The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
Sentinel Blue Podcasts
An audio version of our weekly Sunday messages.
…
continue reading
Tales of our world's most unusual events, odd objects, and obscurities.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
A narrative-play podcast where I tell you the story that came to be from playing a Solo Table Top Role Playing Game.
…
continue reading
Covering everything about science and technology -- from the outer reaches of space to the tiniest microbes in our bodies -- Science Friday is your source for entertaining and educational stories and activities. Each week, host Ira Flatow interviews scientists and inventors like Sylvia Earle, Elon Musk, Neil deGrasse Tyson, and more.
…
continue reading
1
21 Dec 2025 | Keeping Watch: Shepherd Sentinels
20:54
20:54
Play later
Play later
Lists
Like
Liked
20:54The night Jesus was born, some shepherds were playing a role that would have been familiar to anyone shaped by the Hebrew Scriptures—the role of the watchmen. We talk about […]
…
continue reading
1
Introducing the BSP Maturity Model for Identity
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the Security Maturity Model, focusing on identity security. They explore the current state of security practices, identifying areas where organizations may be behind the curve, on track, or ahead of the curve in their security measures. Key topics include the importan…
…
continue reading
1
The Ghost Tower of Bangkok: Inside Sathorn Unique
11:02
11:02
Play later
Play later
Lists
Like
Liked
11:02Rising unfinished above Bangkok’s skyline, the Sathorn Unique Tower stands as one of the city’s most unsettling landmarks. Once envisioned as a symbol of luxury and modern prosperity, the project came to an abrupt halt during the Asian financial crisis, leaving behind a hollow concrete giant frozen in time. See Privacy Policy at https://art19.com/p…
…
continue reading
While waiting for his next target, Winters (aka the Smoker) reflects on the deeds during his long career as a spaceship hopping bounty hunter, smuggler and ne'er-do-well. Be sure to check out Orbital Blue - The Wanderer by Soul Muppet Publishing. CONTENT WARNING: Smoking, gun violence, human trafficking. Music: tunereel.com Ko-fi.com/yourstory…
…
continue reading
1
Microsoft Bug Bounty, CISA hiring surge, US goes offensive in cyber ops, OWASP Top 10
42:22
42:22
Play later
Play later
Lists
Like
Liked
42:22Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in cybersecurity, including Microsoft's overhaul of its bug bounty program, CISA's hiring strategy amidst workforce challenges, the US's shift towards a more aggressive cyber strategy, and insights from the updated OWASP Top 10 vulnerabilities. The…
…
continue reading
1
14 Dec 2025 | Keeping Watch: Watchmen Find Joy in the Waiting
21:33
21:33
Play later
Play later
Lists
Like
Liked
21:33From Board Member Lisa Ruby: Pivoting away from quiet anticipation to rejoicing and elation as we light the candle of joy. Learn more about Blue Ocean Church at a2blue.org. You can […]
…
continue reading
1
Don Yeske on Public Service, Courage, and the Changing Face of Government
1:40:50
1:40:50
Play later
Play later
Lists
Like
Liked
1:40:50After more than two decades in uniform and public service, Don Yeske left his leadership post at the Department of Homeland Security over concerns that the moral core of government was being compromised. In this powerful conversation, he and Andy discuss the meaning of duty, the rule of law, the trauma within today’s federal workforce, and the less…
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the growing cybersecurity threat posed by the Chinese state-sponsored group, Salt Typhoon. They discuss the group's tactics, motivations, and the implications for global security. The conversation highlights China's strategic focus on economic power as a means of n…
…
continue reading
1
07 Dec 2025 | Keeping Watch: Watchmen Warn the City
21:18
21:18
Play later
Play later
Lists
Like
Liked
21:18In the second week of Advent, as we continue our series on the legacy of the watchmen, we are invited to consider the story of Ezekiel the Prophet. Ezekiel was […]
…
continue reading
Hunter Hartl's last two years at Brackroot Academy get (somehow) even darker and deadlier. Check out Tangled Blessings by Cassi Mothwin. This episode features the vocal talents of: Kris CarrAllison Hill Karen Michelle Erin Mills Elise Soeder Emily Valdes Check out Speak Friend Studio! music: tunereel.com…
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss vulnerabilities in popular chat applications, particularly focusing on Line and WhatsApp. They explore the implications of these vulnerabilities for user privacy and security, emphasizing the importance of API security and rate limiting. The conversation then shifts t…
…
continue reading
There are abandoned places, and then there is Bhangarh. Once a thriving kingdom, now an empty maze of temples, palaces, and stone walls that no one dares approach after dark. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.…
…
continue reading
1
30 Nov 2025 | Keeping Watch: Watchmen Wait in the Night
21:11
21:11
Play later
Play later
Lists
Like
Liked
21:11It’s the first week of Advent, the season when we wait in the darkness with hope that God’s presence will break through. We talk about how the watchmen of Scripture provide a […]
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the major announcements from Microsoft Ignite, focusing on the introduction of Security Copilot for Microsoft 365 E5 customers, innovations in identity management through Entra, and the integration of Defender for Cloud with GitHub. They also explore the new capabilit…
…
continue reading
Using a story from the Gospel of Luke, we offer a few thoughts on gratitude this Thanksgiving week. Learn more about Blue Ocean Church at a2blue.org. You can find recordings of past […]
…
continue reading
Season 3 PREMIERE! Hunter Hartl is admitted to Brackroot Academy, a boarding school for would-be mages , where four years of study—and a growing rivalry—lead him to confront the eldritch forces reshaping his soul. Check out Tangled Blessings by Cassi Mothwin. This episode features the vocal talents of: Kris CarrKaren Michelle John Pearson Emily Val…
…
continue reading
1
Unencrypted Satellite Data, China AI Cyberattack
36:56
36:56
Play later
Play later
Lists
Like
Liked
36:56Summary In this episode of the Blue Security Podcast, hosts Adam Brewer and Andy discuss critical issues surrounding satellite security, particularly the vulnerabilities of unencrypted communications. They explore a recent study revealing how researchers intercepted sensitive data from various satellite communications, highlighting the need for enc…
…
continue reading
1
16 Nov 2025 | Sermon on the Mount: Which Story to Trust?
24:04
24:04
Play later
Play later
Lists
Like
Liked
24:04Today we reach the edge of the Sermon on the Mount, where Jesus brings everything to a choice. There are different ways to live. Which story will we trust? Which foundation […]
…
continue reading
In the quiet Gloucestershire village of Wotton-under-Edge stands a place whispered about in hushed tones, a structure so old its foundations predate written memory. The Ancient Ram Inn has been called a portal of shadows, a site of sacrifice, and one of the most haunted buildings in England. See Privacy Policy at https://art19.com/privacy and Calif…
…
continue reading
1
Bill Cameron on partner nation cybersecurity, and cyberspace escalation
1:33:25
1:33:25
Play later
Play later
Lists
Like
Liked
1:33:25Retired Navy officer and cybersecurity leader Bill Cameron joins Andy Sauer to discuss the evolving landscape of cyber conflict. From flying helicopters in the Cold War to advising U.S. presidents, Bill shares lessons in leadership, resilience, and mission focus. He explains why partner nations’ vulnerable networks matter to U.S. security, how adve…
…
continue reading
1
How Face ID Works, Least Private Browser, Ring and Flock
48:24
48:24
Play later
Play later
Lists
Like
Liked
48:24Summary In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the intricate relationship between privacy and security, particularly focusing on biometric data and the transition to passwordless technology. They discuss the security implications of various biometric methods, the privacy risks associated with popular web browse…
…
continue reading
1
09 Nov 2025 | Sermon On the Mount: Judge Not
27:51
27:51
Play later
Play later
Lists
Like
Liked
27:51In the Sermon on the Mount, Jesus tells us not to judge one another and not to get caught up worrying about other people’s issues when we have plenty of […]
…
continue reading
Season 3 promises to take you on adventures through the deep dark corners of eldritch horror, to the gritty jobs of space cowboys, to surreal futures and beyond!
…
continue reading
1
Microsoft Digital Defense Report 2025
1:04:15
1:04:15
Play later
Play later
Lists
Like
Liked
1:04:15Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss Microsoft's Digital Defense Report for 2025. The conversation delves into the critical issues surrounding identity attacks, particularly focusing on the vulnerabilities associated with weak passwords. Andy highlights the prevalence of password spraying in i…
…
continue reading
1
02 Nov 2025 | Sermon On the Mount: Don’t Worry ’Bout a Thing
28:33
28:33
Play later
Play later
Lists
Like
Liked
28:33We continue in our series on the Sermon on the Mount and then have a little chat about the church in lieu of our normal membership series. Learn more about […]
…
continue reading
1
Secrets Behind the Red Walls: The Forbidden City
7:58
7:58
Play later
Play later
Lists
Like
Liked
7:58In the heart of Beijing lies a palace complex so vast and mysterious that it was once known simply as the Forbidden City. For nearly five centuries, its crimson walls and golden rooftops concealed the lives of emperors, concubines, and eunuchs, hidden from the eyes of ordinary people. See Privacy Policy at https://art19.com/privacy and California P…
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss significant recent cybersecurity events, including the F5 breach attributed to state-backed actors, the implications of Windows 10 reaching end of life, and the risks associated with outdated mobile operating systems. They also explore the geopolitical cont…
…
continue reading
1
26 Oct 2025 | Sermon on the Mount: The Lord’s Prayer
23:05
23:05
Play later
Play later
Lists
Like
Liked
23:05This week we take a closer look at The Lord’s Prayer to help us better understand this prayer we say together each week and how it shapes our hearts. Learn […]
…
continue reading
1
Jennifer Ewbank on the CIA, Innovation in AI, and the Race with China
1:08:35
1:08:35
Play later
Play later
Lists
Like
Liked
1:08:35Jennifer Ewbank, former Deputy Director of the CIA for Digital Innovation, joins The Watchers to discuss the intersection of espionage and emerging technology. From her decades in the field to leading the Agency’s digital transformation, she shares insights on the race with China in AI, the challenges of intelligence in a sensor-rich world, and the…
…
continue reading
Summary In this episode, Andy Jaw and Adam Brewer discuss the latest updates in Microsoft Sentinel, focusing on the new features such as the Sentinel Data Lake, Sentinel Graph, and the MCP server. They explore how these innovations enhance security operations, improve data management, and leverage AI for better threat detection and response. The co…
…
continue reading
1
19 Oct 2025 | Sermon On the Mount: Spiritual Practices
24:20
24:20
Play later
Play later
Lists
Like
Liked
24:20The part of the SOTM we’re talking about today is about rivalry-reducing practices. These are spiritual practices that can help shape us to have the kind of character that helps us […]
…
continue reading
1
The Castle on the Hill: Secrets of Casa Loma
10:18
10:18
Play later
Play later
Lists
Like
Liked
10:18From the downfall of its ambitious creator, Sir Henry Pellatt, to the countless ghostly sightings that haunt its dimly lit halls, Casa Loma’s story is as haunting as it is fascinating. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.…
…
continue reading
1
WhatsApp banned; Discord, TransUnion, Jaguar-Land Rover hacked
51:08
51:08
Play later
Play later
Lists
Like
Liked
51:08Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss various topics related to cybersecurity, including the security implications of WhatsApp, the challenges of age verification laws, the recent TransUnion data breach, and the significant cyber attack on Jaguar Land Rover. They emphasize the importance of str…
…
continue reading
1
Jack Rhysider on Darknet Diaries, Privacy, and the Future of Cybersecurity
1:20:43
1:20:43
Play later
Play later
Lists
Like
Liked
1:20:43Jack Rhysider, creator of Darknet Diaries, joins The Watchers to talk privacy, hacking culture, and the evolving threats shaping our digital lives. From disguises at DEFCON to exploring hacker origins in video games, Jack shares insights on why breaches are inevitable, how underground communities evolve, and where optimism fits in the face of AI, n…
…
continue reading
1
12 Oct 2025 | Sermon On the Mount: Love Even Your Enemies
24:20
24:20
Play later
Play later
Lists
Like
Liked
24:20This week we continue our Sermon on the Mount series by considering two of Jesus’ most challenging teachings: nonviolence and enemy-love. We explore the logic behind these teachings and consider […]
…
continue reading
1
iPhone MIE, Microsoft - Israel MOD, npm supply chain attacks
26:53
26:53
Play later
Play later
Lists
Like
Liked
26:53
…
continue reading
1
05 Oct 2025 | Sermon On the Mount: Heart Stuff
25:09
25:09
Play later
Play later
Lists
Like
Liked
25:09We look at how Jesus diagnoses the things that most often trip humans up and keep us from being our best selves, and the practical advice he gives to help […]
…
continue reading
1
Tatyana Bolton on Cyber Policy, OT Security, and the Speed of Relevance
1:42:02
1:42:02
Play later
Play later
Lists
Like
Liked
1:42:02In this episode of The Watchers, Andy Sauer sits down with cybersecurity leader Tatyana Bolton. From her unexpected start in acting to shaping national policy at CISA, Google, and beyond, Tatyana shares her perspective on why U.S. cyber defenses must keep pace with adversaries moving at the “speed of relevance.” They discuss policy gridlock, supply…
…
continue reading
1
Whispers in the Aisles: The Haunting of St. George’s Church
9:34
9:34
Play later
Play later
Lists
Like
Liked
9:34In the quiet village of Luková in the Czech Republic, St. George’s Church stands abandoned, its crumbling walls filled with an eerie presence. Once a place of worship, the church was left in ruins after part of its roof collapsed during a funeral. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/pri…
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the topic of Kerberosting, a known attack method that exploits weaknesses in the Kerberos authentication protocol, particularly focusing on the vulnerabilities associated with RC4 encryption. They discuss a recent letter from Senator Ron Wyden addressing…
…
continue reading
1
28 Sep 2025 | Sermon On the Mount: Salt, Light, Deeds
23:25
23:25
Play later
Play later
Lists
Like
Liked
23:25What does it mean for salt to “lose its taste”? We talk about the part of the Sermon on the Mount that encourages us to keep our “flavor,” be light, […]
…
continue reading
1
Advanced Data Protection with Special Guest Amren Gill
1:06:31
1:06:31
Play later
Play later
Lists
Like
Liked
1:06:31Summary In this episode of the Blue Security Podcast, hosts Andy and Adam celebrate their five-year anniversary with guest Amren Gill, a data security solutions engineer at Microsoft. They delve into the complexities of data protection, focusing on Microsoft Purview's capabilities, including data classification, data loss prevention (DLP), and adva…
…
continue reading
1
21 Sep 2025 | Sermon On the Mount: The Beatitudes
22:12
22:12
Play later
Play later
Lists
Like
Liked
22:12Many people see the Beatitudes as high moral ideals we’re supposed to live up to, but that approach makes us focus on our own effort instead of God’s grace. We […]
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the latest developments in Microsoft security technologies, particularly focusing on Entra and its features like Continuous Access Evaluation (CAE) and the integration of threat intelligence into the Global Secure Access (GSA) platform. They reflect on thei…
…
continue reading
1
Behind the Stone Walls: The Richardson Complex
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26The Richardson Olmsted Complex in Buffalo, New York, stands as one of the most striking remnants of America’s 19th-century mental health movement. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
…
continue reading
1
14 Sep 2025 | Sermon On the Mount: Let Us Begin
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02Pastor Emily opens up a new series on the Sermon On the Mount by setting the stage for Jesus’s most famous teaching. The Sermon on the Mount begins not with a […]
…
continue reading
1
Gentry Lane on cyber weapons, national defense, and the race for global cyber power
1:37:22
1:37:22
Play later
Play later
Lists
Like
Liked
1:37:22Cybersecurity strategist Gentry Lane joins The Watchers to unpack why cyber weapons should be treated as real weapons of war. She and Andy Sauer dive into the absence of a national cyber strategy, the vulnerabilities of America’s critical infrastructure, and the role of Europe in the global cyber power race. From the dangers of supply chain weaknes…
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the concept of FUD (Fear, Uncertainty, and Doubt) prevalent in the cybersecurity industry. They discuss the implications of sensationalized reporting, particularly around Windows Hello for Business vulnerabilities and the importance of adopting fish resistant multi…
…
continue reading
1
07 Sep 2025 | The Theological Revolution Will Not Be Televised
37:22
37:22
Play later
Play later
Lists
Like
Liked
37:22In Luke 14, Jesus responds to the crowds in a surprising way: If you want to be my disciple, be prepared to give up everything. What feels like a harsh […]
…
continue reading
1
Microsoft Licensing Overview - Part 3 - Niche Situations and Azure
48:36
48:36
Play later
Play later
Lists
Like
Liked
48:36Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the complexities of Microsoft licensing, focusing on device-based versus user-based licensing, the nuances of shared mailboxes, and the implications of mixing E3 and E5 licenses. They also explore Azure billing models and the costs associated with Securi…
…
continue reading