{"id":18464,"date":"2024-04-26T09:00:00","date_gmt":"2024-04-26T09:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18464"},"modified":"2024-04-26T10:59:47","modified_gmt":"2024-04-26T10:59:47","slug":"top-cybersecurity-podcasts","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/","title":{"rendered":"8 Binge-Worthy Cybersecurity Podcasts in 2024"},"content":{"rendered":"\n<p>Cybersecurity podcasts are audio-based shows with consistently recurring episodes that provide listeners with recent security news, analysis from experts in the field, vulnerability information, or deep dives into major stories or concepts. We&#8217;ve selected eight top podcasts with varying lengths and areas of focus. Each has a minimum of 4.5 stars and 100 ratings on Apple Podcasts and is available on multiple streaming platforms.<\/p>\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6d44f3c31e\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6d44f3c31e\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#Darknet-Diaries\" title=\"Darknet Diaries\">Darknet Diaries<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#SecurityNow\" title=\"SecurityNow\">SecurityNow<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#CyberWire-Daily\" title=\"CyberWire Daily\">CyberWire Daily<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#Malicious-Life\" title=\"Malicious Life\">Malicious Life<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#Risky-Business\" title=\"Risky Business\">Risky Business<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#Hacking-Humans\" title=\"Hacking Humans\">Hacking Humans<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#Smashing-Security\" title=\"Smashing Security\">Smashing Security<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#Unsupervised-Learning\" title=\"Unsupervised Learning\">Unsupervised Learning<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#Bottom-Line-Podcasts-Can-Deepen-Your-Interest-in-Cybersecurity\" title=\"Bottom Line: Podcasts Can Deepen Your Interest in Cybersecurity\">Bottom Line: Podcasts Can Deepen Your Interest in Cybersecurity<\/a><\/li><\/ul><\/nav><\/div>\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n\n<div id=\"jumpcloud\" class=\"wp-block-group full-width editorial-product-accordion has-shadow--large is-layout-flow wp-block-group-is-layout-flow\" style=\"border-style:none;border-width:0px;border-radius:0px;margin-top:0px;margin-bottom:0px;padding-top:36px;padding-right:0px;padding-bottom:0px;padding-left:0px\">\n<h2 class=\"wp-block-heading has-secondary-font-family has-x-large-font-size\" style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0;font-style:normal;font-weight:400;text-transform:none\"><span class=\"ez-toc-section\" id=\"Darknet-Diaries\"><\/span><strong><strong>Darknet Diaries<\/strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><em><strong>4.9 stars, 7.1K+ reviews<\/strong><\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);background-color:#d0d3d6;color:#d0d3d6\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>If you\u2019ve listened to investigative reporting podcasts like Serial or Reply All and wanted something that was specific to cybersecurity, <a href=\"https:\/\/darknetdiaries.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Darknet Diaries<\/a> is the perfect podcast for you. Since 2017, it&#8217;s investigated some of the most noteworthy stories related to the darkside of the internet, using a storytelling style that&#8217;s easy to follow for technical and non-technical listeners alike.<\/p>\n\n\n\n<p>New episodes of Darknet Diaries typically air on the first Tuesday of the month and are usually around an hour long. There are currently over 150 episodes available on Apple Podcasts, YouTube Music, and Spotify. The podcast has an explicit rating.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/darknet-diaries-logo.jpeg\" alt=\"Darknet Diaries logo.\" class=\"wp-image-18467\" style=\"width:180px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/darknet-diaries-logo.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/darknet-diaries-logo-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-kadence-accordion alignnone\"><div class=\"kt-accordion-wrap kt-accordion-id18464_4694e5-ef kt-accordion-has-11-panes kt-active-pane-0 kt-accordion-block kt-pane-header-alignment-left kt-accodion-icon-style-arrow kt-accodion-icon-side-right\" style=\"max-width:2000px\"><div class=\"kt-accordion-inner-wrap\" data-allow-multiple-open=\"true\" data-start-open=\"none\">\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-3 kt-pane18464_f5251c-17\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Who Is the Host?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Jack Rhysider has a background working in a security operations center (SOC) for a Fortune 500 company. He started the podcast in 2017 and initially created it because he didn&#8217;t know of anything like it available. He also occasionally blogs about podcasting and has spoken on multiple other podcasts as well.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-8 kt-pane18464_76b5dc-9c\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Key Topics Covered<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Darknet Diaries focuses on topics like cyber scams, hacking and social engineering, penetration testing, and malicious types of software.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-10 kt-pane18464_478cef-44\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Notable Guests<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>In the episode &#8220;Maddie,&#8221; Maddie Stone, a researcher from Google&#8217;s Project Zero, discusses combatting zero-day vulnerabilities with Rhysider.<\/p>\n\n\n\n<p>In the episode &#8220;Rachel,&#8221;<strong> <\/strong>social engineer Rachel Tobac chats about her background in hacking and the ways she was able to manipulate people.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-11 kt-pane18464_418993-4e\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Listen to the Podcast<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p><iframe allow=\"autoplay *; encrypted-media *; fullscreen *; clipboard-write\" frameborder=\"0\" height=\"450\" style=\"width:100%;max-width:660px;overflow:hidden;border-radius:10px;\" sandbox=\"allow-forms allow-popups allow-same-origin allow-scripts allow-storage-access-by-user-activation allow-top-navigation-by-user-activation\" src=\"https:\/\/embed.podcasts.apple.com\/us\/podcast\/darknet-diaries\/id1296350485\"><\/iframe><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<div id=\"jumpcloud\" class=\"wp-block-group full-width editorial-product-accordion has-shadow--large is-layout-flow wp-block-group-is-layout-flow\" style=\"border-style:none;border-width:0px;border-radius:0px;margin-top:0px;margin-bottom:0px;padding-top:36px;padding-right:0px;padding-bottom:0px;padding-left:0px\">\n<h2 class=\"wp-block-heading has-secondary-font-family has-x-large-font-size\" style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0;font-style:normal;font-weight:400;text-transform:none\"><span class=\"ez-toc-section\" id=\"SecurityNow\"><\/span><strong><strong>SecurityNow<\/strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><em><em><strong>4.6 stars, 1.9K+ reviews<\/strong><\/em><\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);background-color:#d0d3d6;color:#d0d3d6\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>Running since 2005, <a href=\"https:\/\/twit.tv\/shows\/security-now\" target=\"_blank\" rel=\"noreferrer noopener\">Security Now<\/a> provides weekly episodes to keep both tech geniuses and total novices up to date on recent developments in cybersecurity. The hosts talk knowledgeably about the subjects at hand without getting too bogged down in jargon.<\/p>\n\n\n\n<p>New episodes of Security Now typically air live weekly on Tuesdays, in both audio and visual form, and are uploaded later that evening. There are over 950 episodes of the podcast. Episodes are often around 100-120 minutes long and are available on Apple Podcasts, YouTube Music, and Spotify. Security Now has a clean rating.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Security-Now.jpg\" alt=\"Security Now Logo\" class=\"wp-image-25301\" style=\"width:180px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Security-Now.jpg 600w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Security-Now-300x300.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Security-Now-150x150.jpg 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-kadence-accordion alignnone\"><div class=\"kt-accordion-wrap kt-accordion-id18464_01b2ec-14 kt-accordion-has-11-panes kt-active-pane-0 kt-accordion-block kt-pane-header-alignment-left kt-accodion-icon-style-arrow kt-accodion-icon-side-right\" style=\"max-width:2000px\"><div class=\"kt-accordion-inner-wrap\" data-allow-multiple-open=\"true\" data-start-open=\"none\">\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-3 kt-pane18464_aef970-15\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Who Is the Host?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Leo Laporte founded the TWiT.tv podcast network and is the host of podcast This Week in Tech and radio show The Tech Guy. Steve Gibson founded Gibson Research Corporation and is its current CEO. He created computer science electronics curriculum as a high schooler and has developed both an anti-spyware application and data recovery software. Both hosts have been in the technology industry for a long time and know a lot about security history.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-8 kt-pane18464_7dc6a3-a9\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Key Topics Covered<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>SecurityNow touches on recent breaches and backdoors, legal security news, and specific product issues, just to name a few topics. It covers a wide range of security issues, including crimes and recent hacking news, as well as recommendations for securing your own organization&#8217;s systems.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-10 kt-pane18464_c1d2b4-08\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Notable Guests<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>This podcast doesn&#8217;t regularly incorporate guests.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-11 kt-pane18464_42938c-ce\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Listen to the Podcast<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p><iframe allow=\"autoplay *; encrypted-media *; fullscreen *; clipboard-write\" frameborder=\"0\" height=\"450\" style=\"width:100%;max-width:660px;overflow:hidden;border-radius:10px;\" sandbox=\"allow-forms allow-popups allow-same-origin allow-scripts allow-storage-access-by-user-activation allow-top-navigation-by-user-activation\" src=\"https:\/\/embed.podcasts.apple.com\/us\/podcast\/security-now-audio\/id79016499\"><\/iframe><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<div id=\"jumpcloud\" class=\"wp-block-group full-width editorial-product-accordion has-shadow--large is-layout-flow wp-block-group-is-layout-flow\" style=\"border-style:none;border-width:0px;border-radius:0px;margin-top:0px;margin-bottom:0px;padding-top:36px;padding-right:0px;padding-bottom:0px;padding-left:0px\">\n<h2 class=\"wp-block-heading has-secondary-font-family has-x-large-font-size\" style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0;font-style:normal;font-weight:400;text-transform:none\"><span class=\"ez-toc-section\" id=\"CyberWire-Daily\"><\/span><strong><strong>CyberWire Daily<\/strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><em><em><strong>4.8 stars, 930+ reviews<\/strong><\/em><\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);background-color:#d0d3d6;color:#d0d3d6\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>The CyberWire is a cybersecurity-focused news service, and the <a href=\"https:\/\/thecyberwire.com\/podcasts\/daily-podcast\" target=\"_blank\" rel=\"noreferrer noopener\">CyberWire Daily Podcast<\/a> delivers a rundown of the top cyber news each day of the week. It requires some baseline industry knowledge, but it\u2019s a great way for security professionals to stay on top of InfoSec current events.<\/p>\n\n\n\n<p>New episodes of CyberWire Daily Podcast air each weekday morning (if not more frequently) and are usually less than 30 minutes long. CyberWire Daily has been active since 2016 and currently has more than 2,000 episodes. They\u2019re available on Apple Podcasts, YouTube Music, and Spotify. The podcast is rated clean.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/cyberwire-daily-logo.jpeg\" alt=\"CyberWire Daily Logo.\" class=\"wp-image-18466\" style=\"width:180px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/cyberwire-daily-logo.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/cyberwire-daily-logo-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-kadence-accordion alignnone\"><div class=\"kt-accordion-wrap kt-accordion-id18464_db2f70-57 kt-accordion-has-11-panes kt-active-pane-0 kt-accordion-block kt-pane-header-alignment-left kt-accodion-icon-style-arrow kt-accodion-icon-side-right\" style=\"max-width:2000px\"><div class=\"kt-accordion-inner-wrap\" data-allow-multiple-open=\"true\" data-start-open=\"none\">\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-3 kt-pane18464_12daf5-76\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Who Is the Host?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Dave Bittner is the primary host listed for CyberWire Daily, though he isn&#8217;t the only one. He&#8217;s a security podcaster, but his extensive television and production background includes videography, acting, and content creation.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-8 kt-pane18464_ebf8c2-e5\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Key Topics Covered<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>CyberWire Daily is more of a news overview than a super deep dive into one topic. Multiple security things will be touched on within a single episode, so you&#8217;re getting nuggets of security information. These include major attacks, the intersection of government and cybersecurity, and vulnerabilities in major software.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-10 kt-pane18464_b1586c-ad\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Notable Guests<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>In episode 2029, Adam Meyers, the senior vice president of Counter Adversary Operations at CrowdStrike, speaks about cloud security issues and the cloud as an attack surface.<\/p>\n\n\n\n<p>In an encore episode on April 7, threat intelligence analyst Selena Larson discusses her career move from journalism to into the security field.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-11 kt-pane18464_babdfc-6d\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Listen to the Podcast<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p><iframe allow=\"autoplay *; encrypted-media *; fullscreen *; clipboard-write\" frameborder=\"0\" height=\"450\" style=\"width:100%;max-width:660px;overflow:hidden;border-radius:10px;\" sandbox=\"allow-forms allow-popups allow-same-origin allow-scripts allow-storage-access-by-user-activation allow-top-navigation-by-user-activation\" src=\"https:\/\/embed.podcasts.apple.com\/us\/podcast\/cyberwire-daily\/id1071831261\"><\/iframe><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<div id=\"jumpcloud\" class=\"wp-block-group full-width editorial-product-accordion has-shadow--large is-layout-flow wp-block-group-is-layout-flow\" style=\"border-style:none;border-width:0px;border-radius:0px;margin-top:0px;margin-bottom:0px;padding-top:36px;padding-right:0px;padding-bottom:0px;padding-left:0px\">\n<h2 class=\"wp-block-heading has-secondary-font-family has-x-large-font-size\" style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0;font-style:normal;font-weight:400;text-transform:none\"><span class=\"ez-toc-section\" id=\"Malicious-Life\"><\/span><strong><strong>Malicious Life<\/strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><em><em><strong>4.8 stars, 880+ reviews<\/strong><\/em><\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);background-color:#d0d3d6;color:#d0d3d6\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-4 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>For history buffs, <a href=\"https:\/\/malicious.life\/\" target=\"_blank\" rel=\"noreferrer noopener\">Malicious Life<\/a> by EDR and XDR provider Cybereason chronicles some of the most influential untold cybersecurity stories around the world. It takes listeners on a journey through the history of cybersecurity through the lens of real hackers, security experts, journalists, and politicians.<\/p>\n\n\n\n<p>New episodes of Malicious Life typically air twice a month and are usually 30-40 minutes long. Malicious Life currently has over 240 episodes. They\u2019re available on Apple Podcasts and Spotify. The show has been active since 2017 and is rated clean.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Malicious-Life-logo.png\" alt=\"Malicious Life logo.\" class=\"wp-image-18469\" style=\"width:180px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Malicious-Life-logo.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Malicious-Life-logo-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-kadence-accordion alignnone\"><div class=\"kt-accordion-wrap kt-accordion-id18464_cce66f-76 kt-accordion-has-11-panes kt-active-pane-0 kt-accordion-block kt-pane-header-alignment-left kt-accodion-icon-style-arrow kt-accodion-icon-side-right\" style=\"max-width:2000px\"><div class=\"kt-accordion-inner-wrap\" data-allow-multiple-open=\"true\" data-start-open=\"none\">\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-3 kt-pane18464_5bdb6a-78\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Who Is the Host?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Ran Levi studied electrical engineering at the Technion Institute of Technology and has worked in electronic engineering and programming for multiple Israeli technology companies. He&#8217;s the creator of another popular podcast, Making History. Through interviews and research, Ran connects the dots between the early days of cybercrime and today\u2019s stories of data hacks and breaches.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-8 kt-pane18464_59deb4-31\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Key Topics Covered<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Malicious Life&#8217;s topics of discussion include historical events like Y2K, famous hackers such as Kevin Mitnick, and famous as well as lesser-known cybercrimes and the responsible criminals. Levi also covers hot topics like generative AI.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-10 kt-pane18464_8550f5-5c\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Notable Guests<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>In one of Malicious Life&#8217;s specials, Levi interviewed Amit Serper, the Principal Security Researcher at Cybereason, who&#8217;s worked in cybersecurity for the Israeli government. In the episode, Levi and Serper discuss Serper&#8217;s experience with the government, reverse-engineering and analyzing malware, and nation-state attacks against high-profile targets&#8217; <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network infrastructure<\/a>.<\/p>\n\n\n\n<p>In another interview special, Levi interviews Graham Cluley of Smashing Security, who discusses how he got into the security world and the early stages of the malware industry.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-11 kt-pane18464_a41306-6a\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Listen to the Podcast<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p><iframe allow=\"autoplay *; encrypted-media *; fullscreen *; clipboard-write\" frameborder=\"0\" height=\"450\" style=\"width:100%;max-width:660px;overflow:hidden;border-radius:10px;\" sandbox=\"allow-forms allow-popups allow-same-origin allow-scripts allow-storage-access-by-user-activation allow-top-navigation-by-user-activation\" src=\"https:\/\/embed.podcasts.apple.com\/us\/podcast\/malicious-life\/id1252417787\"><\/iframe><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<div id=\"jumpcloud\" class=\"wp-block-group full-width editorial-product-accordion has-shadow--large is-layout-flow wp-block-group-is-layout-flow\" style=\"border-style:none;border-width:0px;border-radius:0px;margin-top:0px;margin-bottom:0px;padding-top:36px;padding-right:0px;padding-bottom:0px;padding-left:0px\">\n<h2 class=\"wp-block-heading has-secondary-font-family has-x-large-font-size\" style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0;font-style:normal;font-weight:400;text-transform:none\"><span class=\"ez-toc-section\" id=\"Risky-Business\"><\/span><strong><strong>Risky Business<\/strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><em><em><strong>4.7 stars, 330+ reviews<\/strong><\/em><\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);background-color:#d0d3d6;color:#d0d3d6\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-5 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><a href=\"https:\/\/risky.biz\/\" target=\"_blank\" rel=\"noreferrer noopener\">Risky Business<\/a> is one of the longest-running podcasts in the cybersecurity industry, publishing episodes since 2007. You\u2019ll get in-depth analysis each week of the latest stories and how they impact security trends on a global scale.<\/p>\n\n\n\n<p>New episodes of Risky Business typically air weekly on Wednesdays and are usually about 60 minutes long. There are currently over 700 episodes. Risky Business is available on Apple Podcasts and Spotify, and it has a clean rating.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/risky-business-logo.jpeg\" alt=\"Risky Business logo.\" class=\"wp-image-18471\" style=\"width:180px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/risky-business-logo.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/risky-business-logo-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-kadence-accordion alignnone\"><div class=\"kt-accordion-wrap kt-accordion-id18464_083292-2e kt-accordion-has-11-panes kt-active-pane-0 kt-accordion-block kt-pane-header-alignment-left kt-accodion-icon-style-arrow kt-accodion-icon-side-right\" style=\"max-width:2000px\"><div class=\"kt-accordion-inner-wrap\" data-allow-multiple-open=\"true\" data-start-open=\"none\">\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-3 kt-pane18464_10ba3b-2c\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Who Is the Host?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Patrick Gray is a journalist who began writing about security over 20 years ago, including freelancing for multiple internet and security publications. Adam Boileau holds a senior role at CyberCX, a security company based in Australia.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-8 kt-pane18464_170874-5a\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Key Topics Covered<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Risky Business takes an analytical approach to cybersecurity topics like attack and breach news, as well as covering legislation and the ways different governmental bodies approach security.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-10 kt-pane18464_9af578-f1\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Notable Guests<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>In episode 743, Risky Business chats with Andres Freund, a software developer who found the XZ Utils backdoor, as well as discussing a Ukraine hack of Russia, social engineering, and a Cyber Safety Review Board (CSRB) scolding directed toward Microsoft.<\/p>\n\n\n\n<p>In a sponsored news episode, Catalin Cimpanu, the author of Risky Business&#8217;s newsletter, interviews the founder of GreyNoise, Andrew Morris, about vulnerability exploit trends from the previous year.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-11 kt-pane18464_c6eae3-67\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Listen to the Podcast<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p><iframe allow=\"autoplay *; encrypted-media *; fullscreen *; clipboard-write\" frameborder=\"0\" height=\"450\" style=\"width:100%;max-width:660px;overflow:hidden;border-radius:10px;\" sandbox=\"allow-forms allow-popups allow-same-origin allow-scripts allow-storage-access-by-user-activation allow-top-navigation-by-user-activation\" src=\"https:\/\/embed.podcasts.apple.com\/us\/podcast\/risky-business\/id216478078\"><\/iframe><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<div id=\"jumpcloud\" class=\"wp-block-group full-width editorial-product-accordion has-shadow--large is-layout-flow wp-block-group-is-layout-flow\" style=\"border-style:none;border-width:0px;border-radius:0px;margin-top:0px;margin-bottom:0px;padding-top:36px;padding-right:0px;padding-bottom:0px;padding-left:0px\">\n<h2 class=\"wp-block-heading has-secondary-font-family has-x-large-font-size\" style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0;font-style:normal;font-weight:400;text-transform:none\"><span class=\"ez-toc-section\" id=\"Hacking-Humans\"><\/span><strong><strong>Hacking Humans<\/strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><em><em><strong>4.6 stars, 270+ reviews<\/strong><\/em><\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);background-color:#d0d3d6;color:#d0d3d6\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-6 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>If you\u2019re particularly interested in the connection between cybersecurity and psychology, you may like <a href=\"https:\/\/thecyberwire.com\/podcasts\/hacking-humans\" target=\"_blank\" rel=\"noreferrer noopener\">Hacking Humans<\/a>, CyberWire\u2019s podcast division specifically dedicated to social engineering and how to avoid it.<\/p>\n\n\n\n<p>New episodes of Hacking Humans air weekly on Thursdays and are usually 40-60 minutes long. The podcast currently has more than 500 episodes. They\u2019re available on Apple Podcasts, YouTube Music, or Spotify and are rated clean. Another series within Hacking Humans includes Word Notes, a short episode that defines a common security term or acronym.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/hacking-humans-logo.png\" alt=\"Hacking Humans logo.\" class=\"wp-image-18468\" style=\"width:180px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/hacking-humans-logo.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/hacking-humans-logo-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-kadence-accordion alignnone\"><div class=\"kt-accordion-wrap kt-accordion-id18464_80dddd-75 kt-accordion-has-11-panes kt-active-pane-0 kt-accordion-block kt-pane-header-alignment-left kt-accodion-icon-style-arrow kt-accodion-icon-side-right\" style=\"max-width:2000px\"><div class=\"kt-accordion-inner-wrap\" data-allow-multiple-open=\"true\" data-start-open=\"none\">\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-3 kt-pane18464_d41a96-5d\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Who Is the Host?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Dave Bittner shows up again in this podcast, also connected to CyberWire, but he&#8217;s not the only host. Joe Carrigan has a background in software engineering and currently works as a senior security engineer with the Johns Hopkins University Information Security Institute. His experience includes usable security, data migration, and embedded systems.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-8 kt-pane18464_7a4ed0-84\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Key Topics Covered<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Hacking Humans mainly focuses on the world of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/\">social engineering<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\">phishing attempts<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/data-loss-prevention-dlp-solutions\/\">insider threats<\/a>, and similar criminal exploits. It offers recommendations for listeners to protect themselves from these attacks, too.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-10 kt-pane18464_fe2f4f-3f\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Notable Guests<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>In episode 285, the hosts speak with Dr. Robert Blumofe, the chief technology officer at Akamai, about an AI doomsday scenario. Bittner also discusses the research surrounding people falling for scams and that they shouldn&#8217;t feel guilty for succumbing to one.<\/p>\n\n\n\n<p>In episode 279, Bittner and Carrigan chat with Mike Kosak, the principal intelligence analyst at LastPass, about passkeys and Chinese hacking group Volt Typhoon.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-11 kt-pane18464_d83fb3-27\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Listen to the Podcast<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p><iframe allow=\"autoplay *; encrypted-media *; fullscreen *; clipboard-write\" frameborder=\"0\" height=\"450\" style=\"width:100%;max-width:660px;overflow:hidden;border-radius:10px;\" sandbox=\"allow-forms allow-popups allow-same-origin allow-scripts allow-storage-access-by-user-activation allow-top-navigation-by-user-activation\" src=\"https:\/\/embed.podcasts.apple.com\/us\/podcast\/hacking-humans\/id1391915810\"><\/iframe><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<div id=\"jumpcloud\" class=\"wp-block-group full-width editorial-product-accordion has-shadow--large is-layout-flow wp-block-group-is-layout-flow\" style=\"border-style:none;border-width:0px;border-radius:0px;margin-top:0px;margin-bottom:0px;padding-top:36px;padding-right:0px;padding-bottom:0px;padding-left:0px\">\n<h2 class=\"wp-block-heading has-secondary-font-family has-x-large-font-size\" style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0;font-style:normal;font-weight:400;text-transform:none\"><span class=\"ez-toc-section\" id=\"Smashing-Security\"><\/span><strong><strong>Smashing Security<\/strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><em><em><strong>4.5 stars, 280+ reviews<\/strong><\/em><\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);background-color:#d0d3d6;color:#d0d3d6\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>Cybersecurity topics are usually no laughing matter, but on <a href=\"https:\/\/www.smashingsecurity.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Smashing Security<\/a>, the co-hosts bring a sense of levity to the conversation. Each week, the two computer security experts and a variety of guests talk through some of the top cybercrime headlines, taking a humorous, laid-back tone that makes learning about security news more approachable.<\/p>\n\n\n\n<p>New episodes of Smashing Security air weekly on Wednesdays (with occasional additional episodes on other days). The podcast currently has over 370 episodes. They\u2019re usually 45-60 minutes long and are available on Apple Podcasts, Google Podcasts, and Spotify. Smashing Security is rated explicit and may contain adult themes.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/smashing-security-logo.jpeg\" alt=\"Smashing Security logo.\" class=\"wp-image-18472\" style=\"width:180px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/smashing-security-logo.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/smashing-security-logo-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-kadence-accordion alignnone\"><div class=\"kt-accordion-wrap kt-accordion-id18464_2c93e4-ff kt-accordion-has-11-panes kt-active-pane-0 kt-accordion-block kt-pane-header-alignment-left kt-accodion-icon-style-arrow kt-accodion-icon-side-right\" style=\"max-width:2000px\"><div class=\"kt-accordion-inner-wrap\" data-allow-multiple-open=\"true\" data-start-open=\"none\">\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-3 kt-pane18464_b03ea9-48\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Who Is the Host?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Graham Cluley is a security blogger and researcher with a background in programming; he coded an early Windows antivirus toolkit. Carole Theriault started Sophos Naked Security and currently runs Tick Tock Social, a media firm geared toward tech organizations.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-8 kt-pane18464_c95f30-f8\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Key Topics Covered<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Cluley and Theriault cover common hot topics like AI, breaches, hacking, online privacy, and legal concerns, but their tone is more lighthearted overall than the majority of podcasts. They also cover security vulnerabilities or attacks on a variety of enterprises, including those in the pharmaceutical, gaming, and consumer electronic industries.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-10 kt-pane18464_a9599c-32\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Notable Guests<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>In episode 360, Cluley and Theriault chat with Keiron Holyome of BlackBerry about predictive AI as a tool to prevent cybersecurity threats.<\/p>\n\n\n\n<p>In episode 359, the co-hosts discuss ransomware gangs and mobile phone number issues with Allan Liska, incident response team member at Recorded Future.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-11 kt-pane18464_1a00ab-69\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Listen to the Podcast<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p><iframe allow=\"autoplay *; encrypted-media *; fullscreen *; clipboard-write\" frameborder=\"0\" height=\"450\" style=\"width:100%;max-width:660px;overflow:hidden;border-radius:10px;\" sandbox=\"allow-forms allow-popups allow-same-origin allow-scripts allow-storage-access-by-user-activation allow-top-navigation-by-user-activation\" src=\"https:\/\/embed.podcasts.apple.com\/us\/podcast\/smashing-security\/id1195001633\"><\/iframe><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<div id=\"jumpcloud\" class=\"wp-block-group full-width editorial-product-accordion has-shadow--large is-layout-flow wp-block-group-is-layout-flow\" style=\"border-style:none;border-width:0px;border-radius:0px;margin-top:0px;margin-bottom:0px;padding-top:36px;padding-right:0px;padding-bottom:0px;padding-left:0px\">\n<h2 class=\"wp-block-heading has-secondary-font-family has-x-large-font-size\" style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0;font-style:normal;font-weight:400;text-transform:none\"><span class=\"ez-toc-section\" id=\"Unsupervised-Learning\"><\/span><strong><strong>Unsupervised Learning<\/strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><em><em><em><strong>4.6 stars, 120+ reviews<\/strong><\/em><\/em><\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--40);background-color:#d0d3d6;color:#d0d3d6\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-8 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><a href=\"https:\/\/danielmiessler.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Unsupervised Learning<\/a> condenses 5-20 hours of research into a concise summary of the most interesting things happening in the news related to security, technology, and society at large. This podcast is extremely succinct, so some listeners may find it a bit dry, but the host connects a wide scope of topics masterfully. It&#8217;s a great podcast for security geeks.<\/p>\n\n\n\n<p>New episodes of Unsupervised Learning typically air once a week or every two weeks and are around 30 minutes or less. There are currently over 400 episodes, and they&#8217;re available on Apple Podcasts and Spotify. The show is rated explicit.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/unsupervised-learning-logo.jpeg\" alt=\"Unsupervised Learning logo.\" class=\"wp-image-18473\" style=\"width:180px\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/unsupervised-learning-logo.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/unsupervised-learning-logo-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-kadence-accordion alignnone\"><div class=\"kt-accordion-wrap kt-accordion-id18464_c2e9ff-61 kt-accordion-has-11-panes kt-active-pane-0 kt-accordion-block kt-pane-header-alignment-left kt-accodion-icon-style-arrow kt-accodion-icon-side-right\" style=\"max-width:2000px\"><div class=\"kt-accordion-inner-wrap\" data-allow-multiple-open=\"true\" data-start-open=\"none\">\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-3 kt-pane18464_efdf8e-51\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Who Is the Host?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Daniel Miessler has a background in information security and writing and started his site in 1999. The podcast came later, in 2016, but he&#8217;s been writing about security much longer. He lives in San Francisco. Miessler pairs cybersecurity news that might otherwise feel boring with commentary and analysis of how current affairs could affect future events.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-8 kt-pane18464_9e1f5d-80\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Key Topics Covered<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Unsupervised Learning currently focuses largely on AI and how it affects humans, as well as the ways people can thrive using AI and handle it well.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-10 kt-pane18464_8a8c21-b6\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Notable Guests<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>In a March 19 conversation, Miessler talks with Jason Meller, founder of Kolide, which was just acquired by 1Password. They discuss password management, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/\">device trust and zero trust<\/a>, and limitations of mobile device management products.<\/p>\n\n\n\n<p>In a January 29 episode, Miessler chats with Shil Sircar, the senior VP of engineering and data science at Blackberry. They discuss machine learning, threat detection, and synthetic malware generation.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-11 kt-pane18464_643f3d-12\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Listen to the Podcast<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p><iframe allow=\"autoplay *; encrypted-media *; fullscreen *; clipboard-write\" frameborder=\"0\" height=\"450\" style=\"width:100%;max-width:660px;overflow:hidden;border-radius:10px;\" sandbox=\"allow-forms allow-popups allow-same-origin allow-scripts allow-storage-access-by-user-activation allow-top-navigation-by-user-activation\" src=\"https:\/\/embed.podcasts.apple.com\/us\/podcast\/unsupervised-learning\/id1099711235\"><\/iframe><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\"><span class=\"ez-toc-section\" id=\"Bottom-Line-Podcasts-Can-Deepen-Your-Interest-in-Cybersecurity\"><\/span>Bottom Line: Podcasts Can Deepen Your Interest in Cybersecurity<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>It&#8217;s one thing to look at an application&#8217;s management console or stare at threat intelligence feeds and alerts all day. But listening to podcasts \u2014 and the humans who have experienced events in this field \u2014 makes cybersecurity that much more interesting. If you&#8217;re looking for a new podcast, whether to further your experience in the security field or to learn what professionals do, I recommend you check out these podcasts and see which ones are a fit.<\/p>\n\n\n\n<p><strong>If you&#8217;re interested in hearing more insights from security professionals, read our guide to the <a href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/\">best cybersecurity Twitter accounts<\/a> next.<\/strong><\/p>\n\n\n\n<p><em><a href=\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\">Jenna Phipps<\/a> contributed to this article.<\/em><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d44f2c9a6-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d44f2c9a6\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d44f2c9a6\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d44f2c9a6\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d44f2c9a6\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d44f2c9a6\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d44f2c9a6\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Check out the best cybersecurity podcasts to follow in 2024. Stay informed on the current trends and best practices from industry leaders.<\/p>\n","protected":false},"author":159,"featured_media":35071,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[16],"tags":[3790,841,31959],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[249,143],"class_list":["post-18464","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends","tag-cybersecurity","tag-data-security","tag-podcast","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-business-best-practices","b2b_product-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>8 Best Cybersecurity Podcasts To Follow in 2024<\/title>\n<meta name=\"description\" content=\"Check out the best cybersecurity podcasts to follow in 2024. Stay informed on the current trends and best practices from industry leaders.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Best Cybersecurity Podcasts To Follow in 2024\" \/>\n<meta property=\"og:description\" content=\"Check out the best cybersecurity podcasts to follow in 2024. Stay informed on the current trends and best practices from industry leaders.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T10:59:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240426-top-cybersecurity-podcasts.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kaiti Norton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kaiti Norton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/\"},\"author\":{\"name\":\"Kaiti Norton\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/a9bab2a98d99b2e5fd48b6406aef738f\"},\"headline\":\"8 Binge-Worthy Cybersecurity Podcasts in 2024\",\"datePublished\":\"2024-04-26T09:00:00+00:00\",\"dateModified\":\"2024-04-26T10:59:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/\"},\"wordCount\":2167,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240426-top-cybersecurity-podcasts.png\",\"keywords\":[\"cybersecurity\",\"data security\",\"podcast\"],\"articleSection\":[\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/\",\"name\":\"8 Best Cybersecurity Podcasts To Follow in 2024\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240426-top-cybersecurity-podcasts.png\",\"datePublished\":\"2024-04-26T09:00:00+00:00\",\"dateModified\":\"2024-04-26T10:59:47+00:00\",\"description\":\"Check out the best cybersecurity podcasts to follow in 2024. Stay informed on the current trends and best practices from industry leaders.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240426-top-cybersecurity-podcasts.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240426-top-cybersecurity-podcasts.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: OneClic\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 Binge-Worthy Cybersecurity Podcasts in 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/a9bab2a98d99b2e5fd48b6406aef738f\",\"name\":\"Kaiti Norton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/526eeed355a7228b28b9476b0ea40851?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/526eeed355a7228b28b9476b0ea40851?s=96&d=blank&r=g\",\"caption\":\"Kaiti Norton\"},\"description\":\"Kaiti Norton is a Nashville-based Content Writer for eSecurity Planet, Webopedia, and Small Business Computing. She is passionate about helping brands build genuine connections with their customers through relatable, research-based content.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/kaiti-norton\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 Best Cybersecurity Podcasts To Follow in 2024","description":"Check out the best cybersecurity podcasts to follow in 2024. Stay informed on the current trends and best practices from industry leaders.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/","og_locale":"en_US","og_type":"article","og_title":"8 Best Cybersecurity Podcasts To Follow in 2024","og_description":"Check out the best cybersecurity podcasts to follow in 2024. Stay informed on the current trends and best practices from industry leaders.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/","og_site_name":"eSecurity Planet","article_published_time":"2024-04-26T09:00:00+00:00","article_modified_time":"2024-04-26T10:59:47+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240426-top-cybersecurity-podcasts.png","type":"image\/png"}],"author":"Kaiti Norton","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Kaiti Norton","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/"},"author":{"name":"Kaiti Norton","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/a9bab2a98d99b2e5fd48b6406aef738f"},"headline":"8 Binge-Worthy Cybersecurity Podcasts in 2024","datePublished":"2024-04-26T09:00:00+00:00","dateModified":"2024-04-26T10:59:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/"},"wordCount":2167,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240426-top-cybersecurity-podcasts.png","keywords":["cybersecurity","data security","podcast"],"articleSection":["Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/","url":"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/","name":"8 Best Cybersecurity Podcasts To Follow in 2024","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240426-top-cybersecurity-podcasts.png","datePublished":"2024-04-26T09:00:00+00:00","dateModified":"2024-04-26T10:59:47+00:00","description":"Check out the best cybersecurity podcasts to follow in 2024. Stay informed on the current trends and best practices from industry leaders.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240426-top-cybersecurity-podcasts.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240426-top-cybersecurity-podcasts.png","width":1400,"height":900,"caption":"Image: OneClic\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"8 Binge-Worthy Cybersecurity Podcasts in 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/a9bab2a98d99b2e5fd48b6406aef738f","name":"Kaiti Norton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/526eeed355a7228b28b9476b0ea40851?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/526eeed355a7228b28b9476b0ea40851?s=96&d=blank&r=g","caption":"Kaiti Norton"},"description":"Kaiti Norton is a Nashville-based Content Writer for eSecurity Planet, Webopedia, and Small Business Computing. She is passionate about helping brands build genuine connections with their customers through relatable, research-based content.","url":"https:\/\/www.esecurityplanet.com\/author\/kaiti-norton\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18464"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/159"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18464"}],"version-history":[{"count":3,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18464\/revisions"}],"predecessor-version":[{"id":35070,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18464\/revisions\/35070"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/35071"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18464"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18464"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18464"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}