Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Digital Security Podcasts
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Great security solution are designed from the ground up.. Secured by Design is a podcast where Santosh shares practical insights, frameworks, and perspectives on identity security and other aspects of cybersecurity. Each episode breaks down complex concepts into actionable ideas for professionals protecting digital identities, designing secure systems, and leading security initiatives. Because true security is built and not bolted on...
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Become a Paid Subscriber: https://podcasters.spotify.com/pod/show/siliconcurtain/subscribe A podcast about propaganda, digital disinformation, politics, corruption, hybrid warfare, weaponised conspiracy theories, social echo chambers and digital dystopias. 1984, Authoritarian, Autocracy, Autocrat, Big Brother, Brainwashing, Cold war, Cold war propaganda, Communism, Conflict, Conspiracy theories, Control, Cults, Cyber warfare, Deception, Dictator, Dictatorship, Digital dystopia, Digital media ...
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The MERICS China Podcast, brought to you by the Mercator Institute for China Studies, a show that analyses current affairs in China and the latest developments in EU-China relations.
…
continue reading
Star Link emphasizes in providing corporate organizations with all types of biometric attendance system & access control system and all most all types of softwares to speed up HRs, Admin & Top Most Management with smooth an effective workflow.
…
continue reading
In conversation with leaders and experts, McKinsey's At the Edge podcast demystifies cutting-edge technologies and shares strategies on how companies can capture big opportunities.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Our award-winning podcast gives you practical advice from experts on systems, communications, content and design. Whether you’re using digital signage, or just considering it, we help you communicate better.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
801
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
The Power of Digital Policy is a podcast that teaches you and your organization how to balance the risks and opportunities that come with operating websites, social media, mobile applications, voice assistants, AI and other channels. Through a monthly focus on individual topics, such as accessibility, cookies, copyrights, social media faux pas, data breaches, and data privacy, you will learn how to develop guardrails to maximize digital opportunity and minimize risk. Whether you work for a s ...
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Stay up to date with the Nextcloud community!
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Welcome to the Ctrl-Alt-Secure podcast, your guide to navigating the ever-changing landscape of cybersecurity. Join us as we delve into the latest trends, threats, and innovations shaping the infosec space.
…
continue reading
Digital certificate industry veterans Tim Callan and Jason Soroko explore the issues surrounding digital identity, PKI, and cryptographic connections in today's dynamic and evolving computing world. Best practices in digital certificates are continually under pressure from technology trends, new laws and regulations, cryptographic advances, and the evolution of our computing architectures to be more virtual, agile, ubiquitous, and cloud-based. Jason and Tim (and the occasional guest subject ...
…
continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Welcome to a podcast that dives deep into the fascinating crossroads of data, AI, privacy, and cybersecurity. Hosted by data and AI expert Kate Carruthers, this series explores the cutting-edge frontiers of our digital world, where data is forging an entirely new economy. Tune in to stay ahead of the curve and uncover the opportunities, challenges, and innovations shaping our future.
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what's new and what's next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
Dr. Darren Pulsipher, Chief Enterprise Architect for Public Sector, author and professor, investigates effective change leveraging people, process, and technology. Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution. People Workers are at the heart of many of today’s biggest digital transformation projects. Lea ...
…
continue reading
51
Anonymous and the Hydra: The Digital Vigilantes Fighting Child Exploitation—Methods, Morality, and 250 FBI Probes
16:51
16:51
Play later
Play later
Lists
Like
Liked
16:51An overview of #OpChildSafety, an ongoing hacktivist operation founded by the decentralized collective Anonymous, which focuses on digital vigilantism to protect minors from online child exploitation. This dedicated effort emerged as part of Anonymous' broader campaigns, gaining prominence between 2018 and 2024, motivated in part by perceived limit…
…
continue reading
In today’s competitive world, profitability isn’t just about higher sales or cutting costs — it’s about operational intelligence. When inefficiencies slowly erode productivity, technology becomes the most powerful lever of profit.By Biometric Attendance & Access Control Solution
…
continue reading
1
Human behaviour, digital twins and resilient cybersecurity with Prof Ganna Pogrebna
42:54
42:54
Play later
Play later
Lists
Like
Liked
42:54In this episode of the Technology & Security podcast, host Dr. Miah Hammond-Errey is joined by Professor Ganna Pogrebna. They explore the intersections of behavioural data science, AI, cybersecurity, and technology adoption. The discussion covers urban-rural technology divides and the dilemmas faced by small businesses using "off the shelf" AI tool…
…
continue reading
1
Microsoft Digital Defense Report 2025
1:03:26
1:03:26
Play later
Play later
Lists
Like
Liked
1:03:26Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss Microsoft's Digital Defense Report for 2025. The conversation delves into the critical issues surrounding identity attacks, particularly focusing on the vulnerabilities associated with weak passwords. Andy highlights the prevalence of password spraying in i…
…
continue reading
1
A Day In The Life Of A CISO - What They Don't Tell You / Future Secured Ep 48
45:53
45:53
Play later
Play later
Lists
Like
Liked
45:53In this episode of Future Secured, Jason Murrell and Tom Finnigan are joined by David Gee, a renowned technology executive, author and cybersecurity board advisor, to reflect on how the role of cyber leadership has evolved from firefighting to business enablement. Drawing on his experience as CISO for HSBC Asia Pacific, Global Head of Tech and Cybe…
…
continue reading
What is democratic resilience and why is it a national security issue? Why is it important to preserve public trust and participation in the electoral process and what are some of the challenges to this? Apart from voting, what are some other ways that Australians can engage in the democratic process? What challenges do big tech companies, mis- and…
…
continue reading
Did you change your security cam's default password? If you're like most, maybe not. Here's why you should and other great tips you need to know about. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
BREAKING: The Army of FAKES - Is Russia WEAPONIZING Generative AI?
19:43
19:43
Play later
Play later
Lists
Like
Liked
19:43Silicon Bites Ep267 | News Update - Day 1,354 - 2025-11-08 | AI fakes try to poison Ukraine’s mobilization debate; Washington grants Budapest a carve-out on Russian energy; Kyiv’s defence industry talks up its potential with $30–35 billion in long-range output for 2026; the EU tightens visa screws on Russian nationals; Pokrovsk hangs in the balance…
…
continue reading
1
Lawfare Archive: The Dangers of Deploying the Military on U.S. Soil
1:33:52
1:33:52
Play later
Play later
Lists
Like
Liked
1:33:52From November 6, 2024: For today’s special episode, Lawfare General Counsel and Senior Editor Scott R. Anderson held a series of conversations with contributors to a special series of articles on “The Dangers of Deploying the Military on U.S. Soil” that Lawfare recently published on its website, in coordination with our friends at Protect Democracy…
…
continue reading
Skip the swiping. The new move is checking someone’s Facebook history before you even say hi. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
Mexico’s Corruption, Violence, and Impunity Crisis
48:26
48:26
Play later
Play later
Lists
Like
Liked
48:26Context and the Surrounding Situation in Mexico Héctor López, an ethical hacker and cybersecurity educator based in Guanajuato, Mexico, joined the Twitter Space because he woke up very early with intense anxiety and insomnia (“bien ansioso”) over the catastrophic national security and political situation in Mexico. The immediate trigger for his dis…
…
continue reading
1
3079: From F1 to the Boardroom: Seb Sheppard on Building High-Performance Tech Teams
34:45
34:45
Play later
Play later
Lists
Like
Liked
34:45What can leadership in Formula One teach the rest of us about business transformation? In this episode of the Tech Talks Daily Podcast, I sit down with Seb Sheppard, whose career has taken him from flying helicopters in the Royal Navy to leading engineering teams in Formula One and steering post-merger integrations across multiple industries. His s…
…
continue reading
1
Lavrov is in TROUBLE - After Budapest Failure and Moscow UNESCO Fiasco
13:58
13:58
Play later
Play later
Lists
Like
Liked
13:582025-11-07 | Silicon Wafers 050 | Is Sergei Lavrov on the way out? After that embarrassment of the non-summit in Budapest, and the cold treatment of Kirill Dmitriev in Washington, it looks like Lavrov is falling out of favour with the Kremlin. But will he also be falling out with those square shaped and glazed objects, designed to let light into ta…
…
continue reading
1
Find the neighborhood cameras tracking your car
7:35
7:35
Play later
Play later
Lists
Like
Liked
7:35Want to know who’s watching your driveway? I’ll walk you through the easy ways to map nearby cameras. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
What Does "Secured by Design" Really Mean?
14:24
14:24
Play later
Play later
Lists
Like
Liked
14:24Summary In this (First) episode of Secured by Design, we explore the critical role of identity in cybersecurity. We emphasise that identity should be the foundation of security, rather than an afterthought. Through real-world examples, we illustrate the risks associated with poor identity management and the benefits of adopting an identity-first ap…
…
continue reading
1
BREAKING: Putin's #1 Threat is "Civil War" Claims Kremlin Sociologist!
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56Silicon Bites Ep266 - Day 1,353 - 2025-11-07 | Civil War is Kremlin’s #1 Fear, according to the Kremlin’s own chief sociologist. If I was asked this question, I’d have said it’s a low probability, as is the fragmentation of Russia into myriad smaller states. Not impossible, but very unlikely, even after the conclusion of Putin’s disastrous war in U…
…
continue reading
1
US China policy under Trump 2.0, with George Yin
25:03
25:03
Play later
Play later
Lists
Like
Liked
25:03The relationship between the US and China has been fraud with conflict for many years and its twists and turns have global effects. In this episode, George Yin joins Johannes Heller-John to decipher the China policy of the US and its continuities and changes over the last administrations. They also discuss what the EU can do to find its place amids…
…
continue reading
1
Guest pod: Alex LaCasse talks AI governance with Brenda Leong and Andrew Burt
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12As artificial intelligence continues to coalesce in the modern economy, AI governance only grows in significance. Brenda Leong, director of ZwillGen's AI division, and Andrew Burt, CEO of Luminos, have long been on the front lines of AI's emergence and busy helping organizations navigate this space. In a first for The Privacy Advisor Podcast, we're…
…
continue reading
1
Lawfare Daily: Supreme Court Oral Arguments on President Trump’s Tariffs
1:02:24
1:02:24
Play later
Play later
Lists
Like
Liked
1:02:24In a live conversation on November 5, Lawfare Senior Editor Scott R. Anderson sat down with Lawfare Contributing Editor Peter Harrell and Georgetown Law Professors Marty Lederman and Kathleen Claussen to discuss what occurred during oral arguments in the legal challenge to President Trump’s tariffs at the Supreme Court and how the justices may rule…
…
continue reading
AI voice cloning is fooling parents, grandparents, everyone. I’ll tell you how to make sure you never fall for it. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
The Espionage Act was written more than a century ago to stop spies and saboteurs. But over time, its reach has quietly expanded — from enemy agents to insiders, and now, possibly, to the press itself. Georgetown Law’s Stephen Vladeck explains how a law built for wartime secrecy could become one of the most powerful tools in Washington’s arsenal. L…
…
continue reading
Chain of lure is an attack method used to circumvent restrictions and boundaries places on AIs. Jason explains this attack and its implications.By Tim Callan and Jason Soroko
…
continue reading
1
3478: Why Aviatrix Believes Network Visibility Is the Missing Pillar of Cloud Defense
40:37
40:37
Play later
Play later
Lists
Like
Liked
40:37How do you secure a world where trusted internal traffic now travels over the public internet? That's the question I put to Doug Merritt, CEO of Aviatrix, in this thought-provoking conversation recorded for Tech Talks Daily. Doug brings decades of experience from his time leading Splunk and other major technology players, and he now finds himself a…
…
continue reading
1
870. Russia is on Fire - Livestream with Yuri Rashkin and Jason Jay Smart
1:02:27
1:02:27
Play later
Play later
Lists
Like
Liked
1:02:27Livestream with Yuri Rashkin----------Partner on this video: KYIV OF MINE Watch the trailer now: https://www.youtube.com/watch?v=arJUcE1rxY0'Kyiv of Mine' is a documentary series about Ukraine’s beautiful capital, Kyiv. The film production began in 2018, and much has changed since then. It is now 2025, and this story is far from over.https://www.yo…
…
continue reading
1
Building a Real Security Culture: Why Most AppSec Champion Programs Fall Short | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 5 | A Musing On the Future of Cybersecurity with Sean Martin ...
2:24
2:24
Play later
Play later
Lists
Like
Liked
2:24Most organizations have security champions. Few have a real security culture. In this episode of AppSec Contradictions, Sean Martin explores why AppSec awareness efforts stall, why champion programs struggle to gain traction, and what leaders can do to turn intent into impact. 🔍 In this episode: Why compliance training doesn’t build culture The dat…
…
continue reading
This goes way beyond stealing pens or notepads at work. There’s a new way to cheat the system. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
866. SHOCKING - Is MAGA Aligning with Ukraine and Zelenskyy Now?
50:48
50:48
Play later
Play later
Lists
Like
Liked
50:48Steven Moore is a political strategist, who spent seven years as a chief of staff and senior leadership aide in the United States Congress, developing relationships with senior policymakers across the United States and around the world. He worked on Capitol Hill in the House of Representatives mostly as chief of staff for former Rep. Pete Roskam (R…
…
continue reading
1
How AI is Expanding the CIO Role with Chetna Mahajan of Webflow
31:30
31:30
Play later
Play later
Lists
Like
Liked
31:30In this episode, Chetna explains how new automation strategies are evolving not only productivity, but the role of the CIO. Chetna emphasizes the importance of data quality and security when scaling a fast-growing company, as well as transparency and partnership in vendor relationships. About the Guest: Chetna is an award winning CIO, board member,…
…
continue reading
1
#303 Private AI vs Public AI: Governance, Compliance & Cost Control
35:46
35:46
Play later
Play later
Lists
Like
Liked
35:46In a world increasingly wary of public cloud solutions, Daniel Rodriguez, Chief AI Officer at United Data Technologies, joins Dr. Darren on the Embracing Digital Transformation podcast to discuss the merits and strategies behind private AI platforms. Discover why organizations are turning to private cloud solutions to protect their data while also …
…
continue reading
Once the king of VPNs, ExpressVPN has seen a dramatic fall of grace that started in 2021. This is the story of the rise and fall of one of the most well-known privacy and security apps. Start protecting your own online identity with our free email course: https://www.allthingssecured.com/email-course/ Recommended alternatives to ExpressVPN (affilia…
…
continue reading
The ultimate sci-fi fantasy? A bot that can do the dishes or fold your pants. Hear why, by 2026, that dream is finally within reach. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
Lawfare Daily: Seeking Meaning at the Soviet Collapse, with Joseph Kellner
37:57
37:57
Play later
Play later
Lists
Like
Liked
37:57On today’s episode, Lawfare Managing Editor Tyler McBrien sits down with Joseph Kellner, an assistant professor of history at the University of Georgia to discuss his latest book, “The Spirit of Socialism: Culture and Belief at the Soviet Collapse,” which examines the millions of Soviet people who embarked on a “spirited and highly visible search f…
…
continue reading
Today we are joined by Dr. Sasha O'Connell, Senior Director for Cybersecurity Programs at Aspen Digital, discussing "10 Years of Cybersecurity Progress & What Comes Next." Ben talks about a couple of instances of AI companies reigning in their chatbots. Dave's got the story of ICE’s controversial facial recognition operations. While this show cover…
…
continue reading
1
Seeing the unseen: why geospatial intelligence is important
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57What are the origins of AGO and how has the organisation developed within the National Intelligence Community? How does AGO contribute to the broader remit of Australian statecraft, the work done by other NIC agencies, and the Five Eyes partnership? What are some of the biggest challenges in Australia’s immediate region that AGO is working towards?…
…
continue reading
1
3477: The Intersection of AI, DX, and Technical Debt.
27:15
27:15
Play later
Play later
Lists
Like
Liked
27:15Every software team, no matter its size or sophistication, has wrestled with the same quiet threat, technical debt. But what if the issue isn't just messy code or outdated frameworks, but something more human? That's the question Ernesto Tagwerker, Founder and CEO of OmbuLabs.ai, has been asking as he works at the intersection of AI, developer expe…
…
continue reading
1
The Winter War - Russia Hits Out at Snacks and Pills (warehouses)
9:19
9:19
Play later
Play later
Lists
Like
Liked
9:192025-11-05 | Silicon Wafers 049 | DAILY UPDATES | Pokrovsk, the contested Donetsk rail-and-road hub has become the most consequential urban fight since Avdiivka, and the outcome of that fight may turn out to be instrumental for the outcome of the war, not only against Ukraine, but Russia’s war against Western democracy. In today’s episode, we are z…
…
continue reading
51
The 764 Network: Decoding the Hydra of Online Extremism, Child Exploitation, and Real-World Murder
29:49
29:49
Play later
Play later
Lists
Like
Liked
29:49The sources provide a comprehensive overview of the 764 network, classified as a decentralized, international online group operating as a violent extremist organization primarily targeting minors for grooming, sextortion, and coercion into self-harm. Originating around 2021 as an offshoot of an earlier group called CVLT, the network employs sophist…
…
continue reading
An overview of #OpChildSafety, an ongoing hacktivist operation founded by the decentralized collective Anonymous, which focuses on digital vigilantism to protect minors from online child exploitation. This dedicated effort emerged as part of Anonymous' broader campaigns, gaining prominence between 2018 and 2024, motivated in part by perceived limit…
…
continue reading
1
The 764 Network: Threats, Tactics, and Response
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12A comprehensive overview of the 764 network, classified as a decentralized, international online group operating as a violent extremist organization primarily targeting minors for grooming, sextortion, and coercion into self-harm. Originating around 2021 as an offshoot of an earlier group called CVLT, the network employs sophisticated psychological…
…
continue reading
1
869. Lights Go Out Around Russia as Ukrainian Campaigns Rollout
1:03:11
1:03:11
Play later
Play later
Lists
Like
Liked
1:03:11David DeBatto is host of the ‘No Delusion Zone’ podcast @NoDelusionZone is a retired U.S. Army Counterintelligence Special Agent, a geopolitical analyst, writer, and podcaster. David is an Iraq war veteran who served as Team Leader of a Tactical Human Intelligence Team (THT) in operations within Iraq and is also a former police officer. David is co…
…
continue reading
1
Pokrovsk on the Brink - Its Defenders Face the Fight of Their Lives
22:12
22:12
Play later
Play later
Lists
Like
Liked
22:12Silicon Bites Ep265 - Day 1,351 - 2025-11-05 | Donetsk, the contested Donetsk rail-and-road hub has become the most consequential urban fight since Avdiivka, and the outcome of that fight may turn out to be instrumental for the outcome of the war, not only against Ukraine, but Russia’s war against Western democracy. In today’s episode, we are zoomi…
…
continue reading
You know how it goes, the second you actually need to make a call with your phone, the signal tanks. Don’t panic. I’ve got fast fixes. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
Atroposia RAT: The Malware That Scans for Its Own Exploits
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11Got a question or comment? Message us here! 🎙️ A new threat is making waves ... Atroposia RAT, a remote access trojan that doesn’t just infiltrate systems but scans them for vulnerabilities to exploit further. In this episode, we break down how this modular malware operates, how it hides, and why its built-in scanner is a game-changer for attackers…
…
continue reading
1
Rational Security: The “Wea Culpa” Edition
1:14:26
1:14:26
Play later
Play later
Lists
Like
Liked
1:14:26This week, Scott sat down with co-hosts emeritus Benjamin Wittes and Alan Rozenshtein, and Senior Editor Kate Klonick, to talk through the week’s big national security news stories, including: “Cracks in the Foundation.” The conservative Heritage Foundation—and the broader conservative movement it plays a central role in—has been going through a ve…
…
continue reading
1
Bridging the Cybersecurity Divide Between the Haves and Have-Nots: Lessons from Australia’s CISO Community | A Conversation with Andrew Morgan | Redefining CyberSecurity with Sean Martin
52:14
52:14
Play later
Play later
Lists
Like
Liked
52:14⬥GUEST⬥ Andrew Morgan, Chief Information Security Officer | On LinkedIn: https://www.linkedin.com/in/andrewmorgancism/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ The cybersecurity communi…
…
continue reading
1
Identity Threats, AI Attacks, and the Power of Community with Filipi Pires
39:12
39:12
Play later
Play later
Lists
Like
Liked
39:12In this episode of the Security by Default podcast, host Joe Carson welcomes back Filipi Pires, Head of Identity Threat Labs & Global Product Advocate at Segura® to discuss the latest trends in identity threats and cybersecurity. They explore the evolution of attacks, particularly focusing on social engineering and the role of AI in both offensive …
…
continue reading