Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Where we talk and discuss what the great firewall of China is, and the ethics of it Cover art photo provided by JJ Ying on Unsplash: https://unsplash.com/@jjying
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Learn how to think not what to think.
…
continue reading
Training of Aria Technologies products including Ericsson-LG, Lancom Systems, Star Leaf, So Connect, Jabra, xmedius, Checkpoint, NBN, iPECS2Teams
…
continue reading
A great WordPress.com site
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
Hosted by planetary scientist and astrobiologist Dr. Michael L. Wong, Strange New Worlds examines science, technology, and culture through the lens of Star Trek!
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Red Eye Radio is the pre-eminent syndicated overnight radio show hosted by radio vets Gary McNamara and Eric Harley airing Monday through Friday, Midnight to 5am Central. Targeted at long haul truckers, Red Eye Radio has broadened its mission to include virtually everyone living and working non-traditional hours. The audience includes shift workers, travelers, truck drivers and others who embrace the new 24/7 lifestyle, with many restaurants, retailers and other business establishments open ...
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Where timely and relevant security meets puns and witty banter. Our goal is to keep defenders apprised of pertinent news and trends in under forty-five minutes.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
Join Jason Esposito and Ben Cartland as they explore the deeper questions behind Jason's sermons at Crossway Church, a "community for the curious".
…
continue reading
A live podcast show, that’s like a morning radio show, just much better. Live from 6h00-8h00 Monday, Wednesday and Friday. Clever, funny, outrageous and sometimes very silly. Come for the guests, stay for the laughter. Also check out our other shows on The Real Network for more entertainment.
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
An exploration of the UAP - UFO phenomenon and the associated "high strangeness" which accompanies it from the standpoint of analysts and researchers. Fortean Winds is a collective of data and research professionals who began a project in 2020 to better understand the UFO/UAP phenomenon from the perspective of existing research and evidence. After a few years study and note taking (which you can see at our website https://www.forteanwinds.com) , we're ready to discuss our notes and insights ...
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
SecurityGen
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
Join us as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peek behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | Co-Host Twitter Handle: Andy @andylapteff
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
The CGAI Podcast Network is created and produced by the Canadian Global Affairs Institute. Join us each week to explore the energy, defense, and international affairs stories that matter to Canadians. Listen now to CGAI podcasts “The Global Exchange”, “Defence Deconstructed”, and “Energy Security Cubed”, and partner podcasts “Battle Rhythm" and “Conseils de sécurité”. Visit www.cgai.ca for more, or follow us on Facebook, Twitter, or LinkedIn. The Canadian Global Affairs Institute (CGAI) is a ...
…
continue reading
Welcome to The CDW UK OCTOPOD, your go-to source for the latest technology innovations. In each episode, experts from CDW and our trusted partners explore hot topics like Generative AI, Hybrid Cloud, Cybersecurity, Service Optimisation and Modern Work. Backed by CDW’s Office of the CTO, we dive deep into trending tech, break down the news you need and provide actionable insights to apply right away. Whether you’re a tech enthusiast or simply curious about the digital world, OCTOPOD will help ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
DIAF is a series of audiobooks presented in podcast format which follow the adventures of Brian Brushwood and Justin Robert Young.
…
continue reading
Founded in 2022, securitygen is a global start-up focused on telecom security.
…
continue reading
Just a London girl who happens to speak three languages. Catch me on here for VIBES.
…
continue reading
The Mid-Atlantic’s Best IT services company. Helping Business Owners create, improve and scale their Technology strategy. IT services, IT Security and IT Support advice and leadership from expert professionals. Q&A with Senior Engineers, Service Managers and Business Development.
…
continue reading
I have a unique way of looking at things and I'd like to share that view with you. I believe faith and technology have a lot in common and I can teach both at the same time during one little byte. Join me today and find out how. I'm a strong Christian and have been sharing my faith since being saved in 1993. You can read my personal testimony here: http://www.amylynn.org/testimony I'm a computer geek, programming since the age of seven so I have a lot of things to share. All my businesses ar ...
…
continue reading

1
Coinbase Puts A $20M Bounty Out For Ransomers
12:14
12:14
Play later
Play later
Lists
Like
Liked
12:14In this episode, the hosts discuss a significant cybersecurity incident involving Coinbase, which reportedly cost the company $400 million. They explore the implications of such attacks on financial institutions, the role of insider threats and bribery, and the importance of robust cybersecurity measures. The conversation also touches on investment…
…
continue reading

1
Bradley Asks: Why Do Jews Insist on Getting the Religious Part Wrong?
47:58
47:58
Play later
Play later
Lists
Like
Liked
47:58As a culture, Judaism is so rewarding and life-affirming, says Bradley, but he believes that the religious services rarely are so. Instead, he finds them tedious, antiquated, and decidedly unhelpful. While Reform Judaism, in his opinion, made some improvements, he still thinks it doesn't go far enough, so he lays out a vision for what would get him…
…
continue reading
There are way too many messenger apps today. It’s a sad state of affairs and I don’t see it getting better anytime soon. But the real problem (for me) is that almost all of the popular messenger apps aren’t really that secure and private. Most do not have end-to-end encryption (E2EE) at all or it’s not turned on by default. And frankly even the app…
…
continue reading
In this Triple Helix episode of Defence Deconstructed, recorded March 20th, David Perry sits down with James Grannan, the Vice President of Defence and Government Relations at Lastwall to discuss trends in cyber defence and security. //Guest bios:- James Grannan is the Vice President of Defence and Government Relations at Lastwall.//Host bio:David …
…
continue reading

1
05-15-25 Part Two - A Breach in the Firewall
39:01
39:01
Play later
Play later
Lists
Like
Liked
39:01In part two of Red Eye Radio with Gary McNamara and Eric Harley, Reuters reports on potential breaches in firewalls done remotely involving solar and wind farms. Also intellectual property rights, the so-called rights of activist judges, passionate audio from Representative Mark Green on the importance of law enforcement and the liberal disdain for…
…
continue reading

1
Pi-hole: The Open Source DNS Firewall Revolutionizing Network Security
39:50
39:50
Play later
Play later
Lists
Like
Liked
39:50Your network is talking behind your back—but Pi-hole is listening. Join The Audit as Pi-hole co-founders Dan Schaper and Adam Warner reveal how their open-source DNS sinkhole technology has become the secret weapon for over 200,000 privacy-conscious users worldwide. In this episode, we discuss: How Pi-hole evolved from a simple ad blocker to a crit…
…
continue reading
09.05.25 Pt 1 - Gareth Cliff and Ben Karpinski weigh in on the election of the new Pope and why preserving tradition still holds value in a fast-changing world. They also unpack the controversy around Julius Malema being denied entry into the UK, and what it says about South Africa's global standing and political self-respect. Plus, in an era where…
…
continue reading

1
Faith and Firewalls (title brought to you by Chat GPT)
40:10
40:10
Play later
Play later
Lists
Like
Liked
40:10Jason and Ben discuss the difficulties of how to engage technology and what it means to be human.By Jason Esposito & Ben Cartland
…
continue reading

1
Episode 4 - The Future of Cybersecurity: AI, Threats, and Business Resilience with Dan Havens
1:08:23
1:08:23
Play later
Play later
Lists
Like
Liked
1:08:2300:00 Introduction to Cybersecurity and Acronis 03:01 The Evolution of Acronis and Cyber Protection 06:10 Understanding Cyber Threats and Ransomware 09:04 Common Mistakes in Data Protection 11:57 The Importance of Business Continuity 15:02 The Role of Managed Service Providers 17:58 Best Practices for Cybersecurity 21:11 The Human Factor in Cyberse…
…
continue reading

1
Inside the Human Firewall: Phishing, Deepfakes & the Rise of Social Engineering with Heather Benwell
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21Send us a text In this eye-opening episode, we sit down with Heather Benwell, Chief Marketing Officer at Challengeword, to explore one of the fastest-growing threats in cybersecurity: social engineering. From phishing to deepfakes, and the evolving complexity of human-targeted attacks, Heather shares stories, statistics, and insights that highlight…
…
continue reading
Amy Lynn explores firewalls in Firewalls and The Armor of God, inspired by Ephesians 6:18. Optimize your online security and balance performance, while donning the spiritual Armor of God for protection. This faith tech episode offers wisdom and practical tips. Subscribe to Faith and Tech Bytes with Amy Lynn! #ChristianPodcast #FaithAndTech #Cyberse…
…
continue reading

1
Aging Icons & the Art of Staying Relevant
1:01:32
1:01:32
Play later
Play later
Lists
Like
Liked
1:01:3221.05.25 Pt 2 - Gareth Cliff is joined by media personality Alan Ford for a lively conversation on timeless icons and the role of art in a chaotic world. From Diana Ross dazzling at the Met Gala to a candid chat about how some celebrities are gracefully ageing — and others, not so much — the duo also reflect on why art, beauty, and creativity matte…
…
continue reading

1
The Great Trek: Escaping South Africa?
1:02:59
1:02:59
Play later
Play later
Lists
Like
Liked
1:02:5921.05.25 Pt 1 - Gareth Cliff is joined by producer and media maverick Alan Ford. They unpack The Great Trek — the rising online trend inspired by the story of 49 refugees who recently left South Africa. The conversation digs into the social and political undercurrents behind the movement, while also exploring the romanticism often attached to South…
…
continue reading

1
Risky Business #792 -- Beware, Coinbase users. Crypto thieves are taking fingers now
53:01
53:01
Play later
Play later
Lists
Like
Liked
53:01On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: TeleMessage memory dumps show up on DDoSecrets Coinbase contractor bribed to hand over user data Telegram does seem to be actually cooperating with law enforcement Britain’s legal aid service gets 15 years worth of applicant data stolen Shocking no one, Ivanti …
…
continue reading

1
SANS Stormcast Wednesday, May 21st 2025: Researchers Scanning the Internet; Forgotten DNS Records; openpgp.js Vulneraiblity (#)
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51SANS Stormcast Wednesday, May 21st 2025: Researchers Scanning the Internet; Forgotten DNS Records; openpgp.js Vulneraiblity Researchers Scanning the Internet A “newish” RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do off…
…
continue reading
On this episode of #TheGlobalExchange, Colin Robertson sits down with Gordon Holden and Paul Evans to discuss the relationships and tensions between Canada and China, and how the new Carney government will play into this.//Participants' bios- Paul Evans is Professor Emeritus at the School of Public Policy and Global Affairs at the University of Bri…
…
continue reading

1
05-20-25 Part One - How Long Has This Been Going On?
2:31:07
2:31:07
Play later
Play later
Lists
Like
Liked
2:31:07In part one of Red Eye Radio with Gary McNamara and Eric Harley, the audio cut of the day from Dr. Ezekiel Emanuel on "Morning Joe" on Joe Biden's cancer diagnosis stating the former President most assuredly had cancer when he was in office. Also Washington Republicans need to wake up on deficit, deportation and the authority of the SCOTUS, tornado…
…
continue reading

1
05-20-25 Part Two - Finding Beauty in the Bill
39:01
39:01
Play later
Play later
Lists
Like
Liked
39:01In part two of Red Eye Radio with Gary McNamara and Eric Harley, continued discussion on spending, cutting and revisions to create approval for President Trump's "Big Beautiful Bill". Also audio from Hakeem Jeffries shaming Republicans on Joe Biden's health issues and Mark Halprin on the media's response to Biden's diagnosis and Jake Tapper's new b…
…
continue reading

1
AI’s Next Wave: Intelligent Agents & the Skills to Secure Them with Ankur Shah
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24Send us a text In this episode of Secure Insights, we sit down with Ankur Shah, Co-Founder and CEO of Straiker, to explore the next generation of AI innovation, far beyond chatbots and simple prompts. We speak about how to stay secured when using intelligent agents that not only converse but act — booking your holidays, managing your calendar, arra…
…
continue reading

1
The Hidden Thread – Part 3: Shadows of the Black Sun
25:32
25:32
Play later
Play later
Lists
Like
Liked
25:32Send us a text As the Third Reich crumbled, its strangest ideas didn’t vanish — they mutated. In this episode, we follow the fallout of Nazi occult science, from the bizarre SS witch archive known as Project Hexen to the Soviet psi programs it helped inspire. We reveal how Nazi brainwashing techniques and esoteric warfare doctrines laid the groundw…
…
continue reading
Jason and Ben discuss the strength and challenges of being the global church.By Jason Esposito & Ben Cartland
…
continue reading

1
SANS Stormcast Tuesday, May 20th 2025: AutoIT Code RAT; Fake Keepass Download; Procolored Printer Software Compromise (#)
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41SANS Stormcast Tuesday, May 20th 2025: AutoIT Code RAT; Fake Keepass Download; Procolored Printer Software Compromise RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960…
…
continue reading

1
05-19-25 Part One - Joe Biden's Cancer Diagnosis
2:31:08
2:31:08
Play later
Play later
Lists
Like
Liked
2:31:08In part one of Red Eye Radio with Gary McNamara and Eric Harley, FBI directors determine Jeffrey Epstein's death was a suicide. Also Joe Biden diagnosed with a very aggressive form of prostate cancer, Jake Tapper loves Joe Biden, Mexican tour vessel hits the Brooklyn Bridge killing 2 crew members, audio from CNN on Biden's cancer, forward progress …
…
continue reading

1
05-19-25 Part Two - Biden's Cognitive Cover Up
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02In part two of Red Eye Radio with Gary McNamara and Eric Harley, getting to the bottom of the details of the length of Biden's illness and who was hiding his condition for so long. Also Gary reflects on his health, audio from Kash Patel and Dan Bongino shut down Jeffrey Epstein's suicide conspiracy theories and much more. For more talk on the issue…
…
continue reading

1
A New Breed of Botnet Threatening Gaming and Tech
10:13
10:13
Play later
Play later
Lists
Like
Liked
10:13In this episode of the podcast, the hosts discuss the emergence of a new botnet that is launching targeted DDoS attacks on the gaming industry. They explore the implications of these attacks, particularly focusing on the financial impact on both large and small gaming companies. The conversation highlights the sophistication of the botnet and the c…
…
continue reading
19.05.25 Pt 2 - Gareth Cliff sits down with actor and activist Jack Devnarain for a candid chat about the craft of acting. From classical training alongside the likes of Benedict Cumberbatch to the enigma of Tom Cruise and Scientology, no name is off-limits. Jack also opens up about his personal approach to performance—what drives him, grounds him,…
…
continue reading
19.05.25 Pt 1 - Gareth Cliff and Jack Devnarain dive straight into the deep end with a raw conversation about the harsh realities facing freelancers in South Africa's struggling media industry. Is the answer to survival found in unionisation? Or is it too late to turn the tide? The discussion doesn’t stop there—Trump’s tariffs take centre stage, an…
…
continue reading

1
Cloud Beyond IaaS - App Modernisation Part 1
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47Welcome to a special series with our friends from Microsoft centred around the topic of Cloud Beyond IaaS and how we can drive cost optimisation and innovation through technology. This will be a 13-part series starting with the strategy and diving into the technology across three core areas: App Modernisation, Hybrid Cloud and Data & AI. In this ep…
…
continue reading

1
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk (#)
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk xorsearch.py: Python Functions Didier’s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own c…
…
continue reading
In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss their personal updates, including vacations, media consumption, and music recommendations. Chris shares his experience in Costa Rica, emphasizing the beauty of the rainforest and the benefits of a technology detox. The convers…
…
continue reading

1
05-16-25 Part One - James Comey Sells Seashells
2:31:04
2:31:04
Play later
Play later
Lists
Like
Liked
2:31:04In part one of Red Eye Radio with Gary McNamara and Eric Harley, the secret service is investigating an Instagram post of seashells arranged to show "86 47" that he found walking on the beach. Also Bruce Springsteen trashes Trump onstage, audio from The View yapping about sexism in politics, audio from Chip Roy and Rand Paul on the "Big Beautiful B…
…
continue reading
In part two of Red Eye Radio with Gary McNamara and Eric Harley, making time for the "Big Beautiful Bill" with audio from Ron Johnson and the HUD director on how to make it beautiful. Also the impeachment attempt, audio from the President on returning home from his first trip abroad in his second term and seeing his new Grandchild, audio from SCOTU…
…
continue reading

1
Relatable Royals, Diddy Drama & Desk Diaries
53:31
53:31
Play later
Play later
Lists
Like
Liked
53:3116.05.25 Pt 2 - Gareth Cliff and Simphiwe Mthethwa unpack Michelle Obama’s latest attempt to seem more relatable — but is it hitting the mark, or missing completely? Simphiwe breaks down the latest from the explosive Diddy trial, with all the twists and courtroom drama. Plus, what does your workspace really say about you? The team takes a look at l…
…
continue reading
Welcome to a special series with our friends from Microsoft centred around the topic of Cloud Beyond IaaS and how we can drive cost optimisation and innovation through technology. This will be a 13-part series starting with the strategy and diving into the technology across three core areas: App Modernisation, Hybrid Cloud and Data & AI. In this ep…
…
continue reading
16.05.25 Ot 1 - Gareth Cliff weighs in on the 49 South African refugees who’ve just resettled in America — and what their departure could signal for the local economy. A quick sports update with producer James derails into full-on locker room talk as they unpack the strange and hilarious habits people have. Plus, what really happens when you’re sla…
…
continue reading

1
63. Phishing Lessons From Troy Hunt's Story
35:00
35:00
Play later
Play later
Lists
Like
Liked
35:00Helpful episodes to listen to first Episode 62, Even a Security Expert Can Get Phished (Troy Hunt, Part 1) Episode 17, Eliminating Email Exhaustion - Part 2 - Unique Emails Episode 42, Website and Email Filtering, Part 3: Email Friends Questions we answer in this episode Who is to blame for Troy getting phished? How can you reliably tell who sent y…
…
continue reading

1
Risky Biz Soap Box: Push Security's browser-first twist on identity security
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24In this wholly sponsored Soap Box edition of the show, Patrick Gray chats with Adam Bateman and Luke Jennings from Push Security. Push has built an identity security platform that collects identity information and events from your users’ browsers. It can detect phish kits and shut down phishing attempts, protect SSO credentials, and find shadow/per…
…
continue reading

1
SANS Stormcast Friday, May 16th: Increase in Sonicwall Scans; RVTools Compromised?; RountPress (#)
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27SANS Stormcast Friday, May 16th: Increase in Sonicwall Scans; RVTools Compromised?; RountPress Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from “Global Host”, a low-cost virtual hosting provider. https://isc.sans.edu/…
…
continue reading

1
05-15-25 Part One - The Buffalo Soldier
2:28:35
2:28:35
Play later
Play later
Lists
Like
Liked
2:28:35In part one of Red Eye Radio with Gary McNamara and Eric Harley, Austin Texas based band Buffalo Soldier makes the headlines as the drummer gets arrested on a plane for a criminal violation..not for an immigration arrest as the liberal media posts about the story. Also actor George Clooney seems "invisible" to his beloved liberal party, audio from …
…
continue reading

1
"You Want to be Popular? Go Sell Ice Cream."
43:42
43:42
Play later
Play later
Lists
Like
Liked
43:42In the latest installment of The Race to Gracie Mansion, Zellnor Myrie, New York State Senator from Brooklyn, explains how he'll handle the hard stuff as mayor, like build one million new housing units over the next decade. "We have to think big, we have to," says Myrie. "I'm just so frustrated we've shrunk as a city in imagination. You want to be …
…
continue reading