The Audit - Cybersecurity Podcast cover art

All Episodes

The Audit - Cybersecurity Podcast — 91 episodes

#
Title
1

Inside Email Security: Phishing, Hackers, and Harmony Checkpoint

2

Ghost in the Machine: AI Identities & the Spiritual Red Teaming

3

Cyber News: Iran Attacks, Greyware, and Backdoor Code

4

Cognitive Surrender: How AI Weaponizes Human Psychology

5

Surviving a Cardiac Event: Biometric Data and the Risks Nobody Talks About

6

Secret Service Agent Reveals Undercover Cyber Ops

7

Cyber News: Advanced Phishing, ClickFix & AI Wearables

8

Field Notes: New Year Catch-Up, Coffee, And Team DNA

9

AI Architecture: Stop Button Pushing, Start Building

10

The Audit 2025: Deepfakes, Quantum & AI That Changed Everything

11

Gaming to Cybersecurity: How AI Agents Fight Alert Overload

12

Critical Infrastructure: Everything is Connected and Vulnerable

13

Red Team Warfare: A Navy Cyber Officer's Inside Look at Military Offensive Operations

14

Field Notes: AI's $10 Trillion Lie + Coffee Roasting & Starlink Hacks

15

Apple Vision Pro Meets AI: Why Your Company Needs Both

16

Field Notes: Coffee, Gliders & Trademark Scams

17

Cybersecurity News: Grok AI Hijacked for Malware, Wi-Fi Heart Rate Hacks, Starlink Competition

18

Field Notes: Why Cyber Attacks Are Accelerating

19

Healthcare Ransomware: When Cyberattacks Turn Deadly

20

The Deepfake Hiring Crisis: AI Fraud in Job Interviews

21

How CTF Culture Gamifies Your Way to Unbreakable Security Teams

22

Cybersecurity News: Vikings Vishing Lost $240K, Scattered Spider & F1 Racing

23

Grassroots Cybersecurity: Protecting Communities Through Education

24

Tabletop Exercises 2.0: How OpsBook Is Changing the Game

25

The Invisible Threats: OT Meets IT in Modern Manufacturing

26

Pwnagotchi: The AI Pet That Hunts Your Network Credentials

27

Pi-hole: The Open Source DNS Firewall Revolutionizing Network Security

28

Cybersecurity News: E-Z Pass Scam, Dead Internet Theory & $16.6B FBI Report

29

Inside InfraGard: How FBI Partnerships Attack Risks to Critical Infrastructure

30

The Future of Quantum: Majorana Particles, Encryption, AI, and Parallel Universes

31

Eco-Security: The Intersection of Recycling and Technology

32

SOC Audits Decoded: What Your Business Needs to Know Now!

33

Cybersecurity News: Elon's Audits, Finland’s Tabletop Security, & AI Threats

34

Social Engineering Tactics & Defense Strategies with Alethe Denis

35

Cybersecurity Insights 2025: Big Data, AI, and Staying Ahead of Attacks

36

Big Data Meets Cybersecurity: Expert Insights from Wade Baker

37

Cybersecurity in Travel: Tips, Tools, and Tales with Matthew Wold

38

Cracking Gmail and SEO Poisoning: Inside the Latest Cyber Threats

39

Social Engineering to AI Ethics: Wild West Hackin’ Fest 2024

40

AI & Emerging Tech for a Better Future with Marsha Maxwell

41

Building Resilient, Secure Software: Lessons from DevSecOps Experts

42

Real-World Cybersecurity: Need to Know Now Insights from a CISO

43

Safety Science Meets Cybersecurity: Lessons for Risk Management

44

Next-Gen Email Security: Mick Leach on AI, Phishing, and QR Codes

45

Cybersecurity News: CrowdStrike, TikTok, and Ransomware Trends

46

Mastering Open Source Intelligence (OSINT): AI, Tradecraft, and Future Trends

47

Cybersecurity News: Military Malware, UFOs, and More Passwords Leaked

48

Inside the Hak5 Pineapple: Tools, Tips, and Real-World Applications

49

Cybersecurity News: DDoS Attacks, Public Library Breach, Phishing and More

50

Quantum Computing's Impact on Cybersecurity with Bernie Leung

51

Securing the Invisible Threats: Insights on IoT Security with Eric Johansen

52

Soaring Through Cybersecurity: Indoor Skydiving and Pen Testing with Brian Johnson

53

Building the Future: AI and Cybersecurity in Construction

54

Cybersecurity News: Water Systems & IoT Devices Under Threat

55

Phishing: The Number 1 Social Engineering Tactic with James Arndt

56

Printing the Future: Navigating Cybersecurity in 3D Printing

57

Are VPNs Secure? Insights on the Risks, and the Ivanti Breach

58

A Veteran’s Journey into Cybersecurity with Clifton Robinson

59

Email and Mobile Security Tips with Dean Morstad

60

Meet the Team: Learn Their Approach to Ransomware, Breach Response, and AI

61

Cybersecurity Jobs, Breach Communication & The Infosec Landscape with Leah McLean

62

Decoding Flipper Zero: The Swiss-Army Knife of Hacking Tools

63

Understanding Cryptocurrency and Wallet Security with Matt Starland

64

Stories from the Dark Side of Cyber Forensics with Andre Champagne

65

eCommerce and Surviving the Black Friday Frenzy with Jeff White

66

The Future of Digital Storage: From Hard Drives to DNA

67

A Comprehensive Guide to Quantum Computing

68

The Next Era of Computing and Processor Technology

69

Unmasking the Complex World of Cybersecurity and Software Updates

70

The Dark Side of Cyberspace: Data Breaches and the Price of Information

71

The New Toolkit: AI-Powered Presentations

72

The Future of Passwords and Personal Security

73

Certified Vulnerable: How Certificates Can Be Exploited

74

So, you wanna be a CISO?

75

Hacking Hardware Hobbies with Dennis Pelton

76

Security in the News: Cloud Policies and Data Breach Prevention

77

Cyber Safe Travel: Tips for Secure Adventures

78

So, You Want to Be in Cybersecurity?

79

What is the Dark Web?

80

Security in the News: Architects, APIs, and Alaska

81

It’s a Pwnagotchi Party!

82

Wireless Attack Kill Chain for n00bs with Dennis Pelton

83

Tales from the Cybersecurity Trenches: Breaches, Badges and Backdoors

84

DC30 Vishing Competition Black Badge winners Team Spilt Beans

85

Phishing, Smishing and Other Cybersecurity Threats

86

Unquoted Service Paths: A Windows Vulnerability

87

Personal Information Security Protection in a Modern Era, Part IV

88

Personal Information Security Protection in a Modern Era, Part III

89

Personal Information Security Protection in a Modern Era, Part II

90

Personal Information Security Protection in a Modern Era, Part I

91

Introduction to The Audit