SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Security Operations Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Your Weekly Source for Linux GNews from the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
A Cyber Security Podcast, focussed on Threat Research and the interesting people behind it.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A podcast about all things energy, brought to you by the Australian Energy Market Operator.
…
continue reading
Sea Control is CIMSEC's Flagship podcast. We focus on maritime security, naval affairs, and defense and foreign policy.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
Entry & Exit is a podcast about building, scaling, and exiting security and fire businesses. Hosts Stephen Olmon and Collin Trimble share their journey growing Alarm Masters through acquisitions and organic growth, along with the lessons they’ve learned along the way. From recurring revenue strategies to sales, operations, and M&A, Entry & Exit gives business owners and entrepreneurs an inside look at what it takes to succeed in the security industry. Whether you’re starting your first compa ...
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
The Guardian Way is a weekly podcast from Guardian Protection Force that turns real-world security experience into practical guidance you can use today. Hosted by Garrett Thomas with co-host Terry MacAdam, each episode breaks down an operations-level topic like executive protection, protective intelligence, workplace violence prevention, campus security, remote guarding, and patrol program design. We focus on what works in the field, why it works, and how to implement it with clear steps, po ...
…
continue reading
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
…
continue reading
"Building the Base" - an in-depth series of conversations with top entrepreneurs, innovators, and leaders from tech, financial, industrial, and public sectors. Our special guests provide their unique perspectives on a broad selection of topics such as: shaping our future national security industrial base, the impact of disruptive technologies, how new startups can increasingly contribute to national security, and practical tips on leadership and personal development whether in government or ...
…
continue reading
Welcome to Ragnar365 Nuggets, Ragnar Heil's short news and personal insights about Microsoft 365 Intelligent Workplace. Focus Areas: Microsoft Teams, SharePoint, Outlook, OneDrive, Copilot, Microsoft Viva, Employee Experience, Governance, Compliance, Power Platform etc)
…
continue reading
Star Link emphasizes in providing corporate organizations with all types of biometric attendance system & access control system and all most all types of softwares to speed up HRs, Admin & Top Most Management with smooth an effective workflow.
…
continue reading
Commissionaires Nova Scotia proudly presents Purpose & Protection, a podcast dedicated to the people behind Canada’s security: veterans, their families, civilians and all those dedicated to keeping our communities safe. Each episode explores the lived experiences of those who’ve served, those who support them, and those shaping the future of Canada’s security landscape. From the frontlines to the home front, you’ll hear stories of resilience, leadership and purpose. As the largest private em ...
…
continue reading
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
…
continue reading
America’s military operations are constantly evolving. From boot camp to boots on the ground, anchor Ryan Robertson provides in-depth coverage of international armed conflicts and the latest technological developments in weaponry worldwide.
…
continue reading
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
4
Acquisitions Anonymous - #1 for business buying, selling and operating
Bill D'Alessandro, Mills Snell, Heather Endresen, and Michael Girdley
Jump into the world of business acquisitions with hosts Bill D'Alessandro, Mills Snell, Heather Endresen, and Michael Girdley. We review real businesses for sale in each episode, providing expert insights, strategies, and tips to make savvy business moves like the pros. Perfect for entrepreneurs, investors, and anyone interested in buying and selling businesses.
…
continue reading
If you wish to know what it's really like to make the life and death decisions portrayed in the movies by James Bond or on TV by Homeland's, Cary Matherson, then Black Spy Podcast is the show for you. If you're interested in the clandestine world of secret intelligence, espionage, counter-terrorism and national security, then this definitely your must listen Podcast! Every week, along with a different successful or famous guest who's always been interested in the secret services, ex officer, ...
…
continue reading
Master the CompTIA Server+ exam with the Server+ Audio Course—your complete audio companion for learning server hardware, administration, security, storage, and troubleshooting. Each episode breaks down the official exam objectives into clear, practical lessons designed for listening and learning on the go. You’ll gain a deep understanding of physical and virtual server environments, network integration, performance monitoring, and disaster recovery planning—all explained in simple, direct l ...
…
continue reading
The Bare Metal Cyber CCISO Audio Course is your complete, executive-level training companion for mastering the Certified Chief Information Security Officer (CCISO) certification. Built for experienced cybersecurity professionals and strategic leaders, this Audio Course delivers over seventy focused episodes covering every domain, concept, and competency area tested on the official EC-Council exam. From governance, risk, and compliance to strategic planning, vendor oversight, and technical co ...
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
…
continue reading
Want a peak behind the curtain into one of the best places to work in cybersecurity and the minds of the innovators behind the industry’s leading security operations platform? Tune in to The Howler podcast! Hosted by Chelsea Lowman, People Experience Specialist, and Mary Newville, People Experience Senior Manager, the culture duo connects with pack leaders on leadership insights, mental health and overall wellbeing, and how they lead their teams to advance our mission of ending cyber risk.
…
continue reading
Welcome to the War Studies podcast. We bring you world-leading research from the School of Security Studies at King’s College London, the largest community of scholars in the world dedicated to the study of all aspects of security, defence and international relations. We aim to explore the complex realm of conflict and uncover the challenges at the heart of navigating world affairs and diplomatic relations, because we believe the study of war is fundamental to understanding the world we live ...
…
continue reading
Midweek Sitrep with Jerry Fowler is your biweekly briefing on what’s happening in the world of national security—decoded for everyday listeners. From classified documents and sanctions to cyberattacks, foreign interference, and spycraft, Jerry breaks down the headlines, the history, and the hidden forces shaping global power today. Whether it’s a presidential executive order, a new war in a far-off region, or a tech ban making waves in Washington, Jerry gives you the background and context t ...
…
continue reading
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
The BUILDINGS Podcast presents the latest developments and practices in facility management from energy management, lowering operating costs, maintenance of commercial buildings, life and safety, sustainability, green issues, project management, security, building performance and much more. Find more facility management news at www.buildings.com Send any comments or questions to [email protected] Support this podcast: https://podcasters.spotify.com/pod/show/buildings-podcast/support
…
continue reading
In today’s competitive world, profitability isn’t just about higher sales or cutting costs — it’s about operational intelligence. When inefficiencies slowly erode productivity, technology becomes the most powerful lever of profit.By Biometric Attendance & Access Control Solution
…
continue reading
1
$4.2M Security Business… With $773K Revenue?!
27:54
27:54
Play later
Play later
Lists
Like
Liked
27:54In this episode the hosts critique a $4.28 million asking price for a Signal Security Franchise business in San Antonio earning ~$773K revenue—arguing it’s overpriced, under‑differentiated and risky. Business Listing – https://www.bizbuysell.com/business-opportunity/san-antonio-tx-highly-profitable-security-business-for-sale/2350661/ Welcome to Acq…
…
continue reading
1
Operation ForumTroll: Chrome Zero-Day Tied to Italian Spyware Developer Memento Labs
37:19
37:19
Play later
Play later
Lists
Like
Liked
37:19A newly uncovered cyber-espionage operation known as Operation ForumTroll has revealed the resurgence of commercial spyware in state-sponsored surveillance campaigns. According to new research from Kaspersky, the campaign exploited a Google Chrome zero-day vulnerability (CVE-2025-2783) and targeted Russian and Belarusian organizations in government…
…
continue reading
1
TNO046: Prisma AIRS: Securing the Multi-Cloud and AI Runtime (Sponsored)
27:22
27:22
Play later
Play later
Lists
Like
Liked
27:22Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsored episode with Palo Alto Networks, we dig into offerings such as CLARA (Cloud and AI Risk Assessment) that help ops teams gain more visibility into the structure and workflows of their multi-cloud net…
…
continue reading
1
🎙️ Episode 90 | GPSEC DFW: The Modern CISO, AI, and the OT Frontier
25:28
25:28
Play later
Play later
Lists
Like
Liked
25:28🎙️ Episode Summary Episode 90 of The Professional CISO Show kicks off the GPSEC DFW series, recorded live in Dallas. Host David Malicoat welcomes Andy Lux, Kendall Reese, and Patrick Gillespie for a dynamic discussion on risk leadership, AI governance, and OT security. Together, they explore how the role of the CISO is evolving — from managing cont…
…
continue reading
1
Lawfare Daily: The Trials of the Trump Administration, Nov. 7
1:41:04
1:41:04
Play later
Play later
Lists
Like
Liked
1:41:04In a live conversation on YouTube, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Senior Editors Anna Bower, Molly Roberts, Roger Parloff and Eric Columbus to discuss the criminal trial of the man who threw a sandwich at a federal immigration officer in D.C., a hearing in the prosecution of James Comey, litigation over the conditions…
…
continue reading
1
Venezuela - Trump's end of Empire War (Part 2)
1:03:28
1:03:28
Play later
Play later
Lists
Like
Liked
1:03:28Venezuela - Trump's end of Empire War (Part 2) The Black Spy Podcast 218, Season 22, Episode 0008 This week and next week host Carlton King asks if President Trump is planning an invasion of Venezuela, in whatever format, to effect 'regime change' there. Carlton goes through the options for this coming aggressive action. The likelihood of it taking…
…
continue reading
1
98. Putin’s Secret Army: The Rise Of Prigozhin (Ep 1)
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13From Putin’s chef to Putin’s butcher, this is the story of Prigozhin. A man on the brink of oligarchical power who flew a little too close to the sun… Listen as David and Gordon begin a new series on the ill-fated life of the head of the infamous Wagner Group, Yevgeny Prigozhin. ------------------- THE REST IS CLASSIFIED LIVE 2026: Buy your tickets…
…
continue reading
1
Lawfare Archive: Waxman and Ramsey on Delegating War Power
52:20
52:20
Play later
Play later
Lists
Like
Liked
52:20There is much debate among academics and policy experts over the power the Constitution affords to the president and Congress to initiate military conflicts. But as Michael Ramsey and Matthew Waxman, law professors at the University of San Diego and Columbia, respectively, point out in a recent law review article, this focus misses the mark. In fac…
…
continue reading
1
Michael DeBolt: From acting to cyber. [Intelligence] [Career Notes]
7:38
7:38
Play later
Play later
Lists
Like
Liked
7:38Please enjoy this encore of Career Notes. Chief intelligence officer at Intel 471, Michael shares his story where he started as an actor and quickly changed over to intelligence and what the transition was like for him. Michael grew up wanting to be an actor and even was able to land some acting jobs, after going into the Marine Corps he decided to…
…
continue reading
1
Lawfare Archive: The Dangers of Deploying the Military on U.S. Soil
1:33:52
1:33:52
Play later
Play later
Lists
Like
Liked
1:33:52From November 6, 2024: For today’s special episode, Lawfare General Counsel and Senior Editor Scott R. Anderson held a series of conversations with contributors to a special series of articles on “The Dangers of Deploying the Military on U.S. Soil” that Lawfare recently published on its website, in coordination with our friends at Protect Democracy…
…
continue reading
1
A fine pearl gone rusty. [Research Saturday]
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59Tal Peleg, Senior Product Manager, and Coby Abrams, Cyber Security Researcher of Varonis, discussing their work and findings on Rusty Pearl - Remote Code Execution in Postgres Instances. The flaw could allow attackers to execute arbitrary commands on a database server’s operating system, leading to potential data theft, destruction, or lateral move…
…
continue reading
1
What’s the Covert Action Plan for Venezuela?
48:15
48:15
Play later
Play later
Lists
Like
Liked
48:15Veteran war reporter and Latin America expert Doug Farah throws cold water on Trump’s campaign against Nicholas Maduro. Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Karen Greenberg on Twitter https://x.com/KarenGreenberg3 Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk on Twitter: https://twitter.…
…
continue reading
The CBO was hacked by a suspected foreign actor. Experts worry Trump’s budget cuts weaken U.S. cyber defenses. Regulation shapes expectations. ClickFix evolves on macOS. Notorious cybercrime groups form a new “federated alliance.” Congressional leaders look to counter China’s influence in 6G networks. An EdTech firm pays $5.1 million to settle data…
…
continue reading
1
328: This MONTH in Linux with Linux 6.17, End of Windows 10, KDE Plasma 6.5, GNOME 49, COSMIC Beta, Fedora 43, Ubuntu 25.10, & more Linux news
35:18
35:18
Play later
Play later
Lists
Like
Liked
35:18video: https://youtu.be/9sSoZ89qwpU Download as MP3 Support the Show Become a Patron = tuxdigital.com/membership Store = tuxdigital.com/store Chapters: 00:00 Intro 01:42 Linux 6.17 Released 04:28 The End of Windows 10 Has Arrived 09:23 KDE Plasma 6.5 Released 11:39 GNOME 49 Released 15:30 Sandfly Security, agentless Linux security 17:40 Fedora Linu…
…
continue reading
1
TNO049: Automated Network Testing and Validation
52:50
52:50
Play later
Play later
Lists
Like
Liked
52:50What does network testing and validation really mean? How do testing and validation fit within an automation workflow? Is it possible to run meaningful tests without coding skills? Dan Wade from BlueAlly answers these questions and offers practical insights into building trust in automation through test environments, using AI for ideation and probl…
…
continue reading
1
Sea Control 589: Non-state Special Operations
43:00
43:00
Play later
Play later
Lists
Like
Liked
43:00Dr. Craig Whiteside is Professor of National Security Affairs at the US Naval War College resident program at the Naval Postgraduate School, Monterey, California. He is a research fellow at George Washington University’s Program on Extremism and the International Centre for Counterterrorism-The Hague. Whiteside’s current work focuses on the leaders…
…
continue reading
1
$4.4 M Diabetes Patch Brand: Hidden Gem or Hidden Trap?
46:35
46:35
Play later
Play later
Lists
Like
Liked
46:35In this episode of Acquisitions Anonymous, the hosts dig into a $4.4 M e‑commerce business in the diabetes sensor accessory space and debate whether its 41% net margin, Australian base, and licensing opportunity make it a smart buy—or a risky startup in disguise. Business Listing – https://websiteproperties.com/websites/13755-sticking-with-success-…
…
continue reading
1
Lawfare Daily: Supreme Court Oral Arguments on President Trump’s Tariffs
1:02:24
1:02:24
Play later
Play later
Lists
Like
Liked
1:02:24In a live conversation on November 5, Lawfare Senior Editor Scott R. Anderson sat down with Lawfare Contributing Editor Peter Harrell and Georgetown Law Professors Marty Lederman and Kathleen Claussen to discuss what occurred during oral arguments in the legal challenge to President Trump’s tariffs at the Supreme Court and how the justices may rule…
…
continue reading
1
Checklist 448 - OS Updates and App Store Accountability
15:43
15:43
Play later
Play later
Lists
Like
Liked
15:43We're looking at a child safety feature and the over 400 security fixes in this week's 26.1 OS updates from Apple. Plus - Texas is exerting control over smartphone parental controls. We'll talk about Apple and the Texas App Store Accountability Act on this edition of The Checklist, brought to you by SecureMac. Check out our show notes: SecureMac.co…
…
continue reading
1
Automox Insiders – Next-Level Automation: A Conversation with Automox's Cybersecurity Experts, E09
19:19
19:19
Play later
Play later
Lists
Like
Liked
19:19In this episode of IT Insiders, Maddie Regis speaks with Ryan Braunstein and Mat Lee from Automox's security team about the evolution of automation in security operations. They discuss their career backgrounds, the day-to-day use of Automox for security tasks, and the innovative strategies they employ to enhance automation. The conversation also co…
…
continue reading
1
The role of AI in Zero Trust. [CyberWire-X]
23:25
23:25
Play later
Play later
Lists
Like
Liked
23:25Zero Trust has been top of mind for years, but how is AI changing what that actually looks like in practice? In this episode of CyberWire-X, Dave Bittner is joined by Deepen Desai, Chief Security Officer at Zscaler, to discuss the transformative impact of AI on Zero Trust security frameworks. The discussion outlines how AI enhances threat preventio…
…
continue reading
Cisco patches critical vulnerabilities in its Unified Contact Center Express (UCCX) software. CISA lays off 54 employees despite a federal court order halting workforce reductions. Gootloader malware returns. A South Korean telecom is accused of concealing a major malware breach. Russia’s Sandworm launches multiple wiper attacks against Ukraine. Ch…
…
continue reading
1
Lawfare Daily: Seeking Meaning at the Soviet Collapse, with Joseph Kellner
37:57
37:57
Play later
Play later
Lists
Like
Liked
37:57On today’s episode, Lawfare Managing Editor Tyler McBrien sits down with Joseph Kellner, an assistant professor of history at the University of Georgia to discuss his latest book, “The Spirit of Socialism: Culture and Belief at the Soviet Collapse,” which examines the millions of Soviet people who embarked on a “spirited and highly visible search f…
…
continue reading
Operation “Chargeback” takes down global fraud networks. An investigation reveals the dangers of ADINT. M&S profits plunge after a cyberattack. Google patches a critical Android flaw. Asian prosecutors seize millions from an accused Cambodian scam kingpin. Ohio residents are still guessing water bills months after a cyberattack. Houston firefighter…
…
continue reading
1
Rational Security: The “Wea Culpa” Edition
1:14:26
1:14:26
Play later
Play later
Lists
Like
Liked
1:14:26This week, Scott sat down with co-hosts emeritus Benjamin Wittes and Alan Rozenshtein, and Senior Editor Kate Klonick, to talk through the week’s big national security news stories, including: “Cracks in the Foundation.” The conservative Heritage Foundation—and the broader conservative movement it plays a central role in—has been going through a ve…
…
continue reading
1
AV & SNC teaming up to tackle Golden Dome initiative
25:33
25:33
Play later
Play later
Lists
Like
Liked
25:33This week on Weapons & Warfare host Ryan Robertson takes a look at the innovative agreement between AeroVironment (AV) and Sierra Nevada Corporation (SNC), exploring their possible role in the Golden Dome initiative. Robertson examines the potential of their partnership on national security and how it could help shape the future of national defense…
…
continue reading
1
How To Make Your Business Run Without You
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50Hosts Stephen Olmon and Collin Trimble unpack how technology builds sellable, scalable security & life-safety companies. They reveal how connected systems—CRM, billing, and field service—create a “Customer 360” that boosts customer experience, drives predictable revenue, and reduces key-person risk. If you want to exit someday (or just stop living …
…
continue reading
1
Lawfare Daily: The Looming Fall of Pokrovsk
42:45
42:45
Play later
Play later
Lists
Like
Liked
42:45In this episode, Lawfare’s Ukraine Fellow Anastasiia Lapatina sits down with Francis Farrell, a front line reporter at the Kyiv Independent, to discuss the looming fall of Pokrovsk, the recent transformations of the front line, and whether Ukraine can ever give up Donbas, per Russia’s demand. To receive ad-free podcasts, become a Lawfare Material S…
…
continue reading
1
Honour, Country, Sacrifice: Capturing the Faces of Service with Trevor Godinho
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17Acclaimed Toronto-based editorial photographer Trevor Godinho joins host Barry Pitcher, CEO of Commissionaires Nova Scotia, to discuss his powerful portrait series, Honour Country Sacrifice. This moving project captures the stories and faces of Canadian Armed Forces members, past and present, highlighting the diversity and humanity behind the unifo…
…
continue reading
1
97. Selling The World's Secrets: Why The Brits Won The Falklands War (Ep 2)
51:27
51:27
Play later
Play later
Lists
Like
Liked
51:27THE REST IS CLASSIFIED LIVE 2026: Buy your tickets HERE on Friday 7th November at 12pm GMT. In the latter half of the twentieth century, the CIA and its German counterpart, the BND, were listening to the encrypted messages of at least 62 countries around the world. This intelligence was then passed to allies and used to win wars, depose leaders and…
…
continue reading
1
Automate IT – Gratitude, Growth, and the People Who Shape Your Career, E20
15:49
15:49
Play later
Play later
Lists
Like
Liked
15:49In this reflective episode of Automate IT, Jeremy Maldonado shares how gratitude has shaped his 11-year journey in IT, from his early days in customer service to building technical expertise and community. He explores the importance of mentorship, asking for help, and showing appreciation in both work and home life. As the year winds down, Jeremy i…
…
continue reading
China-Linked hackers target Cisco firewalls. MIT Sloan withdraws controversial “AI-Driven Ransomware” paper. A new study questions the value of cybersecurity training. Hackers exploit OpenAI’s API as a malware command channel. Apple patches over 100 Security flaws across devices. A Florida-based operator of mental health and addiction treatment cen…
…
continue reading
1
LLM-as-a-Judge: Bias, Preference Leakage, and Reliability
22:11
22:11
Play later
Play later
Lists
Like
Liked
22:11Here's the newest bright idea in AI: don’t pay humans to evaluate model outputs, let another model do it. This is the “LLM-as-a-judge” craze. Models not just spitting answers but grading them too, like a student slipping themselves the answer key. It sounds efficient, until you realize you’ve built the academic equivalent of letting someone’s cousi…
…
continue reading
1
Lawfare Daily: How Social Media Threatens Democracy, with Rick Pildes
55:17
55:17
Play later
Play later
Lists
Like
Liked
55:17On today’s episode, Lawfare Senior Editor Kate Klonick sits down with NYU law professor Rick Pildes to discuss his article, “Political Fragmentation in Democracies in the West,” which was featured in a New York Times opinion column by Thomas Edsall on the link between smartphone and social media use and threats to democracy. The two discuss the adm…
…
continue reading
1
Episode 223: Jackals of Trust: A Short History of Cybercrime
47:31
47:31
Play later
Play later
Lists
Like
Liked
47:31Cybercrime expert Gary Warner joins to discuss Nigerian confraternities, the "campus cults" rooted in idealism that morphed into a multi-billion dollar transnational organized crime network. Learn about the "money blessing," the coded language and insider access, and the elite thug playbook for exploiting trust. Learn more about your ad choices. Vi…
…
continue reading
1
Privacy needs where you least expect it. [CISO Perspectives]
36:08
36:08
Play later
Play later
Lists
Like
Liked
36:08When discussing privacy risks, many often look to implementing strong encryption, secure data storage practices, and data sanitization processes to help ensure sensitive information remains protected. Though these practices are good and should be prioritized, many often miss other key areas that need just as much focus. As the internet of things ha…
…
continue reading
1
Ghost Fleet at 10: Fiction as a Strategic Tool with author August Cole
35:49
35:49
Play later
Play later
Lists
Like
Liked
35:49In this episode of Building the Base, Hondo Geurts and Lauren Bedula sit down with August Cole, strategist, author, and futurist who has spent his career exploring fiction's role in national security strategy. Drawing from his journey from Wall Street Journal journalist covering defense and technology to co-authoring the groundbreaking novel Ghost …
…
continue reading
1
Episode 435: Platform SSO (Okta's Version)
1:08:50
1:08:50
Play later
Play later
Lists
Like
Liked
1:08:50Apple announced Platform Single Sign-on at the setup assistant in macOS 26, and it's been a race for Identity Providers and Device Management Services to wrap their heads around the changes and implement it. Okta recently released their implementation and we are joined by Arki and Dan to talk about what this changes, what was involved in getting it…
…
continue reading
The FCC plans to roll back cybersecurity mandates that followed Salt Typhoon. The alleged cybercriminal MrICQ has been extradited to the U.S. Ransomware negotiators are accused of conducting ransomware attacks. Ernst & Young accidentally exposed a 4-terabyte SQL Server backup. A hacker claims responsibility for last week’s University of Pennsylvani…
…
continue reading
Reevaluating your parking strategy could be the strategic growth lever your property needs. It’s a valuable amenity that can increase your cash flow if you leverage it correctly.By Endeavor Business Media
…
continue reading
1
How to Manage Manipulative and Disruptive Behavior at Work and in Public Spaces
26:55
26:55
Play later
Play later
Lists
Like
Liked
26:55Have you ever felt manipulated into doubting yourself and your abilities, even though your track record shows that you’re doing well? You might have encountered a gaslighter, says Michael Gips, CPP. These individuals’ manipulative shenanigans can be costly to personnel and productivity unless managers intervene promptly. Also in this episode, disru…
…
continue reading
1
From Nixon to Bush: Why U.S. Foreign Policy Fails at Coordination
48:59
48:59
Play later
Play later
Lists
Like
Liked
48:59Text the ATB Team! We'd love to hear from you! In this episode of the At the Boundary podcast, GNSI’s Senior Director, Jim Cardoso, interviewed Fabio van Loon about his latest publication on the topic of the pitfalls and challenges of U.S. foreign policy, specifically with interagency coordination. Fabio explained his paper’s focus on three differe…
…
continue reading
1
Farewell Last Exchange Server, Copilot Memory Rolls Out, and Agentic AI Improvements – Practical 365 Podcast S04E44
45:34
45:34
Play later
Play later
Lists
Like
Liked
45:34In this episode of the Practical 365 Podcast, Steve Goodman and Paul Robichaux discuss major Exchange updates – including the fallout from a recent AWS outage, Microsoft’s new tools to finally remove your last on-premises Exchange server, the final patches for Exchange 2016/2019, and a new auto-archiving feature for Exchange Online. They also dive …
…
continue reading
1
Private Security vs Law Enforcement in Active Shooter Situations
3:31
3:31
Play later
Play later
Lists
Like
Liked
3:31When seconds matter, knowing how private security integrates with law enforcement can save lives. We compare roles, responsibilities, comms, and command during active shooter incidents, then outline training, pre-incident planning, and post-incident recovery actions organizations should implement now.…
…
continue reading
1
From GSSAP to RG-XX, Space Force Bringing “Solution Diversity” to Space Domain Awareness
46:23
46:23
Play later
Play later
Lists
Like
Liked
46:23To better understand the space operational environment, the United States Space Force has traditionally relied on military-operated constellations like the Space Based Space Surveillance system (SBSS) and the Geosynchrnous Space Situational Awareness Program (GSSAP), both of which provide space situational awareness (SSA) data that simply identifie…
…
continue reading
1
Lawfare Daily: The Trials of the Trump Administration, Oct. 31
1:42:15
1:42:15
Play later
Play later
Lists
Like
Liked
1:42:15In a live conversation on YouTube, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Contributor Marty Lederman, Public Service Fellow Loren Voss, and Senior Editors Scott R. Anderson, Roger Parloff and Eric Columbus to discuss the Supreme Court’s handling of the legal challenge to the federalization of the National Guard in Chicago, Ja…
…
continue reading