POPULARITY
Show Featured Sponsor: Precision Holsters:These guys have a lifetime, no questioned asked 100% guarantee. They are makers of high-quality holsters, belts, and magazine pouches. Visit them at: Precision Holsters and use code “seekAWS” for a discount. In this episode of the American Warrior Show, Rich Brown is joined by Andrew Frisbie (Practical Cyber Defense) to dig into the threats America faces in cyberspace—and how we must respond.
Relebogile Mabotja speaks to Vanessa Sekati a Cybersecurity Services Manager in the financial industry unpacking how in today’s digital age, cyber threats are no longer just an IT problem they are a personal risk that affects everyone, from schoolchildren to CEOs. According to the 2024 Interpol African Cyberthreat Assessment, South Africa experienced the highest number of cybercrime incidents on the continent, with over 230 million threat detections in a single year. 702 Afternoons with Relebogile Mabotja is broadcast live on Johannesburg based talk radio station 702 every weekday afternoon. Relebogile brings a lighter touch to some of the issues of the day as well as a mix of lifestyle topics and a peak into the worlds of entertainment and leisure. Thank you for listening to a 702 Afternoons with Relebogile Mabotja podcast. Listen live on Primedia+ weekdays from 13:00 to 15:00 (SA Time) to Afternoons with Relebogile Mabotja broadcast on 702 https://buff.ly/gk3y0Kj For more from the show go to https://buff.ly/2qKsEfu or find all the catch-up podcasts here https://buff.ly/DTykncj Subscribe to the 702 Daily and Weekly Newsletters https://buff.ly/v5mfetc Follow us on social media: 702 on Facebook https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702 See omnystudio.com/listener for privacy information.
In this high-stakes episode, we dive into the latest breaking national security developments. The Secret Service has uncovered a massive plot involving hundreds of thousands of SIM cards capable of disabling cell towers, 911 systems, and encrypted communications—potentially targeting U.S. leaders during the UN General Assembly in New York. We break down what this means, the ongoing investigation, and the implications for American cybersecurity in a world of nation-state threats. We also examine the strategic significance of Bagram Air Base in Afghanistan. With China, Iran, and Russia all maneuvering for influence, we analyze why reclaiming this base is critical for countering threats and maintaining global military leverage—and why fewer troops may still be enough to hold this tactical jewel. From cyber vulnerabilities to global military strategy, this episode gives a deep look at the complex threats facing the U.S. today and the bold moves being considered to keep America secure.
The Secret Service says it has dismantled a network of hundreds of servers capable of disrupting telecommunications as the UN General Assembly meets in Manhattan. Meanwhile, the City Council is preparing to vote on a controversial housing proposal in the Bronx that would create apartments for people leaving Rikers Island with serious medical needs. Also, Grammy-winning rapper Cardi B is lending her voice to MTA subway announcements, reminding riders to pay fares and follow safety rules. And NY1's Errol Louis joins us to break down the unusual four-way race for New York City mayor.
In this episode, we're uncovering the unusual side of cyber threat trends under the theme of AI and Cybersecurity: The Rise of False Bug Reports. This phenomenon is muddying the waters of vulnerability management, revealing new layers of complexity in cybersecurity defense. We look at what's driving the rise of false bug reports—and how to stay ahead of the curve.Try AI Box: https://aibox.aiAI Chat YouTube Channel: https://www.youtube.com/@JaedenSchaferJoin my AI Hustle Community: https://www.skool.com/aihustle
More than half of small to medium businesses in New Zealand experienced a cyber threat in the last six months. National Cyber Security Centre's Director Mission Enablement Mike Jagusch spoke to Corin Dann.
Welcome back to To the Point Cybersecurity Podcast, brought to you by Forcepoint! In this week's episode, co-hosts Rachael Lyon and Jonathan Knepher continue their conversation with Russell Teague, CISO at Fortified Health Security and a contributor to the White House National Cybersecurity Healthcare Strategy. With over three decades of experience spanning healthcare, tech, pharma, and finance, Russell dives deep into the current state of cybersecurity in the healthcare sector. In this insightful Part 2, the trio unpacks hot topics like the HIPAA Security Rule update, how budget uncertainty is creating decision paralysis for healthcare organizations, and the real-world impact this has on cyber preparedness. Russell discusses the importance—and challenges—of moving toward a secure-by-design approach for medical devices, the complexities of third-party and even fourth- and fifth-party risk, and why building strong vendor relationships and risk management programs has never been more critical. Looking to the future, they also tackle the role of AI and workforce shortages in healthcare cybersecurity, highlighting how AI could help close the security gap and how new talent—whether from the military, clinics, or other backgrounds—can find a path into this essential field. If you're interested in where healthcare cybersecurity is heading and want practical advice straight from a top expert, this episode is packed with insights you won't want to miss. Be sure to hit that subscribe button so you never miss an episode of To the Point Cybersecurity! For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e346
In this episode, we're continuing a series focused on malware from the IJIS Institute's Cybersecurity Working Group and their JusticeGuardian series—this time, the group dives into the topic of cyber threat actors, the people who are behind the creation and distribution of malware. We once again welcome back host Larry Zorio, Chair of the Cybersecurity Working Group, along with returning member Jeramy Cooper-Leavitt. Together, they discuss what motivates them, why they are using malware, what the actors gain from it, and more.
On this episode of To the Point Cybersecurity Podcast, hosts Rachel Lyon and Jonathan Knepher dive deep into the evolving threat landscape in healthcare cybersecurity with special guest Russell Teague, CSO at Fortified Health Security. With over three decades of experience across sectors like healthcare, pharma, and finance—and as a contributor to the White House National Cybersecurity Healthcare Strategy—Russell brings incredibly valuable insights to the table. Together, they unpack the most pressing cyber threats facing healthcare organizations today, including ransomware as a service, third-party risks, and the growing impact of AI on both offense and defense. Russell discusses the unique challenges rural and small healthcare providers face, the critical importance of operational resiliency and incident readiness, and why data management remains a top priority in protecting patient information. Tune in for practical advice, free resources, and expert analysis of what's needed to stay ahead of attackers in one of the world's most targeted industries. Whether you're a cybersecurity professional, healthcare leader, or just interested in the intersection of technology and patient care, this episode is packed with insights you won't want to miss. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e345
In this episode of The Cyber Threat Perspective, we're diving into one of the most pressing trends in cybersecurity: how threat actors are using AI. From deepfake scams and AI-generated phishing emails to automated malware and voice cloning, attackers are leveraging artificial intelligence to scale their operations and sharpen their tactics. We'll break down real-world examples, tools like WormGPT, and what this means for defenders going forward.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com
In this episode of Reimagining Cyber, host Rob Aragao sits down with cybersecurity executive and domain security expert Ihab Shraim to spotlight one of the most overlooked yet critical areas of cyber risk—fraudulent domain registrations and DNS hijacking. As the digital attack surface expands, bad actors are exploiting unmonitored domain portfolios and exposed DNS infrastructure to launch phishing campaigns, malware distribution, and business email compromise—all while flying under the radar of traditional security tools.Ihab explains why domain risk is a foundational weakness in many organizations' security postures and argues that without domain security, cybersecurity is incomplete. From shadow IT and orphaned domains to poor DNS hygiene and lack of domain portfolio governance, Ihab outlines the blind spots that make companies vulnerable—and provides actionable strategies CISOs and security leaders must adopt to regain control.Whether you're managing brand reputation, protecting customer trust, or looking to tighten your security fundamentals, this episode delivers an eye-opening exploration into why domain risk needs to be a board-level conversation.Key Takeaways:Why domain name portfolios are a high ROI target for cybercriminalsThe dangers of DNS exposure and subdomain hijackingHow social media abuse and unauthorized resellers magnify brand riskWhy domain monitoring, locking, and defensive registrations are essentialThe case for making CISOs accountable for domain strategy and protectionFollow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.
Video - https://youtu.be/d9ohtkGZUhQWhat if the biggest threat to your online safety wasn't just phishing—but something even more absurd? In this witty yet eye-opening cyber parody, we introduce "Phloging," a hilarious take on the careless habits that put your privacy at risk. It's funny, relatable, and just uncomfortable enough to make you rethink your next click. Trust us—you'll laugh, then double-check your inbox.I used ChatGPT-4o, ScreenPal, and Pictory.ai to put this information together.If you're interested in trying Pictory.ai please use the following link. https://pictory.ai?ref=t015o
Joining the podcast this week is Dmitry Bestuzhev, senior director of cyber threat intelligence (CTI) at Blackberry. He gives Petko an inside look into the key types of CTI and how the insights can be used to build context and determine response in specific circumstances, such as in the recent case of attempted targets at NATO. Dmitry also turns our attention to the risks posed by public charging stations - a ploy dubbed “Juice Jacking.” Dmitry Bestuzhev, Senior Director CTI at BlackBerry Dmitry Bestuzhev is Senior Director, CTI (Cyber Threat Intelligence) at BlackBerry. Prior to BlackBerry, Dmitry was Head of Kaspersky's Global Research and Analysis Team for Latin America, where he oversaw the company's experts' anti-malware development work in the region. Dmitry has more than 20 years of experience in IT security across a wide variety of roles. His field of expertise covers everything from traditional online fraud to targeted high-profile attacks on financial and governmental institutions. His main focus in research is on producing Threat Intelligence reports on financially motivated targeted attacks. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e341
Cybersecurity leader Nigel Boston joins the Stats On Stats podcast to share how threat intelligence, discipline, and authenticity transformed his career. From warehouse work to leading in cyber, his journey is a testament to intentional growth and giving back to the community.Guest ConnectLinkedIn: https://www.linkedin.com/in/nigelbboston Stats on Stats ResourcesCode & Culture: https://www.statsonstats.io/flipbooks | https://www.codeculturecollective.io Merch: https://www.statsonstats.io/shop LinkTree: https://linktr.ee/statsonstatspodcast Stats on Stats Partners & AffiliatesHacker HaltedWebsite: https://hackerhalted.com/ Use Discount Code: "
Text us a pool question!In this episode of the Talking Pools podcast, hosts Steve and Wayne discuss various topics related to pool maintenance, including the importance of reliable staffing, the impact of ransomware attacks on the industry, and the significance of effective water testing. They emphasize the need for strong cybersecurity measures, especially in light of recent attacks, and the importance of clear communication with clients regarding pool maintenance expectations. The conversation also touches on the challenges posed by weather conditions and the necessity of understanding pool chemistry for effective maintenance.takeawaysSteve shares his recent wedding experience in Turks and Caicos.Reliable staffing is crucial for business continuity during personal events.Ransomware attacks can affect any business with technology.Cybersecurity is essential for protecting business operations.Weather significantly impacts pool maintenance and water quality.Proper water testing is vital for pool health and safety.Communication with clients about pool conditions is key.The cost of maintaining pools can vary significantly.Understanding pool chemistry is essential for effective maintenance.Evaluating client relationships is important for business sustainability.Sound Bites"Congratulations, Steve and Janet.""Ransomware affects anyone with tech going on.""Is it worth it for me to send a guy out there?"Chapters00:00Celebrating New Beginnings02:38The Importance of Reliable Staffing04:58Navigating Ransomware Attacks10:41The Significance of Proper Pool Maintenance23:52Understanding Water Chemistry30:47The Dangers of Cheap Testing Kits36:34Client Communication and Expectations42:15Evaluating Client Relationships Support the showThank you so much for listening! You can find us on social media: Facebook Instagram Tik Tok Email us: talkingpools@gmail.com
Joining the podcast this week is Dmitry Bestuzhev, senior director of cyber threat intelligence (CTI) at Blackberry. He gives Petko an inside look into the key types of CTI and how the insights can be used to build context and determine response in specific circumstances, such as in the recent case of attempted targets at NATO. Dmitry also turns our attention to the risks posed by public charging stations - a ploy dubbed “Juice Jacking.” Dmitry Bestuzhev, Senior Director CTI at BlackBerry Dmitry Bestuzhev is Senior Director, CTI (Cyber Threat Intelligence) at BlackBerry. Prior to BlackBerry, Dmitry was Head of Kaspersky's Global Research and Analysis Team for Latin America, where he oversaw the company's experts' anti-malware development work in the region. Dmitry has more than 20 years of experience in IT security across a wide variety of roles. His field of expertise covers everything from traditional online fraud to targeted high-profile attacks on financial and governmental institutions. His main focus in research is on producing Threat Intelligence reports on financially motivated targeted attacks. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e340
Cyber threat intelligence (CTI) is no longer just a technical stream of indicators or a feed for security operations center teams. In this episode, Ryan Patrick, Vice President at HITRUST; John Salomon, Board Member at the Cybersecurity Advisors Network (CyAN); Tod Beardsley, Vice President of Security Research at runZero; Wayne Lloyd, Federal Chief Technology Officer at RedSeal; Chip Witt, Principal Security Analyst at Radware; and Jason Kaplan, Chief Executive Officer at SixMap, each bring their perspective on why threat intelligence must become a leadership signal that shapes decisions far beyond the security team.From Risk Reduction to OpportunityRyan Patrick explains how organizations are shifting from compliance checkboxes to meaningful, risk-informed decisions that influence structure, operations, and investments. This point is reinforced by John Salomon, who describes CTI as a clear, relatable area of security that motivates chief information security officers to exchange threat information with peers — cooperation that multiplies each organization's resources and builds a stronger industry front against emerging threats.Real Business ContextTod Beardsley outlines how CTI can directly support business and investment moves, especially when organizations evaluate mergers and acquisitions. Wayne Lloyd highlights the importance of network context, showing how enriched intelligence helps teams move from reactive cleanups to proactive management that ties directly to operational resilience and insurance negotiations.Chip Witt pushes the conversation further by describing CTI as a business signal that aligns threat trends with organizational priorities. Jason Kaplan brings home the reality that for Fortune 500 security teams, threat intelligence is a race — whoever finds the gap first, the defender or the attacker, determines who stays ahead.More Than DefenseThe discussion makes clear that the real value of CTI is not the data alone but the way it helps organizations make decisions that protect, adapt, and grow. This episode challenges listeners to see CTI as more than a defensive feed — it is a strategic advantage when used to strengthen deals, influence product direction, and build trust where it matters most.Tune in to hear how these leaders see the role of threat intelligence changing and why treating it as a leadership signal can shape competitive edge.________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of both the Random and Unscripted Podcast and On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Want to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website.
Cyber threat intelligence (CTI) is no longer just a technical stream of indicators or a feed for security operations center teams. In this episode, Ryan Patrick, Vice President at HITRUST; John Salomon, Board Member at the Cybersecurity Advisors Network (CyAN); Tod Beardsley, Vice President of Security Research at runZero; Wayne Lloyd, Federal Chief Technology Officer at RedSeal; Chip Witt, Principal Security Analyst at Radware; and Jason Kaplan, Chief Executive Officer at SixMap, each bring their perspective on why threat intelligence must become a leadership signal that shapes decisions far beyond the security team.From Risk Reduction to OpportunityRyan Patrick explains how organizations are shifting from compliance checkboxes to meaningful, risk-informed decisions that influence structure, operations, and investments. This point is reinforced by John Salomon, who describes CTI as a clear, relatable area of security that motivates chief information security officers to exchange threat information with peers — cooperation that multiplies each organization's resources and builds a stronger industry front against emerging threats.Real Business ContextTod Beardsley outlines how CTI can directly support business and investment moves, especially when organizations evaluate mergers and acquisitions. Wayne Lloyd highlights the importance of network context, showing how enriched intelligence helps teams move from reactive cleanups to proactive management that ties directly to operational resilience and insurance negotiations.Chip Witt pushes the conversation further by describing CTI as a business signal that aligns threat trends with organizational priorities. Jason Kaplan brings home the reality that for Fortune 500 security teams, threat intelligence is a race — whoever finds the gap first, the defender or the attacker, determines who stays ahead.More Than DefenseThe discussion makes clear that the real value of CTI is not the data alone but the way it helps organizations make decisions that protect, adapt, and grow. This episode challenges listeners to see CTI as more than a defensive feed — it is a strategic advantage when used to strengthen deals, influence product direction, and build trust where it matters most.Tune in to hear how these leaders see the role of threat intelligence changing and why treating it as a leadership signal can shape competitive edge.________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of both the Random and Unscripted Podcast and On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Want to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website.
Wilson Patton, Solutions Architect for Trellix, demonstrates how their four-pillar Gen-AI framework transforms incident alerts into actionable intelligence.Topics Include:Wilson Patton: Trellix Solutions Architect, 20 years government experienceWitnessed evolution from basic firewalls to zero trust architecturesTrellix combines McAfee and FireEye heritage and capabilitiesAI integration isn't new - machine learning embedded for yearsPartnership with AWS Bedrock accelerates Gen-AI development capabilities2014: Developed Impossible Travel Analytic for anomaly detection2016: Launched Guided Investigations framework for SOC analysts2023: Introduced AI Guided Investigations with contextual understanding64% of public sector exploring AI adoption activelyOnly 21% have requisite data ready for trainingGen-AI won't magically clean up messy, siloed data74% of executives doubt AI information accuracy currentlyMonday morning alert queue: 76 high, 318 medium alertsAdversaries steal credentials 90 days before major incidentsCritical breadcrumbs hidden in low-priority informational alerts1000+ data-driven investigative questions developed over eight yearsSkilled analysts take too long reading all answersAutomate analysis, distill thousands down to ten critical alertsFour foundational pillars for effective, trustworthy Gen-AI implementationCybersecurity expertise essential - Gen-AI is just a toolFrameworks ensure reliability and consistent prompting for productionMultiple LLM models tested through AWS Bedrock platformQuality diverse datasets required for accurate question answeringGood prompts combine evidence, context, and comprehensive informationTesting shows order of magnitude price differences between modelsNova Micro provides cost-effective results for many scenariosPrompt engineering superior to fine-tuning for avoiding biasAgentic AI performs multi-step investigations with live dataStrategic model choice based on specific requirements and costsTransparent audit trails mandatory for government compliance requirements Participants:Wilson Patton – Solutions Architect, TrellixFurther Links:Website: https://www.trellix.comTrellix in the AWS MarketplaceSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/
Risk-based prioritising using severity scoring and patch analysisEscaping the silo trap - bridging the gap between IT and security teamsAutomate rules to handle high-severity vulnerabilities and zero-daysJonathan Craven, Host, teissTalkhttps://www.linkedin.com/in/jonathanbcraven/Tiago Rosado, Chief Information Security Officer, Asitehttps://www.linkedin.com/in/tiagorosado/Cameron Brown, Head of Cyber Threat and Risk Analytics, Ariel Rehttps://www.linkedin.com/in/analyticalcyber/York von Eichel-Streiber, Product Marketing Manager, NinjaOnehttps://www.linkedin.com/in/york-von-eichel-streiber-50552b9b
As Chair Powell testifies on Capitol Hill, BNY's Vince Reinhart offers insight into what it means for the Fed path and investor expectations. Victoria Greene of G Squared breaks down the market positioning. FedEx and AeroVironment earnings. Former Pentagon official Roger Zakheim weighs in on the state of ceasefire efforts in the Middle East while Crowdstrike CEO George Kurtz joins to talk the rising cyber threats coming from Iran. More on the wild moves in the energy market with Again Capital's John Kilduff.
This show has been flagged as Clean by the host. Out of nowhere, my Firefox browser on my Mac mini started automatically adding every page I visited to my bookmarks. At first, I thought it was a bug after recent update —maybe a misconfigured setting or similar. But when I searched for a fix, Google suggested something alarming: Scan for malware. And guess what? The source of my trouble turned out to be an 4 SVG files hiding malicious code. That's right—those innocent-looking vector graphics files we use every day for logos, icons, and web design? They can secretly carry malware. In my case those were the files, a logos of reputable delivery companies like deliveroo and JustEat which I have downloaded while I was updating a website for my client. Today, we're breaking down how SVG files are being weaponized, why they're so effective, and how to protect yourself. example of svg file Provide feedback on this episode.
Rich is joined by Alex Swoyer—attorney and legal affairs reporter for The Washington Times—to discuss the controversial federal court decision ordering the release of Mahmoud Khalil, a figure tied to terror-related concerns. With the Trump administration considering deportation action, the case raises serious questions about national security and judicial oversight. Marine veteran and founder of Post Traumatic Winning, Michael McNamara, shares his battle-tested approach to dealing with post-traumatic stress—offering raw, practical insight not just for veterans, but for anyone dealing with deep emotional trauma. Then, former CIA cybersecurity expert and Secure Anchor CEO Eric Cole breaks down the growing risk of Iranian cyberattacks targeting U.S. infrastructure and private industry. He explains why digital warfare may be Iran's next move—and how America can stay ahead. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Due to the escalating situation in Israel, we held an emergency panel to explore: - What is happening on the ground - What we can expect in the coming days - The situation here in America - The changing dynamics of modern warfare On our panel, we had: Rosh Yeshiva of Talmudic University of Florida, Rabbi Akiva Zweig. Former Chief Scientist of the US Army Research Laboratory, Dr. Alexander Kott. Chief Science Officer and Cofounder of the Network Contagion Research Institute, Dr. Joel Finkelstein. Board-certified adult and geriatric psychiatrist, Dr. Marc Agronin. Cyber Threat & Open-Source Intelligence Analyst, Travis Hawley.
Send us a textToday's episode offers a comprehensive overview of Cyber Threat Exposure Management (CTEM), defining it as a proactive framework for continuously evaluating digital and physical asset accessibility, exposure, and exploitability. It clarifies foundational cybersecurity concepts such as vulnerabilities, attack surface, threats, and impact, explaining how their interplay creates exposure. The speaker categorizes various types of exposure, from internet-facing systems to data leakage and phishing susceptibility, emphasizing the expanding attack surface due to interconnected IT infrastructure. Furthermore, the discussion elaborates on exposure management processes and related technologies, including vulnerability scanning, patch management, penetration testing, breach and attack simulation, and external attack surface management, alongside an explanation of how these tools are evolving to support a more unified CTEM approach. Finally, the transcript explores how Artificial Intelligence (AI) is enhancing CTEM through automated discovery, smarter prioritization, intelligent remediation, and enhanced automation.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Forecast = Stormy with a chance of TikTok malware showers—exploit scoring systems hot, but patch management outlook remains partly cloudy. Welcome to Storm⚡️Watch! In this episode, we're diving into the current state of cyber weather with a mix of news, analysis, and practical insights. This week, we tackle a fundamental question: are all exploit scoring systems bad, or are some actually useful? We break down the major frameworks: **CVSS (Common Vulnerability Scoring System):** The industry standard for assessing vulnerability severity, CVSS uses base, temporal, and environmental metrics to give a comprehensive score. It's widely used but has limitations—especially since it doesn't always reflect real-world exploitability. **Coalition Exploit Scoring System (ESS):** This system uses AI and large language models to predict the likelihood that a CVE will be exploited in the wild. ESS goes beyond technical severity, focusing on exploit availability and usage probabilities, helping organizations prioritize patching with better accuracy than CVSS alone. **EPSS (Exploit Prediction Scoring System):** EPSS is a data-driven approach that estimates the probability of a vulnerability being exploited, using real-world data from honeypots, IDS/IPS, and more. It updates daily and helps teams focus on the most urgent risks. **VEDAS (Vulnerability & Exploit Data Aggregation System):** VEDAS aggregates data from over 50 sources and clusters vulnerabilities, providing a score based on exploit prevalence and maturity. It's designed to help teams understand which vulnerabilities are most likely to be actively exploited. **LEV/LEV2 (Likely Exploited Vulnerabilities):** Proposed by NIST, this metric uses historical EPSS data to probabilistically assess exploitation, helping organizations identify high-risk vulnerabilities that might otherwise be missed. **CVSS BT:** This project enriches CVSS scores with real-world threat intelligence, including data from CISA KEV, ExploitDB, and more. It's designed to help organizations make better patching decisions by adding context about exploitability. Next, we turn our attention to a troubling trend: malware distribution via TikTok. Attackers are using AI-generated videos, disguised as helpful software activation tutorials, to trick users into running malicious PowerShell commands. This “ClickFix” technique has already reached nearly half a million views. The malware, including Vidar and StealC, runs entirely in memory, bypassing traditional security tools and targeting credentials, wallets, and financial data. State-sponsored groups from Iran, North Korea, and Russia have adopted these tactics, making it a global concern. For employees, the takeaway is clear: never run PowerShell commands from video tutorials, and always report suspicious requests to IT. For IT teams, consider disabling the Windows+R shortcut for standard users, restrict PowerShell execution, and update security awareness training to include social media threats. We also highlight the latest from Censys, VulnCheck, runZero, and GreyNoise—industry leaders providing cutting-edge research and tools for vulnerability management and threat intelligence. Don't miss GreyNoise's upcoming webinar on resurgent vulnerabilities and their impact on organizational security. And that's a wrap for this episode! We will be taking a short break from Storm Watch for the summer. We look forward to bringing more episodes to you in the fall! Storm Watch Homepage >> Learn more about GreyNoise >>
Cybersecurity is a shared responsibility that requires strong partnerships between governments and businesses. Governments, therefore, face the challenge of adapting to a world where – in the cyber domain – the state is not the sole provider of intelligence or security, and private sector emerges as a cyber intelligence actor. In this Podcast episode, eGA's Head of Cybersecurity Merle Maigre speaks with Jack McCurley, a senior intelligence consultant at Recorded Future, about what it takes to build national resilience when the threats are global and decentralised. “Threat actors are networked. If defenders aren't, we're already behind,” he says. A first look, here, into the tools and public-private cooperation in cyber threat intelligence sharing reshaping cybersecurity from the inside out. All in anticipation of the e-Governance Conference 2025 session on public-private partnerships on the matter, where today's speakers will be joined by Liga Raita Rozentale and Nerses Yeritsyan to discuss how shared responsibility can be turned into shared defence.
Cyber attacks against public safety agencies are rising, with 324 confirmed globally in 2024, including 25 complete system shutdowns. The Public Safety Threat Alliance, established by Motorola Solutions, is a cyber threat Information Sharing and Analysis Organization (ISAO) recognized by CISA that provides actionable intelligence to public safety agencies across the globe to improve their resilience and defense capabilities. Membership in the PSTA is open to all public safety agencies, and there is no cost to join for public sector organizations. In this episode of the Policing Matters podcast, part of a special report from Motorola Solutions Summit 2025, host Jim Dudley speaks with William DeCoste, STARS Program Manager and Telecommunications Engineer Manager with the Virginia State Police Communications Division and Jay Kaine, the Director of Threat Intelligence at Motorola Solutions. They tackle the direct effect cyber attacks can have on public safety agencies and the collaborative efforts underway to combat them. About our sponsor This episode of the Policing Matters podcast is sponsored by Motorola Solutions.
Three Buddy Problem - Episode 45: (The buddies are trapped in timezone hell with cross-continent travel this week). In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It's a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging information gaps between adversaries. Includes talk on the ethical challenges in CTI, questioning the impact of intelligence-sharing and how cyber operations affect real-world conflicts. He pointed to Ukraine and Israel as examples where CTI plays a critical, yet complicated, role. His message: cybersecurity pros need to be aware of the real-world consequences of their work and the ethical responsibility that comes with it. Acknowledgment: Credit for the audio goes to CyberThreat 2023, SANS Institute, NCSC, and SentinelOne. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).
In episode 134 of Cybersecurity Where You Are, Sean Atkinson is joined by Randy Rose, VP of Security Operations & Intelligence at the Center for Internet Security® (CIS®); and Timothy Davis, Lead Cyber Threat Intelligence (CTI) Analyst at CIS. Together, they discuss how generative artificial intelligence (GenAI) lowers the barrier of entry for cyber threat actors (CTAs). Here are some highlights from our episode:01:37. CTAs' use of GenAI to improve their existing campaigns03:38. The need for CTI teams to look beyond language in analyzing GenAI-enabled threats07:22. The evolving impact of GenAI on phishing campaigns, malware development, deepfakes, and malicious Artificial Intelligence as a Service (AIaaS) offerings12:28. How GenAI increases the the speed at which CTAs can scale their efforts17:29. Technical barriers and other limitations that shape CTAs' use of GenAI22:46. A historical perspective of AI-enabled cybersecurity and how GenAI can support cybersecurity awareness training26:50. The cybersecurity benefits of AI and machine learning (ML) capabilities for clustering data29:05. What the future might hold for GenAI from an offensive and defensive perspectiveResourcesThe Evolving Role of Generative Artificial Intelligence in the Cyber Threat LandscapeEpisode 89: How Threat Actors Are Using GenAI as an EnablerEpisode 95: AI Augmentation and Its Impact on Cyber Defense12 CIS Experts' Cybersecurity Predictions for 2025CIS Critical Security Controls®Multi-State Information Sharing and Analysis Center®If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
2/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD. 1930
GOOD EVENING: The show begins in kashmir along the line of control...Good evening: The show begins in Kashmir along the Line of Control... 1947 PARTITION CBS EYE ON THE WORLD WITH JOHN BATCHELOR FIRST HOUR 9:00-9:15 1/2: #KASHMIR: FOREBODING AT THE LINE OF CONTROL. BILL ROGGIO, FDD. HUSAIN HAQQANI, HUDSON INSTITUTE. 9:15-9:30 2/2: #KASHMIR: FOREBODING AT THE LINE OF CONTROL. BILL ROGGIO, FDD. HUSAIN HAQQANI, HUDSON INSTITUTE. 9:30-9:45 #UKRAINE: WHAT IS NEEDED. JOHN HARDIE, BILL ROGGIO, FDD 9:45-10:00 #UKRAINE: PUTIN FOOT-DRAGGING. JOHN HARDIE, BILL ROGGIO, FDD SECOND HOUR 10:00-10:15 #ISRAEL: MARCH OF THE LIVING 2025. MALCOLM HOENLEIN @CONF_OF_PRES @MHOENLEIN1 @THADMCCOTTER @THEAMGREATNESS 10:15-10:30 #ANTISEMITISM: HARVARD 300 PAGE REPORT INADEQUATE. MALCOLM HOENLEIN @CONF_OF_PRES @MHOENLEIN1 @THADMCCOTTER @THEAMGREATNESS 10:30-10:45 1/2: #HARVARD: WHAT IS TO BE DONE? PETER BERKOWITZ, HOOVER INSTITUTION 10:45-11:00 2/2: #HARVARD: WHAT IS TO BE DONE? PETER BERKOWITZ, HOOVER INSTITUTION THIRD HOUR 11:00-11:15 #PRC: DID THE US AND EU BANKS SEE THE BUBBLE? ANNE STEVENSON-YANG, @GORDONGCHANG, GATESTONE, NEWSWEEK, THE HILL 11:15-11:30 #USS IOWA: REMEMBERING THE GUN TURRET TRAGEDY. JAMES HOLMES, @GORDONGCHANG, GATESTONE, NEWSWEEK, THE HILL 11:30-11:45 #PRC: WASHING CHINA EXPORTS TO THE US. CHARLES ORTEL, @GORDONGCHANG, GATESTONE, NEWSWEEK, THE HILL 11:45-12:00 #CIA: INEXPLICABLE HOLLYWOOD MELODRAMA RECRUITING. GRANT NEWSHAM, "WHEN CHINA ATTACKS." FOURTH HOUR 12:00-12:15 #NEWWORLDREPORT: BOMB PLOT RIO. JOSEPH HUMIRE @JMHUMIRE @SECUREFREESOC. ERNESTO ARAUJO, FORMER FOREIGN MINISTER REPUBLIC OF BRAZIL. #NEWWORLDREPORTHUMIRE 12:15-12:30 #NEWWORLDREPORT: EBBING PINK TIDE. JOSEPH HUMIRE @JMHUMIRE @SECUREFREESOC. ERNESTO ARAUJO, FORMER FOREIGN MINISTER REPUBLIC OF BRAZIL. #NEWWORLDREPORTHUMIRE 12:30-12:45 1/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD. 12:45-1:00 AM 2/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD.
1/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD. OCTOBER 1931
CyberIntel - Talking Cybersecurity and Compliance (Presented by VikingCloud)
In this episode of VikingCloud's CyberIntel, Brian Odian discusses the findings of the 2025 Cyber Threat Landscape Report.
This Week in Machine Learning & Artificial Intelligence (AI) Podcast
Today, we're joined by Nidhi Rastogi, assistant professor at Rochester Institute of Technology to discuss Cyber Threat Intelligence (CTI), focusing on her recent project CTIBench—a benchmark for evaluating LLMs on real-world CTI tasks. Nidhi explains the evolution of AI in cybersecurity, from rule-based systems to LLMs that accelerate analysis by providing critical context for threat detection and defense. We dig into the advantages and challenges of using LLMs in CTI, how techniques like Retrieval-Augmented Generation (RAG) are essential for keeping LLMs up-to-date with emerging threats, and how CTIBench measures LLMs' ability to perform a set of real-world tasks of the cybersecurity analyst. We unpack the process of building the benchmark, the tasks it covers, and key findings from benchmarking various LLMs. Finally, Nidhi shares the importance of benchmarks in exposing model limitations and blind spots, the challenges of large-scale benchmarking, and the future directions of her AI4Sec Research Lab, including developing reliable mitigation techniques, monitoring "concept drift" in threat detection models, improving explainability in cybersecurity, and more. The complete show notes for this episode can be found at https://twimlai.com/go/729.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Bipartisan push for renewal of cyberthreat information sharing law ClickFix becoming a favorite amongst state-sponsored hackers GoDaddy puts Zoom on mute for about 90 minutes Thanks to this week's episode sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, And helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines. Find the stories behind the headlines at CISOseries.com
Cybersecurity threats are evolving rapidly, and organizations of all sizes are vulnerable. While leaders are already navigating countless uncertainties, cyber threats represent a unique challenge that can bring business operations to a halt, causing significant financial damage and operational chaos.Find the full show notes at: https://workmatters.com/How-Cyber-Threat-Intelligence-Can-Protect-Your-Organization-with-Mary-DAngelo
Forecast = Scattered exploits, Mirai storms brewing, and rogue drones dropping malware over Russia. Keep your firewalls up—a vulnerability front is rolling in fast! On this episode of Storm⚡️Watch, we're bringing you a packed episode that covers the latest in cyber threat intelligence, industry news, and a few stories you won't want to miss. We kick things off with our usual round of introductions and a quick look at the cyber weather, setting the stage for what's happening across the threat landscape. In our first segment, Tod shares his wrap-up from VulnCon 2025, highlighting the key takeaways and emerging trends from this year's conference. From new vulnerability research to the latest in exploit techniques, Tod breaks down what security professionals need to know and what's likely to shape the industry in the coming months. Next up, we sit down with Tracy Z. Maleeff, better known as InfosecSherpa, for an interview that traces her journey from librarian to cybersecurity professional. Tracy shares insights on career pivots, the importance of information literacy in security, and her ongoing work to make the field more accessible. Her story is a must-listen for anyone considering a move into cyber or looking for inspiration from someone who's successfully navigated the transition. We then turn our attention to a headline-grabbing story out of Ukraine, where reports indicate that drones sent into Russian territory are not just for surveillance or kinetic impact—they're also carrying malware designed to infect military systems if captured. This blend of physical and cyber warfare is a stark reminder of how modern conflicts are increasingly fought on multiple fronts, with digital payloads now as critical as traditional munitions. If we need to fill a little extra time, we'll explore some of the more bizarre aspects of hybrid warfare, including reports of weaponized consumer goods—think exploding sex toys and cosmetics—being used as part of psychological and disruption campaigns targeting the West. It's a strange new world where almost anything can be turned into a tool of conflict. We also spotlight recent research from Censys on the Salt Typhoon attacks, which underscore the need for advanced defenses as attackers continue to exploit edge devices and cloud infrastructure. Their findings highlight the importance of proactive monitoring and rapid response to emerging threats. On the GreyNoise front, we've observed a threefold surge in exploitation attempts targeting TVT DVRs, likely linked to Mirai botnet activity. This uptick is a clear signal that attackers are constantly scanning for vulnerable devices to conscript into their botnets, and it's a reminder for defenders to stay vigilant and patch exposed systems. As always, we wrap up with a round of goodbyes and a reminder to subscribe for more insights, interviews, and real-time threat intelligence. Thanks for tuning in to Storm⚡️Watch—where we keep you ahead of the cyber storms. Storm Watch Homepage >> Learn more about GreyNoise >>
If you're enjoying the content, please like, subscribe, and comment! Please consider supporting the show! https://creators.spotify.com/pod/show/worldxppodcast/supportJoin our Women in CTI Slack channel here: https://filigran-community.slack.com/archives/C07T52JK3Q9Mary D'Angelo is a Cyber Threat Intelligence Solutions Lead at Filigran, where she helps organizations operationalize threat intelligence and bridge the gap between CTI teams and executive decision-makers. She's also a recognized thought leader and mentor in the InfoSec community, dedicated to democratizing intelligence and guiding the next generation of cybersecurity professionals.Mary is an active contributor to global cybersecurity initiatives, including the Dagstuhl Seminar and the Tortora Bradya Institute, and frequently speaks at industry events to advance collaboration and innovation in the field.______________________Follow us!@worldxppodcast Instagram - https://bit.ly/3eoBwyr@worldxppodcast Twitter - https://bit.ly/2Oa7BzmSpotify - http://spoti.fi/3sZAUTGYouTube - http://bit.ly/3rxDvUL#cybersecurity #cybercrime #cyberthreats #scam #darkweb #internet #safety #password #protection #explore #explorepage #podcastshow #longformpodcast #longformpodcast #podcasts #podcaster #newpodcast #podcastshow #podcasting #newshow #worldxppodcast
This week's Pipeliners Podcast episode is a rebroadcast of Episode 237 featuring host Russel Treat walking through how each individual pipeliner should think about pipeline cyber security as it relates to supporting their operation. The episode centers on three key areas of threats, understanding, and mitigation. Russel goes into deep detail about cybersecurity threats, the importance of understanding what the nature of the environment is, and how to have healthy cyber hygiene. In this episode, you will learn the language of cybersecurity professionals, as well as how to reduce your chances of being cyber attacked by controlling your personal risk and personal mitigations by identifying phishing, using VPNs, and having proper password management.
Geoff White is an author, speaker, and investigative journalist. In this episode, he joins host Melissa O'Leary to discuss the ByBit hack and the broader North Korean cyber threat, including how the country's hackers developed their skills, the IT-worker issue that corporate America is facing, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com
This week on The International Risk Podcast, Dominic Bowen sits down with John Bruce, an expert in cybersecurity law and policy, to explore the evolution of state-sponsored cyber activity, and what these developments mean for businesses and governments worldwide.Cyber operations have changed significantly over the last few decades. Once highly targeted and discreet, state-sponsored cyber activities are now more opportunistic, widespread, and increasingly damaging. In this episode, John breaks down how governments attribute cyberattacks, the blurring lines between cybercrime and intelligence operations, and what this shift means for cyber defense strategies in both the public and private sectors.John Bruce is the former General Counsel for Field Effect Software Inc., a cybersecurity firm based in Ottawa. Before this role, he spent 22 years with the Department of Justice Canada, providing legal counsel and strategic policy advice on cybersecurity programs and operations. He currently teaches cybersecurity and cyber operations law and policy as an adjunct professor at Carleton University's Norman Paterson School of International Relations and a visiting professor at the University of Ottawa. He is also an Associate Fellow in the Cyber Security Program at the International Institute for Strategic Studies and a Senior Fellow at the Centre for International Governance Innovation, focusing on international cybersecurity law and governance. John holds an LL.B. and an LL.M. in law and technology.The International Risk Podcast is a must-listen for senior executives, board members, and risk advisors. This weekly podcast dives deep into international relations, emerging risks, and strategic opportunities. Hosted by Dominic Bowen, Head of Strategic Advisory at one of Europe's top risk consulting firms, the podcast brings together global experts to share insights and actionable strategies.Dominic's 20+ years of experience managing complex operations in high-risk environments, combined with his role as a public speaker and university lecturer, make him uniquely positioned to guide these conversations. From conflict zones to corporate boardrooms, he explores the risks shaping our world and how organisations can navigate them.The International Risk Podcast – Reducing risk by increasing knowledge. Follow us on LinkedIn for all our great updates.Tell us what you liked!
In this episode, Chris Sadlowski speaks live at the Inch360 event in Spokane, Washington. Chris, with over 20 years of experience in the FBI, discusses the evolving landscape of cyber threats, common and emerging methods of cyberattack, and the significant risks posed by state-sponsored actors, criminal networks, and the personal impacts of cybercrime on individuals. He also touches on the importance of preparedness and effective communication in the cybersecurity realm, emphasizing the collective role in safeguarding against these threats. We're thrilled to be sponsored by IXL. IXL's comprehensive teaching and learning platform for math, language arts, science, and social studies is accelerating achievement in 95 of the top 100 U.S. school districts. Loved by teachers and backed by independent research from Johns Hopkins University, IXL can help you do the following and more:Simplify and streamline technologySave teachers' timeReliably meet Tier 1 standardsImprove student performance on state assessments
In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with insights from Scott Wright. Additionally, we discuss the recent changes to Firefox's privacy policy and what it means for user data. ** […] The post Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes appeared first on Shared Security Podcast.
(00:00) - Introduction to Automotive Cybersecurity(06:18) - Tom Zaubermann's Journey in Cybersecurity(12:22) - The Intersection of Cybersecurity and Automotive(16:06) - Challenges in Automotive Cybersecurity Development(21:23) - The Role of Over-the-Air Updates(25:20) - Consumer Awareness and Best Practices in Cybersecurity(29:54) - Navigating Cybersecurity Vulnerabilities in Automotive(32:35) - The Role of Regulations in Automotive Cybersecurity(34:22) - Understanding Automotive Vulnerabilities(36:34) - Complexities of Car Hacking(40:07) - Consumer Awareness of Cybersecurity Risks(42:51) - Choosing Safe Vehicles in a Digital Age(48:56) - Engaging with SAE International for Cybersecurity EducationThis episode is part of a series brought to you by SAE International to explore the leading edge of mobility with the support of experts from industry & academia. Other episodes in this series include Episode 202, where we talked about the cyber threats to vehicles.You can learn more about the automotive cybersecurity courses Tom will be teaching in May HERE. Enjoyed listening to Tom? Want to hear more from him? Check out his links below:Tom's LinkedIn Become a founding reader of our newsletter: http://read.thenextbyte.com/ As always, you can find these and other interesting & impactful engineering articles on Wevolver.com.
Zero Trust World 2025, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year's event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.The Growth of Zero Trust WorldNow in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company's own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.What to Expect: Hands-On Learning and Key DiscussionsOne of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker's perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there's something to gain from these hands-on labs.High-Profile Speakers and Industry InsightsBeyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.Networking, Certification, and MoreZero Trust World isn't just about education—it's also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.A Unique Capture the Flag ChallengeFor those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event's commitment to real-world application of cybersecurity techniques.Join the ConversationWith so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.Whether you're looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you're attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.Guest: Kieran Human, Special Projects Engineer, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Chinese hackers have vastly increased their efforts in recent years, burrowing into systems at ports, pipelines, water facilities and elsewhere. WSJ reporter Dustin Volz joins host James Rundle to talk about what this means for national security, and how companies such as major telecom providers were hacked in the first place. Sign up for the WSJ's free Technology newsletter. Learn more about your ad choices. Visit megaphone.fm/adchoices