• The 2025 Cyber Crossroads: Balancing AI Innovation with IoT Security and Evolving Threats
    Apr 23 2025

    Navigate the complex cybersecurity landscape of Q2 and Summer 2025 as we delve into the escalating convergence of AI-driven cyberattacks, the persistent vulnerabilities of the expanding Internet of Things (IoT), and the challenges of establishing robust security and governance frameworks. Based on recent Q1 2025 incident data and expert projections, this episode explores the weaponization of AI in phishing, malware, and social engineering, the continued exploitation of poorly secured IoT devices, and the evolving tactics of ransomware and state-sponsored actors. We'll also discuss the crucial need for proactive defense, AI-augmented security, and adaptation to a fragmenting global regulatory environment.

    breached.company/strategic-cybersecurity-outlook-ai-iot-and-threat-actor-convergence-in-q2-summer-2025

    Show more Show less
    24 mins
  • 2025 Q1 Cyber Shockwave: Ransomware Records, AI Threats, and the Regulatory Reckoning
    Apr 22 2025
    The first four months of 2025 witnessed an alarming surge in global cybersecurity incidents, with ransomware attacks reaching unprecedented levels. Join us as we dissect the key trends, including the evolution of ransomware tactics like double extortion, the increasing sophistication of social engineering fueled by AI and deepfakes, and the persistent exploitation of software vulnerabilities. We'll delve into major incidents like the crippling attack on Change Healthcare and the record-breaking Bybit cryptocurrency theft, highlighting the most targeted sectors such as healthcare, education, government, and manufacturing. Finally, we'll examine how organizations, law enforcement, and the evolving global regulatory environment, with key legislation like the EU's NIS2 and DORA, are grappling with this escalating cyber threat.

    breached.company/global-cybersecurity-incident-review-january-april-2025

    Show more Show less
    22 mins
  • Navigating Privacy Risks with the NIST Privacy Framework 1.1
    Apr 21 2025

    This podcast delves into the NIST Privacy Framework 1.1, a voluntary tool developed to help organizations identify and manage privacy risk while fostering innovation and protecting individuals' privacy. We explore its three core components: Core, Organizational Profiles, and Tiers, and how they enable organizations to understand, assess, prioritize, and communicate their privacy activities. Learn how to use this framework to build customer trust, meet compliance obligations, and facilitate dialogue about privacy practices.

    www.compliancehub.wiki/navigating-the-complex-world-of-privacy-with-the-nist-privacy-framework-1-1

    Show more Show less
    17 mins
  • Beyond the Firewall: The Offensive Cybersecurity Edge
    Apr 20 2025

    Dive into the dynamic world of offensive cybersecurity with insights from leading experts and real-world scenarios. We explore the critical role of techniques like penetration testing, adversary simulation, and red team exercises in proactively identifying vulnerabilities and strengthening defenses against evolving cyber threats. Understand how adopting an adversarial mindset and employing continuous assessment methodologies are essential for navigating today's complex threat landscape and building a resilient security posture.

    www.securitycareers.help/dont-just-scan-test-choosing-the-right-penetration-testing-partner

    https://cisomarketplace.services

    https://generatepolicy.com

    Show more Show less
    13 mins
  • AI on Trial: Decoding the Intersection of Artificial Intelligence and Harm
    Apr 19 2025

    Explore the rapidly evolving landscape where artificial intelligence intersects with criminality and societal risks. Drawing on expert research, this podcast delves into the transformative potential of AI-enabled crime, from sophisticated financial fraud using deepfakes to the generation of child sexual abuse material, and the challenges this poses for law enforcement. We also examine the critical need for robust AI incident reporting mechanisms, as proposed with standardized key components for documenting AI-related harms and near misses. Join us as we unpack the threats, the defenses, and the policy reforms necessary to navigate this complex new frontier.

    breached.company/navigating-the-ai-frontier-confronting-ai-enabled-crime-through-robust-incident-reporting

    https://airiskassess.com

    https://cisomarketplace.services

    Show more Show less
    21 mins
  • Quantum Leap Security: Navigating the Post-Quantum Cryptography Era
    Apr 18 2025

    We delve into the urgent need for organizations to prepare for the era of quantum computing, which threatens to break today's standard encryption methods. We examine the "harvest now, break later" (HNDL) threat, where malicious actors are already collecting encrypted data for future decryption by quantum computers. Drawing upon information from sources like NIST and expert analysis, we discuss the development and standardization of quantum-resistant cryptographic algorithms such as CRYSTALS-Kyber (ML-KEM) and CRYSTALS-Dilithium (ML-DSA). We provide CISOs and cybersecurity professionals with key strategic considerations for a successful quantum-safe transition, including conducting a comprehensive cryptographic inventory and quantum risk assessment (QRA), prioritizing systems for migration, engaging with vendors, and fostering crypto agility. Join us as we navigate the challenges and opportunities of this critical cybersecurity revolution and help you take the necessary quantum leap to secure your future.

    www.securitycareers.help/the-quantum-clock-is-ticking-your-guide-to-navigating-the-post-quantum-cryptography-era

    https://quantumsecurity.ai

    https://risk.quantumsecurity.ai/

    Show more Show less
    10 mins
  • The AI and Influence Front - (dis/mis)Information
    Apr 17 2025

    Explore the escalating threats posed by artificial intelligence incidents, sophisticated disinformation campaigns like the Doppelgänger network targeting nations from France to Israel, and the cyber espionage activities of threat actors such as UAC-0050 and UAC-0006 as revealed by Intrinsec's analysis. We delve into the tactics, infrastructure, and narratives employed in these digital battlegrounds, drawing insights directly from recent intelligence reports. Understand the key components of AI incident reporting, the disinformation narratives amplified across different countries, and the evolving techniques of cyber intrusion sets targeting critical infrastructure and institutions. Join us as we unpack the complex landscape of AI risks, influence operations, and cyber warfare.

    breached.company/the-unseen-frontlines-navigating-the-intertwined-threats-of-ai-incidents-disinformation-and-cyber-espionage

    Show more Show less
    23 mins
  • Smart City Cyber Shield
    Apr 16 2025

    This podcast we are exploring the critical cybersecurity challenges facing today's interconnected urban environments. We delve into the evolving threats arising from smart city infrastructure and the Internet of Things (IoT), including ransomware attacks on critical infrastructure, the expanded attack surface created by interconnected devices, and strategies for building cyber resilience. Join us as we discuss best practices for municipalities, the importance of public trust, and the role of AI in both cyberattacks and defense. Stay informed and learn how we can collectively protect the future of our smart cities.

    www.securitycareers.help/navigating-the-cyber-threat-landscape-of-smart-cities

    https://cybersafe.city

    https://risk.secureiotoffice.world

    https://risk.secureiot.house

    Show more Show less
    15 mins
adbl_web_global_use_to_activate_webcro768_stickypopup