All Episodes
CyberIntel - Talking Cybersecurity and Compliance (Presented by VikingCloud) — 96 episodes
Business Uninterrupted Episode 1: How AI is Changing Cyber Risk (Audio Only)
Myanmar's industrial-scale scam operation
The Hidden Risk of Public Wi-Fi
CyberIntel S7EP2: Indirect Prompt Injections
CyberIntel S7EP1: Harvest Now, Decrypt Later — The Quantum Time Bomb
Cyberattacks Damaging Confidence
Cybersecurity Isn't Immune to Pressures
FBI's Internet Crime Report - What You Need to Know
Having an AI Usage Policy
MITRE ATT&CK Framework
VikingCloud's 2025 Cyber Threat Landscape Report
Cybercrime Evasion Tactics
Risk Management with AI-Assisted Tools
North Korean and Chinese Threat Actors
IBM X-Force Threat Landscape Report
Notifiable Data Breaches Report
BadSpace
NIST Releases First 3 Finalized Post-Quantum Encryption Standards
Creating a Cohesive Compliance Program
Ethical Hacking and Transhumanism
Attacks With Geopolitical Motives Rise
The Surge in Regulatory Compliance Through Legislation
Scams as Old as Time
The Next Y2K Problem
The 2024 Cyber Threat Landscape Report
Labhost
What is Considered a Significant Change in PCI DSS v4.0
Cyberwarfare
Artificial Intelligence: Sanity Check
Geopolitical Tensions and Cybersecurity
Gartner Top Trends in Cybersecurity for 2024: Emerging Skills
PCI v4 and What We've Seen So Far
Internal Vulnerability Scanning
IBM Cost of a Data Breach Report 2023
Moon-Shot Cybersecurity Goals
What a Solid Vulnerability Program Should Look Like
Gartner Top Cybersecurity Trends for 2023 (Part 2)
Are Your Cybersecurity Walls Futureproof?
Gartner Top Cybersecurity Trends for 2023
Unsafe Consumption of APIs
APIs and Improper Inventory Management
Cyberinsurance and War Exclusions
Ownership in Cybersecurity and Compliance
FIDO and Quantum Computing
Cybersecurity Disclosures
PCI DSS v4.0 Items Noted for Improvement Process
Cloud Security
The AI Black Box Problem
Artificial Intelligence in Cybersecurity
Small Vendors in the Supply Chain of Larger Firms
The History and Future of Zero Trust Architecture
State Sponsored Attacks and Geopolitical Instability
World Economic Forum - 2023 Cybersecurity Report Findings
World Economic Forum 2023: Cybersecurity Outlook Report
PCI DSS v4.0 - Compensating Controls vs. Customized Approach
PCI DSS v4.0 - In Place with Remediation Removed
PCI DSS Gap Analysis
PCI DSS Network Segmentation
World Economic Forum Global Cybersecurity Outlook 2022 Insight Report
PCI SSC’s Position of Storage of Post-Authorization SAD
Gartner Predictions
US Executive Order Number 14028
NIST IR 8374 Ransomware Risk Management - A Cybersecurity Framework Profile
CIS Controls Version 8
Finding Synergies Between your Compliance Standards
PCI DSS V4.0 Self-Assessment Questionnaires
ISO:27002 2022 Released
The Difference between ISO:27001 and ISO:27002
Assessment Findings
PCI DSS v4.0 - 2 Approaches for Validation
PCI DSS v4.0 Arrives
PCI DSS and Telephone Environments
The Pandemic Opening Up Gaps
Asset Identification
Data Breaches and the Health Sector
Is a Home Office a Sensitive Area for PCI DSS v3.2.1?
Don’t Rest on your Laurels
TLS and PCI DSS Compliance
How Much Data is on your Credit Card, and What Can Be Done with it?
Can you be PCI DSS v3.2.1 Compliant Without 4 Passing Vulnerability Scans?
The Risk of the Home Router to Your Business
The NIST Phish Scale
Voice Over IP and Compliance
Strong Physical Security
PCI DSS v3.2.1 and Compensating Controls
PCI DSS Vulnerability Scanning
When Do You Raise Your Hand for Help?
Threat Modeling
Demonstrating Compliance
”Loose Lips Sink Ships”
The Quality of Assessments
NIST SP 800.53 Revision 5
Business Continuity, Planning and Real Risk Scenarios
PCI DSS and Certificates of Compliance
Multifactor Authentication
Sharing Credit Card Data Over the Phone