In part two, Hannah and Four tackle the human element at the heart of cybersecurity: Who are the bad actors, and what motivates them? They dissect the evolving strategies designed to stop social engineering attacks - like passkeys and risk-based authentication - and confront the complex security and privacy challenges that may be introduced by autonomous age ... Show More
Feb 2025
AI versus Cybersecurity with Chris Puderbaugh
<p>Welcome to the Artificial Intelligence Podcast with Jonathan Green! In this episode, we delve into the crucial topic of AI in cybersecurity with our special guest, Chris Puderbaugh, a leading expert in the field.</p><p>Chris shares insights into how AI is transforming cybersec ... Show More
24m 45s
May 2022
Introducing Control Loop, the industrial cybersecurity podcast.
Cybersecurity for Operational Technology and Industrial Control Systems. The Control Loop podcast, hosted by the CyberWire’s Dave Bittner, investigates the latest threat intelligence, security strategies, and technologies that industry professionals rely on to safeguard civilizat ... Show More
3m 31s
May 2023
City Jerks, AI animals, and is the BBC hacking again?
Two unsavoury websites suffer from a worrying leak, scientists are going animal crackers over AI, and the BBC is intercepting scammers' live phone calls with victims.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer secu ... Show More
48m 42s
Jan 2025
Understanding AGI Alignment Challenges and Solutions - with Eliezer Yudkowsky of the Machine Intelligence Research Institute
<p>Today's episode is a special addition to our AI Futures series, featuring a special sneak peek at an upcoming episode of our Trajectory podcast with guest Eliezer Yudkowsky, AI researcher, founder, and research fellow at the Machine Intelligence Research Institute. Eliezer joi ... Show More
43m 3s
Aug 2024
Episode 85: Practical Applications of DEFCON 32 Web Research
Episode 85: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel talk through some of the research coming out of DEFCON, mainly from the PortSwigger team. Web timing attacks, cache exploitation, and exploits related to email protocols are all featured. Plus w ... Show More
1h 30m