Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Security Experts Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Russia knows our weaknesses. But do you? A major five-part series from Sky News and Tortoise which imagines how a Russian attack on the UK could play out – and invites real-life former ministers, military chiefs and other experts to figure out how to defend the country. Written and presented by Sky News' security and defence editor, Deborah Haynes. This is Deborah's second podcast series for Sky News. In her first series, Into The Grey Zone, Deborah explores the murky evolution of warfare. W ...
…
continue reading
Decoding Geopolitics is a podcast that tries to make sense of today's dangerous world by talking with real experts on international relations, strategy and security.
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
On Mondays, Jon Stewart hosts The Daily Show, but on Thursdays, he's back in your ears with The Weekly Show -- a podcast featuring in-depth conversations with a range of special guests. From experts and advocates, to stakeholders and thought leaders, we discuss the challenges, changes, and ideas that are shaping our world.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Learn how to think not what to think.
…
continue reading
Discussions over drinks with security, defense, and foreign policy insiders and experts. The original War on the Rocks podcast series.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we’re experts. Because this is the internet, and that’s how it works now.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
After 25 years helping litigators find the right expert witnesses, Round Table Group’s network contains some of the world’s greatest experts. On this podcast, we talk to some of them about what’s new in their field of study and their experience as expert witnesses.
…
continue reading
Stay updated with the latest happenings in the world of stock markets with our expert analysts
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
Michael Colligan is joined by experts, advocates, and professionals to discuss creating better quality night skies.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
…
continue reading
Carnegie Connects is our premier virtual event series hosted by Aaron David Miller. Every other week, he tackles the most pressing foreign policy issues of the day in conversations with journalists, policymakers, historians, and experts.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
World-renowned aviation-industry consultants and former NTSB investigators John Goglia and Greg Feith have 100 years of worldwide aviation safety experience between them. In this hard-hitting podcast series they talk about everything aviation -- from the behind-the-scenes facts on deadly air crashes to topics of interest such as tips and tricks for navigating through airports and security, traveling with infants and children, unruly passengers, and packing your bags to ease through security.
…
continue reading
State Secrets is a weekly interview podcast featuring Cipher Brief experts and national security leaders.
…
continue reading
Welcome to The Peter Zeihan Podcast Series! Geopolitical Strategist Peter Zeihan is a global energy, demographic and security expert. If you want to stay informed on the realities of geography and populations, you've come to the right place. Zeihan's worldview offers insights into how global politics impact markets and economic trends, helping industry leaders navigate today’s complex mix of geopolitical risks and opportunities. Expect a forward-looking approach to what will drive tomorrow’s ...
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Daily analysis of the biggest global security developments, brought to you by military specialists and The Times' renowned foreign correspondents. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
Engaging with Security and Legal Expert, Dr. James Pastor
46:39
46:39
Play later
Play later
Lists
Like
Liked
46:39In this episode… Dr. James Pastor is the principal expert at SecureLaw LLC, a security and legal consultancy. He's a security expert with a broad background, ranging from police work to academia. He's a published author, a sought-after public speaker and of course, an expert witness. Dr. Pastor holds a PhD in public policy analysis. Do not, under a…
…
continue reading
Hawaiian Airlines reports a cybersecurity incident. Microsoft updates its Windows Resiliency Initiative after the 2024 CrowdStrike crash. CitrixBleed 2 is under active exploitation in the wild. Researchers disclose a critical vulnerability in Open VSX. Malware uses prompt injection to evade AI analysis. A new report claims Cambodia turns a blind ey…
…
continue reading

1
Trump vs the Ayatollah: what next for Iran?
10:31
10:31
Play later
Play later
Lists
Like
Liked
10:31Iran’s Supreme Leader has emerged from his bunker to declare victory over the US and Israel. Ayatollah Ali Khamenei insists they achieved little with their attacks on Tehran, and did no significant damage to Iran’s nuclear facilities. But do Iranians believe his sabre-rattling? Bronwen Maddox, director of the Chatham House think tank, explains what…
…
continue reading

1
Sarah Paine Interview Part 2: Avoiding WW3, War Over Taiwan & Future of Europe
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22➡️ Join the community of geopolitics enthusiasts and gain access to exclusive content on PATREON: https://www.patreon.com/DecodingGeopolitics ➡️ Sign up to my free geopolitics newsletter: https://stationzero.substack.com/ Thank you Conducttr for sponsoring the podcast. Take a look at Conducttr's services and its crisis exercise software at: https:/…
…
continue reading

1
The Revolution in Military Affairs: Europe's Future || Peter Zeihan
10:30
10:30
Play later
Play later
Lists
Like
Liked
10:30Last time we chatted about the misalignment between American weapons systems and European needs. So, what does the future of Europe's military strategy look like? Join the Patreon here: https://www.patreon.com/PeterZeihan Full Newsletter: https://mailchi.mp/zeihan/the-revolution-in-military-affairs-europes-future…
…
continue reading

1
Lawfare Daily: Ukraine-Russia Negotiations with Eric Ciaramella and Samuel Charap
1:08:15
1:08:15
Play later
Play later
Lists
Like
Liked
1:08:15Lawfare Legal Fellow Mykhailo Soldatenko sits down with Eric Ciaramella, Senior Fellow at the Carnegie Endowment for International Peace, and Samuel Charap, Senior Political Scientist at Rand Corporation, to discuss the key issues in the Ukraine-Russia talks. They chat about the national interests of the interested parties, whether a negotiated set…
…
continue reading
Helpful episodes to listen to first What is a Security Stack Questions we answer in this episode What are the 6 layers in the Bulletproof Stack Formula? How are they grouped? What are the most neglected layers? Episode summary There are 6 types of layers we can review to help us build a Security Stack. They help us build redundancy into our Securit…
…
continue reading

1
Is Vuln Management Dead? - HD Moore - PSW #880
2:16:08
2:16:08
Play later
Play later
Lists
Like
Liked
2:16:08This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
…
continue reading
Patches, patches and more patches.A patient death has been linked to the 2023 ransomware attack on an NHS IT provider. U.S. authorities indict the man known online as “IntelBroker”. A suspected cyberattack disrupts Columbia University’s computer systems. A major license plate reader company restricts cross-state data access after reports revealed m…
…
continue reading

1
Introducing "The Iran Reckoning with Afshon Ostovar"
40:30
40:30
Play later
Play later
Lists
Like
Liked
40:30War on the Rocks is launching a new show called "The Iran Reckoning with Afshon Ostovar." It's a members-only show but this first episode is free for all. Join us as renowned Iran scholar Afshon Ostovar takes you inside one of America's most complex and consequential adversaries. In this episode, Ryan introduces you to Afshon and his background (ab…
…
continue reading

1
Rational Security: The “Pronghorn Shirt Daily” Edition
1:18:09
1:18:09
Play later
Play later
Lists
Like
Liked
1:18:09This week, Scott sat down with his Lawfare colleagues Benjamin Wittes and Natalie Orpett, and University of Virginia School of Law professor Ashley Deeks, to talk through the week’s big national security news, including: “Bracing for Fallout.” In a surprise move, President Trump joined Israel’s military campaign against Iran over the weekend, using…
…
continue reading
A Pentagon intelligence leak has sparked a war of words over Iran’s nuclear programme, with conflicting assessments from US intelligence agencies and the White House fuelling heated debate. Former Pentagon official Jim Townsend joins us to unpack the challenges of intelligence and examine the fraught relationship between the White House and the int…
…
continue reading

1
Engaging with Energy, Oil & Gas Expert, Steve Reese
22:46
22:46
Play later
Play later
Lists
Like
Liked
22:46In this episode… Today’s guest, Steve Reese, is the CEO of Reese Energy Consulting, a full-service consulting firm serving the energy sector, and Reese Energy Training. He is an expert in natural gas contracts, energy marketing, sales contracts, and more. Mr. Reese holds a degree in Business Administration from the University of Central Oklahoma. E…
…
continue reading

1
Episode 28: The Darkness News Update for June 26, 2025
24:19
24:19
Play later
Play later
Lists
Like
Liked
24:19Highlights from this episode: - Parks Funding - New Data - Curb Cuts and Umbrellas - Blacker Than the Blackest Black Times Infinity! Intro and outro music by Doctor Turtle Sponsored by The National Association of Innovative Lighting Distributors visit https://naild.org/ Headlines and Sources can be found at www.RestoringDarkness.com…
…
continue reading

1
Israel’s Uncertain Endgame in Iran || Peter Zeihan
5:06
5:06
Play later
Play later
Lists
Like
Liked
5:06Israel and Iran are still in the thick of an air war, which is really their only option given the several countries between them. But are things going to ramp up here soon? Is nuclear war coming? Will the US get involved? Join the Patreon here: https://www.patreon.com/PeterZeihan Full Newsletter: https://mailchi.mp/zeihan/israels-uncertain-endgame-…
…
continue reading

1
Why is Fighting Cybercrime Worth the Effort?
45:52
45:52
Play later
Play later
Lists
Like
Liked
45:52Cyber crime continues to grow each year, but should organizations give up fighting it? On this episode of Unspoken Security, host AJ Nash speaks with Robert Duncan from Netcraft, who argues the answer is absolutely not. Robert makes the case that fighting cyber crime is worth the effort, even when it feels like an endless battle. Robert challenges …
…
continue reading

1
Lawfare Daily: ‘Ransom War’ with Max Smeets
53:06
53:06
Play later
Play later
Lists
Like
Liked
53:06Max Smeets, Co-Director of Virtual Routes and Senior Researcher at ETH Zurich, joins Lawfare’s Jonathan Cedarbaum and Justin Sherman to discuss his recently released book “Ransom War: How Cybercrime Became a Threat to National Security.” They discuss the history of ransomware (including the term itself), how the threats have evolved over the years,…
…
continue reading

1
Why Fraud Prevention Silos Are Holding Your Business Back
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53"The thing to challenge is the fact that fraud prevention is a vertical by itself," says Guido Ronchetti, CTO at XTN Cognitive Security. He stresses that recent fraudulent trends exhibit "no real separation between fraud, cybersecurity, and AML.” In this episode of The Security Strategist podcast, Jonathan Care discusses fraud prevention with Ronch…
…
continue reading

1
Iran, Beyond the Headlines with Maziar Bahari
1:33:13
1:33:13
Play later
Play later
Lists
Like
Liked
1:33:13With the US now directly engaged in the Israel-Iran conflict, Jon is joined by Maziar Bahari, publisher of iranwire.com and author of “Then They Came for Me,” a memoir that served as the basis for Jon’s 2014 film “Rosewater.” Together, they explore the reality of life under Iran's current government, discuss the complex challenges of regime change …
…
continue reading

1
Iran, Israel and the future of Middle East security
53:20
53:20
Play later
Play later
Lists
Like
Liked
53:20Where do the other Middle East countries and the Gulf nations stand on the Iran-Israel conflict? How do they view the US’ changing foreign policy? What were the motivations behind the recent US and Israeli attacks on Iran? Was it preventive or pre-emptive action? Is regime change in Iran a realistic objective by Israel/US? Could Australia be asked …
…
continue reading
Cybercriminals target financial institutions across Africa using open-source tools. Threat actors are using a technique called Authenticode stuffing to abuse ConnectWise remote access software. A fake version of SonicWall’s NetExtender VPN app steals users’ credentials. CISA and the NSA publish a guide urging the adoption of Memory Safe Languages. …
…
continue reading

1
Episode 27: Fireflies Don’t Have Blackout Curtains with Eileen Kragie
42:31
42:31
Play later
Play later
Lists
Like
Liked
42:31In this compelling episode, we sit down with Eileen Kragie, founder of Dark Sky Friends and passionate advocate for DarkSky International, to explore the urgent issue of light pollution and how it's transforming our night skies. Eileen shares how her lifelong awareness of light trespass evolved into a full-scale movement for legislative reform and …
…
continue reading
Gen. Jim Rainey, the commander of Army Futures Command, joins Ryan to share how emerging technologies are set to transform the way America’s soldiers will fight and win. He also shares some key insights about the Army Transformation Initiative.
…
continue reading

1
Analyzing Iran-Israel Cyber Threats, New Scattered Spider Attack Chain
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst Hayden and Threat Hunter Leo as they discuss: New Scattered Spider Attack Chain Israel and Iran Cyber Threat Deep Dive Top Iran-linked Threat Groups & How to Mitigate Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research…
…
continue reading
The Charge of the Light Brigade was a military action undertaken by British light cavalry against Russian forces during the Battle of Balaclava in the Crimean War, resulting in many casualties to the cavalry. On 25 October 1854, the Light Brigade, led by Lord Cardigan, mounted a frontal assault against a Russian artillery battery which was well-pre…
…
continue reading
As NATO leaders gather in The Hague - edging towards an historic 5% defence spending target - their focus is on Donald Trump's influence, and a continuing land war in Europe. John Lough - a former NATO official and now Head of Foreign Policy at the New Eurasian Strategies Centre unpacks how this summit has unfolded. The World in 10 is the Times' da…
…
continue reading

1
Safety Critical Information Being Withheld from Air India 787 Crash? – Episode 276
35:25
35:25
Play later
Play later
Lists
Like
Liked
35:25Greg Feith, John Goglia and Todd Curtis find the lack of information emerging about the Air India 787 crash surprising. They wonder if safety critical information is being withheld from the aviation community and the public at large. The flight data recorder (FDR) is in the US for analysis, while the cockpit voice recorder (CVR) remains in India. T…
…
continue reading

1
The Revolution in Military Affairs: Weapons Sales || Peter Zeihan
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17Our series on the revolution in military affairs continues with the geopolitics of weapons sales. Why does Europe buy US weapons? And will they continue to do so? Join the Patreon here: https://www.patreon.com/PeterZeihan Full Newsletter: https://mailchi.mp/zeihan/the-revolution-in-military-affairs-weapons-sales…
…
continue reading

1
Lawfare Daily: A Right to Warn: Protecting AI Whistleblowers with Charlie Bullock
41:11
41:11
Play later
Play later
Lists
Like
Liked
41:11In the wake of controversy over OpenAI’s restrictive nondisclosure agreements, a bipartisan group of senators has introduced the AI Whistleblower Protection Act. In this episode, Lawfare Research Director Alan Rozenshtein spoke with Charlie Bullock, Senior Research Fellow at the Institute for Law & AI and co-author of a new Lawfare article on the b…
…
continue reading

1
EP 131 Tim Wenzel on "Targeted: CEOs, Culture, and the Fallout We Didn't Predict'
54:40
54:40
Play later
Play later
Lists
Like
Liked
54:40Send us a text 🔑 Top Talking Points: “Targeted: CEOs, Culture, and the Fallout We Didn't Predict” The Assassination of Brian Thompson – Overview of the attack, public reaction, and why so little is known about the case – The transformation of the attacker into a disturbing “folk hero” among some Gen Z communities Executive Risk in a Post-COVID Worl…
…
continue reading

1
Thriving Through Volatility: Insights for CISOs - Jeff Pollard, Pejman (Pej) Roshan, Deepen Desai - BSW #401
1:05:24
1:05:24
Play later
Play later
Lists
Like
Liked
1:05:24In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
…
continue reading
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwante…
…
continue reading

1
SN 1031: How Salt Typhoon Gets In - What "AI" Really Means
3:00:38
3:00:38
Play later
Play later
Lists
Like
Liked
3:00:38China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwante…
…
continue reading
Hey Friends! This is one of the most important issues so far -- please share! Ever find yourself believing something… just because you’ve heard it enough? That’s the Illusory Truth Effect at work. "Illusory Truth" is the cognitive glitch that makes repetition feel like credibility. In this issue of Deceptive Minds, we explore: 🧠 Why familiar lies f…
…
continue reading

1
The Rise of Malware: Salt Typhoon and Spark Kitty - SWN #488
35:37
35:37
Play later
Play later
Lists
Like
Liked
35:37In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak …
…
continue reading

1
#69 Ed Arnold: What No One Dared To Say At The NATO Summit
27:23
27:23
Play later
Play later
Lists
Like
Liked
27:23➡️ Join the community of geopolitics enthusiasts and gain access to exclusive content on PATREON: https://www.patreon.com/DecodingGeopolitics ➡️ Sign up to my free geopolitics newsletter: https://stationzero.substack.com/
…
continue reading

1
Iran’s digital threat after U.S. strikes.
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35Cybersecurity warnings about possible Iranian retaliation have surged. A potential act of sabotage disrupts the NATO Summit in The Hague. Canadian cybersecurity officials discover Salt Typhoon breached a major telecom provider. The U.S. House bans WhatsApp from all government devices. APT28 uses Signal chats in phishing campaigns targeting Ukrainia…
…
continue reading

1
Developing: All Killed in Helicopter Crash with Radio Tower - Episode 248
32:34
32:34
Play later
Play later
Lists
Like
Liked
32:34Todd Curtis and John Goglia share the unfolding information surrounding a October 20, 2024 crash of an air tour R44 helicopter into a radio tower in Houston. The NTSB investigation continues. The air tour helicopter apparently crashed into the radio tower while the pilot in command was reading back a traffic advisory about a second helicopter in th…
…
continue reading
Announced amidst missile strikes and heated rhetoric - Donald Trump’s fragile peace deal between Iran, Israel and the US is holding, for now. The Times’ foreign correspondent Richard Spencer examines its prospects - and what it means for the region. The World in 10 is the Times' daily podcast dedicated to global security. Expert analysis of war, di…
…
continue reading

1
E054 - Building a Data Governance Strategy Part 2
45:23
45:23
Play later
Play later
Lists
Like
Liked
45:23In this episode, Perry Correll joins us to demystify data governance—framing it not as a source of fear, but as a framework for smarter, safer business practices. We explore how different teams within an organization view data through different lenses, and how compliance can serve as a bridge between them to enable both innovation and accountabilit…
…
continue reading

1
What is Israel's Victory Condition in Iran? || Peter Zeihan
4:10
4:10
Play later
Play later
Lists
Like
Liked
4:10Israel and Iran are still going at it, but things have not significantly escalated. Here's a breakdown of the situation and what could come next. Join the Patreon here: https://www.patreon.com/PeterZeihan Full Newsletter: https://mailchi.mp/zeihan/what-is-israels-victory-condition-in-iran
…
continue reading

1
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336
1:01:18
1:01:18
Play later
Play later
Lists
Like
Liked
1:01:18Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
…
continue reading

1
Lawfare Daily: U.S. Strikes on Iranian Nuclear Facilities
59:34
59:34
Play later
Play later
Lists
Like
Liked
59:34In a live conversation on June 23, Lawfare Editor-in-Chief Benjamin Wittes spoke to Lawfare Senior Editor Scott Anderson, Lawfare Foreign Policy Editor and CSIS fellow Daniel Byman, and Vice President and Director of Foreign Policy at the Brookings Institution Suzanne Maloney about the American attacks on Iranian nuclear sites, what the reaction wi…
…
continue reading
US warns of heightened risk of Iranian cyberattacks. Cyber warfare has become central to Israel and Iran’s strategies. Oxford City Council discloses data breach. Europe aiming for digital sovereignty. Michigan hospital network says data belonging to 740,000 was stolen by ransomware gang. RapperBot pivoting to attack DVRs. A picture worth a thousand…
…
continue reading