Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
Join us monthly for an interactive Cyberside Chats: Live! Our next session will be announced soon.
| Episode | Date |
|---|---|
|
We don’t break in, we badge in
|
Apr 07, 2026 |
|
Stryker Attack Analysis: Cybersecurity and insurance perspectives
|
Mar 31, 2026 |
|
Mass Exploitation 2.0: Web Platforms Under Attack
|
Mar 24, 2026 |
|
Is Anthropic a Pentagon “Supply Chain Risk”?
|
Mar 17, 2026 |
|
Google Gemini Changed the Rules: Are Your API Keys Exposed?
|
Mar 03, 2026 |
|
Opus 4.6: Changing the Pace of Software Exploitation Description
|
Feb 24, 2026 |
|
Nancy Guthrie’s Recovered Footage: The Reality of Residual Data
|
Feb 17, 2026 |
|
Ransomware Gangs Are Teaming Up
|
Feb 10, 2026 |
|
Top Threat of 2026: The AI Visibility and Control Gap
|
Feb 03, 2026 |
|
The Verizon Outage and the Cost of Concentration
|
Jan 27, 2026 |
|
Data Is Hazardous Material: How Data Brokers Telematics and Over-Collection Are Reshaping Cyber Risk
|
Jan 20, 2026 |
|
Venezuela’s Blackout: Cybercrime Domino Effect
|
Jan 13, 2026 |
|
What the Epstein Files Teach Us About Redaction and AI
|
Jan 06, 2026 |
|
Amazon's Warning: The New Reality of Initial Access
|
Dec 30, 2025 |
|
AI Broke Trust: Identity Has to Step Up in 2026
|
Dec 23, 2025 |
|
The 5 New-ish Microsoft Security Features to Roll Out in 2026
|
Dec 16, 2025 |
|
The Extension That Spied on You: Inside ShadyPanda’s 7-Year Attack
|
Dec 09, 2025 |
|
Inside Jobs: How CrowdStrike, DigitalMint & Tesla Got Burned
|
Dec 02, 2025 |
|
Made in China—Hacked Everywhere?
|
Nov 25, 2025 |
|
Holiday Hackers—The 2025 AI Fraud Boom
|
Nov 18, 2025 |
|
LOUVRE Was the Password?! Cybersecurity Lessons from the Heist
|
Nov 11, 2025 |
|
Poisoned Search: How Hackers Turn Google Results into Backdoors
|
Nov 04, 2025 |
|
The AWS Outage and Hidden Fourth-Party Risks
|
Oct 28, 2025 |
|
Ransomware in the Fast Lane: Lessons from the Jaguar Land Rover Attack
|
Oct 21, 2025 |
|
The Power of “Why” – Communicating Cybersecurity Effectively
|
Oct 14, 2025 |
|
Shutdown Fallout: The Cybersecurity Information Sharing Act Expires
|
Oct 07, 2025 |
|
Inside the Spider’s Web: What Indictments Reveal About Scattered Spider
|
Sep 30, 2025 |
|
Vibe Hacking: The Dark Side of AI Coding
|
Sep 23, 2025 |
|
The Saga Continues: More Dirt on the Salesforce–Drift Breach
|
Sep 16, 2025 |
|
Connected App, Connected Risk: The Salesforce–Drift Incident
|
Sep 09, 2025 |
|
Betrayal, Backdoors, and Payback: When Hackers Become the Hacked
|
Sep 02, 2025 |
|
Printer Problems: Trump, Putin, and a Costly Mistake
|
Aug 26, 2025 |
|
Mass Salesforce Hacks: How Criminals Are Targeting the Cloud Supply Chain
|
Aug 19, 2025 |
|
North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies
|
Aug 12, 2025 |
|
The Amazon Q AI Hack: A Wake-Up Call for Developer Tool Security
|
Aug 05, 2025 |
|
Iran’s Cyber Surge: Attacks Intensify in 2025
|
Jul 29, 2025 |
|
Leaked and Loaded: DOGE’s API Key Crisis
|
Jul 22, 2025 |
|
Holiday Horror Stories: Why Hackers Love Long Weekends
|
Jul 15, 2025 |
|
Federal Cybersecurity Rollbacks: What Got Cut—And What Still Stands
|
Jul 08, 2025 |
|
No Lock, Just Leak
|
Jul 01, 2025 |
|
The AI Insider Threat: EchoLeak and the Rise of Zero-Click Exploits
|
Jun 24, 2025 |
|
When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines
|
Jun 17, 2025 |
|
Retailgeddon Reloaded: Beyond Card Theft, Into Chaos
|
Jun 10, 2025 |
|
How Hackers Get In: Penetration Testing Secrets from the Front Line
|
Jun 03, 2025 |
|
Afterlife Access: Cybersecurity Planning for When You’re Gone
|
May 27, 2025 |
|
The LockBit Leak: When Hackers Get a Taste of Their Own Medicine
|
May 20, 2025 |
|
Network for Rent: The Criminal Market Built on Outdated Routers
|
May 13, 2025 |
|
Hacker AI: Smarter Attacks, Faster Exploits, Higher Stakes
|
May 06, 2025 |
|
Quantum Shift: How Cybersecurity Must Evolve Now
|
Apr 29, 2025 |
|
Red Alert: CISA's Budget Cuts and the Fallout for Defenders
|
Apr 22, 2025 |
|
23andMe: Breaches, Bankruptcy, and Security
|
Apr 15, 2025 |
|
"Unmasking Shadow IT: Navigating Unauthorized Communication Tools Like Signal"
|
Apr 08, 2025 |
|
The Encryption Battle: Security Savior or Cyber Risk?
|
Apr 01, 2025 |
|
Deepfakes & Voice Phishing: The New Frontier of Cybercrime
|
Mar 25, 2025 |
|
Wiretapped: How Hackers Infiltrated Global Telecom Networks
|
Mar 18, 2025 |
|
When Microsoft Goes Down: Cyber Risk & Resilience
|
Mar 11, 2025 |
|
Abandoned S3 Buckets – A Goldmine for Hackers
|
Mar 04, 2025 |
|
Ransomware Watch: Ghost, RansomHub, and the Latest Trends
|
Feb 25, 2025 |
|
Software Exploits – The Fast-Paced Threat Landscape of 2025
|
Feb 18, 2025 |
|
The OPM Security Debacle: Rogue Servers, Data Risks & What’s Next
|
Feb 11, 2025 |
|
DeepSeek or Deep Risk? The AI Power Play With China
|
Feb 04, 2025 |
|
The Silk Road, a Pardon, and the Future of Cybercrime
|
Jan 28, 2025 |
|
When the FBI Becomes Your IT Department
|
Jan 21, 2025 |
|
Cyber Trust or Bust? The New FTC Cyber Trust Mark
|
Jan 14, 2025 |
|
2025 Cybersecurity Priorities: The Top 3 Moves to Make
|
Dec 17, 2024 |