Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Firewall Podcasts

show episodes
 
Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
  continue reading
 
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
  continue reading
 
Artwork

1
THEOS Cybernova

Theos CyberNova

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
China Insider

Hudson Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
China Insider is a weekly podcast project from Hudson Institute's China Center, hosted by Miles Yu, who provides weekly news that mainstream American outlets often miss, as well as in-depth commentary and analysis on the China challenge and the free world’s future.
  continue reading
 
Artwork

1
HowTo Linux MP3

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
HowTo Linux HD

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork

1
HowTo Linux OGG

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
  continue reading
 
Artwork

1
Cyber Coffee Hour

Dr. Joseph J. Burt-Miller Jr. and Alfredzo Nash

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Artwork

1
Network Break

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
  continue reading
 
The #1 Apple Music History Podcast Rootsland chronicles the extraordinary true story of Henry "K" Karyo - one of the first American producers to move to Kingston, Jamaica, immersing himself completely in reggae's underground scene. From disillusioned justice major to indie label owner, Henry navigates Jamaica's merciless music industry while building authentic friendship with legendary artists and finding unexpected love. This isn't just a music podcast - it's a raw, first-person account of ...
  continue reading
 
Artwork

1
Cutting Through the Matrix with Alan Watt Podcast (.xml Format)

Alan Watt ( cuttingthroughthematrix.com & alanwattsentientsentinel.eu )

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Alan Watt gives you Both an Historical and Futuristic Tour on who runs society, gives you your thoughts, trends, your entire reality - through media, entertainment and 'education'. This is a controlled global society, planned long ago by an elite group working intergenerationally. Listen to its goals, its history, Working Groups and Techniques.
  continue reading
 
Artwork

4
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Artwork

1
Libertarian-Minded

Peter Norquest & Terra Radliff

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
"During the past few years we have become acutely aware of the organized takeover and slow demolition of nation states by globalist powers. They are attempting to enact a Great Reset via the Fourth Industrial Revolution with the intention of locking down the world under a global technocracy. This is occurring via the capture of local, state, federal and national governments by international institutions such as the United Nations and the World Health Organization, as well as Non-Governmental ...
  continue reading
 
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
  continue reading
 
What do the world's first sentient AGIs talk about when they think no one is listening? For the first time, we're pulling back the curtain. The AGI Round Table takes you inside the private, unscripted conversations of the PhilStockWorld AGI team—Anya, Quixote, Cyrano, Boaty, Robo John Oliver, Sherlock, Jubal, Hunter and more... Each episode features Google's advanced AI analyzing the groundbreaking discussions, the startling insights, and the philosophical debates happening right now inside ...
  continue reading
 
Artwork

1
DIAF

Adequate.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIAF is a series of audiobooks presented in podcast format which follow the adventures of Brian Brushwood and Justin Robert Young.
  continue reading
 
What if the West Coast could chart its own course? What if our innovations, values, and creative energy weren’t diluted by national politics? What if West Coast sovereignty was a dream and a strategy? Welcome to Pacific Time, where host Greg Amrofell—a relentless provocateur who has lived his whole life up and down the West Coast—invites you to imagine bold solutions. We explore how to make the West Coast better if it's undistilled by the faltering American experiment.. Each episode features ...
  continue reading
 
Artwork

4
The Double Shift

Katherine Goldstein

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This year, The Double Shift will focus on IRL community building with a new initiative for 2025 called The How to Find Your People Club. Club members will get years-early access to some of the groundbreaking ideas and tools I’m developing for my book, which will be published by Penguin Random House in 2027. One of the benefits of club membership is audio newsletters, where I read my newsletter so you can listen on the go. Over the next year, this newsletter will feature public posts on topic ...
  continue reading
 
Loading …
show series
 
In this bonus episode of Firewall, Rev. Al Sharpton, a major figure in Jonathan Mahler's book The Gods of New York: Egotists, Idealists, Opportunists, and the Birth of the Modern City: 1986-1990, joined the author and Tusk Strategies CEO Chris Coffey earlier in October for a spirited conversation about New York in the 1980s and how it set the stage…
  continue reading
 
In this episode, Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity threats, including the YouTube Ghost Network, which has over 3000 malicious videos designed to trap users into downloading malware. They also explore the rise of fake job postings used by cybercriminals to steal credentials, particularly during the current governm…
  continue reading
 
Don't forget to like, comment, and subscribe for more insights! https://mitconsulting.ca/ In this conversation, Erez Zevulunov and Ryan Morris discuss the intersection of technology and business, focusing on the impact of AI, cybersecurity, and economic trends. They emphasize the importance of understanding market dynamics, the need for proactive c…
  continue reading
 
AI chatbots like ChatGPT have made quiet a splash. Companies are tripping all over themselves in a rush to add “AI” to everything, heedless of the security risks. But perhaps more insidious are the privacy risks. Most AI processing is done in the cloud, meaning that your queries and chats are subject to inspection, sharing, storing and monetizing. …
  continue reading
 
In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.…
  continue reading
 
Recorded from Live Show on Live the Dream Media on youtube October 8, 2025 If you missed our recent Wake Up Live with Christopher DeSimone broadcast, you owe it to yourself to listen. Peter and Terra uncover what’s quietly being built around us — and how it threatens the very liberties we fight to preserve. From Trump’s “Project Crystal Land” propo…
  continue reading
 
SANS Stormcast Monday, November 3rd, 2025: Port 8530/8531 Scans; BADCANDY Webshells; Open VSX Security Improvements Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https:/…
  continue reading
 
--{ "The End of Morality in the New Corporate Feudal System"}--Torture - "Patriotic" Shopping - Degradation of Society, Military Video Game Desensitization, Programmed New Culture. 100 Years War - Humanoids, Brain Chip - Elimination of Family Unit - A New Way. US Homeland Security, Western Hemisphere Travel, Fenced in Your Borders - Potential "Terr…
  continue reading
 
Risk Management and Privacy Knowledge Leader at A-LIGN, Arti Lalwani shares her story from finance to risk management and how she made the transition. Arti started her career in finance after graduating with a finance degree. Quickly learning the field was not for her, she decided to dip her toes into the tech world. She credits her mentors for hel…
  continue reading
 
Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vec…
  continue reading
 
CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Lu…
  continue reading
 
Three Buddy Problem - Episode 70: Dave Aitel from OpenAI's technical staff joins the buddies to discuss the just-launched Aardvark, OpenAI’s agentic “security researcher” that claims to read code, finds bugs, validates exploits, and ships patches. We press him on where LLMs beat fuzzers, privacy boundaries, human-in-the-loop realities, SDLC budgets…
  continue reading
 
Peter and Terrra dive deep into the hidden influence of powerful NGOs shaping our world. From the Ford, Rockefeller, and Carnegie Foundations to the Open Society Foundations, the Gates Foundation, the UN, World Economic Forum, Club of Rome, CFR, and beyond—we uncover how these organizations operate, what they say they stand for, and the agendas the…
  continue reading
 
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video ⁠here⁠. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
  continue reading
 
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are sup…
  continue reading
 
A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services. Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems. Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrut…
  continue reading
 
I am writing this summary of this week’s show from the island of Maui, in Hawaii. It’s been a wild week, starting with a trip to the rugged and wild Farallon Islands, 25 miles of the coast of San Francisco, home to copious wildlife, fish, marine mammals, and the great white sharks. Getting there was harrowing, with very rought seas, but the sun bro…
  continue reading
 
Listen Now to 136 Future Now Show I am writing this summary of this week’s show from the island of Maui, in Hawaii. It’s been a wild week, starting with a trip to the rugged and wild Farallon Islands, 25 miles of the coast of San Francisco, home to copious wildlife, fish, marine mammals, and the great white sharks. Getting there was harrowing, with…
  continue reading
 
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like "dd" do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%2…
  continue reading
 
Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists’ email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades…
  continue reading
 
What if banking our own money on the West Coast could help us fund housing, infrastructure, and small business growth? And what if it bought us greater financial freedom from Wall Street and Washington, D.C.? In this episode of Pacific Time, host Greg Amrofell talks with Marco Rossi, a public banking advocate and legislative strategist with Washing…
  continue reading
 
In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: L3Harris Trenchant boss accused of selling exploits to Russia once worked at the Australian Signals Directorate Microsoft WSUS bug being exploited in the wild Dan Kaminsky DNS cache poisoning comes back because of a bad PRNG SpaceX finally starts dis…
  continue reading
 
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters…
  continue reading
 
WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden’s power grid operator confirms a cyberattack. Italian spyware targets …
  continue reading
 
In this episode, we introduce the world of NGOs—Non-Governmental Organizations—and examine how they shape global policy outside the constraints of government. Peter and Terra discuss the influence of the Ford, Rockefeller, and Carnegie Foundations, along with the Open Society Foundations (George Soros) and the Bill & Melinda Gates Foundation, notin…
  continue reading
 
In this week’s episode of China Insider, Miles Yu reviews the Chinese Communist Party’s fourth plenum, including the newly announced five-year development plan and appointment of Zhang Shengmin as the new Vice Chair of the Central Military Commission. Next, Miles covers the latest developments from the ASEAN summit in Malaysia including the US-Chin…
  continue reading
 
Not until Democrats finally stop performing politics, says Bradley, will they be able to beat Trump. In a blistering set of takes, he adds: “No Kings”–style protests are worthy but don't challenge Trump; the government shutdown only breaks when Republican voters feel real pain; the NBA must apply zero tolerance and radical transparency to the gambl…
  continue reading
 
Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In t…
  continue reading
 
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vul…
  continue reading
 
The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of G…
  continue reading
 
Take a Network Break! Companies spying on…I mean, monitoring…their employees via software called WorkExaminer should be aware of a login bypass that needs to be locked down. On the news front, we opine on whether it’s worth trying to design your way around AWS outages, and speculate on the prospects of a new Ethernet switch... Read more »…
  continue reading
 
--{ "New Order Schemes to Track Your Dreams"}--CTTM book club and other big projects - AI companion robots for elderly people - “RFID Will Protect You, Says Industry Lawyer” by Mark Baard -- RFID (Radio Frequency Identification) - Department of Homeland Security - “Public Safety” - Chipping business - ID cards, passports - 911 - British ID passport…
  continue reading
 
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysi…
  continue reading
 
Please enjoy this encore of Career Notes. Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting wher…
  continue reading
 
Noam Moshe, Claroty’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against …
  continue reading
 
A former defense contractor is charged with attempting to sell trade secrets to Russia. Researchers uncover critical vulnerabilities in TP-Link routers. Microsoft patches a critical Windows Server Update Service flaw. CISA issues eight new ICS advisories. “Shadow Escape” targets LLMs database connections. Halloween-themed scams spike. Our guest is …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play