mnemonic security podcast

By mnemonic

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by mnemonic

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 0
Reviews: 0
Episodes: 151

Description

The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.


Episode Date
Present and Future of MDR
Dec 01, 2025
Agentic Browsers
Nov 24, 2025
Dark Web Roast
Nov 10, 2025
The Quiet Conflict
Oct 27, 2025
Prompt Engineering
Oct 06, 2025
State of the Union: Agentic AI
Sep 29, 2025
Autonomous cyberattacks
Sep 15, 2025
Pig Butchering
Sep 01, 2025
The Economy for Phish
Aug 18, 2025
Agentic
Aug 04, 2025
Proofing for Quantum
Jun 18, 2025
Magic Cat (Part 1)
Jun 02, 2025
Magic Cat (Part 2)
Jun 02, 2025
Negotiation
May 19, 2025
Personal Leadership
May 05, 2025
LLMs in Security Products
Apr 21, 2025
Storebrand Success Story (Part 2)
Apr 01, 2025
Policy as Code (Part 1)
Mar 31, 2025
Exposure Management
Mar 17, 2025
AV and IoT
Mar 03, 2025
FINN.no
Feb 17, 2025
n-days
Feb 03, 2025
CTFs
Jan 20, 2025
Reverse Engineering
Jan 06, 2025
Risk Hunting
Dec 16, 2024
CNAPP
Dec 02, 2024
Deviation Detection
Nov 18, 2024
Infostealers
Nov 04, 2024
Prioritisation & Decision Making in Critical Infrastructure Defence
Oct 14, 2024
KraftCERT Threat Assessment 2024
Sep 30, 2024
Risk Forecast: Windy
Sep 16, 2024
Email and Human Centric Security
Sep 09, 2024
Episode 100*!
Aug 26, 2024
Follow the Crypto
Aug 19, 2024
Black Teaming
Aug 05, 2024
ML Engineers these days
Jul 01, 2024
Isolate first, Triage second, and the tools to help you do it.
Jun 17, 2024
Guidance for High-Risk Individuals
Jun 03, 2024
Models Always Lie
Apr 15, 2024
Data Brokers and Removal Services
Mar 25, 2024
The Risk Business
Mar 11, 2024
Ethical Social Engineering
Feb 26, 2024
A student/mentor’s perspective on AI
Feb 12, 2024
When Ransomware Hits the Ranch
Jan 29, 2024
Conflictual coexistence
Jan 15, 2024
From Russia with Ransomware
Dec 18, 2023
Metaverses
Dec 04, 2023
Defending Cyber Space (EVE Online)
Nov 20, 2023
Digging into State Directed Cyber
Nov 06, 2023
Cryptology
Oct 25, 2023
Physical Penetration Testing / Red Teaming
Oct 09, 2023
Securing AI Models
Sep 25, 2023
Supply Chain Attacks
Sep 11, 2023
Experience Sharing - Bug Bounty Programs
Aug 28, 2023
Influencing the board
Aug 14, 2023
KraftCERT
Jul 10, 2023
Managing stress in cybersecurity (ISACA series)
Jul 03, 2023
Asset Intelligence
Jun 26, 2023
Unit 42
Jun 12, 2023
Crypto Finance
May 22, 2023
Office IoT
May 08, 2023
Passwords and their managers
Apr 17, 2023
Darkwebs
Apr 03, 2023
Security Engineering - IAM
Mar 20, 2023
Bots
Mar 06, 2023
House of Pain (ISACA series)
Feb 28, 2023
We are Defending (ISACA series)
Feb 28, 2023
Insider threats to ransomware groups
Feb 20, 2023
Network detection and response (NDR): the value of evidence
Feb 06, 2023
ICS in the Cloud
Jan 23, 2023
Enterprise Security Architecture
Jan 09, 2023
Azure / Office365: monitoring & hardening
Dec 19, 2022
Keeping the lights on
Dec 05, 2022
Smartphones
Nov 15, 2022
More Drones
Oct 24, 2022
Drones
Oct 19, 2022
Application Programming Interfaces
Oct 10, 2022
Industrial Security Conference
Sep 26, 2022
LinkedIn
Sep 12, 2022
Nordic Choice
Aug 22, 2022
TIBER
Aug 08, 2022
Security Leadership Essentials for Managers
Jul 11, 2022
Zero Trust vs. Castle and Moat
Jun 27, 2022
Security of Things
Jun 13, 2022
The ransomware dilemma
May 30, 2022
Encrypted traffic management
May 09, 2022
Conti leaks - The inside of the dark side
Apr 25, 2022
The Science of SOAR
Apr 11, 2022
Control Validation & Cyber Insurance
Mar 28, 2022
Special Edition: SOCCRATES
Mar 14, 2022
Space Norway
Mar 07, 2022
Deception technology
Feb 21, 2022
Collecting and sharing threat intelligence
Feb 07, 2022
Innsiderisiko
Jan 25, 2022
Does your managed SOC suck?
Jan 10, 2022
Project 2030
Jan 03, 2022
CMMC
Dec 27, 2021
Mergers & Acquisitions
Dec 20, 2021
Initial Access Brokers
Dec 06, 2021
Communicating threat intelligence to management
Nov 29, 2021
Buying security products
Nov 15, 2021
The state of cyber insurance in 2021
Sep 20, 2021
Can threat intelligence be automated?
Aug 30, 2021
Is honesty the best policy in incident response?
Aug 09, 2021
Threat hunting
Jul 12, 2021
Chat with a CFO
Jun 21, 2021
Stress and security
May 31, 2021
Internet of Things
May 10, 2021
Honeypots
Apr 26, 2021
The World of Open Source
Apr 12, 2021
The future of privacy | Privacy miniseries
Mar 29, 2021
Business Email Compromise
Mar 15, 2021
Cyber espionage | Privacy miniseries
Mar 01, 2021
Your phone is spying on you | Privacy miniseries
Feb 15, 2021
DNS security with Quad9
Feb 02, 2021
Nuclear Cyber Security | OT miniseries
Jan 18, 2021
IT Security Is From Mars, Software Security Is From Venus
Jan 04, 2021
Technology isn't the problem | OT miniseries
Dec 21, 2020
SIEM is DEAD?
Dec 07, 2020
Security Assurance
Nov 23, 2020
When security hits the fan
Nov 16, 2020
Financial Cyber Crime
Nov 09, 2020
Feature velocity > software security?
Oct 26, 2020
Forensic Readiness | OT miniseries
Oct 12, 2020
Misconceptions of Threat Intelligence
Oct 05, 2020
OODA Loops with Open Source
Sep 21, 2020
Security Validation
Sep 07, 2020
A shared responsibility
Aug 31, 2020
Data science and security visibility
Aug 17, 2020
KPIs vs. Empowerment
Aug 03, 2020
A chat with KraftCERT | OT miniseries
Jul 20, 2020
Why should we care about PAM?
Jul 06, 2020
You can't protect what you don't know you have | OT miniseries
Jun 22, 2020
Turning users from targets to defenders
Jun 08, 2020
OT's role in a CISO's world | OT miniseries
May 25, 2020
Microservices, in theory and practice
May 11, 2020
To SOAR, or not to SOAR? (Part 2)
Apr 28, 2020
To SOAR, or not to SOAR? (Part 1)
Apr 21, 2020
Securing healthcare data while studying COVID-19
Apr 15, 2020
IAM these days
Apr 06, 2020
Bug Bounties and Unicorns
Mar 23, 2020
Hack my (hard-coded) heart
Mar 09, 2020
Super CISO! With 300 brands to secure
Feb 24, 2020
Securing our financial future
Feb 10, 2020
Out of Control
Feb 03, 2020
Cyber Insurance for Y2K
Jan 27, 2020
Pentesting these days - Crowdsourcing
Jan 08, 2020
Special Edition: Under the hood of Argus
Jan 08, 2020
Cloud security with an Angel
Jan 08, 2020
Boss of the SOC
Jan 08, 2020
Sharing is caring - Threat Intelligence with ACT
Jan 08, 2020