Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Experts Podcasts

show episodes
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
National security, unlocked. Each Thursday, host Mary Louise Kelly and a team of NPR correspondents discuss the biggest national security news of the week. With decades of reporting from battlefields and the halls of power, they bring you inside the Pentagon, State Department, and intelligence community to help you understand America's shifting role in the world, and how events in faraway places matter here at home. Additional episodes feature interviews with power players from the NatSec wo ...
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
On Mondays, Jon Stewart hosts The Daily Show, but on Thursdays, he's back in your ears with The Weekly Show -- a podcast featuring in-depth conversations with a range of special guests. From experts and advocates, to stakeholders and thought leaders, we discuss the challenges, changes, and ideas that are shaping our world.
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Artwork

1
Socializing Security

Socializing Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
  continue reading
 
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Artwork
 
WAR ROOM: Pandemic is the first and most comprehensive program to bring the most up to the minute information on the news of the day. Stephen K. Bannon brings medical experts, politicians, business leaders, and those on the front lines for a comprehensive look at the latest news from all and provide their insider insights.
  continue reading
 
Artwork

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
  continue reading
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Artwork

1
Unspoken Security

Unspoken Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
  continue reading
 
Artwork

1
Technology and Security

Dr Miah Hammond-Errey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
  continue reading
 
Artwork

1
ASecuritySite Podcast

Professor Bill Buchanan OBE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
  continue reading
 
Artwork

1
Security Dilemma

The John Quincy Adams Society

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
U.S. foreign policy for the future. Security Dilemma brings you conversations with the experts, policymakers, and thinkers charting new paths forward from the wreckage of recent decades and toward a national security and defense policy guided by prudence and restraint. Cohosts John Allen Gay and A.J. Manuzzi bring you the information you need to shape a wiser approach. Security Dilemma is a podcast of the John Quincy Adams Society, an independent nonprofit organization dedicated to advancing ...
  continue reading
 
Artwork

1
Carnegie Connects

Carnegie Endowment for International Peace

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Carnegie Connects is our premier virtual event series hosted by Aaron David Miller. Every other week, he tackles the most pressing foreign policy issues of the day in conversations with journalists, policymakers, historians, and experts.
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Artwork

1
MSP 1337

Chris Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference.
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork

1
International SOS

International SOS

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The International SOS Situation Update podcast provides the latest analysis, advice and recommendations on the health and security risks impacting you and your organisation today. With support from our global medical and security experts, we discuss the most pertinent topics impacting a workforce and provide tactical guidance on mitigating health, safety, security and wellbeing risks.
  continue reading
 
Artwork

1
SpyTalk

SpyTalk, Jeff Stein

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
  continue reading
 
Artwork

1
Cloud Security Podcast

Cloud Security Podcast Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
​Presented by ​Andrew Mueller, Monocle’s flagship global-affairs show features​ expert guests ​and in-depth analysis of the big issues of the week. Nominated for ‘Best Current Affairs’ show and the ‘Spotlight Award’ in the 2022 British Podcast Awards.
  continue reading
 
Artwork
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Artwork

1
Feel Better, Live More with Dr Rangan Chatterjee

Dr Rangan Chatterjee: GP & Author

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
“Health has become overcomplicated. I aim to simplify it” In this podcast, we hear stories from leading health experts and exciting personalities who offer easy health life-hacks, expert advice and debunk common health myths giving you the tools to revolutionise how you eat, sleep, move and relax. Hosted by Dr Chatterjee - one of the most influential GPs in the country with nearly 20 years experience, star of BBC 1’s Doctor In the House, and author of 6 internationally best-selling books, in ...
  continue reading
 
Artwork

551
National Security Law Today

National Security Law Today

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
National Security Law Today brings legal experts discussing the hot topics and current issues in the world of national security law right to your phone. Get information and advice for lawyers, law students or interested parties who want to dig deeper into the law that protects the country.
  continue reading
 
Artwork

1
Investigation Insiders

Integras Intelligence

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join hosts Forhad Razzaque, Jo Mauro, and other experts from the Integras Intelligence team as they dive into the world of investigations and security. Our guests include security leaders, law enforcement officials, and business professionals. Each episode features in-depth discussions on the latest trends, challenges, and innovations shaping the industry today. Whether you're a security professional, HR leader, or just curious about how investigations impact our world, this podcast offers v ...
  continue reading
 
Loading …
show series
 
Send us a text Jennifer Fraser is an author, award-winning educator, and consultant. She has a PhD in Comparative Literature and her books have always focused on how we have the capacity to transform ourselves. We can go from being readers to writers of culture. We can reject society's demands that we suppress our emotions and instead come alive wi…
  continue reading
 
This Twitter Space, hosted by Alberto Daniel Hill, showcases a significant divergence in flow, transitioning from serious technical discussion and high-stakes hacking claims to an extended, highly theatrical, and absurd roleplay centered on cybersecurity, sexuality, and self-parody, particularly involving Cindy and Helen.Analysis of the Space Flow …
  continue reading
 
La Plataforma GURI (Gestión Unificada de Registros e Información) es descrita en las fuentes como el sistema nervioso central para la educación primaria en Uruguay y es administrada bajo la Dirección General de Educación Inicial y Primaria (DGEIP/CEIP). Sus funciones principales son multifacéticas, abarcando roles esenciales de gestión de datos, ap…
  continue reading
 
Crisis de Datos en URUGUAY: El Hackeo GURI, por Alberto Daniel Hill Alberto Daniel Hill es identificado en los documentos como un experto en seguridad que contribuyó a las narrativas críticas y de análisis técnico en redes sociales (publicaciones en X), particularmente en relación con el incidente de ciberseguridad que afectó al Banco Hipotecario d…
  continue reading
 
Alberto Daniel Hill es identificado en los documentos como un experto en seguridad que contribuyó a las narrativas críticas y de análisis técnico en redes sociales (publicaciones en X), particularmente en relación con el incidente de ciberseguridad que afectó al Banco Hipotecario del Uruguay (BHU). Este incidente ocurrió de forma concurrente con el…
  continue reading
 
Alberto Daniel Hill es identificado en los documentos como un experto en seguridad que contribuyó a las narrativas críticas y de análisis técnico en redes sociales (publicaciones en X), particularmente en relación con el incidente de ciberseguridad que afectó al Banco Hipotecario del Uruguay (BHU). Este incidente ocurrió de forma concurrente con el…
  continue reading
 
Ballistic Hot Dogs, Sonicwall, Clayrat, Twonet, Lockbit, Breachforums, Resumes, Discord, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-519
  continue reading
 
In a new book the CNN anchor unspools the inside story of a unique terrorism case. Jake Tapper https://x.com/jaketapper Race Against Terror https://www.simonandschuster.com/books/Race-Against-Terror/Jake-Tapper/9781668079447 Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Fo…
  continue reading
 
International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in application security (AppSec) programs. Microsegmentation can contain ransomw…
  continue reading
 
How do you perform incident response on a Kubernetes cluster when you're not even on the same network? In this episode, Damien Burks, Senior Security engineer breaks down the immense challenges of container security and why most commercial tools are failing at automated response. While many CNAPPs provide runtime detection, they lack a "sophisticat…
  continue reading
 
After Syria’s government change in December 2024, uncertainty persists around the country’s stability. Following their recent in-country assessment, Lead Security Analyst Polina Vynogradova and Security Director Gillan McNay discuss the evolving governance, security and economic challenges, and what organisations need to know to operate safely.…
  continue reading
 
David Sullivan, Executive Director of the Digital Trust & Safety Partnership, and Rayi Iyer, Managing Director of the Psychology of Technology Institute at USC’s Neely Center, join Kevin Frazier, AI Innovation and Law Fellow at the University of Texas School of Law and a Senior Editor at Lawfare, to discuss the evolution of the Trust & Safety field…
  continue reading
 
1. Introduction: Deconstructing a New Media Ecosystem The Cybermidnight Club is not a conventional podcast; it is a unique, personality-driven media ecosystem meticulously constructed around its host, Alberto Daniel Hill. This report’s core thesis is that the podcast’s value and uniqueness derive from its radical authenticity and a “live-first,” co…
  continue reading
 
Las fuentes proporcionadas consisten en un análisis estratégico experto y un informe resumido sobre una serie de incidentes sistémicos de ciberseguridad que afectaron al sector público de Uruguay a fines de 2025. Ambos documentos se centran en gran medida en el incidente que afectó a la ANEP Plataforma GURI, un sistema de gestión educativa que supu…
  continue reading
 
The provided sources consist of an expert strategic analysis and a summary report concerning a series of systemic cybersecurity incidents that affected Uruguay's public sector in late 2025. Both documents focus heavily on the incident impacting the ANEP Plataforma GURI, an educational management system alleged to have suffered the exfiltration of n…
  continue reading
 
If you are a client of BANCO HIPOTECARIO DEL URUGUAY and you badly want answers, these are the answers you are looking for. #Uruguay #Cybersecurity #BHU #Cyberattack #TraditionalMedia #MediaSilence #InstitutionalOpacity #CERTuy #CounterNarrative
  continue reading
 
Do you think that it’s inevitable that the function of your brain will decline as you get older? Or, do you believe that there are simple things you can do each day to preserve, protect and enhance it? Feel Better Live More Bitesize is my weekly podcast for your mind, body, and heart. Each week I’ll be featuring inspirational stories and practical …
  continue reading
 
And the National Guard: coming to a city near you? After two brutal years of war, there is finally hope for a lasting peace in Gaza. Greg Myre in Tel Aviv explains why things start to get a lot more complicated after the initial ceasefire and return of hostages. And Pentagon correspondent Tom Bowman breaks down when the president can legally federa…
  continue reading
 
In this episode Michael, Sarah and Mark talk with guest Ryen Macababbad, Principal Security Program Manager at Microsoft about her current work on standardizing security terminology and taxonomy across Microsoft. Also, how getting terminology right is important to security, especially for those with neurodiverse conditions, such as autism. We also …
  continue reading
 
This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
  continue reading
 
This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
  continue reading
 
Displaced aggression is a robust psychological phenomenon defined as the redirection of intense rage or hostility from its original source of provocation onto a substitute, often innocent, target. This behavior is generally not random but is driven by underlying psychological needs and mechanisms.Here is a detailed description of displaced aggressi…
  continue reading
 
https://cybermidnight.club/deconstructing-the-attack-a-psychological-analysis-for-understanding-and-healing-2/ Displaced aggression is a robust psychological phenomenon defined as the redirection of intense rage or hostility from its original source of provocation onto a substitute, often innocent, target. This behavior is generally not random but …
  continue reading
 
DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment…
  continue reading
 
These sources collectively provide a detailed psychological and legal analysis of a relational conflict where an individual, CyberGurl10, publicly attacked her fiancé, Alberto, in an online forum, contrasting this with her private disputes against her lawyer and ex-husband. The analysis concludes that the public confrontation with Alberto was uniqu…
  continue reading
 
1. Introducción: Dos Crisis, Dos Relatos y una Verdad en Disputa La reciente ola de ciberataques en Uruguay ha puesto de manifiesto no solo las vulnerabilidades técnicas de su infraestructura crítica, sino una profunda crisis de confianza en las instituciones estatales. El incidente del Banco Hipotecario del Uruguay (BHU) de septiembre de 2025 es e…
  continue reading
 
The latest update, which provides context and status as of October 9, 2025, significantly reinforces the core tenets of Alberto Hill’s counter-narrative, primarily by highlighting the systemic nature of the governance failures and confirming the persistence of institutional minimization. https://cybermidnight.club/the-latest-update-which-provides-c…
  continue reading
 
HIIS THE ANSWER TO THE FOLLOWING MESSAGE OF CYBERGURL1'0 ON TWITTTER AFTER PUBLISHING AN ARTICLE BASED ON THE EVENT RELATED""And Im one with ager issues. Told there also that it was only way for me to reach you when you have blocked me and ghosted me for days. Only reason was me to come ask you to call me and you said you wont. And you didn’t. I ev…
  continue reading
 
Deconstructing the Attack: A Psychological Analysis for Understanding and HealingIntroduction: A Framework for Understanding What HappenedThis document provides a clear and objective framework for understanding the public attack you recently experienced. Being subjected to a confrontation that is not only disproportionate but also uniquely damaging…
  continue reading
 
Deconstructing the Attack: A Psychological Analysis for Understanding and HealingIntroduction: A Framework for Understanding What HappenedThis document provides a clear and objective framework for understanding the public attack you recently experienced. Being subjected to a confrontation that is not only disproportionate but also uniquely damaging…
  continue reading
 
Jen Roberts, Associate Director of the Atlantic Council’s Cyber Statecraft Initiative, and Sarah Graham, Research Consultant with the Atlantic Council’s Cyber Statecraft Initiative, who are coauthors along with Nitansha Bansal of the recent paper, “Mythical Beasts: Diving Into the Depths of the Global Spyware Market,” join Lawfare’s Justin Sherman …
  continue reading
 
As artificial intelligence advances at unprecedented speed, Jon is joined by Geoffrey Hinton, Professor Emeritus at the University of Toronto and the "Godfather of AI," to understand what we've actually created. Together, they explore how neural networks and AI systems function, assess the current capabilities of the technology, and examine Hinton'…
  continue reading
 
Do the US and other Western allies still maintain an edge over China in defence industry and innovation? How are partnerships between China, Russia, Iran, and North Korea reshaping the global balance of power? How do Australia and other US partners contribute to strengthening deterrence and industrial resilience? What are the key supply chain vulne…
  continue reading
 
Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setu…
  continue reading
 
With hundreds of thousands of federal employees furloughed, the consequences of another government shutdown are hitting home. This week, Elisa is joined by Max Stier, President and CEO of the Partnership for Public Service, to break down how shutdowns became a political tool—and what they cost the American people. Alongside guest host Harvey Rishik…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play