Podcast Episodes

Back to Search
Patch or Perish: Navigating the Windows 10 EOL Minefield
Patch or Perish: Navigating the Windows 10 EOL Minefield

Episode 298

The impending end-of-life (EOL) for operating systems like Windows 10 creates an immediate and permanent security vulnerability, essentially transfor…

4 months, 3 weeks ago

Short Long
View Episode
The PSYOP Industrial Complex: Hacking Human Trust in the Fifth Generation War
The PSYOP Industrial Complex: Hacking Human Trust in the Fifth Generation War

Episode 297

Modern conflict, often characterized as Fifth Generation Warfare (5GW), targets the consciousness and subconsciousness of civil populations through i…

4 months, 3 weeks ago

Short Long
View Episode
AI, CaaS, and Cronos: Inside the Industrialization of Cybercrime in 2024
AI, CaaS, and Cronos: Inside the Industrialization of Cybercrime in 2024

Episode 296

The cybercrime ecosystem has reached a stage of industrialisation, marked by the specialization of tasks, the emergence of Initial Access Brokers, an…

4 months, 3 weeks ago

Short Long
View Episode
The DeepSeek AI Paradox: Security Catastrophe, CCP Censorship, and the High Cost of 'Cheap' Models
The DeepSeek AI Paradox: Security Catastrophe, CCP Censorship, and the High Cost of 'Cheap' Models

Episode 295

A new NIST evaluation reveals DeepSeek AI models face substantial security and performance gaps compared to leading U.S. alternatives, highlighting c…

4 months, 3 weeks ago

Short Long
View Episode
The Cybersecurity and Privacy Divide: CISO vs. DPO in the Age of GDPR
The Cybersecurity and Privacy Divide: CISO vs. DPO in the Age of GDPR

Episode 294

We break down the crucial differences between the Chief Information Security Officer (CISO), who is responsible for protecting information assets aga…

4 months, 3 weeks ago

Short Long
View Episode
Stop the Attack Cycle: Play Ransomware, Phishing, and the Power of MFA
Stop the Attack Cycle: Play Ransomware, Phishing, and the Power of MFA

Episode 293

Ransomware groups, such as Play (also known as Playcrypt), were among the most active groups in 2024 and use advanced methods like double extortion, …

4 months, 3 weeks ago

Short Long
View Episode
Cyber Security Resilience 2025: Taking Control in an Expanding Threat Landscape
Cyber Security Resilience 2025: Taking Control in an Expanding Threat Landscape

Episode 292

This episode explores why cyber insureds are demonstrating enhanced resilience, evidenced by an overall decline in claims severity by more than 50% a…

5 months ago

Short Long
View Episode
Phishing, Ransomware, and Geopolitical Spies: Inside the EU's 2025 Cyber Frontline
Phishing, Ransomware, and Geopolitical Spies: Inside the EU's 2025 Cyber Frontline

Episode 291

This episode dissects the latest ENISA Threat Landscape, revealing how cybercriminal operations remain potent, fueled by resilient Ransomware-as-a-Se…

5 months ago

Short Long
View Episode
The Global Tech Tangle: AI, Censorship, and the 2025 Compliance Crisis
The Global Tech Tangle: AI, Censorship, and the 2025 Compliance Crisis

Episode 290

This year marks a high-stakes moment for digital governance as major legislation like the EU AI Act, DORA, and India's DPDPA see major enforcement, i…

5 months ago

Short Long
View Episode
Artificial Power: Brussels, Silicon Valley, and the Global Compliance Fight
Artificial Power: Brussels, Silicon Valley, and the Global Compliance Fight

Episode 289

2025 marks a high-stakes year for enterprises navigating rapidly shifting obligations as global compliance accelerates across continents, driven by m…

5 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us