All Episodes
The Audit - Cybersecurity Podcast — 91 episodes
Inside Email Security: Phishing, Hackers, and Harmony Checkpoint
Ghost in the Machine: AI Identities & the Spiritual Red Teaming
Cyber News: Iran Attacks, Greyware, and Backdoor Code
Cognitive Surrender: How AI Weaponizes Human Psychology
Surviving a Cardiac Event: Biometric Data and the Risks Nobody Talks About
Secret Service Agent Reveals Undercover Cyber Ops
Cyber News: Advanced Phishing, ClickFix & AI Wearables
Field Notes: New Year Catch-Up, Coffee, And Team DNA
AI Architecture: Stop Button Pushing, Start Building
The Audit 2025: Deepfakes, Quantum & AI That Changed Everything
Gaming to Cybersecurity: How AI Agents Fight Alert Overload
Critical Infrastructure: Everything is Connected and Vulnerable
Red Team Warfare: A Navy Cyber Officer's Inside Look at Military Offensive Operations
Field Notes: AI's $10 Trillion Lie + Coffee Roasting & Starlink Hacks
Apple Vision Pro Meets AI: Why Your Company Needs Both
Field Notes: Coffee, Gliders & Trademark Scams
Cybersecurity News: Grok AI Hijacked for Malware, Wi-Fi Heart Rate Hacks, Starlink Competition
Field Notes: Why Cyber Attacks Are Accelerating
Healthcare Ransomware: When Cyberattacks Turn Deadly
The Deepfake Hiring Crisis: AI Fraud in Job Interviews
How CTF Culture Gamifies Your Way to Unbreakable Security Teams
Cybersecurity News: Vikings Vishing Lost $240K, Scattered Spider & F1 Racing
Grassroots Cybersecurity: Protecting Communities Through Education
Tabletop Exercises 2.0: How OpsBook Is Changing the Game
The Invisible Threats: OT Meets IT in Modern Manufacturing
Pwnagotchi: The AI Pet That Hunts Your Network Credentials
Pi-hole: The Open Source DNS Firewall Revolutionizing Network Security
Cybersecurity News: E-Z Pass Scam, Dead Internet Theory & $16.6B FBI Report
Inside InfraGard: How FBI Partnerships Attack Risks to Critical Infrastructure
The Future of Quantum: Majorana Particles, Encryption, AI, and Parallel Universes
Eco-Security: The Intersection of Recycling and Technology
SOC Audits Decoded: What Your Business Needs to Know Now!
Cybersecurity News: Elon's Audits, Finland’s Tabletop Security, & AI Threats
Social Engineering Tactics & Defense Strategies with Alethe Denis
Cybersecurity Insights 2025: Big Data, AI, and Staying Ahead of Attacks
Big Data Meets Cybersecurity: Expert Insights from Wade Baker
Cybersecurity in Travel: Tips, Tools, and Tales with Matthew Wold
Cracking Gmail and SEO Poisoning: Inside the Latest Cyber Threats
Social Engineering to AI Ethics: Wild West Hackin’ Fest 2024
AI & Emerging Tech for a Better Future with Marsha Maxwell
Building Resilient, Secure Software: Lessons from DevSecOps Experts
Real-World Cybersecurity: Need to Know Now Insights from a CISO
Safety Science Meets Cybersecurity: Lessons for Risk Management
Next-Gen Email Security: Mick Leach on AI, Phishing, and QR Codes
Cybersecurity News: CrowdStrike, TikTok, and Ransomware Trends
Mastering Open Source Intelligence (OSINT): AI, Tradecraft, and Future Trends
Cybersecurity News: Military Malware, UFOs, and More Passwords Leaked
Inside the Hak5 Pineapple: Tools, Tips, and Real-World Applications
Cybersecurity News: DDoS Attacks, Public Library Breach, Phishing and More
Quantum Computing's Impact on Cybersecurity with Bernie Leung
Securing the Invisible Threats: Insights on IoT Security with Eric Johansen
Soaring Through Cybersecurity: Indoor Skydiving and Pen Testing with Brian Johnson
Building the Future: AI and Cybersecurity in Construction
Cybersecurity News: Water Systems & IoT Devices Under Threat
Phishing: The Number 1 Social Engineering Tactic with James Arndt
Printing the Future: Navigating Cybersecurity in 3D Printing
Are VPNs Secure? Insights on the Risks, and the Ivanti Breach
A Veteran’s Journey into Cybersecurity with Clifton Robinson
Email and Mobile Security Tips with Dean Morstad
Meet the Team: Learn Their Approach to Ransomware, Breach Response, and AI
Cybersecurity Jobs, Breach Communication & The Infosec Landscape with Leah McLean
Decoding Flipper Zero: The Swiss-Army Knife of Hacking Tools
Understanding Cryptocurrency and Wallet Security with Matt Starland
Stories from the Dark Side of Cyber Forensics with Andre Champagne
eCommerce and Surviving the Black Friday Frenzy with Jeff White
The Future of Digital Storage: From Hard Drives to DNA
A Comprehensive Guide to Quantum Computing
The Next Era of Computing and Processor Technology
Unmasking the Complex World of Cybersecurity and Software Updates
The Dark Side of Cyberspace: Data Breaches and the Price of Information
The New Toolkit: AI-Powered Presentations
The Future of Passwords and Personal Security
Certified Vulnerable: How Certificates Can Be Exploited
So, you wanna be a CISO?
Hacking Hardware Hobbies with Dennis Pelton
Security in the News: Cloud Policies and Data Breach Prevention
Cyber Safe Travel: Tips for Secure Adventures
So, You Want to Be in Cybersecurity?
What is the Dark Web?
Security in the News: Architects, APIs, and Alaska
It’s a Pwnagotchi Party!
Wireless Attack Kill Chain for n00bs with Dennis Pelton
Tales from the Cybersecurity Trenches: Breaches, Badges and Backdoors
DC30 Vishing Competition Black Badge winners Team Spilt Beans
Phishing, Smishing and Other Cybersecurity Threats
Unquoted Service Paths: A Windows Vulnerability
Personal Information Security Protection in a Modern Era, Part IV
Personal Information Security Protection in a Modern Era, Part III
Personal Information Security Protection in a Modern Era, Part II
Personal Information Security Protection in a Modern Era, Part I
Introduction to The Audit