The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Stay updated with the latest happenings in the world of stock markets with our expert analysts
…
continue reading
Official Website: https://psysecure.com/podcast/ Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Learn how to think not what to think.
…
continue reading
Pod Save the UK is your weekly fix of political news, big ideas and a shot of inspiration. Each week hosts, comedian Nish Kumar and journalist Coco Khan are joined by politicians, experts, and famous friends to unpick the latest news, look for solutions, and inspire action. From Crooked Media – the creators of Pod Save America – in partnership with Reduced Listening, tune in to new episodes of Pod Save the UK every Thursday wherever you pod.
…
continue reading
Discussions over drinks with security, defense, and foreign policy insiders and experts. The original War on the Rocks podcast series.
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
On Mondays, Jon Stewart hosts The Daily Show, but on Thursdays, he's back in your ears with The Weekly Show -- a podcast featuring in-depth conversations with a range of special guests. From experts and advocates, to stakeholders and thought leaders, we discuss the challenges, changes, and ideas that are shaping our world.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Michael Colligan is joined by experts, advocates, and professionals to discuss creating better quality night skies.
…
continue reading
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
…
continue reading
The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we’re experts. Because this is the internet, and that’s how it works now.
…
continue reading
Carnegie Connects is our premier virtual event series hosted by Aaron David Miller. Every other week, he tackles the most pressing foreign policy issues of the day in conversations with journalists, policymakers, historians, and experts.
…
continue reading
Listen in on FDD Events featuring discussions on today’s most pressing national security and foreign policy challenges and opportunities with top policymakers and leading experts. Webpage: https://www.fdd.org/events/
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
Post Reports is the daily podcast from The Washington Post. Unparalleled reporting. Expert insight. Clear analysis. Everything you’ve come to expect from the newsroom of The Post, for your ears. Martine Powers and Elahe Izadi are your hosts, asking the questions you didn’t know you wanted answered. Published weekdays around 5 p.m. Eastern time.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Welcome to The Peter Zeihan Podcast Series! Geopolitical Strategist Peter Zeihan is a global energy, demographic and security expert. If you want to stay informed on the realities of geography and populations, you've come to the right place. Zeihan's worldview offers insights into how global politics impact markets and economic trends, helping industry leaders navigate today’s complex mix of geopolitical risks and opportunities. Expect a forward-looking approach to what will drive tomorrow’s ...
…
continue reading

1
Nightlife Security Podcast | The Nightlife and Bar Security Resource for Security Professionals, Owners, & Operators
Nightlife Security Consultants, LLC
The Nightlife and Bar Security Industry Resource for Hospitality Security Professionals, Owners, & Operators - with Industry Expert Robert C. Smith & Host Manny Marquez.
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
U.S. foreign policy for the future. Security Dilemma brings you conversations with the experts, policymakers, and thinkers charting new paths forward from the wreckage of recent decades and toward a national security and defense policy guided by prudence and restraint. Cohosts John Allen Gay and A.J. Manuzzi bring you the information you need to shape a wiser approach. Security Dilemma is a podcast of the John Quincy Adams Society, an independent nonprofit organization dedicated to advancing ...
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
State Secrets is a weekly interview podcast featuring Cipher Brief experts and national security leaders.
…
continue reading

1
62. Even a Security Expert Can Get Phished
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16Questions we answer in this episode Who is Troy Hunt? How did he get phished? What are some lessons we can learn from his story? Who will we be inviting as a guest to the podcast? Episode summary Troy Hunt, a security expert, got phished. He clicked a link in an email, and entered his password into a fake website. The hackers logged into his Mailch…
…
continue reading

1
EP 124 From Guantanamo to the Boardroom: Lena Sisco the no. 11 Body Language Expert: Building Trust During Interrogation, Not Fear
57:06
57:06
Play later
Play later
Lists
Like
Liked
57:06Send us a text 🎙️ Podcast Summary: In this compelling episode, Yolanda sits down with Lena Sisco — former Department of Defense interrogator, bestselling author, TEDx speaker, and body language expert. Lena shares her extraordinary and unexpected journey from archaeology to military intelligence, revealing the mental and emotional endurance it take…
…
continue reading

1
CYBERSECURITY for AI: The New Threat Landscape & How Do We Secure It?
40:43
40:43
Play later
Play later
Lists
Like
Liked
40:43As Artificial Intelligence reshapes our world, understanding the new threat landscape and how to secure AI-driven systems is more crucial than ever. We spoke to Ankur Shah, Co-Founder and CEO of Straiker about navigating this rapidly evolving frontier. In this episode, we unpack the complexities of securing AI, from the fundamental shifts in applic…
…
continue reading

1
The Fire Hose of Chaos: The “Deal" With the Chinese
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53Trade tensions are taking their toll on an already fragile Chinese system. The US is dealing with self-sufficiency problems, but for China, it is an existential question. Will this new deal change that? Join the Patreon here: https://www.patreon.com/PeterZeihan Full Newsletter: https://mailchi.mp/zeihan/the-deal-with-the-chinese…
…
continue reading

1
Lawfare Daily: Nayib Bukele's Crackdown on Dissent in El Salvador
51:24
51:24
Play later
Play later
Lists
Like
Liked
51:24El Salvador’s President Nayib Bukele has made a lot of headlines recently in the United States for his partnership with the Trump administration. Bukele has helped enable President Trump’s scheme to remove supposed Venezuelan gang members from the U.S. under the Alien Enemies Act, housing these detainees in the notorious CECOT prison. In court, the…
…
continue reading

1
Appsec News & Interviews from RSAC on Identity and AI - Rami Saas, Charlotte Wylie - ASW #331
1:01:48
1:01:48
Play later
Play later
Lists
Like
Liked
1:01:48In the news, Coinbase deals with bribes and insider threat, the NCSC notes the cross-cutting problem of incentivizing secure design, we cover some research that notes the multitude of definitions for secure design, and discuss the new Cybersecurity Skills Framework from the OpenSSF and Linux Foundation. Then we share two more sponsored interviews f…
…
continue reading
On this week's episode of Security Dilemma, John Allen Gay and A.J. Manuzzi spoke with Candace Rondeaux, the author of Putin’s Sledgehammer: The Wagner Group and Russia’s Collapse into Mercenary Chaos. She serves as the Senior Director for the Future Frontlines and Planetary Politics programs at New America, and is a professor of practice at Arizon…
…
continue reading
Opening Bell - Morning Commentary Japan's PM Raises Alarm on Economic Challenges, Late U.S. Market Recovery to Boost Our Markets' Opening. US stocks recovered from steep early-session losses and closed slightly higher on Monday. Investors digested news that a major ratings agency had downgraded its U.S. federal government debt assessment. The major…
…
continue reading

1
How America's Special Operators are Preparing for a High-Tech Future
17:10
17:10
Play later
Play later
Lists
Like
Liked
17:10Down in Tampa on the sidelines of SOF Week, Ryan spoke with Lt. Gen. Frank Donovan, vice commander of Special Operations Command, in front of a live audience about how America's special operators are leading the way on the the future of warfare, from great power competition to data and AI — or, how our guest puts it, from the seabed to low earth or…
…
continue reading

1
The small-business owner suing Trump over tariffs
26:23
26:23
Play later
Play later
Lists
Like
Liked
26:23Before she decided to sue the Trump administration, Emily Ley’s image wasn’t political. She makes high-end planners and has a new cookbook with easy recipes for busy parents. But she manufactures her planners in China and says Trump’s tariffs make her business model untenable. “One minute I was talking about how to make an easy pot roast, and the n…
…
continue reading
The UK’s Ministry of Justice suffers a major breach. Mozilla patches two critical JavaScript engine flaws in Firefox. Over 200,000 patients of a Georgia-based health clinic see their sensitive data exposed. Researchers track increased malicious targeting of iOS devices. A popular printer brand serves up malware. PupkinStealer targets Windows system…
…
continue reading

1
FDD Morning Brief | feat. Barak Barfi (May 19)
22:40
22:40
Play later
Play later
Lists
Like
Liked
22:40IS SYRIA'S NEW REGIME MALIGN OR MODERATE? HEADLINE 1: Israel is working on a plan to relocate civilians in Gaza if a ceasefire doesn’t materialize soon. HEADLINE 2: It’s official: Hamas’s October 7th attack was designed to derail Saudi-Israel normalization. HEADLINE 3: Another day, another Israeli caught spying for Iran. -- FDD Executive Director J…
…
continue reading

1
The Fire Hose of Chaos: Chinese Edition Intro
3:43
3:43
Play later
Play later
Lists
Like
Liked
3:43Today, we're launching into the next phase of our "Fire Hose of Chaos” series, shifting our focus from the US and onto China. Trust me, there will be no shortage of chaos in this series either. Join the Patreon here: https://www.patreon.com/PeterZeihan Full Newsletter: https://mailchi.mp/zeihan/the-fire-hose-of-chaos-chinese-edition-intro…
…
continue reading

1
THPC EP64 – CISO XC Austin: Veterans, Mid-Market Cyber & Responsible AI
27:11
27:11
Play later
Play later
Lists
Like
Liked
27:11Sponsor: Netskope (www.netskope.com) On Location at CISO XC ATX: www.cisoxc.com THPC EP64 – CISO XC Austin: Veterans, Mid-Market Cyber & Responsible AI In this special episode recorded live at CISO XC’s inaugural Austin event, host David Malicoat brings you ground-level conversations with leaders shaping modern cybersecurity—from national defense t…
…
continue reading

1
Lawfare Daily: The Trials of the Trump Administration, May 16
1:33:23
1:33:23
Play later
Play later
Lists
Like
Liked
1:33:23In a live conversation on May 16, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Senior Editors Anna Bower, Quinta Jurecic, and Roger Parloff and Lawfare Legal Fellow James Pearce to discuss legal challenges against President Trump’s executive actions, including the Friday hearing in the Abrego Garcia litigation, the Supreme Court’s …
…
continue reading

1
The State of Cybersecurity Readiness for the Next Big Emergency - David Aviv, Bri Frost, Marshall Erwin - ESW #407
2:12:42
2:12:42
Play later
Play later
Lists
Like
Liked
2:12:42Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
…
continue reading

1
Mark Zuckerberg’s Vision: AI Companions and the Loneliness Epidemic
20:49
20:49
Play later
Play later
Lists
Like
Liked
20:49In this episode, we explore Mark Zuckerberg’s bold claim that AI friends will replace human friendships, and discuss the potential implications of a world where technology mediates our connections. We also update listeners on the recent developments in the 23andMe bankruptcy case and what it means for former customers. Joining the conversation is c…
…
continue reading

1
__NATO Police Nightmare_ When a Breakup Becomes an International Crisis__
20:12
20:12
Play later
Play later
Lists
Like
Liked
20:12__NATO Police Nightmare_ When a Breakup Becomes an International Crisis__
…
continue reading
Opening Bell - Morning Commentary US Credit Rating Downgrade to Temper Global Market Sentiment, Local Small and Midcap Stocks are likely to Remain Resilient. Moody’s Investors Service cut the United States' credit rating, citing concerns over rising debt and political deadlock. This is a jolt to US markets, though it may not impact it immediately, …
…
continue reading

1
Lawfare Archive: Human Rights Abuses in Saudi Arabia with Joey Shea
28:06
28:06
Play later
Play later
Lists
Like
Liked
28:06From September 26, 2023: On August 21, the Human Rights Watch released a report detailing systematic abuses of Ethiopian migrants and asylum seekers at the Saudi Arabia-Yemen border. Researchers interviewed dozens of Ethiopian migrants and asylum seekers and found that Saudi border guards had used explosive weapons on them and shot migrants at clos…
…
continue reading

1
Dave Bittner: From puppet shows to podcasts. [Media] [Career Notes]
10:47
10:47
Play later
Play later
Lists
Like
Liked
10:47Please enjoy this encore of Career Notes. Host of the CyberWire Podcast, Dave Bittner, wanted to work with the Muppets, so naturally he landed in cybersecurity. Dave and his Cookie Monster puppet spent much of his childhood putting on shows for his parents friends. During one of those performances, he was discovered and got his start at the local P…
…
continue reading

1
Tara Brach on how to deal with fear and uncertainty
34:10
34:10
Play later
Play later
Lists
Like
Liked
34:10The world can seem like a really scary place right now. Many of us look around and see wars, climate change, economic uncertainty and a lot of overwhelming things we can’t control. So today we’re going to share a conversation about fear. Elahe Izadi spoke to Tara Brach, a therapist with a PhD in clinical psychology who has also spent years studying…
…
continue reading

1
Lawfare Archive: Christina Koningisor on Secrecy Creep
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09From January 4, 2022: Government secrecy is pervasive when it comes to national security and foreign affairs, and it’s becoming more and more common for state and even local governments to invoke government secrecy rationales that in the past, only the president of the United States and the national intelligence community were able to claim. While …
…
continue reading

1
Leveling up their credential phishing tactics. [Research Saturday]
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement count…
…
continue reading
In this episode, Michael, Sarah, and Mark talk to Craig Nelson, VP of the Microsoft Red Team about how the Red Team works to help secure Microsoft and its customers. In life, there are things you know you know, things you know you don't know, and finally, things you don't know you don't know. This episode is full of the latter. We also cover securi…
…
continue reading

1
Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More... - SWN #477
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-477
…
continue reading

1
The Diddy trial: Cassie’s "freak-offs" testimony
40:15
40:15
Play later
Play later
Lists
Like
Liked
40:15The first week of testimony in the trial of music producer Sean “Diddy” Combs began with several witnesses, including the highly anticipated Casandra “Cassie” Ventura. Ventura is a central witness in the government’s case against Combs – she filed a civil lawsuit against him detailing allegations of violence and sex trafficking in 2023 that led to …
…
continue reading
NATO hosts the world’s largest cyber defense exercise. The DOJ charges a dozen people in a racketeering conspiracy involving the theft of over $230 million in cryptocurrency. Japan has enacted a new Active Cyberdefense Law. Lawmakers push to reauthorize the Cybersecurity Information Sharing Act. Two critical Ivanti Endpoint Manager Mobile vulnerabi…
…
continue reading

1
Trump’s Plane Won’t Fly with Rep. Jim Himes
38:56
38:56
Play later
Play later
Lists
Like
Liked
38:56Rep. Jim Himes, top Dem on the House Intel Committee, talks with Jeff & Mike about the Qatar grift and more bad things going on under Tulsi Gabbard. Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk on Twitter: https://twitter.com/talk_spy Subscribe to SpyTalk o…
…
continue reading

1
The Never-Ending Chess Game in Personnel Security
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55Takeaways #Personnelsecurity is crucial for organisations and individuals. There is a significant talent shortage in the #cybersecurityindustry. #AI can enhance security measures but cannot replace human instinct. Outsourcing security functions can be beneficial for smaller organisations. The pressure on cybersecurity roles is immense and can lead …
…
continue reading

1
Beyond The App Store: Cloud Marketplace Security
27:26
27:26
Play later
Play later
Lists
Like
Liked
27:26Takeaways #Cloudmarketplaces function like a digital mall for various services. Continuous monitoring and detection of threats are essential. Legislation like NIST 2 and Dora impacts cloud security practices. Zero trust methodology is advised in securing cloud connections. Regular penetration testing and vulnerability management are necessary. Data…
…
continue reading

1
FDD Morning Brief | feat. Nadim Koteich, hosted by Hussain Abdul-Hussain (May 16)
26:36
26:36
Play later
Play later
Lists
Like
Liked
26:36TRUMP'S GULF TRIP AND THE IMPLICATIONS FOR THE REGION HEADLINE 1: President Trump’s whirlwind Middle East tour was rife with record-breaking deals. HEADLINE 2: Congressional Republicans have reiterated their support for full Iranian nuclear dismantlement. HEADLINE 3: Trump’s sharp policy reversal on U.S. sanctions against Syria during his Gulf tour…
…
continue reading

1
The Question of Leadership…And Management || Peter Zeihan
8:13
8:13
Play later
Play later
Lists
Like
Liked
8:13Everyone gets mad at me for critiquing the leader that they like, but listen...I'm out here roasting everybody. Whether it's Obama, Trump, Xi Jinping, or Grandma, nobody is safe. Okay fine, we'll leave Gram Gram out of it for today. Join the Patreon here: https://www.patreon.com/PeterZeihan Full Newsletter: https://mailchi.mp/zeihan/the-question-of…
…
continue reading

1
Lawfare Daily: What Trump’s Middle East Trip Means for Gaza and the Israeli-Palestinian Conflict, with Joel Braunold
1:10:07
1:10:07
Play later
Play later
Lists
Like
Liked
1:10:07For today’s episode, Lawfare General Counsel and Senior Editor Scott R. Anderson sat down with Contributing Editor Joel Braunold, the Managing Director of the S. Daniel Abraham Center for Middle East Peace, for the latest in their series of podcast conversations delving into the latest developments relating to the Israeli-Palestinian conflict and r…
…
continue reading

1
Cartel Cell Networks_ Beyond Burner Phones & Encrypted Apps
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12The assertion that Mexican drug cartels have engineered and deployed their own sophisticated, independent cellular networks to circumvent governmental surveillance, as detailed in the primary source article 1, presents a significant development in the operational capabilities of transnational criminal organizations. This report offers an exhaustive…
…
continue reading

1
63. Phishing Lessons From Troy Hunt's Story
35:00
35:00
Play later
Play later
Lists
Like
Liked
35:00Helpful episodes to listen to first Episode 62, Even a Security Expert Can Get Phished (Troy Hunt, Part 1) Episode 17, Eliminating Email Exhaustion - Part 2 - Unique Emails Episode 42, Website and Email Filtering, Part 3: Email Friends Questions we answer in this episode Who is to blame for Troy getting phished? How can you reliably tell who sent y…
…
continue reading

1
Stolen Star Power: How Lana Rose's Online Life Fuels Romance Scams
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01Stolen Star Power: How Lana Rose's Online Life Fuels Romance Scams A significant challenge in this analysis is the current inaccessibility of the live Instagram profile @lanarose786. Consequently, this assessment relies on data from third-party analytics providers such as HypeAuditor , publicly accessible information from platforms including YouTub…
…
continue reading

1
Havana Syndrome Unpacked: From Sonic Attacks to Scientific Uncertainty
23:24
23:24
Play later
Play later
Lists
Like
Liked
23:24Anomalous Health Incidents: An In-Depth Examination of the “Havana Syndrome” PhenomenonI. The Emergence of a Medical Mystery: Unexplained Health Incidents The perplexing saga of what became popularly known as “Havana Syndrome” began to unfold against a backdrop of shifting geopolitical tides. Its emergence not only presented a novel medical challen…
…
continue reading
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
…
continue reading

1
Trump's big beautiful Boeing from Qatar, and a trade war thaw
32:01
32:01
Play later
Play later
Lists
Like
Liked
32:01There are plenty of ethical and security questions surrounding the Trump administration’s plan to accept a gift of an airplane from Qatar. Senior political reporter Aaron Blake talks with White House reporters Cleve R. Wootson Jr. and Natalie Allison about the proposal, and what it says about Trump’s evolving foreign policy in the Middle East. Also…
…
continue reading
Google issues an emergency patch for a high-severity Chrome browser flaw. Researchers bypass BitLocker encryption in minutes. A massive Chinese-language black market has shut down. The CFPB cancels plans to curb the sale of personal information by data brokers. A cyberespionage campaign called Operation RoundPress targets vulnerable webmail servers…
…
continue reading

1
Can Compliance Be Cool? Harness's Andrew Spangler Thinks So
54:38
54:38
Play later
Play later
Lists
Like
Liked
54:38In this episode of Security and GRC Decoded, Raj Krishnamurthy sits down with Andrew Spangler, Director of Security and GRC at Harness, to explore how compliance engineering can go far beyond checkboxes—and actually drive innovation. Andrew shares his journey from building the compliance engineering function at Datadog to scaling automation and vis…
…
continue reading