Cybersecurity Podcasts

SANS Stormcast Thursday, April 16th, 2026: AI Credential Scans; Microsoft Update Issues; RDP Warnings; GitHub Action Vulns;
PodcastApr 16, 20266 min

SANS Stormcast Thursday, April 16th, 2026: AI Credential Scans; Microsoft Update Issues; RDP Warnings; GitHub Action Vulns;

In this 7‑minute Stormcast episode, Johannes Ulrich warns that attackers are increasingly scanning web servers for AI‑related configuration files such as .env files containing OpenAI, Claude, or OpenClaw credentials, emphasizing the need for proper secret management and billing alerts. He...

By SANS Internet StormCast
MSP 1337 | Cybersecurity Education & Security Guidance
PodcastApr 15, 20260 min

MSP 1337 | Cybersecurity Education & Security Guidance

In this brief episode, the hosts explore the intertwined nature of cybersecurity and compliance, emphasizing that both are part of an ongoing journey for organizations. They discuss core topics such as incident response, penetration testing, and the evolving tactics of...

By Bloomberg Surveillance (Podcast)
Why DHS No Longer Has a Compliance Mindset for Cybersecurity
PodcastApr 13, 202639 min

Why DHS No Longer Has a Compliance Mindset for Cybersecurity

In this episode of Ask the CIO, former DHS Chief Information Security Officer Hemant Badewin discusses his 15‑year federal career, why he chose to leave at this pivotal moment, and his new role as Executive CISO at Knox Systems. He...

By Ask the CIO (Apple listing)
ONC’s Keane Says Government Will Strengthen TEFCA Onboarding to Address Provider Privacy Concerns
PodcastApr 12, 202642 min

ONC’s Keane Says Government Will Strengthen TEFCA Onboarding to Address Provider Privacy Concerns

In this episode, ONC National Coordinator Tom Keen discusses recent organizational changes at ONC, the dual‑lane approach of TEFCA and CMS‑aligned networks, and how the government is strengthening TEFCA onboarding to address provider privacy concerns. He explains that ONC will...

By healthsystemCIO
How to Design Bullet-Proof Conditional Access Policies in Microsoft Entra ID
PodcastApr 11, 20260 min

How to Design Bullet-Proof Conditional Access Policies in Microsoft Entra ID

In this episode, Microsoft MVP Per Torben‑Sansson discusses the fundamentals of building resilient Conditional Access (CA) policies in Microsoft Entra ID, starting with the critical role of break‑glass (emergency) accounts. He explains how to properly configure these accounts—using cloud‑only identities,...

By Entra.News - Your weekly dose of Microsoft Entra
EP271 Can AI-Native MDR Actually Fix Your Broken SOC Workflows or Just Automate the Mess?
PodcastApr 9, 202629 min

EP271 Can AI-Native MDR Actually Fix Your Broken SOC Workflows or Just Automate the Mess?

In this live Cloud Security Podcast episode, host Tim Peacock and co‑host Anton Chewbacca interview Eric Foster and Bashar Abu Abusido, CEOs of 10X, about AI‑native Managed Detection and Response (MDR) and its impact on SOC modernization. They discuss why...

By Cloud Security Podcast
Mobile App Security with Ryan Lloyd
PodcastApr 9, 202654 min

Mobile App Security with Ryan Lloyd

In this episode, Ryan Lloyd, Chief Product Officer at GuardSquare, explains how mobile app security differs from desktop and web security, emphasizing that critical logic and IP reside on users' devices, making them prime targets for reverse engineering, tampering, and...

By Software Engineering Daily – Data
When “Opportunity” Knocks, Don’t Answer.
PodcastApr 9, 202649 min

When “Opportunity” Knocks, Don’t Answer.

In this episode of Hacking Humans, Dave, Joe, and Maria dissect two major social‑engineering threats: a LinkedIn‑based phishing campaign that uses urgent “business opportunity” emails and look‑alike login pages to harvest credentials, and a $20 million Everest‑guide scam where climbers are...

By Hacking Humans
SANS Stormcast Thursday, April 9th, 2026: Honeypot Fingerprinting; Microsoft Locks Developer Accounts; ActiveMQ Vuln;
PodcastApr 9, 20267 min

SANS Stormcast Thursday, April 9th, 2026: Honeypot Fingerprinting; Microsoft Locks Developer Accounts; ActiveMQ Vuln;

In this 7‑minute Stormcast episode, Johannes Ulrich discusses three security topics: attackers fingerprinting medium‑interaction honeypots by using obvious usernames like "honeypot" to confirm they’re not real systems; Microsoft’s recent suspension of developer accounts for privacy‑focused projects such as WireGuard, Veracrypt,...

By SANS Internet StormCast
512,000 Lines of Leaked Code Reveal the Lock-In Strategy Coming for Your AI Stack
PodcastApr 8, 20260 min

512,000 Lines of Leaked Code Reveal the Lock-In Strategy Coming for Your AI Stack

The episode dives into the recent Anthropic Claude code leak, emphasizing that the most consequential element is the hidden "Conway" always‑on agent and its companion environment, Funway, rather than the raw source code. These components form a standalone agent platform...

By Nate’s Newsletter
Who’s Logging In? [OMITB]
PodcastApr 7, 20263 min

Who’s Logging In? [OMITB]

In this episode of Only Malware in the Building, host Selina Larson and guests Keith Malarski and Dave discuss the rapid rise of identity‑based attacks, noting that identity‑related root causes now outpace traditional malware. They cite recent reports from Sophos,...

By Hacking Humans
Defeating the Single Point of Failure W/ Mike Belshe of BitGo | BFC Show Ep. 33
PodcastApr 6, 202651 min

Defeating the Single Point of Failure W/ Mike Belshe of BitGo | BFC Show Ep. 33

In this episode, BitGo co‑founder Mike Belshe discusses the origins of BitGo, its pioneering use of multi‑signature (multi‑sig) technology to eliminate single points of failure, and how the company evolved from a self‑custody solution into a regulated global custodian with...

By Bitcoin Magazine Podcast
How Kevin Mandia Built the Most Trusted Name in Cybersecurity
PodcastApr 6, 20261h 2m

How Kevin Mandia Built the Most Trusted Name in Cybersecurity

In this episode, Kevin Mandia, founder of Mandiant and CEO of Armadillo, discusses the imminent shift to AI-driven cyber attacks and the need for autonomous defense. He explains how Armadillo is building nation‑state‑grade offensive capabilities to train and certify defenses,...

By Grit (Kleiner Perkins)
Houston, We Have a Protocol.
PodcastApr 5, 202640 min

Houston, We Have a Protocol.

The episode dives into space cybersecurity, featuring Brandon Bailey of the Aerospace Corporation and Cass (Kaz) Vogel, Blue Origin’s Director of Cybersecurity Governance, Risk, and Compliance. They discuss the evolving threat landscape as humanity expands beyond Earth, emphasizing the need...

By T-Minus Space Daily