The CyberWire Daily Podcast is our look at what's happening in cyberspace. It provides a clear and concise summary of the news and offers commentary from industry experts as well as our Academic and Research Partners. We publish each weekday afternoon (in time for US East Coast drive-time.)

You can subscribe to the CyberWire podcast RSS feed here and it's also available on iTunes.

The CyberWire podcasts are made possible by the generous support of our sponsors. For information on supporting the CyberWire or becoming a partner, please fill out the Contact Us form.

Subscribe to RSS
Available on iTunes
Listen to Stitcher
Google Play Music

The CyberWire Daily Podcast for 02.02.17

Criminals recruit insiders, and the black market trades insider information. Cisco studies the costs and causes of data breaches. The Internet serves as an R&D resource for threat actors. Russo-American tensions in cyberspace recapitulate Cold War themes.

In today's podcast, we hear about how criminals are recruiting company insiders, and how the black market trades insider information for illicit speculation. Cisco studies the costs and causes of data breaches, and the security industry offers reactions. Jonathan Katz from the University of Maryland describes searchable encryption. Vadim Vladimirskiy from Nerdio explains IT as a Service. The Internet seems to serve, again, as an R&D resource for threat actors. This time it's ISIS and commercial drones, but there's a lot out there for sale and trade. 

Palo Alto Networks Logo

Palo Alto Networks

Palo Alto Networks, a next-generation security company, maintains trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, customers can confidently pursue a digital-first strategy and embark on new technology initiatives. Learn more at
CyberArk Logo


CyberArk delivers the industry’s most comprehensive Privileged Account Security Solution – designed equally for on-premise, hybrid cloud, and OT/SCADA environments. It secures privilege from the endpoint to the cloud. Learn more at