POPULARITY
Categories
It's a brand new season of Random but Memorable — and we're kicking things off with practical security for the people you care about most.
In this episode, host Mark Ledlow is joined by Eddie Garcia, a 22-year Army veteran and former Airborne Ranger, who has extensive experience in special operations and policy work on Capitol Hill. Eddie provides insights on the current geopolitical landscape, particularly focusing on Venezuela and the strategic moves by the Trump administration. They discuss various topics, including the impact of social media on perception, the importance of controlling resources, economic warfare, and the intricate chess game between the U.S., China, and Russia. The episode also touches on the defense industrial base, the significance of securing critical minerals, and the future of economic and defense strategies under the Trump administration. Eddie shares his expertise in navigating the complexities of Washington D.C. for small and medium-sized businesses looking to enter the defense space. The conversation also includes advice for veterans transitioning to civilian life and exploring entrepreneurial opportunities.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSTrump's strategy focuses on economic control of the Western Hemisphere, not military occupationVenezuela move erased $19B Chinese debt and secures oil/mineral access for American companiesModern warfare is about controlling resources and supply chains, not traditional combatDefense spending could jump 50% to $1.5 trillion by 2027Huge opportunities in drones, AI, and domestic manufacturingSmall businesses need DC connections to navigate Pentagon relationshipsGet any job first to learn the civilian landscape—you can switch in 6 monthsList what you DON'T want (location, hours, travel) to narrow your optionsUse military benefits as a safety net while exploring entrepreneurshipQUOTES"The bigger war right now is an economic war over resources. If you don't have the critical minerals, you've already lost before anything has ever been fired.""DC doesn't run on the right idea. It runs on relationships, politics, and the news cycle. You can have the right answer, but come from the wrong place and it can lock you out permanently.""$200-$300 drones can inflict tens of billions of dollars in damage on a world superpower. We are gonna spend a ton of money on drone dominance.""Make a list of what you don't want to do. I don't want to shovel snow. I don't want to miss my kids' games. Start there and figure out what you're good at.""You might pay a consultant for two years and get nothing but relationships. Then in year three, you get a $30 million contract. That two years becomes peanuts."Get to know more about Eddie Garcia through the links below.https://www.linkedin.com/in/eddiegarciava/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen on major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
In this episode, host Mark Ledlow is joined by Phelim Rowe, an industry analyst, from the United Kingdom, diving deep into Phelim's journey in the security conference industry. The discussion covers various aspects of organizing and running conferences, the impact of COVID-19 on the industry, and the differences in conference culture between the US and Europe. Phelim also shares insights on how to handle adversity, the importance of creating valuable agendas, and his transition from public service to becoming a well-known conference producer. This episode is packed with valuable information for anyone interested in the security, business, and entertainment sectors.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYS• Specialize in one industry rather than jumping between topics - builds credibility and deep understanding• Ask layered questions to uncover real pain points, not surface-level answers• Post-COVID conferences are thriving - more events, more attendance, but more selective spending• US networking is transactional and fast; European networking emphasizes long-term professional relationships• The US economy drives most international security work, especially from Silicon Valley clients• Good conferences help the entire industry - when one fails, it hurts all eventsQUOTES"I had 42 [job interviews] and I didn't get anything... If they're not asking for it, they don't want to know.""I call myself an analyst... you don't see me jumping between mother and baby Expo and infantry weapons.""What's keeping you up at night? Most people, the initial first thing they say is not correct... We need to peel back the layers.""If I met you for the first time at GSX... and then we continue our dialogue virtually... it's an extension.""People are spending money in ways that are reassuringly expensive. Oh, it cost me a hundred grand, so it must be better. No, you are paying their overheads."Get to know more about Phelim Rowe through the links below.https://www.linkedin.com/in/pr33jfhh/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen on major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Technology Reseller News sat down with Todd Wilson, Reco's head of channel alliances, to discuss the transition from static configuration checks to a more identity-centric security model. Drawing on his background at Netskope and AppOmni, Wilson notes that standard security tools often fail to account for user behavior within applications. He adds that Reco addresses this via its App Factory, which aims to secure new or niche applications within three to five days. Wilson says doing so quickly helps partners address the rapid adoption of shadow artificial intelligence and the frequent introduction of new software tools. Regarding the Reco partner model, Wilson says the focus is on providing an immediate return on investment by identifying unused licenses and ghost accounts. These findings are designed to offer customers direct cost savings. Beyond software sales, Wilson suggests that the platform's data allows managed service providers to establish recurring service lines, like software-as-a-service health checks or AI audits. This approach is intended to transition resellers into advisory roles rather than focusing solely on one-off transactions. Wilson further addresses the technical demands on partner teams, stating that automation can help manage security environments without requiring significant increases in specialized staff. Looking toward 2026, the channel leader emphasizes that SaaS security will likely require automated governance to manage the growth of AI agents and decentralized application use. He concludes by highlighting that ongoing partner enablement will be necessary to navigate these shifts in the SaaS landscape. Join us for this dynamic podcast to learn more about the shifting world of SaaS security and the channel opportunity. Visit https://www.reco.ai/
Happy New Year! In this episode, Automox cybersecurity experts Ryan Braunstein and Seth Hoyt break down the security vulnerabilities you need to know heading into 2026.First up: a ticking time bomb. Microsoft's 2011 Secure Boot certificates expire in June and October 2026, making this your top patching priority for the year. If your BIOS and OS aren't both updated, you're leaving the door wide open for rootkit attacks. Start auditing your hardware now. You have six months.Next up: a Windows Installer Elevation of Privilege Vulnerability that exploits a time-of-check to time-of-use (TOCTOU) race condition. Think of it like swapping wristbands after the bouncer checks you at the door.Finally, an actively exploited flaw in Desktop Window Manager that can leak sensitive information and even break out of sandboxes.Patch your systems. Patch your BIOS. See you next month.
Brian Long is the CEO & Co-Founder at Adaptive Security. In this episode, he joins host Paul John Spaulding and Teresa Zielinski, Vice President and Global CISO at GE Vernova, to discuss social engineering and how it is evolving in light of artificial intelligence advancements. The AI Security Podcast is brought to you by Adaptive Security, the leading provider of AI-powered social engineering prevention solutions, and OpenAI's first and only cybersecurity investment. To learn more about our sponsor, visit https://AdaptiveSecurity.com
Happy New Year!
Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: Rapid Recovery - When Security Fails [The Industrial Security Podcast]Pub date: 2025-12-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWe've been hacked. Everything is down. Or more mundane - there was a power surge and 5% of our cyber gear is fried. How do we get back into operation fastest? Stephen Nichols of Acronis joins us to look at rapid recovery of OT systems - from the mundane to the arcane.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
We've been hacked. Everything is down. Or more mundane - there was a power surge and 5% of our cyber gear is fried. How do we get back into operation fastest? Stephen Nichols of Acronis joins us to look at rapid recovery of OT systems - from the mundane to the arcane.
We've been hacked. Everything is down. Or more mundane - there was a power surge and 5% of our cyber gear is fried. How do we get back into operation fastest? Stephen Nichols of Acronis joins us to look at rapid recovery of OT systems - from the mundane to the arcane.
Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: We can't - and shouldn't - fix everything [The Industrial Security Podcast]Pub date: 2025-11-21Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWe know there are problems in our security systems, but we can't and shouldn't fix everything. What do we fix? Who decides? How do we explain what's reasonable to people who do decide? Kayne McGladrey, CEO In Residence at Hyperproof, joins us to explore risk, communication, and a surprising role for insurance.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Black Friday season is upon us!
In this episode of the Fearless Mindset Podcast, we delve into the importance of leadership and creating a safe, inclusive work culture in security with industry experts. The conversation touches on the critical role of trust, leading during times of crisis, and managing risk in a rapidly changing world. Ludlow and guests share insights from recent events, the evolution of organizational threats, and how to foster a resilient, people-focused company culture.Key TakeawaysLeadership in security is about influencing people and building a culture of care and trust.Modern threats are increasingly internal, not just external, requiring leaders to "read the room" and understand employee well-being.Company culture is critical, especially in times of crisis and disruption; organizations with intentional cultures fare better.Focusing on people, not just operations, is essential for resilience and long-term success.Trust must be built and cannot be assumed; employees need to feel safe, accepted, and part of the mission.Diversity in skills, experiences, and perspectives strengthens organizations.Leaders should empower employees to take ownership of their own security and well-being.Notable Quotes"We focus on people because people matter, and it matters a lot.""You are not going to hit your goals if your people are not there.""We are not taking care of this for them; they are part of the process.""Trust must be built and not assumed from day one.""I'm not here to hire sheriffs, I'm here to hire mayors.""Diversity is not about followers, religions, or converse. It's about skills."To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen on major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
At the Cisco Partner Summit, Technology Reseller News' Moshe Beauford spoke with Nathaniel Stearns, Splunk and cybersecurity consultant at Keos Technology, to discuss Cisco's integration of Splunk following its landmark acquisition and what it means for partners navigating the next era of AI-driven security. Stearns explained that Keos Technology—Splunk's largest professional services provider in the United States—works closely with resellers, distributors, and channel partners to provide pre- and post-sales support around Splunk implementations. “Cisco has been making very accelerated leaps to integrate all of Splunk’s products into its existing portfolio,” Stearns noted. “It's expanding their security capabilities in a really powerful way, and there's a large amount of education happening across the partner ecosystem.” As Cisco weaves Splunk into its infrastructure and security portfolio, Stearns emphasized the growing role of AI integration. “Artificial intelligence is all the buzz these days, but when it comes to driving business outcomes, AI has to be well integrated into valuable tools,” he said. “Cisco is doing a uniquely good job of connecting these tools—networking, security, observability, collaboration—and adding AI to make each one stronger.” For partners, this evolution represents a major opportunity. Stearns explained that Cisco's combined suite—including ThousandEyes, AppDynamics, and now Splunk—offers unmatched visibility, security, and operational intelligence. “Cisco has done a tremendous job bundling these all together and making it the single marketplace you want to go to for your security solutions,” he said. Looking ahead, Stearns predicts that Splunk's integration into Cisco will double its impact across the enterprise landscape. “Splunk was already a strong platform, but now that it's part of Cisco, there's an opportunity to double its business because it fits so perfectly within Cisco's ecosystem,” he added. “Resellers will have a unique opportunity to package these tools together and deliver holistic security and observability solutions.” Learn more about Keos Technology at https://www.keostechnology.com/.
We know there are problems in our security systems, but we can't and shouldn't fix everything. What do we fix? Who decides? How do we explain what's reasonable to people who do decide? Kayne McGladrey, CISOIn Residence at Hyperproof, joins us to explore risk, communication, and a surprising role for insurance.
We know there are problems in our security systems, but we can't and shouldn't fix everything. What do we fix? Who decides? How do we explain what's reasonable to people who do decide? Kayne McGladrey, CEO In Residence at Hyperproof, joins us to explore risk, communication, and a surprising role for insurance.
On the latest Cents of Security Podcast, we dive into Interactive Brokers' InvestMentorSM, a free app designed to make financial literacy simple and accessible for everyone.
Brian Long is the CEO & Co-Founder at Adaptive Security. In this episode, he joins host Paul John Spaulding and Adam Keown, CISO at Eastman, a Fortune 500 company focused on developing materials that enhance the quality of life while addressing climate change, the global waste crisis, and supporting a growing global population. Together, they discuss the rise of AI-powered social engineering, including various attack methods, and how businesses can face these threats. The AI Security Podcast is brought to you by Adaptive Security, the leading provider of AI-powered social engineering prevention solutions, and OpenAI's first and only cybersecurity investment. To learn more about our sponsor, visit https://AdaptiveSecurity.com
Ever wondered what happens to your online accounts when you're gone?
International law professors Chiara Giorgetti, Milena Sterio, and Rebecca Hamilton join Just Security's Managing Editor, Megan Corrarino, to discuss takeaways from the American Branch of the International Law Association (ABILA)'s Oct. 23-25 International Law Weekend. In this special episode co-produced with ABILA's International Law Chats podcast, which Giorgetti and Sterio co-host along with Alison Macdonald KC, the guests — each of whom also participated in International Law Weekend — discuss the weekend's theme, “Crisis as Catalyst on International Law”; takeaways from panels on topics ranging from the proposed Crimes against Humanity Treaty to international environmental law and more; and how international lawyers and law students might think about their role in the present moment. Show Note: International Law Chats - an ABILA podcast Crisis as Catalyst in International Law by Michael P. Scharf (October 16, 2025) Crisis as Catalyst: Past, Present, and Future of International Law by William J. Aceves, Amity Boye and Jessica Peake (October 21, 2025) A Series on the Occasion of ABILA's International Law Weekend 2025
Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: Medical Device Cybersecurity Is Tricky [The Industrial Security Podcast]Pub date: 2025-10-28Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationYes the device has to be safe to use on patients, and yes it has to produce its results reliably, but patient / data confidentiality is also really important. Naomi Schwartz of Medcrypt joins us to explore the multi-faceted world of medical device cybersecurity - from MRI's to blood sugar testers.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Ever wondered how easy it is to hack a car?
Yes the device has to be safe to use on patients, and yes it has to produce its results reliably, but patient / data confidentiality is also really important. Naomi Schwartz of Medcrypt joins us to explore the multi-faceted world of medical device cybersecurity - from MRI's to blood sugar testers.
In this week's Cents of Security Podcast, explored with Jeffrey Fidelman of Fidelman & Co. how startups can apply sales-style thinking to fundraising. Highlights: Why fundraising should mirror a sales funnel Why phone calls still matter How to qualify and nurture investor leads Common mistakes founders make—and how to avoid them Why asking for money is the point If you're raising capital or advising someone who is, this episode is packed with practical insights.
In this week's Cents of Security Podcast, I spoke with Jose Torres, Senior Economist at Interactive Brokers, about the latest CPI report and its ripple effects across the economy. Why inflation came in below expectations How housing costs drove the miss Why core inflation matters more than headline What it means for rate cuts and market momentum How Social Security and geopolitics factor in Jose's insights help decode the macro puzzle and what investors should watch next.
____________Podcast Redefining Society and Technology Podcast With Marco Ciappellihttps://redefiningsocietyandtechnologypodcast.com ____________Host Marco CiappelliCo-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybersecurity #Society
How is the transition to passkeys going in 2025?
Episode 4: Security as Code In this episode of the ePlus Security + F5 API Security Podcast, David Tumlin and Chuck Herrin dive into the future of “security as code,” where automation, AI, and DevSecOps converge to protect dynamic, ephemeral environments. From real-time threat validation to AI-assisted policy tuning, this is a must-listen for anyone building or securing modern apps.
Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: Hardware Hacking - Essential OT Attack Knowledge [the industrial security podcast]Pub date: 2025-10-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIf you can touch it, you can hack it, usually. And having hacked it, you can often more easily find exploitable vulnerabilities. Marcel Rick-Cen of Foxgrid walks us through the basics of hacking industrial hardware and software systems.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
If you can touch it, you can hack it, usually. And having hacked it, you can often more easily find exploitable vulnerabilities. Marcel Rick-Cen of Foxgrid walks us through the basics of hacking industrial hardware and software systems.
Identity theft affects millions of people every year — but do you really know how it works, or how to protect yourself? This week, we're joined by Eva Velasquez, CEO of the Identity Theft Resource Center, who shares the latest trends in identity crime and what steps you can take if it ever happens to you.
NPR journalist and host Mary Louise Kelly recently launched a national security podcast, Sources & Methods, where she discusses the biggest national security news of the week with NPR correspondents.In this bonus podcast, KOSU's Michael Cross visits with her about the new podcast and previews her upcoming visit to Oklahoma City on Nov. 4.
In this episode of the Cents of Security Podcast, host Mary MacNamara and Interactive Brokers Senior Economist Jose Torres unpack the Federal Reserve's September rate cut, its implications for labor markets, inflation, and investor sentiment. They also explore geopolitical developments, tariff dynamics, and the outlook for future monetary policy decisions.
What does cyberwarfare really look like behind the headlines? This week, Roo sits down with Hayley Benedict, a cyber intelligence analyst at RANE, to explore the evolving world of digital conflict. From hacktivists to disinformation specialists, Hayley shares how nation states, criminals, and ideologically driven groups are blurring lines — and why data theft, disruption, and doubt remain the weapons of choice.
Last week, Senator Elissa Slotkin (D-MI) unveiled a new “national security war plan,” centered on reviving the middle class, winning the global tech race, and rethinking how Americans are protected in an era of shifting threats and changing geopolitical realities. Senator Slotkin joins Just Security's editors-in-chief Ryan Goodman and Tess Bridgeman to discuss the relationship between economic security and national security, the tools Congress should use to defend against threats to our democracy, the role for congressional oversight in domestic use of the military and in the recent military attack on a suspected drug smuggling vessel in the Caribbean, how the United States should engage with China in an era of increasing competition and cooperation, and a range of other national security and foreign policy priorities.Show Notes: Senator Elissa Slotkin's launch of her new vision for American national security and foreign policy at the Council on Foreign Relations. Just Security's AI and Emerging Technology Archive Just Security's Congress Archive
NPR's Mary Louise Kelly is hosting a new national security podcast, Sources and Methods. She talked about it with KAZU.
Podcast: The Industrial Security Podcast (LS 36 · TOP 3% what is this?)Episode: Managing Risk with Digital Twins - What Do We Do Next? [the industrial security podcast]Pub date: 2025-09-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAsset inventory, networks and router / firewall configurations, device criticality - a lot of information. How can we USE this information to make useful decisions about next steps to address cyber risk? Vivek Ponada of Frenos joins us to explore a new kind of OT / industrial digital twin - grab all that data and work it to draw useful conclusions.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Asset inventory, networks and router / firewall configurations, device criticality - a lot of information. How can we USE this information to make useful decisions about next steps to address cyber risk? Vivek Ponada of Frenos joins us to explore a new kind of OT / industrial digital twin - grab all that data and work it to draw useful conclusions.
Want to work in cybersecurity but don't know where to begin? Or just curious what it takes to break into the field? This week, we're joined by the internet's very own Heath Adams, better known as The Cyber Mentor. He demystifies the application process and what it takes to build a career in cybersecurity – no matter your background.
This episode is a family-friendly extravaganza as we unpack the secrets to secure digital parenting. We're joined by Alanna Powers, a research specialist from the renowned Family Online Safety Institute (FOSI).
We don't have budget to fix the problem, so we accept the risk? Tim McCreight of TaleCraft Security in his (coming soon) book "I don't sign s**t" uses story-telling to argue that front line security leaders should not be accepting multi-billion dollar risks on behalf of the business. We need to escalate those decisions - with often surprising results when we do.
We don't have budget to fix the problem, so we accept the risk? Tim McCreight of TaleCraft Security in his (coming soon) book "I don't sign s**t" uses story-telling to argue that front line security leaders should not be accepting multi-billion dollar risks on behalf of the business. We need to escalate those decisions - with often surprising results when we do.
Ethical hacker Rachel Tobac joins us to answer a juicy question: How would she hack someone reasonably security savvy like Matt?
What does "secure by default" really mean—and is it enough? In this episode of CyberArk's Security Matters, host David Puner sits down with Scott Barronton, Chief Information Security Officer (CISO) at Diebold Nixdorf, to explore the often-overlooked risks of cloud default settings and how assumptions can lead to vulnerabilities.Drawing on over 25 years in cybersecurity, Scott shares how he balances product and corporate security, leads a global team, and chairs his company's AI steering committee. He discusses the importance of machine identity management, certificate automation, and building security programs that support both innovation and accountability.Plus, Scott reflects on how his passion for travel—including a group trip to Antarctica—informs his leadership style and security mindset.
NIS2 legislation is late in many EU countries, and the new CRA applies to most suppliers of industrial / OT computerized and software products to the EU. Christina Kiefer, attorney at reuschlaw, walks us through what's new and what it means for vendors, as well as for owner / operators.
NIS2 legislation is late in many EU countries, and the new CRA applies to most suppliers of industrial / OT computerized and software products to the EU. Christina Kiefer, attorney at reuschlaw, walks us through what's new and what it means for vendors, as well as for owner / operators.
We're back with a brand-new season of Random but Memorable! ✨
Hundreds of subsystems with the same IP addresses? Thousands of legacy devices with no modern encryption or other security? Constant, acquisitions of facilities "all over the place" network-wise and security-wise? What most of us need is "network duct tape". Tom Sego of Blastwave shows us how their "duct tape" works.
WE NEED YOU! Our 2025 listener survey is now live, and we'd love to hear from you. Whether you've been with us from episode one or just joined the chaos, your feedback will make the show even better.