Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork
 
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
  continue reading
 
Artwork

1
Click Here

Recorded Future News

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
Artwork

1
NatSec Matters

Beacon Global Strategies LLC

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Formerly known as Intelligence Matters, the NatSec Matters podcast features former senior national security officials Michael Allen, Jeremy Bash, and Andrew Shapiro as they interview top leaders in national security, including intelligence officers, military leaders, and policymakers, on the most critical security challenges of our time. Their interviews offer insights into the world’s most pressing problems and assess the effectiveness of U.S. policy responses. They also explore the biograp ...
  continue reading
 
Artwork
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
Unsubscribe
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
  continue reading
 
True Spies takes you inside the world's greatest espionage and detective operations. Our hosts Hayley Atwell, Vanessa Kirby, Sophia Di Martino, Daisy Ridley and Rhiannon Neads talk to the real spies behind the missions. What do they know? What are their skills? And what would you do in their position? We explore and investigate real life thrillers, mysteries and crimes - stories that prove truth is stranger than fiction! These stories cover lies, murder, theft, sex, drugs and rock ‘n roll. Y ...
  continue reading
 
Artwork

1
SpyTalk

SpyTalk, Jeff Stein

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
  continue reading
 
Artwork

1
Unspoken Security

Unspoken Security

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Covert Operations and National Security

Circle Of Insight Productions

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to covert actions and national security podcast. Welcome to covert and national security podcast. A podcast where we discuss a spectrum of activities concerning covert operations, intelligence, counterintelligence, unconventional warfare, assassination issues, espionage spy craft technology and more. Enter the operational world with Dr. Carlos
  continue reading
 
Artwork

1
EverydaySpy Podcast

Andrew Bustamante

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
  continue reading
 
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
  continue reading
 
Artwork

1
Unconventional Knowledge

Geopolitical Intelligence Services

icon
Unsubscribe
icon
Unsubscribe
Daily
 
"Unconventional Knowledge" is a podcast dedicated to providing in-depth analysis of critical global issues. Each episode features top-level insiders from various fields, offering insights into complex geopolitical, economic and security topics that shape the international landscape. Hosted by Geopolitical Intelligence Services, the podcast moves beyond surface-level reporting, delving into the underlying trends and factors influencing current events.
  continue reading
 
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
The Open at Intel podcast is about all things open source, from software to security to artificial intelligence to Linux and beyond. Each episode brings you fresh perspectives with sophisticated, leading-edge, free-ranging conversations from some of the best minds in the open source community.
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Artwork
 
Welcome to AI News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about machine learning, robotics, automation, natural language processing, AI ethics, and more. Whether you're a tech enthusiast, AI researcher, or simply curious about the future of technology, this podcast is your go-to source for AI news. T ...
  continue reading
 
Security Unlocked presents The BlueHat Podcast From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions. Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and crea ...
  continue reading
 
Artwork

1
At The Boundary

Global and National Security Institute

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
  continue reading
 
Artwork
 
Security Signal uncovers the signal from the noise for cybersecurity leaders, and helps them focus on important trends, threats and opportunities. Each episode translates cybersecurity complexities into actionable intelligence for executives at the helm. Security Signal helps leaders turn resilience into a competitive advantage. Follow us @CloudflareTV Explore our content hub for exclusive C-level conversations at cloudflare.tv/executive Read the full 2025 Cloudflare Security Signals report ...
  continue reading
 
Artwork

101
Technology and Security

Dr Miah Hammond-Errey

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
  continue reading
 
Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI). Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers.
  continue reading
 
Artwork

1
World in 10

The Times

icon
Unsubscribe
icon
Unsubscribe
Daily
 
Daily analysis of the biggest global security developments, brought to you by military specialists and The Times' renowned foreign correspondents. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Artwork

1
Security Tech Talk

Steve Kenny, Axis Communications

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
  continue reading
 
Artwork

1
Entangled Things

Entangled Things

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork
 
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
  continue reading
 
New technologies like artificial intelligence, facial recognition and social media algorithms are changing our world so fast that it can be hard to keep up. This cutting-edge tech often inspires overblown hype — and fear. That’s where we come in. Each week, CNN Tech Writer Clare Duffy will break down how these technologies work and what they’ll mean for your life in terms that don’t require an engineering degree to understand. And we’ll empower you to start experimenting with these tools, wi ...
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Loading …
show series
 
Send us a text ✍️ Short Podcast Summary: In this gripping episode of The Security Circle, former British intelligence officer Gavin Stone lifts the veil on the murky world of corporate espionage. From railgun leaks in Korea to bugs in boardrooms, Gavin shares shocking real-world tactics used to infiltrate companies, manipulate insiders, and extract…
  continue reading
 
This episode of the Ontic Connected Intelligence Podcast continues to honor Mental Health Awareness Month with a compelling conversation about mental health in the corporate security field. Hosted by Manish Mehta, this episode features John Rodriguez, founder of Empathic Security Cultures LLC, and Allison Macalik, Director of Solutions at Ontic. To…
  continue reading
 
What the status of Encrypted Client Hello (ECH)? What radio technology would be best for remote inverter shutdown? Some DNS providers already block newly listed domains. Knowing when not to click a link can take true understanding. Why can losing a small portion of a power grid bring the rest down? Where are we in the "AI Hype Cycle" and is this th…
  continue reading
 
For today's episode, Lawfare Senior Editor and General Counsel Scott R. Anderson sat down with three leading legal experts on domestic military deployments: William Banks of Syracuse University College of Law, Laura Dickinson of the George Washington University Law School, and Chris Mirasola of the University of Houston Law Center. They discussed t…
  continue reading
 
(0:10): Apple Sets 2026 for Major Siri AI Upgrade Amidst Previous Delays (2:08): Oracle and Seekr Partner to Revolutionize AI with Powerful New GPU Cluster (4:41): Tesla Sues Ex-Engineer for Trade Secrets Theft in Humanoid Robot Rivalry (6:35): Meta AI's Discovery Feed Sparks Privacy Fears as Personal Chats Go Public (8:38): Adobe Reports Record Q2…
  continue reading
 
Zoom was built for speed. But in its rush to connect us, it may have left a few doors open. This week, a cybersecurity expert walks us through how one of Zoom’s most mundane features became a hacker’s best friend—and why the weakest link in crypto isn’t the blockchain… it’s the person who thinks they’re too smart to get scammed. Learn about your ad…
  continue reading
 
Dr. Rudolf G. Adam argues that Russia is unwavering in its aims, and the world should take President Putin at his word. Read the report here. 📚 Explore all GIS Reports 📝 Read the weekly comments from Prince Michael of Liechtenstein 🔔 Stay updated on the latest reports and analysis: LinkedIn & X 📬 Sign up for our weekly newsletter or subscribe direc…
  continue reading
 
Send us a text Jason Haddix, CEO of Arcanum Information Security, joins the MLSecOps Podcast to share his methods for assessing and defending AI systems. Full transcript, video, and links to episode resources available at https://mlsecops.com/podcast/holistic-ai-pentesting-playbook. Thanks for checking out the MLSecOps Podcast! Get involved with th…
  continue reading
 
Today, it’s Episode Seven of Escalation, our latest narrative series co-hosted by Lawfare Managing Editor Tyler McBrien and Ukraine Fellow Anastasiia Lapatina. Throughout the show, Nastya and Tyler trace the history of U.S.-Ukrainian relations from the time of Ukrainian independence through the present. You can listen to Escalation in its entirety,…
  continue reading
 
In this episode of Unspoken Security, host AJ Nash sits down with Jennifer Leggio, Chief Strategy Officer of W2 Communications, to discuss the unspoken challenges impacting career fulfillment. Jennifer shares her personal experiences with toxic work environments, imposter syndrome, and the struggle to balance ego and self-awareness. She highlights …
  continue reading
 
A Trump defence official says the US will review the AUKUS deal to see whether it fits the ‘America First’ agenda. That Biden-era agreement will see the UK and Australia develop new nuclear submarines with the US, while Washington will sell five current models to Australia. Ship-building specialist Trevor Taylor explains why officials in London and…
  continue reading
 
The traditional corporate perimeter, once a simple fortress, is no longer a reliable defense. With vulnerabilities changing rapidly in a world of cloud computing and remote work, relying on outdated security models is no longer a viable strategy. This massive shift demands a new approach centered on identity, leaving many organizations wondering ho…
  continue reading
 
All links and images can be found on CISO Series. Check out this post by Justin Pagano at Klaviyo for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Jesse Webb, CISO and svp information systems, Avalon Healthcare Solutions. In th…
  continue reading
 
(0:10): Databricks Unveils Agent Bricks: Revolutionizing AI with Custom Agents and No-Code Solutions (2:03): Google Appoints New AI Chief, Plans $75B Investment Amidst Fierce Competition (4:07): DeepL Unveils Europe's First DGX SuperPOD, Revolutionizing Language AI with 30x Faster Translations (6:20): The Browser Company Unveils Dia: A New AI-Power…
  continue reading
 
Lawfare Contributing Editor Renée DiResta sits down with Clay Risen to talk about his book “Red Scare: Blacklists, McCarthyism, and the Making of Modern America,” exploring the historical context of McCarthyism and its relevance to contemporary issues. They discuss the dynamics of accusation versus evidence during the Red Scare, the impact of vigil…
  continue reading
 
Today’s guest is Tim Burge, Director at Aquant. Aquant is an AI platform built for service teams that maintain and repair complex equipment. It gives clear, accurate answers to service questions — from basic fixes to deep diagnostics — so field techs, call centers, managers, and customers can get to solutions faster. Used by top manufacturers like …
  continue reading
 
Stefan Hedlund examines how the Maastricht Treaty reshaped Europe, but its centralizing ambitions undermined economic growth and triggered crises that continue today. Read the report here. 📚 Explore all GIS Reports 📝 Read the weekly comments from Prince Michael of Liechtenstein 🔔 Stay updated on the latest reports and analysis: LinkedIn & X 📬 Sign …
  continue reading
 
In this episode of the ‘AI in Business’ podcast, Principal Group Product Manager Will Guyman of Microsoft and Senior Director Lyndi Wu of NVIDIA explore how healthcare providers are deploying AI at scale to drive clinical and operational transformation. With host Matthew DeMello, they discuss the combined power of NVIDIA’s GPU acceleration and Micr…
  continue reading
 
Every organization is built on people, structures, and culture. But culture isn’t static—it evolves with every interaction, ambition, and shift in circumstance. As IT drives business transformation, new technologies reshape how people connect and collaborate. In this ever-changing landscape, a strong, adaptive culture is the key to lasting success.…
  continue reading
 
Why is the Indo-Pacific of importance to Canada? Will it have a more consistent presence in the region in the future? How is Canada adapting its defence capabilities to meet the demands of a rapidly changing geopolitical and technological landscape? What lessons has Canada drawn from the war in Ukraine, and how are these shaping the future of its a…
  continue reading
 
Why is it important to separate your identity from your experience after you’ve been scammed? In this episode, Tamara Michèle sits down with Deb Andrew a Life and Wellness Coach and co-founder of Altruistic Coach. They explore how emotional recovery, mindset shifts, and self-compassion are essential tools in rebuilding confidence and staying resili…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Alex and John as they discuss: The Enduring Legacy of Black Basta Qilin's Exploitation of Fortinet Flaws Vishing for Salesforce Data Atomic Stealer x ClickFix Campaign Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Resear…
  continue reading
 
This week, Scott sat down with Lawfare Senior Editors Molly Reynolds and Quinta Jurecic, and Contributing Editor Chris Mirasola, to focus on the week’s big domestic news, including: “Drama Majors, Meet Major Drama.” In the glittering city of Los Angeles, the Trump administration has taken the dramatic step of calling up the California National Guar…
  continue reading
 
French officials have played down speculation that President Emmanuel Macron will recognise a Palestinian state imminently. But he is co-chairing a summit in New York with Saudi Arabia, to discuss the future for Palestinians and a two-state solution to the conflict in Gaza. Former French ambassador Michel Duclos thinks France has to follow through …
  continue reading
 
Send us a text 🎙️ Podcast Summary: In this dynamic episode, Yolanda welcomes fellow podcast host and security entrepreneur Mark Ledlow, founder of Fearless Mindset and CEO of Ledlow Security Group. From humble beginnings in the Marine Corps to leading a thriving executive protection firm, Mark shares his unfiltered journey into the world of securit…
  continue reading
 
Christina Knight, Machine Learning Safety and Evals Lead at Scale AI and former senior policy adviser at the U.S. AI Safety Institute (AISI), joins Kevin Frazier, the AI Innovation and Law Fellow at Texas and a Senior Editor at Lawfare, to break down what it means to test and evaluate frontier AI models as well as the status of international effort…
  continue reading
 
In this episode of NatSec Matters, we revisit Michael Allen's conversation with General (Ret.) Kenneth 'Frank' McKenzie, Jr., former commander of U.S. Central Command, about the evolving security challenges in the Middle East. They discuss Iran’s vulnerabilities, the impact of Israel’s military actions, and the strategic fallout from the assassinat…
  continue reading
 
(0:10): Global ChatGPT Outage: AI Industry Faces Reliability Test Amid Growing Dependence (2:01): OpenAI and Google Cloud Forge Unlikely Alliance to Boost AI Computing Power Amid Competition (4:15): Android 16 Launches on Pixel: Live Updates, AI Security, and Enhanced Camera Features Unveiled (6:10): Cisco Unveils Secure AI Network Architecture, Su…
  continue reading
 
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumar’s dynamic keynote from BlueHat India 2025, where he explores the evolving threat landscape of AI through the lens of the Microsoft AI Red Team. From adversarial machine learning to psychosocial harms and persuasive AI, Ram highlights real-world…
  continue reading
 
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumar’s dynamic keynote from BlueHat India 2025, where he explores the evolving threat landscape of AI through the lens of the Microsoft AI Red Team. From adversarial machine learning to psychosocial harms and persuasive AI, Ram highlights real-world…
  continue reading
 
Enterprise leaders are no longer asking if they should adopt AI — the question is how to do it effectively. In this episode, Emerj Editorial Director Matthew DeMello speaks with James Raybould, SVP and GM of Turing Intelligence at Turing, about what distinguishes successful enterprise AI deployments from stalled pilots. Turing is one of the world’s…
  continue reading
 
Join Fred Burton as he sits down with retired FBI special agent Scott Payne to explore his 28-year career, including daring undercover missions within extremist groups and insights into modern-day radicalization. Scott shares gripping stories from his book, Codename Pale Horse, offering an up-close look at how extremist tactics have evolved and the…
  continue reading
 
In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0…
  continue reading
 
In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0…
  continue reading
 
On a clear September morning, the American homeland was shattered, revealing a vulnerability unforeseen for nearly two centuries. But, how did Osama bin Laden, soon to become the world's most wanted terrorist, orchestrate the largest mass murder in American history? What was the "chatter" among Al Qaeda members that something was imminent, and why …
  continue reading
 
Today, it’s Episode Six of Escalation, our latest narrative series co-hosted by Lawfare Managing Editor Tyler McBrien and Ukraine Fellow Anastasiia Lapatina. Throughout the show, Nastya and Tyler trace the history of U.S.-Ukrainian relations from the time of Ukrainian independence through the present. You can listen to Escalation in its entirety, a…
  continue reading
 
Dr Miah Hammond-Errey is joined by Dr Johnny Ryan, Director of Enforce at the Irish Council for Civil Liberties and a leading authority on surveillance, data rights, and privacy. Drawing on his extensive experience in the ad tech industry and digital rights advocacy, Dr Ryan explains how real-time bidding (RTB)—the backbone of online advertising—ro…
  continue reading
 
Germany’s intelligence chief has warned that Russia could test NATO’s resolve. Bruno Kahl thinks Vladimir Putin would do this by placing ‘little green men’ - in other words, plain-clothes soldiers - in Estonia like he did when he annexed Crimea in 2014. Emily Ferris, a Russia specialist from the RUSI think tank in London, examines how likely this i…
  continue reading
 
(0:10): UK FCA and Nvidia Unveil AI Sandbox to Boost Innovation and Competitiveness (2:22): Google CEO: AI to Boost Creativity, Not Replace Jobs; Plans to Hire More Engineers (4:43): Qualcomm to Acquire Alphawave for $2.4B, Strengthening AI Chip Arsenal (6:54): UK PM Unveils 'Extract': AI Tool to Revolutionize Housing Plans with Google Collaboratio…
  continue reading
 
➡️ Join the community of geopolitics enthusiasts and gain access to exclusive content on PATREON: https://www.patreon.com/DecodingGeopolitics➡️ Sign up to my free geopolitics newsletter: https://stationzero.substack.com/Thank you Conducttr for sponsoring the podcast. Take a look at Conducttr's services and its crisis exercise software at: https://w…
  continue reading
 
Lawfare Contributing Editor Renée DiResta sits down with Daphne Keller, Director of the Program on Platform Regulation at Stanford University's Cyber Policy Center; Dean Jackson, Contributing Editor at Tech Policy Press and fellow at American University's Center for Security, Innovation, and New Technology; and Joan Barata, Senior Legal Fellow at T…
  continue reading
 
Explore the Trump administration's controversial restructuring of the US AI Safety Institute, OpenAI's efforts to combat malicious AI use, and Qualcomm's strategic move to acquire UK-based Alphawave IP Group. Dive into the changing landscape of AI policy, security, and industry developments. Sources: https://techstory.in/safety-removed-from-ai-safe…
  continue reading
 
From smartwatches to rings, the market for wearable health trackers has exploded in recent years. There are also apps to track your sleep, your exercise, your food intake and more. Can this tracking technology really lead us to make healthier choices? Dr. Leana Wen, an emergency physician and CNN's health and wellness expert, weighs in. Learn more …
  continue reading
 
In late 2001, veteran CIA Officer Duane Evans deployed to Afghanistan as part of the US response to 9/11. This is his story. In Part 2, Duane and Team Foxtrot make the perilous journey to Kandahar. But the Afghan city proves to be no safe haven. From SPYSCAPE, the home of secrets. A Cup And Nuzzle production. Series producer: Joe Foley. Produced by…
  continue reading
 
Jake Gallen was a rising star in crypto. Then, after what seemed like a routine YouTube interview, his digital world unraveled. His NFTs? Liquidated. His social accounts? Hijacked. It turns out, the hackers didn’t need phishing links or fake job offers. They needed something much simpler: a Zoom invite. Learn about your ad choices: dovetail.prx.org…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play