Top 5 Cybersecurity Podcasts to Follow in 2022
One of my favorite parts about talking to cybersecurity professionals is asking how they landed in the industry. Few tell me about a straight path to their career, like attending college or earning a certification. Most launch into an interesting tale of their non-traditional career paths.
When I share these stories, I’m often asked how someone can find their way into the field. One of the best ways is by listening to podcasts. Those wondering about the field can learn about potential professions this way. Experts can also use podcasts to learn how cybersecurity relates to business. And even better, some of the podcasts will make you laugh.
Here are my top five picks for podcasts to follow in 2022:
If you want to get a concise (8 to 15 minutes) roundup of what has happened in cybersecurity over the past week, then this is your podcast. Recent episodes touched on a bounty paid by Coinbase for a security bug and whether the TikTok algorithm rewards different types of content based on geography. The episodes meet the promise of their tagline. It’ll give you something to think about and prepare you for what’s happening next. But fair warning, the host does liberally sprinkle in his view on politics and policies.
Want to laugh? Press play on Smashing Security and hear about the funny side of SNAFUs, which often border on the absurd. This podcast tends to pick up more lesser-known events that will usually make you laugh out loud. Everything ranging from cosplay, dead hamsters and Pokemon has been discussed recently – and yes, he manages to tie it all back to security, at least in some fashion. Most episodes include guests, which is a great way to get more perspective.
Literally, got two minutes? This podcast boils down the news to the top stories and gives you just the facts. And the host is about as high profile as you can get: Theresa Payton, former White House CIO. Sadly this podcast isn’t producing new episodes, but listening to previously recorded podcasts is a great way for a newbie to the industry to learn about past events.
Think “This American Life” where every episode talks about the dark web, and you’ve got Darknet Diaries. This one ranks as my favorite with its journalistic flair and real-life tales. I especially like how the host talks to different experts each week to add a different perspective. But I have to admit that my favorite episodes are those where he interviews a threat actor to get a firsthand view of their world. I especially enjoyed episode 107, about how attacker Alethe worked as a social engineer and even won a contest. Her account of wondering how the person she scammed felt was especially insightful and thought-provoking. The episodes in this podcast are about an hour long. Because of that, it’s a good one to save for a jog or a road trip.
This show is the longest-running podcast on this list, having been ‘on the air’ since 2007. While other podcasts on this list upload new content weekly, Risky Business posts two or three episodes a week. Each episode discusses multiple topics related to current events and typically goes very deep on the subject. Risky Business focuses more on global news and how political events affect cybersecurity than the others, which adds a new point of view.
Security Intelligence has its very own cybersecurity podcast too! Consisting of just six episodes, this show aired earlier this year as a limited mini-series. Into the Breach dives into the cyber world and helps to provide the knowledge and tools necessary to better protect against security breaches. Each episode includes an interview with a security expert from varying fields to provide different and insightful perspectives on a number of cybersecurity topics.
So the next time you are out for that run, riding that commute or just looking for some audio entertainment, check out one of these podcasts. You might be surprised at what you learn, or how hard you laugh.
Jennifer Goforth Gregory is a freelance B2B technology content marketing writer specializing in cybersecurity. Other areas of focus include B2B, finance, tec…
4 min readThis is a time of major changes for businesses and agencies. That includes the move to the cloud and the shift to being digital-first. So, cybersecurity has moved to a front-and-center position in many companies and industries. When talking about…
3 min readCorporate clients and cloud service providers (CSPs) are both responsible for cloud security. Clients remain accountable for governance and compliance. However, their other duties will vary depending upon the type of cloud deployment. What can cloud-native security controls do for…
4 min readWill people ever live in a digital world 24/7? Nobody knows for sure, but the metaverse is certainly expanding rapidly. As the world dives deeper into the digital realm, companies need guidance on how to protect their assets and intellectual…
The globally-recognized Certified Information Systems Auditor (CISA) certification shows knowledge of IT and auditing, security, governance, control and assurance to assess potential threats. As you can imagine, it’s very much in demand. It can also be confusing.  Is CISA Certification Related to the Cybersecurity and Infrastructure Security Agency? CISA, the certification, is related to CISA, the federal agency, right?  Wrong.…
IBM Security Managed Detection and Response (MDR) observations coupled with IBM Security X-Force malware research sheds additional light on the mysterious objectives of the operators behind the Raspberry Robin worm. Based on a comparative analysis between a downloaded Raspberry Robin DLL and a Dridex malware loader, the results show that they are similar in structure and functionality. Thus, IBM Security…
The average cost of a data breach reached an all-time high of $4.35 million this year, according to newly published 2022 Cost of a Data Breach Report, an increase of 2.6% from a year ago and 12.7% since 2020. New research in this year’s report also reveals for the first time that 83% of organizations in the study have experienced…
Today, the cybersecurity industry faces many challenges. Highly skilled attackers, a daily flood of data full of irrelevant information and false alarms across multiple systems come in amid a severe shortage of skilled workers. In this industry, performing detailed threat analysis with the data you already have will help protect your business. For that, you need threat analysts. These are…
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.

Affiliate Marketing As A Business

source

/ Uncategorized

Leave a Reply

Your email address will not be published. Required fields are marked *