The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj research staff and journalists interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
Security Intelligence Podcasts
National security, unlocked. Each Thursday, host Mary Louise Kelly and a team of NPR correspondents discuss the biggest national security news of the week. With decades of reporting from battlefields and the halls of power, they bring you inside the Pentagon, State Department, and intelligence community to help you understand America's shifting role in the world, and how events in faraway places matter here at home. Additional episodes feature interviews with power players from the NatSec wo ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
“Pod Save America” cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obama’s National Security Council. On “Pod Save the World,” he and former deputy national security adviser Ben Rhodes break down the latest global developments and bring you behind the scenes with the people who were there. New episodes every Wednesday. Subscribe to Friends of the Pod! Your subscription makes Crooked’s work possible and gives ...
…
continue reading
Canada's intelligence landscape is as unique as the country itself. In an evolving global threat environment, fostering informed discussions on intelligence has become increasingly vital to the national security discourse. Secure Line Podcast is designed to influence and inform the national dialogue on security and intelligence in Canada, and internationally. Secure Line is brought to you by the Canadian Association for Security & Intelligence Studies (CASIS).
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Artificial Intelligence has too much hype. In this podcast, linguist Emily M. Bender and sociologist Alex Hanna break down the AI hype, separate fact from fiction, and science from bloviation. They're joined by special guests and talk about everything, from machine consciousness to science fiction, to political economy to art made by machines.
…
continue reading
The Long Game is a weekly national security podcast hosted by Jake Sullivan, President Biden’s National Security Advisor, and Jon Finer, his Principal Deputy—senior aides who sat in on the classified Presidential Daily Brief each morning and translated raw intelligence into policy advice. Each week, Jake and Jon will pull back the curtain on how power really works helping you make sense of the national security stories unfolding today. Part of the Vox Media Podcast Network.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Join in on weekly podcasts that aim to illuminate how AI transforms cybersecurity—exploring emerging threats, tools, and trends—while equipping viewers with knowledge they can use practically (e.g., for secure coding or business risk mitigation).
…
continue reading
Join Jason Palmer and Rosie Blau for noise-cancelling news and analysis from The Economist's global network of correspondents. Every weekday this award-winning podcast picks three stories shaping your world—the big shifts in politics, business and culture, plus things you never knew you needed to know. On Saturdays, download The Weekend Intelligence to dive deep into a single story, vividly told. If you’re already a subscriber to The Economist, you’ll have full access to all our shows as par ...
…
continue reading
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
…
continue reading
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
…
continue reading
MBP Intelligence Briefing is a weekly podcast from MBP Intelligence.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
IBSi podcasts for insights and discussions from the world of FinTech and Banking. Listen in to what’s trending in the ever-evolving financial industry.
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
…
continue reading
"Unconventional Knowledge by GIS" is a podcast dedicated to providing in-depth analysis of critical global issues. Each episode features top-level insiders from various fields, offering insights into complex geopolitical, economic and security topics that shape the international landscape. Hosted by Geopolitical Intelligence Services, the podcast moves beyond surface-level reporting, delving into the underlying trends and factors influencing current events.
…
continue reading
Welcome to the Global Intelligence Knowledge Network Podcast, where real-world intelligence expertise meets insightful analysis. Join your host, Neil Bisson, a former Intelligence Officer with the Canadian Security Intelligence Service, for a weekly deep dive into the world of espionage, national security, foreign interference, terrorism, and all matters spy and intelligence related. With over 25 years of experience in intelligence and law enforcement, both domestically and internationally, ...
…
continue reading
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
Focused on Microsoft AI Security, Data Intelligence and ERP/CRM.
…
continue reading
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
Podcast by John White & Jason Himmelstein
…
continue reading
Welcome to “Understandable Insights: Information to Intelligence with Sue Gordon” — the national security podcast that provides you an elemental understanding of the world as it is, not how you prefer it to be. Each week, Eric — a former Marine, father, and entrepreneur — sits down with the Honorable Sue Gordon, the nation’s former top career intelligence officer. Together, they break down the headlines shaping our world and ask what they really mean for citizens, leaders, and institutions. ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
4
"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis
Erik Torenberg, Nathan Labenz
A biweekly podcast where hosts Nathan Labenz and Erik Torenberg interview the builders on the edge of AI and explore the dramatic shift it will unlock in the coming years. The Cognitive Revolution is part of the Turpentine podcast network. To learn more: turpentine.co
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
A podcast about the fundamentals of safe and resilient modeling systems behind the AI that impacts our lives and our businesses.
…
continue reading
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what's new and what's next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
1
Ep. 24 The National Security Trump Card: Ukraine, Greenland, and Windmills
29:37
29:37
Play later
Play later
Lists
Like
Liked
29:37In this episode of Understandable Insights, Sue and Eric discuss Ukraine’s latest turn: President Zelensky takes his pitch for peace to Mar-a-Lago as Russia sustains heavy strikes. They unpack what would actually signal progress: whether battlefield activity slows in a way that suggests a real path to peace rather than leverage and messaging. Next,…
…
continue reading
1
MBP Ep 11: Intelligence Roundtable – Parliamentary Wrap Up, US National Security Strategy and Canada–US Trade Signals (Free Version)
14:36
14:36
Play later
Play later
Lists
Like
Liked
14:36The MBP Intelligence Briefing delivers exclusive, insider insight into the policies, decisions, and dynamics shaping Canada’s political and economic landscape. Hosted by Ben Woodfinden, Director of MBP Intelligence and Senior Advisor at Meredith Boessenkool & Phillips, the series features weekly conversations with MBP partners Ken Boessenkool, Tyle…
…
continue reading
1
Ven and the art of hemispheric maintenance: America’s national-security posture
17:21
17:21
Play later
Play later
Lists
Like
Liked
17:21America’s seizure of a Venezuelan oil tanker fits with the stated goals in its new national-security strategy: untrammelled hemispheric dominance. How much of the document is polemic and how much will become policy? The long-run costs of the work-from-home revolution are becoming apparent in many American cities. And the one region where Pepsi is t…
…
continue reading
1
HOU.SEC.CON Live: Merging Physical & Cyber Security + The Future of Threat Intelligence
19:49
19:49
Play later
Play later
Lists
Like
Liked
19:49🔥 Episode Summary Guests: Steve Lupo (Chevron, Retired FBI) & Orlan Streams (RA Infrastructure) Sponsor: CyberOne Security (www.cyberonesecurity.com) Recorded live at HOU.SEC.CON, this episode brings together two unique perspectives shaping the cybersecurity landscape. First, David speaks with Steve Lupo, Event Security Advisor at Chevron and a ret…
…
continue reading
1
EP940: Securing Bharat’s Financial Future: Digital Inclusion in Life Insurance
18:04
18:04
Play later
Play later
Lists
Like
Liked
18:04Casparus Kromhout, Managing Director & CEO, Shriram Life Insurance Life insurance in India is undergoing a pivotal shift from traditional, agent-driven models to digitally enabled, inclusion-led experiences. Rural and emerging India, once underserved, has now become the next frontier for financial protection and long-term security. In this episode,…
…
continue reading
1
Lawfare Archive: Russia’s Aggression Against Ukraine and the International Legal Order
1:29:06
1:29:06
Play later
Play later
Lists
Like
Liked
1:29:06From April 4, 2023: Russia’s invasion of Ukraine has tested the international legal order like never before. For many, the fact that a nuclear power and member of the U.N. Security Council would commit unveiled aggression against another state seemed like it might be the death knell of the international system as we know it. But last week, in the a…
…
continue reading
Today’s show is a tribute to those whose lives we remembered this year. From Pope Francis, the most open-minded pontiff for decades, and controversial vice-president Dick Cheney, to champ of the chimpanzees Jane Goodall, bubblegum pop star Brian Wilson and Alice Tan Ridley, a New York subway busker who became a superstar. Listen to what matters mos…
…
continue reading
1
Lorrie Cranor: Why Security Fails Real People [Afternoon Cyber Tea]
23:45
23:45
Play later
Play later
Lists
Like
Liked
23:45While our team is out on winter break, please enjoy this episode of Afternoon Cyber Tea with Ann Johnson from our partners at Microsoft Security. Dr. Lorrie Cranor, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vice President, Microsoft, on this week's episode of Afternoon Cyber Tea …
…
continue reading
1
113. How To Protect Your Secrets: Is The Toaster Spying On You? (Ep 2)
54:53
54:53
Play later
Play later
Lists
Like
Liked
54:53Does China want to hack into your washing machine? What really is the dark web? And can you ever avoid being spied on in the 21st century? Listen as David and Gordon are once again joined by the CIA's first Chief of Tradecraft and Operational Technology, Glenn Chafetz, to discuss the nuances of ubiquitous technical surveillance and how you can prot…
…
continue reading
1
Ransomware Is NOT the Greatest Threat | Here Is What's Coming
49:55
49:55
Play later
Play later
Lists
Like
Liked
49:55Question? Text our Studio direct. New Episode🔥The Cybercrime Junkies show discusses the evolution of ransomware, highlighting how it has shifted from simple file locking to direct extortion. We explore the latest ransomware trends and the significant ransomware impact on critical sectors like hospitals and supply chains. This ransomware attack stra…
…
continue reading
1
Rational Security: The “Inadequate Chicken Moved to Inferior Location” Special End-of-Year Edition
1:04:05
1:04:05
Play later
Play later
Lists
Like
Liked
1:04:05For the podcast’s annual end-of-year episode, Scott sat down with co-host emeritus Benjamin Wittes, Senior Editor Anna Bower, and Managing Editor Tyler McBrien to talk over listener-submitted topics and object lessons, including: Which sphere of influence is Western Europe in today? What should we make of President Trump's lawsuit against BBC? Afte…
…
continue reading
1
Defining AGI: Oops! All Eugenics, 2025.12.08
55:01
55:01
Play later
Play later
Lists
Like
Liked
55:01There's a new definition of artificial general intelligence in town, and unsurprisingly... it's bad! Alex and Emily rip up the tissue-paper-thin premises behind this latest attempt to define "intelligence." Plus, we discover that AI hypers love using logos that look like buttholes. References: "A Definition of AGI" landing page and paper-shaped obj…
…
continue reading
1
Boom with a view: our economy of the year
21:33
21:33
Play later
Play later
Lists
Like
Liked
21:33Announcing the return of The Economist’s annual ranking for best performing economy. Are you ready for the big reveal? Dalit cuisine is barely visible, in India or beyond. And why London’s river boats are making a comeback. Get a world of insights by subscribing to Economist Podcasts+. For more information about how to access Economist Podcasts+, p…
…
continue reading
1
Lawfare Daily: Tom Brzozowski on Domestic Terrorism Investigations and Prosecutions
52:50
52:50
Play later
Play later
Lists
Like
Liked
52:50Senior Editor Michael Feinberg and Tom Brzozowski, formerly of the Justice Department, sit down to talk over recent changes set in motion by the White House and Justice Department with respect to domestic terrorism investigations and prosecutions, and sound a warning from history at how these changes hearken back to pre-Church Committee practices. …
…
continue reading
1
The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report [Microsoft Threat Intelligence Podcast]
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29While our team is out on winter break, please enjoy this episode of The Microsoft Threat Intelligence Podcast from our partners at Microsoft. In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a co…
…
continue reading
Artificial intelligence is rewriting the rules of weather forecasting — spotting storms sooner, warning us faster, and increasing the potential to save lives. But cuts to NOAA and the National Weather Service threaten the very data that makes it possible. In this CyberMonday crossover with WAMU’s 1A, we hear from listeners as we return to an episod…
…
continue reading
1
Season finale: Leading security in a brave new world. [CISOP]
43:59
43:59
Play later
Play later
Lists
Like
Liked
43:59In the season finale of CSO Perspectives, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons an…
…
continue reading
1
Why Post-Merger Integrations Fail Without Data Governance - Sandro Venturini of UBS
17:29
17:29
Play later
Play later
Lists
Like
Liked
17:29Today's guest is Sandro Venturini, Executive Director at UBS Asset Management Switzerland. Sandro brings deep expertise in fund structuring, cross-border launches, and data integration for financial services. Sandro joins Emerj Editorial Director Matthew DeMello to explore how fragmented fund data creates silos in mergers and launches, and how a si…
…
continue reading
1
Undercover for the holidays: Some of our favorite spy novels
29:01
29:01
Play later
Play later
Lists
Like
Liked
29:01What's more thrilling than a great... thriller? As national security buffs, we have thoughts. Host Mary Louise Kelly chats with national security correspondent Greg Myre and books and culture reporter Andrew Limbong about some of their favorite books and authors in the world of espionage fiction. Email the show at [email protected] NPR+ sup…
…
continue reading
1
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
52:29
52:29
Play later
Play later
Lists
Like
Liked
52:29Question? Text our Studio direct. Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro…
…
continue reading
1
40 Year Career at the CIA Built Character for this Leader
23:32
23:32
Play later
Play later
Lists
Like
Liked
23:32For this episode of the Security Clearance Careers Podcast, we we explore leadership, ethics, and excellence in high-stakes environments. Today’s episode will reshape how you think about leadership, especially leadership where character and trust are at the foundation of leading groups in national security missions. Today we are thrilled to be join…
…
continue reading
Five years after seizing power in a coup, the military junta in Myanmar is holding an election. Yet all credible opposition has been banned. And war has inspired so many films over the past century. Our correspondents battle it out to pick the best one. Listen to what matters most, from global politics and business to science and technology—Subscri…
…
continue reading
1
Lawfare Daily: The 2026 National Defense Authorization Act
1:00:32
1:00:32
Play later
Play later
Lists
Like
Liked
1:00:32In this episode, Ariane Tabatabai, Scott R. Anderson, and Loren Voss discuss the National Defense Authorization Act (NDAA) for Fiscal Year 2026. They take stock of how Congress is reasserting itself vis-a-vis the Trump administration on matters related to the national defense, as well as the NDAA’s key provisions. Relevant links: National Defense A…
…
continue reading
1
The Hidden Risk in Your Stack [Data Security Decoded]
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik. In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and w…
…
continue reading
1
112. How To Protect Your Secrets: Inside China’s Technical Surveillance Playbook (Ep 1)
50:34
50:34
Play later
Play later
Lists
Like
Liked
50:34The world of surveillance has changed beyond recognition over the past 25 years with the advent of technology. From CCTV cameras to cookie tracking, it's not so easy to escape the long arm of the intelligence services in 2025. David and Gordon are joined by the CIA's first Chief of Tradecraft and Operational Technology, Glenn Chafetz, to explore th…
…
continue reading
1
How to Measure Cyber Risk Today: Guidelines for Leaders
1:04:04
1:04:04
Play later
Play later
Lists
Like
Liked
1:04:04Question? Text our Studio direct. What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to Know Ryan Leirvik who joins us in the studio. Ryan is t…
…
continue reading
1
Lawfare Archive: Lidsky and Koningisor on First Amendment Disequilibrium
51:08
51:08
Play later
Play later
Lists
Like
Liked
51:08From March 6, 2024: Executive branch constraints and the posture of the media have shifted in significant ways over the past two decades. Lyrissa Lidsky and Christina Koningisor, law professors at the University of Florida and the University of California San Francisco, respectively, argue in a forthcoming law review article that these changes—incl…
…
continue reading
1
Charity Wright: Pursue what you love. [Threat intelligence] [Career Notes]
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50While our team is out on winter break, please enjoy this episode of Career Notes. Threat intelligence analyst at Recorded Future, Charity Wright, shares her story from the army to her career today. Transitioning from the army to cybersecurity was an exciting change for her. During college she was recruited by the U.S. army where she started her jou…
…
continue reading
1
Controlling Tools or Aligning Creatures? Emmett Shear (Softmax) & Séb Krier (GDM), from a16z Show
1:15:41
1:15:41
Play later
Play later
Lists
Like
Liked
1:15:41Emmett Shear and Séb Krier debate whether today’s AI alignment paradigm—focused on control and instruction-following—is fundamentally flawed. PSA for AI builders: Interested in alignment, governance, or AI safety? Learn more about the MATS Summer 2026 Fellowship and submit your name to be notified when applications open: https://matsprogram.org/s26…
…
continue reading
Send us a text 🔍 Global Intelligence Yearly Wrap-Up 2025 | Terrorism, Espionage, Foreign Interference & Hybrid Warfare This special Year in Review episode of Global Intelligence Weekly Wrap-Up steps back from the weekly headlines to examine the national security and intelligence trends that defined 2025 — and what they tell us about the threat envi…
…
continue reading
1
Famous Hacker Reveals TRUE Ethical Hacking Stories
50:47
50:47
Play later
Play later
Lists
Like
Liked
50:47Question? Text our Studio direct. 🚨New Episode 🚨We’re joined in-studio by Bryan Seely— World Famous Hacker who Reveals True Ethical Hacking Storie. Bryan is a cybersecurity expert, and media commentator featured on CNBC, Fox News, CNN, and WSJ. He’s also the author of Cyber Fraud: The Web of Lies! We discuss: true ethical hacking stories, data brok…
…
continue reading
1
Lawfare Archive: Ask Us Anything About 2024
1:16:28
1:16:28
Play later
Play later
Lists
Like
Liked
1:16:28From January 2, 2025: You called in with your questions, and Lawfare contributors have answers! Benjamin Wittes, Kevin Frazier, Quinta Jurecic, Eugenia Lostri, Alan Rozenshtein, Scott R. Anderson, Natalie Orpett, Amelia Wilson, Anna Bower, and Roger Parloff addressed questions on everything from presidential pardons to the risks of AI to the domest…
…
continue reading
1
Excel-lerating cyberattacks. [Research Saturday]
23:43
23:43
Play later
Play later
Lists
Like
Liked
23:43While our team is out on winter break, please enjoy this episode of Research Saturday. This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belaru…
…
continue reading
1
LIVE: They’re Stealing You with AI 😳 | AI Risks to Identity & How to Fight Back
1:28:28
1:28:28
Play later
Play later
Lists
Like
Liked
1:28:28Question? Text our Studio direct. If you manage care about protecting yourself, your loved ones—and your organization-- this episode offers actionable takeaways you can use today. This is part of our official Cyber Crime Junkies podcast series—subscribe wherever you listen! ✅ **Don’t forget to like, subscribe, and hit the bell 🔔.** 💬 Comment your “…
…
continue reading
1
Ep. 23 Bonus: You Can't Surge Trust in a Crisis
8:47
8:47
Play later
Play later
Lists
Like
Liked
8:47In this special edition of Understandable Insights, Sue and Eric examine public health policy as national security. Beginning with HHS’s termination of pediatric health grants, they map the downstream consequences of politicized funding: diminished institutional trust, fragmented preparedness, and greater vulnerability ahead of the next crisis. Que…
…
continue reading
1
Battle of the texts: which books changed the world?
40:56
40:56
Play later
Play later
Lists
Like
Liked
40:56So many books are published each year; few stand the test of time. Today we devote our whole show to asking which works have shaped the way we behave and how we think. Picks include “Frankenstein” by Mary Shelley, “Pride and Prejudice” by Jane Austen, “A Suitable Boy” by Vikram Seth and “Lord of the Rings” by JRR Tolkien. Full list of books mention…
…
continue reading
Every year, Lawfare publishes a retrospective of the year that passed. Today, we’re pleased to bring you an audio debrief of that article, The Year That Was: 2025, which you can read in full on our website starting December 31. Lawfare is focused on producing timely, rigorous, and non-partisan analysis of “hard national security choices.” And this …
…
continue reading
China’s surveillance of Uyghurs has leapt from the physical world to the digital one. No longer just QR codes on doorways, it’s now hidden in cloud services and software updates. This week on Click Here’s Mic Drop, we return to a story on how digital tools meant to protect identity are being used to erase it. ERASED is a four-part investigation int…
…
continue reading
1
Beyond cyber: Securing the next horizon. [Special Edition]
1:00:13
1:00:13
Play later
Play later
Lists
Like
Liked
1:00:13While our team is out on winter break, please enjoy this Special Edition episode. Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The NightDragon Innovation Summit convened a group of industry leaders to discuss how public and private entities can work together to address emerging …
…
continue reading