The 14 Best Cyber Podcasts in 2022
When it comes to cybersecurity, staying informed is one of the first steps to avoid risks such as data leaks and hacker invasion, which can generate a series of disruptions in an organization, even compromising business continuity.
The good news is that there is a lot of content available on the subject today, both in blogs, such as this one, from senhasegura, and in podcasts.
With this in mind, we prepared an article in which we bring the definition of cybersecurity and why it is essential to understand the topic. In it, we also indicate the 14 best cyber podcasts for you to listen to and stay up to date. To facilitate your reading, we divided our text into topics. They are as follows:
- What Is Cybersecurity?
- Why Is It Important to Learn About Cybersecurity?
- 14 Best Cyber Podcasts
- About senhasegura
- Conclusion
Read our article to the end!
What Is Cybersecurity?
Also known as information technology security or electronic information security, cybersecurity refers to practices used to protect computers and servers, mobile devices, data networks, and electronic systems from cyber risks.
Having a cybersecurity strategy allows one to avoid the action of malicious attackers, who can enter, change, and delete systems or even have access to confidential data from an organization, causing damage and loss of credibility among customers.
In the next topic, we present some recent data related to information security, which shows why it is important to keep up to date on the subject.
Why Is It Important to Learn About Cybersecurity?
With the evolution of technology, malicious attackers also hone their tactics, which points to the need to always be aware of threats and prevent them. Some data generated by the annual Verizon Data Breach Report reinforces this in its 2022 edition. Check it out:
-
The use of privileged credentials is related to most of the attacks surveyed
According to information extracted from the report, almost half of the attacks surveyed involved the use of privileged credentials.
This reveals the importance of adopting security measures, such as the principle of least privilege and a PAM solution.
-
Privilege abuse has generated more than 80% of attacks involving the misuse of privileges
Applying the least privilege policy is essential to avoid privilege abuse by employees and former employees, as this measure allows each user to have only the necessary permissions to perform their activities.
-
One of the main strategies used by cybercriminals is phishing
Phishing is a type of crime in which the hacker impersonates a legitimate entity so that victims feel secure in sharing sensitive data, such as banking information.
Because it is a very common tactic, it is highly recommended that organizations train their employees to identify and combat it.
-
20% of the attacks surveyed were related to social engineering
Attacks involving social engineering are another factor that deserves special attention, as hackers take advantage of uninformed users to compromise the security of companies.
Thus, it is essential to promote training to raise awareness and empower professionals, who must always be prepared to deal with this type of threat.
-
The use of cloud computing increases the attack surface
Cloud computing has been much used especially after the covid-19 pandemic, which required companies to adapt to remote work, so it brings several business advantages, such as speed and scalability.
However, the adoption of cloud environments significantly increases the attack surface and risks in the face of malicious agents.
-
82% of attacks involved the human aspect
It is common for the security of a company to be compromised by human failures, such as the incorrect configuration of database assets. This is what the latest edition of the Verizon Data Breach Report indicates.
According to the document, 50% of the violations generated by human errors were caused by administrators and 30% by developers, with incorrect configurations representing 50% of errors, and incorrect deliveries, 30%.
14 Best Cyber Podcasts
Now that we have covered what cybersecurity is and the importance of understanding it, let’s introduce the 14 best cyber podcasts. Check it out:
-
Cyber Notes Cast
In addition to sharing a lot of quality content here on the blog, we, from senhasegura, have launched the “Cyber Notes Cast” podcast, which you can listen to on Spotify or YouTube.
Through it, we bring the narration of articles in English published on our page, in weekly episodes of approximately 10 minutes. It is perfect for those who are driving, have no time, and want to feel sure about what they hear.
-
Smashing Security
On the Smashing Security podcast, Graham Cluley and Carole Theriault discuss topics such as online privacy, hacker action, and cybercrime with their guests.
With more than eight million downloads, Smashing Security is among the best cyber podcasts: it has hosted guests such as Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones, as well as being the winner of the “Best Security Podcast 2018” and “Best Security Podcast 2019”.
You can follow the podcast on Twitter @SmashinSecurity and subscribe for free using a podcast app.
-
Sophos Naked Security
Sophos Naked Security is also among the best cyber podcasts and is ideal for those who want to receive technical information and expert advice, which can be applied at home and in the corporate environment, in a relaxed tone.
This podcast can be found on Spotify, Apple Podcasts, and Soundcloud. It is also possible to listen to the latest episodes through the Naked Security website itself.
-
Darknet Diaries
Created by Jack Rhysider, the Darknet Diaries podcast broadcasts real stories involving hackers, cybercrime, invasions, and hacktivism, among other activities carried out in an obscure way on the Internet.
-
Stormcast
Stormcast is produced daily, with episodes of five to ten minutes, which update the audience on threats related to digital security. To subscribe, just click here and check out one of the best cyber podcasts.
-
Security Now!
Hosted every Tuesday by the creator of the first anti-spyware program, Steve Gibson, and tech expert, Leo Laporte, Security Now! is also one of the best cyber podcasts and explores complex themes in depth through a humorous and accessible conversation.
Among the topics covered in the podcast, the following stand out:
- Malware;
- Ransomware and hacks;
- Encryption and decryption;
- Software and security patches, plug-ins, and updates;
- Digital service shutdowns;
- Bug reward programs;
- Passwords and authentication;
- Hardware and IoT security;
- Bluetooth and Wi-Fi exploitations;
- Zero-day exploitations;
- Digital identity, data privacy, and policies; and
- Browser vulnerabilities.
In addition, the hosts evaluate privacy issues when it comes to mobile devices and messaging apps, such as WhatsApp and Facebook Messenger.
Security Now! was launched in August 2005 and soon received several awards: in 2007, it received the People’s Choice Podcast Awards in the Technology/Science category.
In 2006, it ranked fourth in the Top 40 podcasts listened to through PodNova, and in 2015, Security Now! was ranked fourth among the top 40 technology podcasts in the United States.
-
Hacking Humans
In this podcast, Dave Bittner and Joe Carrigan comment weekly on cybercrimes that affect organizations around the world, addressing topics such as social engineering and phishing.
As well as hosting a security podcast, Dave Bittner is one of CyberWire’s founders. He has experience as a creator, cameraman, actor, producer, and entrepreneur, in addition to having worked in journalism and media production.
Joe Carrigan is a security engineer at the Johns Hopkins University Institute of Information Security, with over 20 years of experience and knowledge in authentication systems, embedded systems, data migration, and network communication.
-
Risky Business
Founded in 2007 and hosted by journalist Patrick Gray, Risky Business includes detailed news and comments on digital security and is an indispensable summary for professionals in the field.
-
Unsupervised Learning
Launched in 1999 by information security professional and writer Daniel Miessler (ME-slur), the Unsupervised Learning website is a platform that brings together the technical knowledge of its creator, where he organizes everything he has learned and intends to learn to share with his audience.
-
The CyberWire Daily Podcast
CyberWire began in 2012, providing business-related information and technical intelligence to the CyberPoint International team and expanded its operations in the cybersecurity sector, reaching thousands of readers and listeners from various countries.
Its goal is to ensure that people can stay up-to-date on cybersecurity through news shared by analysts, experts, and writers based on technology.
Its creators understand it is necessary to inform and educate cyberspace users so that this becomes a more secure environment. Therefore, the company is committed to teaching students, executives, and other interested people on the subject, sharing good and bad news without sensationalism.
Connected with experts from different regions of the world, its professionals have access to stories, interviews, and insights they share with their audience, producing one of the best cyber podcasts.
-
THE 443 – Security Simplified
Secplicity, creator of THE 443 – Security Simplified podcast, shares knowledge about information technology and cybersecurity in a simple and accessible way. It is no wonder the channel has a name that refers to the simplification of complex concepts and solutions.
Its video and editorial content cover the latest threats related to information security and how companies should address them.
-
The CISO Minute
This is a series of podcasts from Cybercrime Radio producers and is sponsored by KnowBe4. It is an initiative of Cybersecurity Ventures, one of the world’s leading research companies on the global cyber economy and a reliable source of cybersecurity facts, figures, and statistics.
Broadcasted on Mondays in the morning, the podcast provides guidance and insights for people interested in the topic.
The CISO Minute was on ClearanceJobs’ “Best Cybersecurity Podcasts in 2019” list, an important security jobs website.
To access the podcast, simply download the app from the Apple Store or Google Play Store. You can also listen to it on Cybersecurity Ventures’ own website.
-
Into the Breach
This podcast is aimed at people who are always connected, IT professionals, and companies that deal with many customers and services, being subject to security flaws.
It is also one of the best cyber podcasts and lets you know what experts have to say about it and how to prepare for incidents.
-
Off the Hook
By listening to the Off the Hook podcast, you understand the hackers’ perspective on technology and security vulnerabilities, as well as the news shared by this community. To learn more, just follow @HackerRadioShow on Twitter or @[email protected] on Mastodon.
Are you enjoying this post? Join our Newsletter!
Newsletter Blog EN
We will send newsletters and promotional emails. By entering my data, I agree to the Privacy Policy and the Terms of Use.
About senhasegura
We, from senhasegura, are part of the MT4 Tecnologia group and aim to provide cybersecurity and digital sovereignty to our customers.
Today, we work with institutions from 54 countries, acting against data theft and tracking actions on servers, databases, network administrators, and devices in general.
With this, we can provide efficiency and productivity to organizations, as we avoid interruptions of their activities by expiration, in addition to ensuring compliance with audit criteria and standards such as PCI DSS, Sarbanes-Oxley, ISO 27001, and HIPAA.
Conclusion
In this article, you saw that:
- Cybersecurity encompasses practices used to protect computers, servers, mobile devices, data networks, and electronic systems against cyber risks;
- Understanding cybersecurity is important to prevent cyber threats by investing in strategies such as the principle of least privilege and solutions such as PAM;
- The 2021 edition of the Verizon Data Breach Report brings alarming data on cybersecurity. One of them is that 61% of the attacks surveyed are related to the use of privileged credentials;
- Social engineering is also an aspect that deserves attention according to the Verizon Data Breach Report, since malicious attackers take advantage of unsuspecting users to act;
- Moreover, cloud computing, which brought several advantages for companies during the pandemic, is another aspect that generates risks, as it increases the attack surface, facilitating the action of hackers;
- Another important evidence taken from this report is that 85% of invasions are caused by human failures, especially of administrators and developers;
- In this article, we also recommended 14 podcasts for those who want to learn more about cybersecurity, including senhasegura’s Cyber Notes Cast.
- Cyber Notes Cast is senhasegura’s article reading channel, which you can follow through Spotify or YouTube. It has weekly episodes lasting approximately 10 minutes.
Was our article helpful to you? Share it with others who would like recommendations to listen to the best cyber podcasts!