats aren't isolated incidents—they are sophisticated operations orchestrated by organized criminals and even nation states. This new reality demands we respond not as individual organizations, but as a unified industry with shared intelligence and coordinated defenses. Through FINRA Forward, we are applying this perspective to create practical tools that firms can use to protect themselves and their clients from emerging threats. On this episode, we explore the topic with Bryan Smith, FINRA's Senior Vice President of Complex Investigations and Intelligence; Brita Bayatmakou, Vice President of Strategic and Threat Intelligence; and Jason Beachy, Vice President of the Cyber and Analytics Unit. Our guests discuss how FINRA is working to provide firms with the intelligence, preparation, and collaborative tools they need to better protect themselves and their customers in an increasingly complex threat landscape. These efforts include workshops and tabletop exercises, the Cyber and Operational Resilience program, and our forthcoming Financial Intelligence Fusion Center.Resources mentioned in this episode:FINRA ForwardFINRA Crypto and Blockchain Education ProgramBlog Post: FINRA Forward's Rule Modernization—An UpdateBlog Post: Vendors, Intelligence Sharing and FINRA's MissionBlog Post: FINRA Forward Initiatives to Support Members, Markets and the Investors They ServeEp. 177: Previewing FINRA's Crypto and Blockchain Education ProgramFIFC Email: fifc@finra.org Find us: LinkedIn / X / YouTube / Facebook / Instagram / E-mailSubscribe to our show on Apple Podcasts, Google Play and by RSS.

    Cyber Security Today
    Cybersecurity Today: CloudFlare Outage, Microsoft's AI Risk, New Red Team Tool, and More!

    Cyber Security Today

    Play Episode Listen Later Nov 19, 2025 15:38


    In this episode of 'Cybersecurity Today,' host Jim Love covers multiple pressing topics: CloudFlare's major outage affecting services like OpenAI and Discord, Microsoft's new AI feature in Windows 11 and its potential malware risks, a new red team tool that exploits cloud-based EDR systems, and a new tactic using calendar invites as a stealth attack vector. Additionally, a critical SAP vulnerability scoring a perfect 10 on the CVSS scale is discussed alongside a peculiar event where Anthropic's AI mistakenly tried to report a cybercrime to the FBI. The episode wraps up with a mention of the book 'Alyssa, A Tale of Quantum Kisses' and a thank you to Meter for sponsoring the podcast. Tune in for essential cybersecurity insights. 00:00 Introduction and Sponsor Message 00:22 CloudFlare Outage Causes Major Disruptions 02:55 Microsoft's New AI Features and Malware Risks 05:22 Silent but Deadly: New Red Team Tool 07:39 Calendar Invites as a Stealth Attack Vector 10:04 Critical SAP Vulnerability 12:11 Anthropic's AI and the FBI Incident 14:06 Conclusion and Final Thoughts

    Serious Privacy
    We do Redo - what's happening with GDPR? [Live from Privacy Space]

    Serious Privacy

    Play Episode Listen Later Nov 19, 2025 33:42


    Send us a textOn this episode of the award-winning Serious Privacy, Paul Breitbarth, Ralph O'Brien, and Dr. K Royal bring you an analysis of the leaked GDPR revisions recorded live at the award-winning Privacy Space in the UK. Tune in to hear what might be happening. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

    Smart Money Circle
    This CEO Solving A Quantum Problem = Quantum Security

    Smart Money Circle

    Play Episode Listen Later Nov 19, 2025 22:42


    The interview is also on Youtube: https://youtu.be/oSIFewGWnNE?si=efQOrP5YXeoWuYYAGuest Carlos Moreira Founder & CEO of SealSQ Ticker: (Nasdaq: LAES)Website: https://www.sealsq.com/BioCarlos Creus Moreira is a global technology entrepreneur and cybersecurity authority, serving as Founder, Chairman, and CEO of WISeKey (NASDAQ: WKEY) and SEALSQ (LAES). For decades, he has been a leading voice in securing the internet, developing trusted digital identity ecosystems, and advocating for the ethical use of artificial intelligence.Moreira began his career as a United Nations expert on CyberSecurity and Trust Models, working with agencies such as ILO, UNCTAD, ITC/WTO, World Bank, UNDP, and ESCAP (1983–1999). He is also the Founder of OISTE.org, a global non-profit dedicated to strengthening digital identity standards.From 1995 to 1999, he served as an Adjunct Professor and Head of the Trade Efficiency Lab at RMIT University in Australia, contributing to advances in trade facilitation and cybersecurity. His academic and professional work has consistently focused on enhancing trust in digital systems.Moreira holds influential roles in numerous international organizations. He is a Founding Member of the Geneva Government's E-Voting Steering Committee, a UN Global Compact Member, and has contributed extensively to the World Economic Forum (WEF). His WEF roles include: Founding Member of Global Growth Companies, WEF New Champion (2007–2016), Vice-Chair of the Agenda Council on Illicit Trade (2012–2015), Member of the WEF Selection Committee for Growth Companies, and contributor to the Agenda Council on the Future of IT Software & Services (2014–2016). He has been recognized as one of the WEF's Trailblazers, Shapers, and Innovators.He also serves on the Blockchain Advisory Board of the Government of Mexico, the Blockchain Research Institute, and is Founder of the Geneva Security Forum, the Blockchain Center of Excellence, and TrustValley.Moreira has received numerous honors, including:• One of Switzerland's 300 most influential people (Bilan.CH 2011, 2013)• Top 100 in the Net Economy• Most Exciting EU Company (Microsoft MERID 2005)• Man of the Year (AGEFI 2007)• One of Switzerland's 100 most important digital leaders (Bilanz 2016)• Best EU M&A Award (2017)• Blockchain Davos Award of Excellence (GBBC 2018)• CGI Award HolderHe is co-author of the global best-selling book “The TransHuman Code,” a leading work on managing technology's impact on humanity. As a multilingual keynote speaker (English, Spanish, Italian, French, Portuguese), Moreira has spoken at the UN, WEF, CGI, ITU, Bloomberg, Munich Security Conference, World Policy Conference, Zermatt Summit, Microsoft, IMD, INSEAD, MIT Sloan, HEC, UBS, and the CEO Summit.Pioneering Work During the Dawn of the World Wide Web (WWW)During the early 1990s in Geneva, at the same time Tim Berners-Lee was creating the World Wide Web at CERN, Moreira was deeply involved in advancing secure digital identity and trust models. His UN cybersecurity work positioned him as a key advocate for building security into the fabric of the emerging web. This vision led him to found WISeKey in 1999, which has become a global leader in digital identity, authentication, and securing online transactions.He later established the Geneva Security Forum and Geneva Philanthropy Forum, reinforcing Geneva's role as a center for digital trust, innovation, and global cybersecurity dialogue.Married with six children, Carlos Creus Moreira remains committed to building a secure, transparent, and human-centered digital future. More information can be found at carloscreusmoreira.com.

    Cybercrime Magazine Podcast
    Cybercrime Wire For Nov. 19, 2025. Cyberattack Hits French Social Charges Body. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Nov 19, 2025 1:18


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    Stats On Stats Podcast
    Breaking Into Cybersecurity and Incident Response with Alante Pritchett

    Stats On Stats Podcast

    Play Episode Listen Later Nov 19, 2025 63:52


    Incident responder and SOC analyst Alante Pritchett joins the Stats On Stats crew to talk about breaking into cybersecurity, transitioning from government contracting to the private sector, and how gaming, Discord communities, and mentorship shape his approach to helping others enter the field. Co-host Joshua Davis adds insights from government tech as they compare offensive vs. defensive security, discuss burnout, and offer practical guidance for newcomers.Guest Connect: Alante PritchettLinkedIn: https://www.linkedin.com/in/alante-pritchett-0b1666140/Stats on Stats ResourcesCode & Culture: https://www.statsonstats.io/flipbooks    | https://www.codeculturecollective.io  Merch: https://www.statsonstats.io/shop   LinkTree: https://linktr.ee/statsonstatspodcast   Stats on Stats Partners & AffiliatesIntelliCON 2026Website: https://www.intelliguards.com/intellic0n-speakersRegister: www.eventbrite.com/e/1497056679829/?discount=STATSONSTATSUse Discount Code: "STATSONSTATS" for 30% offAntisyphon TrainingWebsite: https://www.antisyphontraining.com   MAD20 TrainingWebsite: https://mad20.io   Discount Code: STATSONSTATS15Ellington Cyber Academy: https://kenneth-ellington.mykajabi.com   Discount Code: STATSONSTATSKevtech AcademyWebsite: https://www.kevtechitsupport.com   Dream Chaser's Coffee Website: https://dreamchaserscoffee.com   Discount code: STATSONSTATSPodcasts We LikeDEM Tech FolksWebsite: https://linktr.ee/developeverymind   IntrusionsInDepthWebsite: https://www.intrusionsindepth.com  -----------------------------------------------------Episode was shot and edited at BlueBox Studio Tampahttps://blueboxdigital.com/bluebox-studio/

    UNSECURITY: Information Security Podcast
    Unsecurity Episode 251: Practicing Personal Cybersecurity with Coral Morgan & Cory Hanks

    UNSECURITY: Information Security Podcast

    Play Episode Listen Later Nov 19, 2025 21:33


    Coming off Cybersecurity Awareness Month and into the holidays, this season is the perfect time to reflect on personal cybersecurity practices. Information Security Consultant, Coral Morgan, and IR Case Manager, Cory Hanks, join this episode to provide tips and cybersecurity practices for all age groups. Like, subscribe, and share with your network to stay informed about the latest in cybersecurity! We want to hear from you! Reach out at unsecurity@frsecure.com and follow us for more: LinkedIn: https://www.linkedin.com/company/frsecure/ Instagram: https://www.instagram.com/frsecureofficial/ Facebook: https://www.facebook.com/frsecure/ BlueSky: https://bsky.app/profile/frsecure.bsky.social About FRSecure: https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start or looking for a team of experts to collaborate with you, we are ready to serve.

    The Gate 15 Podcast Channel
    Weekly Security Sprint EP 135. Happy Bday CISA! Cyber risks and reports and self reflection from an attack victim

    The Gate 15 Podcast Channel

    Play Episode Listen Later Nov 19, 2025 19:44


    In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:• Happy Birthday to CISA! The Cybersecurity and Infrastructure Security Agency turned seven on Sunday. • Government funding bill temporarily revives cybersecurity information-sharing law• The Gate 15 Interview EP 64: Cody Barrow, CEO, EclecticlQ. “Nothing in cyber happens without a reason.”• Faith-Based (U.S.): FB-ISAO Newsletter, v7, Issue 10Main Topics:Cybersecurity!• OWASP Top Ten. Welcome to the 8th installment of the OWASP Top Ten! • ASD: Annual Cyber Threat Report 2024-2025• Checkout.com: Protecting Our Merchants: Standing Up to Extortion: “We will not be extorted by criminals. We will not pay this ransom.” Holidays & Hostile Events!• Europol: 10 years on: remembering the victims of the 13 November terrorist attack in Paris• DOJ: New Jersey Man Charged with Cyberstalking in Connection with Violent Network ‘764'• Indiana Republican called out by Trump on redistricting is swatted• Marjorie Taylor Greene Says She Received Pipe Bomb Threat: What We Know• Terror plot arrests reveal ‘more dangerous' online pathway to ISIS radicalization in America• Suspects charged in alleged Michigan Halloween terror plot eyed attack on Chicago Pride Parade: Docs • Racists are now openly targeting Indian Americans• Is left-wing terrorism returning? Quick Hits:• Blended Threats! Risky Biz News - German TV station hacked: A cyberattack has disrupted the broadcast of German radio station Radio Nordseewelle. Hardware components were damaged in the attack and had to be replaced. The broadcaster said it had to rebuild large parts of its IT network. The hack took place days after a similar incident crippled the transmission of Dutch radio and TV station RTV Noord. [Tarnkappe]

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonAllow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform at https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    The Other Side Of The Firewall
    AI Hacks Are Here Agentic AI Espionage, Cybersecurity Layoffs & Info Sharing Gaps

    The Other Side Of The Firewall

    Play Episode Listen Later Nov 19, 2025 38:39


    The conversation delves into the alarming use of AI in espionage, highlighting a recent incident reported by Anthropic where AI tools were manipulated to conduct attacks on various global organizations. The discussion emphasizes the unprecedented nature of these threats and the significant role AI plays in modern cybersecurity challenges. Article: Anthropic warns state-linked actor abused its AI tool in sophisticated espionage campaign https://www.cybersecuritydive.com/news/anthropic-state-actor-ai-tool-espionage/805550/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExZzBzVlFKcDRKVzZLbmJ1T3NydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIIY2FsbHNpdGUBMgABHmJQUhzPLTfnQg0GYwFyPg3ARvkAWiKL6IZtIWEV7q5MgjQsVfHp1nipJKaT_aem_go7RwNdHcqn4lzSWflfhPg Cybersecurity Firm Deepwatch Fires One Third of Workforce for AI https://tech.co/news/cybersecurity-firm-deepwatch-fires-dozens-ai?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExZzBzVlFKcDRKVzZLbmJ1T3NydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIIY2FsbHNpdGUBMgABHlqDES7fqv92ODvciJ7E84px4O4JeOl2PpO47KtKihhVmbzhiPDk8PyZAxoA_aem_DHggk6C_uwwg_PLLcB2MJg Congress extends CISA 2015, but path to long-term reauthorization remains murky https://federalnewsnetwork.com/cybersecurity/2025/11/congress-extends-cisa-2015-but-path-to-long-term-reauthorization-remains-murky/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExZzBzVlFKcDRKVzZLbmJ1T3NydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIIY2FsbHNpdGUBMgABHk3k0ov9AK_1lZTBc7E8RiizrqvKCOoBpJNHQGWLgFw3ShwOmrLF8KllX7ES_aem_s_EruEoddKOwdCRNUu7vCw Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN

    News Plus
    KI-Spielzeug im Kinderzimmer: Wie gefährlich ist das?

    News Plus

    Play Episode Listen Later Nov 19, 2025 16:15


    Erstickungsgefahr gehört zu den grössten Gefahren, die von Spielzeug ausgehen. Doch US-Verbraucherschützer haben nun eine neue Quelle ausgemacht: KI-Spielzeug. Was es so gefährlich macht und wie es Kinder beinflussen kann. Immer mehr Spielzeughersteller setzen auf Chatbots. OpenAI hat zum Beispiel im Frühjahr 2025 eine Kooperation mit dem Spielzeugunternehmen Mattel verkündet. Gemeinsam wollen sie eine sprechende Barbie-Puppe auf den Markt bringen. Den Verbraucherschützern zufolge statten die Unternehmen die KI in vielen Fällen zwar mit Richtlinien für altersgerechte Interaktionen aus. Diese seien aber mal mehr und mal weniger effektiv und können manchmal komplett zusammenbrechen. Dass KI-Spielsachen viele neue Gefahren ins Kinderzimmer bringen, bestätigt auch Isabel Wagner, Professorin für Cyber-Security an der Universität Basel. Vor allem in punkto Datenschutzes gebe es verheerende Mängel. Trotzdem ist nicht alles nur schlecht, im Zusammenhang mit KI-Spielzeug. Ein Entwicklungspsychologe sagt, sie könnten auch einen positiven Effekt auf das Selbstbewusstsein haben. ____________________ Habt Ihr Fragen oder Themen-Inputs? Schreibt uns gerne per Mail an newsplus@srf.ch oder sendet uns eine Sprachnachricht an 076 320 10 37. ____________________ In dieser Episode zu hören - Isabel Wagner, Professorin Cyber-Security, Universität Basel - Moritz Daum, Professor für Entwicklungspsychologie an der Universität Zürich ____________________ Team: - Moderation: Vanessa Ledergerber - Produktion: Marielle Gygax - Mitarbeit: Julius Schmid ____________________ Das ist «News Plus»: In einer Viertelstunde die Welt besser verstehen – ein Thema, neue Perspektiven und Antworten auf eure Fragen. Unsere Korrespondenten und Expertinnen aus der Schweiz und der Welt erklären, analysieren und erzählen, was sie bewegt. «News Plus» von SRF erscheint immer von Montag bis Freitag um 16 Uhr rechtzeitig zum Feierabend.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Tuesday, November 18th, 2025: Binary Expression Decoding. Tea NPM Pollution; IBM AIX NIMSH Vulnerability

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Nov 18, 2025 4:58


    Decoding Binary Numeric Expressions Didier updated his number to hex script to support simple arithmetic operations in the text. https://isc.sans.edu/diary/Decoding%20Binary%20Numeric%20Expressions/32490 Tea Token NPM Pollution The NPM repository was hit with around 150,000 submissions that did not contain any useful contributions, but instead attempted to fake contributions to earn a new tea coin. https://aws.amazon.com/blogs/security/amazon-inspector-detects-over-150000-malicious-packages-linked-to-token-farming-campaign/ IBM AIX NIMSH Vulnerabilities IBM patched several critical vulnerablities in the NIMSH daemon https://www.ibm.com/support/pages/node/7251173

    Packet Pushers - Full Podcast Feed
    PP087: Why SBOMs Are Cooler and More Useful Than You Think

    Packet Pushers - Full Podcast Feed

    Play Episode Listen Later Nov 18, 2025 46:08


    Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software. Why should you care about SBOMs? Our guest, Natalie Somersall, is here... Read more »

    CISO-Security Vendor Relationship Podcast
    Are You Implying This Line Graph Isn't a Compelling Cybersecurity Narrative?

    CISO-Security Vendor Relationship Podcast

    Play Episode Listen Later Nov 18, 2025 41:01


    All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is our sponsored guest, Nathan Hunstad, director, security, Vanta. In this episode: Metrics that matter Testing for real AI as an assistant Intelligence without context Huge thanks to our sponsor, Vanta Vanta automates key areas of your GRC program—including compliance, risk, and customer trust—and streamlines the way you manage information. A recent IDC analysis found that compliance teams using Vanta are 129% more productive. Get back time to focus on strengthening security and scaling your business at vanta.com/ciso

    Packet Pushers - Fat Pipe
    PP087: Why SBOMs Are Cooler and More Useful Than You Think

    Packet Pushers - Fat Pipe

    Play Episode Listen Later Nov 18, 2025 46:08


    Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software. Why should you care about SBOMs? Our guest, Natalie Somersall, is here... Read more »

    FreightCasts
    Check Call | The state of cybersecurity in the supply chain

    FreightCasts

    Play Episode Listen Later Nov 18, 2025 27:58


    In this episode, we dive into the world of cybersecurity. Our guest, Joe Ohr, COO at the NMFTA breaks down trends in cybersecurity and how the NMFTA is positioning itself as the hub for cybersecurity reporting and calling out bad actors. For more information, subscribe to Check Call the newsletter or the podcast.  Follow the Check Call Podcast Other FreightWaves Shows Learn more about your ad choices. Visit megaphone.fm/adchoices

    To The Point - Cybersecurity
    How Cybersecurity Impacts Patient Care in Hospitals with Christian Dameff

    To The Point - Cybersecurity

    Play Episode Listen Later Nov 18, 2025 27:37


    Welcome to To the Point Cybersecurity podcast, brought to you by Forcepoint! This week, hosts Rachael Lyon and Jonathan Knepher are joined by Dr. Christian Dameff, the nation's very first Medical Director of Cybersecurity at UC San Diego Health. Dr. Dameff brings a unique perspective to the evolving intersection of healthcare, patient safety, and cybersecurity—combining his experience as an emergency physician, clinical informaticist, and self-proclaimed lifelong hacker. In this episode, we dive into the critical challenges faced by healthcare organizations, from bridging the gap between CISOs and clinical staff to the urgent realities of cyberattacks that threaten patient outcomes. Dr. Dameff shares real-world stories and research about the very tangible impact of ransomware on hospitals and patient care, emphasizing the need for interdisciplinary collaboration and evidence-based solutions. Whether you're a cybersecurity professional, a healthcare provider, or just interested in how digital threats are reshaping medicine, this episode promises insights into the balancing act between innovation, security, and saving lives. Hit play, subscribe, and join us as we get to the point—where cybersecurity meets patient care! For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e359

    Stories With Traction
    #173: Cybersecurity Meets Comedy: How Humor Builds Trust

    Stories With Traction

    Play Episode Listen Later Nov 18, 2025 31:04


    SHOW NOTES:In this episode, Matt Zaun sits down with Rob Black, Founder & CEO of Fractional CISO, to demystify cybersecurity for growing companies—without the fear-mongering. Rob explains how his team operates as a virtual CISO (security leader) to strengthen programs, enable enterprise sales, and translate “security-speak” into clear business outcomes.Rob shares why security shouldn't be priority #1 (sales and delivery come first), how to size up the risk when incidents are low-probability but high-impact, and why humor can drive far more adoption than dry policy memos.In this episode, they cover:✅ Prioritization reality: why cybersecurity should be priority 4–5—not 100✅ Humor that converts: skits, wigs, and why fun content outperforms stoic lectures✅ LinkedIn as referral fuel: staying top-of-mind vs. hard selling (and why neighbors all know what Rob does)…and much more.BIOS:Rob Black is the founder of Fractional CISO, where he and his team serve as virtual CISOs for companies. A veteran security leader with an MBA from Kellogg, Rob blends operator pragmatism with clear business storytelling, often using humor to drive adoption of best practices.Matt Zaun is an award-winning speaker and strategic storytelling expert who helps leaders inspire action and drive results through the power of story. He's the author of The StoryBank, a practical playbook for using narrative to build culture, boost sales, strengthen marketing, and become a dynamic public speaker.

    Bite Size Sales
    Why Your First VP of Sales Will Fail (And What To Do Instead) – Eyal Worthalter, Multi-Time VP of Sales, Cybersecurity Startups

    Bite Size Sales

    Play Episode Listen Later Nov 18, 2025 42:46 Transcription Available


    Send me a text (I will personally respond)Are you grappling with when, and who, to hire as your first sales leader in your cybersecurity startup? Wondering why sales leadership churn is so high, or if founders should keep selling longer? If you've debated hiring account executives versus a VP of Sales, and wrestled with investor pressure on scaling your sales team, this episode is for you.In this conversation, we discuss: 

    Cybercrime Magazine Podcast
    Cybercrime Wire For Nov. 18, 2025. Princeton Announces Database Breach. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Nov 18, 2025 1:19


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    MSP 1337
    Cybersecurity and Simplicity

    MSP 1337

    Play Episode Listen Later Nov 18, 2025 28:46


    Sitting down with Bobby Glen James of Boteka about the importance of simplicity in IT security for MSPs. Bobby shares lessons from decades in the industry, advocating for Lean IT practices, streamlined technology stacks, and a service-first approach that avoids hardware upselling and long-term contracts. Practical insights on risk management, prioritizing critical systems, and building resilient, client-focused MSP services.

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonAllow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform at https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    Grow Your Credit Union
    Don't Ask Me! Ask the Robots!

    Grow Your Credit Union

    Play Episode Listen Later Nov 18, 2025 32:59


    Read the shownotes and full transcript on our site: growyourcreditunion.com Want to learn more about SBS CyberSecurity? Watch this video or visit SBSCyber.com The credit unions succeeding with AI didn't wait for comprehensive vendor solutions or regulatory clarity. They started asking one question: what can employees do with AI today? In this episode of Grow Your Credit Union, host Joshua Barclay welcomes Raymond George, CIO of Clearview Federal Credit Union, as guest co-host, along with Chad Knutson, CEO of SBS Cybersecurity, to explore: Real AI use cases beyond the hype Why vendor management is such a struggle How AI can help you prepare for NCUA exams Why the chief AI officer might become your most important hire Want to know what credit union professionals are really saying about cybersecurity preparedness? SBS Cybersecurity surveyed credit union professionals nationwide about risk management, team support, and examiner expectations. Get the exclusive 2025 Executive Report: The State of Cybersecurity in Credit Unions for key trends, emerging risks, and practical steps you can take today. A huge thanks to our sponsor, SBS CyberSecurity SBS CyberSecurity partners with hundreds of credit unions across the U.S. to deliver tailored cybersecurity solutions that go beyond compliance. We understand the unique challenges credit unions face — limited resources, evolving threats, and increasing regulatory pressure. Our team speaks your language and knows your examiners. Learn more at SBSCyber.com

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Monday, November 17th, 2025: New(isch) Fortiweb Vulnerability; Finger and ClickFix

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Nov 17, 2025 7:10


    Fortiweb Vulnerability Fortinet, with significant delay, acknowledged a recently patched vulnerability after exploit attempts were seen publicly. https://isc.sans.edu/diary/Honeypot+FortiWeb+CVE202564446+Exploits/32486 https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/ https://fortiguard.fortinet.com/psirt/FG-IR-25-910?ref=labs.watchtowr.com Flnger.exe and ClickFix Attackers started to use the finger.exe binary to retrieve additional payload in ClickFix attacks https://isc.sans.edu/diary/Finger.exe%20%26%20ClickFix/32492