CYBRARY Podcasts

Tune in to industry leaders and cybersecurity professionals sharing their stories

We discuss a range topics from DevSecOps and Ransomware attacks to diversity and how to retain of talent. Entrepreneurs at all stages of their startup companies join us to share their stories and experience, including how to get funding, hiring the best talent, driving sales, and choosing where to base your business.

Subscribe to the Cybrary Podcast using your favorite app

Looking for a new Podcast?

Join thousands of other listeners to hear from the current leaders, experts, vendors, and instructors in the IT and Cybersecurity fields regarding DevSecOps, InfoSec, Ransomware attacks, the diversity and the retention of talent, and more. Gain the confidence, consistency, and courage to succees at work and in life.

Download our free media kit today to learn more.
Podcast image

Podcast Channels

All Episodes

Going Phishing with ChatGPT | The Cybrary Podcast Ep. 100
December 21, 2022

Going Phishing with ChatGPT | The Cybrary Podcast Ep. 100

Could an AI chatbot like ChatGPT help you co-author the next great cyberpunk novel? Or craft a phishing email and generate sock puppets - for ethical hacking research, of course! Join our security research team - incident responder Marc Balingit and adversary emulator Matt Mullins - as we wade into the fun (and sometimes ethically ambiguous) areas of AI tech in cybersecurity. Keep the conversation going as we explore how AI tools can impact productivity, learning, skill shortages, and more.

401 Access Denied Podcast Ep. 69 | Cloud Hacks with Carlos Polop
December 14, 2022

401 Access Denied Podcast Ep. 69 | Cloud Hacks with Carlos Polop

Cloud services have made it easier for users to stay connected and access resources from anywhere. But how can we reduce the security risks resulting from on-premises-to-cloud infrastructure migration? Security researcher Carlos Polop returns to the 401 Access Denied Podcast to expose the most unexpected cloud security flaws commonly leveraged by adversaries. From tackling misconfigurations to enhancing security controls, we cover top risk mitigation strategies recommended by cloud penetration testers!

Creating a Neurodiverse Cybersecurity Workforce with Melwood | The Cybrary Podcast Ep. 99
December 7, 2022

Creating a Neurodiverse Cybersecurity Workforce with Melwood | The Cybrary Podcast Ep. 99

Cybersecurity needs dynamic minds to keep up with ever-evolving threats. How can managers foster an inclusive workforce that celebrates diversity of thought? Scott Gibson, Chief Strategy Officer at Melwood, discusses how a "double empathetic" approach can help security leaders improve sourcing best practices and meet their employees where they're at. Hear more about the steps that neurodivergent people can take to build their career-ready skills and succeed in cybersecurity.

401 Access Denied Podcast Ep. 68 | Know Your Hackers' Rights with Chloé Messdaghi
November 30, 2022

401 Access Denied Podcast Ep. 68 | Know Your Hackers' Rights with Chloé Messdaghi

Ethical hackers are motivated to make society safer, but how can they ensure that they are following the law? This episode of the 401 Access Denied Podcast explores all the gray areas of vulnerability disclosure policies, copyright laws, and end-user license agreements. Learn essential hacker safety tips from our hosts, Joe Carson and Chloé Messdaghi!

Unpacking Quantum Risks with Ron Lewis of Patero | Cybrary Podcast Ep. 98
November 23, 2022

Unpacking Quantum Risks with Ron Lewis of Patero | Cybrary Podcast Ep. 98

The quantum computing revolution is a hot topic in the technology world, but how exactly does it impact cybersecurity professionals? To what extent does quantum computing pose a threat to encryption, and how long do we have to prepare for it? Ron Lewis, VP of Customer Success and Innovation at Patero, helps us find a pragmatic approach to post-quantum resiliency. In the first episode of our Quantum and Cyber podcast series with Patero, you'll learn all about how to differentiate Shor's algorithm from Grover's, navigate the cryptographic saga of Bob and Alice, and realistically quantify post-quantum risks.