Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
…
continue reading
Firewall Podcasts
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
Beyond the Firewall is a podcast designed to help business and IT leaders understand how technology shapes performance, resilience, and long-term growth. Each episode delivers expert perspectives and actionable insights to help organizations stay ahead in a rapidly evolving digital landscape. You’ll hear deep dives into today’s most pressing technology topics, including artificial intelligence, cybersecurity, IT modernization, and cloud transformation. Conversations center on real-world chal ...
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Where we talk and discuss what the great firewall of China is, and the ethics of it Cover art photo provided by JJ Ying on Unsplash: https://unsplash.com/@jjying
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Training of Aria Technologies products including Ericsson-LG, Lancom Systems, Star Leaf, So Connect, Jabra, xmedius, Checkpoint, NBN, iPECS2Teams
…
continue reading
A great WordPress.com site
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
5 Bytes Podcast features some of the highlights in enterprise IT for the last week as well as some useful resources for IT Pros and more!
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Politics and Culture video pod with Obama White House work spouses turned politically codependent besties. @carritwigg @bradjenkins
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
A podcast dedicated to exploring the magic, mess, and mastery of innovation. Learn more about how WEtech Alliance helps innovation and tech-based businesses start, sell and scale: www.wetech-alliance.com
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
This Week in NET is Cloudflare’s weekly roundup exploring the Internet’s past, present, and future. Hosted by João Tomé with expert guests, it shares insights that matter to developers, businesses, and Internet enthusiasts alike. Follow us on X: @CloudflareTV and @Cloudflare Read our blog posts at blog.cloudflare.com Watch our full video library at cloudflare.tv/ThisWeekInNet
…
continue reading
An educational resource for planning purposes in relation to Architecture, development and construction. Tailored for doers and professionals. Providing applicable knowledge and insight to ensure proper planning and project success.
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
SecurityGen
…
continue reading
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to Agriculture and Agri-Food Canada’s podcast series that explores the freshest ideas in agriculture and food. Each episode explores a single topic in depth—digging deep into new practices, innovative ideas, and their impacts on the industry. Learn about Canada’s agricultural sector from the people making the breakthroughs and knocking down the barriers! Farmers and foodies, scientists and leaders, and anyone with an eye on the future of the sector—this podcast is for you!
…
continue reading
Was America founded as a Christian Nation, or is that the most dangerous lie in modern American politics? Join Jim, an Army combat veteran who swore an oath to defend the Constitution, as he takes on the widespread propaganda of the Christian Nationalist movement. This isn't just an academic debate; for a soldier who swore to protect our republic, it's a matter of honor. Each episode of False Foundation deconstructs the historical myths, half-truths, and outright lies used to build the "Fals ...
…
continue reading
DIAF is a series of audiobooks presented in podcast format which follow the adventures of Brian Brushwood and Justin Robert Young.
…
continue reading
Founded in 2022, securitygen is a global start-up focused on telecom security.
…
continue reading
Just a London girl who happens to speak three languages. Catch me on here for VIBES.
…
continue reading
This year, The Double Shift will focus on IRL community building with a new initiative for 2025 called The How to Find Your People Club. Club members will get years-early access to some of the groundbreaking ideas and tools I’m developing for my book, which will be published by Penguin Random House in 2027. One of the benefits of club membership is audio newsletters, where I read my newsletter so you can listen on the go. Over the next year, this newsletter will feature public posts on topic ...
…
continue reading
1
Welcome to 2026: Time to build a cultural firewall
1:05:09
1:05:09
Play later
Play later
Lists
Like
Liked
1:05:09This episode of Twigg & Jenkins takes on the state of American democracy in 2026 (and it’s only been a week and a half), zooming out from any one scandal to the broader ecosystem that keeps Trumpism alive. Carri and Brad talk about a political class that feels both exhausted and reckless at the same time—Democrats who won’t fully use their power, a…
…
continue reading
What will trigger the fiercest backlash to the AI boom? Rather than job losses or generative-AI weirdness, says Bradley, it'll be data centers and their insatiable appetite for electricity. When utility bills start climbing, voters everywhere will make their wrath felt. Which means new power sources are in hot demand. Can we develop them fast enoug…
…
continue reading
1
Firewall Config Issues! MDT Retirement! Software Update from Hell!
28:34
28:34
Play later
Play later
Lists
Like
Liked
28:34I cover issues in Intune relating to Firewall configurations, the retirement of MDT, a reboot loop issue on Cisco switches, a software update from hell story plus much more!Reference Links: https://www.rorymon.com/blog/firewall-config-issues-mdt-retirement-software-update-from-hell/By Rory Monaghan
…
continue reading
AI has many problems, but also has promise. Today I’m going to focus on one particular problem that has some viable solutions: privacy. Chat bots like ChatGPT, Gemini and Claude all require your queries to be processed in the cloud. All the personal questions we ask are probably being logged against our identity and could be used to train future AI…
…
continue reading
1
The Killing of Renee Good: Lies, Rhetoric, and the Cognitive Firewall
25:15
25:15
Play later
Play later
Lists
Like
Liked
25:15This episode examines the fatal shooting of Renee Good and the rapid, misleading political rhetoric that followed, exploring how preemptive messaging and media ecosystems shaped public perception. It explains "cognitive warfare" and the "cognitive firewall"—how conservative Christian nationalism and integrated right-wing media weaponize trusted val…
…
continue reading
1
Insider Threats & Talent Gaps: Why 2026 Feels a Lot Like 2025
1:00:43
1:00:43
Play later
Play later
Lists
Like
Liked
1:00:43In this episode of the podcast, the hosts, Ryan Williams Sr., Shannon Tynes, and Chris Abacon, discuss various topics related to cybersecurity, including a significant malware attack affecting millions of browser users, the implications of insider threats within the cybersecurity industry, and the ongoing workforce gap in cybersecurity roles. They …
…
continue reading
1
Sedgwick Cyber Incident Ransomware, Trump Orders $2.9M Chips Deal Divestment, 10K Fortinet Firewalls Exposed
16:19
16:19
Play later
Play later
Lists
Like
Liked
16:19🎙️ Sedgwick Cyber Incident Ransomware, Trump Orders $2.9M Chips Deal Divestment, 10K Fortinet Firewalls Exposed 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1037: Today's episode will discuss the latest news: Rondodox Botnet Exploiting React2Shell Vulnerability Cyb…
…
continue reading
1
AI-Era AppSec: Transparency, Trust, and Risk Beyond the Firewall - Felipe Zipitria, Steve Springett, Aruneesh Salhotra, Ken Huang - ASW #363
1:06:43
1:06:43
Play later
Play later
Lists
Like
Liked
1:06:43In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely d…
…
continue reading
1
The DREAM BuildCast Ep. 7 | Adult Daycare Realities: Firewalls, I-4 Codes, Leases & Lessons Learned (ft. Yavonda, Guardian Angels ADS)
48:01
48:01
Play later
Play later
Lists
Like
Liked
48:01In Episode 7 of The DREAM BuildCast, Nicholas Robinson is joined by Alex Walker and Devon Ellis for a candid, real-world conversation with Yavonda, owner of Guardian Angels Adult Day Services, about what it actually takes to open and operate an adult daycare. This episode goes far beyond theory. Yavonda shares her personal journey — from walking aw…
…
continue reading
1
Beyond the Firewall | Episode 16-Stop Losing Time and Money| The Real Business Case for Dropbox Sign
37:53
37:53
Play later
Play later
Lists
Like
Liked
37:53In this episode of Beyond the Firewall, Erez Zevulunov and Jeff Sage from Dropbox discuss the evolving landscape of digital signatures, focusing on Dropbox Sign as a key product. They explore its user-friendly interface, integration capabilities, customizable workflows, security features, and mobile accessibility. The conversation also touches on t…
…
continue reading
1
How Converging OT And IT Protects The Systems That Run Our World
45:50
45:50
Play later
Play later
Lists
Like
Liked
45:50Operational technology runs the systems we depend on every day. Power grids, hospitals, manufacturing lines, transportation networks, and smart buildings all rely on environments where uptime directly affects safety and revenue. In this episode, we sit down with Pat Hurley and Ryan Davis from Acronis, along with Chris Daggett from HUB Tech, to expl…
…
continue reading
1
Proactive WAF Vulnerability Protection & Firewall for AI + Multiplayer Chess Demo in ChatGPT
25:43
25:43
Play later
Play later
Lists
Like
Liked
25:43In this episode of This Week in NET, we talk with Daniele Molteni, Director of Product Management for Cloudflare’s WAF, about how Cloudflare responded within hours to a newly disclosed React Server Components vulnerability — deploying global protection before the public advisory was even released. That speed matters. In just the first 11 days after…
…
continue reading
1
SANS Stormcast Thursday, January 15th, 2026: Luma Streal Repeat Infection; ServiceNow Broken Auth; Starlink/GPS Jamming (#)
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11SANS Stormcast Thursday, January 15th, 2026: Luma Streal Repeat Infection; ServiceNow Broken Auth; Starlink/GPS Jamming Infection repeatedly adds scheduled tasks and increases traffic to the same C2 domain https://isc.sans.edu/diary/Infection%20repeatedly%20adds%20scheduled%20tasks%20and%20increases%20traffic%20to%20the%20same%20C2%20domain/32628 B…
…
continue reading
Patch Tuesday fallout, China sidelines Western security vendors, and a critical flaw puts industrial switches at risk of remote takeover. A ransomware attack disrupts a Belgian hospital, crypto scams hit investment clients, and Eurail discloses a data breach. Analysts press Congress to go on offense in cyberspace, and Sean Plankey gets another shot…
…
continue reading
1
Belgian Hospital Cyberattack Shuts Servers, Microsoft Patch Tuesday 3 Zero-Days, 40 Countries NK IT Theft
16:48
16:48
Play later
Play later
Lists
Like
Liked
16:48🎙️ Belgian Hospital Cyberattack Shuts Servers, Microsoft Patch Tuesday 3 Zero-Days, 40 Countries NK IT Theft 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1043: Today's episode will discuss the latest news: Adobe Patches Critical Apache Tika Bug in ColdFusion SAP's …
…
continue reading
1
The Future Of Proactive Security Before Building an AI Enabled Enterprise - Erik Nost - BSW #430
55:30
55:30
Play later
Play later
Lists
Like
Liked
55:30The three proactive security principles of visibility, prioritization, and remediation have always been the foundation of vulnerability management teams. But these teams face continuous challenges. How do you address these challenges? Erik Nost, Senior Analyst at Forrester, joins Business Security Weekly to break down the six questions that need to…
…
continue reading
1
The Future Of Proactive Security Before Building an AI Enabled Enterprise - Erik Nost - BSW #430
55:30
55:30
Play later
Play later
Lists
Like
Liked
55:30The three proactive security principles of visibility, prioritization, and remediation have always been the foundation of vulnerability management teams. But these teams face continuous challenges. How do you address these challenges? Erik Nost, Senior Analyst at Forrester, joins Business Security Weekly to break down the six questions that need to…
…
continue reading
1
SANS Stormcast Wednesday, January 14th, 2026: Microsoft, Adobe and Fortinet Patches; ConsentFix (#)
7:58
7:58
Play later
Play later
Lists
Like
Liked
7:58SANS Stormcast Wednesday, January 14th, 2026: Microsoft, Adobe and Fortinet Patches; ConsentFix Microsoft Patch Tuesday January 2026 Microsoft released patches for 113 vulnerabilities. This includes one already exploited vulnerability, one that was made public before today and eight critical vulnerabilities. https://isc.sans.edu/diary/January%20202…
…
continue reading
1
Are you dead?, AI Hellscape, Copilot, Blue Delta, Quishing, Confer, Aaran Leyland... - SWN #546
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35Are you dead? AI Hellscape, Copilot Uninstalled?, Blue Delta, 2026 predictions, Quishing, Confer, Aaran Leyland, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-546
…
continue reading
1
Are you dead?, AI Hellscape, Copilot, Blue Delta, Quishing, Confer, Aaran Leyland... - SWN #546
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35Are you dead? AI Hellscape, Copilot Uninstalled?, Blue Delta, 2026 predictions, Quishing, Confer, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-546
…
continue reading
Stolen Target source code looks real. CISA pulls the plug on Gogs. SAP rushes patches for critical flaws. A suspected Russian spy emerges in Sweden, while Cloudflare threatens to walk away from Italy. Researchers flag a Wi-Fi chipset bug, a long-running Magecart skimming campaign, and a surge in browser-in-the-browser phishing against Facebook user…
…
continue reading
1
Is the cyber talent ecosystem broken? [CISO Perspectives]
40:36
40:36
Play later
Play later
Lists
Like
Liked
40:36Please enjoy this encore of CISO Perspectives We're sharing an episode from another N2K show we thought you might like. It's the first episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: The cyber talent ecosystem faces severe indigestion, which has stifled growth and closed doors to new talent. In this episod…
…
continue reading
1
University of Hawaii Cancer Center Ransomware, Spanish Energy Giant Endesa Breach, Target Dev Server Offline
16:40
16:40
Play later
Play later
Lists
Like
Liked
16:40🎙️ University of Hawaii Cancer Center Ransomware, Spanish Energy Giant Endesa Breach, Target Dev Server Offline 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1042: Today's episode will discuss the latest news: Russia's APT28 Targeting Energy Research Defense Collabo…
…
continue reading
1
Secure By Design Is Better Than Secure By Myth - Bob Lord - ASW #365
53:33
53:33
Play later
Play later
Lists
Like
Liked
53:33Not all infosec advice is helpful. Bad advice wastes time, makes people less secure, and takes focus away from making software more secure. Bob Lord talks about his efforts to tamp down hacklore -- the security myths and mistakes that crop up in news stories and advice to users. He talks about how these myths come about, why they're harmful, and ho…
…
continue reading
1
Secure By Design Is Better Than Secure By Myth - Bob Lord - ASW #365
53:33
53:33
Play later
Play later
Lists
Like
Liked
53:33Not all infosec advice is helpful. Bad advice wastes time, makes people less secure, and takes focus away from making software more secure. Bob Lord talks about his efforts to tamp down hacklore -- the security myths and mistakes that crop up in news stories and advice to users. He talks about how these myths come about, why they're harmful, and ho…
…
continue reading
1
Secure By Design Is Better Than Secure By Myth - Bob Lord - ASW #365
53:33
53:33
Play later
Play later
Lists
Like
Liked
53:33Not all infosec advice is helpful. Bad advice wastes time, makes people less secure, and takes focus away from making software more secure. Bob Lord talks about his efforts to tamp down hacklore -- the security myths and mistakes that crop up in news stories and advice to users. He talks about how these myths come about, why they're harmful, and ho…
…
continue reading
1
Secure By Design Is Better Than Secure By Myth - Bob Lord - ASW #365
53:33
53:33
Play later
Play later
Lists
Like
Liked
53:33Not all infosec advice is helpful. Bad advice wastes time, makes people less secure, and takes focus away from making software more secure. Bob Lord talks about his efforts to tamp down hacklore -- the security myths and mistakes that crop up in news stories and advice to users. He talks about how these myths come about, why they're harmful, and ho…
…
continue reading
1
SANS Stormcast Tuesday, January 13th, 2026: n8n got npm'ed; Gogs exploit; telegram proxy links (#)
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46SANS Stormcast Tuesday, January 13th, 2026: n8n got npm'ed; Gogs exploit; telegram proxy links n8n supply chain attack Malicious npm pagackages were used to attempt to obtain user OAUTH credentials for NPM. https://www.endorlabs.com/learn/n8mare-on-auth-street-supply-chain-attack-targets-n8n-ecosystem Gogs 0-Day Exploited in the Wild An at the time…
…
continue reading
The FBI warns of Kimsuky quishing. Singapore warns of a critical vulnerability in Advantech IoT management platforms. Russia’s Fancy Bear targets energy research, defense collaboration, and government communications. Malaysia and Indonesia suspend access to X. Researchers warn a large-scale fraud operation is using AI-generated personas to trap mob…
…
continue reading
1
Instagram Denies 17M Account Breach, $26M Crypto Stolen Truebit, BreachForums Database Leaked 324K
17:43
17:43
Play later
Play later
Lists
Like
Liked
17:43🎙️ Instagram Denies 17M Account Breach, $26M Crypto Stolen Truebit, BreachForums Database Leaked 324K 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1041: Today's episode will discuss the latest news: Exploit for VMware Zero-Day Flaws Likely Built a Year Before Publi…
…
continue reading
1
The State of Cybersecurity Hiring, 2026 content plans, and the weekly news - ESW #441
1:35:49
1:35:49
Play later
Play later
Lists
Like
Liked
1:35:49First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segmen…
…
continue reading
1
The State of Cybersecurity Hiring, 2026 content plans, and the weekly news - ESW #441
1:35:49
1:35:49
Play later
Play later
Lists
Like
Liked
1:35:49First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segmen…
…
continue reading
1
SANS Stormcast Monday, January 12th, 2026: PEB Manipulation; YARA Update; VideoLAND and Apache NimBLE Patches (#)
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17SANS Stormcast Monday, January 12th, 2026: PEB Manipulation; YARA Update; VideoLAND and Apache NimBLE Patches Malicious Process Environment Block Manipulation The process environment block contains metadata about particular processes, but can be manipulated. https://isc.sans.edu/diary/Malicious+Process+Environment+Block+Manipulation/32614/ YARA-X 1…
…
continue reading
1
Laura Hoffner: Setting your sights high. [Intelligence] [Career Notes]
9:52
9:52
Play later
Play later
Lists
Like
Liked
9:52Please enjoy this encore of Career Notes. Laura Hoffner, Executive Vice President at Concentric, shares her story about her time working as a Naval Intelligence Officer and supporting special operations around the globe for 12 years, to now, where she transitioned to the Naval Reserves and joined the Concentric team. Laura has known since she was i…
…
continue reading
1
Walking on EggStremes. [Research Saturday]
28:01
28:01
Play later
Play later
Lists
Like
Liked
28:01This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company." Built for long-term espionage, the campaign uses DLL sideloading, in-memory execution, and abused Windows services to stay stealthy an…
…
continue reading
This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company." Built for long-term espionage, the campaign uses DLL sideloading, in-memory execution, and abused Windows services to stay stealthy an…
…
continue reading
1
Nudification, Spying, Ni8mare, Cisco, Chat-GPT, Chrome, SaaS, CES, Josh Marpet & More - SWN #545
38:11
38:11
Play later
Play later
Lists
Like
Liked
38:11Grok Nudification, Spying, Ni8mare, Cisco, Chat-GPT, Chrome, SaaS, CES, Josh Marpet, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-545
…
continue reading