Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Sentinel Blue Podcasts

show episodes
 
Artwork

1
The Watchers

Sentinel Blue

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
  continue reading
 
Artwork
 
Covering everything about science and technology -- from the outer reaches of space to the tiniest microbes in our bodies -- Science Friday is your source for entertaining and educational stories and activities. Each week, host Ira Flatow interviews scientists and inventors like Sylvia Earle, Elon Musk, Neil deGrasse Tyson, and more.
  continue reading
 
Loading …
show series
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the Security Maturity Model, focusing on identity security. They explore the current state of security practices, identifying areas where organizations may be behind the curve, on track, or ahead of the curve in their security measures. Key topics include the importan…
  continue reading
 
Rising unfinished above Bangkok’s skyline, the Sathorn Unique Tower stands as one of the city’s most unsettling landmarks. Once envisioned as a symbol of luxury and modern prosperity, the project came to an abrupt halt during the Asian financial crisis, leaving behind a hollow concrete giant frozen in time. See Privacy Policy at https://art19.com/p…
  continue reading
 
While waiting for his next target, Winters (aka the Smoker) reflects on the deeds during his long career as a spaceship hopping bounty hunter, smuggler and ne'er-do-well. Be sure to check out Orbital Blue - The Wanderer by Soul Muppet Publishing. CONTENT WARNING: Smoking, gun violence, human trafficking. Music: tunereel.com Ko-fi.com/yourstory…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in cybersecurity, including Microsoft's overhaul of its bug bounty program, CISA's hiring strategy amidst workforce challenges, the US's shift towards a more aggressive cyber strategy, and insights from the updated OWASP Top 10 vulnerabilities. The…
  continue reading
 
After more than two decades in uniform and public service, Don Yeske left his leadership post at the Department of Homeland Security over concerns that the moral core of government was being compromised. In this powerful conversation, he and Andy discuss the meaning of duty, the rule of law, the trauma within today’s federal workforce, and the less…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the growing cybersecurity threat posed by the Chinese state-sponsored group, Salt Typhoon. They discuss the group's tactics, motivations, and the implications for global security. The conversation highlights China's strategic focus on economic power as a means of n…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss vulnerabilities in popular chat applications, particularly focusing on Line and WhatsApp. They explore the implications of these vulnerabilities for user privacy and security, emphasizing the importance of API security and rate limiting. The conversation then shifts t…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the major announcements from Microsoft Ignite, focusing on the introduction of Security Copilot for Microsoft 365 E5 customers, innovations in identity management through Entra, and the integration of Defender for Cloud with GitHub. They also explore the new capabilit…
  continue reading
 
Season 3 PREMIERE! Hunter Hartl is admitted to Brackroot Academy, a boarding school for would-be mages , where four years of study—and a growing rivalry—lead him to confront the eldritch forces reshaping his soul. Check out Tangled Blessings by Cassi Mothwin. This episode features the vocal talents of: Kris CarrKaren Michelle John Pearson Emily Val…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Adam Brewer and Andy discuss critical issues surrounding satellite security, particularly the vulnerabilities of unencrypted communications. They explore a recent study revealing how researchers intercepted sensitive data from various satellite communications, highlighting the need for enc…
  continue reading
 
In the quiet Gloucestershire village of Wotton-under-Edge stands a place whispered about in hushed tones, a structure so old its foundations predate written memory. The Ancient Ram Inn has been called a portal of shadows, a site of sacrifice, and one of the most haunted buildings in England. See Privacy Policy at https://art19.com/privacy and Calif…
  continue reading
 
Retired Navy officer and cybersecurity leader Bill Cameron joins Andy Sauer to discuss the evolving landscape of cyber conflict. From flying helicopters in the Cold War to advising U.S. presidents, Bill shares lessons in leadership, resilience, and mission focus. He explains why partner nations’ vulnerable networks matter to U.S. security, how adve…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the intricate relationship between privacy and security, particularly focusing on biometric data and the transition to passwordless technology. They discuss the security implications of various biometric methods, the privacy risks associated with popular web browse…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss Microsoft's Digital Defense Report for 2025. The conversation delves into the critical issues surrounding identity attacks, particularly focusing on the vulnerabilities associated with weak passwords. Andy highlights the prevalence of password spraying in i…
  continue reading
 
In the heart of Beijing lies a palace complex so vast and mysterious that it was once known simply as the Forbidden City. For nearly five centuries, its crimson walls and golden rooftops concealed the lives of emperors, concubines, and eunuchs, hidden from the eyes of ordinary people. See Privacy Policy at https://art19.com/privacy and California P…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss significant recent cybersecurity events, including the F5 breach attributed to state-backed actors, the implications of Windows 10 reaching end of life, and the risks associated with outdated mobile operating systems. They also explore the geopolitical cont…
  continue reading
 
Jennifer Ewbank, former Deputy Director of the CIA for Digital Innovation, joins The Watchers to discuss the intersection of espionage and emerging technology. From her decades in the field to leading the Agency’s digital transformation, she shares insights on the race with China in AI, the challenges of intelligence in a sensor-rich world, and the…
  continue reading
 
Summary In this episode, Andy Jaw and Adam Brewer discuss the latest updates in Microsoft Sentinel, focusing on the new features such as the Sentinel Data Lake, Sentinel Graph, and the MCP server. They explore how these innovations enhance security operations, improve data management, and leverage AI for better threat detection and response. The co…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss various topics related to cybersecurity, including the security implications of WhatsApp, the challenges of age verification laws, the recent TransUnion data breach, and the significant cyber attack on Jaguar Land Rover. They emphasize the importance of str…
  continue reading
 
Jack Rhysider, creator of Darknet Diaries, joins The Watchers to talk privacy, hacking culture, and the evolving threats shaping our digital lives. From disguises at DEFCON to exploring hacker origins in video games, Jack shares insights on why breaches are inevitable, how underground communities evolve, and where optimism fits in the face of AI, n…
  continue reading
 
In this episode of The Watchers, Andy Sauer sits down with cybersecurity leader Tatyana Bolton. From her unexpected start in acting to shaping national policy at CISA, Google, and beyond, Tatyana shares her perspective on why U.S. cyber defenses must keep pace with adversaries moving at the “speed of relevance.” They discuss policy gridlock, supply…
  continue reading
 
In the quiet village of Luková in the Czech Republic, St. George’s Church stands abandoned, its crumbling walls filled with an eerie presence. Once a place of worship, the church was left in ruins after part of its roof collapsed during a funeral. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/pri…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the topic of Kerberosting, a known attack method that exploits weaknesses in the Kerberos authentication protocol, particularly focusing on the vulnerabilities associated with RC4 encryption. They discuss a recent letter from Senator Ron Wyden addressing…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam celebrate their five-year anniversary with guest Amren Gill, a data security solutions engineer at Microsoft. They delve into the complexities of data protection, focusing on Microsoft Purview's capabilities, including data classification, data loss prevention (DLP), and adva…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the latest developments in Microsoft security technologies, particularly focusing on Entra and its features like Continuous Access Evaluation (CAE) and the integration of threat intelligence into the Global Secure Access (GSA) platform. They reflect on thei…
  continue reading
 
Cybersecurity strategist Gentry Lane joins The Watchers to unpack why cyber weapons should be treated as real weapons of war. She and Andy Sauer dive into the absence of a national cyber strategy, the vulnerabilities of America’s critical infrastructure, and the role of Europe in the global cyber power race. From the dangers of supply chain weaknes…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the concept of FUD (Fear, Uncertainty, and Doubt) prevalent in the cybersecurity industry. They discuss the implications of sensationalized reporting, particularly around Windows Hello for Business vulnerabilities and the importance of adopting fish resistant multi…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the complexities of Microsoft licensing, focusing on device-based versus user-based licensing, the nuances of shared mailboxes, and the implications of mixing E3 and E5 licenses. They also explore Azure billing models and the costs associated with Securi…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play