show episodes
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Tous les jours
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
DataTalk

Experian

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque mois
 
Experian's DataTalk is a fun show featuring data science leaders and technologists from around the world. We talk about artificial intelligence, machine learning, deep learning, computer vision, data visualizations, data ethics, data philanthropy, and much more. Hosted by Mike Delgado
  continue reading
 
Artwork

1
GDPR Now!

Karen Heaton/Data Protection 4 Business

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque mois
 
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque mois
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork

1
The Privacy Advisor Podcast

Jedidiah Bracy, IAPP Editorial Director

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque mois
 
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
  continue reading
 
Artwork

1
To The Point - Cybersecurity

Forcepoint | Global Cybersecurity Leader | Security. Simplified.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque semaine
 
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
  continue reading
 
Artwork
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Smooth Scaling: System Design for High Traffic focuses on all things scalability, reliability, and performance. Tune in for expert advice on how to scale systems, control costs, boost availability, optimize performance, and get the most out of your tech stack. Host Jose Quaresma is the VP of Technical Engagement at Queue-it, working on the frontlines with some of the world’s biggest businesses on their busiest days, from Ticketmaster to Zalando to Home Office U.K. He’ll be joined by experts ...
  continue reading
 
This show is designed to keep you up to date on the latest trends happening in data, digital, outsourcing and software. Just 20-30 minutes long, each podcast session provides insight on legal issues relating to technology transactions and touches on relevant and timely topics.
  continue reading
 
Artwork

1
RowingChat

Rebecca Caroe

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque semaine
 
Rowing Chat is the podcast network dedicated to rowing. We have many shows hosted from around the world on specialist topics from Strength Training to USA news, from interviews to data analysis. Produced by Rebecca Caroe, it brings rowing news, coaching advice and interviews to you. Go to https://rowing.chat/ for links to the latest episodes & subscribe in your favourite podcast software.
  continue reading
 
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
  continue reading
 
Artwork

1
The indglobalaustralia’s Podcast

indglobalaustralia

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque mois
 
Software testing is the most important part of software development, but it is especially significant for healthcare software. Healthcare software applications manage patient data, offer medical services, and ensure compliance with various standards and regulations. Defects or errors in healthcare software can have consequences for patient security, data protection, and functional efficiency.
  continue reading
 
Artwork

1
Techlore Talks

Techlore

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque mois
 
Techlore Talks brings you in-depth conversations with the experts at the forefront of privacy, security, and digital rights. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode features meaningful discussions with the people building, researching, and advocating for digital freedom. From cybersecurity researchers and privacy tool developers to open-source advocates and digital rights activists—if they're shaping how we protect ourselves online, the ...
  continue reading
 
Artwork

1
Avero GovTech Insights

Abhijit Verekar

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque semaine
 
Welcome to Avero GovTech Insights, your go-to podcast for the latest trends, insights, and innovations in government technology. Each episode brings you expert analysis and discussions on a wide range of topics, from data analytics to digital transformation and public sector ERP systems. Join us as we explore the technologies shaping the future of public services and discover how you can leverage them to drive efficiency, transparency, and better outcomes for your community.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque semaine
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
Cyber Security Café

Beverley Roche

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque mois
 
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
  continue reading
 
Artwork

1
Certified: The CISSP Audio Course

Dr. Jason Edwards

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque semaine+
 
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
  continue reading
 
The federal government spends $90 billion on technology every year. If you are a tech innovator and want to expand your share of the market, this is the podcast for you to find new opportunities for growth. Every week, Federal Tech Podcast sits down with successful innovators who have solved complex computer system problems for federal agencies. They cover topics like Artificial Intelligence, Zero Trust, and the Hybrid Cloud. You can listen to the technical issues that concern federal agenci ...
  continue reading
 
Artwork

1
Cybercrime Magazine Podcast

Cybercrime Magazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Tous les jours+
 
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
  continue reading
 
Artwork

1
TMChats

Coforge

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque mois
 
Welcome to TMChats, the Innovation & Community Podcast powered by Coforge! We are a digital services and solutions provider and an Elite ServiceNow Partner in Australia. Here at Coforge, we feel we’ve got so much to share with the ServiceNow community, whether you’re an experienced developer or a new platform customer. We welcome you to relevant, insightful, and useful content to help you continue along your ServiceNow journey.
  continue reading
 
Artwork

1
The HR Uprising Podcast

Lucinda Carney

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque mois+
 
Welcome to the HR Uprising Podcast. This engaging podcast explores HR ‘hot’ topics and challenges through conversations with relevant experts and real-life HR; O.D. or L&D professionals. HR Uprising is about creating an inclusive forum that enables us to share and learn from experts and everyday professionals. Hosted by Actus CEO Lucinda Carney a Business Psychologist; Chartered Psychologist; Experienced HR Change Agent; Entrepreneur; Speaker and Coach. There are two types of show formats: T ...
  continue reading
 
Join us for wide-ranging interviews with water monitoring professionals, who share everything from nitty-gritty project details to big-picture perspective. These conversations between guests and our own groundwater and surface water experts offer fascinating insight into the world of water science and the incredible work being done to protect our precious water resources. Presented to you by In-Situ. We specialize in the manufacture and design of equipment and software used to solve water mo ...
  continue reading
 
Artwork

1
Trail of Bits

Trail of Bits

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque semaine+
 
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
  continue reading
 
Artwork
 
Every real estate investing coach, influencer, and figure head will tell you they have the answers to financial freedom. The goal of REsimpli’s podcast is to remove the redundant discourse and discuss the realities of the REI space. Host Sharad Mehta speaks to a range of investors in different niches about their wins, losses, and best practices. Through open and honest discussions, our guests provide high level strategies for RE investors at every level. REsimpli is a leading all-in-one inve ...
  continue reading
 
"Expedient: The Podcast" is your gateway to the inner workings of technology and innovation, presented with unparalleled clarity and expertise. Each episode is an invitation to join the luminaries of Expedient along with special guests from the forefront of the tech industry. We delve into the latest advancements in cloud computing, the evolution of data centers, cybersecurity trends, and groundbreaking developments in AI and machine learning. This podcast strips away the complexity of the t ...
  continue reading
 
Artwork

1
Be a Smarter Homeowner

Beth Dodson and John Bodrozic

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque mois
 
Welcome to Be a Smarter Homeowner podcast, where hosts, Beth Dodson and John Bodrozic are dedicated to helping you save money and get organized while managing, maintaining, protecting, improving, and eventually buying or selling your largest financial asset and biggest expense, your home. Discover how easy it is to be a smarter homeowner. Having worked with homeowners for over 20 years, your co-hosts are two of the three co-founders of HomeZada, a digital home management software platform th ...
  continue reading
 
Artwork
 
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep ​network visibility to not only protect against sophisticated cyber- ...
  continue reading
 
Has your antivirus just screamed "Threat Found!" and left you asking, "Now what?!" As a UK small business owner or sole trader, a cyber-attack can feel like a direct threat to your business livelihood, your reputation, and everything you've worked hard for. Don't panic! My Antivirus Says "Threat Found!" – Now What? is your essential Malware Alert First Aid Kit, designed specifically for UK SMEs who need practical, immediate cyber security advice to protect what matters most. This podcast cut ...
  continue reading
 
Artwork
 
Employing an outside company to handle all payroll-related duties is known as outsourcing payroll services in a business. The main reasons for using payroll management services are to cut costs and free up time when handling payroll-related financial operations. Employing a third party to handle payroll operations frees up a company from having to recruit and educate a sizable in-house payroll team, buy suitable payroll software, and keep up with complicated tax regulations. All business typ ...
  continue reading
 
Artwork

1
Lenovo Support +1(415)547-0376

Lenovo Support +1(415)547-0376

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Tous les jours+
 
Lenovo Customer Care +1(415)547-0376 Support Phone Number Facing any problem while dealing with your Lenovo device? Want to know various services provided by Lenovo? Or Want to access Lenovo Support Service? Click here!! Lenovo Support In today’s world of cut and throw competition, any firm which is ruling the market will keep ruling till their customers were satisfied. And having a satisfied customer is only possible with two things, i.e., Good Quality Product and best Customer Support Serv ...
  continue reading
 
Artwork

1
AI Automation Minute

Dr Teri Fisher

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Chaque mois
 
Welcome to AI Automation Minute – Your Shortcut to Smarter Workflows Step into the fast-paced world of AI and automation in healthcare with Dr. Teri Fisher in AI Automation Minute. Designed for busy professionals, each bite-sized daily episode delivers powerful insights, practical tools, and the latest trends to help you streamline your practice, save time, and enhance patient care— all in just one minute. Whether you're a cosmetic injector, doctor, nurse, dentist, or any healthcare provider ...
  continue reading
 
If you’re looking to improve your trading skills and make smarter decisions in the market, you’re in the right place! Funding Pips is offering a 20% discount on your first purchase when you use the exclusive coupon code “c9995e01”. Whether you’re just beginning your trading journey or looking for advanced strategies and tools, this limited-time offer will help you access top-tier resources at a fraction of the price. In the competitive world of trading, having the right tools, educational re ...
  continue reading
 
Loading …
show series
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
The transition to post-quantum cryptography (PQC) is becoming urgent as quantum computing advances accelerate, with major investments signaling that the assumed 5 to 10 year preparation window is shrinking. In 2026, QuantumXChange expects that the first binding PQC compliance requirements will emerge, particularly for financial services, healthcare…
  continue reading
 
Active exploitation of Fortinet VPN bypass utility observed Google possibly allowing users to change default gmail address June Aflac attack resulted in data theft Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintai…
  continue reading
 
The crew makes suggestions for building a hacking lab today! We will tackle: What is recommended today to build a lab, given the latest advancements in tech Hardware hacking devices and gadgets that are a must-have Which operating systems should you learn Virtualization technology that works well for a lab build Using AI to help build your lab Visi…
  continue reading
 
The $82.7 billion deal to acquire Warner Bros., and the acquisition has already been described as sending Hollywood into “full-blown panic mode,” “possibly a death blow to theatrical filmmaking,” and maybe even “the end of Hollywood” itself. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Coordinated scams target MENA region Pen Test Partners accused of 'blackmail' Hackers steal record $2.7B in crypto in 2025 Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join u…
  continue reading
 
Want to be the first to hear our episodes each week? Become a Patreon donor here. Merry Christmas and Happy Holidays! Links to this week’s stories: https://krebsonsecurity.com/2025/12/most-parked-domains-now-serving-malicious-content/ https://thehackernews.com/2025/12/russia-linked-hackers-use-microsoft-365.html?m=1 https://cybersecuritynews.com/am…
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
  continue reading
 
ServiceNow to acquire cybersecurity startup Armis MacSync Stealer adopts quieter installation Nissan customer data stolen in Red Hat raid Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real envir…
  continue reading
 
It’s the holidays, your defenses are down, your inbox is lying to you, and yes—you’re gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won’t save you, and why the real job is surviving after the click. From phishing and sm…
  continue reading
 
Cybercrime Magazine has a new podcast series coming soon, brought to you by Mend.io, whose mission is to make application security frictionless for developers and scalable for security teams – without compromise. Deputy editor Amanda Glassner caught up with Amir Shahmiri, senior sales engineer, at Black Hat Europe 2025. This episode was brought to …
  continue reading
 
Pirate group Anna’s Archive says it has scraped 86 million songs from Spotify. Also, OpenAI says prompt injections will always be a risk for AI browsers with agentic capabilities, like Atlas. But the firm is beefing up its cybersecurity with an 'LLM-based automated attacker.' Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Cybercrime Magazine met with Alex Zoldova, Board Member, Women In Cybersecurity at Microsoft when we were at Black Hat Europe 2025 in London. She spoke with us about the state of women in cybersecurity today, as well as the value of mentoring, the imperative to increase STEM education opportunities for young people, and more. Connect with Alex Zold…
  continue reading
 
Cybercrime Magazine was a media partner at Black Hat Europe 2025, marking a new chapter for our reporting. Conversations centered around familiar topics – including ransomware, artificial intelligence, and cloud security – but being on location in Europe, there was one unavoidable question: how do today’s cybersecurity challenges look from a Europe…
  continue reading
 
Michael Centrella is the Head of Public Policy at SecurityScorecard. In this episode, he joins host Paul Spaulding and Anton Chuvakin, Security Advisor at Office of the CISO, Google Cloud, to reflect back on 2025 and look ahead to 2026 in terms of cybersecurity. SecurityScorecard's mission is to make the world a safer place by transforming the way …
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss the recent data breach at Conduent, including the company's anticipated cost of the incident, their next steps, and more. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-ti…
  continue reading
 
Love a hot take? 🔥 You’re in luck! We’re back with a special end-of-year treat: a rapid-fire round of cybersecurity hot takes guaranteed to start arguments in your group chats and hijack at least one Slack thread. 💬 The team weighs in on bold claims like “Passwords will finally die in 2026” and “AI will solve more cybersecurity problems than it cau…
  continue reading
 
Welcome to another episode of the To the Point Cybersecurity Podcast! This week, hosts Rachael Lyon and Jonathan Knepher are kicking off the holiday season with a fascinating conversation featuring David Saunders, Director of Forcepoint Security Lab and a seasoned cybersecurity professional with more than two decades of experience. The discussion d…
  continue reading
 
Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/…
  continue reading
 
Alphabet is set to pay $4.75 billion in cash, plus debt, for the data center and clean energy developer. Also, the move is the latest attempt by the Trump administration to delay the construction of 6 gigawatts of offshore wind near a hotspot of data center development. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
  continue reading
 
Spotify music library scraped DDoS disrupts France's postal and banking services Fake delivery websites hit holiday shoppers Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join…
  continue reading
 
Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Jason Taule, CISO, Luminis Health, and Chris Ray, Field CTO, GigaOm Thanks to our show sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zer…
  continue reading
 
The bill will require large AI developers to publish information about their safety protocols and report safety incidents to the state within 72 hours. Also, the newest episode raises questions about whether Sequoia's new leadership -- managing partners Alfred Lin and Pat Grady, who took over last month -- can or will rein in Maguire's social media…
  continue reading
 
Cassie Crossley is an internationally recognized cybersecurity and technology executive, and author of “Software Supply Chain Security." In this episode, she joins host Kris Lovejoy, Global Security and Resilience Practice Leader at Kyndryl, to discuss software supply chain security, including how to navigate compliance, automation, ecosystem resil…
  continue reading
 
Ahmad Halabi is the managing director at Resecurity. In this episode, he joins host Scott Schober to discuss brand protection in cybersecurity and why it is important for organizations today, as well as what types of threats can impact brands, look-alike domains, and more. The Power of Threat Intelligence, a Cybercrime Magazine podcast series broug…
  continue reading
 
@WomenKnowCyber on X, curated by Cybercrime Magazine Media Coordinator Taylor Fox, is chock full of inspiring stories, people, and resources. In this episode, Fox joins host Amanda Glassner to discuss why it's important to elevate women in cybersecurity, how the daily stories are chosen, and more. • For more on cybersecurity, visit us at https://cy…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
Once you sign a software contract, your leverage is gone. In this GovTech episode, Megan and Billie break down what public-sector teams must understand before finalizing a software agreement—especially when implementation timelines, payment terms, and post-go-live support are on the line. You’ll learn: Why you should define “go-live” and every majo…
  continue reading
 
Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There’s a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn’t infringe on any individual organization’s privacy. That’s why we hear the i…
  continue reading
 
President signs defense bill funding Cyber Command, Pentagon phone security Iranian APT Infy resurfaces with new malware Massive Android botnet Kimwolf launches DDoS attack Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement an…
  continue reading
 
Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.theregister.com/2025/12/09/hypervisor_ransomware_attacks_increasing https://www.bleepingcomputer.com/news/security/react2shell-flaw-exploited-to-breach-30-orgs-77k-ip-addresses-vulnerable https://www.infosecurity-magazine.com/…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
The gaming startup will allow Netflix subscribers to create avatars that can extend across gaming titles. Also, Meta is working on an image and video model and new text-based model, which aids with coding. Learn more about your ad choices. Visit podcastchoices.com/adchoicesPar TechCrunch
  continue reading
 
Despite AI dominating headlines, Network World notes that 2025 proved to be a landmark year for quantum computing, with the UN declaring it the International Year of Quantum Science and Technology. Quantinuum launched the Helios quantum computer in November, claiming it's the most accurate commercial system available, while the industry raised $3.7…
  continue reading
 
As a media sponsor at Black Hat Europe 2025, Cybercrime Magazine caught up with leaders from across the cybersecurity sector, including Or Chen, co-founder and CPO at Clover Security. In this episode, Chen discussed the company's approach to reinventing product security, artificial intelligence, and more. • For more on cybersecurity, visit us at ht…
  continue reading
 
David Braue, Editor-At-Large for Cybercrime Magazine, joins host Scott Schober in this episode to discuss Austrlia's world-first teen social media ban, which went into effect this month. Together, they discuss how the ban is sitting with teens and parents across the country, the new rules platforms must follow, and more. • For more on cybersecurity…
  continue reading
 
In this Tech Talks episode, Mayer Brown partners Ana Bruder, Julian Dibbell, Gabriela Kennedy, Arsen Kourinian, and Oliver Yaros put four AI regimes head to head: the European Union's risk based Act, the United Kingdom's light touch approach, Asia's mixed models, and the United States' state by state patchwork. Their contracting playbook: lock down…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
The FTC alleged Instacart misled consumers with unlawful tactics, causing them to pay higher fees while also denying refunds. Also, Apple says it can now collect any money a developer owes the tech giant at any time. Learn more about your ad choices. Visit podcastchoices.com/adchoicesPar TechCrunch
  continue reading
 
Recent Windows updates break RemoteApp connections France arrests threat actors for installing malware on Italian ferry Senate Intel chair urges safeguard against open-source software threats Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Security …
  continue reading
 
This week's Surveillance Report covers the internet's free speech protections under attack as a US Senator moves to repeal Section 230. Plus: ransomware attacks escalate with React2Shell exploitation, India orders government access to encrypted messaging, AI "superintelligence" fear is being used to justify actual corporate manipulation happening r…
  continue reading
 
Loading …

Guide de référence rapide

Écoutez cette émission pendant que vous explorez
Lire