Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Firewall Podcasts

show episodes
 
Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
THEOS Cybernova

Theos CyberNova

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
  continue reading
 
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
  continue reading
 
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
China Insider

Hudson Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
China Insider is a weekly podcast project from Hudson Institute's China Center, hosted by Miles Yu, who provides weekly news that mainstream American outlets often miss, as well as in-depth commentary and analysis on the China challenge and the free world’s future.
  continue reading
 
Artwork

1
HowTo Linux MP3

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
HowTo Linux HD

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork

1
HowTo Linux OGG

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
Artwork

1
Beyond Politics

Matt Robison

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Politics may be dismal, but the ideas that swirl around it and shape it are fascinating. This is a show that looks not just at politics, but the deeper ideas from history, science, psychology, economics, and technology that are shaping our world. We feature smart, lively, upbeat discussions with people who know what they're talking about and can help us understand the world better. Hosted by Matt Robison: writer, former senior congressional staffer, and campaign manager.
  continue reading
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
The #1 Apple Music History Podcast Rootsland chronicles the extraordinary true story of Henry "K" Karyo - one of the first American producers to move to Kingston, Jamaica, immersing himself completely in reggae's underground scene. From disillusioned justice major to indie label owner, Henry navigates Jamaica's merciless music industry while building authentic friendship with legendary artists and finding unexpected love. This isn't just a music podcast - it's a raw, first-person account of ...
  continue reading
 
Artwork

1
Network Break

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
  continue reading
 
Artwork

1
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Artwork

1
Cutting Through the Matrix with Alan Watt Podcast (.xml Format)

Alan Watt ( cuttingthroughthematrix.com & alanwattsentientsentinel.eu )

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Alan Watt gives you Both an Historical and Futuristic Tour on who runs society, gives you your thoughts, trends, your entire reality - through media, entertainment and 'education'. This is a controlled global society, planned long ago by an elite group working intergenerationally. Listen to its goals, its history, Working Groups and Techniques.
  continue reading
 
Tech Transformation with Evan Kirstel: A podcast exploring the latest trends and innovations in the tech industry, and how businesses can leverage them for growth, diving into the world of B2B, discussing strategies, trends, and sharing insights from industry leaders! With over three decades in telecom and IT, I've mastered the art of transforming social media into a dynamic platform for audience engagement, community building, and establishing thought leadership. My approach isn't about per ...
  continue reading
 
Loading …
show series
 
Interested in being a guest? Email us at [email protected] A single unchecked setting can hand your network to an attacker—and it happens more often than most teams admit. We sit down with Adam BennettCo-Founder and CEO from SureStack to unpack how “resilient intelligence” marries standards, deep practitioner experience, and AI to find misconfi…
  continue reading
 
Matt Stoller, author of the Substack newsletter BIG, joins Bradley to dig into how the rise of AI mirrors the early internet—when regulators failed to check the dominance of Google, Facebook, and others. Stoller argues that America’s political elites, especially under Obama, confused “freedom from restriction” with “freedom from mastery,” enabling …
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams and Shannon Tynes discuss the latest cybersecurity news, including the implications of the government shutdown on cybersecurity operations, emerging threats like Comet Jacking, and China's severe penalties for cybercriminals. They also share personal updates and reflecti…
  continue reading
 
There are literally billions of devices connected to the internet today – many of them cheap, insecure IoT devices… smart thermostats, doorbell cameras, webcams, cheap WiFi routers and other smart appliances. As we like to say, the “S” in “IoT” is for security. And when insecure devices are no longer supported, the security bugs will never be fixed…
  continue reading
 
Major federal cybersecurity programs expire amidst the government shutdown. Global leaders and experts convene in Riyadh for the Global Cybersecurity Forum. NIST tackles removable media. ICE buys vast troves of smartphone location data. Researchers claim a newly patched VMware vulnerability has been a zero-day for nearly a year. ClickFix-style atta…
  continue reading
 
Critical Vulnerabilities and AI Voice Cloning Risks in Cybersecurity In this episode of Cybersecurity Today, host Jim Love discusses key cybersecurity threats, including critical vulnerabilities in Sudo and Cisco firewalls, and a remote command flaw in Western Digital MyCloud devices. The show highlights efforts by national security agencies in the…
  continue reading
 
There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federa…
  continue reading
 
🎙️ UK Gov $1.5B JLR Intervention, RTX Boarding Software Ransomware, Cisco Firewall Zero-Days 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 985: Today's episode will discuss the latest news as UK Gov $1.5B JLR Intervention with more news below: · British Department Store Harrods Wa…
  continue reading
 
Three Buddy Problem - Episode 65: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco’s 5500-X series appliances, devices that sit at the h…
  continue reading
 
Enjoying the content? Let us know your feedback! Welcome back and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain English. I am your host Ibrahim Yusuf... This is part 2 of where we will continue covering the debate that's been heating up in security circles: Are We…
  continue reading
 
--{ "Put a Firewall Around Your Mind"}--Adam Curtis documentary, Can't Get You Out of My Head - What we're told and shown from talking heads about Charlie Kirk, Israel - Constant Conflict - CFR/RIIA and New American Century's Agenda - Psychological Operations, You are the Target - Microwave and Frequency Weapons, Psychotronic Technology - The Mind …
  continue reading
 
In this conversation, Erez Zevulunov and Ryan Morris discuss the challenges and realities of AI deployment in businesses. They explore the hype cycle surrounding new technologies, the importance of human involvement in AI implementation, and the potential for job transformation rather than outright displacement. The discussion emphasizes the need f…
  continue reading
 
Please enjoy this encore of Career Notes. Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. When choosing a career, Chetan notes that "the liking and doing has to matter and be in conjunction with each other." Explaining the parallels in his home country of India and where he studied hi…
  continue reading
 
Three Buddy Problem - Episode 67: We discuss the rise of automated red-teaming, Apple’s $2 million exploit chain bounties aimed at outbidding spyware brokers and the iPhone maker's focus on wireless proximity attacks and “tactical suitcase” Wi-Fi exploits. We also hit the news of Paragon spyware targeting European executives and the bizarre story o…
  continue reading
 
John Fokker, Head of Threat Intelligence at Trellix is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. Once united through Ransomware-as-a-Service programs, gangs are now turning on each other — staging hacks, public feuds, an…
  continue reading
 
In this episode of Cybersecurity Today, Jim hosts Craig Taylor, a seasoned virtual Chief Information Security Officer (vCISO) with over 25 years of experience. They discuss the evolution and significance of the vCISO role, Taylor's career path, and the founding of his company, Cyber Hoot, which provides cybersecurity education and vCISO services. T…
  continue reading
 
International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in application security (AppSec) programs. Microsegmentation can contain ransomw…
  continue reading
 
***Please subscribe to Matt's ⁠Substack⁠ at https://worthknowing.substack.com/***Revealing the Reality: Analyzing Trump's Unhinged Militarization On Tuesday this week, Matt was a guest on the morning show hosted by the legendary radio host Howard Monroe, and he threw Howard bit of a curve ball. Howard asked about the unhinged performances from Secr…
  continue reading
 
Rootsland: Resistance – Episode 1: “The Tan Umbrella” In the debut of Rootsland: Resistance, hosts Henry K and Sia explore what it truly means to “put up resistance” — in life, in music, and in the modern world. Inspired by Beres Hammond’s timeless anthem, their conversation weaves personal stories with social truths, showing how the fight to stay …
  continue reading
 
Interested in being a guest? Email us at [email protected] Your phone’s most magical moments—messages turning blue, a watch pairing in seconds, an eSIM activating from Settings, a text sent from the middle of nowhere—don’t happen by accident. They ride on a quiet protocol called entitlements, and today we sit down with Emir Aboulhosn, CEO of Ne…
  continue reading
 
A Chinese Reformer in Exile: Kang Youwei and the Chinese Empire Reform Association in North America, 1899-1911 is an encyclopaedic reference work documenting the exile years of imperial China’s most famous reformer, Kang Youwei, and the political organization he mobilized in North America and worldwide to transform China’s autocratic empire into a …
  continue reading
 
A Chinese Reformer in Exile: Kang Youwei and the Chinese Empire Reform Association in North America, 1899-1911 is an encyclopaedic reference work documenting the exile years of imperial China’s most famous reformer, Kang Youwei, and the political organization he mobilized in North America and worldwide to transform China’s autocratic empire into a …
  continue reading
 
Cybersecurity Today: Teenage Ransomware Arrests, GoAnywhere Critical Flaw, and Google AI Vulnerability In this episode of Cybersecurity Today, hosted by Jim Love, two teenagers were arrested in London for a ransomware attack on Kiddo International preschools, involving child data extortion. The show discusses a critical vulnerability in GoAnywhere …
  continue reading
 
Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to…
  continue reading
 
SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike “Issues”; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper) https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Defending against attacks like RedTail is more then blocking IoCs, but instead…
  continue reading
 
DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment…
  continue reading
 
Property Tax Reform Veto Overrides to Ohio's Constitutional Redistricting Process. This week Ohio Senate President Rob McColley returns to the President's Podcast and delivers a straightforward conversation about why the General Assembly's property tax reforms are critical for Ohio homeowners. President McColley also describes the process Ohio vote…
  continue reading
 
***Please subscribe to Matt's ⁠Substack⁠ at https://worthknowing.substack.com/***  The one election race that gives the most insight into the state of politics in America right now is the campaign for Bucks County District Attorney in Pennsylvania. Bucks County is the true swingiest of swing counties in one of the few--and biggest--swing states in …
  continue reading
 
🎙️ Chinese Hackers Hit Law Firm Zero-Day, Discord 55M Users Breach, SonicWall All Configs Stolen 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 991: Today's episode will discuss the latest news as Chinese Hackers Hit Law Firm Zero-Day with more news below: · Hacktivists Target Crit…
  continue reading
 
Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnerability A user cloning a git repository may be tricked into executing arbitrary code via…
  continue reading
 
SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln; Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnera…
  continue reading
 
3I/ATLAS just passed Mars and all our Martian assets were tracking..Sadly, NASA is officially closed due to the federal government shutdown, but nonetheless, our orbiters and landers were tracking our visitor from the Milky Way’s thin disk, where the youngest and oldest stars of our galaxy meet. Be it sentient or not, it has tales to tell.. This we…
  continue reading
 
Listen Now to 133 Future Now Show 3I/ATLAS just passed Mars and all our Martian assets were tracking..Sadly, NASA is officially closed due to the federal government shutdown, but nonetheless, our orbiters and landers were tracking our visitor from the Milky Way’s thin disk, where the youngest and oldest stars of our galaxy meet. Be it sentient or n…
  continue reading
 
Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setu…
  continue reading
 
Interested in being a guest? Email us at [email protected] What if the riskiest part of a megaproject is the part you can’t see? We sit down with Jeremy Suard CEO and co-founder of Exodigo, to unpack how multi-sensor scanning and decision-support AI reveal the utilities and soil conditions that make or break billion-dollar timelines. Instead of…
  continue reading
 
🎙️ Avnet Breach Data Unreadable, Salesforce Refuses Ransom, North Korea Stole $2B Crypto 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 990: Today's episode will discuss the latest news as Avnet Breach Data Unreadable with more news below: · DraftKings Warns Users of Credential Stu…
  continue reading
 
Since Xi Jinping’s accession to power in 2012, nearly every aspect of China’s relations with Africa has grown dramatically. Beijing has increased the share of resources it devotes to African countries, expanding military cooperation, technological investment, and educational and cultural programs as well as extending its political influence. China'…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play