show episodes
 
Artwork
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
  continue reading
 
Our worst fears come true... on the home front. An ordinary woman is swept up into an extraordinary plot against America, by Russian domestic terrorists. She's overheard key details of the plot, but does not speak Russian... until she undergoes an experimental procedure, and becomes America's unlikely best chance against enemies hiding in plain sight.
  continue reading
 
For “Marketplace” host Kai Ryssdal, joining the Navy fresh out of college was a defining chapter in his life. It was the 1980s; the Cold War and the Soviet Union was the greatest threat. Fast-forward through 40 years — and one career change — and the threat looks different. Climate change has no face or flag, but it will fundamentally change the way the U.S. military trains and fights. It already has. “How We Survive” is an award-winning podcast from Marketplace about the messy business of c ...
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

Unsubscribe
Unsubscribe
Monthly+
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. brad@securit360.com
  continue reading
 
Artwork

1
Threat Status

The Washington Times

Unsubscribe
Unsubscribe
Weekly
 
An edgy and informative look at the biggest U.S. national security and geopolitical issues making headlines right now. Less about hot takes and more about depth, the Threat Status podcast is helmed by veteran Washington Times journalists Ben Wolfgang and Guy Taylor and features regular appearances by insiders with expertise on war, politics and global affairs.
  continue reading
 
Artwork

1
Flashpoint

Tenderfoot TV and iHeartPodcasts

Unsubscribe
Unsubscribe
Monthly+
 
On July 27th, 1996, a domestic terrorist bombed the Summer Olympic Games held in Atlanta, GA. While the FBI and the media fixated on the wrong man, the bomber planned his next, more overtly political attacks on 2 abortion clinics and a gay nightclub. The bomber would later be identified as a dedicated soldier in the white-supremacist Christian Identity Movement. Through the lens of these 4 bombings, and the victims left to pick up the pieces, Flashpoint explores America's greatest threat, th ...
  continue reading
 
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
  continue reading
 
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
Power, greed, religion and sex: historian Dan Jones brings the drama of mediaeval history to life through compelling stories, fascinating characters and vivid scenes. “A Dynasty to Die For” tells the story of the Plantagenets, one of the most powerful and dysfunctional families in European history. Their scandals, betrayals and bloody politics shaped the world we live in today. In Season 6 we meet King Edward III, the ambitious warrior responsible for starting the Hundred Years’ War. But whi ...
  continue reading
 
Unraveled is hosted by journalist Alexis Linkletter. Each season features a deep dive investigation into a case or issue. Season 1 covers the case of the Long Island Serial Killer. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
America through the looking glass - enter a world where nothing is as it seems. As America heads into a presidential election, Gabriel Gatehouse dives back into the labyrinthine rabbit warren of American conspiracy culture. Whilst liberals across the world worry about a possible return of Donald Trump, millions of Americans are convinced that their democracy has already been highjacked - by a sinister Deep State cabal. How did this happen? And who is behind it? That's the story that Gabriel ...
  continue reading
 
Artwork

1
Daily Cyber Threat Brief

Gerald Auger, PhD - Simply Cyber

Unsubscribe
Unsubscribe
Daily
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
  continue reading
 
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
  continue reading
 
Welcome to UFO...No! the podcast that covers the weird, the whacky and the obscure. We connect the dots that most people are too normal to connect! Are UFOs actually aliens or are they top secret technology? Is anal probing a real threat? We're a blend of "believers" or "skeptics," speculators of the unknown
  continue reading
 
Artwork
 
Totally Terrorism is a Pool Re Podcast - the UK's leading terrorism reinsurer. Each month the Pool Re threat analysis team speaks with a leading expert from the terrorism and counter-terrorism field about the threat posed by terrorism. Experts featured on the podcast include academics, policy makers, and practitioners amongst others, all with a distinct assessment or perspective of terrorism threat. The podcast will cover a range of topics including but not limited to: terrorist groups, terr ...
  continue reading
 
Artwork

1
The Breach Report

Robert Wortmann, Rense Buijen

Unsubscribe
Unsubscribe
Daily+
 
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
  continue reading
 
Artwork

1
Ahead of the Threat

Federal Bureau of Investigation

Unsubscribe
Unsubscribe
Monthly+
 
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
  continue reading
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
  continue reading
 
Artwork

1
Out of the Woods: The Threat Hunting Podcast

Out of the Woods: The Threat Hunting Podcast

Unsubscribe
Unsubscribe
Monthly+
 
Intel 471's podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, all over a cocktail ...
  continue reading
 
Artwork
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
  continue reading
 
Artwork

1
Serious Danger

Emerald Moon & Tom Ballard

Unsubscribe
Unsubscribe
Weekly+
 
Serious Danger is a podcast about our broken political system and its greatest threat: the Greens. Join traitorous SJWs Emerald Moon and Tom Ballard as they discuss the #auspol news of the week, chat to key figures from the left movement, and talk about how to win a future for all of us. This is NOT an official Greens party podcast, but it IS the official podcast of trying to not go insane while experiencing the sh*tshow that is Australian politics. / Produced by Michael Griffin / Twitter & ...
  continue reading
 
Artwork

1
DrZeroTrust

Dr. Chase Cunningham

Unsubscribe
Unsubscribe
Weekly
 
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
  continue reading
 
Artwork

1
STR: Suspicious Transaction Report

Royal United Services Institute

Unsubscribe
Unsubscribe
Monthly
 
From the team analysing the intersection of finance and security, tune into compelling conversations on the real-world impact of global illicit finance. This podcast explores the financial dimensions of today’s leading transnational security challenges. Host Tom Keatinge and the team from the Centre for Finance and Security at RUSI bring you unique insights on the challenges posed by illicit finance and practical analysis of the policy responses. They interview top thinkers and influential v ...
  continue reading
 
Is our musical culture facing an existential threat? With ever smaller numbers of young people learning instruments, the gradual erasing of music from state education and years of declining funding, things may be worse than you think. Sound World investigates the state of music today and looks at what we can do to safeguard it for future generations.
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton, Chuck Randolph, and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you sec ...
  continue reading
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

Unsubscribe
Unsubscribe
Monthly+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
Artwork
 
VerSprite is a leader in risk-based cybersecurity services and PASTA threat modeling, enabling businesses to improve the protection of critical assets, ensure compliance, and manage risk. Our mission is to help you understand and improve your organization’s cybersecurity posture. With cyberattacks increasing in number and sophistication daily, it is essential to protect your organization’s assets, protect your clients, and maintain the same, excellent reputation and trust you have worked har ...
  continue reading
 
Loading …
show series
 
In our latest episode of the Future of Threat Intelligence, David speaks with Deb Radcliff, Cybersecurity Analyst, Journalist, & Author of the Breaking Backbones hacker trilogy, who shares her unique journey from investigative journalism to writing her books. She discusses the importance of understanding hacker culture and the human side of cybercr…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
  continue reading
 
Join us in this episode of Threat Vector as guest host Michael Heller shares his conversation with Harriet Farlow, CEO of Mileva Security Labs and a pioneer in AI security research. With a background spanning AI and national cybersecurity, Harriet shares her journey into adversarial machine learning and the critical importance of addressing AI secu…
  continue reading
 
On this episode of Ahead of the Threat, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Chris Cwalina, global head of cybersecurity and privacy at Norton Rose Fulbright. Chris and his team of lawyers advise clients on how to minimize damage from sophisticated data breaches and cybersecurity inciden…
  continue reading
 
In this episode, we discuss the broad concept of risk, what it is, and how to manage it. This episode is a great way to begin understanding how to develop an overall risk management strategy at your organization or understand how a risk management program might work for you. You find out more about what Rob and his team can do here: https://www.sec…
  continue reading
 
In this episode of Out of the Woods: The Threat Hunting Podcast, Scott Poley sits down with Brian Hill, a cybersecurity leader with a rich background in law enforcement, military service, and corporate security. Brian shares his journey from major crimes detective and forensics expert to building and managing Security Operations Centers (SOCs) at o…
  continue reading
 
Bruce Greenwood (Netflix's The Fall Of The House Of Usher, Fox's The Resident) stars in the thriller/horror audio drama, Primal. An FBI agent on the trail of a bizarre killer stumbles onto a terrifying plot to return humanity to its primal roots. Look for Primal, from Voyage Media, anywhere you listen to podcasts. Learn more about your ad choices. …
  continue reading
 
Tom and Julie plan the rise of a supergroup called The Buffet All Stars and watch clips of a guy who makes hats out of dried cucumbers, the world’s NEW biggest chicken shaped building, a child who won a pie eating contest, and more! Plus Steph Curry, auditory hallucinations, Hugh Grant as Jar Jar Binks, Travis Kelce, ribbon candy, Runaround Sue, ho…
  continue reading
 
In today’s episode of The Daily Threat, we cover three breaking cybersecurity stories that you can’t afford to ignore! From foreign hackers targeting U.S. telecoms to a deadly new wiper malware wreaking havoc, and big changes looming at the top U.S. cyber agency, we’ve got the latest news that could impact your business. Stay informed, stay protect…
  continue reading
 
Ben and Guy break down President-elect Donald Trump's controversial cabinet nominations in the military and intelligence communities, and they discuss billionaire Elon Musk's new role in a government efficiency task force. Then, longtime U.S. diplomat Gerald Feierstein joins the show to talk about the American military campaign in Yemen, the "sport…
  continue reading
 
Hello to all our Cyber Pals! Join host Selena Larson and guest, Genina Po, Threat Researcher at Emerging Threats at Proofpoint. She shares how she tackles emerging cyber threats, breaking down the process of turning data into detection signatures. Using tools like Suricata to create detections for malicious activity, she maps out her approach to wr…
  continue reading
 
On the 102nd episode of the Triple Threat Theater podcast, Dax and Rian feel the brotherly love.Films discussed on this episode:The Long Riders (1980)At Close Range (1986)Men At Work (1990)Follow Triple Threat Theater on social media:Twitter - @buy_borrow_burnInstagram - @triplethreattheaterpodcastTumblr - triplethreattheater.tumblr.com…
  continue reading
 
Quishing, a dangerous combination of QR codes and phishing, is emerging as a significant threat that can lead to unauthorized access to sensitive information. Cybercriminals exploit the increasing prevalence of QR codes to trick users into scanning malicious links, resulting in credential theft and data breaches. Given the rapid rise in QR code phi…
  continue reading
 
Loading …

Quick Reference Guide