Menu
My Activity Hub
Podcasts
Videos
Pricing
Feedback
Tutoring
Sign Up
Log In
My Activity Hub
Podcasts
Videos
How it works
Pricing
Tutoring
Sign Up
Log In
Safe Mode Podcast
Podcast by Safe Mode Podcast
When iPhone exploits turn into commodities
35 mins; March 26, 2026
Behind the scenes of the Socksescort takedown
34 mins; March 19, 2026
What comes next for Trump's cybersecurity plan?
28 mins; March 12, 2026
A plea to improve quantum security in the federal government
17 mins; March 05, 2026
Is the 'Shields Up' era of CISA over?
33 mins; February 26, 2026
Should you still trust your password manager?
36 mins; February 19, 2026
No exceptions: How Amazon killed the password and unified security
36 mins; February 12, 2026
What leaders can learn from the WEF's Cybersecurity Outlook
36 mins; February 05, 2026
Opportunistic by Default: How OT gets pulled into the blast radius
34 mins; January 29, 2026
How do you win a conflict most Americans can’t see?
35 mins; January 22, 2026
What's powering the 'Steroid Era' of cybercrime?
52 mins; January 15, 2026
The Access‑Trust Gap: Why security can’t see what work depends on
32 mins; December 18, 2025
How AI has complicated enterprise mobile security
38 mins; December 11, 2025
Breaking down the latest era of Chinese cyberespionage with Booz Allen's Nate Beach-Westmoreland
29 mins; December 04, 2025
How Visa's CISO turns a 'paranoid and pessimisitic mindset' into positive security outcomes
46 mins; November 20, 2025
What security teams should do to prepare for the quantum computing future
40 mins; November 13, 2025
How MSP's are dealing CISA changes
32 mins; November 06, 2025
Mobilizing Main Street: Inside the Cyber Civic Engagement Program
30 mins; October 30, 2025
A reset on information sharing
35 mins; October 23, 2025
Rethinking resilience with WatchTowr CEO Benjamin Harris
35 mins; October 16, 2025
What's it like to go through the FedRAMP process?
31 mins; October 09, 2025
Andesite's Brian Carbaugh on how lessons from the CIA can power an AI-powered SOC
27 mins; October 02, 2025
Censys’ Silas Cutler on how adversaries chain vulns together for big attacks
26 mins; September 25, 2025
Veracode’s Chris Wysopal on the security issues with AI code development
32 mins; September 17, 2025
Phosphorus’ Sonu Shankar on IoT Vulnerabilities and Salt Typhoon Tactics
23 mins; September 11, 2025
Halcyon’s Cynthia Kaiser on the state of ransomware
29 mins; September 04, 2025
What happens if CISA 2015 lapses?
24 mins; August 28, 2025
Dave DeWalt on how to get a board to buy in on cybersecurity
31 mins; August 21, 2025
Are enterprises having the right AI security conversations?
45 mins; August 14, 2025
What is CISA’s focus moving forward
34 mins; August 07, 2025
Inside the AI Action Plan with Dreadnode’s Daria Bahrami
33 mins; July 31, 2025
NetRise’s Tom Pace on why telecom’s Salt Typhoon problem may never go away
30 mins; July 24, 2025
Kemba Walden and Devin Lynch on securing the AI Stack
66 hours 31 mins; July 17, 2025
Valence Security’s Yoni Shohet on the growing risk tied to SaaS applications
33 mins; July 10, 2025
Intel471’s Will Dixon goes behind the scenes on the DanaBot takedown
32 mins; July 03, 2025
DARPA’s Andrew Carney on AIxCC’s quest for truly autonomous AI
52 mins; June 26, 2025
RSA CEO Rohit Ghai on the promise and peril of passkeys
41 mins; June 12, 2025
MIND’s Eran Barak
33 mins; June 05, 2025
Bishop Fox’s Rob Ragan and Iron Man Suit for pen testers
30 mins; May 29, 2025
Olivia Rose on why the CISO role may not be the pinnacle of security work
44 mins; May 22, 2025
Semperis CEO Mickey Bresman on the power of tabletop exercises
35 mins; May 15, 2025
Expel CEO Dave Merkel on the impact of AI & Automation in modern SOCs
31 mins; May 08, 2025
Recorded Future’s Alexander Leslie on the ‘MarkoPolo’ traffer team
32 mins; May 01, 2025
Verizon’s Alex Pinto on the takeaways from the 2025 DBIR
38 mins; April 24, 2025
Will Pearce on the ever-changing field of offensive AI security
40 mins; April 17, 2025
Lior Div on how security teams should be using AI agents
34 mins; April 10, 2025
Ken Bagnall on how companies can work with governments to take down malicious infrastructure
32 mins; April 01, 2025
Edera’s Alex Zenla on how to make cloud computing and AI secure-by-design
47 mins; March 26, 2025
Allie Bohan on how to handle the non-technical side of a ransomware attack
35 mins; March 19, 2025
Discover’s Sunil Mallik on the ever-changing roles of the CISO
38 mins; March 11, 2025
Chainguard’s Dan Lorenc on the next decade of software supply chain security
28 mins; March 05, 2025
Virtru’s John Ackerly on how the feds are keeping data secure and interoperable
34 mins; February 26, 2025
FBI’s Cynthia Kaiser on Salt Typhoon’s ‘indiscriminate’ data collection
20 mins; February 19, 2025
Chainalysis’ Jackie Burns-Koven on the drop in ransomware payments
32 mins; February 12, 2025
Google’s John Hultquist on how APTs are using generative AI
27 mins; February 05, 2025
Hugh Thompson on what the SEC got right (and wrong) with its cyber incident reporting mandate
43 mins; January 28, 2025
Gabrielle Hempel on AI regulation on the federal and state level
39 mins; January 23, 2025
Guidepoint Security’s Jason Baker on lessons learned from negotiations with ransomware groups
51 mins; January 16, 2025
Phil Venables on the State of the CISO
40 mins; January 08, 2025
Vik Phatak on the inherent issues in native cloud firewalls
32 mins; December 18, 2024
Emily Crose on the government’s long history with hackers
50 mins; December 10, 2024
GreyNoise’s Andrew Morris on using AI to find zero-days
44 mins; December 04, 2024
The evolution of Microsoft’s Digital Crimes Unit
61 hours 41 mins; November 20, 2024
Securing the Skies: Aerospace Cybersecurity with David Brumley
35 mins; November 13, 2024
What will GenAI regulation look like in 2025?
27 mins; November 06, 2024
Special CyberTalks Edition with National Cyber Director Harry Coker
31 mins; October 31, 2024
DomainTools’ Sean McNee on how China is watching the Russia-Ukraine conflict
31 mins; October 24, 2024
ReversingLabs’ Saša Zdjelar on the ‘black box’ of commercial software
29 mins; October 17, 2024
Cal-Berkeley’s Elijah Baucom on how students are helping nonprofits avoid spyware
28 mins; October 10, 2024
Mandiant’s Michael Barnhart on the North Korean IT worker crisis
38 mins; October 03, 2024
Trellix’s John Fokker on the latest cybercriminal snapshot
40 mins; September 26, 2024
How organizations are handing AI security
42 mins; September 19, 2024
We’re back! RunSafe CEO Joe Saunders on secure-by-design in IoT devices
30 mins; September 12, 2024
Ted Schlein on the cybersecurity industry and the latest twist in the Trump-Iran hacking saga
46 mins; August 22, 2024
Hack-and-leak op targets Trump; a technical deep dive with John Hammond on the CrowdStrike outage
32 mins; August 15, 2024
A deep dive with Tim Starks on the Biden administration's cybersecurity initiatives
44 mins; August 08, 2024
Sara Hooker on compute thresholds for AI; CrowdStrike breaks the internet
45 mins; July 25, 2024
Dewey Murdick on enabling principles for AI governance; a landmark breach at AT&T
39 mins; July 18, 2024
Allan Liska on why it’s time to ban ransomware payments; Russian info ops
38 mins; July 11, 2024
Selena Larson on e-crime matching nation state hackers; Disinfo before the Supreme Court
44 mins; June 27, 2024
Protecting teens against sextortion; threats to election workers
35 mins; June 20, 2024
Keeping Ukraine’s grid up and running amid war; Snowflake customers under attack
30 mins; June 12, 2024
Josh Harguess on AI red-teaming; an Israeli info op targets the U.S.
36 mins; June 06, 2024
Joe Sullivan on his legal battle with the feds; the latest on Russian influence operations
47 mins; June 03, 2024
Joe Sullivan on his legal battle with the feds; the latest on Russian influence operations
47 mins; May 30, 2024
Omkhar Arasaratnam on open source security; AI dogfighting
36 mins; May 23, 2024
The FBI’s Brett Leatherman on LockBitSupp’s unmasking; a spyware reckoning in Poland
33 mins; May 16, 2024
Stefan Soesanto on Ukrainian hack and leak ops; cyberattack in Georgia
41 mins; May 02, 2024
Rumman Chowdhury on AI red-teaming; a Sisense supply chain attack
49 mins; April 17, 2024
Sayash Kapoor on AI risk; Federal agencies affected by Russian breach of Microsoft
43 mins; April 11, 2024
Dave Aitel on ‘secure by design’; CISA’s rules for cyber incident reporting
46 mins; April 04, 2024
Byron Tau on data brokers; US sanctions, indicts Chinese hackers
43 mins; March 26, 2024
Sherrod DeGrippo on APT groups experimenting with AI
40 mins; March 21, 2024
Kiersten Todt on the cybersecurity policy landscape; AI training for election officials
39 mins; March 14, 2024
David Haber breaks down the AI security industry; ALPHV snarls U.S. health care
47 mins; March 07, 2024
Robert M. Lee on critical infrastructure attacks; and is LockBit back?
44 mins; February 29, 2024
LockBit’s very bad day; Adam Meyers on Israel-Gaza cyber ops
35 mins; February 22, 2024
The future of the TIC program amid the shift to zero trust
28 mins; February 20, 2024
Legal aid for hackers; Big Tech wants action on commercial spyware
33 mins; February 15, 2024
How the Pentagon is embracing AI; election officials’ concerns going into 2024
45 mins; February 08, 2024
Click here to see more
‹ Prev
1
2
Next ›