Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Security Interviews Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
National security, unlocked. Each Thursday, host Mary Louise Kelly and a team of NPR correspondents discuss the biggest national security news of the week. With decades of reporting from battlefields and the halls of power, they bring you inside the Pentagon, State Department, and intelligence community to help you understand America's shifting role in the world, and how events in faraway places matter here at home. Additional episodes feature interviews with power players from the NatSec wo ...
…
continue reading
Get the edge with Hidden Forces where media entrepreneur and financial analyst Demetri Kofinas gives you access to the people and ideas that matter, so you can build financial security and always stay ahead of the curve.
…
continue reading
Foreign Affairs invites you to join its editor, Daniel Kurtz-Phelan, as he talks to influential thinkers and policymakers about the forces shaping the world. Whether the topic is the war in Ukraine, the United States’ competition with China, or the future of globalization, Foreign Affairs’ weekly podcast offers the kind of authoritative commentary and analysis that you can find in the magazine and on the website.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Conversations with people shaping our world, from all around the globe. Listen to The Interview for the best conversations from the BBC, the world's most trusted international news provider. We hear from titans of business, politics, finance, sport and culture. Global leaders, decision-makers and cultural icons. Politicians, activists and CEOs. Each interview is around 20-minutes, packed full of insight and analysis, covering some of the biggest issues of our time. How does it work? Well, at ...
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
The Security Matters Podcast is published monthly and hosted by the magazine’s Editor Brian Sims. In each episode, Brian reports on and analyses the latest UK security industry news and also interviews leading professionals from the sector. The Security Matters Podcast is sponsored by The Security Event, which takes place on 8-10 April 2025 at the NEC in Birmingham. To register for your free pass to the show visit www.thesecurityevent.co.uk For all the latest security industry news and opini ...
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Welcome to Interview Boss hosted by sisters Emma and Sarah Smith. This podcast is all about providing advice, inspiration and support for job seekers. Whether you're between jobs, or looking for your dream promotion, we're here to give you the tips, tricks and behind the scenes knowledge you need to be the boss of your career. We'll dive deep in to all things resume, cover letter, job application, job search strategy, interviews and offer negotiations. We're going to bring you a mix of advic ...
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
Listen to the latest happenings in Healthcare IT in this series of interviews with leading experts in healthcare technology. Whether you're trying to understand EMR and EHR, healthcare communications, security and privacy, analytics, telehealth and telemedicine, and much more, these interviews will dive into what's really happening on the front lines of healthcare. Learn more at: https://www.healthcareittoday.com
…
continue reading
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
…
continue reading
Brought to you by the Texas National Security Review, this podcast features lectures, interviews, and panel discussions at The University of Texas at Austin.
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
1
DoD Secure-Working with National Industrial Security Program
jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC
Interviews and topics centering on security clearances and National Industrial Security Clearance Operating Manual (NISPOM) compliance.
…
continue reading
Tech News Briefing is your guide to what people in tech are talking about. Every weekday, we’ll bring you breaking tech news and scoops from the pros at the Wall Street Journal, insight into new innovations and policy debates, tips from our personal tech team, and exclusive interviews with movers and shakers in the industry.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
Leading scholars provide insight on urgent policy debates. Jeff Friedman of Dartmouth College interviews contributors to the premiere peer-reviewed journal of security studies. They offer sophisticated, authoritative analyses of contemporary, theoretical, and historical security issues from the role of China in the world and cyber in international security to the long history of ethnic cleansing in Europe. The podcast is produced at Harvard Kennedy School’s Belfer Center for Science and Inte ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference.
…
continue reading
Interviews with the top VCs & Founders leading the next tech innovation cycle.
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Mike Poole, Conor Mulherin, Dave Lewis - ESW #430
1:39:12
1:39:12
Play later
Play later
Lists
Like
Liked
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
…
continue reading
1
Sir Bradley Wiggins: I couldn’t see hope or joy
22:59
22:59
Play later
Play later
Lists
Like
Liked
22:59There were periods when I couldn’t see any hope or joy. Anna Foster speaks to British cycling champion Sir Bradley Wiggins in a deeply personal interview. The first Briton to win the Tour de France, he collected five Olympic gold medals throughout his career. But his stellar reputation came under attack as he faced allegations of doping. What follo…
…
continue reading
Once upon a time, I was an MSP. Looking at everything that MSPs have to keep track of, both internally and client-facing, can be overwhelming. I sat down with Dor Eisner of Guardz.com to talk about the biggest challenge facing MSPs.
…
continue reading
China-Linked hackers target Cisco firewalls. MIT Sloan withdraws controversial “AI-Driven Ransomware” paper. A new study questions the value of cybersecurity training. Hackers exploit OpenAI’s API as a malware command channel. Apple patches over 100 Security flaws across devices. A Florida-based operator of mental health and addiction treatment cen…
…
continue reading
1
TNB Tech Minute: Nvidia and Deutsche Telekom to Build AI Factory in Germany
2:55
2:55
Play later
Play later
Lists
Like
Liked
2:55Plus: AMD reports sharp increases in profit and sales. Rivian Automotive records a jump in third-quarter revenue. And Nintendo boosts guidance for the full year. Julie Chang hosts. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The Wall Street Journal
…
continue reading
China analyst and former policymaker Elizabeth Economy sits down with Ravi Agrawal to unpack the meeting that took place last week between U.S. President Donald Trump and Chinese President Xi Jinping. What was agreed to? What does it mean for the broader trajectory of the world’s most important bilateral relationship? Plus, Ravi’s One Thing on Trum…
…
continue reading
1
AI is already breaking the Silos Between AppSec & CloudSec
1:11:37
1:11:37
Play later
Play later
Lists
Like
Liked
1:11:37The silos between Application Security and Cloud Security are officially breaking down, and AI is the primary catalyst. In this episode, Tejas Dakve, Senior Manager, Application Security, Bloomberg Industry Group and Aditya Patel, VP of Cybersecurity Architecture discuss how the AI-driven landscape is forcing a fundamental change in how we secure o…
…
continue reading
1
TNB Tech Minute: Anthropic Signs Cognizant in Enterprise Deal
2:30
2:30
Play later
Play later
Lists
Like
Liked
2:30Plus: Spotify adds subscribers in the third quarter. And Uber logs higher quarterly profit and revenue. Zoe Kuhlkin hosts. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The Wall Street Journal
…
continue reading
1
Cold War Lessons for Export Controls Against China
48:04
48:04
Play later
Play later
Lists
Like
Liked
48:04We sit down with Dartmouth national security scholars Jennifer Lind and Michael Mastanduno as they compare Cold War export control strategies with modern attempts to limit China's access to sensitive US technologies. They delve into three key lessons from the historical COCOM regime, discuss the evolving technological competition with China, and re…
…
continue reading
In this episode of Simply Offensive, Phillip Wylie interviews Danny Jenkins, CEO and founder of ThreatLocker. Danny shares his unique journey from corporate IT to ethical hacking, discussing his innovative approach to penetration testing and cybersecurity. He emphasizes the importance of understanding technology and security configurations, the rol…
…
continue reading
1
A Rural Hospital Embedded in the Community Benefits from a Consolidated EHR
15:35
15:35
Play later
Play later
Lists
Like
Liked
15:35Morris Hospital and Healthcare Centers is quite small: an independent, rural system of clinics including an 89-bed hospital. Yet the system is the largest employer in Morris, IL. In this interview, Kim Landers, their Vice President of Patient Care and Chief Nurse Executive, explains how they remain relevant and solvent, and the aid provided by movi…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
How Amazon’s Data Hubs Are Transforming Small-Town America
13:15
13:15
Play later
Play later
Lists
Like
Liked
13:15Rural parts of the country are getting an economic boost thanks to the construction of giant data centers. WSJ reporter David Uberti visits Umatilla, Oregon to look into whether the boom will last. Plus, the Journal’s auto columnist, Dan Neil, goes for a ride in a flying car. Katie Deighton hosts. Sign up for the WSJ's free Technology newsletter. L…
…
continue reading
1
Privacy needs where you least expect it. [CISO Perspectives]
36:08
36:08
Play later
Play later
Lists
Like
Liked
36:08When discussing privacy risks, many often look to implementing strong encryption, secure data storage practices, and data sanitization processes to help ensure sensitive information remains protected. Though these practices are good and should be prioritized, many often miss other key areas that need just as much focus. As the internet of things ha…
…
continue reading
1
TNB Tech Minute: Rare-Earth Magnet Startups Secure Deals With White House
2:56
2:56
Play later
Play later
Lists
Like
Liked
2:56Plus: Microsoft secures new computing power capacity in deal with data center company IREN. And Palantir Technologies reports another quarter of record revenue, while shares of Amazon close at a new all-time high. Julie Chang hosts. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The Wall Street Journal
…
continue reading
The FCC plans to roll back cybersecurity mandates that followed Salt Typhoon. The alleged cybercriminal MrICQ has been extradited to the U.S. Ransomware negotiators are accused of conducting ransomware attacks. Ernst & Young accidentally exposed a 4-terabyte SQL Server backup. A hacker claims responsibility for last week’s University of Pennsylvani…
…
continue reading
Send us a text FSO professional development https://www.nispomcentral.com/fso-pro... Get NISPOM https://www.nispomcentral.com/nispom-... Contact us: [email protected] Brian Robinson Coaching https://www.brianrobinsoncoaching.com/ Cultivating Excellence: Strengthening the FSO and SMO Relationship In this episode of DOD Secure, host Jeff…
…
continue reading
1
How to Manage Manipulative and Disruptive Behavior at Work and in Public Spaces
26:55
26:55
Play later
Play later
Lists
Like
Liked
26:55Have you ever felt manipulated into doubting yourself and your abilities, even though your track record shows that you’re doing well? You might have encountered a gaslighter, says Michael Gips, CPP. These individuals’ manipulative shenanigans can be costly to personnel and productivity unless managers intervene promptly. Also in this episode, disru…
…
continue reading
1
From Nixon to Bush: Why U.S. Foreign Policy Fails at Coordination
48:59
48:59
Play later
Play later
Lists
Like
Liked
48:59Text the ATB Team! We'd love to hear from you! In this episode of the At the Boundary podcast, GNSI’s Senior Director, Jim Cardoso, interviewed Fabio van Loon about his latest publication on the topic of the pitfalls and challenges of U.S. foreign policy, specifically with interagency coordination. Fabio explained his paper’s focus on three differe…
…
continue reading
1
TNB Tech Minute: Open AI, Amazon Enter First Cloud Partnership
2:36
2:36
Play later
Play later
Lists
Like
Liked
2:36Plus: Microsoft gets U.S. approval to export Nvidia chips to the United Arab Emirates. And European automaker shares rise on optimism that a semiconductor shortage might be resolved soon. Zoe Kuhlkin hosts. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The Wall Street Journal
…
continue reading
1
A Career Change Guide for Intel, Military, Foreign Affairs, & NatSec Professionals
19:39
19:39
Play later
Play later
Lists
Like
Liked
19:39Where do spies, diplomats, soldiers, and FBI agents turn when their official service comes to an end? For most, full retirement isn’t an immediate option. The choice to step away from government service is difficult enough—deciding what comes next can feel even harder. Author and Career Coach Alison P. Bouwmeester knows this journey firsthand. She …
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
Field Notes: AI's $10 Trillion Lie + Coffee Roasting & Starlink Hacks
26:28
26:28
Play later
Play later
Lists
Like
Liked
26:28What if everything AI tells you about cybersecurity costs is completely wrong? The Audit crew unpacks a shocking data black hole that has infected every major AI model—plus field-tested tech that actually works. In this laid-back Field Notes episode, Joshua Schmidt, Eric Brown, and Nick Mellum return from Gartner's CIO Symposium with insights that'…
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
How Ryan Serhant Sold $20B in Real Estate with Media & AI
1:02:53
1:02:53
Play later
Play later
Lists
Like
Liked
1:02:53Ryan Serhant is one of the most successful and well-known real estate entrepreneurs in the world, with over $20 billion in lifetime sales. After leading one of New York City’s top-ranked brokerage teams to more than $4 billion in transactions, he founded SERHANT., a next-generation real estate company built at the intersection of media, technology,…
…
continue reading
1
What Happens When Social Trust Collapses? | Peter Atwater
3:26
3:26
Play later
Play later
Lists
Like
Liked
3:26Episode 447 is the tenth installment in the Hundred Year Pivot podcast series. In it, Demetri Kofinas and Grant Williams speak with Peter Atwater, a recognized expert on the impact of confidence and mood on individual and group decision-making. Peter's work has been instrumental not only in helping his clients, students, and readers understand how …
…
continue reading
1
OpenAI’s ChatGPT Atlas: What It Means for Cybersecurity and Privacy
15:13
15:13
Play later
Play later
Lists
Like
Liked
15:13In this episode, we explore OpenAI’s groundbreaking release GPT Atlas, the AI-powered browser that remembers your activities and acts on your behalf. Discover its features, implications for enterprise security, and the risks it poses to privacy. Join hosts Tom Eston and Scott Wright as they discuss everything from the browser’s memory function to v…
…
continue reading
1
OpenAI's ChatGPT Atlas: What It Means for Cybersecurity and Privacy
15:14
15:14
Play later
Play later
Lists
Like
Liked
15:14In this episode, we explore OpenAI's groundbreaking release GPT Atlas, the AI-powered browser that remembers your activities and acts on your behalf. Discover its features, implications for enterprise security, and the risks it poses to privacy. Join hosts Tom Eston and Scott Wright as they discuss everything from the browser's memory function to v…
…
continue reading
1
Edward Enninful, former editor of British Vogue: fashion has to be more inclusive
23:00
23:00
Play later
Play later
Lists
Like
Liked
23:00‘Fashion has to be more inclusive, it has to speak to people outside the normal demographic’ BBC presenter Amol Rajan speaks to Ghanaian-born Edward Enninful, who rose to the pinnacle of fashion in Britain as the editor-in-chief of British Vogue. Enninful has dedicated his career to making fashion representative and relevant to all, ignoring the ac…
…
continue reading
1
Arti Lalwani: Supporting and being the change. [Risk Management] [Career Notes]
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28Risk Management and Privacy Knowledge Leader at A-LIGN, Arti Lalwani shares her story from finance to risk management and how she made the transition. Arti started her career in finance after graduating with a finance degree. Quickly learning the field was not for her, she decided to dip her toes into the tech world. She credits her mentors for hel…
…
continue reading
1
Martin Moore and Thomas Colley, "Dictating Reality: The Global Battle to Control the News" (Columbia UP, 2025)
1:00:44
1:00:44
Play later
Play later
Lists
Like
Liked
1:00:44From the United States to China and from Brazil to India, an authoritarian approach to news is spreading across the world. Increasingly, the media is no longer a check on power or a source of objective information but a means by which governments and leaders can propagate their versions of reality, however biased or false. In Dictating Reality: The…
…
continue reading
1
Attack of the automated ops. [Research Saturday]
19:40
19:40
Play later
Play later
Lists
Like
Liked
19:40Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vec…
…
continue reading
1
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen - Rob Allen - SWN #525
32:25
32:25
Play later
Play later
Lists
Like
Liked
32:25AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
…
continue reading
After spending years tracking Al Qaeda, former analyst Gina Bennett talks to SpyTalk about her storied career, her new spy novel and the rising threat of "politicized misogyny." Gina Bennett If Two of Them Are Dead Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Karen Greenberg on Twitter https://x.com/KarenGreenberg3 Follow Mich…
…
continue reading
CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Lu…
…
continue reading
1
TNB Tech Minute: Microsoft Earnings Indicate OpenAI Suffered a $12 Billion Loss Last Quarter
2:45
2:45
Play later
Play later
Lists
Like
Liked
2:45Plus: The flurry of Silicon Valley companies trying to build AI data centers is flooding debt markets. And Charter Communications profits fell in the third-quarter as its home internet subscriber base weakens. Julie Chang hosts. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The Wall Street Journal
…
continue reading
1
TNB Tech Minute: SpaceX Set to Develop Satellites in $2 Billion Pentagon Deal
2:43
2:43
Play later
Play later
Lists
Like
Liked
2:43Plus: Nvidia strikes a number of deals with some of South Korea’s biggest companies. And Google releases its first AI-generated ad. Zoe Kuhlkin hosts. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The Wall Street Journal
…
continue reading
Today we discuss some pre-travel tips you can use before hopping on a plane to start a work/personal adventure. Tips include: Updating the family DR/BCP plan Lightening your purse/wallet Validating/testing backups and restores Ensuring your auto coverage is up to snuff
…
continue reading
51
Meet the Robot Housekeeper That’s Still Part Human
14:16
14:16
Play later
Play later
Lists
Like
Liked
14:161X’s Neo humanoid robot is rolling out to households soon, but it’s not totally autonomous yet. WSJ senior personal technology columnist Joanna Stern tells us what it was like to give the robot a spin. Plus, WSJ personal technology columnist Nicole Nguyen breaks down another piece of technology AI is changing: the web browser. Belle Lin hosts. Sign…
…
continue reading