1. EachPod
EachPod
The Safety Brief - Podcast

The Safety Brief

Welcome to The Safety Brief – your weekly live dive into the world of cybersecurity! Join us on Twitch, YouTube, and LinkedIn every other Thursday for expert insights, practical tips, and engaging discussions on digital defense and prevention. Follow us for updates, and stay frosty with The Safety Brief!

Technology News Tech News
Update frequency
every 8 days
Average duration
38 minutes
Episodes
66
Years Active
2023 - 2025
Share to:
Inside the Stack: The Tools That Stop Threats Before They Strike

Inside the Stack: The Tools That Stop Threats Before They Strike

Your cybersecurity stack is only as strong as its weakest link. In this episode, we’ll explore the essential tools and strategies that form a truly resilient defense, the kind that stops threats befo…

00:31:30  |   Mon 08 Sep 2025
Cloud Control: Who’s Watching Your SaaS?

Cloud Control: Who’s Watching Your SaaS?

More businesses are in the cloud than ever—but are they secure? This week, we dive into the growing risks hiding in SaaS platforms like Microsoft 365 and Google Workspace. From token theft to invisib…

00:31:32  |   Mon 08 Sep 2025
Inbox Infiltration: Stopping Cyberattacks Before They Hit Send

Inbox Infiltration: Stopping Cyberattacks Before They Hit Send

Email is still the #1 entry point for cyberattacks, and threat actors are only getting smarter. In this week’s Safety Brief, we’ll explore how modern phishing campaigns are bypassing traditional defe…

00:29:06  |   Thu 31 Jul 2025
EDR Killers: The Silent Assassins of Endpoint Security

EDR Killers: The Silent Assassins of Endpoint Security

Join us for a critical conversation with Rob Boles, Founder and CEO of BLOKWORX, as we dive deep into "EDR Killers"—the sophisticated malicious tools that are systematically dismantling endpoint secu…

00:37:16  |   Thu 10 Jul 2025
Cyber Turbulence: The Rise of Airline Attacks

Cyber Turbulence: The Rise of Airline Attacks

In this episode of the Safety Brief, we dive into the surge of cyberattacks disrupting airlines and the broader transportation sector. From Scattered Spider’s high-profile breaches to ransomware that…

00:28:17  |   Thu 03 Jul 2025
Empowering Partners Through Security-First Enablement

Empowering Partners Through Security-First Enablement

This week, we’re excited to be joined by Kelsey, our Partner Success Advocate, as we dive into how we can better support and empower our partners through a security-first approach. With the cybersecu…

00:30:22  |   Thu 19 Jun 2025
Security Budget ROI: Measuring What Didn't Happen

Security Budget ROI: Measuring What Didn't Happen

In cybersecurity, the most successful outcomes are often invisible—breaches that never occurred, ransomware that never deployed, data that wasn't stolen. This creates a fundamental challenge: how do …

00:38:35  |   Thu 22 May 2025
Eyes Everywhere: Surveillance Tech in the Modern Workplace

Eyes Everywhere: Surveillance Tech in the Modern Workplace

From screen recording software to AI productivity trackers, today’s surveillance technologies are reshaping how companies monitor their workforce. But where do we draw the line between productivity a…

00:32:08  |   Fri 09 May 2025
AI Meeting Notetakers: Silent Stalkers in Your Zoom Calls

AI Meeting Notetakers: Silent Stalkers in Your Zoom Calls

This week on The Safety Brief, we're calling out the hidden risks of AI meeting notetakers like Otter.ai and Read.ai. What seems like a helpful tool can turn into a security and privacy nightmare — s…

00:27:46  |   Fri 09 May 2025
Patchwork or Protection? Avoiding Frankenstein Security

Patchwork or Protection? Avoiding Frankenstein Security

Is your cybersecurity stack a monster of mismatched tools stitched together over time? In this episode, we’re dissecting “Frankenstein Security”—a patchwork of platforms that may look strong but leav…

00:39:17  |   Thu 17 Apr 2025
Quantum Threats: Are Today’s Defenses Ready for Tomorrow?

Quantum Threats: Are Today’s Defenses Ready for Tomorrow?

Quantum computing promises lightning-fast data processing—but it also threatens to break the encryption foundations we rely on. In this episode, we explore how cybersecurity must evolve to keep up wi…

00:29:54  |   Thu 10 Apr 2025
Silent but Deadly: The Danger of Undetected Breaches

Silent but Deadly: The Danger of Undetected Breaches

Cybercriminals aren’t always loud—they’re patient. In this episode, we uncover the terrifying reality of attacks that lurk undetected in your network for over 200 days. We’ll break down the dangers o…

00:34:06  |   Thu 03 Apr 2025
Evaluating Industry Progress – Security, Reliability, and User Experience in Focus

Evaluating Industry Progress – Security, Reliability, and User Experience in Focus

Join us for an insightful discussion on the evolution of security measures, the ongoing challenges of system reliability, and how these impact the end-user experience. Our team will dive into the big…

00:45:09  |   Thu 13 Mar 2025
Cloud Chaos: Cybersecurity Strategies for Surviving Service Outages

Cloud Chaos: Cybersecurity Strategies for Surviving Service Outages

Cloud outages are more than just downtime—they can expose critical security risks and disrupt business operations. In this episode, we dive into why cloud failures are becoming a growing concern, the…

00:28:33  |   Thu 06 Mar 2025
The Digital Moat: Why Firewalls Are Still Essential in 2025

The Digital Moat: Why Firewalls Are Still Essential in 2025

Are firewalls still relevant in modern cybersecurity? Absolutely! In this Safety Brief, we break down: ✅ What firewalls do & why they’re essential 🔥 ✅ Traditional vs. Next-Gen Firewalls (NGFWs) 🔄 ✅ C…

00:33:00  |   Thu 27 Feb 2025
Cyber Hygiene – The Security Practices Your Business Can’t Ignore in 2025

Cyber Hygiene – The Security Practices Your Business Can’t Ignore in 2025

🔐 88% of breaches happen due to human error.

🔑 61% of breaches involve weak or stolen passwords.

⚙️ 25% of security teams will rely on AI-driven automation to improve security by 2026.

Yet, many busin…

00:30:55  |   Thu 13 Feb 2025
Into the Deep: Exposing the Risks of Deep Seek

Into the Deep: Exposing the Risks of Deep Seek

Join us as we dive Into the Deep to uncover the alarming security risks of Deep Seek. Recent reports reveal critical vulnerabilities, from data privacy gaps to potential misuse for disinformation and…

00:32:21  |   Thu 06 Feb 2025
TikTok Ban and Data Privacy: Lessons from the Rise of Rednote

TikTok Ban and Data Privacy: Lessons from the Rise of Rednote

Join us this Thursday, January 30th, at 2 PM ET for an insightful Safety Brief on "TikTok Ban and Data Privacy: Lessons from the Rise of Rednote." We’ll dive into the data privacy concerns that spark…

00:42:58  |   Thu 30 Jan 2025
Data Breach Survival Guide: What Happens Next?

Data Breach Survival Guide: What Happens Next?

Join us as we break down the critical steps businesses should take after a data breach. From containment and impact assessment to customer notifications and recovery planning, this will equip you wit…

00:44:30  |   Thu 23 Jan 2025
Protection Perfected: The Managed Security Advantage

Protection Perfected: The Managed Security Advantage

Join us for an engaging live stream as we break down the critical differences between in-house IT teams, MSPs, and MSSPs. Learn how MSSPs like BLOKWORX provide expert defense against advanced threats…

00:44:05  |   Thu 16 Jan 2025
Disclaimer: The podcast and artwork embedded on this page are the property of BLOKWORX LLC. This content is not affiliated with or endorsed by eachpod.com.