Podcast
Cybersecurity Synergy: Navigating Known and Unknown Threats with LogRhythm Axon and CimTrak
This podcast episode explores the unique collaboration between LogRhythm Axon and CimTrak, two cutting-edge cybersecurity solutions. Our experts, LogRhythm's Josh King and Cimcor's Justin Chandler discuss how these technologies make security easy, ...
Alyssa Miller: Charting the Course Through InfoSec and Aviation
In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey ...
The art and science of product security: A deep dive with Jacob Salassi
Discover the main takeaways from our conversation on product security with Jacob Salassi, Director of Product Security at Snowflake ...
The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update
In episode 321, the hosts discuss how connected cars are sharing driving data with insurance companies, potentially leading to increased rates for drivers. They also talk about the anti-TikTok bill passed by ...
Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware
In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part. They ...
Don’t Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection
In Episode 319, Tom and Kevin discuss the potential data privacy risks associated with having an AI ‘girlfriend’ or ‘boyfriend’ and why one should refrain from sharing their personal data with such ...
Developers and security training: can they co-exist?⎜Laura Bell Main
Today, we’re excited to have an amazing guest, Laura Bell Main, join us. Discover with us: Can developers and security training really co-exist? ...
‘Get to Know Me’ Privacy Risks, Pros and Cons of Publicly Sharing Ring Doorbell Footage
In episode 318, we discuss the trending ‘get to know me’ posts on social media platforms like Instagram and the potential risks of sharing personal information publicly, particularly in light of potential ...
Adversarial machine learning: what is it and are we ready? ⎜Anmol Agarwal
Today, we're joined by Anmol Agarwal, a security researcher at Nokia. Tune in as we challenge her insights on adversarial machine learning ...
Cloudflare Breached by Nation-State Hackers
In a recent podcast interview with Cybercrime Magazine's Host, Charlie Osborne, Scott Schober, Cyber Expert, Author, and CEO of Berkeley Varitronics Systems, discusses the latest breach at Cloudflare, which has since been ...