SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Security Operations Podcasts
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
The talk of the Apple Community
…
continue reading
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
A podcast made by people who love running Linux.
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
…
continue reading
Welcome to Ragnar365 Nuggets, Ragnar Heil's short news and personal insights about Microsoft 365 Intelligent Workplace. Focus Areas: Microsoft Teams, SharePoint, Outlook, OneDrive, Copilot, Microsoft Viva, Employee Experience, Governance, Compliance, Power Platform etc)
…
continue reading
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A podcast about all things energy, brought to you by the Australian Energy Market Operator.
…
continue reading
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android’s a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
A Cyber Security Podcast, focussed on Threat Research and the interesting people behind it.
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
Welcome to covert actions and national security podcast. Welcome to covert and national security podcast. A podcast where we discuss a spectrum of activities concerning covert operations, intelligence, counterintelligence, unconventional warfare, assassination issues, espionage spy craft technology and more. Enter the operational world with Dr. Carlos
…
continue reading
Welcome to The Security Guy’d — the podcast where safety meets strategy! With your host, Rafee, each week we dive deep into the world of security, leadership, and everything in between. Whether you’re running a company, managing a team, or just passionate about keeping people safe — this show is your guide to smarter, stronger security. Expect real talk, expert guests, and practical tips to help you stay ahead of the game. Let’s lock in and level up — This is The Security Guy’d
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Ideas, Advice, Experience on how to run your business operations more successfully from the friendly and hugely experienced crew at Shergroup!
…
continue reading
🎙️ Welcome to the Microsoft Intune and Security Report Podcast🎙️ — your essential stop for the latest in Windows and Edge security! This podcast is designed to be a time-saving powerhouse, distilling the most critical updates, new features, and emerging vulnerabilities from multiple trusted sources into one convenient, ready-to-reference report. Each week, we dig deep into the data to give you a concise, actionable rundown on the security landscape, helping you stay one step ahead. So whethe ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading

1
The NDS Show - An Intelligence Community Podcast covering Geospatial Intelligence, Open Source Intelligence OSINT, Human Intelligence HUMINT, Military & National Security
The NDS Show
Unlock a world of valuable insights and thought-provoking discussions related to the Special Forces, Military, and Intelligence Community (CIA, NSA, NGA, FBI, Military Intelligence). Things we discuss: GEOINT, OSINT, HUMINT, SIGINT, SOF, Special Forces, Military, Veterans Issues, Army, Navy, Marines, Air Force, Entrepreneurship, Geopolitics, News, Politics, Technology, Artificial Intelligence, Augmented Reality, Cloud Computing, Data Analytics, Government Contracting, Defense Contracting, Bu ...
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
…
continue reading
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot ...
…
continue reading
"Building the Base" - an in-depth series of conversations with top entrepreneurs, innovators, and leaders from tech, financial, industrial, and public sectors. Our special guests provide their unique perspectives on a broad selection of topics such as: shaping our future national security industrial base, the impact of disruptive technologies, how new startups can increasingly contribute to national security, and practical tips on leadership and personal development whether in government or ...
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veteran Graham Cluley chats with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @smashinse ...
…
continue reading
Welcome to The Security Experience Podcast — the safe space security talk Hosted by Everett Gray & Josh Bowman, this show brings together security pros of all kinds: the technicians pulling wire and installing panels, the engineers programming AI cameras, the sales teams building trust, and the executives shaping the future of Fortune 500 security operations. Here, you can share stories, learn from real-world wins and failures, and dive deep into the technologies transforming CCTV, access co ...
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
…
continue reading
The CYSA PrepCast is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
…
continue reading

1
EP 136 Hiring the Enemy? Is Your applicant a Trojan Horse? Former CIA Operative: Nick Gicinto Explains How a Bad Hire can Literally be Hiring your Hacker
1:06:31
1:06:31
Play later
Play later
Lists
Like
Liked
1:06:31Send us a text 🔐 Top 5 Things This Podcast Unpacks 🚩 The Rise of Fake Identities in Remote Hiring Nation-state actors — particularly from North Korea — are using stolen or fabricated identities to secure legitimate remote IT roles inside Western organisations, bypassing traditional recruitment filters. 🎭 Deepfakes and Digital Deception From AI-gene…
…
continue reading
By Circle Of Insight Productions
…
continue reading

1
TNO036: Bridging Networking and Security with Auvik (Sponsored)
57:28
57:28
Play later
Play later
Lists
Like
Liked
57:28Auvik is network management software that lets users monitor, manage, and troubleshoot their networks. On today’s sponsored episode we talk with Doug Murray, CEO; and John Harden, Director of Strategy & Technology Evangelism, both from Auvik, about the challenges facing today’s network operators. We look at the rise of the IT generalist, workloads …
…
continue reading

1
The Evolution of Cyber Operations and Growth in Defense-Focused Companies
28:08
28:08
Play later
Play later
Lists
Like
Liked
28:08In today’s ever-shifting security environment, both cyber operations and the defense industry at large are experiencing transformative growth. From humble beginnings of rudimentary attacks to the intricate global threat matrix of today, cyber operations have evolved dramatically. In parallel, defense-focused companies are re-evaluating their strate…
…
continue reading

1
Episode 17: Domain 1 Overview – Security Operations in the Analyst’s World
15:46
15:46
Play later
Play later
Lists
Like
Liked
15:46Welcome to Domain 1, the largest and most foundational section of the CySA+ exam. In this episode, we preview what you’ll learn across the next several modules and explain how Security Operations serves as the nerve center of a modern cyber defense strategy. From architecture to access control to threat detection, this domain sets the tone for your…
…
continue reading

1
Lawfare Archive: Amanda Tyler on Rahimi and Taking Guns Away From Loyalists
40:52
40:52
Play later
Play later
Lists
Like
Liked
40:52From December 27, 2023: The Supreme Court last month heard oral arguments in United States v. Rahimi, in which the Court will decide the constitutionality of a federal law that criminalizes the possession of firearms by individuals on whom state courts have imposed domestic violence protective orders. This case came to the Court following its June …
…
continue reading

1
The Escobar Phone and Imaginary Flamethrowers
52:23
52:23
Play later
Play later
Lists
Like
Liked
52:23We unpack how a Swedish entrepreneur used Pablo Escobar’s name to sell fake phones, flamethrowers, and crypto — and how a viral scam built on influencer hype finally came crashing down. That and other stories. Hacked is brought to you by Push Security, check them out at PushSecurity.com Learn more about your ad choices. Visit podcastchoices.com/adc…
…
continue reading

1
MacVoices #25206: Live! - Apple Sues A Leaker, iCloud Stays Secure, Apple Intelligence Stays Private
33:19
33:19
Play later
Play later
Lists
Like
Liked
33:19The MacVoices Live! panel discusses Apple’s lawsuit against a leaker over alleged iOS 26 leaks and the broader implications for media control, trade secrets, and leaker culture. Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Web Bixby, Marty Jencius, and Eric Bolden examine the UK government’s retreat from demanding access to iCloud encrypti…
…
continue reading

1
Unsecurity Episode 243: Cyber Counsel w/ Heidi Fessler
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:48Attorney Heidi Fessler is this week's guest! Practicing law for 35 years and specializing in cybersecurity, Heidi walks us through the right time to engage legal, navigating incident response, distinctions between general and cyber counsel, and cyber law. Thoughts on Unsecurity? Contact us at [email protected] and follow us for more! LinkedIn…
…
continue reading
Former top NSA, CIA & ODNI official Larry Pfeiffer discusses Tulsi Gabbard’s attacks on CIA handling of Russia election report with hosts Jeff Stein and Michael Isikoff Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk on Twitter: https://twitter.com/talk_spy Su…
…
continue reading

1
TNO037: The Next Era of Network Management and Operations
46:31
46:31
Play later
Play later
Lists
Like
Liked
46:31What’s the next era of network management and operations? Total Network Operations talks to Mahesh Jethanandani, Chair of NETCONF Working Group and Distinguished Engineer at Arrcus. Mahesh describes a workshop from December of 2024 that sought to investigate the past, present, and future of network management and operations. He talks about the IETF…
…
continue reading

1
CCA Testing Kickstarts Next Generation of Air Dominance
27:47
27:47
Play later
Play later
Lists
Like
Liked
27:47In a little over a year since the program’s announcement, two prototypes of Collaborative Combat Aircraft (CCA) have started ground testing and are expected to fly in the coming months. The achievement marks an impressive timeline for the aircraft’s development, which is designed to be an unmanned platform that will fly in tandem with, and in suppo…
…
continue reading

1
Breaking Down Chaos: Tactics and Origins of a New RaaS Operation
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33Hazel is joined by threat intelligence researcher James Nutland to discuss Cisco Talos’ latest findings on the newly emerged Chaos ransomware group. Based on real-world incident response engagements, James breaks down Chaos’ fast, multi-threaded encryption, their use of social engineering and remote access tools like Quick Assist, and the group’s l…
…
continue reading

1
Scaling Laws: Renée DiResta and Alan Rozenshtein on the ‘Woke AI’ Executive Order
46:48
46:48
Play later
Play later
Lists
Like
Liked
46:48Renée DiResta, an Associate Research Professor at the McCourt School of Public Policy at Georgetown and a Contributing Editor at Lawfare, and Alan Rozenshtein, an Associate Professor at Minnesota Law, Research Director at Lawfare, and, with the exception of today, co-host on the Scaling Laws podcast, join Kevin Frazier, the AI Innovation and Law Fe…
…
continue reading

1
Checklist 434 - OS Updates and City Under Cyberattack
20:19
20:19
Play later
Play later
Lists
Like
Liked
20:19Last week, we talked about moves Apple’s making to fight smishing. Now some political types are fighting against that fight. We’ll tell you more. Plus - Apple updated all of its current operating systems earlier this week. We’ll fill you in. We start though in Saint Paul, Minnesota - a city under cyberattack. It’s all ahead on this edition of The C…
…
continue reading

1
Soap Box: Why AI can't fix bad security products
37:11
37:11
Play later
Play later
Lists
Like
Liked
37:11In this Soap Box edition of the show Patrick Gray chats with the CEO of email security company Sublime Security, Josh Kamdjou. They talk about where AI is useful, where it isn’t, and why AI can’t save vendors from their bad product design choices. This episode is also available on Youtube. Show notes…
…
continue reading

1
Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference | An ITSPmagazine Webinar: On Location Coverage with Sean ...
1:00:22
1:00:22
Play later
Play later
Lists
Like
Liked
1:00:22In this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025. Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shiftin…
…
continue reading

1
MacVoices #25205: Live! - ICE Surveillance App Debate, TikTok Reboot, Bluetooth Messaging, and Napster’s Return
40:03
40:03
Play later
Play later
Lists
Like
Liked
40:03The panel dives into the controversy over an app used to track ICE agents, debating First Amendment rights, privacy, and potential misuse. Chuck Joiner, Brian Flanigan-Arthurs, Ben Roethig, Marty Jencius, Eric Bolden, Jim Rea, Jeff Gamet, Mark Fuccio, David Ginsburg, and Web Bixby also explore TikTok’s possible Americanized version, Jack Dorsey’s n…
…
continue reading

1
Building Security Programs That Actually Scale – with Bonnie Viteri | Secrets of AppSec Champions 🎙️
31:04
31:04
Play later
Play later
Lists
Like
Liked
31:04Building great security programs takes more than checklists and best practices—it takes vision, collaboration, and adaptability. In this episode, Bonnie Viteri, Principal Technical Security Engineer at Yahoo, shares how to build scalable, resilient programs that evolve, survive leadership turnover, and actually provide value to the business. 🔔 Subs…
…
continue reading

1
More Than Medals: How Jeffrey Jackson Builds Champions On and Off the Mat
1:23:32
1:23:32
Play later
Play later
Lists
Like
Liked
1:23:32Send us a text In this powerful episode of The Security Guy’d, we sit down with the legendary Jeffrey Jackson — a 5th Dan Karate instructor from Mitchells Plain, Commonwealth Gold Medalist, 10-time South African National Champion, and Former Karate Sportsman of the Year. Now the founder of JODO (Karate Satori), Jeffrey has turned his passion into p…
…
continue reading

1
MacVoices #25204: MacVoices Update - 2025-07
7:40
7:40
Play later
Play later
Lists
Like
Liked
7:40This July MacVoices Update recaps a MacStock-filled month, including highlights from the live panel and thoughts on tech insights gained at the event. Renewed blogging efforts featuring podcast recommendations and previews are kicking off this month, as well as a more regular cadence for upcoming shows. He also spotlights MacVoices Magazine and del…
…
continue reading

1
Lawfare Daily: The Famine in Gaza and Its Implications, with Joel Braunold
1:09:04
1:09:04
Play later
Play later
Lists
Like
Liked
1:09:04For today's episode, Lawfare General Counsel and Senior Editor Scott R. Anderson sat down with Joel Braunold, Managing Director of the S. Daniel Abraham Center for Middle East Peace, for another of their regular updates on the Israeli-Palestinian conflict. This time, they discussed the brutal famine afflicting Gaza, how the broader military conflic…
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the challenges of DIY network automation, and what vendors can do to help.By Enterprise Management Associates + APMdigest
…
continue reading

1
Red flags, leaked chats, and a final farewell
40:10
40:10
Play later
Play later
Lists
Like
Liked
40:10The viral women-only dating safety app Tea, built to flag red flags, gets flagged itself - after leaking over 70,000 private images and chat logs. We are talking full-on selfies, ID docs, private DMs, and a dash of 4chan creepiness. Yikes. Plus, Carole takes us down memory lane as she hangs up her co-host mic after 428 glorious episodes. Expect tea…
…
continue reading

1
MacVoices #25203: Live! - Apple Lands on Threads, FaceTime Freezes Nudity
30:21
30:21
Play later
Play later
Lists
Like
Liked
30:21The panel discusses Apple’s quiet debut on Threads, debates the value and future of social media platforms, and explores Vision Pro’s emerging “InSpace” community as a new kind of digital gathering space. Chuck Joiner, Brian Flanigan-Arthurs, Ben Roethig, Marty Jencius, Eric Bolden, Jim Rea, Jeff Gamet, Mark Fuccio, David Ginsburg, and Web Bixby al…
…
continue reading

1
Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Conversation with Sean Metcalf | Redefining CyberSecurity with Sean Martin
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:48⬥GUEST⬥ Sean Metcalf, Identity Security Architect at TrustedSec | On LinkedIn: https://www.linkedin.com/in/seanmmetcalf/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ Sean Metcalf, a frequen…
…
continue reading
This episode explores how the Fairfax County 911 Center is using Next Generation 911 systems to better serve its jurisdiction. Guest Biographies Heleana Melendez is an expert in criminal justice research and policing. At CNA, Melendez supports projects focused on violence prevention, system improvement, crisis intervention and use of force for law …
…
continue reading

1
Rational Security: The “SkrillEx Parte” Edition
1:14:03
1:14:03
Play later
Play later
Lists
Like
Liked
1:14:03This week, Scott sat down with his Lawfare colleagues Natalie Orpett, Kevin Frazier, and Tyler McBrien to talk through the week’s big national security news stories, including: “Feeding Frenzy.” The crisis in Gaza has reached a new, desperate stage. Months of a near total blockade on humanitarian assistance has created an imminent risk, if not a re…
…
continue reading

1
SharePoint On-Prem Exploited & Keeping on top of changes in M365: Practical 365 Podcast S04E42
48:58
48:58
Play later
Play later
Lists
Like
Liked
48:58Join Steve Goodman, Paul Robichaux, and Bastiaan Verdonk as they delve into the critical security vulnerabilities affecting on-premises SharePoint servers, including the "ToolShell" exploit chain (CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, CVE-2025-53771) which enables unauthenticated remote code execution. They discuss the scale of the proble…
…
continue reading

1
Lawfare Daily: ‘Putin’s Sledgehammer’ with Candace Rondeaux
57:36
57:36
Play later
Play later
Lists
Like
Liked
57:36Candace Rondeaux, Senior Director of New America’s Future Frontlines program, Director of its Planetary Politics initiative, and professor of practice at Arizona State University joins Lawfare’s Justin Sherman to discuss her recently published book, "Putin’s Sledgehammer: The Wagner Group and Russia’s Collapse into Mercenary Chaos." They discuss Ye…
…
continue reading

1
"As Bad as it Gets" Inside the SharePoint Breach - Ep 160
11:42
11:42
Play later
Play later
Lists
Like
Liked
11:42“It's got a [vulnerability] score of a 9.8, and this is on a scale of 10 and I've really never seen 10. So 9.8 is basically just as bad as it gets.” This episode is inspired by an ongoing global cybersecurity incident. In mid‑July attackers began actively exploiting Microsoft SharePoint vulnerabilities in what’s now known as the “ToolShell” exploit…
…
continue reading

1
Risky Business #800 — The SharePoint bug may have leaked from Microsoft MAPP
53:37
53:37
Play later
Play later
Lists
Like
Liked
53:37On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: Did the SharePoint bug leak out of the Microsoft MAPP program? Expel retracts its FIDO bypass writeup The mess surrounding the women-only dating-safety app Tea gets worse Broadcom customers struggle to get patches for VMWare hypervisor escapes Aeroflot gets hac…
…
continue reading

1
69. Israel Attacks Iran: Mossad’s First Assault (Ep 2)
41:04
41:04
Play later
Play later
Lists
Like
Liked
41:04How did Israel and the US develop this new type of weapon which they would unleash upon Iran? Who will they rely on to get it into the system? And how will they try to sabotage Iran in silence? Listen as David McCloskey and Gordon Corera discuss Israel’s development of a cyber weapon that could damage the Iranian nuclear program without anyone even…
…
continue reading

1
MacVoices #25202: Live! - MacVoices Live! at Macstock Conference (2)
29:46
29:46
Play later
Play later
Lists
Like
Liked
29:46In Part 2 of the live panel from Macstock Conference 2025, the group dives deeper into Apple user culture, changes in technology habits, and the importance of in-person tech events. With a mix of thoughtful commentary and good-natured banter, Marty Jencius, Brittany Smith, Jeff Gamet, Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Norbert Fr…
…
continue reading

1
Episode 422: Live from MacAdmins at Penn State
54:30
54:30
Play later
Play later
Lists
Like
Liked
54:30We’re live at the MacAdmins Conference at Penn State, talking about the week’s events, the state of the community, and what it’s like being at this very special conference. We’ve got great guests, and a good chance to have a wonderful conversation. Hosts: Tom Bridge - @[email protected] Guests: Erin Merchant - LinkedIn Greg Neagle - Linked…
…
continue reading

1
Lawfare Daily: Sezaneh Seymour and Brandon Wales on Private-Sector Cyber Operations
48:13
48:13
Play later
Play later
Lists
Like
Liked
48:13Alan Rozenshtein, Senior Editor and Research Director at Lawfare, sits down with Sezaneh Seymour, Vice President and head of regulatory risk and policy at Coalition and a former Senior Adviser on the National Security Council staff, and Brandon Wales, Vice President for cybersecurity strategy at SentinelOne and the former Executive Director of the …
…
continue reading

1
MacVoices #25201: LIve! - MacVoices Live! at Macstock Conference 2025 (1)
31:41
31:41
Play later
Play later
Lists
Like
Liked
31:41In a MacVoices Live! panel from Macstock Conference 2025 the group explores curiosity, learning, and creativity through technology. Marty Jencius, Brittany Smith, Jeff Gamet, Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Norbert Frassa, and Eric Bolden share personal motivations, how AI impacts their work and lives, and why continuous learn…
…
continue reading

1
Breaking Into Cybersecurity: Expert-Backed Tips to Launch a Career in 2025
26:15
26:15
Play later
Play later
Lists
Like
Liked
26:15As cyber threats surge and organizations scramble to protect digital infrastructure, the demand for cybersecurity professionals has never been higher. But for those aspiring to break into the field, the path can feel unclear. Whether you're transitioning from IT, switching careers entirely, or just starting out, cybersecurity offers diverse entry p…
…
continue reading

1
429: Open Source AI, End of Clear Linux, & the Security Scoop with Sandfly
1:14:49
1:14:49
Play later
Play later
Lists
Like
Liked
1:14:49video: https://youtu.be/abgTchtrH0k On this episode of Destination Linux, we are joined by security expert Craig Rowland returns for the “Sandfly Security Scoop,” explaining how the stealthy BPFdoor back‑door evades firewalls and sharing tips for DEF CON and Black Hat attendees. We also unpack listener feedback about phone‑addiction myths and mindf…
…
continue reading

1
Lawfare Daily: The Trials of the Trump Administration, July 25
1:44:10
1:44:10
Play later
Play later
Lists
Like
Liked
1:44:10In a live conversation on July 25, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Senior Editors Scott Anderson and Roger Parloff and Lawfare Legal Fellow James Pearce to discuss the the Supreme Court’s rulings allowing the removal of executive officials of independent agencies, the ongoing dismantling of executive agencies like the …
…
continue reading

1
Zero Trust Architecture: The Future of Cybersecurity
50:16
50:16
Play later
Play later
Lists
Like
Liked
50:16Send us a text Cybersecurity expert Bob Kochan from Beyond Identity discusses the evolution of security from network defense to identity-first approaches. He shares insights on how AI is transforming security operations while creating new threat vectors, emphasizing the need for phishing-resistant authentication solutions in today's threat landscap…
…
continue reading

1
68. Israel Attacks Iran: The Origins of the Iranian Nuclear Programme (Ep 1)
49:27
49:27
Play later
Play later
Lists
Like
Liked
49:27When did Israel first attack Iran’s nuclear program? How did they do it? And how did Iran develop its nuclear program that has shaped so much of the politics of the Middle-East over the past 20 years? Listen as David McCloskey and Gordon Corera discuss Israel’s first attempt to slow down Iran’s development of a nuclear bomb. ------------------- To …
…
continue reading
From May 6, 2017: Three months into the Trump presidency, where does the relationship between the president and the intelligence community stand? Donald Trump is no longer quite so regularly combative in his tweets and public comments about the various intelligence agencies, but the White House-intelligence community relationship is still far from …
…
continue reading

1
Lawfare Archive: AI Policy Under Technological Uncertainty, with Alex “amac” Macgillivray
40:32
40:32
Play later
Play later
Lists
Like
Liked
40:32From July 23, 2024: Alan Rozenshtein, Associate Professor at the University of Minnesota Law School and Senior Editor at Lawfare, and Matt Perault, the Director of the Center on Technology Policy at the University of North Carolina at Chapel Hill, sat down with Alexander Macgillivray, known to all as "amac," who was the former Principle Deputy Chie…
…
continue reading