News

Despite being adopted and prioritized by many organizations, cybersecurity still faces a significant challenge where leaders still cannot articulate their needs, and find and develop talent. Rather, ...
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. This week, Dave is joined by ⁠Ziv Karliner⁠, ...
⁠Dustin Childs⁠, Head of Threat Awareness at ⁠Trend Micro Zero Day Initiative⁠, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC ...
Most cybersecurity vendors lead with fear, gate their best features, and hide behind complexity. Bitwarden did the opposite and still won. In this episode, Gianna and Maria sit down with Gary ...
Dr. Aleise McGowan⁠, Chief Information Security Officer of BlackGirlsHack and a 20-year cybersecurity veteran, joins Ann on this week's episode of Afternoon Cyber Tea. Aleise shares how a ...
A House oversight committee requests DOGE documents from Microsoft. Predatory Sparrow claims a cyberattack on an Iranian bank. Microsoft says data that happens in Europe will stay in Europe. A complex ...
On this week's show: OpenAI's models are reportedly resisting human commands to shut down. A controversial new research paper questions whether AI systems actually "think" or just create an illusion ...
Joe Carrigan has been a Software and Security Engineer for 25 years and has been working in the security field for more than 15 years focusing on usable security, security integrations social ...
This week on Caveat, Dave and Ben welcome back N2K’s own ⁠⁠Ethan Cook⁠⁠ for our latest policy deep dive segment. As a trusted expert in law, privacy, and surveillance, Ethan is joining the show ...
Recorded live at RSAC 2025, this special episode of the Microsoft Threat Intelligence Podcast, hosted by⁠ ⁠⁠Sherrod DeGrippo,⁠ brings together ⁠Jeremy Dallman⁠ from the Microsoft Threat Intelligence ...
In this episode of The BlueHat Podcast, host ⁠Nic Fillingham⁠ and ⁠Wendy Zenone⁠ share ⁠Ram Shankar Siva Kumar’s⁠ dynamic keynote from BlueHat India 2025, where he explores the evolving threat ...