Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
…
continue reading
Firewall Podcasts
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Interviews with Scholars of East Asia about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/east-asian-studies
…
continue reading
Where we talk and discuss what the great firewall of China is, and the ethics of it Cover art photo provided by JJ Ying on Unsplash: https://unsplash.com/@jjying
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Training of Aria Technologies products including Ericsson-LG, Lancom Systems, Star Leaf, So Connect, Jabra, xmedius, Checkpoint, NBN, iPECS2Teams
…
continue reading
China Insider is a weekly podcast project from Hudson Institute's China Center, hosted by Miles Yu, who provides weekly news that mainstream American outlets often miss, as well as in-depth commentary and analysis on the China challenge and the free world’s future.
…
continue reading
A great WordPress.com site
…
continue reading
LIVE Call in Tuesdays 2:00-3:00 PMn (PST), www.drfutureshow.com/archives
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
A place for time travellers to consult records of the future during eternity
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Interviews with Scholars of China about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/chinese-studies
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
Twice per month, Peter House and Mike Chmielewski discuss current cyberthreats and issues. Internet Weather Report is recorded at the studios of Big Cabbage Radio in Palmer, Alaska.
…
continue reading
Interview with Scholars of Journalism about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/journalism
…
continue reading
Get the perspective you won't hear or read about anywhere else from Ohio Senate President Rob McColley. A weekly feature from "On The Record with The Ohio Senate-The Views, The News, Excludes."
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Politics may be dismal, but the ideas that swirl around it and shape it are fascinating. This is a show that looks not just at politics, but the deeper ideas from history, science, psychology, economics, and technology that are shaping our world. We feature smart, lively, upbeat discussions with people who know what they're talking about and can help us understand the world better. Hosted by Matt Robison: writer, former senior congressional staffer, and campaign manager.
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
The #1 Apple Music History Podcast Rootsland chronicles the extraordinary true story of Henry "K" Karyo - one of the first American producers to move to Kingston, Jamaica, immersing himself completely in reggae's underground scene. From disillusioned justice major to indie label owner, Henry navigates Jamaica's merciless music industry while building authentic friendship with legendary artists and finding unexpected love. This isn't just a music podcast - it's a raw, first-person account of ...
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
SecurityGen
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading

1
Cutting Through the Matrix with Alan Watt Podcast (.xml Format)
Alan Watt ( cuttingthroughthematrix.com & alanwattsentientsentinel.eu )
Alan Watt gives you Both an Historical and Futuristic Tour on who runs society, gives you your thoughts, trends, your entire reality - through media, entertainment and 'education'. This is a controlled global society, planned long ago by an elite group working intergenerationally. Listen to its goals, its history, Working Groups and Techniques.
…
continue reading
Tech Transformation with Evan Kirstel: A podcast exploring the latest trends and innovations in the tech industry, and how businesses can leverage them for growth, diving into the world of B2B, discussing strategies, trends, and sharing insights from industry leaders! With over three decades in telecom and IT, I've mastered the art of transforming social media into a dynamic platform for audience engagement, community building, and establishing thought leadership. My approach isn't about per ...
…
continue reading

1
How AI-Driven Resilience Fixes Firewall Misconfigurations and Closes Security Gaps
16:31
16:31
Play later
Play later
Lists
Like
Liked
16:31Interested in being a guest? Email us at [email protected] A single unchecked setting can hand your network to an attacker—and it happens more often than most teams admit. We sit down with Adam BennettCo-Founder and CEO from SureStack to unpack how “resilient intelligence” marries standards, deep practitioner experience, and AI to find misconfi…
…
continue reading
Matt Stoller, author of the Substack newsletter BIG, joins Bradley to dig into how the rise of AI mirrors the early internet—when regulators failed to check the dominance of Google, Facebook, and others. Stoller argues that America’s political elites, especially under Obama, confused “freedom from restriction” with “freedom from mastery,” enabling …
…
continue reading

1
Every Government Shutdown is a National Cybersecurity Risk
55:53
55:53
Play later
Play later
Lists
Like
Liked
55:53In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams and Shannon Tynes discuss the latest cybersecurity news, including the implications of the government shutdown on cybersecurity operations, emerging threats like Comet Jacking, and China's severe penalties for cybercriminals. They also share personal updates and reflecti…
…
continue reading
There are literally billions of devices connected to the internet today – many of them cheap, insecure IoT devices… smart thermostats, doorbell cameras, webcams, cheap WiFi routers and other smart appliances. As we like to say, the “S” in “IoT” is for security. And when insecure devices are no longer supported, the security bugs will never be fixed…
…
continue reading
Major federal cybersecurity programs expire amidst the government shutdown. Global leaders and experts convene in Riyadh for the Global Cybersecurity Forum. NIST tackles removable media. ICE buys vast troves of smartphone location data. Researchers claim a newly patched VMware vulnerability has been a zero-day for nearly a year. ClickFix-style atta…
…
continue reading
Critical Vulnerabilities and AI Voice Cloning Risks in Cybersecurity In this episode of Cybersecurity Today, host Jim Love discusses key cybersecurity threats, including critical vulnerabilities in Sudo and Cisco firewalls, and a remote command flaw in Western Digital MyCloud devices. The show highlights efforts by national security agencies in the…
…
continue reading

1
NB545: CISA Orders Immediate Patch of Cisco Vulnerabilities; Firewall Upgrade Blocks Emergency Calls
22:30
22:30
Play later
Play later
Lists
Like
Liked
22:30There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federa…
…
continue reading

1
UK Gov $1.5B JLR Intervention, RTX Boarding Software Ransomware, Cisco Firewall Zero-Days
19:09
19:09
Play later
Play later
Lists
Like
Liked
19:09🎙️ UK Gov $1.5B JLR Intervention, RTX Boarding Software Ransomware, Cisco Firewall Zero-Days 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 985: Today's episode will discuss the latest news as UK Gov $1.5B JLR Intervention with more news below: · British Department Store Harrods Wa…
…
continue reading

1
Cisco firewall zero-days and bootkits in the wild
1:54:49
1:54:49
Play later
Play later
Lists
Like
Liked
1:54:49Three Buddy Problem - Episode 65: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco’s 5500-X series appliances, devices that sit at the h…
…
continue reading

1
243 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 2
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38Enjoying the content? Let us know your feedback! Welcome back and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain English. I am your host Ibrahim Yusuf... This is part 2 of where we will continue covering the debate that's been heating up in security circles: Are We…
…
continue reading

1
Sept. 21, 2025 "Cutting Through the Matrix" with Alan Watt --- Redux (Educational Talk From the Past): "Put a Firewall Around Your Mind"
1:25:46
1:25:46
Play later
Play later
Lists
Like
Liked
1:25:46--{ "Put a Firewall Around Your Mind"}--Adam Curtis documentary, Can't Get You Out of My Head - What we're told and shown from talking heads about Charlie Kirk, Israel - Constant Conflict - CFR/RIIA and New American Century's Agenda - Psychological Operations, You are the Target - Microwave and Frequency Weapons, Psychotronic Technology - The Mind …
…
continue reading

1
Beyond the Firewall | Episode 9 - Why 95% of AI Projects Fail
36:20
36:20
Play later
Play later
Lists
Like
Liked
36:20In this conversation, Erez Zevulunov and Ryan Morris discuss the challenges and realities of AI deployment in businesses. They explore the hype cycle surrounding new technologies, the importance of human involvement in AI implementation, and the potential for job transformation rather than outright displacement. The discussion emphasizes the need f…
…
continue reading

1
Chetan Conikee: Create narratives of your journey. [CTO] [Career Notes]
10:29
10:29
Play later
Play later
Lists
Like
Liked
10:29Please enjoy this encore of Career Notes. Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. When choosing a career, Chetan notes that "the liking and doing has to matter and be in conjunction with each other." Explaining the parallels in his home country of India and where he studied hi…
…
continue reading

1
Apple Exploit-Chain Bounties, Wireless Proximity Exploits and Tactical Suitcases
2:23:02
2:23:02
Play later
Play later
Lists
Like
Liked
2:23:02Three Buddy Problem - Episode 67: We discuss the rise of automated red-teaming, Apple’s $2 million exploit chain bounties aimed at outbidding spyware brokers and the iPhone maker's focus on wireless proximity attacks and “tactical suitcase” Wi-Fi exploits. We also hit the news of Paragon spyware targeting European executives and the bizarre story o…
…
continue reading

1
No honor among thieves. [Research Saturday]
25:03
25:03
Play later
Play later
Lists
Like
Liked
25:03John Fokker, Head of Threat Intelligence at Trellix is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. Once united through Ransomware-as-a-Service programs, gangs are now turning on each other — staging hacks, public feuds, an…
…
continue reading

1
The Role and Evolution of Virtual CISOs with Craig Taylor
51:54
51:54
Play later
Play later
Lists
Like
Liked
51:54In this episode of Cybersecurity Today, Jim hosts Craig Taylor, a seasoned virtual Chief Information Security Officer (vCISO) with over 25 years of experience. They discuss the evolution and significance of the vCISO role, Taylor's career path, and the founding of his company, Cyber Hoot, which provides cybersecurity education and vCISO services. T…
…
continue reading
International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in application security (AppSec) programs. Microsegmentation can contain ransomw…
…
continue reading

1
Why Hegseth's Insane Speech Last Week Was Actually Great
25:50
25:50
Play later
Play later
Lists
Like
Liked
25:50***Please subscribe to Matt's Substack at https://worthknowing.substack.com/***Revealing the Reality: Analyzing Trump's Unhinged Militarization On Tuesday this week, Matt was a guest on the morning show hosted by the legendary radio host Howard Monroe, and he threw Howard bit of a curve ball. Howard asked about the unhinged performances from Secr…
…
continue reading
Rootsland: Resistance – Episode 1: “The Tan Umbrella” In the debut of Rootsland: Resistance, hosts Henry K and Sia explore what it truly means to “put up resistance” — in life, in music, and in the modern world. Inspired by Beres Hammond’s timeless anthem, their conversation weaves personal stories with social truths, showing how the fight to stay …
…
continue reading

1
How a Small Team Rewrote Mobile for Billions
29:39
29:39
Play later
Play later
Lists
Like
Liked
29:39Interested in being a guest? Email us at [email protected] Your phone’s most magical moments—messages turning blue, a watch pairing in seconds, an eSIM activating from Settings, a text sent from the middle of nowhere—don’t happen by accident. They ride on a quiet protocol called entitlements, and today we sit down with Emir Aboulhosn, CEO of Ne…
…
continue reading

1
Robert L. Worden and Jane Leung Larson, "A Chinese Reformer in Exile: Kang Youwei and the Chinese Empire Reform Association in North America, 1899-1911" (Brill, 2025)
2:14:03
2:14:03
Play later
Play later
Lists
Like
Liked
2:14:03A Chinese Reformer in Exile: Kang Youwei and the Chinese Empire Reform Association in North America, 1899-1911 is an encyclopaedic reference work documenting the exile years of imperial China’s most famous reformer, Kang Youwei, and the political organization he mobilized in North America and worldwide to transform China’s autocratic empire into a …
…
continue reading

1
Robert L. Worden and Jane Leung Larson, "A Chinese Reformer in Exile: Kang Youwei and the Chinese Empire Reform Association in North America, 1899-1911" (Brill, 2025)
2:14:03
2:14:03
Play later
Play later
Lists
Like
Liked
2:14:03A Chinese Reformer in Exile: Kang Youwei and the Chinese Empire Reform Association in North America, 1899-1911 is an encyclopaedic reference work documenting the exile years of imperial China’s most famous reformer, Kang Youwei, and the political organization he mobilized in North America and worldwide to transform China’s autocratic empire into a …
…
continue reading

1
Teenage Ransomware Arrest In Day Care Ransom
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Cybersecurity Today: Teenage Ransomware Arrests, GoAnywhere Critical Flaw, and Google AI Vulnerability In this episode of Cybersecurity Today, hosted by Jim Love, two teenagers were arrested in London for a ransomware attack on Kiddo International preschools, involving child data extortion. The show discusses a critical vulnerability in GoAnywhere …
…
continue reading

1
SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike “Issues”; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper)
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to…
…
continue reading

1
SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike “Issues”; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper) (#)
15:13
15:13
Play later
Play later
Lists
Like
Liked
15:13SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike “Issues”; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper) https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Defending against attacks like RedTail is more then blocking IoCs, but instead…
…
continue reading

1
Cyber defenders pulled into deportation duty.
29:49
29:49
Play later
Play later
Lists
Like
Liked
29:49DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment…
…
continue reading

1
The Ohio Senate's Strong Fall Agenda with Senate President Rob McColley
37:15
37:15
Play later
Play later
Lists
Like
Liked
37:15Property Tax Reform Veto Overrides to Ohio's Constitutional Redistricting Process. This week Ohio Senate President Rob McColley returns to the President's Podcast and delivers a straightforward conversation about why the General Assembly's property tax reforms are critical for Ohio homeowners. President McColley also describes the process Ohio vote…
…
continue reading

1
What's Happening Inside the #1 Bellwether Election in America?
37:48
37:48
Play later
Play later
Lists
Like
Liked
37:48***Please subscribe to Matt's Substack at https://worthknowing.substack.com/*** The one election race that gives the most insight into the state of politics in America right now is the campaign for Bucks County District Attorney in Pennsylvania. Bucks County is the true swingiest of swing counties in one of the few--and biggest--swing states in …
…
continue reading

1
Chinese Hackers Hit Law Firm Zero-Day, Discord 55M Users Breach, SonicWall All Configs Stolen
15:31
15:31
Play later
Play later
Lists
Like
Liked
15:31🎙️ Chinese Hackers Hit Law Firm Zero-Day, Discord 55M Users Breach, SonicWall All Configs Stolen 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 991: Today's episode will discuss the latest news as Chinese Hackers Hit Law Firm Zero-Day with more news below: · Hacktivists Target Crit…
…
continue reading

1
SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln;
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnerability A user cloning a git repository may be tricked into executing arbitrary code via…
…
continue reading

1
SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln; (#)
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln; Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnera…
…
continue reading

1
133 Future Now Show - Interstellar Object passes Mars as we watch closely, OpenAI Raises the Bar on AI Video & Agents, Interview - Max Van Praag takes us into his epic Wild Wild West tour.
1:25:27
1:25:27
Play later
Play later
Lists
Like
Liked
1:25:273I/ATLAS just passed Mars and all our Martian assets were tracking..Sadly, NASA is officially closed due to the federal government shutdown, but nonetheless, our orbiters and landers were tracking our visitor from the Milky Way’s thin disk, where the youngest and oldest stars of our galaxy meet. Be it sentient or not, it has tales to tell.. This we…
…
continue reading

1
133 Future Now Show - Interstellar Object passes Mars as we watch closely, OpenAI Raises the Bar on AI Video and Agents, Interview - Max Van Praag takes us into his epic Wild Wild West tour.
Listen Now to 133 Future Now Show 3I/ATLAS just passed Mars and all our Martian assets were tracking..Sadly, NASA is officially closed due to the federal government shutdown, but nonetheless, our orbiters and landers were tracking our visitor from the Milky Way’s thin disk, where the youngest and oldest stars of our galaxy meet. Be it sentient or n…
…
continue reading
Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setu…
…
continue reading

1
How AI Maps the Earth Beneath Our Feet to De-Risk Megaprojects
14:15
14:15
Play later
Play later
Lists
Like
Liked
14:15Interested in being a guest? Email us at [email protected] What if the riskiest part of a megaproject is the part you can’t see? We sit down with Jeremy Suard CEO and co-founder of Exodigo, to unpack how multi-sensor scanning and decision-support AI reveal the utilities and soil conditions that make or break billion-dollar timelines. Instead of…
…
continue reading

1
Avnet Breach Data Unreadable, Salesforce Refuses Ransom, North Korea Stole $2B Crypto
19:05
19:05
Play later
Play later
Lists
Like
Liked
19:05🎙️ Avnet Breach Data Unreadable, Salesforce Refuses Ransom, North Korea Stole $2B Crypto 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 990: Today's episode will discuss the latest news as Avnet Breach Data Unreadable with more news below: · DraftKings Warns Users of Credential Stu…
…
continue reading

1
Joshua Eisenman and David H. Shinn, "China's Relations with Africa: A New Era of Strategic Engagement" (Columbia UP, 2023)
1:42:23
1:42:23
Play later
Play later
Lists
Like
Liked
1:42:23Since Xi Jinping’s accession to power in 2012, nearly every aspect of China’s relations with Africa has grown dramatically. Beijing has increased the share of resources it devotes to African countries, expanding military cooperation, technological investment, and educational and cultural programs as well as extending its political influence. China'…
…
continue reading
By Jim Love
…
continue reading

1
SANS Stormcast Wednesday, October 8th, 2025: FreePBX Exploits; Disrupting Teams Threats; Kibana and QT SVG Patches
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57By Dr. Johannes B. Ullrich
…
continue reading

1
SANS Stormcast Wednesday, October 8th, 2025: FreePBX Exploits; Disrupting Teams Threats; Kibana and QT SVG Patches (#)
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57
…
continue reading

1
Legal Superstar Glenn Kirschner: Three Reasons I'm Now Optimistic About Trump Floundering
1:03:45
1:03:45
Play later
Play later
Lists
Like
Liked
1:03:45
…
continue reading