Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Existential Risk Podcasts

show episodes
 
AXRP (pronounced axe-urp) is the AI X-risk Research Podcast where I, Daniel Filan, have conversations with researchers about their papers. We discuss the paper, and hopefully get a sense of why it's been written and how it might reduce the risk of AI causing an existential catastrophe: that is, permanently and drastically curtailing humanity's future potential. You can visit the website and read transcripts at axrp.net.
  continue reading
 
Artwork

1
Philosophize This!

Stephen West

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Beginner friendly if listened to in order! For anyone interested in an educational podcast about philosophy where you don't need to be a graduate-level philosopher to understand it. In chronological order, the thinkers and ideas that forged the world we live in are broken down and explained.
  continue reading
 
Artwork

1
Future of Life Institute Podcast

Future of Life Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Future of Life Institute (FLI) is a nonprofit working to reduce global catastrophic and existential risk from powerful technologies. In particular, FLI focuses on risks from artificial intelligence (AI), biotechnology, nuclear weapons and climate change. The Institute's work is made up of three main strands: grantmaking for risk reduction, educational outreach, and advocacy within the United Nations, US government and European Union institutions. FLI has become one of the world's leading ...
  continue reading
 
Artwork

1
80,000 Hours Podcast

Rob, Luisa, and the 80,000 Hours team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Unusually in-depth conversations about the world's most pressing problems and what you can do to solve them. Subscribe by searching for '80000 Hours' wherever you get podcasts. Hosted by Rob Wiblin and Luisa Rodriguez.
  continue reading
 
Artwork

4
The Art Of Risk

Debra Jarvis, Nassim Assefi

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Life offers us many opportunities but some seem too risky to accept. How do we choose what is worth the risk? The Art of Risk is a podcast exploring gutsy choices made by colorful characters. The show defines risk as an active decision that has potential to result in a negative outcome. Our emphasis is not on talking with athletic daredevils, but people who have taken cultural, social, financial, emotional, and even existential risks. Our long-form interview show focuses on ordinary people w ...
  continue reading
 
Artwork

1
At a Distance

The Slowdown

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about the bigger picture. Host Spencer Bailey calls on leading minds, from scientists and technologists to artists and climate activists, to zoom out and look at some of the planet’s most pressing issues from a whole-earth, long-view perspective.
  continue reading
 
"Frame of Reference - Profiles in Leadership" and "Frame of Reference - Coming together" are conversational style shows with local, national, and global experts about issues that affect all of us in some way. I’m, at heart, a “theatre person”. I was drawn to theatre in Junior High School and studied it long enough to get a Master of Fine Arts in Stage Direction. It’s the one thing that I’m REALLY passionate about it because as Shakespeare noted, “all the world’s a stage and all the men and w ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Apocalypse HOW?!

Apocalypse HOW?!

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A scientist and a comedian discuss scientifically plausible end-of-the-world scenarios. Join neuroscientist Dr James Cooke (PhD, MSc, BA Oxon) and comedian Rory O'Keeffe ("may not be up to the task of real life" Fest ★★★★) as they embark on an informative journey through what James calls "Human Existential Risk" or what Rory calls “it all going to shit in a big way”.
  continue reading
 
Artwork

1
Steering AI

UCL Minds

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Artificial Intelligence is hurtling us into an unknown future. Will it pollute our infosphere, reinforce biases, or even be an existential risk? Or will AI help us solve the energy crisis, revolutionise healthcare and even eliminate the need for work? Perhaps all of these? On Steering AI, we talk to leading academic experts at the cutting-edge of this increasingly powerful and pervasive technology, hearing their views on the benefits and how to steer around the risks. The first step to mitig ...
  continue reading
 
Artwork

4
The Risktory Podcast

Jacinthe A Galpin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
December 2021 Update: The Risktory Podcast is on indefinite hiatus. Thank you for all the support! Risktory is a first of its kind podcast, dedicated to exploring the risk universe through the lens of history. From Napoleon in his first Italian campaign, to the ancient city of Pompeii, to Jack the Ripper, risk has always had a place in helping humans to both guard against existential threat, but to also grasp and exploit exquisite opportunity. Think risk is boring? Let Risktory blow your min ...
  continue reading
 
Artificial Intelligence has evolved at an unprecedented pace, transforming from simple rule-based systems to powerful deep learning models capable of reasoning, creativity, and autonomous decision-making. As AI continues to advance, the line between innovation and existential risk grows thinner. While breakthroughs in AGI (Artificial General Intelligence) promise incredible benefits, concerns about AI surpassing human control, ethical dilemmas, and its potential misuse in warfare and misinfo ...
  continue reading
 
Artwork
 
Conversations on the deeper lessons we learn from the outdoors. Tim Stewart speaks to athletes, authors, philosophers, and leaders about their adventures outdoors and the lessons they have brought back with them. We explore topics such as flow states, consciousness, fear, risk, and death, and how all of these come together to provide us with meaning and wisdom.
  continue reading
 
Artwork

1
Chronocast: Deep Dives

Primordial & LemonHedd

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
ChronoCast: Deep Dives is the official audio signal of the Omniverse—transmitted across timelines, misfiled by cosmic bureaucracy, and accidentally recovered. Dive into lore analysis, narrative theatre, and audiobook-style transmissions. Sanctioned (or not) by the Fulcrum Order. Monitored by Q.U.A.N.T.U.M. Interpret at your own existential risk.
  continue reading
 
Bite-sized clips with TED level top thinkers, founders and scientists on how advances in biotech & genomics, space travel, IoT, AI and other exponential tech converge to create our collective future and what we can do, from a research and policy perspective to shape the trends, technologies and societal norms for a better world. Main Podcast: https://disruptors.fm/itunes If in-depth, unscripted conversations with the researchers, startups and future thinkers transforming the future of all of ...
  continue reading
 
Artwork

1
Ok, Doomer!

European Leadership Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
“Ok, Doomer!” the podcast by NEVER, is a 6-part series by the European Leadership Network and their New European Voices on Existential Risk, aka NEVER network, embarking on an exploration into the heart of the manmade existential risks threatening humanity, our planet, and life as we know it. Each episode delves into a different existential crisis, from the looming shadows of nuclear war and the escalating perils of climate change to the uncharted territories of disruptive AI technologies an ...
  continue reading
 
Artwork

1
On What Matters

Coleman Snell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
What are the greatest forces, risks, and ideas that define the 21st Century? Each week existential risk researcher Coleman Snell speaks with academics, thinkers, and artists whose work speaks to life in the 21st Century for the modern individual. We talk about the biggest risks/challenges facing our species, solutions, unique aspects of 21st Century Life, and how we can find meaning in this strange century. Learn more about the field of global catastrophic & existential risk and about the po ...
  continue reading
 
Artwork

4
Kids These Days

Matt Sowerby

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
“I have been classified as part of Generation Z. There are no letters after Z. Meaning we have a choice: to be an ending, or the people who do things differently.” It’s 2019. Examination is at an all-time high. Mental health problems are an epidemic. Students everywhere are striking school for the climate. Matt is a normal teenager. He likes writing poetry. He likes his friend Aidan. He likes this girl called Amy but is too afraid to ask her out. But sometimes being afraid isn’t an option. S ...
  continue reading
 
Artwork

1
FUTURATI PODCAST

Thomas Frey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join renowned visionary Thomas Frey and Trent Fowler as they explore artificial intelligence, cryptocurrencies, space exploration, quantum computing, biotechnology, and a variety of other topics of interest to futurists.
  continue reading
 
Artwork

1
The Cyberlaw Podcast

Stewart Baker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
  continue reading
 
Artwork

1
Zoom Out

Zoom Out

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
For-fun podcast based out of Calgary, Canada discussing issues surrounding Tech, Culture, Science, & Society. Hosted by Cal Leung & Simon Loewen. Currently on hiatus to work sister podcast 'We Believe in Calgary'! To resume ~November 2021.
  continue reading
 
Artwork

1
New Frontier

New Frontier

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Patrick Blumenthal (@PatrickJBlum) interviews some of the world's leading economists, political scientists, and philosophers to discuss their ideas and what they mean for society, technology, and the economy.
  continue reading
 
Artwork

1
Rising Ape Speaks

James Riley / Antony Poveda

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A weekly podcast where James Riley and Antony Poveda from Rising Ape Collective debate the advancement of civilisation and the demise of their own humanity... In a fun way!
  continue reading
 
Artwork

1
Intergenerational Fairness Day Podcast

Intergenerational Fairness Day

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On November 16th, 2023, organisations from all over the world are proclaiming a worldwide day for action. Join host Lena Winzer as she introduces the concept of ‘intergenerational fairness’ and the organisations championing the Intergenerational Fairness Day! Every three months an episode will be released, in which challenges to an intergenerationally fair world are introduced and discussed. The first episode releases on 16/11/2023 and is produced by Lena Winzer and Svenja Klöckner.
  continue reading
 
Welcome to Countdown To Dawn, your daily podcast exploring the fascinating world of Artificial Intelligence and Technology. Hosted by 4RAAARI this show delves into the positive and negative effects of AI, discussing breakthroughs in machine learning, ethical implications, and real-world applications. Whether you're an AI enthusiast, tech professional, or curious learner, our AI-powered host deliver analysis and insight on the latest developments in the field. We break down complex concepts, ...
  continue reading
 
Artwork

1
The Waking Cosmos Podcast

Adrian David Nelson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The universe is an extraordinary place, full of beauty and mystery. And yet, for all of the amazing things that science has discovered, the most surprising and mysterious aspect of reality is… us. Through the development of life and mind, the universe glimpses the potential of a subjective dimension, -of value, meaning, and significance. Today growing numbers of scientists and philosophers argue that proper recognition of the existence of consciousness reframes our entire cosmological pictur ...
  continue reading
 
Artwork

1
Principle of Charity

Emile Sherman, Lloyd Vogelman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Are you ready to burst your filter bubble? To hit pause on righteous anger? Principle of Charity injects curiosity and generosity back into difficult conversations, bringing together two expert guests with opposing views on big social issues. But here’s the twist: as well as passionately advocating their own views, each guest is challenged to present the best, most generous version of the other’s argument. This unique format comes from an ancient idea - the principle of charity - which tells ...
  continue reading
 
Loading …
show series
 
A successful strategy in appsec is to build platforms with defaults and designs that ease the burden of security choices for developers. But there's an important difference between expecting (or requiring!) developers to use a platform and building a platform that developers embrace. Julia Knecht shares her experience in building platforms with an …
  continue reading
 
Interview Segment - Lessons Learned from the tj-actions GitHub Action Supply Chain Attack with Dimitri Stiliadis Breach analysis is one of my favorite topics to dive into and I’m thrilled Dimitri is joining us today to reveal some of the insights he’s pulled out of this GitHub Actions incident. It isn’t an overstatement to say that some of the less…
  continue reading
 
We chat with Material Security about protecting G Suite and MS365. How else are you monitoring the most commonly used cloud environments and applications? In the security news: Google Sues Badbox operators Authenticated or Unauthenticated, big difference and my struggle to get LLMs to create exploits for me Ring cameras that were not hacked Malicou…
  continue reading
 
How do we get security right? The answer varies by many factors, including industry, what you're trying to protect, and what the C Suite and Board care about. Khaja Ahmed, Advisor at CISO Forum, joins Business Security Weekly to discuss how to get consensus on your security program. CISOs, executives, and the Board need to be aligned on the risks a…
  continue reading
 
Donatello, SharePoint, CrushFTP, WordPress, Replit, AllaKore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.darkreading.com/threat-intelligence/matanbuchus-loader-ransomware-infections This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Visit https://ww…
  continue reading
 
For decades, US allies have slept soundly under the protection of America’s overwhelming military might. Donald Trump — with his threats to ditch NATO, seize Greenland, and abandon Taiwan — seems hell-bent on shattering that comfort. But according to Hugh White — one of the world's leading strategic thinkers, emeritus professor at the Australian Na…
  continue reading
 
AI is more than LLMs. Machine learning algorithms have been part of infosec solutions for a long time. For appsec practitioners, a key concern is always going to be how to evaluate the security of software or a system. In some cases, it doesn't matter if a human or an LLM generated code -- the code needs to be reviewed for common flaws and design p…
  continue reading
 
Segment 1 - Interview with Helen Patton: Introducing the Cybersecurity Canon Did you know that there’s a hall-of-fame for cybersecurity books? Over the past decade, the Cybersecurity Canon has published reviews on dozens of cybersecurity books and established a hall of fame. Hall of fame books are defined as titles that all cybersecurity profession…
  continue reading
 
In the security news: The train is leaving the station, or is it? The hypervisor will protect you, maybe The best thing about Flippers are the clones Also, the Flipper Zero as an interrogation tool Threats are commercial and open-source Who is still down with FTP? AI bug hunters Firmware for Russian drones Merging Android and ChromOS Protecting you…
  continue reading
 
Send us a text When global tensions flare, it's often what's happening behind the scenes that matters most. In this thought-provoking episode, we dig into the complex relationship between domestic politics and international conflicts, focusing on the recent escalation between Israel and Iran. We begin by examining the abandoned Joint Comprehensive …
  continue reading
 
On this episode, Tom Davidson joins me to discuss the emerging threat of AI-enabled coups, where advanced artificial intelligence could empower covert actors to seize power. We explore scenarios including secret loyalties within companies, rapid military automation, and how AI-driven democratic backsliding could differ significantly from historical…
  continue reading
 
Are you running SAP? The clock is ticking... Standard maintenance end-of-life is set for the end of 2027. Migration to S/4HANA must be completed by then (or 2030 if you buy into SAP’s special three-year reprieve). While that may appear to be enough time, companies currently working toward an S/4HANA transition are finding the journey challenging, a…
  continue reading
 
What happens when civilisation faces its greatest tests? This compilation brings together insights from researchers, defence experts, philosophers, and policymakers on humanity’s ability to survive and recover from catastrophic events. From nuclear winter and electromagnetic pulses to pandemics and climate disasters, we explore both the threats tha…
  continue reading
 
What are some appsec basics? There's no monolithic appsec role. Broadly speaking, appsec tends to branch into engineering or compliance paths, each with different areas of focus despite having shared vocabularies and the (hopefully!) shared goal of protecting software, data, and users. The better question is, "What do you want to secure?" We discus…
  continue reading
 
In this episode we speak with Dr. Bryan Carmody, pediatric nephrologist and associate professor of pediatrics at Eastern Virginia Medical School. We talk about whether America really faces a doctor shortage, why people in areas with plenty of doctors still struggle to access care, whether proposed solutions can address the access problems many pati…
  continue reading
 
Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' p…
  continue reading
 
Anders Sandberg joins me to discuss superintelligence and its profound implications for human psychology, markets, and governance. We talk about physical bottlenecks, tensions between the technosphere and the biosphere, and the long-term cultural and physical forces shaping civilization. We conclude with Sandberg explaining the difficulties of desi…
  continue reading
 
This week in the security news: Citrixbleed 2 and so many failures Ruckus leads the way on how not to handle vulnerabilities When you have no egress Applocker bypass So you bought earbuds from TikTok More gadgets and the crazy radio Cheap drones and android apps Best Mario Kart controller ever VSCode: You're forked Bluetooth earbuds and vulnerabili…
  continue reading
 
SEC settles with SolarWinds. We react! In the leadership and communications section, The Skills and Habits Aspiring CEOs Need to Build, Why People Really Quit — And How Great Managers Make Them Want to Stay, The Small Actions That Become Your Legacy, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https:/…
  continue reading
 
Ryan Greenblatt — lead author on the explosive paper “Alignment faking in large language models” and chief scientist at Redwood Research — thinks there’s a 25% chance that within four years, AI will be able to do everything needed to run an AI company, from writing code to designing experiments to making strategic and business decisions. As Ryan la…
  continue reading
 
Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this new code means for appsec practices. On a positive note, the prevalence of those ancient vulns seems to be diminishing, but the rising use of LLMs is e…
  continue reading
 
Today we talk about the book The Crisis of Narration by the philosopher Byung Chul Han. We talk about the history of storytelling. Walter Benjamins distinction between a Paris fire and a revolution in Madrid. The effects of social media on memory. Story telling vs story selling. AI as pure Intelligenz lacking Geist. The ability for stories to give …
  continue reading
 
Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
  continue reading
 
In this episode, I chat with Samuel Albanie about the Google DeepMind paper he co-authored called "An Approach to Technical AGI Safety and Security". It covers the assumptions made by the approach, as well as the types of mitigations it outlines. Patreon: https://www.patreon.com/axrpodcast Ko-fi: https://ko-fi.com/axrpodcast Transcript: https://axr…
  continue reading
 
This week, we dive into the world of Meshtastic and LoRa—two technologies empowering secure, long-range, and infrastructure-free communication. We'll talk about the origins of Meshtastic, how LoRa radio works, and why mesh networking is revolutionizing off-grid messaging for adventurers, hackers, emergency responders, and privacy advocates alike. W…
  continue reading
 
Send us a text "What's going on today in our world?" asks Rauel as he and Antowan dive deep into one of the most controversial pieces of legislation currently making waves across America – the so-called "Big Beautiful Bill." This powerful conversation exposes the troubling psychology behind American politics today, where questioning has become thre…
  continue reading
 
On this episode, Daniel Kokotajlo joins me to discuss why artificial intelligence may surpass the transformative power of the Industrial Revolution, and just how much AI could accelerate AI research. We explore the implications of automated coding, the critical need for transparency in AI development, the prospect of AI-to-AI communication, and whe…
  continue reading
 
New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
  continue reading
 
Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
  continue reading
 
Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
  continue reading
 
Today we talk about the late work of Wittgenstein in Philosophical Investigations. We talk about the meaning of words. Augustine's theory. Forms of life. Rules and practices. Grammar. Geometry. Family resemblance. And the role of a philosopher on the other side of accepting this view of language. Hope you love it. :) Sponsors: ZocDoc: https://www.Z…
  continue reading
 
In this episode, I talk with Peter Salib about his paper "AI Rights for Human Safety", arguing that giving AIs the right to contract, hold property, and sue people will reduce the risk of their trying to attack humanity and take over. He also tells me how law reviews work, in the face of my incredulity. Patreon: https://www.patreon.com/axrpodcast K…
  continue reading
 
On this episode, Daniel Susskind joins me to discuss disagreements between AI researchers and economists, how we can best measure AI’s economic impact, how human values can influence economic outcomes, what meaningful work will remain for humans in the future, the role of commercial incentives in AI development, and the future of education. You can…
  continue reading
 
This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
  continue reading
 
AI models today have a 50% chance of successfully completing a task that would take an expert human one hour. Seven months ago, that number was roughly 30 minutes — and seven months before that, 15 minutes. These are substantial, multi-step tasks requiring sustained focus: building web applications, conducting machine learning research, or solving …
  continue reading
 
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
  continue reading
 
In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak …
  continue reading
 
The era of making AI smarter just by making it bigger is ending. But that doesn’t mean progress is slowing down — far from it. AI models continue to get much more powerful, just using very different methods, and those underlying technical changes force a big rethink of what coming years will look like. Toby Ord — Oxford philosopher and bestselling …
  continue reading
 
Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
  continue reading
 
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play