POPULARITY
Categories
On the latest Cents of Security Podcast, we dive into Interactive Brokers' InvestMentorSM, a free app designed to make financial literacy simple and accessible for everyone.
Brian Long is the CEO & Co-Founder at Adaptive Security. In this episode, he joins host Paul John Spaulding and Adam Keown, CISO at Eastman, a Fortune 500 company focused on developing materials that enhance the quality of life while addressing climate change, the global waste crisis, and supporting a growing global population. Together, they discuss the rise of AI-powered social engineering, including various attack methods, and how businesses can face these threats. The AI Security Podcast is brought to you by Adaptive Security, the leading provider of AI-powered social engineering prevention solutions, and OpenAI's first and only cybersecurity investment. To learn more about our sponsor, visit https://AdaptiveSecurity.com
Ever wondered what happens to your online accounts when you're gone?
International law professors Chiara Giorgetti, Milena Sterio, and Rebecca Hamilton join Just Security's Managing Editor, Megan Corrarino, to discuss takeaways from the American Branch of the International Law Association (ABILA)'s Oct. 23-25 International Law Weekend. In this special episode co-produced with ABILA's International Law Chats podcast, which Giorgetti and Sterio co-host along with Alison Macdonald KC, the guests — each of whom also participated in International Law Weekend — discuss the weekend's theme, “Crisis as Catalyst on International Law”; takeaways from panels on topics ranging from the proposed Crimes against Humanity Treaty to international environmental law and more; and how international lawyers and law students might think about their role in the present moment. Show Note: International Law Chats - an ABILA podcast Crisis as Catalyst in International Law by Michael P. Scharf (October 16, 2025) Crisis as Catalyst: Past, Present, and Future of International Law by William J. Aceves, Amity Boye and Jessica Peake (October 21, 2025) A Series on the Occasion of ABILA's International Law Weekend 2025
Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: Medical Device Cybersecurity Is Tricky [The Industrial Security Podcast]Pub date: 2025-10-28Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationYes the device has to be safe to use on patients, and yes it has to produce its results reliably, but patient / data confidentiality is also really important. Naomi Schwartz of Medcrypt joins us to explore the multi-faceted world of medical device cybersecurity - from MRI's to blood sugar testers.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Ever wondered how easy it is to hack a car?
Yes the device has to be safe to use on patients, and yes it has to produce its results reliably, but patient / data confidentiality is also really important. Naomi Schwartz of Medcrypt joins us to explore the multi-faceted world of medical device cybersecurity - from MRI's to blood sugar testers.
In this week's Cents of Security Podcast, explored with Jeffrey Fidelman of Fidelman & Co. how startups can apply sales-style thinking to fundraising. Highlights: Why fundraising should mirror a sales funnel Why phone calls still matter How to qualify and nurture investor leads Common mistakes founders make—and how to avoid them Why asking for money is the point If you're raising capital or advising someone who is, this episode is packed with practical insights.
In this week's Cents of Security Podcast, I spoke with Jose Torres, Senior Economist at Interactive Brokers, about the latest CPI report and its ripple effects across the economy. Why inflation came in below expectations How housing costs drove the miss Why core inflation matters more than headline What it means for rate cuts and market momentum How Social Security and geopolitics factor in Jose's insights help decode the macro puzzle and what investors should watch next.
____________Podcast Redefining Society and Technology Podcast With Marco Ciappellihttps://redefiningsocietyandtechnologypodcast.com ____________Host Marco CiappelliCo-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybersecurity #Society
How is the transition to passkeys going in 2025?
Episode 4: Security as Code In this episode of the ePlus Security + F5 API Security Podcast, David Tumlin and Chuck Herrin dive into the future of “security as code,” where automation, AI, and DevSecOps converge to protect dynamic, ephemeral environments. From real-time threat validation to AI-assisted policy tuning, this is a must-listen for anyone building or securing modern apps.
Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: Hardware Hacking - Essential OT Attack Knowledge [the industrial security podcast]Pub date: 2025-10-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIf you can touch it, you can hack it, usually. And having hacked it, you can often more easily find exploitable vulnerabilities. Marcel Rick-Cen of Foxgrid walks us through the basics of hacking industrial hardware and software systems.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
If you can touch it, you can hack it, usually. And having hacked it, you can often more easily find exploitable vulnerabilities. Marcel Rick-Cen of Foxgrid walks us through the basics of hacking industrial hardware and software systems.
Identity theft affects millions of people every year — but do you really know how it works, or how to protect yourself? This week, we're joined by Eva Velasquez, CEO of the Identity Theft Resource Center, who shares the latest trends in identity crime and what steps you can take if it ever happens to you.
NPR journalist and host Mary Louise Kelly recently launched a national security podcast, Sources & Methods, where she discusses the biggest national security news of the week with NPR correspondents.In this bonus podcast, KOSU's Michael Cross visits with her about the new podcast and previews her upcoming visit to Oklahoma City on Nov. 4.
Hacktivists don't need zero-days to hurt you—they weaponize people. Host Lieuwe Jan Koning sits down with Yuri Wit (SOC analyst) and Rob Maas (Field CTO) to dissect APT Handala: how they hunt targets, deliver wipers, and brag about leaks. We map their moves to the Lockheed Martin Kill Chain and turn it into a Zero Trust defense playbook you can actually use—today.(00:00) - - 01:40 - Introduction (01:40) - - 02:27 - What is APT Handala? (02:27) - - 05:27 - Kill Chain Step 1: Reconnaissance (05:27) - - 06:43 - Kill Chain Step 2: Weaponization (06:43) - - 10:39 - Kill Chain Step 3: Delivery (10:39) - - 14:37 - Kill Chain Step 4: Exploitation (14:37) - - 17:34 - Kill Chain Step 5: Installation (17:34) - - 23:39 - Kill Chain Step 6: Command and control (23:39) - - 26:40 - Kill Chain Step 7: Act on objectives (26:40) - - 29:35 - How to respond to being hacked (29:25) - - 30:22 - Closing notes Key Topics Covered• Handala's playbook: people-centric recon, phishing kits, wipers, boast-and-leak ops.• Zero Trust counters: deny-by-default egress, newly-registered-domain blocks, hard EDR, passkeys.• SOC tells: DNS DGA spikes, encrypted C2 on common apps, “human error” as the biggest CVE.• Comms reality: when openness helps—and when strategic silence limits amplification.Additional Resources• ON2IT Zero Trust: https://on2it.net/zero-trust/• Lockheed Martin Cyber Kill Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html• Tor Project (onion services): https://www.torproject.org/• Threat Talks hub: https://threat-talks.com/Click here to view the episode transcript.
In this episode of the Cents of Security Podcast, host Mary MacNamara and Interactive Brokers Senior Economist Jose Torres unpack the Federal Reserve's September rate cut, its implications for labor markets, inflation, and investor sentiment. They also explore geopolitical developments, tariff dynamics, and the outlook for future monetary policy decisions.
What does cyberwarfare really look like behind the headlines? This week, Roo sits down with Hayley Benedict, a cyber intelligence analyst at RANE, to explore the evolving world of digital conflict. From hacktivists to disinformation specialists, Hayley shares how nation states, criminals, and ideologically driven groups are blurring lines — and why data theft, disruption, and doubt remain the weapons of choice.
Last week, Senator Elissa Slotkin (D-MI) unveiled a new “national security war plan,” centered on reviving the middle class, winning the global tech race, and rethinking how Americans are protected in an era of shifting threats and changing geopolitical realities. Senator Slotkin joins Just Security's editors-in-chief Ryan Goodman and Tess Bridgeman to discuss the relationship between economic security and national security, the tools Congress should use to defend against threats to our democracy, the role for congressional oversight in domestic use of the military and in the recent military attack on a suspected drug smuggling vessel in the Caribbean, how the United States should engage with China in an era of increasing competition and cooperation, and a range of other national security and foreign policy priorities.Show Notes: Senator Elissa Slotkin's launch of her new vision for American national security and foreign policy at the Council on Foreign Relations. Just Security's AI and Emerging Technology Archive Just Security's Congress Archive
NPR's Mary Louise Kelly is hosting a new national security podcast, Sources and Methods. She talked about it with KAZU.
Podcast: The Industrial Security Podcast (LS 36 · TOP 3% what is this?)Episode: Managing Risk with Digital Twins - What Do We Do Next? [the industrial security podcast]Pub date: 2025-09-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationAsset inventory, networks and router / firewall configurations, device criticality - a lot of information. How can we USE this information to make useful decisions about next steps to address cyber risk? Vivek Ponada of Frenos joins us to explore a new kind of OT / industrial digital twin - grab all that data and work it to draw useful conclusions.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Asset inventory, networks and router / firewall configurations, device criticality - a lot of information. How can we USE this information to make useful decisions about next steps to address cyber risk? Vivek Ponada of Frenos joins us to explore a new kind of OT / industrial digital twin - grab all that data and work it to draw useful conclusions.
Want to work in cybersecurity but don't know where to begin? Or just curious what it takes to break into the field? This week, we're joined by the internet's very own Heath Adams, better known as The Cyber Mentor. He demystifies the application process and what it takes to build a career in cybersecurity – no matter your background.
Episode 3: Increased Adoption of AI and Machine Learning In this episode, ePlus' David Tumlin and F5's Chuck Herrin break down how the AI boom is reshaping API security—and why skipping visibility is a risk you can't afford. Learn about the blind spots you'll face if you forgo API security and don't have your API ecosystems under control.
This episode is a family-friendly extravaganza as we unpack the secrets to secure digital parenting. We're joined by Alanna Powers, a research specialist from the renowned Family Online Safety Institute (FOSI).
We don't have budget to fix the problem, so we accept the risk? Tim McCreight of TaleCraft Security in his (coming soon) book "I don't sign s**t" uses story-telling to argue that front line security leaders should not be accepting multi-billion dollar risks on behalf of the business. We need to escalate those decisions - with often surprising results when we do.
We don't have budget to fix the problem, so we accept the risk? Tim McCreight of TaleCraft Security in his (coming soon) book "I don't sign s**t" uses story-telling to argue that front line security leaders should not be accepting multi-billion dollar risks on behalf of the business. We need to escalate those decisions - with often surprising results when we do.
Podcast: The Industrial Security Podcast (LS 36 · TOP 3% what is this?)Episode: I don't sign s**t [The Industrial Security Podcast]Pub date: 2025-08-11Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWe don't have budget to fix the problem, so we accept the risk? Tim McCreight of TaleCraft Security in his (coming soon) book "I don't sign s**t" uses story-telling to argue that front line security leaders should not be accepting multi-billion dollar risks on behalf of the business. We need to escalate those decisions - with often surprising results when we do.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Ethical hacker Rachel Tobac joins us to answer a juicy question: How would she hack someone reasonably security savvy like Matt?
Podcast: The Industrial Security Podcast (LS 36 · TOP 3% what is this?)Episode: NIS2 and the Cyber Resilience Act (CRA) [The Industrial Security Podcast]Pub date: 2025-07-28Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationNIS2 legislation is late in many EU countries, and the new CRA applies to most suppliers of industrial / OT computerized and software products to the EU. Christina Kiefer, attorney at reuschlaw, walks us through what's new and what it means for vendors, as well as for owner / operators.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
What does "secure by default" really mean—and is it enough? In this episode of CyberArk's Security Matters, host David Puner sits down with Scott Barronton, Chief Information Security Officer (CISO) at Diebold Nixdorf, to explore the often-overlooked risks of cloud default settings and how assumptions can lead to vulnerabilities.Drawing on over 25 years in cybersecurity, Scott shares how he balances product and corporate security, leads a global team, and chairs his company's AI steering committee. He discusses the importance of machine identity management, certificate automation, and building security programs that support both innovation and accountability.Plus, Scott reflects on how his passion for travel—including a group trip to Antarctica—informs his leadership style and security mindset.
NIS2 legislation is late in many EU countries, and the new CRA applies to most suppliers of industrial / OT computerized and software products to the EU. Christina Kiefer, attorney at reuschlaw, walks us through what's new and what it means for vendors, as well as for owner / operators.
NIS2 legislation is late in many EU countries, and the new CRA applies to most suppliers of industrial / OT computerized and software products to the EU. Christina Kiefer, attorney at reuschlaw, walks us through what's new and what it means for vendors, as well as for owner / operators.
We're back with a brand-new season of Random but Memorable! ✨
In this episode, ePlus' David Tumlin and F5's Chuck Herrin discuss how securing modern applications isn't just about tools—it's about people. Hear how ePlus and F5 are helping organizations break down silos and build secure, scalable systems—together.
Podcast: The Industrial Security Podcast (LS 36 · TOP 3% what is this?)Episode: Network Duct Tape [The Industrial Security Podcast]Pub date: 2025-07-11Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationHundreds of subsystems with the same IP addresses? Thousands of legacy devices with no modern encryption or other security? Constant, acquisitions of facilities "all over the place" network-wise and security-wise? What most of us need is "network duct tape". Tom Sego of Blastwave shows us how their "duct tape" works.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Hundreds of subsystems with the same IP addresses? Thousands of legacy devices with no modern encryption or other security? Constant, acquisitions of facilities "all over the place" network-wise and security-wise? What most of us need is "network duct tape". Tom Sego of Blastwave shows us how their "duct tape" works.
Hundreds of subsystems with the same IP addresses? Thousands of legacy devices with no modern encryption or other security? Constant, acquisitions of facilities "all over the place" network-wise and security-wise? What most of us need is "network duct tape". Tom Sego of Blastwave shows us how their "duct tape" works.
WE NEED YOU! Our 2025 listener survey is now live, and we'd love to hear from you. Whether you've been with us from episode one or just joined the chaos, your feedback will make the show even better.
Podcast: The Industrial Security Podcast (LS 36 · TOP 3% what is this?)Episode: Credibility, not Likelihood [The Industrial Security Podcast]Pub date: 2025-06-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationSafety defines cybersecurity - Kenneth Titlestad of Omny joins us to explore safety, risk, likelihood, credibility, and deterministic / unhackable cyber defenses - a lot of it in the context of Norwegian offshore platforms.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Safety defines cybersecurity - Kenneth Titlestad of Omny joins us to explore safety, risk, likelihood, credibility, and deterministic / unhackable cyber defenses - a lot of it in the context of Norwegian offshore platforms.
Safety defines cybersecurity - Kenneth Titlestad of Omny joins us to explore safety, risk, likelihood, credibility, and deterministic / unhackable cyber defenses - a lot of it in the context of Norwegian offshore platforms.
Random but Memorable turns 150! 1️⃣5️⃣0️⃣ (It's official, we're old.)
In this episode, Mark Ledlow, Bruno Dias, and Matt Talbot discuss the importance of comprehensive threat and risk assessments in corporate and educational environments. They explore the integration of physical security with behavioral threat assessments, emphasizing the crucial role every employee plays in maintaining safety. Additionally, they touch on the psychological aspects of individuals who commit acts of violence, drawing on their own extensive field experiences. Matt shares a powerful story from his time working in a high-risk prison environment, highlighting the importance of building trust and respect with inmates. The episode wraps up with information about their ongoing projects and how listeners can reach out to them for their expert services.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSAdversity Handling: The importance of dealing with adversity and leveraging experiences to stay fearless is emphasized. Comprehensive Security Approach: Incorporating physical security into behavioral threat assessment provides a unique value. Inclusiveness in Safety: Every employee, regardless of their role, should be viewed as part of the safety and security team. Warning Signs: Identifying and acting on warning behaviors and signs is crucial in preventing violent incidents. Human Side of Inmates: Building respectful relationships with inmates can foster mutual respect and potentially prevent violent outcomes. Impactful Storytelling: Personal stories, such as working with high-risk individuals, can convey powerful lessons in security management. Legacy and Education: The importance of leaving a positive legacy and educating the next generation of security professionals.QUOTES"We really need to think about everybody who is positioned to be able to possibly help." "Humans communicate kind of like dogs shed hair, right? It's just a necessity." "Everybody plays a role... there's something good in everybody and my job was to figure that out." "Sometimes it's about just getting to the human side of somebody." "Treating people with validation and making them feel significant can prevent them from committing violent acts." "Our goal is to leave something original, something impacting on this larger community."Get to know more about Dr. Bruno Dias through the link below.https://www.linkedin.com/in/brunodiaspci/Get to know more about Dr. Matt Talbot through the link below.https://www.linkedin.com/in/matt-talbot-phd-lcsw-ccfc-cfmhe-ctm%C2%AE-5a655044To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
AI has taken us into uncharted territory.
How did they get in? How did we find them when they got in? What can we do in future to clean up the mess faster? Chris Sistrunk reflects on a decades' industrial cyber incident response experience at Mandiant (Google).
It's our World Password Day Special!
What's the best thing small businesses can do to improve their security posture?
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Travis Farral. Travis has been working in information security since the 90s at places such as Nokia, ExxonMobil, and XTO Energy. He is currently VP & CISO at Archaea Energy, a bp owned, renewable natural gas company based in Houston, Texas. He has spoken at events around world on topics such as Cyber Threat Intelligence, MITRE ATT&CK, and Incident Response. Notable activities during his career include everything from programming logic controllers, building and leading SOCs, driving forklifts, standing up cybersecurity teams, developing threat intelligence programs, and handling responses to incidents, among many other things over the last few decades. [April 21, 2025] 00:00 - Intro 00:18 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 02:08 - Travis Farral Intro 02:58 - A Different Path than Today 05:25 - Healthy Hacking 08:08 - Anything Can Be Weaponized 10:54 - Questionable Behavior 14:31 - Smash That Report Button!!! 18:58 - Improving Our Odds 21:00 - You Have to Keep It Simple 22:25 - Letters to a Young CISO 24:20 - Find Travis Farral online - LinkedIn: linkedin.com/in/travisfarral 25:01 - Mentors - Shawn Edwards - Jay Leek 27:02 - Book Recommendations - R. E. Lee: A Biography - Douglas Southall Freeman 29:34 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org