SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Security Operations Podcasts
Your Weekly Source for Linux GNews from the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
A podcast made by people who love running Linux.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Welcome to Ragnar365 Nuggets, Ragnar Heil's short news and personal insights about Microsoft 365 Intelligent Workplace. Focus Areas: Microsoft Teams, SharePoint, Outlook, OneDrive, Copilot, Microsoft Viva, Employee Experience, Governance, Compliance, Power Platform etc)
…
continue reading
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
…
continue reading
A podcast about all things energy, brought to you by the Australian Energy Market Operator.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android’s a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Analyzing War, National Security, Politics & Foreign policy. 4x Combat Deployer. Unintimidated & Uncompormised. Danniel Davis is a Bronze Star Medal for Valor in Iraq + Bronze Star for Service in Afghanistan. He has a deep love for America. He remains Unintimidated + Uncompromised.
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading

1
The Deep Dive : Mysteries, Conspiracies, Scandals, Covert Operations, Folklore, Legends & More.
coachbp1975
We want to explore and dive deep into the world of Mysteries, Conspiracies, Scandals, Covert Operations, Folklore, Legends & More. We never claim to know everything, we never claim our opinion is correct, we simply put the evidence we have on the table and allow the audience to decide for themselves.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
The Guardian Way is a weekly podcast from Guardian Protection Force that turns real-world security experience into practical guidance you can use today. Hosted by Garrett Thomas with co-host Terry MacAdam, each episode breaks down an operations-level topic like executive protection, protective intelligence, workplace violence prevention, campus security, remote guarding, and patrol program design. We focus on what works in the field, why it works, and how to implement it with clear steps, po ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
…
continue reading
An improved audio format version of our written content. Get your defence and security perspectives now through this podcast.
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
The best-curated wisdom from founders, operators, & investors on executing at startups | Hosted by Roshan Cariappa | Head down, execute hard. 🔥 Millions of listeners seek out Bingepods (Ideabrew Studios Network content) every day. Get in touch with us to advertise, join the network or click listen to enjoy content by some of India's top audio creators. [email protected] Android | Apple
…
continue reading
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Commissionaires Nova Scotia proudly presents Purpose & Protection, a podcast dedicated to the people behind Canada’s security: veterans, their families, civilians and all those dedicated to keeping our communities safe. Each episode explores the lived experiences of those who’ve served, those who support them, and those shaping the future of Canada’s security landscape. From the frontlines to the home front, you’ll hear stories of resilience, leadership and purpose. As the largest private em ...
…
continue reading

1
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
Join Mike for discussions on intelligence, security, preparedness, building a first world zone in a third world descent, and winning low intensity conflict... or at least not losing.
…
continue reading
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
…
continue reading
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Want a peak behind the curtain into one of the best places to work in cybersecurity and the minds of the innovators behind the industry’s leading security operations platform? Tune in to The Howler podcast! Hosted by Chelsea Lowman, People Experience Specialist, and Mary Newville, People Experience Senior Manager, the culture duo connects with pack leaders on leadership insights, mental health and overall wellbeing, and how they lead their teams to advance our mission of ending cyber risk.
…
continue reading
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
…
continue reading
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading

1
Israel's Secret Security & Intelligence Apparatus
20:13
20:13
Play later
Play later
Lists
Like
Liked
20:13By coachbp1975
…
continue reading

1
How Security Can Lead Operational Resilience, Plus Reimagining Office Security
24:29
24:29
Play later
Play later
Lists
Like
Liked
24:29Security professionals have to be integrated into operational resilience efforts and business continuity planning to prevent disruptions of all kinds, according to new research from the ASIS Foundation. In this episode of the SM Highlights podcast, report co-author and ResOrgs principal consultant Joanne Stevenson shares why security gets left out …
…
continue reading

1
Razor Tooling in Visual Studio 2026 with David Wengier
55:00
55:00
Play later
Play later
Lists
Like
Liked
55:00Razor Tooling is evolving! Carl and Richard talk to David Wengier about the changes coming for Razor Pages in the next version of Visual Studio. David talks about the realization that much of the new work in Razor ties closely to Roslyn, which has resulted in a new co-hosting model that means higher performance and reliability for your web pages! T…
…
continue reading
By coachbp1975
…
continue reading
Build an intelligence-led executive protection program before an incident happens. Who it helps (role or ICP) HR and safety leaders responsible for workplace violence prevention in California. Facilities and operations leaders at mid-market companies. Campus and public-sector security decision makers. Executive teams seeking a practical EP starting…
…
continue reading

1
436: Exploring Design in Linux & Open Source with Máirín Duffy
1:20:23
1:20:23
Play later
Play later
Lists
Like
Liked
1:20:23video: https://youtu.be/EJZkJi8qF-M In this episode of Destination Linux, we chat with Máirín Duffy from Red Hat about the essential role of user experience design in open source. She shares her journey into Linux, driven by early encounters with technology, and discusses her contributions to projects like Inkscape. We explore the integration of AI…
…
continue reading

1
EP 143 “Fierce, Resilient, Unstoppable: Connie Moorehead’s Journey in Security”
48:19
48:19
Play later
Play later
Lists
Like
Liked
48:19Send us a text “Resilience isn’t about never falling — it’s about getting up one more time than you fall.” 🎙️ Episode Summary In this inspiring episode of the Security Circle Podcast, Yolanda sits down with Connie Moorehead, CEO of the Seymour Group, trailblazer, and lifelong mentor in the security industry. Connie opens up about her journey from b…
…
continue reading

1
Canadian Defence with the Honourable Peter MacKay
46:59
46:59
Play later
Play later
Lists
Like
Liked
46:59In this inaugural episode, Commissionaires Nova Scotia CEO and host, Barry Pitcher, sits down with the Honourable Peter MacKay, PC, KC, to discuss the evolving security landscape and the importance of supporting Canada’s veterans. From service to defence, this conversation explores leadership, legacy and national purpose. Topics Covered: Peter MacK…
…
continue reading
Introduction This year marked the 80th anniversary of the atomic bombing of Hiroshima and Nagasaki. Since then, the non-use of nuclear weapons has remained the single most significant phenomenon of the nuclear age. Central to any discussion of global nuclear politics is the term nuclear taboo, which refers to a de facto prohibition against the firs…
…
continue reading

1
Navigating the Future of Corporate Security: Insights from the Clarity Factory's Annual CSO Survey
34:15
34:15
Play later
Play later
Lists
Like
Liked
34:15Rachel Briggs, CEO of The Clarity Factory, joins us again on the Connected Intelligence Podcast to share findings from The Clarity Factory's Annual CSO Survey, proudly sponsored by Ontic. We explore how security leaders can break silos, tackle insider risk, and adapt to the rapidly evolving threat landscape. She highlights the growing need for cros…
…
continue reading

1
Ukraine Generals: IN THEIR OWN WORDS /Lt Col Daniel Davis
41:52
41:52
Play later
Play later
Lists
Like
Liked
41:52Ukraine Generals: IN THEIR OWN WORDS /Lt Col Daniel Davis See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
…
continue reading

1
Charlie Kirk Shooting, Ukraine Russia War Update /Lt Col Daniel Davis & Larry Johnson
57:44
57:44
Play later
Play later
Lists
Like
Liked
57:44Charlie Kirk Shooting, Ukraine Russia War Update /Lt Col Daniel Davis & Larry Johnson See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
…
continue reading

1
83. The Man Who Saved The World: Countdown to Armageddon (Ep 4)
50:34
50:34
Play later
Play later
Lists
Like
Liked
50:34It’s 1983 and the world is on the brink of nuclear war. Operation Able Archer has ratcheted tensions right up, how is Oleg Gordievski going to prevent a nuclear apocalypse? Is this the greatest contribution of any spy to humanity? And what does it say about the enduring value of human intelligence? Listen as David and Gordon continue their series o…
…
continue reading
By coachbp1975
…
continue reading

1
Automox Insiders – Switching Classrooms: Katie Bleichman on Redefining Her Career Path, E19
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30In this episode of Automox Insiders, host Maddie Regis sits down with Katie Bleichman, Director of CX Operations and Enablement at Automox. Katie shares her inspiring journey from two decades in elementary education to leading customer experience in the SaaS and cybersecurity world. Discover how skills from the classroom translate into IT, what it …
…
continue reading

1
The DPU Awakening: Silicon Muscle for AI Mayhem
22:12
22:12
Play later
Play later
Lists
Like
Liked
22:12This week on Pop Goes the Stack, we crack open the next frontier of enterprise infrastructure: DPUs (Data Processing Units). AI factories aren’t just stressing your network—they’re setting it on fire. With east-west traffic exploding and inference storms growing by the day, CPUs and legacy firewalls just can’t keep up. Enter the DPU: purpose-built …
…
continue reading

1
#232 John Pennell on Russia's Actions in Ukraine and Syria
50:14
50:14
Play later
Play later
Lists
Like
Liked
50:14The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Dr. John Pennell discusses his bo…
…
continue reading
It started with a slow roll of weird emails and phone calls. And then award-winning filmmaker Dan Sturman found himself in the crosshairs of serious hackers. With parallels to another case of mistaken identity and an assist from security expert Reuben Moretz, this week we explore bad social engineering. Learn more about your ad choices. Visit megap…
…
continue reading

1
Will the Real Velvet Sundown Please Stand Up?
1:10:28
1:10:28
Play later
Play later
Lists
Like
Liked
1:10:28The story of a hoax within a hoax within a hoax within an AI soft rock band. That and a bunch of other stories about technology. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy Hacked
…
continue reading

1
Ukraine Russia: Neither Side Can BACK DOWN! /Patrik Baab & Lt Col Daniel Davis
51:50
51:50
Play later
Play later
Lists
Like
Liked
51:50Ukraine Russia: Neither Side Can BACK DOWN! /Patrik Baab & Lt Col Daniel Davis See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
…
continue reading
By coachbp1975
…
continue reading
Apple’s released a gaggle of new hardware today. What’s on the release list? What do we make of the new models? Let’s dive in and figure it out. Hosts: Tom Bridge - @[email protected] Marcus Ransom - @marcusransom Selina Ali - LinkedIn Sponsors: Kandji 1Password Watchman Monitoring If you're interested in sponsoring the Mac Admins Podcast,…
…
continue reading

1
Hack Your Way to Achievement: One Small Step at a Time
42:50
42:50
Play later
Play later
Lists
Like
Liked
42:50Send us a text Ted Harrington shares insights about achieving difficult goals through disciplined habits rather than relying on fleeting inspiration. He explains how the hacker mindset—being curious, non-conforming, committed, and creative—can help anyone overcome challenges and find overlooked opportunities. • Breaking big goals into smaller, mana…
…
continue reading

1
U.S. Foreign Policy: Bad Under Biden, Worse with Trump /Lt Col Daniel Davis & Chas Freeman
1:00:18
1:00:18
Play later
Play later
Lists
Like
Liked
1:00:18U.S. Foreign Policy: Bad Under Biden, Worse with Trump /Lt Col Daniel Davis & Chas Freeman See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
…
continue reading

1
Trump Doesn't Want to End Ukraine Russia War
27:50
27:50
Play later
Play later
Lists
Like
Liked
27:50President Trump’s Ukraine envoy, Keith Kellogg, gave a major speech in Kyiv claiming Russia is losing the war in Ukraine. He argued that if Russia were truly winning, they would already control Kyiv, Odessa, and the Dnipro River. Instead, Russia is advancing only “meters, not miles,” while suffering catastrophic losses — Kellogg claimed over 1 mill…
…
continue reading

1
82. The Man Who Saved The World: Britain’s Best Ever Agent (Ep 3)
49:21
49:21
Play later
Play later
Lists
Like
Liked
49:21Oleg Gordievsky is now recruited as an agent for MI6 and he is providing intelligence of the highest order, but is there a chance he’ll be rumbled by the KGB? Who will keep him safe in London? And what does Oleg himself have to do to ensure his identity remains secret? Listen as David and Gordon continue their series on Oleg Gordievsky by looking a…
…
continue reading
By coachbp1975
…
continue reading

1
Kosher Tax - Unmasking the Antisemitic Conspiracy Theory
11:05
11:05
Play later
Play later
Lists
Like
Liked
11:05By coachbp1975
…
continue reading

1
TRUMP SLAMS RUSSIA & NATO / Lt Col Daniel Davis
45:21
45:21
Play later
Play later
Lists
Like
Liked
45:21Danny argues many countries (India, Hungary, Slovakia, etc.) have already said they won’t stop buying Russian oil because they lack viable, affordable alternatives; existing discounts and earlier tariffs haven’t changed that. Increasing tariffs or adding another 10–50% tariff is unlikely to alter their behavior and would instead inflict real econom…
…
continue reading

1
Mukden Incident - Japan's Manchurian Invasion Pretext
21:39
21:39
Play later
Play later
Lists
Like
Liked
21:39By coachbp1975
…
continue reading

1
TNO041: From Ansible to AI: Jeremy Schulman on the Evolution of Network Automation
1:12:38
1:12:38
Play later
Play later
Lists
Like
Liked
1:12:38Jeremy Schulman has been working at network automation for much of his professional life. On today’s Total Network Operations, host Scott Robohn talks with Jeremy about his ongoing quest to get the network engineering bottleneck out of production. They discuss the early days of network automation when engineers tried to adopt tools from compute sid…
…
continue reading
Wall Street Journal reporters Drew Hinshaw and Joe Parkinson talk about their new book “Swap” on the SpyTalk podcast. Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk on Twitter: https://twitter.com/talk_spy Subscribe to SpyTalk on Substack https://www.spytalk.…
…
continue reading

1
Unsecurity Episode 246: Practicing Policy
37:14
37:14
Play later
Play later
Lists
Like
Liked
37:14In this Friday edition of Unsecurity, Megan and Brad tackle Policy! They approach a topic commonly avoided with a consulting perspective, having real examples of policy benefits. Hear the full coversation, covering: - Standardizing programs, documentation, and access - The relationship between technology and policy development - Legal consideration…
…
continue reading

1
The Problem With Threat Modeling in Application Security: Too Slow, Too Theoretical, Not Agile | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 2 | A Musing On the Future of Cybersecurity ...
3:58
3:58
Play later
Play later
Lists
Like
Liked
3:58Threat modeling is often called the foundation of secure software design—anticipating attackers, uncovering flaws, and embedding resilience before a single line of code is written. But does it really work in practice? In this episode of AppSec Contradictions, Sean Martin explores why threat modeling so often fails to deliver: It’s treated as a one-…
…
continue reading

1
Copilot Studio Updates, Licensing Changes, and Local AI Testing with Jan – Practical 365 Podcast S04E43
34:04
34:04
Play later
Play later
Lists
Like
Liked
34:04Join Steve Goodman and Paul Robichaux as they unpack Microsoft’s latest Copilot Studio updates, including new licensing terminology, human-in-the-loop features, and real-time protection for AI agents. Plus, hear how Jan can help you test AI agents locally before deploying them in Microsoft 365, and get their take on Microsoft’s quiet reversal of it…
…
continue reading

1
Checklist 440 - Latest iPhones Target Serious Spyware
15:21
15:21
Play later
Play later
Lists
Like
Liked
15:21Longterm and short-term security work from Apple on this week’s Checklist. First, the company’s warning individuals in France of potential spyware attacks. We’ll look at what they’re looking for and advice for staying safe. Plus - the iPhones Apple announced this week are bringing a new memory safety feature. We'll familiarize ourselves with Memory…
…
continue reading

1
#Wavell Reviews A Risk Too Far: A Psychological Autopsy of the Planning for Arnhem by Gary Buck
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04You may have thought that another book on Arnhem was not necessary or that it could not possibly tell you anything you did not already know about this iconic battle from World War Two. However, Gary Buck's new book, A Risk Too Far, takes a new and novel approach to the subject that has you reappraising the commonly held views and your own long-held…
…
continue reading

1
FBI UPDATE: Charlie Kirk Shooting - Suspect in Custody
56:15
56:15
Play later
Play later
Lists
Like
Liked
56:15A suspect in the fatal shooting of conservative activist Charlie Kirk was identified Friday as Utah man Tyler Robinson, whose family identified him after law enforcement released surveillance footage of a suspected gunman as part of a dayslong manhunt. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.co…
…
continue reading

1
Russia State Sponsor of Terrorism? /Lt Col Daniel Davis & Patrick Henningsen
1:06:18
1:06:18
Play later
Play later
Lists
Like
Liked
1:06:18Sen Lindsey Graham claims that in 2025 Russia has invaded Ukraine and allegedly taken ~19,546 Ukrainian children to Russia; some teenagers are being trained to fight for Russia. Urgent moral call: make this practice unacceptable and take action to get the children returned. Notes a US push (Lindsey Graham mentioned) to add Russia to the U.S. list o…
…
continue reading

1
Nostradamus - Life, Prophecies, & Enduring Legacy
13:24
13:24
Play later
Play later
Lists
Like
Liked
13:24By coachbp1975
…
continue reading

1
CISO IT – Great Security Begins with Great IT, E11
13:44
13:44
Play later
Play later
Lists
Like
Liked
13:44In this episode, Jason Kikta discusses the critical relationship between IT and security, emphasizing that great security begins with a solid IT foundation. He explores the importance of establishing a baseline for normalcy, the role of user safety in preventing security breaches, and the need to understand insider threats. Jason concludes with dis…
…
continue reading

1
Episode 22 - Two Year Anniversary Special
1:42:49
1:42:49
Play later
Play later
Lists
Like
Liked
1:42:49The Howler Podcast is two years old! In this special episode, Chelsea and Mary are joined by some surprise co-hosts as well as pack members from around the globe as they celebrate Arctic Wolf's one-of-a-kind culture. Interested in running with the pack? Explore careers at Arctic Wolf—one of the fastest-growing and exciting cybersecurity companies i…
…
continue reading

1
Gentry Lane on cyber weapons, national defense, and the race for global cyber power
1:37:22
1:37:22
Play later
Play later
Lists
Like
Liked
1:37:22Cybersecurity strategist Gentry Lane joins The Watchers to unpack why cyber weapons should be treated as real weapons of war. She and Andy Sauer dive into the absence of a national cyber strategy, the vulnerabilities of America’s critical infrastructure, and the role of Europe in the global cyber power race. From the dangers of supply chain weaknes…
…
continue reading

1
Lifelong iPhone User Switches to Open Source OS (Secure?)
11:45
11:45
Play later
Play later
Lists
Like
Liked
11:45I put Graphene OS to the test by ditching my iPhone to see how easy it is to switch. If you value mobile privacy, here's what you need to know before you make a similar switch. Take the first step toward better online privacy with a free Proton account: https://www.proton.me/allthingssecured Learn more about Graphene OS: ▶ What's the difference bet…
…
continue reading

1
John Mearsheimer: Ukraine Army Indicators Tell a Very Grim Story
1:03:30
1:03:30
Play later
Play later
Lists
Like
Liked
1:03:30John Mearsheimer: Ukraine Army Indicators Tell a Very Grim Story See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
…
continue reading

1
Visual Studio 2026 with Mads Kristensen
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00Ready for the next version of Visual Studio? Carl and Richard talk to Mads Kristensen about the long-awaited version of Visual Studio. Needless to say, artificial intelligence sits front and center. Mads talks about the deep integration of AI across the development lifecycle, including code completion, debugging, even natural language querying. The…
…
continue reading