Cyberside Chats: Cybersecurity Insights from the Experts

By Chatcyberside

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Chatcyberside

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 8
Reviews: 0
Episodes: 65

Description

Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!

Join us monthly for an interactive Cyberside Chats: Live! Our next session will be announced soon.


Episode Date
We don’t break in, we badge in
Apr 07, 2026
Stryker Attack Analysis: Cybersecurity and insurance perspectives
Mar 31, 2026
Mass Exploitation 2.0: Web Platforms Under Attack
Mar 24, 2026
Is Anthropic a Pentagon “Supply Chain Risk”?
Mar 17, 2026
Google Gemini Changed the Rules: Are Your API Keys Exposed?
Mar 03, 2026
Opus 4.6: Changing the Pace of Software Exploitation Description
Feb 24, 2026
Nancy Guthrie’s Recovered Footage: The Reality of Residual Data
Feb 17, 2026
Ransomware Gangs Are Teaming Up
Feb 10, 2026
Top Threat of 2026: The AI Visibility and Control Gap
Feb 03, 2026
The Verizon Outage and the Cost of Concentration
Jan 27, 2026
Data Is Hazardous Material: How Data Brokers Telematics and Over-Collection Are Reshaping Cyber Risk
Jan 20, 2026
Venezuela’s Blackout: Cybercrime Domino Effect
Jan 13, 2026
What the Epstein Files Teach Us About Redaction and AI
Jan 06, 2026
Amazon's Warning: The New Reality of Initial Access
Dec 30, 2025
AI Broke Trust: Identity Has to Step Up in 2026
Dec 23, 2025
The 5 New-ish Microsoft Security Features to Roll Out in 2026
Dec 16, 2025
The Extension That Spied on You: Inside ShadyPanda’s 7-Year Attack
Dec 09, 2025
Inside Jobs: How CrowdStrike, DigitalMint & Tesla Got Burned
Dec 02, 2025
Made in China—Hacked Everywhere?
Nov 25, 2025
Holiday Hackers—The 2025 AI Fraud Boom
Nov 18, 2025
LOUVRE Was the Password?! Cybersecurity Lessons from the Heist
Nov 11, 2025
Poisoned Search: How Hackers Turn Google Results into Backdoors
Nov 04, 2025
The AWS Outage and Hidden Fourth-Party Risks
Oct 28, 2025
Ransomware in the Fast Lane: Lessons from the Jaguar Land Rover Attack
Oct 21, 2025
The Power of “Why” – Communicating Cybersecurity Effectively
Oct 14, 2025
Shutdown Fallout: The Cybersecurity Information Sharing Act Expires
Oct 07, 2025
Inside the Spider’s Web: What Indictments Reveal About Scattered Spider
Sep 30, 2025
Vibe Hacking: The Dark Side of AI Coding
Sep 23, 2025
The Saga Continues: More Dirt on the Salesforce–Drift Breach
Sep 16, 2025
Connected App, Connected Risk: The Salesforce–Drift Incident
Sep 09, 2025
Betrayal, Backdoors, and Payback: When Hackers Become the Hacked
Sep 02, 2025
Printer Problems: Trump, Putin, and a Costly Mistake
Aug 26, 2025
Mass Salesforce Hacks: How Criminals Are Targeting the Cloud Supply Chain
Aug 19, 2025
North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies
Aug 12, 2025
The Amazon Q AI Hack: A Wake-Up Call for Developer Tool Security
Aug 05, 2025
Iran’s Cyber Surge: Attacks Intensify in 2025
Jul 29, 2025
Leaked and Loaded: DOGE’s API Key Crisis
Jul 22, 2025
Holiday Horror Stories: Why Hackers Love Long Weekends
Jul 15, 2025
Federal Cybersecurity Rollbacks: What Got Cut—And What Still Stands
Jul 08, 2025
No Lock, Just Leak
Jul 01, 2025
The AI Insider Threat: EchoLeak and the Rise of Zero-Click Exploits
Jun 24, 2025
When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines
Jun 17, 2025
Retailgeddon Reloaded: Beyond Card Theft, Into Chaos
Jun 10, 2025
How Hackers Get In: Penetration Testing Secrets from the Front Line
Jun 03, 2025
Afterlife Access: Cybersecurity Planning for When You’re Gone
May 27, 2025
The LockBit Leak: When Hackers Get a Taste of Their Own Medicine
May 20, 2025
Network for Rent: The Criminal Market Built on Outdated Routers
May 13, 2025
Hacker AI: Smarter Attacks, Faster Exploits, Higher Stakes
May 06, 2025
Quantum Shift: How Cybersecurity Must Evolve Now
Apr 29, 2025
Red Alert: CISA's Budget Cuts and the Fallout for Defenders
Apr 22, 2025
23andMe: Breaches, Bankruptcy, and Security
Apr 15, 2025
"Unmasking Shadow IT: Navigating Unauthorized Communication Tools Like Signal"
Apr 08, 2025
The Encryption Battle: Security Savior or Cyber Risk?
Apr 01, 2025
Deepfakes & Voice Phishing: The New Frontier of Cybercrime
Mar 25, 2025
Wiretapped: How Hackers Infiltrated Global Telecom Networks
Mar 18, 2025
When Microsoft Goes Down: Cyber Risk & Resilience
Mar 11, 2025
Abandoned S3 Buckets – A Goldmine for Hackers
Mar 04, 2025
Ransomware Watch: Ghost, RansomHub, and the Latest Trends
Feb 25, 2025
Software Exploits – The Fast-Paced Threat Landscape of 2025
Feb 18, 2025
The OPM Security Debacle: Rogue Servers, Data Risks & What’s Next
Feb 11, 2025
DeepSeek or Deep Risk? The AI Power Play With China
Feb 04, 2025
The Silk Road, a Pardon, and the Future of Cybercrime
Jan 28, 2025
When the FBI Becomes Your IT Department
Jan 21, 2025
Cyber Trust or Bust? The New FTC Cyber Trust Mark
Jan 14, 2025
2025 Cybersecurity Priorities: The Top 3 Moves to Make
Dec 17, 2024