PodcastsNewsCybersecurity Headlines

Cybersecurity Headlines

CISO Series
Cybersecurity Headlines
Latest episode

1720 episodes

  • Cybersecurity Headlines

    The Department of Know: Vercel breach, a "Contagious Interview," and ghost breaches

    24/04/2026 | 40 mins.
    Link to episode
    This week's Department of Know is hosted by Rich Stroffolino, with guests Brett Conlon, CISO, American Century Investments, and Michael Bickford, former CISO, New York State Gaming Commission. 
    Missed the live show? Check it out on YouTube.
    The Department of Know is live every Friday at 4:00 p.m. ET. Join us each week by registering for the open discussion at CISOSeries.com.


    Huge thanks to our sponsor, ThreatLocker


    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent release
    of Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on
    credentials alone, it requires the right user, the right device, and the right conditions.
    Because as we've seen in recent large-scale CRM breaches, stolen credentials and
    misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is
    exposed, and access is limited to exactly what's needed. Learn more and start your free
    trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    Rituals cosmetics breach, FBI iOS flaw fixed, Teams Helpdesk impersonation

    24/04/2026 | 8 mins.
    Cosmetics giant Rituals discloses data breach
    Apple fixes iOS flaw exploited by the FBI
    Microsoft Teams Helpdesk impersonation
    Get the show notes here: https://cisoseries.com/cybersecurity-news-rituals-cosmetics-breach-fbi-ios-flaw-fixed-teams-helpdesk-malware-impersonation/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    New OpenAI cyber product, unauthorized Mythos access, insurers to cap LLMjacking payouts

    23/04/2026 | 7 mins.
    OpenAI shares cyber product with government orgs
    Unauthorized Mythos access, Firebox bugs fixed by Mythos
    Insurers move to cap LLMjacking cyber payouts
    Get the show notes here: https://cisoseries.com/cybersecurity-news-new-openai-cyber-product-unauthorized-mythos-access-insurers-to-cap-llmjacking-payouts/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    CISA lacks Mythos, Lovable's leak by design, YouTube's deepfake detection

    22/04/2026 | 7 mins.
    CISA lacks Mythos access
    Lovable denies data leak
    YouTube opens up deepfake detection tool
    Get the show notes here: https://cisoseries.com/cybersecurity-news-cisa-lacks-mythos-lovables-leak-by-design-youtubes-deepfake-detection/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.
  • Cybersecurity Headlines

    Vercel breach, ZionSiphon targets water infrastructure, Bluesky DDoS

    21/04/2026 | 7 mins.
    Vercel confirms breach, stolen data for sale
    ZionSiphon targets water infrastructure
    Bluesky blames outage on DDoS
    Get the show notes here: https://cisoseries.com/cybersecurity-news-vercel-breach-zionsiphon-targets-water-infrastructure-bluesky-ddos/
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker is extending Zero Trust beyond endpoint control. With their recent releaseof Zero Trust Network Access and Zero Trust Cloud Access, access isn't based on credentials alone, it requires the right user, the right device, and the right conditions. Because as we've seen in recent large-scale CRM breaches, stolen credentials and misconfigurations can expose massive amounts of data. With ThreatLocker, nothing is exposed, and access is limited to exactly what's needed. Learn more and start your free trial today at ThreatLocker.com/CISO.

More News podcasts

About Cybersecurity Headlines

Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Podcast website

Listen to Cybersecurity Headlines, Global News Podcast and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

Cybersecurity Headlines: Podcasts in Family

Social
v8.8.12| © 2007-2026 radio.de GmbH
Generated: 4/25/2026 - 2:30:50 AM