Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Welcome to the Layer 8 Podcast season 5! This season we’ll have conversations with social engineers and OSINT investigators who will tell their stories. We hope you enjoy them.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
Security isn’t about luck—it’s about strategy. In this podcast, we break down how to protect your home, family, and business from threats most people don’t even think about. We’re not here to fuel fear—we’re here to help you prepare. Hosted by security professionals, Michael Johnson, a retired law enforcement captain with 29 years of experience and James Kerr an expert from Boss Security Screens, this podcast delivers real, no-nonsense advice. We know what truly stops burglars—not just locks ...
…
continue reading
A web3 podcast focused on Monad, the new Layer 1 that has fundamentally optimized the EVM.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
Want to know more about the human side of cybersecurity? This is the show for you. Each week, Tessian's Tim Sadler meets with security experts and business leaders to discuss everything from security cultures, hackers, social engineering and insider threats.
…
continue reading
Base Layer will be providing insights from founders and investors in the base layer of cryptoassets. Simplifying complex projects and the technology being developed, from interoperability to relayers and more - who is building the future, why are they and how are they doing it.
…
continue reading
PowerShell Community
…
continue reading
Featuring guests from around the world and builders of some of the most exciting technologies on earth, join us as we explore the world of innovation and technology and what we need to do as engineers to keep it safe and secure.
…
continue reading
We will be doing podcasts about data storage, backup & disaster recovery, and cloud storage solutions
…
continue reading
A podcast on all things related to IT Security from the CompTIA IT Security Community. If you’re not already part of the CompTIA IT Security Community, join here (https://bit.ly/2Pat2OD) and be on the forefront of new technologies in IT security and evaluate new opportunities and challenges for businesses in the security space.
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
Podcast focused on Tech & Product topics within the Web3 space. Watch on YouTube: https://www.youtube.com/playlist?list=PLsZkl0r_l2kvaGllkk8PgzMUXK6zHkyU9 Website: https://wavect.io
…
continue reading
If you want to prevent these problems from happening in the first place, you can improve your car's windshield by applying a protective layer of security. At Portland Auto Glass, we install high-quality aftermarket glass products from Mopar and Guardian. We use these products because they're designed to be scratch-resistant, fog-resistant, and chip resistant. You're not just getting an effective repair; you're getting glass that will defend your vehicle against additional wear and tear for m ...
…
continue reading
The PowerShell Podcast is a weekly show about building your career with PowerShell. Each episode features the tips, tech, and modules that make PowerShell the premier automation and scripting tool for IT professionals. Join us as we interview PowerShell experts to discover what makes PowerShell and its community so amazing and awesome.
…
continue reading
Join Kostas and Nitay as they speak with amazingly smart people who are building the next generation of technology, from hardware to cloud compute. Tech on the Rocks is for people who are curious about the foundations of the tech industry. Recorded primarily from our offices and homes, but one day we hope to record in a bar somewhere. Cheers!
…
continue reading
The Fren Zone brings you the brightest technical minds in crypto and web3. Join our host Mason as he goes on a technical deep dive with cutting-edge projects building new and novel technology. Twitter: @tokensoftinc
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
"Web 3.0 with Sam Kamani" is all about Web 3 and how it is going to change the world. If you are interested in learning more about the 4th Industrial revolution then this podcast is for you. Web 3.0 or Web 3 is often hailed as the technology that will usher in the 4th industrial revolution. This revolution is going to affect every industry, business, government and person on this planet. Web 3.0 is a collection of technologies that are going to change how we collaborate with each other and i ...
…
continue reading
ThePrint.in is a news, analysis, opinion & knowledge media company that sharply focuses on politics, policy, government and governance. Start your mornings with our journalists who bring you the big story of the day in ThePrintAM. ThePrintPod offers you our special reports and opinions for when you‘re on the go. End your day with our most popular show ‘Cut The Clutter’ by Editor-in-Chief Shekhar Gupta. But that’s not all. We also have Pure Science, National Interest, ThePrint Uninterrupted, ...
…
continue reading

1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
Path | Passion | Purpose by DIONZ is a podcast that aims to inspire and empower its audience by interviewing conscious and impactful global leaders, nextgens, entrepreneurs, and creatives. Through candid conversations, guests share their path to discovering their passion - or the unique gifts that make them who they are - and, more importantly, how they transformed their passion into impactful endeavours that co-create a positive impact for us all. Instead of recording our podcast in a stati ...
…
continue reading
Essential listening for the broadcast production, journalism and technology communities. Your guide to everything from editorial and craft skills to taking your next step in the industry. Practical advice on all aspects of TV, radio, journalism.
…
continue reading
A relaxed coffee always brings an insightful conversation. And when it comes to mobile app performance, coffee is always a useful tool. Join us at the App Performance Café, where Rui Costa, CEO at Codavel, brings the most knowledgable individuals for an informal conversation around the vast world of mobile app performance. Our guests will share the challenges and obstacles, strategies, and lessons learned when building top-performing mobile apps. Across multiple episodes, we'll cover the con ...
…
continue reading
Do you feel there's more that we can do to keep our schools safe? Join Michele Gay, co-founder and Director of Safe and Sound Schools and a mother who lost her child tragically in the Sandy Hook School tragedy, as she discusses practical and inspiring ways school leaders, parents, and students can work together to ensure safer schools for all. Together, we can make a difference. Together, we can make our schools Safe and Sound.
…
continue reading
Youtube: https://www.youtube.com/@ProofOfPodcast
…
continue reading
Techzine Talks on Tour is a podcast series recorded on location at the events Coen and Sander attend all over the world. A spin-off of the successful Dutch series Techzine Talks, this new English series aims to reach new audiences. Each episode is an approximately 30-minute discussion that Coen or Sander has with a high-level executive of a technology company. The episodes are single-take affairs, and we don't (or hardly) edit them afterwards, apart from polishing the audio up a bit of cours ...
…
continue reading
Going through a divorce is never easy. For women who put their own career or education on hold to support a spouse and raise their children, it adds an additional layer of difficulty, and it can become a poverty trap that is nearly impossible to climb out of. I offer a different option by teaching you how to build a small service business with little to no capital or experience. Entrepreneurship can be the solution to keeping you out of poverty, and divorce can be a great catalyst for change ...
…
continue reading
Welcome to the Data Science Conversations Podcast hosted by Damien Deighan and Dr Philipp Diesinger. We bring you interesting conversations with the world’s leading Academics working on cutting edge topics with potential for real world impact. We explore how their latest research in Data Science and AI could scale into broader industry applications, so you can expand your knowledge and grow your career. Every 4 or 5 episodes we will feature an industry trailblazer from a strong academic back ...
…
continue reading
With thousands of organizations using Microsoft software solutions, One Identity and Microsoft have come together to make Zero Trust Active Directory Security within reach. Cybersecurity starts with identity management. For CISOs and other IT security leaders, this is at the forefront of their minds as they seek solutions to prevent breaches and enable Zero Trust. This podcast series focuses on how Microsoft and One Identity solutions work together to create a Zero Trust security model. Hear ...
…
continue reading
Billions & Billions of eyeballs, six continents, 10k+ servers, and plenty of lessons learned over 2+ decades in IT If you're looking for quick tips on optimizing tech, managing suppliers, and growing a business, 20 Minutes Max is the space for you. Join me as I talk about things that come up during my day and share insights on taking your business to the next level. In less than 20 minutes, you'll walk away with actionable advice and strategies for success. Take advantage of this valuable re ...
…
continue reading

1
Episode 130: Positive Reinforcement and Gamification in Security Awareness with CyberHoot
42:09
42:09
Play later
Play later
Lists
Like
Liked
42:09Craig Taylor is the founder and CEO of CyberHoot a security awareness company that focuses on positive reinforcement and gamification. Craig studied psychology and used that knowledge when creating CyberHoot, which he offers for free. Craig also set up a challenge specifically for listeners of the Layer 8 Podcast, if you'd like to test your ability…
…
continue reading

1
Humans aren't the weakest link, they're a critical security layer
30:37
30:37
Play later
Play later
Lists
Like
Liked
30:37Security awareness is a thing of the past. Rather, the term and what it stands for are things of the past. It just doesn't cover the actual challenge organizations need to address. We need to be talking about Human Risk. At least, that's what Perry Carpenter, Chief Human Risk Management Strategist at KnowBe4, thinks we should do. We were happy to o…
…
continue reading

1
Beating the AI Game, Ripple, Numerology, Darcula, Special Guests from Hidden Layer... - Malcolm Harkins, Kasimir Schulz - SWN #471
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
…
continue reading

1
Episode 41 - Nillion: How Decentralized Tech Could Save Your Private Data
51:41
51:41
Play later
Play later
Lists
Like
Liked
51:41In this episode of The Pipeline, we sit down with Alex Page, CEO of Nillion, to unpack the terrifying reality of how much of your personal data is already in the hands of AI and what we can do about it. From blind computation to decentralized privacy layers, Alex shares how Nillion is building a future where sensitive data can be used securely with…
…
continue reading

1
Politics post-Operation Sindoor—how the Modi government has outplayed the Congress
14:24
14:24
Play later
Play later
Lists
Like
Liked
14:24Trump’s claims, IMF bailout package for Pakistan—how Opposition is seeking to puncture PM Modi’s Vishwaguru narrative and how it’s messing up again, ThePrint Political Editor DK Singh explains in this episode of #PoliticallyCorrect Read the column here: https://theprint.in/politics/excluded-by-congress-shashi-tharoor-says-honoured-by-govts-invitati…
…
continue reading

1
Appsec News & Interviews from RSAC on Identity and AI - Rami Saas, Charlotte Wylie - ASW #331
1:01:48
1:01:48
Play later
Play later
Lists
Like
Liked
1:01:48In the news, Coinbase deals with bribes and insider threat, the NCSC notes the cross-cutting problem of incentivizing secure design, we cover some research that notes the multitude of definitions for secure design, and discuss the new Cybersecurity Skills Framework from the OpenSSF and Linux Foundation. Then we share two more sponsored interviews f…
…
continue reading

1
ThePrintAM: Why has SC ordered SIT probe into MP minister Vijay Shah’s remarks on Col Qureshi?
3:48
3:48
Play later
Play later
Lists
Like
Liked
3:48‘Entire nation ashamed’—SC orders SIT probe into MP BJP minister Vijay Shah’s remarks on Col Qureshi https://theprint.in/judiciary/entire-nation-ashamed-sc-orders-sit-probe-into-mp-bjp-minister-vijay-shahs-remarks-on-col-qureshi/2630554/By ThePrint
…
continue reading

1
CutTheClutter: 25 bailouts since 1958: Pakistan as IMF’s biggest client & strict conditionalities it must fulfill
30:18
30:18
Play later
Play later
Lists
Like
Liked
30:18#cuttheclutter Pakistan has a long and recurring reliance on International Monetary Fund (IMF) bailouts—25 times since 1958. IMF continues to support Islamabad and suggests that Pakistan’s economy is showing signs of recovery. In Episode 1664 of #CutTheClutter Editor-in-Chief Shekhar Gupta breaks down the latest $7 billion Extended Fund Facility an…
…
continue reading

1
256: Reinventing Stablecoins: Bundeep Singh on Pi Protocol, Tokenized Treasuries & Decentralized Yield
17:04
17:04
Play later
Play later
Lists
Like
Liked
17:04In this episode, Sam Kamani talks with Bundeep Singh Ranga, co-founder of Pi Protocol, about a new model for stablecoins. Bundeep shares how Pi separates principal and interest using tokenized US treasuries, empowering anyone to become a stablecoin minter and earn yield—without giving up liquidity. We explore why stablecoins are just getting starte…
…
continue reading
https://mcdn.podbean.com/mf/web/a7x5dxkvagvdwwem/The_PowerShell_Podcast_episode_174_Brockstar63mcr.mp3 In this episode of the PowerShell Podcast, we sit down with Brock Bingham, a longtime PowerShell enthusiast, educator, and community advocate. Recorded live from PDQ Headquarters in Salt Lake City, Utah, this episode captures the high energy and c…
…
continue reading

1
Building Confidence and Community with PowerShell with Brock Bingham
38:20
38:20
Play later
Play later
Lists
Like
Liked
38:20In this episode of the PowerShell Podcast, we sit down with Brock Bingham, a longtime PowerShell enthusiast, educator, and community advocate. Recorded live from PDQ Headquarters in Salt Lake City, Utah, this episode captures the high energy and camaraderie of a PowerShell Wednesday in person. Brock shares his journey from PowerShell beginner to me…
…
continue reading

1
The State of Cybersecurity Readiness for the Next Big Emergency - David Aviv, Bri Frost, Marshall Erwin - ESW #407
2:12:42
2:12:42
Play later
Play later
Lists
Like
Liked
2:12:42Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
…
continue reading

1
ThePrintAM: Why did ISRO’s PSLV-C61 mission fail?
5:22
5:22
Play later
Play later
Lists
Like
Liked
5:22Why did ISRO’s PSLV-C61 mission fail?By ThePrint
…
continue reading

1
National Interest: Pakistan has a 7-year terror itch. Here’s what India should do to cure it
16:09
16:09
Play later
Play later
Lists
Like
Liked
16:09National Interest: Pakistan has a 7-year terror itch. Here’s what India should do to cure itBy ThePrint
…
continue reading

1
SecurityCode: 'Trump’s Kashmir fixation is dangerous for India, New Delhi must begin preparing'
11:20
11:20
Play later
Play later
Lists
Like
Liked
11:20In 1962, a war-battered India caved in to pressure from President John F Kennedy to negotiate a Kashmir deal with Pakistan. The results were disastrous. Emboldened by what he read as Western support, Field Marshal Ayub Khan began preparing plans for the 1965 war. That pattern has played out time and again----more----Read full article here: https://…
…
continue reading

1
ThePrintAM: WHAT'S THE CONTROVERSY OVER MP DEPUTY CM JAGDISH DEVDA'S COMMENT?
4:06
4:06
Play later
Play later
Lists
Like
Liked
4:06By ThePrint
…
continue reading

1
Initia: Incentively Aligned Appchains - Ezaan Mangalji, Anil Lulla & Jose Maria Macedo
1:02:08
1:02:08
Play later
Play later
Lists
Like
Liked
1:02:08Blockchain architecture is constantly being forced to adapt to new technologies, as well as to meet new demands from users and builders. While the idea of apps building their own chains was first explored by Cosmos, it lacked the support and tooling to see it succeed. Later on, rollups also took the centerstage of Ethereum’s scaling roadmap, but du…
…
continue reading

1
Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More... - SWN #477
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-477
…
continue reading

1
Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More... - SWN #477
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-477
…
continue reading

1
Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More... - SWN #477
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-477
…
continue reading

1
Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More... - SWN #477
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-477
…
continue reading

1
CutTheClutter: 50 yrs of Sikkim integration: How it became Indian state & Indira Gandhi's Himalyan borderlands plan
31:52
31:52
Play later
Play later
Lists
Like
Liked
31:52CutTheClutter: 50 yrs of Sikkim integration: How it became Indian state & Indira Gandhi's Himalyan borderlands planBy ThePrint
…
continue reading

1
ThePrintPod: J&K police, security forces on alert as Pakistan-linked sleeper cells rear head in Kashmir
4:47
4:47
Play later
Play later
Lists
Like
Liked
4:47Technical intel reveals sleeper cells are in contact with Pakistan-based handlers, leaking sensitive info about security forces and key installations via WhatsApp, Telegram, and Signal.By ThePrint
…
continue reading

1
255: Why Build Another L1? Paul from Somnia on Somnia Protocol’s High-Throughput Blockchain
29:33
29:33
Play later
Play later
Lists
Like
Liked
29:33Paul, co-founder of Somnia Protocol and former Improbable exec, joins Sam Kamani to unpack why we still need new Layer 1s—and how Somnia’s high-performance, EVM-compatible blockchain is designed for mass-scale gaming, AI agents, and prediction markets. From his time at Goldman Sachs to building billion-dollar startups, Paul shares deep technical in…
…
continue reading

1
Rise of AI transforms CISO's role: from technical to strategic input
28:20
28:20
Play later
Play later
Lists
Like
Liked
28:20AI has in interesting side-effect for the role of the CISO, says Zscaler CISO Sam Curry when we sit down with him during RSAC 2025 Conference in San Francisco earlier this month. Their input becomes more important. That's good news for CISOs. Or is it? Security leaders haven long been judged and consulted along the technical axis. The (rapid) rise …
…
continue reading
In this episode we talk about a new narrative: Linux-based App-chains. Ever heard of the noisy neighbour problem? Well they fix it - just like other App-chains do. But with one major difference: You can use any library and toolkit Linux supports, including general-purpose languages like Python, etc. João Garcia is a Developer Advocate at Cartesi, l…
…
continue reading

1
SecurityCode POD: Pakistan Army will not end conflict with India as war is performance of its nationhood
10:19
10:19
Play later
Play later
Lists
Like
Liked
10:19Even though Pakistan has suffered repeated military defeats, its Army understands that sustaining the conflict is key to sustaining its chokehold on power. India needs to look beyond the platitudes about deterrence that have become an opiate for its policy-makers, and think about long-term strategies to undermine the Pakistan Army and the ideology …
…
continue reading
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
…
continue reading
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
…
continue reading

1
CutTheClutter: Drones, F-16 upgrades to submarines & defence tech—Op Sindoor reveals deepening Pakistan-Turkey ties
30:57
30:57
Play later
Play later
Lists
Like
Liked
30:57CutTheClutter: Drones, F-16 upgrades to submarines & defence tech—Op Sindoor reveals deepening Pakistan-Turkey tiesBy ThePrint
…
continue reading

1
ThePrintPod: Asim Munir is the first Punjabi general to attack India. It’s sociologically important
9:01
9:01
Play later
Play later
Lists
Like
Liked
9:01Jalandhar has given Pakistan another Chief of Army Staff, Gen Zia ul-Haq, the progenitor of politico-military jihad across both the Afghan and Indian borders.By ThePrint
…
continue reading

1
ThePrintPod: With over 50% Indian students in pilot batches, IITs in Zanzibar & Abu Dhabi ramp up outreach
4:59
4:59
Play later
Play later
Lists
Like
Liked
4:59IIT Madras Zanzibar and IIT Delhi Abu Dhabi report majority Indian students, plan new courses, faculty hiring and shift to larger campuses amid aggressive international outreach.By ThePrint
…
continue reading

1
Mastering Cybersecurity: Part 2 – Securing Systems and Environments
40:33
40:33
Play later
Play later
Lists
Like
Liked
40:33In this episode, Steve and John dive into why securing systems is a must-know skill in cybersecurity. Learn the basics of system hardening, access control, and logging, plus practical tools and labs to get hands-on. They also explore how AI can boost your defense game — and why thinking like both an attacker and defender will set you apart. +++++++…
…
continue reading

1
OpinionPOD: Strategic overview of the wonder weapon of modern warfare— Drones & India’s Op Sindoor
16:04
16:04
Play later
Play later
Lists
Like
Liked
16:04Drones performed a key role in Operation Sindoor. However, they are not a recent innovation. Their military application dates back to World War I, with early experiments by the British. The interwar period and post-World War II era saw the Americans advance this technology significantly. In recent years, however, drone warfare has undergone a drama…
…
continue reading

1
ThePrintAM: How has India reacted to China’s renaming of parts of Arunachal Pradesh?
4:00
4:00
Play later
Play later
Lists
Like
Liked
4:00By ThePrint
…
continue reading
Hey friends, Let’s start with a weird truth: People don’t fall for things because they’re true. They fall for things because they’re plausible. That’s the dark magic of deception — it doesn’t need to be airtight, or flawless, or even particularly clever. It just needs to feel true enough. Something your brain can accept without asking too many ques…
…
continue reading

1
CutTheClutter: How Op Sindoor raised India's nuclear threshold & broke pattern of Pakistan's nuclear blackmail
25:20
25:20
Play later
Play later
Lists
Like
Liked
25:20In his first address to the nation post Operation Sindoor, PM Modi drew a red line in the sand—India will not give in to nuclear blackmail by Pakistan any longer. In Episode 1661 of #CutTheClutter, Editor-in-Chief Shekhar Gupta looks at Pakistan’s behavioural pattern—making pre-emptive nuclear threats to create a sense of fear, and how India has ti…
…
continue reading

1
ThePrintPod: Manipur can be India’s next sporting hub. Financial security need not depend on politics
8:06
8:06
Play later
Play later
Lists
Like
Liked
8:06Manipur's demand for inclusion in the Fifth or Sixth schedule is valid. The state also needs financial and technical support for high-value agriculture, market-friendly crops, and micro-irrigation.By ThePrint
…
continue reading

1
ThePrintPod: Goldfish in perfume bottle, protected species on sale—DU students’ report on horrors of Delhi pet shops
4:39
4:39
Play later
Play later
Lists
Like
Liked
4:39DU law students found star turtles for sale, animals kept in filth, and puppies sold over WhatsApp in unlicensed shops across Delhi’s 8 zones.By ThePrint
…
continue reading

1
CISO Communication and Hiring, as they Combat Threat and Penetration Testing Trends - Gunter Ollmann, Derek Manky - BSW #395
1:06:28
1:06:28
Play later
Play later
Lists
Like
Liked
1:06:28In the leadership and communications section, How CISOs can talk cybersecurity so it makes sense to executives, Firms to spend more on GenAI than security in 2025, Europe leads shift from cyber security ‘headcount gap’ to skills-based hiring, and more! Next, pre-recorded interviews from RSAC Conference 2025, including: This segment is sponsored by …
…
continue reading

1
CISO Communication and Hiring, as they Combat Threat and Penetration Testing Trends - Derek Manky, Gunter Ollmann - BSW #395
1:06:28
1:06:28
Play later
Play later
Lists
Like
Liked
1:06:28In the leadership and communications section, How CISOs can talk cybersecurity so it makes sense to executives, Firms to spend more on GenAI than security in 2025, Europe leads shift from cyber security ‘headcount gap’ to skills-based hiring, and more! Next, pre-recorded interviews from RSAC Conference 2025, including: This segment is sponsored by …
…
continue reading

1
Buddha’s gems at Sotheby’s shows Indian govt doesn’t have an eye on ‘colonial loot’
17:55
17:55
Play later
Play later
Lists
Like
Liked
17:55In the 1898, a British estate manager, William C Peppé dug up a Buddhist Stupa at Piprahwa and stumbled upon a soapstone casket containing relics of Gautama Buddha and a cache of precious gems, which may have been weaved into a necklace or some other form of jewellery, as part of the offerings. More than a century later, a controversy surrounds the…
…
continue reading

1
ThePrintAM: WHO ARE THE LET TERRORISTS KILLED IN SHOPIAN ENCOUNTER?
4:42
4:42
Play later
Play later
Lists
Like
Liked
4:42https://theprint.in/india/a-category-let-terrorist-accused-of-killing-bjp-sarpanch-among-3-dead-in-shopian-encounter-police-say/2624302/By ThePrint
…
continue reading

1
Deepfake, South Korea, Moonlander, ChineseAI, FBI, AI damages professional reputation - SWN #476
29:03
29:03
Play later
Play later
Lists
Like
Liked
29:03Deepfake porn, South Korea, Operation Moonlander, Chinese AI, FBI, AI use damages professional reputation, Joshua Marpet and More Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-476
…
continue reading

1
Deepfake, South Korea, Moonlander, ChineseAI, FBI, AI damages professional reputation - SWN #476
29:03
29:03
Play later
Play later
Lists
Like
Liked
29:03Deepfake porn, South Korea, Operation Moonlander, Chinese AI, FBI, AI use damages professional reputation, Joshua Marpet and More Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-476
…
continue reading

1
Deepfake, South Korea, Moonlander, ChineseAI, FBI, AI damages professional reputation - SWN #476
29:03
29:03
Play later
Play later
Lists
Like
Liked
29:03Deepfake porn, South Korea, Operation Moonlander, Chinese AI, FBI, AI use damages professional reputation, Joshua Marpet and More Show Notes: https://securityweekly.com/swn-476
…
continue reading