
446
Downloads
17
Episodes
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
Episodes

39 minutes ago
Quantum Shift: How Cybersecurity Must Evolve Now
39 minutes ago
39 minutes ago
Quantum computing is advancing rapidly—and with it, the potential to break today’s most widely used encryption standards. In this episode of Cyberside Chats, Sherri and Matt cut through the hype to explore the real-world cybersecurity implications of quantum technology. From the looming threat to encryption to the emerging field of post-quantum cryptography, our experts will explain what security pros and IT teams need to know now. You'll walk away with a clear understanding of the risks, timelines, and concrete steps your organization can take today to stay ahead of the curve.
Takeaways & How to Prepare for Quantum Computing:
- Map Your Crypto Use Today
Inventory where you use RSA, ECC, and digital signatures across your organization. This is the first step toward identifying high-risk systems and planning your migration strategy.
- Ask Vendors the Right Questions
Engage vendors now about their crypto agility and post-quantum readiness. Don’t wait for them to tell you—ask what they're doing to prepare and when they'll support PQC standards.
- Protect Long-Term Confidential Data
Identify and secure data that must stay private for 10+ years—think HR records, contracts, financials, and customer data. Make sure it’s encrypted using symmetric methods or stored on platforms that can adopt PQC.
- Track PQC Standards and Test Early
Keep up with NIST's progress and consider pilot testing PQC tools in non-production environments. Testing now reduces surprises later when standards are finalized.
- Start Using Hybrid Crypto Approaches
Hybrid protocols combine classical and quantum-safe algorithms. They provide an easy starting point to future-proof encryption while retaining backward compatibility.
References:
“NIST Releases First 3 Finalized Post-Quantum Encryption Standards”
“You need to prepare for post-quantum cryptography now. Here’s why”
https://www.scworld.com/resource/you-need-to-prepare-for-post-quantum-cryptography-now-heres-why
#cyptography #quantum #quantumcomputing #quantumcomputers #cybersecurity #ciso #securityawareness #cyberaware #cyberawareness

Tuesday Apr 22, 2025
Red Alert: CISA's Budget Cuts and the Fallout for Defenders
Tuesday Apr 22, 2025
Tuesday Apr 22, 2025
CISA, the U.S. government’s lead cyber defense agency, just took a major financial hit—and the fallout could affect everyone. From layoffs and ISAC cuts to a near-shutdown of the CVE program, these changes weaken critical infrastructure for cyber defense. In this episode of Cyberside Chats, we unpack what’s been cut, how it impacts proactive services like free risk assessments and scanning, and what your organization should do to stay ahead.
Takeaways:
- Don’t wait for Washington—assume support from CISA and ISACs may be slower or scaled back.
- Map your dependencies on CISA services and plan alternatives for scans, intel, and assessments.
- Budget for gaps—prepare to replace free services with commercial or internal resources.
- Subscribe to non-government threat intelligence feeds and monitor them regularly.
- Prioritize and prepare your response to zero-days and software exploits, knowing CVE and intel delays give attackers more time.
- Build local and sector connections to share threat info informally if national channels slow down.
Resources:
MITRE CVE Program - The central hub for CVE IDs, program background, and tracking published vulnerabilities.
https://www.cve.org
The CVE Foundation: https://www.thecvefoundation.org/home
LMG Security Vulnerability Scanning: https://www.lmgsecurity.com/services/testing/vulnerability-scans
#cybersecurity #cyber #CVE #riskmanagement #infosec #ciso #security

Tuesday Apr 15, 2025
23andMe: Breaches, Bankruptcy, and Security
Tuesday Apr 15, 2025
Tuesday Apr 15, 2025
When a company built on sensitive data collapses, what happens to the information it collected? In this episode of Cyberside Chats, we examine 23andMe’s data breach, its March 2025 bankruptcy, and the uncomfortable parallels with the 2009 Flyclear shutdown. What happens to biometric or genetic data when a vendor goes under? What protections failed—and what should corporate security leaders do differently?
Drawing from past and present breaches, we offer a roadmap for corporate resilience. Learn practical steps for protecting your data when your vendors can’t protect themselves.
#Cybersecurity #Databreach #23andMe #CISO #IT #ITsecurity #infosec #DFIR #Privacy #RiskManagement

Tuesday Apr 08, 2025
"Unmasking Shadow IT: Navigating Unauthorized Communication Tools Like Signal"
Tuesday Apr 08, 2025
Tuesday Apr 08, 2025
Unauthorized communication platforms—aka shadow channels—are increasingly used within enterprise and government environments, as demonstrated by the recent Signal scandal. In this week's episode of Cyberside Chats, special guest Karen Sprenger, COO at LMG Security, joins Matt Durrin to delve into the critical issue of shadow IT, focusing on recent controversies involving unauthorized communication tools like Signal and Gmail in sensitive governmental contexts. Matt and Karen discuss the risks associated with consumer-grade apps in enterprise environments, the need to balance usability and security, and how organizations can better manage their communication tools to mitigate these risks.
This episode will cover:
-
What platforms like Signal offer—and their limitations in enterprise settings.
-
Why users bypass official channels and how it leads to compliance failures.
-
Real-world implications from recent incidents, including U.S. officials using unsecured communication tools.
-
The broader shadow IT landscape and why it’s a pressing issue for security leaders.
Join us in exploring the headlines and takeaways that can help organizations avoid similar pitfalls!
#Cybersecurity #ShadowChannels #CybersideChats #UnauthorizedPlatforms #Signal #DataLeaks #Compliance #Infosec #ShadowIT #IT #Cyber #Cyberaware ETech #CISO

Tuesday Apr 01, 2025
The Encryption Battle: Security Savior or Cyber Risk?
Tuesday Apr 01, 2025
Tuesday Apr 01, 2025
Governments are pushing for encryption backdoors—but at what cost? In this episode of Cyberside Chats, we break down Apple’s fight against the UK’s demands, the global backlash, and what it means for cybersecurity professionals. Are backdoors a necessary tool for law enforcement, or do they open the floodgates for cybercriminals? Join us as we explore real-world risks, historical backdoor failures, and what IT leaders should watch for in evolving encryption policies.
Stay informed about how these developments affect corporate data privacy and the evolving landscape of cybersecurity legislation. A must-watch for anyone interested in understanding the complex interplay between technology, privacy, and government control.
#cyberthreats #encryptedcommunications #Apple #encryption #encryptionbackdoors #cybersecurity

Tuesday Mar 25, 2025
Deepfakes & Voice Phishing: The New Frontier of Cybercrime
Tuesday Mar 25, 2025
Tuesday Mar 25, 2025
AI-generated deepfakes and voice phishing attacks are rapidly evolving, tricking even the most tech-savvy professionals. In this episode of Cyberside Chats, we break down real-world cases where cybercriminals used deepfake videos, voice clones, and trusted platforms like YouTube, Google, and Apple to bypass security defenses. Learn how these scams work and what IT and security leaders can do to protect their organizations.
Takeaways:
- Educate Staff on Deep Fake & Voice Cloning Threats – Train employees to recognize red flags in AI-generated phishing attempts, including voice calls that sound slightly robotic, rushed password reset requests, and unexpected changes in vendor communications.
- Verify Before You Trust – Encourage employees to independently verify unexpected requests, even if they appear to come from trusted platforms (e.g., YouTube, Apple, Google). Use known contacts, not the contact information in the suspicious message.
- Strengthen MFA Policies – Require phishing-resistant MFA methods (e.g., FIDO2 security keys) and educate users on MFA fatigue attacks, where criminals bombard them with authentication requests to wear them down.
- Limit Publicly Available Information – Reduce exposure by minimizing executives' and employees' personal and professional information online, as attackers use this data to create convincing deepfakes and social engineering schemes.
- Monitor Trusted Platforms for Abuse – Attackers are exploiting YouTube, Google Forms, and other legitimate services to distribute phishing content. Set up alerts and regularly review security logs for unusual access attempts or fraudulent messages.
Tune in to understand the impact of digital deception and discover practical steps to safeguard against these innovative yet insidious attacks affecting individuals and businesses alike.
#Deepfakes #Phishing #SocialEngineering #CISO #Cyberattacks #VoicePhishing #Cybersecurity #VoiceCloning #CybersideChats

Tuesday Mar 18, 2025
Wiretapped: How Hackers Infiltrated Global Telecom Networks
Tuesday Mar 18, 2025
Tuesday Mar 18, 2025
Recent telecom breaches have exposed a critical security risk for businesses everywhere. Nation-state hackers and cybercriminals are stealing metadata, tracking high-profile targets, and even intercepting calls—all without breaking into corporate networks. In this episode, we analyze major telecom hacks, including the Salt Typhoon breach, and share practical strategies for IT leaders to protect their organizations from targeted attacks using telecom data.
Key Takeaways:
- Strengthen authentication for financial transactions. Don’t rely on the phone!
- Train staff to recognize spoofed calls and phishing texts that mimic trusted partners. Stay aware – assume telecom metadata can be weaponized
- Limit what employees share over calls and texts. Consider using encrypted communications, such as Signal, for any highly sensitive conversations.
- Require telecom service providers to disclose security practices and past breaches
- Have a contingency plan for telecom outages, including backup communication channels and alternative ways to verify urgent requests.
Don't forget to follow our podcast for fresh, weekly cybersecurity news!
#Cybersecurity #TelecomSecurity #SaltTyphoon #Spoofing #Metadata #Infosec #Phishing #CyberThreats #NationStateHackers #BusinessSecurity #CybersideChats #EncryptedCommunications #ITSecurity

Tuesday Mar 11, 2025
When Microsoft Goes Down: Cyber Risk & Resilience
Tuesday Mar 11, 2025
Tuesday Mar 11, 2025
The March 2025 Microsoft Outlook outage left thousands of organizations scrambling. But this wasn’t just an isolated event—recent outages from CrowdStrike, AT&T, and UK banks highlight the systemic risks businesses face. In this episode, we break down the latest Microsoft outage, discuss its impact on cyber insurance, and provide actionable steps to help organizations reduce the risk of business disruption.
Join Sherri Davidoff and Matt Durrin as they discuss the broader implications of such outages, emphasizing the importance of effective risk management, especially for organizations heavily reliant on cloud services.
Actionable Takeaways:
- Develop a Communications Plan – Ensure employees have backup communication methods for cloud service outages.
- Strengthen Vendor Risk Management – Assess dependencies on critical providers and establish alternative solutions.
- Test Business Continuity Plans (BCP) – Run outage simulations to improve response time and decision-making.
- Evaluate Cyber Insurance Coverage – Confirm policies include business interruption coverage, not just cyberattacks.
- Monitor for Early Warnings – Set up alerts for vendor status updates and cybersecurity advisories.
- Reduce Single Points of Failure – Implement multi-cloud or hybrid infrastructure to avoid total reliance on a single provider.
Links & References:
- Microsoft’s Global Outage Coverage (CNBC)
- Cyber Insurance Report – Business Interruption Trends (AM Best)
- CrowdStrike Q4 2025 Earnings Report
- UK Banking System Outage (The Times)
- World Economic Forum Cybersecurity Outlook 2025
#microsoft #microsoftoutage #cybersecurity #cyberaware #businesscontinuityplanning #businesscontinuity #cyberinsurance #LMGsecurity #CybersideChats

Looking for more cybersecurity resources?
Check out our additional resources:
Blog: https://www.LMGsecurity.com/blog/
Top Controls Reports: https://www.LMGsecurity.com/top-security-controls-reports/
Videos: www.youtube.com/@LMGsecurity