PP084: Inside the CVE Process With Cisco (Sponsored)

PP084: Inside the CVE Process With Cisco (Spo...

Up next

PP091: News Roundup–Securing MCP, Hunting Backdoors, and Getting the Creeps From AI Kids’ Toys

Our final news roundup for 2025 is a holiday sampler of tasty, chewy (and a few yucky) confections. We look at a years-long exploit campaign that used browser extensions to steal credentials, inject malicious content, and track behavior; tracks ongoing exploits using the React2Sh ...  Show more

PP090: Why Native Controls Aren’t Enough to Protect Your Cloud Workspaces (Sponsored)

Cloud-based workspaces such as Google Workspace are often the backbone of an organization. But they also face threats from spam and phishing, account takeovers, and illicit access to sensitive documents and files. On today’s Packet Protector we talk with sponsor Material Security ...  Show more

Recommended Episodes

Re-Rolling Role Playing Games
Imaginary Worlds

The world of tabletop role-playing games is much broader than Dungeons & Dragons, and there’s been a boom of DIY tabletop RPGs in the last decade. But as new players are coming on to the scene, they’re asking new questions about what defines a game, and what might be problematic ...  Show more

Ask a Professional Scrum Trainer - Psychological Safety with Joanna Plaskonka
Scrum.org Community Podcast

In this episode of the Scrum.org Community Podcast, guest host Lindsay Velecina is joined by Professional Scrum Trainer Joanna Plaskonka to answer lingering questions from her recent webinar on psychological safety in Scrum Teams. Joanna shares practical insights on measuring ...

  Show more

The Cybersecurity Readiness Podcast Trailer
The Cybersecurity Readiness Podcast Series

Welcome to the Cybersecurity Readiness Podcast! The Podcast serves to have a reflective, thought-provoking and jargon free discussion on how to enhance the state of cybersecurity at an individual, organizational and national level. Host Dr. Dave Chatterjee converses with subject ...  Show more

Peak, Plateau or Plummet? Cyber Trends That Are Here To Stay… and Fading Away
Afternoon Cyber Tea with Ann Johnson

Kevin Beaumont, a thought leader in the cybersecurity industry on incident detection and response, joins Ann to talk about the security trends that are peaking, plateauing, and plummeting. They trade insights on how organizations can examine the dynamics of an attack and effectiv ...  Show more