Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

OSINT Podcasts

show episodes
 
Experience the Cold War like never before with Cold War Conversations — an award-winning podcast recommended by The New York Times. Each week, host Ian Sanders brings you raw, firsthand accounts from the people who lived through one of history’s most tense and transformative eras — soldiers, spies, civilians, and more. These aren’t stories from textbooks. They’re unfiltered voices from the frontlines of history — emotional, gripping, and deeply human. This is Cold War history, told from the ...
  continue reading
 
Artwork

1
The OSINT Bunker

The OSINT Boys

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Military news and defence podcast hosted by @DefenceGeek, @Osinttechnical, @AnAustinThing2 and @geoallison in collaboration with the UK Defence Journal. www.theosintbunker.org
  continue reading
 
Artwork

1
NeedleStack

Authentic8

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
  continue reading
 
Here at Cyber Sector 7 our main goal is to Inform you and give you Security Tips, Digital Privacy Tips, OSINT Methods, and to teach you about hacker methods, culture, and news. We want to inform you of how important security and privacy is. This is for everyone, even if you know nothing about computers, we want you to stay informed.
  continue reading
 
Artwork

1
OSINT Cocktail

OSINT Cocktail

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to OSINT Cocktail - a podcast about tools for investigators. Kirby Plessas and Cynthia Navarro interview investigators of all types on the tools of their trades. The purpose is to illustrate the variety of setups for investigators of all types. What do you really need to do a thorough investigation? Pick up some tips here!
  continue reading
 
The OSINT Curious Project is a source of quality, actionable, Open Source Intelligence news, original blogs, instructional videos, and a bi-weekly webcast/podcast. Most of all, we want to inspire people to look outside of their OSINT-comfort zones and pursue their OSINT passions. We try to keep people curious about exploring web applications for bits of information or trying out new techniques to access important OSINT data. We are an OSINT-learning catalyst. Support this podcast: https://po ...
  continue reading
 
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
  continue reading
 
Cloak & Dagger is a podcast about OSINT, technology, global conflict, and the practitioners and investigators who work in these fields. Join host and journalist MJ Banias as he explores the stories that shape the worlds of intelligence, security, and technology. Cloak & Dagger is powered by Sapper Labs Group. For more information, https://sapperlabs.com/blogs/podcast
  continue reading
 
Artwork
 
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
  continue reading
 
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Unlock a world of valuable insights and thought-provoking discussions related to the Special Forces, Military, and Intelligence Community (CIA, NSA, NGA, FBI, Military Intelligence). Things we discuss: GEOINT, OSINT, HUMINT, SIGINT, SOF, Special Forces, Military, Veterans Issues, Army, Navy, Marines, Air Force, Entrepreneurship, Geopolitics, News, Politics, Technology, Artificial Intelligence, Augmented Reality, Cloud Computing, Data Analytics, Government Contracting, Defense Contracting, Bu ...
  continue reading
 
Artwork

1
The LOWDOWN

Joshua "HOTAS" Patten

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The LOWDOWN Podcast delivers a weekly intelligence briefing designed for military professionals, analysts, and strategic thinkers. Each episode summarizes the most critical open-source developments related to China, Russia, Iran, and North Korea, covering real-world reporting across diplomatic, military, economic, cyber, and information warfare domains. With a clean, voice-ready format and zero fluff, The LOWDOWN helps you stay mission-focused with timely, fact-driven updates. Whether you're ...
  continue reading
 
Artwork

1
Layer 8 Podcast

Layer 8 Conference

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Layer 8 Podcast season 5! This season we’ll have conversations with social engineers and OSINT investigators who will tell their stories. We hope you enjoy them.
  continue reading
 
Artwork

1
In The Arena

Vannevar Labs

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
In the Arena is a podcast about building products that matter for America’s future. Hosted by Vannevar CEO Brett Granberg and Hayley Menser, the series goes inside the fight to modernize U.S. defense and outcompete authoritarian adversaries. From product bets and mission wins to the people and principles behind them, In the Arena is a blueprint for builders on the frontlines of strategic competition.
  continue reading
 
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
  continue reading
 
Artwork

1
The Cyber Sleuth Show

Cyber Social Hub

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Step into the world of digital forensics, mobile forensics, OSINT, and cybersecurity with The Cyber Sleuth Show! Hosted by Kevin DeLong, this podcast dives deep into the ever-evolving landscape of digital investigations, featuring expert guests, cutting-edge tools, real-world case insights, and, of course, the occasional terrible dad joke. From law enforcement investigators and forensic analysts to OSINT specialists and cybersecurity pros, we uncover the latest trends, techniques, and challe ...
  continue reading
 
The podcast that explores everything related to disinformation and online networks. To help us make sense of the global town square that is social media, in every episode, our host speaks to a fresh voice to uncover the good, bad, and fake online. This podcast believes that we are at a pivotal moment in the fight against disinformation. Many people apply the word disinformation to everything from fake news, bot networks, malicious actors, influence operations, manipulation, inauthentic accou ...
  continue reading
 
Artwork

1
Easy Prey

Chris Parker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
  continue reading
 
Artwork
 
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
  continue reading
 
Artwork

1
Securanoia

Securanoia

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to Securanoia — where security meets paranoia, and whispers reveal what others ignore. This is the space between vigilance and obsession, where digital, physical, and psychological threats blur with the uneasy sense that something’s always lurking just out of sight. Each episode investigates the tension between concealment and revelation, fear and fascination, chaos and clarity — inviting you to question what you see, listen for what you don’t, and discover that the world is often lo ...
  continue reading
 
Artwork

1
The Grayman Concept

Bryan (Shammer)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A skilled individual can effortlessly blend into any environment without drawing attention, effectively hiding their true capabilities and intentions. They seamlessly mingle, remain unmemorable, and forge relationships to gather vital information for their objectives. Every move they make is calculated and intended to keep them inconspicuous. Originating from espionage, the term "gray man" refers to incorporating spy tradecraft into one's daily life. This involves honing skills essential for ...
  continue reading
 
When the threats are real and the stakes are high — what actually works? Right now, as you're reading this, someone's watching your family, your business rivals are digging through your digital history, and a disgruntled employee knows exactly where your vulnerabilities are. While you're focused on your day job, they're building a plan. This podcast exists because ignoring threats doesn't make them disappear. I'm Philip Grindell — former Scotland Yard detective, behavioural threat specialist ...
  continue reading
 
WYWM #BeFierce Podcast - Our Audio Archive for the Future Military veterans discussing hot topics such as recruitment, talent, skills, transition, and the market. Are you a current/ex-serving military member or immediate family member? Sign up today for free courses to IT Careers including Cyber Security, Robotic Process Automation, Data Analytics. Simply visit our website and sign up! https://www.withyouwithme.com
  continue reading
 
Want to learn about all of the latest security tools and techniques? This is the show for you! We show you how to install, configure and use a wide variety of security tools for both offense and defense. Whether you are a penetration tester or defending enterprise networks, this show will help you
  continue reading
 
Artwork

1
CyberSpeaksLIVE

CyberSpeaksLIVE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
CyberSpeaksLIVE is an InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeakslive.
  continue reading
 
Artwork

1
Bright Brainz

Isaac Walker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
”Bright Brainz” is an engaging podcast that brings together fascinating individuals to delve into captivating subjects, catering to the curiosity of inquisitive minds. Join us as we explore a wide array of intriguing topics, featuring insightful conversations with experts, enthusiasts, and innovators from various fields. Whether you’re a lifelong learner or simply curious about the world around you, ”Bright Brainz” is your ticket to a journey of discovery, where the intellectually curious ga ...
  continue reading
 
Artwork
 
Security Headlines is a podcast about the latest security vulnerabilities with in the cyber security field. So if your interested about the latest security holes no mather if you are a tech savy penetration tester, a devops person, a programmer or just generally interested in the latest technology security news. Security headlines is here for you Security headlines is perfect to listen on when you want a quick update, on the way to work or when you are taking a walk out side The podcast is p ...
  continue reading
 
Loading …
show series
 
🚨Could your next remote hire secretly be working for North Korea? In this episode of Securanoia, host Brooke Schärli, PhD talks with Aidan Raney, CEO of Farnsworth Intelligence, about infiltrating North Korean “laptop farms,” the rise of deepfake job applicants, and the malware tradecraft fueling global breaches. From personal hardship to leading O…
  continue reading
 
Publicly available data can paint a much clearer picture of our lives than most of us realize, and this episode takes a deeper look at how those tiny digital breadcrumbs like photos, records, searches, even the background of a Zoom call can be pieced together to reveal far more than we ever intended. To help break this down, I'm joined by Cynthia H…
  continue reading
 
Recorded live at DSEI 2025, this episode features host Kate Cox and a panel of Janes experts, Sean Corbett, Leendert Van Bochoven, and Phil Smith. They discuss the evolution of open-source intelligence (OSINT) and its vital role in global security. The panel examines the challenges posed by an overwhelming volume of data in the digital age and expl…
  continue reading
 
China’s aviation reached new milestones with the flight of a third J-36 tailless fighter prototype and a “Type C” loyal wingman drone appearing on the Type 076 ship Sichuan. This highlights rapid stealth maturation and a shift toward drone-centric naval power intended to project force in the Western Pacific. In the Ukraine conflict, Russia’s Sergei…
  continue reading
 
Andrew was a British modern languages student in 1989. He recounts the serendipitous moment when he stumbled upon an advert for a work and holiday trip to the GDR. The trip was organized by the Great Britain GDR Society, which allowed participants to experience life behind the Iron Curtain. For just £120, students could immerse themselves in a cult…
  continue reading
 
China has outfitted a cargo ship with 60 modular missile cells and radar, demonstrating a capability to convert its merchant fleet into improvised arsenal ships. In Iran, purpose-built hardened shelters for Su-35 fighters are nearing readiness at Hamadan Air Base. Reports also claim Supreme Leader Khamenei authorized developing miniaturized nuclear…
  continue reading
 
This episode breaks down the U.S. Department of Defense’s 2025 report to Congress on People’s Republic of China, assessing how Beijing is accelerating military modernization, coercive force employment, and global power projection to support its long-term goal of national “rejuvenation” by 2049. The report highlights China’s prioritization of Taiwan…
  continue reading
 
The intersection of AI and cybersecurity is changing faster than anyone expected, and that pace is creating both incredible innovation and brand-new risks we're only beginning to understand. From deepfake ads that fool even seasoned security professionals to autonomous agents capable of acting on our behalf, the threat landscape looks very differen…
  continue reading
 
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. In this episode, Senior Professional Writer Nathan Stephens breaks down policy writing. Join Our Cybersecurity Mission. Expect the Unexpected. Getting started with a BCP video. Getting started with a BCP recap blog. Testing Your BCP. BCP C…
  continue reading
 
This episode assesses intensifying global security pressures driven by concurrent crises in the Caribbean, Indo-Pacific, Middle East, and Europe, with emphasis on great-power risk management under escalation. China is shown maintaining a deliberately bounded posture toward Venezuela during Operation Southern Spear—condemning U.S. actions and safegu…
  continue reading
 
Keith Longstreth takes us through an extraordinary life shaped by the rhythms and risks of the Cold War. Born into an Air Force family, Keith grew up on bases across the world—from Scotland to Italy to Texas, where he describes a poignant last farewell to President Kennedy before his assassination. His career in the USAF placed him behind the scene…
  continue reading
 
On 19 December, Ukraine reported drones from the 15th Separate Artillery Reconnaissance Brigade (“Black Forest”) destroyed two Russian S-400 “Triumf” launchers in Belgorod Oblast, targeting a system operated by Russia’s 568th Anti-Aircraft Missile Regiment. On 17–18 December, the Institute for the Study of War assessed Russian leadership claims of …
  continue reading
 
Correction: Blockade order was issued on 16 December 2025, not 17 December 2025. I. Venezuela: Blockade and Escalation The central crisis is the escalation of Operation Southern Spear, which has shifted from counter-narcotics to an overt pressure campaign against Nicolás Maduro. President Trump ordered a “total and complete blockade” of sanctioned …
  continue reading
 
References. https://www.longwarjournal.org/archives/2025/12/how-venezuelas-maduro-became-washingtons-most-persistent-hemispheric-adversary.php https://insightcrime.org/news/the-pros-and-cons-of-a-us-intervention-in-venezuela/ https://understandingwar.org/ https://www.twz.com/sea/this-will-be-the-navys-new-medium-landing-ship https://breakingdefense…
  continue reading
 
Some conversations leave us with more questions than answers, and that’s exactly where we want to be. I’m Alex Schärli, producer turned reluctant co-host thanks to a little Swiss chocolate from my wife and host Brooke Schärli. Together we revisit the big moments, unpack the “wait what?” reactions, and bring your voices into the mix. Short, candid, …
  continue reading
 
References: https://understandingwar.org/research/russia-ukraine/russian-offensive-campaign-assessment-december-15-2025/ https://www.38north.org/2025/12/military-airfield-modernization-expands-to-uiju/ https://theaviationist.com/2025/12/15/china-ch-7-drone-first-flight/ https://www.stripes.com/branches/navy/2025-12-15/uss-nimitz-homecoming-last-tim…
  continue reading
 
This episode sponsored by Bad Intelligence. Find your new favorite work shirt at http://etsy.com/shop/BadIntelligence References https://www.sofx.com/u-s-forces-intercept-cargo-ship-carrying-missile-components-bound-for-iran/ https://defence-blog.com/u-s-marines-test-new-unmanned-amphibious-craft/ https://en.defence-ua.com/news/l3harris_delivers_fi…
  continue reading
 
Factor reporting and analysis for 14 December 2025. Sponsored by Bad Intelligence. Find your new favorite work shirt at - https://www.etsy.com/shop/BadIntelligence References https://breakingdefense.com/2025/12/aussies-buy-seven-more-mq-28-ghost-bat-ccas-following-live-fire-demo/?_bhlid=21783972b9216a8ebb3d3aa6006802b94cd96c95 https://euromaidanpre…
  continue reading
 
This is the 2nd part of the story of Miles, a British National Service conscript during his military service in the late 1950s. I’d like to give special thanks for the Norfolk Tank Museum for highlighting Miles’ story and one of his relatives for putting me in contact with him. Throughout the episode, our Miles shares captivating anecdotes and the …
  continue reading
 
When we think of cybersecurity, we often picture protecting online systems and data—but physical security is just as critical. In this episode, lead practitioner Steven Collins explains why safeguarding your physical space and assets matters, and shares practical steps you can take to secure your environment. Physical Security Policy in a Remote Wo…
  continue reading
 
In this episode of Needlestack, hosts AJ Nash and Robert Vamosi delve into the complexities of disappearing online, drawing insights from their experiences and the book 'The Art of Invisibility' by Kevin Mitnick. They discuss practical steps for maintaining anonymity, the role of technology in obfuscation, and the challenges of creating and sustain…
  continue reading
 
Sometimes we forget how much trust we place in the little things around us like a lock on a door or a badge on someone's shirt. We see those symbols and assume everything behind them is safe, but it doesn't always work that way. A person with enough confidence, or the right story, can slip through places we think are locked down tight, and most of …
  continue reading
 
Big thank you to Cisco for sponsoring this video and sponsoring my trip to the Cisco Partner Summit San Diego 2025 Chatbots are out; AI Agents are in. But are your networks ready for the massive traffic spikes, and is your data secure? In this interview from Cisco Partner Summit, we discuss the critical security flaws in the Model Context Protocol …
  continue reading
 
A big thank you to Proton Pass for sponsoring this video. Proton Pass’ Black Friday Special is $1.99 per month on a 12 month plan https://proton.me/davidbombal Save 60%. Rob Braxman reveals the dangers of Windows Recall, Apple Intelligence, and client-side scanning. Discover why AI surveillance and TPM chips mark the end of privacy in 2025. // Rob …
  continue reading
 
We hear the fascinating story of Miles, a British National Service conscript during his military service in the late 1950s. I’d like to give special thanks for the Norfolk Tank Museum for highlighting Miles’ story and one of his relatives for putting me in contact with him. Miles shares vivid memories of receiving his call-up papers, the initial me…
  continue reading
 
Securanoia sits down with Derek Erie (MrEerie), a digital forensic analyst specializing in healthcare incident response. Derek shares his unconventional path into cyber forensics and explains why hospitals are prime targets from the value of patient data to insider curiosity and third‑party risks. He breaks down real-world investigative practice, t…
  continue reading
 
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission. In this episode, Privacy Auditor Suzette Corley dives into ISO 27701. ISO 27701 – Information Security and Privacy Management Systems: https://www.iso.org/standard/27701 2 Minutes on ISO 27701 KirkpatrickPri…
  continue reading
 
Fraud today doesn't feel anything like it used to. It's not just about somebody skimming a credit card at a gas pump or stealing a check out of the mail. It has gotten personal, messy, emotional. Scammers are building relationships, earning trust, and studying the little details of our lives so they can strike when we're tired, distracted, or deali…
  continue reading
 
Some conversations leave us with more questions than answers, and that’s exactly where we want to be. I’m Alex Schärli, producer turned reluctant co-host thanks to a little Swiss chocolate from my wife and host Brooke Schärli. Together we revisit the big moments, unpack the “wait what?” reactions, and bring your voices into the mix. Short, candid, …
  continue reading
 
Big thank you to Cisco for sponsoring this video and sponsoring my trip to the Cisco Partner Summit San Diego 2025 Cisco Unified Edge & The Future of Physical AI (w/ Kevin Wolenweber) Kevin Wolenweber reveals Cisco's new Unified Edge device and details the massive Nvidia partnership transforming data centers. We discuss the shift to "Physical AI," …
  continue reading
 
The Berlin Blockade was one of the first major international crises of the Cold War when the Soviet Union blocked the Western Allies' railway, road, and canal access to the sectors of Berlin under Western control. I speak with Joseph Pearson, the author of “The Airlift Victories, Myths, and the Berlin Blockade. This is not your standard military hi…
  continue reading
 
In this episode, hosts Robert Vamosi and AJ Nash engage with Neil Ysart, a seasoned expert in cyber investigations and open source intelligence (OSINT). They discuss the Coalition of Cyber Investigators, its role in promoting OSINT, and the importance of establishing standards in the field. The conversation delves into the challenges and risks asso…
  continue reading
 
AI has brought incredible new capabilities into everyday technology, but it's also creating security challenges that most people haven't fully wrapped their heads around yet. As these systems become more capable and more deeply connected to the tools and data we rely on, the risks become harder to predict and much more complicated to manage. My gue…
  continue reading
 
Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partner Summit San Diego 2025. This video is a deep dive with Jeetu Patel on why the real AI revolution is happening in infrastructure and networking, not just in GPUs or chatbots. Jeetu explains that we are massively underestimating how much AI infrastructure the world w…
  continue reading
 
Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partner Summit 2025. Is your encryption safe? Cisco’s Vijoy Pandey reveals why distributed quantum computing is coming in 2-3 years, not 10. Learn about the 'Store Now, Harvest Later' threat and how quantum networking changes everything, including the security of your VPN…
  continue reading
 
They said they love hiking, jazz, and meditation—but their socials say otherwise. In a world where 80% of dating profiles contain lies or omissions, how can you know who you’re really talking to? In this episode of Ask Socialprofiler, Tony and Dave unpack the truth about online dating in 2025. From fake identities to billion-dollar scams, they show…
  continue reading
 
Show Notes - https://forum.closednetwork.io/t/episode-49-interview-with-zach-w-developing-coze-js-encryption-cryptography-chat/168 Website / Donations / Support - https://closednetwork.io/support/ BTC Lightning Donations - [email protected] / [email protected] Thank You Patreons! - https://www.patreon.com/closednetwork Michael Bates - Privac…
  continue reading
 
This is the largely untold story of Task Force Faith, the U.S. Army soldiers who although outnumbered 8-1 by Chinese troops fought valiantly during the Battle of Chosin Reservoir in the Korean War. Author Steve Fogel has written a new book called A Task Force Called Faith - The Untold Story of the U.S. Army Soldiers Who Fought for Survival at Chosi…
  continue reading
 
GrapheneOS expert MetropleX joins David Bombal to bust myths. We cover banking apps, notifications, Play Services, and why GrapheneOS is more secure than iOS's lockdown mode. // Sponsored Segment A big thank you to Proton VPN for sponsoring this video. This Black Friday, Save 75% on Proton VPN on the 24 month plan with my link.https://protonvpn.com…
  continue reading
 
From the mat to the military to the mind, Dr. Leyla Brusatori “Dr. B” has lived it all. In this Veterans Day episode, host Brooke Scharli uncovers how an Air Force veteran and former elite gymnast turned psychologist is helping veterans reclaim peace through brain-based care, practical holiday stress tools, and community connection. Expect real tal…
  continue reading
 
Some conversations leave us with more questions than answers, and that’s exactly where we want to be. I’m Alex Schärli, producer turned reluctant co-host thanks to a little Swiss chocolate from my wife and host Brooke Schärli. Together we revisit the big moments, unpack the “wait what?” reactions, and bring your voices into the mix. Short, candid, …
  continue reading
 
Ransomware isn't a lone hacker in a hoodie. It's an entire criminal industry complete with developers, brokers, and money launderers working together like a dark tech startup. And while these groups constantly evolve, so do the tools and partnerships aimed at stopping them before they strike. My guest today is Cynthia Kaiser, former Deputy Assistan…
  continue reading
 
Your child is online—and so are the people influencing them. From games to group chats, social media to secret accounts, the digital world is shaping your kids in real time. Are you part of that conversation? In this episode of Ask Socialprofiler, Tony and Dave dive into what modern parenting really looks like in 2025—and how AI-powered tools like …
  continue reading
 
Recorded live from DSEI 2025. Join host Kate Cox and a panel of Janes experts including Sean Corbett, Dylan Lehrke, and Tom Barton, as they unpack the essentials of intelligence, from foundational data to cutting-edge military insights. Discover what goes on behind the scenes in crafting the intelligence that informs global defence strategies and d…
  continue reading
 
Bill Hodes was an American school child in 1950s Revolutionary China and this is the second part of his story. Among many stories we hear how he had the unique opportunity to meet one of China's most revered leaders, Zhou Enlai, the first Premier of the People's Republic of China and how he played softball with US and British POWs from the Korea Wa…
  continue reading
 
Show Notes: The Monitoring and Enforcement Episode KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. In this episode, Vice President of Privacy Assurance Services, Mark Hinely shares the importance of monitoring and enforcement. Join Our Cybersecurity Mission: https://www.linkedin.com/sho…
  continue reading
 
In this episode, Michael DeBolt joins Robert Vamosi and AJ Nash to dive into the world of Cyber HUMINT — the application of traditional human intelligence (HUMINT) tradecraft in cyberspace. They discuss how investigators use digital personas (sometimes called “sock puppets”) to infiltrate online threat actor communities, collect intelligence, and e…
  continue reading
 
Criminals are always adapting. Whether it's copper wiring stripped from job sites or porch pirates grabbing deliveries in broad daylight, they keep finding new ways to take what isn't theirs. But maybe prevention isn't about harsher punishment or more cameras. Maybe it's about smarter design and understanding what drives people to steal in the firs…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play