Podcasts about cyber threats

Attack on a computer system

  • 786PODCASTS
  • 1,794EPISODES
  • 30mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Oct 31, 2025LATEST
cyber threats

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about cyber threats

Show all podcasts related to cyber threats

Latest podcast episodes about cyber threats

Interpreting India
Cybersecurity in Outer Space: A Growing Concern

Interpreting India

Play Episode Listen Later Oct 31, 2025 36:52


The conversation explores how cybersecurity is integral to space operations, drawing parallels with traditional air defense strategies. Blount discusses the historical context of cybersecurity in space, the role of international law, and the challenges posed by non-state actors. He emphasizes the need for a holistic approach to cybersecurity that includes both space-based and terrestrial components, and the importance of international cooperation in addressing these challenges.Blount warns of the increasing threats from cyber-attacks on space assets and the need for robust legal frameworks to ensure accountability and security. He calls for the development of comprehensive cybersecurity strategies that integrate space and cyberspace, ensuring resilience against a wide range of threats.How can nations protect their space assets from cyber threats? What role does international law play in governing space cybersecurity? How should countries collaborate to enhance global space security?Episode ContributorsP. J. Blount is assistant professor of space law at Durham University. He is also a visiting scholar at Mae Fah Luang University in Chiang Rai, Thailand. Previously, he served as a Lecturer in Law at Cardiff University, an adjunct professor for the LL.M. in the Air and Space Law at the University of Mississippi School of Law, a Postdoctoral Researcher at the University of Luxembourg, an adjunct professor at Montclair State University, and a Visiting Scholar at the Beijing Institute of Technology School of Law. Tejas Bharadwaj is a senior research analyst with the Technology and Society Program at Carnegie India. He focuses on space law and policies and also works on areas related to AI in military domain, Defence tech and Cybersecurity.  Every two weeks, Interpreting India brings you diverse voices from India and around the world to explore the critical questions shaping the nation's future. We delve into how technology, the economy, and foreign policy intertwine to influence India's relationship with the global stage.As a Carnegie India production, hosted by Carnegie scholars, Interpreting India, a Carnegie India production, provides insightful perspectives and cutting-edge by tackling the defining questions that chart India's course through the next decade.Stay tuned for thought-provoking discussions, expert insights, and a deeper understanding of India's place in the world.Don't forget to subscribe, share, and leave a review to join the conversation and be part of Interpreting India's journey.

MONEY FM 89.3 - The Breakfast Huddle with Elliott Danker, Manisha Tank and Finance Presenter Ryan Huang

Cyber threats never take a break, and neither can the companies protecting against them. Gene Yu, CEO and Founder of Blackpanda, shares how cybersecurity in Southeast Asia is evolving, why innovation matters without losing sight of the fundamentals, and how companies can stay resilient in this ever-changing world. Produced and presented by Audrey SiekSee omnystudio.com/listener for privacy information.

Federal Drive with Tom Temin
CISA sounds the alarm on cyber threats to critical infrastructure

Federal Drive with Tom Temin

Play Episode Listen Later Oct 28, 2025 9:24


The Cyber Security and infrastructure security agency has been sounding the alarm about cyber threats to us critical infrastructure like power and water systems. CISA officials are particularly concerned about hackers targeting so called operational technology or OT systems. Targeting of those systems could pose major health and safety risks. For more on what the agency is doing to combat those threats. Federal News Network's Justin Doubleday spoke with the OT cyber lead at CISA, Matt Rogers.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Coffee w/#The Freight Coach
1313. #TFCP - Trucks & Cyber Threats | NMFTA 2025 Day 1

Coffee w/#The Freight Coach

Play Episode Listen Later Oct 27, 2025 27:45 Transcription Available


Today, we've got Amadou Kane of VicOne live from Austin, TX, at the NMFTA Cybersecurity Conference to talk about the real risks facing transportation, from hackers targeting ELDs and Class 8 trucks to supply chain vulnerabilities that could disrupt the entire freight network! We dive into how attackers manipulate GPS data, hijack vehicle controls, and even exploit EV chargers to threaten infrastructure, how fleets can fight back with onboard intrusion detection systems, real-time monitoring, and tighter OEM and supplier vetting through Software Bills of Materials (SBOMs), why vehicle security isn't just IT security, how cost-cutting at the OEM level creates risk, and what proactive measures the industry must take to protect drivers, assets, and national security!   About Amadou Kane Amadou Kane is a Sr. Solution Engineer and the North America Technical Lead at VicOne. With extensive experience in the automotive industry, previously spearheaded Wistron NeWeb's V2X programs in North America and served as the Automotive Business Development Manager, specializing in connectivity and ADAS. Amadou brings a wealth of expertise in developing innovative solutions to address the evolving challenges in automotive technology. He holds a Bachelor of Electrical Engineering and a Master's of Electrical and Computer Engineering, as well as an MBA from the University of Detroit Mercy.    Connect with Amadou Website: https://vicone.com/  LinkedIn: https://www.linkedin.com/in/amadoukn/  

Cyber Security Today
Navigating Cybersecurity in Small and Medium Businesses with White Hat Hacker Graham Berry

Cyber Security Today

Play Episode Listen Later Oct 25, 2025 41:10 Transcription Available


In this episode of Cybersecurity Today, host Jim Love sits down with Graham Barrie a CISO and white hat hacker, to discuss the critical importance of cybersecurity for small and medium-sized businesses. From the moment Berry fell in love with technology through a Tandy TRS 80 to his current role helping businesses secure their data, this conversation covers the evolution of cybersecurity. They delve into how Berry assists businesses in understanding cybersecurity risks, communicating effectively with clients, and preparing for and recovering from cyber incidents. This episode is packed with insightful stories, practical advice, and a deep dive into the realities of cybersecurity for businesses of all sizes. 00:00 The Urgency of Cybersecurity 00:33 Introduction to the Podcast 01:00 Meet Graham Berry: A White Hat Hacker 01:31 Graham's Journey into Technology 04:04 From Technology to Cybersecurity 05:49 The Reality of Cyber Threats for Small Businesses 10:44 The Importance of Cyber Insurance 14:23 Engaging with Clients on Cybersecurity 17:08 Turning Around a Reluctant Client 20:10 The Growing Demand for Cyber Coverage 22:12 Third Party Risk Management 22:50 Effective Tabletop Exercises 23:58 Engaging Executives in Cybersecurity 26:43 Importance of Cyber Insurance 28:33 Successful Recovery Stories 34:16 Challenges with AI in Security 38:57 Looking Forward in Security 40:21 Conclusion and Farewell

Coffee w/#The Freight Coach
1310. #TFCP - Freight at Risk: Inside the Cyber Threats Targeting Transportation!

Coffee w/#The Freight Coach

Play Episode Listen Later Oct 22, 2025 31:40 Transcription Available


How secure is your trucking operation against cyberattacks? Are you confident your team could spot a phishing email or fake shipper domain before it costs you thousands? Today, listen to cybersecurity expert Melanie Padron speaking about the growing threat landscape in transportation! We discuss why small and mid-sized carriers are prime targets, often hit hardest because they lack dedicated security resources, how AI-powered tools are helping companies stay ahead of evolving cyber risks, and practical solutions: employee training, incident response plans, vendor vetting, and partnering with cybersecurity professionals who understand trucking operations. The key message? “Trust but verify.” As National Cybersecurity Awareness Month reminds us, education and consistency are your best defense. Whether you run one truck or a 500-unit fleet, acquire strategies from this episode to secure your business and protect the future of the industry.   About Melanie Padron Melanie Padron is a risk management expert and cybersecurity speaker who has made it her mission to protect trucking companies from cyber threats. She's been right there in the trenches when ransomware attacks hit, helping pick up the pieces after systems are encrypted and ransom demands arrive. After spending over 20 years in the insurance industry helping businesses recover from disasters, Melanie has shifted her focus to something she's even more passionate about: stopping those disasters from happening in the first place through proactive cybersecurity. Her connection to trucking is personal. Growing up working in her family's convenience stores, she watched the steady stream of trucks that kept their gas tanks filled and shelves stocked. Her uncle and aunt were owner-operators who crossed the country delivering freight, giving her firsthand insight into the dedication and sacrifice required to build a trucking business. Working with veteran-owned IT Architeks, Melanie helps trucking leaders secure their fleets and leverage AI to become more efficient and profitable. Her approach is simple: when trucking companies truly understand their risk, real protection begins. One company at a time, she's working to build cyber resilience in the trucking industry.   Connect with Melanie Website: https://www.itarchiteks.com/  LinkedIn: https://www.linkedin.com/in/melanie-padron/  

Public Risk Management
NCSAM Week 5 - The Evolution of Cyber Threats and Risk Reduction

Public Risk Management

Play Episode Listen Later Oct 22, 2025 19:05


NCSAM Week 5 - The Evolution of Cyber Threats and Risk Reduction

ITSPmagazine | Technology. Cybersecurity. Society
New Book: SPIES, LIES, AND CYBER CRIME | Former FBI Spy Hunter Eric O'Neill Explains How Cybercriminals Use Espionage techniques to Attack Us | Redefining Society And Technology Podcast With Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 21, 2025 48:16


The Future of Water
What's at Stake When Cyber Threats Target Water Infrastructure?

The Future of Water

Play Episode Listen Later Oct 21, 2025 57:47


Water systems—once considered too small or obscure to be hacked—are now squarely in the crosshairs of cyber actors. In recent months, Bluefield Research has tracked a surge of cyber activity targeting water and wastewater utilities around the world, from the U.S. Cybersecurity and Infrastructure Security Agency's (CISA) release of 32 new control system advisories to Poland's launch of a national cybersecurity framework for water utilities. In this episode of The Future of Water, Bluefield's Barcelona-based Maria Cardenal and Boston-based Leigh Ramsey join host Reese Tisdale to unpack one of the most pressing—and overlooked—threats facing the water sector: cybersecurity. Our water experts explore where these threats are emerging, how utilities are responding, and what the next phase of digital resilience looks like. Key discussion points include: What's really at stake when critical infrastructure is under attack The biggest vulnerabilities in today's water systems—from legacy hardware to weak IT–OT segmentation Real-world examples from the U.S., Norway, and Poland that show how cyberattacks on operational assets are evolving How governments are responding—including Poland's US$1.1 billion cybersecurity initiative for water and wastewater systems How smaller utilities are managing cybersecurity with limited resources The role of new regulations—from the EU's NIS2 Directive to state-level initiatives in the U.S. Why cybersecurity must become part of asset management and workforce training, not an afterthought If you enjoy listening to The Future of Water Podcast, please tell a friend or colleague, and if you haven't already, please click to follow this podcast wherever you listen. If you'd like to be informed of water market news, trends, perspectives and analysis from Bluefield Research, subscribe to Waterline, our weekly newsletter published each Wednesday. Related Research & Analysis: Poland Strengthens Cybersecurity in the Water Sector Cybersecurity Alerts Highlight Water HMI Vulnerabilities

The Social-Engineer Podcast
Ep. 325 - Security Awareness Series - A Crystal Ball for Mitigating Threats With Chris and Carter

The Social-Engineer Podcast

Play Episode Listen Later Oct 20, 2025 32:02


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Carter Zupancich. Chris and Carter explore the evolving landscape of social engineering threats, focusing on the rise of vishing attacks and the role of AI in enhancing these tactics. Their discussion underscores the importance of empowering employees as a human firewall and the need for continuous education and testing to strengthen organizational security. [Oct 20, 2025]   00:00 - Intro 00:31 - Carter Zupancich Intro -          Website: https://carterzupancich.com/ 01:30 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                03:35 - Tools, Tactics and Procedures 05:19 - Tech Advances 08:16 - The Classics 10:01 - The Need for Testing 12:16 - Callback Phishing 17:26 - Setting Expectations 21:56 - Approved Language 23:56 - Verify! 25:16 - Empowerment 26:17 - And Now a Horrible Story 28:47 - Investing In Employees 31:19 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Health Innovation Matters
Fortifying Healthcare Cyber Resilience with Russell Teague

Health Innovation Matters

Play Episode Listen Later Oct 17, 2025 25:38


Michael chats with Russell Teague, Chief Information Security Officer (CISO) at Fortified Health Security. Together, they discuss how the role of CISO is evolving amid today's cyber threat landscape and regulatory environment, areas in which healthcare needs to improve cyber resilience, why experience is so important in the clinical environment when selecting a vendor or SOC service partner, how CISOs can mitigate massive cyber disruptions and risks, and much more. To learn more about Fortified Health Security, visit FortifiedHealthSecurity.com.

ICT Pulse Podcast
ICTP 372: 2025 Expert Insights update on cyber threats and security in the Caribbean, with Edward Millington of CariSec Global

ICT Pulse Podcast

Play Episode Listen Later Oct 15, 2025 70:04


In the fourth instalment in our Expert Insights series on cyber threats and security for 2025, we are joined once again by Edward Millington, of CariSec Global, which is headquartered in Barbados. In this conversation, Edward discusses, among other things:    *  current trends in cybersecurity;   *  whether there are well-defined paths to pursue specific cybersecurity-related disciplines or specialities;   *  availability of suitable talent in the security job market; and   *  tactics Caribbean countries should be employing to be more prepared and resilient to cyber threats.   The episode, show notes and links to some of the things mentioned during the episode can be found on the ICT Pulse Podcast Page (www.ict-pulse.com/category/podcast/)       Enjoyed the episode?  Do rate the show and leave us a review!       Also, connect with us on: Facebook – https://www.facebook.com/ICTPulse/   Instagram –  https://www.instagram.com/ictpulse/   Twitter –  https://twitter.com/ICTPulse   LinkedIn –  https://www.linkedin.com/company/3745954/admin/   Join our mailing list: http://eepurl.com/qnUtj    Music credit: The Last Word (Oui Ma Chérie), by Andy Narrell Podcast editing support:  Mayra Bonilla Lopez   ---------------  

GovCast
CyberCast: Building Secure Systems Starts with the Right Questions, Says EXIM CISO

GovCast

Play Episode Listen Later Oct 14, 2025 12:16


The Export-Import Bank of the United States (EXIM) facilitates trades of exports of goods and services and, in doing so, deals with massive troves of data. From the Billington Cybersecurity Summit, EXIM CISO, Chief Privacy Officer, and Deputy Chief AI Officer Darren Death tells CyberCast that his agency is centralizing data about user access and behavior to detect potential cyber threats. Death says that balancing cybersecurity with privacy remains a challenge, especially in complex IT ecosystems involving financial institutions. He stresses the need to “shift left” by embedding privacy and security requirements early in the development lifecycle and include business leaders in conversations about cybersecurity, privacy and usability. He also says that the EXIM is using generative AI to simulate incident response scenarios, escalating threats to test team readiness. Death adds that EXIM is positioning AI as a force multiplier rather than a job threat.  

Cyber Security Today
FBI Shuts Down Breach Forums and New Cyber Threats Unveiled

Cyber Security Today

Play Episode Listen Later Oct 14, 2025 12:45 Transcription Available


In this episode of Cybersecurity Today, host David Shipley discusses several major events, including the FBI's takedown of the Breach Forums portal. This site was associated with a significant Salesforce data breach and extortion campaign led by groups like Shiny Hunters and Scattered Lapses Hunters. Oracle users are also warned about a new critical vulnerability in the E-Business Suite, which could allow unauthorized data access without requiring login credentials. Additionally, the resurgence of the Asuru botnet, leveraging compromised IoT devices to execute large-scale DDoS attacks, raises concerns. The episode emphasizes the need for immediate patching and robust security measures by organizations and consumers alike. A positive note highlights a cybersecurity awareness initiative by the Indiana Toll Road. 00:00 FBI Takes Down Breach Forums 03:42 Oracle E-Business Suite Vulnerability 07:39 Massive Botnet Threatening US Networks 11:04 Community Cybersecurity Awareness 11:47 Conclusion and Sign-Off

Iowa Manufacturing Podcast
Nuclear Verdicts, Cyber Threats, and Market Shifts: The Future of Insurance for Iowa Manufacturers

Iowa Manufacturing Podcast

Play Episode Listen Later Oct 9, 2025 47:36


Manufacturers are operating in a world where insurance markets are anything but stable, and the stakes have never been higher. In this episode, Risk Management Consultant Katie Hensley joins host Leisa Fox to demystify the shifting Property & Casualty landscape. From the shrinking property market to nuclear liability verdicts, Katie explains how manufacturers can adapt, update valuations, manage open recommendations, and strengthen communication to protect themselves against emerging risks. The conversation ranges from property, business interruption, and E&O, to workers' compensation, fleet, cyber, and management liability. Katie emphasizes proactive risk management, smarter use of data, and a team-based approach to claims and compliance. Whether you're a business owner, risk manager, or operations leader, you'll leave this episode with actionable insights to help your company weather today's insurance challenges while positioning for tomorrow's opportunities. Find this show on your favorite app: https://iowapodcast.com/katie-hensley   

The Real Conversations Podcast by Nokia
Hit back on latest cyberthreats

The Real Conversations Podcast by Nokia

Play Episode Listen Later Oct 8, 2025 18:54


Cyber breaches are never far from the news and, as Nokia releases its latest Threat Intelligence Report, Kal De, SVP of Product and Engineering for Cloud and Network Services at Nokia, talks to the Network Effect about the current threat landscape and what businesses should focus on right now.

Digital Health Talks - Changemakers Focused on Fixing Healthcare
From Compliance to Confidence: How to Evolve Cybersecurity Beyond the Checklist

Digital Health Talks - Changemakers Focused on Fixing Healthcare

Play Episode Listen Later Oct 7, 2025 30:48


Healthcare cybersecurity stands at an inflection point. Traditional compliance frameworks are proving inadequate in the face of sophisticated threats targeting patient data, clinical operations, and connected medical devices. Robert Eikel, CISO at P-n-T Data Corp., brings unique expertise from government service, financial services, and pediatric healthcare to discuss how leading organizations are evolving beyond checklist security. We'll explore the new frontlines of healthcare cyber defense—identity, integrity, and interoperability—while examining how emerging technologies like AI and quantum computing are reshaping the threat landscape.Moving from periodic compliance to continuous confidence through identity-centric, integrity-focused defense strategiesProtecting clinical workflows and patient safety while maintaining secure interoperability across healthcare ecosystemsPreparing cybersecurity programs for AI-powered threats, quantum risks, and next-generation healthcare technologiesTransforming cybersecurity governance from IT overhead to strategic business enablerRobert Eikel, Chief Information Security Officer, P-n-T Data Corp.Megan Antonelli, Founder & CEO, HealthIMPACT Live

Cyber Security Today
October Cybersecurity Month in Review: Insider Threats, AI's Role, and Cybercrime Trends

Cyber Security Today

Play Episode Listen Later Oct 4, 2025 51:43 Transcription Available


In this episode of 'Cybersecurity Today: Our Month in Review,' host Jim welcomes a panel including Tammy Harper from Flair, Laura Payne from White Tuque, and David Shipley, CEO of Beauceron Securities. The discussion kicks off with an overview of their plans for Cybersecurity Month, including reviving the MapleSEC show and the CIO of the Year awards. David shares his experiences at SECTOR, Canada's largest cybersecurity conference, discussing the importance of security awareness training and the risks of irresponsible tech journalism on public perception. The panel also delves into the resurgence of the Clop ransomware group, their shift to data extortion, and their exploitation of vulnerabilities in Oracle EBS applications. Laura highlights a concerning case of insider threats at RBC, emphasizing the importance of process-driven controls. The episode also touches on the human side of cybersecurity, particularly the impact of romance scams and the growing violence in cybercrime. The panelists underscore the need for improved security awareness and the role of AI in identifying scams. Tammy, Laura, and David conclude by discussing the role of insider threats and the ethical boundaries in cybercrime, sharing insights from recent real-world cases. 00:00 Introduction and Panelist Introductions 00:43 Cybersecurity Month Initiatives 02:46 Security Awareness and Phishing Training 04:03 Impact of Irresponsible Tech Journalism 08:27 AI and Cybersecurity: Hype vs. Reality 10:43 Conference Experiences and Networking 18:33 Clop Ransomware and Data Extortion 23:45 Tammy's Insights on Clop's Tactics 24:58 Scattered Lasus and Cyber Warfare 26:32 Media Savvy Cybercriminals 31:36 Human Impact of Cyber Scams 37:17 Insider Threats and Security Awareness 43:21 Physical Security and Cyber Threats 48:33 Cybercrime Targeting Children 50:58 Conclusion and Upcoming Topics

Investors Coffee Shop
Investing In Cyber Security

Investors Coffee Shop

Play Episode Listen Later Oct 4, 2025 55:31


Send us a textIn this episode of Investors Coffee Shop, Brian Harte sits down with Joe Soeka, a cybersecurity and digital forensics expert with over a decade of hands-on experience in identifying and analyzing cyber threats. Joe has worked extensively in digital forensics and incident response, holding advanced certifications that allow him to tackle complex technical challenges head-on.Joe shares insights on:The most pressing cyber threats facing individuals and businesses todayHow digital forensics uncovers the truth hidden within systems and dataPractical steps anyone can take to strengthen their personal and organizational cybersecurity postureListeners will also walk away with tools and resources to stay ahead of evolving threats. One highlighted resource is Have I Been Pwned, a free service where you can check if your email or phone number has been part of a data breach.Whether you're an investor, entrepreneur, or just someone who wants to better understand how to protect your digital identity, this episode is packed with valuable knowledge.Support the show

Moody’s Talks – The Big Picture
How AI, New Tech Will Change Geopolitics

Moody’s Talks – The Big Picture

Play Episode Listen Later Oct 2, 2025 15:21


As artificial intelligence reshapes workplaces and business strategies, firms increasingly depend on AI providers, making AI a tool of geopolitical influence. We'll discuss the impact across industries, as digital currencies affect monetary control and cyber threats challenge operational resilience. Host: William Foster, Senior Vice President, Sovereign Risk Group, Moody's Ratings Guests: Vincent Gusdorf, Associate Managing Director, Digital Finance and AI Analytics, Moody's Ratings; Leroy Terrelonge, Vice President-Analyst, Cyber Credit Risk, Moody's Ratings  Related research:Artificial Intelligence – Global – Nations push for AI sovereignty to capture economic, geopolitical gains 30 September 2025 Sovereigns - Global – Digital currency growth, inconsistent regulation amplify countries' financial risks 25 September 2025Artificial Intelligence – Corporates – Pace of AI advances, regional disparities will steer credit trends across industries 23 September 2025 Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

YAP - Young and Profiting
How to Stop Cyber Attacks From Destroying Your Business | Entrepreneurship | Ramon Ray | Presented by Bitdefender

YAP - Young and Profiting

Play Episode Listen Later Oct 1, 2025 37:28


Small businesses have become the number one target for cyber attacks, yet most entrepreneurs don't realize how vulnerable they are until it's too late. One attack could wipe out years of growth and instantly damage customer trust. In this episode, presented by Bitdefender, Ramon explains why cybersecurity is essential for small business owners and how they can protect their business from today's digital threats without hiring an IT team or becoming a tech expert. In this episode, Hala and Ramon will discuss: (00:00) Introduction (03:03) Entrepreneurship Lessons and Personal Branding (06:09) Public Speaking Strategies to Build Influence (09:51) Why Small Businesses are at Risk of Cyber Threats (12:21) Common Cyber Attacks and How to Prevent Them (18:37) Cyber Attack Scenarios and What to Do (28:49) How Creator Entrepreneurs Build Audience Trust (33:15) How Entrepreneurs Profit by Embracing Failure Ramon Ray is a serial entrepreneur, bestselling author, keynote speaker, and small business expert. He is the publisher of ZoneofGenius.com and has spoken to global audiences on major stages, including SXSW, VeeCon, and the Aspire Tour. As Bitdefender's Small Business Ambassador, Ramon helps entrepreneurs protect their businesses against cybersecurity threats. Sponsored By: Bitdefender Ultimate Small Business Security: Save 30% when you go to bitdefender.com/profiting  Resources Mentioned: Ramon's Book, The Celebrity CEO: bit.ly/CelebCEO  Ramon's Website: zoneofgenius.com Active Deals - youngandprofiting.com/deals  Key YAP Links Reviews - ratethispodcast.com/yap YouTube - youtube.com/c/YoungandProfiting LinkedIn - linkedin.com/in/htaha Instagram - instagram.com/yapwithhala Social + Podcast Services: yapmedia.com Transcripts - youngandprofiting.com/episodes-new  Disclaimer: This episode is a paid partnership with Bitdefender. Sponsored content helps support our podcast and continue bringing valuable insights to our audience. Entrepreneurship, Entrepreneurship Podcast, Business, Business Podcast, Self Improvement, Self-Improvement, Personal Development, Starting a Business, Strategy, Investing, Sales, Selling, Psychology, Productivity, Entrepreneurs, AI, Artificial Intelligence, Technology, Marketing, Negotiation, Money, Finance, Side Hustle, Startup, Mental Health, Career, Leadership, Mindset, Health, Growth Mindset, Passive Income, Online Business, Solopreneur, Founder, Networking

Joey Pinz Discipline Conversations
#748 MSP Summit 2025-Scott Fuhriman:

Joey Pinz Discipline Conversations

Play Episode Listen Later Oct 1, 2025 25:40


Send us a textIn this episode of Joey Pinz Discipline Conversations, Joey sits down with Scott Fuhriman, cybersecurity veteran and leader at Inveri, live from the MSP Summit in Orlando.Scott shares his 25+ years of cybersecurity experience, explaining how Inveri's runtime integrity technology, born from NSA research, helps MSPs and MSSPs detect hidden in-memory attacks, rootkits, and advanced threats that traditional tools miss. He highlights why protecting this overlooked layer is crucial to preserving revenue, preventing churn, and maintaining customer trust.The conversation also touches on Scott's personal discipline journey — from starting as a young PC tech overwhelmed by information to building a career through self-study, mentorship, and consistency. He and Joey discuss how MSPs can choose the right vendors, strengthen their security stacks, and enable long-term resilience in a competitive market.

The American Warrior Show
Episode #418: Under Digital Siege: Cyber Threats Facing America with Andrew Frisbie

The American Warrior Show

Play Episode Listen Later Sep 30, 2025 84:41


Show Featured Sponsor: Precision Holsters:These guys have a lifetime, no questioned asked 100% guarantee. They are makers of high-quality holsters, belts, and magazine pouches. Visit them at: Precision Holsters and use code “seekAWS” for a discount.​​ In this episode of the American Warrior Show, Rich Brown is joined by Andrew Frisbie (Practical Cyber Defense) to dig into the threats America faces in cyberspace—and how we must respond.

GovCast
CyberCast: Federal Cyber Workforce Lags Behind Emerging Tech, GAO Says

GovCast

Play Episode Listen Later Sep 30, 2025 12:53


Cybersecurity has been on the Government Accountability Office's (GAO) high-risk list since 1997. Federal agencies struggle with issues like cyber hygiene, cyber workforce shortages and strategic execution. While agencies put strategies in place to secure their systems, the implementation and execution can be ineffective, according to GAO Managing Director of IT and Cybersecurity Nick Marinos. Marinos says that evolving threats have reshaped the cybersecurity landscape over the years in government, making evolution a moving target. Agencies are adjusting their workforces accordingly, he says, but is is difficult to keep pace with emerging technology. He underscores the urgency of streamlining federal hiring processes to prevent losing top talent to faster-moving private sector opportunities.

Cybercrime Magazine Podcast
Database Security. Defending Against Modern Cyber Threats & More. Terry Ray, Varonis.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 30, 2025 16:55


Terry Ray is the Vice President of Product Strategy at Varonis. In this episode, he joins host Paul John Spaulding to discuss database security, including defense against modern cyber threats, risks associated with over-permissioned users and applications, and more. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://www.Varonis.com.

My Precious Data
Cryptography, cyber threats & the future with Prof. Dr. Bart Preneel (KU Leuven).

My Precious Data

Play Episode Listen Later Sep 29, 2025 53:08


In this English-language episode of the My Precious Data Podcast, cybersecurity expert Eddy Willems sits down with longtime colleague (LSEC) and internationally renowned cryptographer Prof. Dr. Bart Preneel (KU Leuven). Together, they explore the past, present, and future of cybersecurity — from the foundations of cryptography to the political and societal challenges of digital trust today.Topics discussed:The evolution of cryptography and its real-world applicationsThe balance between privacy, security, and surveillanceQuantum computing: a threat or a promise?Europe's role in shaping global cybersecurity standardsWhat needs to change in the next decade?Quotes from the episode:“In the end, trust is not built by technology alone. It's about governance, transparency, and respect for users.” — Prof. Dr. Bart Preneel“People often think cybersecurity is just about hackers and firewalls. But it's deeply tied to our rights, our freedom, and the way societies function.” — Eddy Willems“We are now entering an era where cryptography will face its biggest challenge: quantum resistance.” — Prof. Dr. Bart PreneelThis is not just a technical conversation — it's a thought-provoking dialogue between two world-leading experts who have been part of the cybersecurity evolution for decades.

Business of Tech
Aiceberg's Approach: Using Machine Learning to Protect Generative AI from Cyber Threats

Business of Tech

Play Episode Listen Later Sep 28, 2025 19:48


Alexander Schlager, CEO of Aiceberg.ai, discusses the intersection of artificial intelligence (AI) and cybersecurity, emphasizing the importance of securing AI-powered workflows. Aiceberg employs traditional machine learning techniques to safeguard generative AI systems, providing a deterministic and explainable approach to security. This method allows organizations to understand how their AI systems operate and ensures that they can trace and audit the decisions made by these systems, which is crucial in an era where AI incidents may lead to legal challenges.The conversation highlights the need for organizations to establish robust governance frameworks as they adopt AI technologies. Schlager points out that many businesses are still grappling with basic cybersecurity measures, which complicates their ability to implement effective AI governance. He stresses that organizations must assess their existing security postures and ensure that they are prepared for the rapid deployment of agentic AI, which allows non-technical users to create and manage AI workflows independently.Schlager provides concrete examples of how Aiceberg's technology is integrated into real-world applications, such as in the banking sector, where AI workflows may involve third-party interactions. He explains that Aiceberg monitors these interactions to classify and respond to potential security threats, ensuring that organizations can demonstrate compliance and safety in the event of an incident. This proactive approach to security is essential for maintaining trust and accountability in AI systems.Finally, the discussion touches on the broader implications of AI adoption, including the potential for improved customer experiences across various industries. Schlager notes that while AI can enhance service delivery, organizations must navigate the challenges of user expectations and the maturity of their AI implementations. By focusing on customer service and experience, companies can unlock significant value from their AI investments, but they must also prioritize security and governance to mitigate risks. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

...and Insurance
From Cyber Threats to Trust That Scales: Who You Work With Matters Episode 99

...and Insurance

Play Episode Listen Later Sep 23, 2025 31:46


What does it take to build a business that's both secure and personal? In this episode, I sit down with Chris Church from PCS to talk about the real-world threats businesses face, from phishing emails to vendors unintentionally opening the door to hackers. But this conversation goes way beyond cybersecurity.We dive into how Chris built his team, the value of genuine networking, and the mindset shift that helped him grow a thriving business without burning out. Whether you're leading a team, protecting your company's data, or just trying to find better balance, this episode is packed with insights and real talk you won't want to miss.

Unsupervised Learning
A Conversation With Harry Wetherald CO-Founder & CEO At Maze

Unsupervised Learning

Play Episode Listen Later Sep 22, 2025 35:03 Transcription Available


➡ Stay Ahead of Cyber Threats with AI-Driven Vulnerability Management with Maze:https://mazehq.com/ In this conversation, I speak with Harry about how AI is transforming vulnerability management and application security. We explore how modern approaches can move beyond endless reports and generic fixes, toward real context-aware workflows that actually empower developers and security teams. We talk about: The Real Problem in Vulnerability ManagementWhy remediation—not just prioritization—remains the toughest challenge, and how AI can help bridge the gap between vulnerabilities and the developers who need to fix them. Context, Ownership, and VelocityHow linking vulnerabilities to the right applications and teams inside their daily tools (like GitHub) reduces friction, speeds up patching, and improves security without slowing developers down. AI Agents and the Future of SecurityWhy we should think of AI agents as “extra eyes and hands,” and how they’re reshaping everything from threat detection to system design, phishing campaigns, and organizational defense models. Attackers Move FirstHow attackers are already building unified world models of their targets using AI, and why defenders need to match (or exceed) this intelligence to stay ahead. From Days to MinutesWhy the tolerance for vulnerability windows is shrinking fast, and how automation and AI are pushing us toward a future where hours—or even minutes—make the difference. Subscribe to the newsletter at:https://danielmiessler.com/subscribe Join the UL community at:https://danielmiessler.com/upgrade Follow on X:https://x.com/danielmiessler Follow on LinkedIn:https://www.linkedin.com/in/danielmiessler Chapters: 00:00 – Welcome and Harry’s Background01:07 – The Real Problem: Remediation vs. Prioritization04:31 – Breaking Down Vulnerability Context and Threat Intel05:46 – Connecting Vulnerabilities to Developers and Workflows08:01 – Why Traditional Vulnerability Management Fails10:29 – Startup Lessons and The State of AI Agents13:26 – DARPA’s AI Cybersecurity Competition14:29 – System Design: Deterministic Code vs. AI16:05 – How the Product Works and Data Sources18:01 – AI as “Extra Eyes and Hands” in Security20:20 – Breaking Barriers: Rethinking Scale with AI23:22 – Building World Models for Defense (and Attack)25:22 – Attackers Move Faster: Why Context Matters27:04 – Phishing at Scale with AI Agents31:24 – Shrinking Windows of Vulnerability: From Days to Minutes32:47 – What’s Next for Harry’s Work34:13 – Closing ThoughtsBecome a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

AI in Action Podcast
E554: 'Fighting Cyber Threats with AI' with Dune Security's Kyle Ryan

AI in Action Podcast

Play Episode Listen Later Sep 15, 2025 21:04


Today's guest is Kyle Ryan, Senior Engineering Manager and Principal Engineer at Dune Security. Founded in 2023, Dune Security's User Adaptive Risk Management solution automatically prevents insider threats in real time. With 90% of breaches starting from human error, traditional phishing simulations and compliance training often fail to reduce real-world risk. Dune addresses this with a unified platform that continuously monitors behavior, tailors interventions and adapts protections around high-risk users.Kyle is highly skilled in AI & Machine Learning research and development, with a specialization in building secure, robust and scalable systems for cutting-edge cybersecurity solutions. He is currently developing advanced technologies to prevent AI-powered social engineering attacks and enable real-time, dynamic risk profiling of employees. Kyle believes that as threat actors evolve, organizations must adapt using data-driven methods to reduce the attack surface and strengthen defenses.In this episode, Kyle talks about:0:00 His journey from early chatbot work to founding engineer at Dune2:19 How Dune Security simulates advanced phishing attacks to train users4:45 How his role evolved from generalist to AI R&D8:17 Delivering authentic threat simulations and risk visibility for organizations11:20 Why future threats will be hyper-personalised, cross-channel and AI-driven14:58 His key advice to stay on AI's cutting edge and solve hard problemsTo find out more about all the great work happening at Dune Security, check out the website www.dune.security

Rich Valdés America At Night
“Accountability for Judges, Cyber Threats from China, and " Bound by law”

Rich Valdés America At Night

Play Episode Listen Later Sep 9, 2025 123:40


On this episode of Rich Valdes America at Night, Rep. Randy Fine (R-FL) shares his plan to hold judges accountable for enabling violent repeat offenders to return to the streets. Then, Eric Cole, CEO of Secure Anchor and former CIA cybersecurity expert, explains how Chinese cyber attackers may have stolen data from nearly every American, and what this means for our national security. Later, Humberto Cancio joins the show to discuss injustices in the Cuban community, immigration challenges, and his new book Gabriel Lock: Bound by Law. Learn more about your ad choices. Visit podcastchoices.com/adchoices

The Health Ranger Report
Brighteon Broadcast News, Sep 2, 2025 – Trump questions Operation Warp Speed while CDC demons wage WAR on RFK Jr!

The Health Ranger Report

Play Episode Listen Later Sep 2, 2025 102:56


- Anniversary of Japanese Surrender and U.S. Occupation (0:10) - Trump's Tariffs and the International Emergency Economic Powers Act (2:34) - Impact of Trump's Tariffs on U.S. Allies and Global Relations (9:21) - Challenges of Shifting Manufacturing to the U.S. (10:02) - AI and Knowledge Mining (14:07) - Trump's Criticism of Operation Warp Speed and Vaccines (24:27) - The Future of Medicine and AI (30:09) - Economic and Political Implications of Trump's Policies (48:20) - Interview with Don Brown on Power Grid Security (48:40) - Strategies for Securing the Power Grid (1:16:29) - Challenges of Depending on Foreign Manufacturers (1:19:14) - Rising Domestic Tensions and Power Grid Vulnerabilities (1:23:35) - Legislation and Cyber Threats (1:30:16) - Protecting Against EMP and Solar Threats (1:32:37) - Preparedness and Personal Responsibility (1:37:42) - Final Thoughts and Recommendations (1:41:12) For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com

Public Sector Podcast
Trends in Cybercrime with NSW Police - Matthew Craft - Episode 148

Public Sector Podcast

Play Episode Listen Later Aug 31, 2025 19:45


In this episode, Matthew Craft, Detective Superintendent, NSW Police Force examines the evolving landscape of cybercrime in 2025—what's changed, what's emerging, and what organisations need to know to stay ahead. From rising threat trends to response readiness, the discussion also highlights the importance of national and international cooperation in combating cyber threats. Whether you're in government, law enforcement, or cyber defence, this episode offers timely insights into staying resilient in a high-risk digital world.   Matthew Craft, Detective Superintendent, NSW Police Force   For more great insights head to www.PublicSectorNetwork.co  

Interpreting India
Military AI and Autonomous Weapons: Gender, Ethics, and Governance

Interpreting India

Play Episode Listen Later Aug 28, 2025 55:00


The episode opens with Bhatt framing the global stakes: from drones on the battlefield to AI-powered early warning systems, militaries worldwide are racing to integrate AI, often citing strategic necessity in volatile security environments. Mohan underscores that AI in conflict cannot be characterized in a single way, applications range from decision-support systems and logistics to disinformation campaigns and border security.The conversation explores two categories of AI-related risks:Inherent risks: design flaws, bias in datasets, adversarial attacks, and human–machine trust calibration.Applied risks: escalation through miscalculation, misuse in targeting, and AI's role as a force multiplier for nuclear and cyber threats.On governance, Mohan explains the fragmentation of current disarmament processes, where AI intersects with multiple regimes, nuclear, cyber, conventional arms, yet lacks a unified framework. She highlights ongoing debates at the UN's Group of Governmental Experts (GGE) on LAWS, where consensus has been stalled over definitions, human-machine interaction, and whether regulation should be voluntary or treaty-based.International humanitarian law (IHL) remains central, with discussions focusing on how principles like distinction, proportionality, and precaution can apply to autonomous systems. Mohan also emphasizes a “life-cycle approach” to weapon assessment, extending legal and ethical oversight from design to deployment and decommissioning.A significant portion of the conversation turns to gender and bias, an area Mohan has advanced through her research at UNIDIR. She draws attention to how gendered and racial biases encoded in AI systems can manifest in conflict, stressing the importance of diversifying participation in both technology design and disarmament diplomacy.Looking forward, Mohan cites UN Secretary-General António Guterres's call for a legally binding instrument on autonomous weapons by 2026. She argues that progress will depend on multi-stakeholder engagement, national strategies on AI, and confidence-building measures between states. The episode closes with a reflection on the future of warfare as inseparable from governance innovation—shifting from arms reduction to resilience, capacity-building, and responsible innovation.Episode ContributorsShimona Mohan is an associate researcher on Gender & Disarmament and Security & Technology at UNIDIR in Geneva, Switzerland. She was named among Women in AI Ethics' “100 Brilliant Women in AI Ethics for 2024.” Her areas of focus include the multifarious intersections of security, emerging technologies (in particular AI and cybersecurity), gender, and disarmament. Charukeshi Bhatt is a research analyst at Carnegie India, where her work focuses on the intersection of emerging technologies and international security. Her current research explores how advancements in technologies such as AI are shaping global disarmament frameworks and security norms.ReadingsGender and Lethal Autonomous Weapons Systems, UNIDIR Factsheet Political Declaration on Responsible Military Use of AI and Autonomy, US Department of StateAI in the Military Domain: A Briefing Note for States by Giacomo Persi Paoli and Yasmin AfinaUnderstanding the Global Debate on Lethal Autonomous Weapons Systems: An Indian Perspective by Charukeshi Bhatt and Tejas Bharadwaj Every two weeks, Interpreting India brings you diverse voices from India and around the world to explore the critical questions shaping the nation's future. We delve into how technology, the economy, and foreign policy intertwine to influence India's relationship with the global stage.As a Carnegie India production, hosted by Carnegie scholars, Interpreting India, a Carnegie India production, provides insightful perspectives and cutting-edge by tackling the defining questions that chart India's course through the next decade.Stay tuned for thought-provoking discussions, expert insights, and a deeper understanding of India's place in the world.Don't forget to subscribe, share, and leave a review to join the conversation and be part of Interpreting India's journey.

Cyber Security Today
From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today

Cyber Security Today

Play Episode Listen Later Aug 25, 2025 8:26 Transcription Available


Host David Shipley explores the latest in cybersecurity, including the rapid development of AI-generated exploits for critical vulnerabilities, record-high searches of digital devices at US borders, and a fired developer jailed for sabotaging his former employer. Additionally, the episode highlights Interpol's Operation Serengeti 2.0, which led to significant arrests and recoveries in the fight against cybercrime in Africa. The episode underscores the speed at which cyber threats can materialize and the importance of global and collaborative defenses. 00:00 Introduction to Cybersecurity Today 00:35 AI-Driven Exploits: A New Era of Cyber Threats 02:48 Record Device Searches at US Borders 04:43 Insider Threats: The Hidden Dangers Within Organizations 06:25 Operation Serengeti 2.0: A Major Blow to Cyber Crime 07:27 Conclusion and Final Thoughts

Cybercrime Magazine Podcast
Microsoft At Black Hat 2025. Combatting Cyber Threats. Travis Schack, Principal Security Researcher.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 22, 2025 1:43


Travis Schack is the Principal Security Researcher at Microsoft, and lead investigator for their incident response team. Cybercrime Magazine caught up with Schack, who previously served as CISO for the State of Colorado, at Black Hat USA 2025 in Las Vegas, Nevada, where he told us about what Microsoft is doing to combat today's vast cyber threat landscape. • For more on cybersecurity, visit us at https://cybersecurityventures.com

The Briefing Room
UK Resilience 2: How prepared are we for cyber threats?

The Briefing Room

Play Episode Listen Later Aug 21, 2025 28:42


From councils disrupted by ransomware, leaked defence data or individuals duped by deep fakes, the UK faces increasing cyber threats. David Aaronovitch asks his guests how prepared we are - whether as government defending critical infrastructure or as individuals guarding our digital identities.Guests: Sadie Creese, Professor of Cyber Security in the department of computer science, Oxford University Dr Aybars Tuncdogan, Associate Professor in digital innovation and information security, Kings College, London Emily Taylor, CEO of Oxford Information Labs and Associate Fellow, Chatham House Presenter: David Aaronovitch Producers: Ben Carter, Sally Abrahams and Kirsteen Knight Production co-ordinator: Rosie Strawbridge Sound Engineers: Dave O'Neill and James Beard Editor: Richard Vadon

The Gate 15 Podcast Channel
Weekly Security Sprint EP 122. FBI Crime Report, Cyber Threats and be ready for the weather

The Gate 15 Podcast Channel

Play Episode Listen Later Aug 12, 2025 20:01


In this week's Security Sprint, Dave and Andy covered the following topics:Main Topics:Physical Security: • FBI Releases 2024 Reported Crimes in the Nation Statisticso Hate crimes hit second largest record in 2024: FBIo Crime down in every category in 2024, FBI report sayso Jews targeted in 69% of religion hate crimes in 2024, 71% since October 2023, per FBI datao FBI Report: Anti-Jewish Hate Crimes Across U.S. Nearly 10x Higher Than Any Other Groupo NYC Sees Drop in Antisemitic Hate Crimes, Yet Jews Still Targeted Most, Police Say• CDC shooter blamed COVID vaccine for depression; union demands statement against misinformationo CDC Shooter Believed Covid Vaccine Made Him Suicidal, His Father Tells Policeo Suspect identified in Atlanta shooting outside CDC: What to know• Shooter kills three in a Target parking lot in Austin before being captured, police sayo Child among 3 killed in north Austin shooting, suspect detainedo 'I was running for my life' | 3 dead in shooting at North Austin TargetThe Cost of a Call: From Voice Phishing to Data Extortion - Update (August 5) & Google says hackers stole its customers' data by breaching its Salesforce databaseHackers Hijacked Google's Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home; For likely the first time ever, security researchers have shown how AI can be hacked to create real-world havoc, allowing them to turn off lights, open smart shutters, and more. In a new apartment in Tel Aviv, the internet-connected lights go out. The smart shutters covering its four living room and kitchen windows start to roll up simultaneously. And a connected boiler is remotely turned on, ready to start warming up the stylish flat. The apartment's residents didn't trigger any of these actions. They didn't put their smart devices on a schedule. They are, in fact, under attack. Each unexpected action is orchestrated by three security researchers demonstrating a sophisticated hijack of Gemini, Google's flagship artificial intelligence bot. Quick Hits:• NOAA - Prediction remains on track for above-normal Atlantic hurricane season• New state, local cyber grant rules prohibit spending on MS-ISAC• Joint Counterterrorism Assessment Team (JCAT): Hybrid and Electric Vehicle Emergency Planning and Postattack Response Considerations• Canadian Centre for Cyber Security - Potential SSL VPN Zero-Day vulnerability impacting Gen 7 SonicWall Firewalls• SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation• Microsoft Releases Guidance on High-Severity Vulnerability (CVE-2025-53786) in Hybrid Exchange Deployments • CISA Releases Malware Analysis Report Associated with Microsoft SharePoint Vulnerabilities• CISA Issues ED 25-02: Mitigate Microsoft Exchange Vulnerability • Leak Reveals the Workaday Lives of North Korean IT Scammers • US companies spending record amounts to protect executives as threats rise• Mysterious Crime Spree Targeted National Guard Equipment Stashes• American Nazis: The Aryan Freedom Network is riding high in Trump era• Florida Man Sentenced to 20 Years for Conspiring to Destroy Baltimore Region Power Grid & Neo-Nazi leader sentenced to 20 years for plotting Baltimore power grid attack• Leader of Transnational Terrorist Group Pleads Guilty to Soliciting Hate Crimes, Soliciting the Murder of Federal Officials, and Conspiring to Provide Material Support to Terrorists

AHRMM
AHRMM SME Podcast with Scott Gee

AHRMM

Play Episode Listen Later Aug 12, 2025 24:20


This is the AHRMM Subject Matter Expert Podcast hosted by Justin Poulin. Tune in every month as we speak with Industry Experts to highlight success stories and solutions from the field that advance the healthcare supply chain. And now, Justin Poulin with this month's Expert… Guest: Scott Gee, Deputy Advisory for Cybersecurity & Risk @ AHA Topic: From Ransomware to Geopolitics - Assessing Supply Chain Risk Outline: - Welcome Scott - Siloed 3rd Party Risk Management Structure (improvements needed) - Cyber Threats & Criminal Activity * Foreign hackers (primarily Russia) * Attack on 3rd party service provider * Tell us why they are the target? - What is the intent of these attacks * Data theft * Ransomware - Example of a few recent threats - National Threats to Security * China has been heavily integrated into our supply chain through commercial relationships and malware * What are the risks and considerations around the unique dynamics? * Disrupt mission/life critical supply chain to create chaos - The role of Geopolitics and supply chain risk

Cybercrime Magazine Podcast
Black Hat 2025. BreachLock On Facing Today's Cyber Threats. Seemant Sehgal, Founder & CEO.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 11, 2025 6:49


Seemant Sehgal is the founder and CEO of BreachLock. In this episode, he joins host Amanda Glassner from Black Hat 2025 in Las Vegas, Nevada, to discuss what the company showcased at this year's conference, as well as the latest on facing today's cyber threat landscape. This episode is brought to you by BreachLock. To learn more about our sponsor, visit https://breachlock.com.

Fintech Combine
Built for Trust: How DefenseStorm Protects Credit Unions from Evolving Cyber Threats

Fintech Combine

Play Episode Listen Later Aug 1, 2025 36:55


In this episode of The Fintech Combine, host Kris Kovac sits down with Steve Soukup, CEO of DefenseStorm, to discuss how the company protects credit unions and community banks from evolving cyber threats. They explore risk management, fraud prevention, AI‑powered threat detection, and why trust is the foundation of effective cybersecurity in the financial sector.Follow the Pod:https://twitter.com/fintechcombineFollow Kris Kovacs:https://twitter.com/ManagementByteshttps://www.linkedin.com/in/kriskovacs/https://www.instagram.com/kriskovacs/The Fintech Combine is Produced and Edited by Anson Beckler-JonesFollow Anson Beckler-JonesInstagram - @ansonandcoYoutube - @ansonandco

Inside Deschutes County
AI, Cyber Threats and Protecting County Data

Inside Deschutes County

Play Episode Listen Later Jul 31, 2025 30:23


Protecting sensitive information like health records, legal documents, and property data is a critical part of local government. In this episode of Inside Deschutes County, we talk with Zach Neemann, the County's Information Security Manager, about how Deschutes County works to keep digital systems secure. From cyber threats to the growing influence of AI, Zach explains how technology is evolving and what it takes to protect the data that matters most.

ITSPmagazine | Technology. Cybersecurity. Society
ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with John Lilliston

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 29, 2025 17:51


ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with John LillistonJoin ITSP Magazine's Marco Ciappelli and Sean Martin as they preview ThreatLocker's exciting Black Hat 2025 presence with Detect Product Director John Lilliston. Discover upcoming major announcements, hands-on hacking demos, and how ThreatLocker's default deny approach is revolutionizing enterprise cybersecurity through comprehensive zero trust implementation.As Black Hat USA 2025 approaches, cybersecurity professionals are gearing up for one of the industry's most anticipated events. ITSP Magazine's Marco Ciappelli and Sean Martin recently sat down with John Lilliston, ThreatLocker's Detect Product Director, to preview what promises to be an exciting showcase of zero trust innovation at booth 1933.ThreatLocker has become synonymous with the "default deny" security approach, a philosophy that fundamentally changes how organizations protect their digital assets. Unlike traditional security models that allow by default and block known threats, ThreatLocker's approach denies everything by default and allows only approved applications, network communications, and storage operations. This comprehensive strategy operates across application, network, and storage levels, creating what Lilliston describes as a "hardened system that stops adversaries in their tracks."The company's rapid growth reflects the industry's embrace of zero trust principles, moving beyond buzzword status to practical, enterprise-ready solutions. Lilliston, who joined ThreatLocker in February after evaluating their products from the enterprise side, emphasizes how the platform's learning mode and ring fencing capabilities set it apart from competitors in the application control space.At Black Hat 2025, ThreatLocker will demonstrate their defense-in-depth strategy through their Detect product line. While their primary zero trust controls rarely fail, Detect provides crucial monitoring for applications that must run in enterprise environments but may have elevated risk profiles. The system can automatically orchestrate responses to threats, such as locking down browsers exhibiting irregular behavior that might indicate data exfiltration attempts.Visitors to booth 1933 can expect hands-on demonstrations and on-demand hacking scenarios that showcase real-world applications of ThreatLocker's technology. The company is preparing major announcements that CEO Danny Houlihan will reveal during the event, promising game-changing developments for both the organization and its client base.ThreatLocker's Black Hat agenda includes a welcome reception on Tuesday, August 5th, from 7-10 PM at the Mandalay Bay Complex, and Houlihan's presentation on "Simplifying Cybersecurity" on Thursday, August 7th, from 10:15-11:05 AM at Mandalay Bay J.The convergence of practical zero trust implementation, cutting-edge threat detection, and automated response capabilities positions ThreatLocker as a key player in the evolving cybersecurity landscape, making their Black Hat presence essential viewing for security professionals seeking comprehensive protection strategies.Keywords: Black Hat 2025, zero trust security, cybersecurity conference, ThreatLocker, default deny strategy, endpoint protection, application control, threat detection, enterprise security, network security, cybersecurity solutions, security automation, malware prevention, cyber threats, information security, security platform, Black Hat USA, cybersecurity innovation, managed detection response, security operationsLearn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content.Learn more.Guests:John LillistonCybersecurity Director | Threat Detection & Response | SOC Leadership | DFIR | EDR/XDR Strategy | GCFA, GISP | https://www.linkedin.com/in/john-lilliston-4725217b/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerThreatLocker® Welcome Reception | Don't gamble with your security! Join us at Black Hat for a lively Welcome Reception hosted by ThreatLocker®. Meet our Cyber Hero® Team and dive into discussions on the latest advancements in ThreatLocker®Endpoint Security. It's a great opportunity to connect and learn together! ‍‍Time: 7PM - 10PM | Location: Mandalay Bay Complex RSVP below and we'll send you a confirmation email with all the details.[ Welcome Reception RSVP ]Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Cybercrime Magazine Podcast
Facing Cyber Threats. Incident Management For Organizations. Florian Saettler & Helen Nuttall, Marsh

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 28, 2025 16:50


Florian Saettler, Cyber Incident Management Leader & Cyber Claims Co-Leader, Marsh Europe, and Helen Nuttall, UK Head of Cyber Incident Management at Marsh, join host Amanda Glassner in this episode to discuss today's cyber threat landscape. Together, they cover incident management for organizations, the importance of out-of-band communication, the CISO's role, and more. Marsh is the world's most trusted and innovative cyber risk advisor, simplifying complexity while delivering unmatched results. To learn more about our sponsor, visit https://marsh.com and click on “cyber risk.”

The CyberWire
SharePoint springs a leak.

The CyberWire

Play Episode Listen Later Jul 23, 2025 30:55


The National Nuclear Security Administration was among the organizations impacted by the SharePoint zero-day. Experts testify before congress that OT security still lags.The FBI warns healthcare and critical infrastructure providers about Interlock ransomware. New York proposes new cybersecurity regulations for water and wastewater systems along with grants to fund them. Researchers uncover an active cryptomining campaign targeting cloud environments. A new variant of the Coyote banking trojan exploits Microsoft's Windows UI Automation (UIA) framework for credential theft. The DoD pilots an agentic AI project aimed at helping military planners critique and enhance war plans. Clorox sues its former IT service provider for $380 million. Our guest is Tim Starks from CyberScoop discussing sanctions on Russian hackers and spies. Pirate Prime, do the time. CyberWire Guest Today we are joined by Tim Starks from CyberScoop discussing research on "UK sanctions Russian hackers, spies as US weighs its own punishments for Russia.” Selected Reading US nuclear weapons agency reportedly breached in Microsoft SharePoint attacks (The Verge) Fully Operational Stuxnet 15 Years Later & the Evolution of Cyber Threats to Critical Infrastructure (US House of Representatives Cybersecurity and Infrastructure Protection Subcommittee Hearing) European healthcare network AMEOS Group hit by cyberattack (Beyond Machines) FBI urges vigilance against Interlock ransomware group behind recent healthcare attacks (The Record) New York unveils new cyber regulations, $2.5 million grant program for water systems (The Record) Soco404: Multiplatform Cryptomining Campaign (Wiz) Coyote malware abuses Windows accessibility framework for data theft (Bleeping Computer) Thunderforge Brings AI Agents to Wargames (IEEE Spectrum) Clorox Sues Cognizant for Causing 2023 Cyber-Attack (Infosecurity Magazine) Operator of Jetflix illegal streaming service gets 7 years in prison (Bleeping Computer) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Social-Engineer Podcast
Ep. 313 - Security Awareness Series - The Importance of Securing Virtual Events With Trent Waterhouse

The Social-Engineer Podcast

Play Episode Listen Later Jul 21, 2025 27:56


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Trent Waterhouse. Trent is the CMO of GlobalMeet, a leading virtual event technology company with a scalable, flexible, and secure hybrid event streaming platform built and supported by experienced event experts. Trent has a proven track record of driving growth and innovation with 35 years of expertise leveraging a field sales marketing model that aligns sales, marketing, and R&D to think like a customer, act like a partner, and measure success through customer satisfaction and net promoters. Built for growth, Trent's unique blend of technology understanding and B2B marketing skills have been proven to help companies grow revenue profitably, improve customer experiences, build new partnerships, and expand opportunity pipelines. [July 21, 2025]   00:00 - Intro 00:50 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                02:30 - Trent Waterhouse Intro 03:11 - Starting Out Pre-Video 04:53 - A Brave New World 08:07 - Going Public 10:21 - Rise of the DeepFakes 13:03 - Video Watermarking 15:23 - A Simple Warning Will Do 19:11 - Staying Up to Date 21:22 - Insider Threat 23:42 - Find Trent Waterhouse Online    -          Website: https://www.globalmeet.com/ -          Instagram: https://www.instagram.com/globalmeet/ -          LinkedIn: https://www.linkedin.com/in/trentonwaterhouse/ 24:44 - Book Recommendations -          Pattern Breakers - Mike Maples, Jr, Peter Ziebelman 27:16 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Order of Man
DR. ERIC COLE | How Cyberthreats Endanger Men and Their Families

Order of Man

Play Episode Listen Later Jul 15, 2025 61:34


Considering how often we utilize technology, we don't spend as nearly as much time as we should protecting ourselves against the inherent vulnerabilities and bad actors who would exploit the very tools designed to improve our lives. The fact of the matter is, cybersecurity has become a huge issue (only to become more relevant as technology advances). My guest today, Dr. Eric Cole, has spent decades learning, understanding, and teaching people how to protect themselves and their loved ones from cyber-threats. Today, we talk about the apps that are more dangerous than others, how best to keep your children safe from online predators, what he calls, cyber-hygiene, why passwords are dead and what to do about it, and why social media will never fully protect children. SHOW HIGHLIGHTS 00:00 - Introduction   00:21 - Welcoming Dr. Eric Cole   00:26 - Importance of Cybersecurity for Families   01:24 - Dangers of Sharing Personal Information Online   02:47 - Targeting Vulnerable Individuals   04:26 - Impact of Technology on Parenting   05:45 - Prevalence of Child Exploitation   08:12 - Monitoring Kids' Online Interactions   10:00 - Social Media Security Measures   12:16 - Identifying Suspicious Accounts   15:00 - Limiting Kids' Access to Smartphones   19:09 - Balancing Technology Use   22:32 - Monitoring Social Media Comments   26:00 - Risks of Location Tracking in Photos   30:06 - Moving Beyond Passwords   32:31 - Avoiding Malicious Links   35:13 - Value of Online Protection Services   37:51 - Cell Phones and Privacy Concerns   43:03 - Importance of Software Updates   45:20 - Benefits of Using VPNs   46:43 - Upgrading Technology Safely   49:20 - AI as a Tool, Not a Replacement   52:43 - Practical Cybersecurity Tips   54:24 - Closing Remarks   Battle Planners: Pick yours up today! Order Ryan's new book, The Masculinity Manifesto. For more information on the Iron Council brotherhood. Want maximum health, wealth, relationships, and abundance in your life? Sign up for our free course, 30 Days to Battle Ready

Joey Pinz Discipline Conversations
#677 Pax8 Beyond-Christopher Marquez:

Joey Pinz Discipline Conversations

Play Episode Listen Later Jul 9, 2025 27:52


Send us a textIn this heartfelt and high-impact episode recorded at Pax8 Beyond 2025, Joey Pinz sits down with Christopher Marquez of IronScales for a powerful conversation that blends vendor strategy, personal resilience, and community leadership.Christopher kicks off by sharing his goals for the week: learning from partners, improving services, and helping MSPs strengthen their security posture. He breaks down how IronScales uses adaptive AI to protect against phishing and email attacks, offering efficient deployment, automation, and education as part of their channel-first approach. MSPs benefit from tools like free email health checks, coaching support, and NFR licenses for internal use.But this episode goes beyond tech. Christopher opens up about his past struggle with alcohol abuse, the wake-up call from his doctor, and his journey to recovery and lasting wellness. He and Joey reflect on the power of discipline, coaching, and community in transforming both business and life.From pork green chili to partner enablement to self-awareness, this conversation is a rich mix of grit, gratitude, and growth — for anyone navigating the MSP space or a personal reset. 

Ones Ready
Ops Brief 065: Daily Drop - 24 June 2025 (Fat Shaming & B-2s)

Ones Ready

Play Episode Listen Later Jun 24, 2025 18:04


Send us a textWelcome back to The Daily Drop—where Jared rants, roasts, and breaks down the news like only the Ones Ready crew can. Today's main event? Iran punches back with a missile strike on Al-Udeid, but 13 of 14 missiles get slapped out of the sky. Trump drops an F-bomb on the lawn. Space and Cyber Command flex behind the scenes. And everyone's favorite stealth bat—the B-2—continues to steal headlines.Meanwhile, the Air Force wants airmen to run two miles... twice a year. Cue the Facebook tears and diaper rash in the NCO groups. Jared lets the fatties have it with a no-holds-barred takedown that would make your Chief blush. Also: the F-15EX has supply chain issues (again), Tech Sergeant promotions spike, and drones in Ukraine are now hiding in IKEA houses.It's blunt. It's brutal. It's your morning slap of reality—Ones Ready style.