Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Firewall Podcasts

show episodes
 
Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
  continue reading
 
Artwork

1
THEOS Cybernova

Theos CyberNova

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
  continue reading
 
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Artwork

4
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
China Insider

Hudson Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
China Insider is a weekly podcast project from Hudson Institute's China Center, hosted by Miles Yu, who provides weekly news that mainstream American outlets often miss, as well as in-depth commentary and analysis on the China challenge and the free world’s future.
  continue reading
 
Artwork

1
HowTo Linux MP3

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
HowTo Linux HD

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork

1
HowTo Linux OGG

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork
 
Join millions of listeners tuning into The Kim Komando Show, the award-winning weekly radio program airing on over 420 stations nationwide and available on-demand. Kim Komando, the trusted digital expert, brings you the latest cutting-edge gadgets, urgent tech news, and vital privacy tips to keep you secure online. Every hour, Kim engages with callers, tackling a wide array of digital life challenges. Don’t be left behind in the ever-evolving tech world. Listen just once and you'll be hooked ...
  continue reading
 
Artwork
 
A weekly podcast about life, technology, entertainment, and business in general. Things in our focus: deep tech, mental health, community initiatives, artificial intelligence, blockchain, gaming and gambling, esports, augmented reality, virtual reality, marketing, creative thinking, fintech, and many more. The talks are hosted by Zoltan "Hawkie".
  continue reading
 
Artwork
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
  continue reading
 
Artwork
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
Artwork

1
Beyond Politics

Matt Robison

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Politics may be dismal, but the ideas that swirl around it and shape it are fascinating. This is a show that looks not just at politics, but the deeper ideas from history, science, psychology, economics, and technology that are shaping our world. We feature smart, lively, upbeat discussions with people who know what they're talking about and can help us understand the world better. Hosted by Matt Robison: writer, former senior congressional staffer, and campaign manager.
  continue reading
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
The #1 Apple Music History Podcast Rootsland chronicles the extraordinary true story of Henry "K" Karyo - one of the first American producers to move to Kingston, Jamaica, immersing himself completely in reggae's underground scene. From disillusioned justice major to indie label owner, Henry navigates Jamaica's merciless music industry while building authentic friendship with legendary artists and finding unexpected love. This isn't just a music podcast - it's a raw, first-person account of ...
  continue reading
 
Artwork

1
Cutting Through the Matrix with Alan Watt Podcast (.xml Format)

Alan Watt ( cuttingthroughthematrix.com & alanwattsentientsentinel.eu )

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Alan Watt gives you Both an Historical and Futuristic Tour on who runs society, gives you your thoughts, trends, your entire reality - through media, entertainment and 'education'. This is a controlled global society, planned long ago by an elite group working intergenerationally. Listen to its goals, its history, Working Groups and Techniques.
  continue reading
 
Artwork

1
Network Break

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
  continue reading
 
Loading …
show series
 
--{ "Put a Firewall Around Your Mind"}--Adam Curtis documentary, Can't Get You Out of My Head - What we're told and shown from talking heads about Charlie Kirk, Israel - Constant Conflict - CFR/RIIA and New American Century's Agenda - Psychological Operations, You are the Target - Microwave and Frequency Weapons, Psychotronic Technology - The Mind …
  continue reading
 
When Danny Kim was nearly crushed by the 4,000-pound chassis of a truck he was working on, he had an epiphany. What if he could make an entirely new kind of car that combined the efficiency of a motorcycle with the safety of a regular car? Lit Motors was born. Bradley talks to Danny about his vision for a two-wheel vehicle with the soul of a spaces…
  continue reading
 
In this episode, Ryan Williams Sr. and Shannon Tynes discuss various cybersecurity topics, including the alarming trend of children hacking their schools, the need for better cybersecurity education, and the modernization of the CVE program. They also explore the role of AI in streamlining cybersecurity processes and the importance of maintaining h…
  continue reading
 
In this conversation, Erez Zevulunov and Ryan Morris discuss the challenges and realities of AI deployment in businesses. They explore the hype cycle surrounding new technologies, the importance of human involvement in AI implementation, and the potential for job transformation rather than outright displacement. The discussion emphasizes the need f…
  continue reading
 
🎙️ Ukraine DDoS Russian Election, 500GB Great Firewall Leak, Uvalde Schools Ransomware 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 980: Today's episode will discuss the latest news as Ukraine DDoS Russian Election with more news below: · China's Internet Watchdog Mandates 1-Hour…
  continue reading
 
In this week’s episode of China Insider, Miles Yu covers the recent anti-corruption movement and Gen Z protests that ousted former Prime Minister Oli and government officials, and examine China's role in the transition to the new interim government. Next, Miles breaks down the latest from US-China trade talks in Madrid, as the US seeks to advance t…
  continue reading
 
Artificial Intelligence (AI) is the Big Tech buzzword of the day. Every company who wants investment (public or private) is scrambling to have an “AI story”, adding chatbots and ‘agentic’ features in their products wherever possible. The AI companies themselves are constantly expanding their models, ingesting as much data (including highly personal…
  continue reading
 
Ah yes, it’s that time of year when Apple Computer announces their latest offerings, the iPhone 17 series, the Apple Watch 11, Airpods Pro 3 and the iPhone Air. Sadly our Apple buddy, Taylor Barcroft, had a recent stroke and is currently recovering in a rehab center in nearby Capitola. But given the significance of this massive Apple event and Tayl…
  continue reading
 
**Please subscribe to Matt's ⁠Substack⁠ at https://worthknowing.substack.com/*** The Judicial Branch Is Our Last Line of Defense Against Trump. Is It Holding?Join Matt Robison and legal expert Kim Wehle as they explore the judiciary's role in countering the unprecedented consolidation of power and abuse of the law by the Trump administration. Amid …
  continue reading
 
Help Wanted: What are these odd requests about? An odd request is hitting a number of our honeypots with a somewhat unusual HTTP request header. Please let me know if you no what the request is about. https://isc.sans.edu/forums/diary/Help+Wanted+What+are+these+odd+reuqests+about/32302/ Forta GoAnywhere MFT Vulnerability Forta s GoAnywhere MFT prod…
  continue reading
 
SANS Stormcast Monday, September 22nd, 2025: Odd HTTP Reuqest; GoAnywhere MFT Bug; EDR Freeze Help Wanted: What are these odd requests about? An odd request is hitting a number of our honeypots with a somewhat unusual HTTP request header. Please let me know if you no what the request is about. https://isc.sans.edu/forums/diary/Help+Wanted+What+are+…
  continue reading
 
Read the full transcript with translations in multiple languages: 在台湾,阿美族的Omah Canglah说:“原住民族的语言也可以很现代!” - In Taiwan, Omah Canglah of the Amis tribe says: "Indigenous languages can also be very modern!"By Easy Mandarin News
  continue reading
 
Forget peanuts. Airlines are quietly handing over five billion passenger records to the feds. Then, I talk to Brian, a grieving uncle who wants to name his pond on Google Maps after his niece but isn’t sure how to get started. Plus, the U.S. keeps TikTok alive, and one woman keeps getting tickets for cars she’s never even seen. Learn more about you…
  continue reading
 
Why can’t we seem to agree on facts? In this succinct volume, sociologist Joel Best turns his inimitable eye toward the social construction of what we think is true. He evaluates how facts emerge from our social worlds—including our beliefs, values, tastes, and norms—and how they align with those worlds’ standards. He argues that by developing a so…
  continue reading
 
Since the beginning of the twentieth century, modern Chinese intellectuals, reformers, revolutionaries, leftist journalists, and idealistic youth often crossed the increasing gap between the city and the countryside, which made the act of "going to the countryside" a distinctively modern experience and a continuous practice in China. Such a spatial…
  continue reading
 
Since the beginning of the twentieth century, modern Chinese intellectuals, reformers, revolutionaries, leftist journalists, and idealistic youth often crossed the increasing gap between the city and the countryside, which made the act of "going to the countryside" a distinctively modern experience and a continuous practice in China. Such a spatial…
  continue reading
 
Peter House from Deep Tree talks about current cybersecurity threats with host Mike Chmielewski. Mike and Peter discussed the Anchorge Neighborhood Health Services breach, which involved 60,000 patients' records. Peter explained that healthcare is a favorite target due to the diverse information available in the records. Elections are coming up soo…
  continue reading
 
The murder of Turning Point USA Founder Charlie Kirk echoes throughout our lives on the news, social media, and in the troubling commentary of those who embrace violence.This week, Pastor Brian Solomon and Pastor Brian Hanson from Ohio Capitol Ministries join the President's Podcast with some straight talk over some tough topics during these diffic…
  continue reading
 
***Please subscribe to Matt's ⁠Substack⁠ at https://worthknowing.substack.com/***Beyond Politics: The Rapid Shifts in Trump's AmericaMatt Robison discusses the swift changes in the political landscape, focusing on Trump's increasing authoritarianism and its implications. Taken from Matt's recent interview on Howard Monroe's radio show, where they d…
  continue reading
 
How do new ideas and beliefs take root when they cross cultural and linguistic borders? In seventeenth-century Taiwan, both Dutch and Spanish missionaries tried to replace Indigenous gods, practices, and laws with their own Christian traditions. Christopher Joby’s Christian Mission in Seventeenth-Century Taiwan: A Reception History of Texts, Belief…
  continue reading
 
How do new ideas and beliefs take root when they cross cultural and linguistic borders? In seventeenth-century Taiwan, both Dutch and Spanish missionaries tried to replace Indigenous gods, practices, and laws with their own Christian traditions. Christopher Joby’s Christian Mission in Seventeenth-Century Taiwan: A Reception History of Texts, Belief…
  continue reading
 
Exploring Uploads in a Dshield Honeypot Environment This guest diary by one of our SANS.edu undergraduate interns shows how to analyze files uploaded to Cowrie https://isc.sans.edu/diary/Exploring%20Uploads%20in%20a%20Dshield%20Honeypot%20Environment%20%5BGuest%20Diary%5D/32296 Sonicwall Breach SonicWall MySonicWall accounts were breached via crede…
  continue reading
 
SANS Stormcast Friday, September 19th, 2025: Honeypot File Analysis (@sans_edu); SonicWall Breach; DeepSeek Bias; Chrome 0-day Exploring Uploads in a Dshield Honeypot Environment This guest diary by one of our SANS.edu undergraduate interns shows how to analyze files uploaded to Cowrie https://isc.sans.edu/diary/Exploring%20Uploads%20in%20a%20Dshie…
  continue reading
 
🎙️ JLR Cyber Shockwave Hits Auto Sector, ShinyHunters Claims 1.5B Salesforce Records, SonicWall Breach 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 982: Today's episode will discuss the latest news as JLR Cyber Shockwave Hits Auto Sector with more news below: · Details Emerge on …
  continue reading
 
The Wound Man—a medical diagram depicting a figure fantastically pierced by weapons and ravaged by injuries and diseases—was reproduced widely across the medieval and early modern globe. In Wound Man: The Many Lives of a Surgical Image (Princeton University Press, 2025), Dr. Jack Hartnell charts the emergence and endurance of this striking image, u…
  continue reading
 
Archival Research in Historical Organisation Studies: Theorising Silences offers an accessible account of theorising the archive, contesting the narrow definitions of the archive with a view beyond a mere repository of documents. Scholars Gabrielle Durepos and Amy Thurlow discuss the ways that business archives have marginalized various populations…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play