Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Information Security Podcasts
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
DoD Secure-Working with National Industrial Security Program
jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC
Interviews and topics centering on security clearances and protecting classified information according to the National Industrial Security Clearance Operating Manual (NISPOM).
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Every weekday for over three decades, Morning Edition has taken listeners around the country and the world with two hours of multi-faceted stories and commentaries that inform, challenge and occasionally amuse.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Podcast by Alex Wood & Robb Reck
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Canada's intelligence landscape is as unique as the country itself. In an evolving global threat environment, fostering informed discussions on intelligence has become increasingly vital to the national security discourse. Secure Line Podcast is designed to influence and inform the national dialogue on security and intelligence in Canada, and internationally. Secure Line is brought to you by the Canadian Association for Security & Intelligence Studies (CASIS).
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
A free podcast about cybersecurity, vulnerability management, and the CVE Program.
…
continue reading
WAR ROOM: Pandemic is the first and most comprehensive program to bring the most up to the minute information on the news of the day. Stephen K. Bannon brings medical experts, politicians, business leaders, and those on the front lines for a comprehensive look at the latest news from all and provide their insider insights.
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
U.S. foreign policy for the future. Security Dilemma brings you conversations with the experts, policymakers, and thinkers charting new paths forward from the wreckage of recent decades and toward a national security and defense policy guided by prudence and restraint. Cohosts John Allen Gay and A.J. Manuzzi bring you the information you need to shape a wiser approach. Security Dilemma is a podcast of the John Quincy Adams Society, an independent nonprofit organization dedicated to advancing ...
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Your dose of tips about all things Information Security, ICT Legislation and Risk. South African podcast.
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading

1
Unsecurity Episode 248: Unveiling & Mapping Government Vulnerabilities with Seth Bowling
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Join us for another episode of the Unsecurity Podcast as Megan, Brad, and Seth Bowling, lead researcher and developer at FRSecure, dive into the evolving landscape of cybersecurity for city and county governments. Seth shares how Mirrored Defense's innovative heat map visualizes the attack surface across the U.S. and presents surprising findings fr…
…
continue reading

1
Vibes Over Evidence: How Governance Failures in Counterterrorism Threaten the Rule of Law
27:29
27:29
Play later
Play later
Lists
Like
Liked
27:29In this episode of Secure Line, hosts Stephanie Carvin and Jessica Davis unpack the National Security and Intelligence Review Agency’s (NSIRA) October 2 report on the Canada Revenue Agency (CRA). The review examined the CRA’s handling of audits on charities for potential terrorist financing, following long-standing allegations of bias against Musli…
…
continue reading

1
Shutdown hits day 15 as public feels the strain and Capitol Hill standoff drags on
3:21
3:21
Play later
Play later
Lists
Like
Liked
3:21The government shutdown is on its 15th day, and as the public increasingly begins to feel the effects, it remains unclear which party on Capitol Hill will blink first.By Sam Gringlas
…
continue reading

1
Republican Rep. Mike Lawler on his calls for Democrats to reopen the government
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34NPR's Michel Martin speaks with Republican Congressman Mike Lawler of New York about the ongoing government shutdown and his calls for Democrats in his state to end it.By Michel Martin
…
continue reading

1
L.A. County Board of Supervisors declares ICE raids a local emergency
2:07
2:07
Play later
Play later
Lists
Like
Liked
2:07The Los Angeles County Board of Supervisors voted Tuesday to declare a local emergency in response to immigration enforcement actions in the area.By Destiny Torres
…
continue reading

1
Magic, Mentalism, and the Modern CISO – with Gary Chan
44:22
44:22
Play later
Play later
Lists
Like
Liked
44:22Episode Summary In this episode, host David Malicoat sits down in St. Louis, Missouri with Gary Chan, Chief Information Security Officer at SSM Health — and a professional Security Mentalist. Gary blends his background in cybersecurity, engineering, and mentalism to bring a refreshingly human and creative approach to leadership, awareness, and infl…
…
continue reading
October 15th, 2025. This is today’s cyber news for October 15th, 2025. We lead with new research showing widespread eavesdropping risk on geostationary satellite traffic, then pivot to Microsoft’s heavy Patch Tuesday and the end of free support for Windows 10. You’ll also hear how the U.K. is grappling with a sharp rise in nationally significant in…
…
continue reading

1
Lawfare Daily: Serhii Plokhii on the History of the Nuclear Arms Race
59:47
59:47
Play later
Play later
Lists
Like
Liked
59:47Lawfare Contributor Mykhailo Soldatenko sits down with Serhii Plokhii, Harvard History Professor and a leading authority on the history of the Cold War and Ukraine, to discuss his new book, "The Nuclear Age: An Epic Race for Arms, Power and Survival," that tells a history of nuclear proliferation and international efforts to tame it. They discuss t…
…
continue reading

1
Supreme Court hears case that questions major plank of voting rights
5:27
5:27
Play later
Play later
Lists
Like
Liked
5:27The Supreme Court on Wednesday hears a case that could strike down the last major part of the 1965 Voting Rights Act that remains standing.By Nina Totenberg
…
continue reading
Gaza ceasefire under strain amid threats from Israel and Trump, shutdown standoff drags on as public begins to feel the effects, Supreme Court to hear case that could gut Voting Rights Act.By Leila Fadel
…
continue reading

1
Author of anti-fascism book harassed by right-wing activists for his work
5:00
5:00
Play later
Play later
Lists
Like
Liked
5:00NPR's Michel Martin speaks with Mark Bray, a professor at Rutgers University who has been targeted by right-wing activists for his writings on anti-fascism.By Michel Martin
…
continue reading

1
Military seizes power in Madagascar after massive anti-government protests
2:17
2:17
Play later
Play later
Lists
Like
Liked
2:17The military in Madagascar seized power Tuesday after weeks of protests over corruption, power and water shortages forced the country's president into hiding.By Emmanuel Akinwotu
…
continue reading

1
Remembering D'Angelo: Soulful visionary and pioneer of the neo soul movement
3:51
3:51
Play later
Play later
Lists
Like
Liked
3:51D'Angelo, the Grammy-winning R&B singer who helped pioneer the neo soul sub genre, died Tuesday at age 51. NPR's Leila Fadel talks with Faith Pennick, who wrote a book about his album "Voodoo."By Leila Fadel
…
continue reading

1
Storm devastates Western Alaska, displacing over 1,000 people
2:19
2:19
Play later
Play later
Lists
Like
Liked
2:19The remnants of Typhoon Halong hit part of western Alaska over the weekend, damaging almost 50 small villages and displacing over 1,000 people.By Sage Smiley
…
continue reading

1
Gaza ceasefire tested as Israel and Trump issue warnings to Hamas
3:52
3:52
Play later
Play later
Lists
Like
Liked
3:52Just six days in, the Gaza ceasefire faces some strain as Israel demands Hamas hand over more bodies of hostages and Trump warns of violence if Hamas doesn't disarm itself.By Daniel Estrin
…
continue reading

1
Gaza aid trickles in as Israel limits deliveries over alleged ceasefire violation
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04Israel cut the number of Gaza aid delivery trucks, citing an alleged Hamas ceasefire breach. NPR's Leila Fadel speaks with Jonathan Fowler of the U.N. Relief and Works Agency for Palestine Refugees.By Leila Fadel
…
continue reading

1
Man pleads guilty in arson attack at Pennsylvania governor's mansion
2:18
2:18
Play later
Play later
Lists
Like
Liked
2:18Cody Balmer pleaded guilty to attempted murder and arson Tuesday for his attack on Pennsylvania Gov. Josh Shapiro's official residence last April.By Tom Riese
…
continue reading

1
Legacy Windows protocols expose theft, Fortra admits GoAnywhere defect, Taiwan claims surge in Chinese attacks
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43Legacy Windows protocols still expose theft Fortra admits exploitation of GoAnywhere defect Taiwan claims surge in Chinese attack efforts Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old to…
…
continue reading

1
Risky Business #810 -- Data extortion attacks have a silver lining
1:03:12
1:03:12
Play later
Play later
Lists
Like
Liked
1:03:12In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: FBI intervenes in Scattered Spider Salesforce leaksite Clop loots Oracle E-Biz deployments Plus so much more data extortion.. At least it’s not ransomware … we guess? The US still can’t decide who’s gonna be in charge of NSA & Cybercom Cambodian scam…
…
continue reading

1
WarRoom Battleground EP 869: "Digital Politics And The Transhuman Fusion" - Joe Allen At Stetson College Of Law
WarRoom Battleground EP 869: "Digital Politics And The Transhuman Fusion" - Joe Allen At Stetson College Of LawBy WarRoom.org
…
continue reading
Episode 4851: Charlie Kirk Medal Of Freedom CeremonyBy WarRoom.org
…
continue reading
It's time to retire NTLM - but how? Richard chats with Steve Syfuhs about the need and challenge of retiring an ubiquitous authentication protocol first used in the 1990s. While guidance to move away from NTLM has been available since 2010, it has only become feasible in the past couple of years, and Microsoft is now providing tooling to make the t…
…
continue reading

1
SANS Stormcast Wednesday, October 15th, 2025: Microsoft Patchday; Ivanti Advisory; Fortinet Patches (#)
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22SANS Stormcast Wednesday, October 15th, 2025: Microsoft Patchday; Ivanti Advisory; Fortinet Patches Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivanti…
…
continue reading
“We Speak CVE” podcast host Shannon Sabens chats with CVE Consumer Working Group (CWG) co-chairs, Jay Jacobs and Bob Lord, and CVE™ Project Lead Alec Summers, about how the CWG was created to address the needs and perspectives of those who use CVE data — ranging from enterprise security teams to tool developers and managed security service provider…
…
continue reading

1
PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read …
…
continue reading
Episode 4850: History Of The US Navy; Tragedy Of Hemispheric DefenseBy WarRoom.org
…
continue reading
Episode 4849: World Leaders Fear Trump; Under Siege A Fight To Save The NationBy WarRoom.org
…
continue reading

1
S7E47 - A Conversation with Students
1:44:14
1:44:14
Play later
Play later
Lists
Like
Liked
1:44:14Recently The Virtual CISO Moment podcast host Greg Schaffer was asked to participate in a question and answer session with students at Minnesota State University who are using his book Information Security for Small and Midsized Businesses as part of their studies. In this special and extended episode, a recoding of that conversation, they talk abo…
…
continue reading

1
WhatsApp banned; Discord, TransUnion, Jaguar-Land Rover hacked
51:08
51:08
Play later
Play later
Lists
Like
Liked
51:08Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss various topics related to cybersecurity, including the security implications of WhatsApp, the challenges of age verification laws, the recent TransUnion data breach, and the significant cyber attack on Jaguar Land Rover. They emphasize the importance of str…
…
continue reading

1
After victory lap in the Middle East, Trump returns to U.S.
3:44
3:44
Play later
Play later
Lists
Like
Liked
3:44President Trump returns to the U.S. Tuesday after celebrating the Gaza ceasefire overseas, but back home, the mood is far from festive as the government shutdown drags on.By Tamara Keith
…
continue reading

1
Virginia Sen. Tim Kaine on the shutdown's impact on federal workers in his state
5:30
5:30
Play later
Play later
Lists
Like
Liked
5:30NPR's Michel Martin speaks with Sen. Tim Kaine, D-Va., about what he's hearing from the many federal workers in his state who have been furloughed during the government shutdown.By Michel Martin
…
continue reading

1
Dozens killed in Afghanistan-Pakistan border clash
2:04
2:04
Play later
Play later
Lists
Like
Liked
2:04The Taliban attacked Pakistani border posts Saturday, triggering clashes that killed dozens. The Taliban said the attack was retaliatory, blaming Pakistan for airstrikes in Afghanistan days earlier.By Betsy Joles
…
continue reading

1
Lawfare Daily: How Technologists Can Help Regulators with Erie Meyer and Laura Edelson
44:26
44:26
Play later
Play later
Lists
Like
Liked
44:26Erie Meyer, Senior Fellow at Georgetown Law’s Institute for Technology Law & Policy and Senior Fellow at the Vanderbilt Policy Accelerator, and Laura Edelson, Assistant Professor of Computer Science at Northeastern University, who are coauthors of the recent toolkit, “Working with Technologists: Recommendations for State Enforcers and Regulators,” …
…
continue reading
This is today’s cyber news for October 14th, 2025. We open with Microsoft tightening Internet Explorer mode in Edge after credible reports of real-world abuse. From there, we cover widespread SonicWall SSLVPN account compromises with stolen credentials, an emergency Oracle E-Business Suite fix following active exploitation, and a U.S.-focused botne…
…
continue reading

1
M. Night Shyamalan and Nicholas Sparks join forces on 'Remain' novel and film
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00Filmmaker M. Night Shyamalan and novelist Nicholas Sparks describe their collaboration to simultaneously craft the new novel and upcoming film Remain as a unique one that's unlikely to be replicated.By Leila Fadel
…
continue reading
People in Israel and Gaza are waking up to very different realities after two years of war, Trump returns to the U.S. after Middle East victory lap, many fear ICE's tactics are growing more violent.By Michel Martin
…
continue reading

1
'We see a future': Two women in Gaza reflect on the ceasefire and what comes next
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00With the skies quiet after two years of war, two women in Gaza talk about grief, survival and what hope looks like in this fragile moment.By Leila Fadel
…
continue reading

1
How a shadow fleet of oil tankers aids Russia in the war with Ukraine
3:52
3:52
Play later
Play later
Lists
Like
Liked
3:52Ukraine says Russia is using oil tankers to launch drone attacks. NPR's A Martinez speaks with Johns Hopkins professor Sergey Radchenko about Russia's "shadow fleet."By A Martínez
…
continue reading

1
Justice Anthony Kennedy talks about his new book, abortion and changing his mind
4:59
4:59
Play later
Play later
Lists
Like
Liked
4:59Justice Anthony Kennedy, who served on the Supreme Court for 30 years, talks about his new memoir which explores his life on and off the high court.By Nina Totenberg
…
continue reading

1
Thrift store discovers jewelry donation has ancient roots
1:47
1:47
Play later
Play later
Lists
Like
Liked
1:47A thrift store in Canada was selling a collection of antique rings and medallions for about 20 US dollars when it learned the jewelry was from ancient times.By Hosts
…
continue reading

1
After the ceasefire, people in Gaza and Israel wake up to different realities
3:37
3:37
Play later
Play later
Lists
Like
Liked
3:37As Israel and Hamas settle into the first phase of the ceasefire, residents in those areas are waking up to very different realities after nearly two years of war.By Aya Batrawy
…
continue reading

1
With the ceasefire in place, what's next for Gaza?
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19NPR's A Martinez speaks with Ghaith al-Omari [[gayth al-oh-MAHR-ee]], senior fellow at The Washington Institute for Near East Policy, about the future of governance in Gaza.By A Martínez
…
continue reading

1
Salesforce data leak, SimonMed breach, Chipmaker vs. Dutch government
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Millions of records exposed in Salesforce data leak SimonMed breach grows from hundreds to over a million Dutch government freezes Chinese-owned chipmaker Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from u…
…
continue reading
By Jason Edwards
…
continue reading

1
S36 Ep8: Catherine Bosley - Reputation in the Digital Age: Protecting Your Online Identity
25:43
25:43
Play later
Play later
Lists
Like
Liked
25:43Today, Steve is in conversation with Catherine Bosley, an award-winning veteran journalist, with more than thirty years of public speaking experience. Steve and Catherine discuss the importance of protecting one’s online image, what to do when *it* hits the fan, and why a social media policy is something all organizations should have. Catherine als…
…
continue reading

1
WarRoom Battleground EP 868: WarRoom Reports On Claim Space Aliens Are Editing Human DNA And Asks If Illegal Aliens Caused Brexit
WarRoom Battleground EP 868: WarRoom Reports On Claim Space Aliens Are Editing Human DNA And Asks If Illegal Aliens Caused BrexitBy WarRoom.org
…
continue reading

1
Episode 4848: Rebuilding Begins In Gaza And What Will We Uncover; US Navy Began With A Fishing Boat
Episode 4848: Rebuilding Begins In Gaza And What Will We Uncover; US Navy Began With A Fishing BoatBy WarRoom.org
…
continue reading

1
The “Shotgun” Botnet: How RondoDox Hijacks Routers, Cameras, and Servers Worldwide
23:28
23:28
Play later
Play later
Lists
Like
Liked
23:28A new and fast-growing botnet dubbed RondoDox is shaking up the global cybersecurity landscape with its “shotgun” exploitation strategy, targeting over 50 known and unknown vulnerabilities across a vast array of internet-connected devices. First detected in mid-2025, the botnet has expanded rapidly, infecting routers, servers, cameras, and DVRs fro…
…
continue reading