Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Operations Podcasts

show episodes
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
Hacked

Hacked

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
  continue reading
 
Artwork

1
Ubuntu Security Podcast

Ubuntu Security Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Artwork

1
Mac Admins Podcast

Mac Admins Podcast LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
  continue reading
 
Artwork
 
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
  continue reading
 
Artwork
 
This is daily Apple news. Monday through Friday, Ken Ray brings a short shot of tech happenings to your day. If it's Apple news, Apple-related news, or news related to Apple-related news, you'll hear about it here. News you'll like... this is Mac OS Ken.
  continue reading
 
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Artwork

1
SpyTalk

SpyTalk, Jeff Stein

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
  continue reading
 
Artwork

1
Mostly Security

Jon King and Eric Wuehler

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
  continue reading
 
Artwork

1
Now in Android

Now in Android

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android’s a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
  continue reading
 
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
  continue reading
 
Artwork

1
The Startup Operator

Startup Operator

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The best-curated wisdom from founders, operators, & investors on executing at startups | Hosted by Roshan Cariappa | Head down, execute hard. 🔥 Millions of listeners seek out Bingepods (Ideabrew Studios Network content) every day. Get in touch with us to advertise, join the network or click listen to enjoy content by some of India's top audio creators. [email protected] Android | Apple
  continue reading
 
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
  continue reading
 
Artwork
 
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
  continue reading
 
Artwork

51
Mean Time To Insight

Enterprise Management Associates + APMdigest

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
  continue reading
 
Artwork

1
Reality 2.0

Katherine Druckman and Doc Searls

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
  continue reading
 
Artwork

1
Connect

Axis Communications

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
  continue reading
 
Artwork

1
All Things Secured | Online Privacy & Security on Odysee

All Things Secured | Online Privacy & Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
  continue reading
 
Artwork

1
Malicious Life

Malicious Life

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and ...
  continue reading
 
Artwork

1
Covert Operations and National Security

Circle Of Insight Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to covert actions and national security podcast. Welcome to covert and national security podcast. A podcast where we discuss a spectrum of activities concerning covert operations, intelligence, counterintelligence, unconventional warfare, assassination issues, espionage spy craft technology and more. Enter the operational world with Dr. Carlos
  continue reading
 
Artwork

1
The Cognitive Crucible

Information Professionals Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
  continue reading
 
Loading …
show series
 
The U.S. Department of Justice has successfully dismantled a major operator behind the notorious Zeppelin ransomware, charging Russian national Ianis Aleksandrovich Antropenko with conspiracy to commit computer fraud, money laundering, and extortion. Antropenko, known online as “china.helper,” allegedly deployed Zeppelin ransomware in targeted camp…
  continue reading
 
It’s week three of the Saint Paul cyberattack. There’s a known culprit now, and an operation underway to secure the city’s information infrastructure. All of that plus mitigation tips everyone can use on this edition of The Checklist brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@S…
  continue reading
 
In this unprecedented history of intelligence cooperation during the Cold War, Aviva Guttmann uncovers the key role of European intelligence agencies in facilitating Mossad's Operation Wrath of God; a campaign of assassination against Black September terrorists. She reveals how, in the aftermath of the 1972 Munich Olympics Massacre, Palestinians su…
  continue reading
 
Eric's on vacation and Jon wrangles cows. Cloudflare accuses perplexity of stealth scraping tactics, Google tweaks their disclosure policy, Microsoft studies AI impact on jobs, and OpenAI shared chats disclose a little (lot) too much. For fun, how about a hike in the Tetons, and Potatoes from Tomatoes. 0:00 - Intro 11:55 - Stealth Bots 16:24 - Disc…
  continue reading
 
The cybersecurity world has entered a new era: AI-powered ransomware. Researchers recently uncovered PromptLock, a proof-of-concept malware that uses OpenAI’s gpt-oss:20b model and Lua scripting to autonomously generate malicious code, encrypt data, and exfiltrate files across Windows, Linux, and macOS. While still experimental, PromptLock demonstr…
  continue reading
 
The 2025 Purple Knight Report paints a stark picture of enterprise identity security: the average security assessment score for hybrid Active Directory (AD) and Entra ID environments has plummeted to just 61%—a failing grade and an 11-point decline since 2023. This troubling trend underscores the persistent challenges organizations face in protecti…
  continue reading
 
Cybercrime is entering a new phase—one marked by AI-powered phishing attacks, the weaponization of legitimate remote access tools, and the rise of professionalized underground markets. Recent reports highlight the alarming growth of AI-driven polymorphic phishing, where malicious emails are automatically tailored, randomized, and adapted in real ti…
  continue reading
 
The recent Salesforce data breach underscores a growing reality in cybersecurity: even when core SaaS platforms are secure, their third-party integrations often aren’t. Between August 8–18, 2025, attackers from the group UNC6395 exploited compromised OAuth tokens from the Salesloft Drift AI chat integration, systematically exporting data from hundr…
  continue reading
 
On today’s episode, Lawfare’s Ukraine Fellow Anastasiia Lapatina sits down with Eric Ciaramella, a Senior Fellow at the Carnegie Endowment for International Peace and Lawfare Contributing Editor, to discuss the history of American security commitments abroad and how it can help inform the debate around security guarantees for Ukraine. To receive ad…
  continue reading
 
- IDC Raises 2025 Smartphone Shipment Expectations Thanks to iPhone - Apple Revokes Notarization for iTorrent in EU’s AltStore PAL - Google Intros Notarization-Style Verification for Android Apps Outside Play Store - Columbia Pursues Probe into Alleged Anticompetitive Behavior from Apple - Apple Music Radio Stations Turn Up on TuneIn - Apple TV+ Dr…
  continue reading
 
How did the design of GitHub evolve? Carl and Richard speak with Diana Mounter about her experiences at GitHub, including her role as head of design. Diana discusses how she was drawn to GitHub as a designer and how her career evolved to lead design for the company. The conversation ranges over different design concepts, the Primer design language,…
  continue reading
 
Adobe has opened a new door on their AI strategy, unveiling a new AI service for PDFs. Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Marty Jencius, Jeff Gamet, Eric Bolden, Jim Rea, Web Bixby, and Norbert Frassa weigh its usefulness against privacy risks and academic research tools. They discuss the Dia browser’s pricey subscription model, …
  continue reading
 
A new and highly sophisticated cyber espionage campaign attributed to Silk Typhoon—also known as Mustang Panda, TEMP.Hex, or UNC6384—has been uncovered, targeting diplomats and government entities across Southeast Asia. Researchers from Google’s Threat Intelligence Group (GTIG) revealed that the attackers deployed Adversary-in-the-Middle (AitM) tec…
  continue reading
 
We unpack how some password managers can be tricked into coughing up your secrets, with a clickjacking sleight-of-hand, what website owners can do to prevent it, and how to lock down your personal password vault. Then we time-hope to the post-quantum scramble: "harvest-now, decrypt later", Microsoft's 2033 quantum-safe pledge, and whether your prin…
  continue reading
 
The fight over encryption has entered a new phase. The Federal Trade Commission (FTC), led by Chairman Andrew Ferguson, has issued a strong warning to major U.S. technology companies: resist foreign government demands to weaken encryption. At stake is nothing less than the security of millions of Americans’ private communications, financial data, a…
  continue reading
 
A wide-ranging MacVoices Live! panel discussion covers Apple’s upcoming AutoMix feature in Music, Spotify’s more granular playlist controls, and how DJs and party hosts might use transitions. The group debates Google’s new “preferred sources” search option and its risks of echo chambers, along with OpenAI’s return of model-selection in ChatGPT. Chu…
  continue reading
 
Returning from this year's DEF CON, hear from our Offensive Team Managers, Dowd and Findlay, and Pinky, IR Manager and co-host of The Hackle Box. Hear about new highlights, CTF's, and villages, and reflection from Brad as a Blue Team member navigating past challenges. Have something to say? Contact us at [email protected] and follow us for mo…
  continue reading
 
Researchers have uncovered a new form of indirect prompt injection that leverages a simple but powerful trick: image scaling. This novel attack involves hiding malicious instructions inside high-resolution images, invisible to the human eye. When AI systems automatically downscale these images during preprocessing, the hidden prompt becomes visible…
  continue reading
 
This week, Scott sat down with old and new Lawfare colleagues—Benjamin Wittes, Renée DiResta, and Michael Feinberg—to talk through the week’s big national security news stories, including: “An Old Fashioned Anti Raid.” Former Trump National Security Advisor (turned Trump critic) John Bolton got a rude awakening this past week when the FBI conducted…
  continue reading
 
The healthcare sector has been rocked yet again by a massive cybersecurity incident. Healthcare Services Group (HCSG), a provider of dining and laundry services to healthcare facilities, disclosed a data breach that compromised the personal information of over 624,000 individuals. Between late September and early October 2024, hackers gained unauth…
  continue reading
 
French retail giant Auchan has confirmed a massive data breach that compromised the personal details of hundreds of thousands of customers. The stolen data includes names, addresses, phone numbers, email addresses, and loyalty card numbers—though banking details, passwords, and PINs were reportedly not affected. Despite this, the breach is serious …
  continue reading
 
This episode examines the political, military, and economic elements of the relationship between Russia and India. Guest Biographies Dmitry Gorenburg is a Senior Research Scientist in CNA’s Russia Studies Program. He is an expert on security issues in the former Soviet Union, the Russian military, Russian foreign policy, and ethnic politics and ide…
  continue reading
 
Apple Silicon provides so many different opportunities with virtualisation, but many of us still miss the intel days when we could snapshot and use serial numbers to automate device enrollment. Tools like Tart provide opportunities to build workflows that allow us to configure and enhance the way we virtualise macOS. Hosts: Tom Bridge - @tbridge@th…
  continue reading
 
- Apple’s Next Media Event Set for 9 September - Expectations for Apple’s “Awe Dropping” Event - Apple Sets “Awe Dropping” Placeholder on YouTube - “Awe Dropping” Art Goes Interactive on Apple Site - BofA: Investors Not Super Excited About iPhone Air - Germany Says Apple Can’t Call Apple Watch “Carbon Neutral” - Apple Opening Two Stores in India Ne…
  continue reading
 
Matthew Ford, Associate Professor at Swedish Defence University and author of “War in the Smartphone Age: Conflict, Connectivity, and the Crises at Our Fingertips,” joins Lawfare’s Justin Sherman to discuss the role of smartphones and related technologies in war, how social media contributes to a collapse of context in the war content we see online…
  continue reading
 
Send us a text Career Paul joined the SIA in 2001 after a 33-year career first in HM Armed Forces and then in the Police Service. Paul retired from policing in 2020 as Assistant Chief Constable (Specialist Policing Services) for Bedfordshire Police and the Cambridgeshire and Hertfordshire constabularies, with responsibility for major crime, armed p…
  continue reading
 
The vast majority of the world's countries are experiencing a demographic revolution: dramatic, sustained, and likely irreversible population aging. States' median ages are steadily increasing as the number of people ages 65 and older skyrockets. Analysts and policymakers frequently decry population aging's domestic costs, especially likely slowing…
  continue reading
 
In the not-so-distant future, a U.S. military commander in the Indo-Pacific could be forced to fight two major wars at once - one against a Chinese assault on Taiwan, the other against a North Korean attack on the Korean Peninsula. This dual-front crisis scenario, long considered unlikely, is now routinely modeled in wargames and quietly debated in…
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Australia expels Iranian ambassador Hackers sabotage Iranian shipping satcoms APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK? Trail of Bits uses image-downscaling to sneak prompts into Google Gemini The Com’s King Bob ge…
  continue reading
 
A critical vulnerability in Docker Desktop, CVE-2025-9074, has shaken the container security world. Scoring 9.3 on the CVSS scale, this flaw exposed an unauthenticated Docker Engine API (192.168.65.7:2375) to any container running on Windows and macOS. With nothing more than a few HTTP requests—or even three lines of Python code—attackers could esc…
  continue reading
 
By the autumn of 1989, the hunt for Pablo Escobar and the Medellín cartel was intensifying. With the US military and intelligence agencies now directly involved, a new, more aggressive phase of the War on Drugs had begun. Join Gordon and David as they explore how Escobar, facing a relentless manhunt, leverages his position to strike an extraordinar…
  continue reading
 
The Arch Linux community has just endured more than a week of turbulence as a massive distributed denial-of-service (DDoS) attack disrupted its most critical services, including the main website, the Arch User Repository (AUR), and community forums. Beginning in mid-August 2025, the sustained volumetric and protocol-level assault overwhelmed hostin…
  continue reading
 
Cyberattacks against supply chains are no longer isolated disruptions—they are systemic threats with the power to cascade across industries and nations. The recent ransomware attack on Data I/O, a chip programming firm whose customers include global giants like Apple, Microsoft, Amazon, and Bosch, demonstrates how one breach can disrupt manufacturi…
  continue reading
 
Apple Watch users regain blood oxygen tracking via iPhone processing, while panelists debate its impact on Apple’s legal fight with Massimo. Security warnings about Plex servers and ESR power banks serve as public service announcements. Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Jim Rea, and Web Bixby then turn their attention to Apple C…
  continue reading
 
video: https://youtu.be/PdyDXEbu56k This week on Destination Linux, we’re putting software to the test with a brand-new community tool at IsItReallyFOSS.com, a site that helps you find out if projects claiming to be open source live up to it. Then Jill takes us through the latest release of Fastfetch 2.49, the modern Neofetch alternative that’s qui…
  continue reading
 
The U.S. healthcare sector continues to face relentless cyberattacks, and rural hospitals are increasingly at the center of this crisis. The recent Aspire Rural Health System breach in Michigan—attributed to the BianLian ransomware group—exposed the personal and medical data of nearly 140,000 patients and staff. From Social Security numbers and fin…
  continue reading
 
Artificial Intelligence (AI) models are shaping the future of industries from healthcare and finance to autonomous vehicles and national infrastructure. But with this rise comes a hidden battlefield: adversarial attacks designed to manipulate AI systems in subtle yet devastating ways. One of the most alarming threats is the OneFlip attack, a method…
  continue reading
 
In this episode of Pop Goes the Stack, F5's Lori MacVittie, Joel Moses, and Ken Arora delve into the complex issue of ownership with respect to your AI-driven digital twin. As organizations consider the use of AI avatars and AI twins, explore the nuances of employment contracts, intellectual property, and the potential for creating AI models based …
  continue reading
 
Lawfare Contributor Mykhailo Soldatenko sits down with Michael O'Hanlon, Director of Foreign Policy Research and Senior Fellow at the Brookings Institution, and Andriy Zagorodnyuk, Chairman of the Centre for Defence Strategies in Kyiv, a former Ukrainian Defence Minister, and a nonresident scholar at Carnegie Endowment for International Peace, to d…
  continue reading
 
- Elon Musk Sues Apple and OpenAI Over iOS/ChatGPT Integration - Y Combinator Sides with Epic in Amicus Brief Against Apple - Apple Seeds Eighth (blank)OS 26 Betas to Developers - 9to5Mac Suspects Eighth iOS 26 Developer Beta is Last Before Wide Release - Apple Seeds Fifth Betas of Most (blank)OS 26 Builds to Public Testers - F1: The $600M+ Movie -…
  continue reading
 
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, David Cook discusses his recent a…
  continue reading
 
In July we hit the half-way mark in the development of the 2026 Integrated System Plan (ISP) with the publication of a number of key reports, including the Inputs, Assumptions and Scenarios Report (IASR) and the new Gas Infrastructure Options Report (GIOR). The ISP is the strategic roadmap for Australia's National Electricity Market (NEM) and it ou…
  continue reading
 
⬥GUEST⬥ Andy Ellis, Legendary CISO [https://howtociso.com] | On LinkedIn: https://www.linkedin.com/in/csoandy/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In this episode of Redefining Cyb…
  continue reading
 
An iPhone survives a 2,600-foot fall, sparking debate on durability and user habits between Chuck Joiner, David Ginsburg, Eric Bolden, Brian Flanigan-Arthurs, Marty Jencius, Web Bixby, Jim Rea, and Jeff Gamet. A Texas startup launches a telescope-hosting data center, enabling astronomers to control gear remotely under pristine skies. Meanwhile, Ope…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play