Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Space Cyber Podcasts

show episodes
 
Artwork

1
Cyber Trek

Mati Kos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Junior Dev's log - personal journey to become Junior Software Developer... and maybe beyond. Weekly entries to a journal of a guy in Manchester England set on a long voyage to a coding job. Let's see where it takes us. ...Cyber space, the final frontier.
  continue reading
 
Artwork

1
Likutei Moharan

Moshe Rubin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Come join us on our journey!!! ... working towards an accessible and meaningful glimpse into the universe of Likutei Moharan with a group of growth-oriented people; Also available at: http://www.jewishheritagefoundation.org/audio_shiurim.html Please feel free to reach out from cyber space: [email protected] and let me know how you are enjoying the shiurim, or just to say hello. Would love to hear from you!!!
  continue reading
 
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
  continue reading
 
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
  continue reading
 
Lies pervade our lives - in business, personal relationships, cyber-space, courting, kids, politics and more… We talk to New Zealanders whose lives were upended by lies and experts about why we do it.
  continue reading
 
Artwork

1
Girls Talk Cyber

girlstalkcyber

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
  continue reading
 
Artwork
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Welcome to "Cyber Compliance and Beyond," a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork
 
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
  continue reading
 
Artwork

1
MS. PSKV

Carloyn Dunning-youman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
OPEN CONVERSATION ON BUILDING OUR HEALTH AND HEALTHY EATING, OPEN CONVERSATION ON RELATIONSHIPS, FINANCIAL DIRECTION, ECONOMIC GROWTH, AND GROWING INTO OUR PERSONAL FUTURE! RECOGNIZING OUR SPIRITUAL UNDERSTANDING AND GROWTH IN THIS FAST GROWING WORLD OF CYBER SPACE ALONG WITH ENVIRONMENT THAT WE LIVE IN NOW WITH COVID-18 PANDEMIC.
  continue reading
 
Needle Mythology is a small (cyber)space where people can enthuse about beautiful records and the people who make them. It's also a record label, but more about that later. Occasionally, we'll post conversations with well-loved musicians and music fans, hosted by Needle Mythology founder Pete Paphides. These podcasts are all produced by Laura Druce (www.whitepebblemedia.co.uk) Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
This series in partnership with the American Medical Association brings healthcare professionals timely, relevant, and emerging information that impacts daily practice and the changing world of medicine. Featuring insights from health care leaders, this Perspectives with the AMA series is a must for any healthcare professional who wants to stay up to date on the latest issues and trending topics in the space, including value-based care, telehealth, the opioid epidemic, Medicare payment, cybe ...
  continue reading
 
Netenrich threat researcher and security expert John Bambenek interviews leading security experts and threat researchers on the latest cyber threats and attacks, and what organizations need to do. Threat researchers, analysts, and SOC teams will gain insights on the latest techniques and approaches to advanced detection, investigation, and response. Learn how enterprises are modernizing outdated systems by adopting data analytics to gain increased visibility, intelligence and efficiencies to ...
  continue reading
 
Artwork

1
Work Junction

Work Junction

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Flexible co working space near huda city center Gurgoan. Work Junktion is the leading coworking space-as-a-service platform, offering flexible shared office space , co work space, Free Parking space, Events, Dedicated Seats, Private Cabins, virtual office space, Space for one on one private meetings, High Speed Internet, Spacious cafeteria, 24 * 7 Power Back Up, Conference Room, solutions to foster creativity and increase productivity, reimagining the workplace for everyone from freelancers ...
  continue reading
 
Artwork
 
The Tales Of Podcast is a system-agnostic tabletop RPG actual play series. Join us as we ROLL-play through long, short and mini adventures of various settings and genres, from horror to cyber punk to space western - and more! Comments, questions or just wanna say hi? Reach us at [email protected]!
  continue reading
 
SheCanCode’s ‘Spilling the T’ podcast offers conversations with top female voices in the tech sector, as we plunge into the latest topics that have captured our imagination recently. Learn about a range of tech disciplines and how to establish a career in them - from coding, AI, cyber, starting a business, career transitions and even diversity in space, we lay it out bare and Spill the T on everything you need to know.
  continue reading
 
America’s military operations are constantly evolving. From boot camp to boots on the ground, anchor Ryan Robertson provides in-depth coverage of international armed conflicts and the latest technological developments in weaponry worldwide.
  continue reading
 
Artwork

1
What the Shell?

John Kordis

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to ”What the Shell?” where I dive into major hacks and vulnerabilities in a way meant to be accessible by anyone. Come with me as we look at each incident through an exciting lens of curiosity. Join us on our discord if you‘d like to participate in discussions with myself and our guests! https://discord.gg/bJauPBBhHn
  continue reading
 
Artwork

1
HII Talking Points

Huntington Ingalls Industries

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HII is a global, all-domain defense partner, building and delivering the world’s most powerful, survivable naval ships and technologies that safeguard our seas, sky, land, space and cyber. As America’s largest shipbuilder and with a more than 135-year history of advancing U.S. national defense, we are united by our mission in service of the heroes who protect our freedom. HII’s diverse workforce includes skilled tradespeople; artificial intelligence, machine learning (AI/ML) experts; enginee ...
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
  continue reading
 
Artwork

1
The CISO Diaries

Syya Yasotornrat & Leah McLean

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
  continue reading
 
Artwork

1
Security & GRC Decoded

Raj Krishnamurthy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC). Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy. It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates. Security & GRC ...
  continue reading
 
Welcome to the Airbus Podcast, 'We Make It Fly'. Here you will find conversations on everything Airbus - what the company is currently up to across its several divisions, its plans for an innovative & sustainable future, and a view of its prestigious past. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Welcome to Safe Space from the Workplace, a podcast dedicated to helping you navigate the challenges of toxic work environments. Hosted by Wendy Cee and her co-host Kate, each episode brings in experts and survivors to discuss topics like bullying, redundancy, and neurodiversity. Whether you’re dealing with workplace stress, feeling overwhelmed, or just need a reminder that you’re not alone, this podcast offers support and guidance to help you find the light at the end of the tunnel. Join us ...
  continue reading
 
Artwork

1
Cyber Junkie

Dope Vibes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome listener to my podcast..If “coding is life” your’re in the right spot to listen to all the progress make while learning Javascript. Plus I get to talk about all my “nerdy subjects” like space “Are we truly alone?”, games and sports. so stay tune :)
  continue reading
 
Artwork

1
Meet The Leader

World Economic Forum

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
How the world's top leaders tackle the toughest challenges. In these one-on-one conversations, host Linda Lacina interviews the world's top leaders, change-makers and experts on the solutions they're building to tackle the world's biggest challenges, the habits they can't work without, and their lessons learned, all from the World Economic Forum.
  continue reading
 
Artwork

1
Ctrl - Alt - Secure Podcast

Red Sentry CEO Valentina Flores

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Ctrl-Alt-Secure podcast, your guide to navigating the ever-changing landscape of cybersecurity. Join us as we delve into the latest trends, threats, and innovations shaping the infosec space.
  continue reading
 
Artwork
 
Let's Tech It Out! OCTOPod is the place to track government techies, geeks and innovators who are making a huge difference in the nation's Capital. There are a lot of cool people in the DC Government tech space and on OCTOPod you can meet them all. [OCTOpod Score, “Down the Road” : © 2023 Michele P. Roseman]
  continue reading
 
Artwork

1
The Naked Scientists Podcast

The Naked Scientists

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Naked Scientists flagship science show brings you a lighthearted look at the latest scientific breakthroughs, interviews with the world's top scientists, answers to your science questions and science experiments to try at home.
  continue reading
 
Admit One features its host, gmoney – a renowned NFT cultural thought leader, educator, and community authority, best-known for sporting his iconic orange beanie CryptoPunk. Picking the brains of noteworthy and successful individuals in the NFT/Web3 space, Admit One has featured guests like fashion legend and author, Bobby Hundreds, artist, Cory Van Lew, entrepreneur and philanthropist, Andrew Yang, and Gary Vee. Most recently, gmoney has used his platform to the new voices of the NFT space ...
  continue reading
 
Loading …
show series
 
'I AM HERE.... NOW' showed the world that you don't need conflicts, plotline resolution, or any form of internal consistency in order to make a MEGA-BLOCKBUSTER HIT MOVIE. Just have things happen for a while and then call it a day when you get to the 85 minute mark. Patreon: https://www.patreon.com/c/Space_Ice Merchandise: spaceice.dashery.com #nei…
  continue reading
 
The sources contain excerpts from a multi-part audio discussion, seemingly a podcast or live chat, where the speakers explore topics related to satanism, luciferianism, occultism, and hacking. The conversation focuses heavily on philosophical differences between these belief systems and traditional religions, particularly Christianity, with an emph…
  continue reading
 
Please enjoy this encore of Career Notes. Chief Information Security Officer at Immuta, Michael Scott shares his story from working at a forgotten internet service provider to leading the security fight for major food chain restaurants. Michael explains how the different roles at various companies he has worked with paved his way to where he is now…
  continue reading
 
While our team is out on winter break, please enjoy this episode of Research Saturday. Today we are joined by ⁠⁠Selena Larson⁠⁠, co-host of ⁠⁠Only Malware in the Building⁠⁠ and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at ⁠⁠Proofpoint⁠⁠, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishin…
  continue reading
 
For more than three decades, Somaliland has functioned as a free, independent, Muslim, pro-peace, anti-Islamist republic on the Horn of Africa. Now, Israel has formally recognized it as a sovereign state. Somaliland’s bad neighbor, Somalia, and other Islamist regimes are furious. Britain also insists the people of Somaliland have no right to decide…
  continue reading
 
While our team is out on winter break, please enjoy this episode of Cyber Things from our partners at Armis. Welcome to Episode 2 of Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire in an homage to Stranger Things. Host ⁠Rebecca Cradick⁠, VP of Global Communications at ⁠Armis⁠, is joined by ⁠Curtis Simpson⁠…
  continue reading
 
While our team is out on winter break, please enjoy this episode of Threat Vector from our partners at Palo Alto Networks. In this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outd…
  continue reading
 
1855 kicks off with a bombshell AP investigation revealing how Silicon Valley giants IBM, Intel, NVIDIA, Oracle, and more spent decades building China’s surveillance state. Also covered, malicious Chrome extensions stealing credentials from 170+ sites, Microsoft’s ambitious Rust migration plans, China’s combat-ready humanoid robot, and Japan restar…
  continue reading
 
While our team is out on winter break, please enjoy this episode of Afternoon Cyber Tea with Ann Johnson from our partners at Microsoft Security. Dr. Lorrie Cranor, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vice President, Microsoft, on this week's episode of Afternoon Cyber Tea …
  continue reading
 
Audits are often misunderstood, frequently disliked, and almost always viewed as a necessary evil — but what if that mindset is holding security teams back? In this episode of Security & GRC Decoded, Raj Krishnamurthy sits down with Varun Prasad to unpack what audits are actually designed to do: provide reasonable assurance, not absolute security. …
  continue reading
 
While our team is out on winter break, please enjoy this episode of The Microsoft Threat Intelligence Podcast from our partners at Microsoft. In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a co…
  continue reading
 
In the season finale of CSO Perspectives, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons an…
  continue reading
 
Alan Leer runs through the biggest science threads of 2025 — from world-first gene editing on the NHS and UK temperature records to Nobel-level physics and a rare interstellar visitor For the latest news, visit Standard.co.uk Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Security researcher Jon “Gainsec” Gaines and YouTuber Benn Jordan discuss their examination of Flock Safety’s AI-powered license plate readers and how cost-driven design choices, outdated software, and weak security controls expose them to abuse. The post AI Surveillance: Unmasking Flock Safety’s Insecurities appeared first on The Security Ledger w…
  continue reading
 
While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik. In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and w…
  continue reading
 
In this Tech 2025 round-up, Alan Leer breaks down the year’s biggest tech themes: AI shifting from chatbots to agentic tools, the UK’s Online Safety Act enforcement, new digital ID plans, tougher competition rules for Big Tech, the privacy and ad-tracking shake-up, and why London’s data-centre boom is colliding with electricity grid limits. Hosted …
  continue reading
 
While our team is out on winter break, please enjoy this episode of Career Notes. Threat intelligence analyst at Recorded Future, Charity Wright, shares her story from the army to her career today. Transitioning from the army to cybersecurity was an exciting change for her. During college she was recruited by the U.S. army where she started her jou…
  continue reading
 
Este documento sintetiza un análisis del abuso sexual basado en imágenes (IBSA), trazando su evolución desde hackeos dirigidos a celebridades hasta la amenaza actual de los "deepfakes" generados por IA. Las fuentes revelan un cambio significativo en la comprensión y la terminología, alejándose de la etiqueta engañosa "pornografía de venganza" hacia…
  continue reading
 
These sources examine the non-consensual distribution of intimate images, a form of digital abuse frequently referred to as "revenge porn." The texts explore the severe mental health consequences for survivors, including depression and social isolation, while detailing the evolving legal landscape across various global jurisdictions. Organizations …
  continue reading
 
This document synthesizes an analysis of image-based sexual abuse (IBSA), charting its evolution from targeted celebrity hacks to the current threat of AI-generated “deepfakes.” The sources reveal a significant shift in understanding and terminology, moving away from the misleading label “revenge porn” to more accurate terms like “non-consensual po…
  continue reading
 
The provided sources examine "El Guardián," a sophisticated telecommunications interception system utilized by the Uruguayan Ministry of the Interior to monitor calls, emails, and social media. While government officials emphasize that the technology is strictly auditable and requires judicial authorization, civil society groups raise concerns rega…
  continue reading
 
Las fuentes proporcionadas examinan "El Guardián", un sofisticado sistema de interceptación de telecomunicaciones utilizado por el Ministerio del Interior de Uruguay para monitorear llamadas, correos electrónicos y redes sociales. Si bien los funcionarios gubernamentales enfatizan que la tecnología es estrictamente auditable y requiere autorización…
  continue reading
 
While our team is out on winter break, please enjoy this episode of Research Saturday. This week, we are joined by ⁠Tom Hegel⁠, Principal Threat Researcher from ⁠SentinelLabs⁠ research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belaru…
  continue reading
 
This Christmas week, we're left to confront a hard truth: Christians are under attack in many corners of the world. On October 10, the Chinese Communist Party arrested Pastor Ezra Jin, founder of Beijing’s Zion Church — along with 28 other leaders — in the largest crackdown on a Christian church in China in decades. Pastor Jin’s daughter, Grace Jin…
  continue reading
 
While our team is out on winter break, please enjoy this Special Edition episode. Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The ⁠NightDragon Innovation Summit⁠ convened a group of industry leaders to discuss how public and private entities can work together to address emerging …
  continue reading
 
While our team is out on winter break, please enjoy this episode of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries. Your host is ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoin…
  continue reading
 
In today’s episode, we dig into the Electronic Frontier Foundation’s annual Breachies, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet misconfigurations, the Breachies offer a revealing look at how familiar…
  continue reading
 
In this episode, Ray covers December Tech News! T-Mobile’s groundbreaking Starlink satellite beta promises to eliminate dead zones using your regular phone with no special equipment needed. Also discussed: Japan’s ship-mounted laser weapon with unlimited ammo, China’s record-breaking 387 mph maglev train, Rivian challenging Tesla’s camera-only appr…
  continue reading
 
On this Christmas Eve edition of Tech and Science Daily from The Standard, we’re keeping it festive but still very London: Thames Water tackles a fresh Whitechapel fatberg blockage, while Crystal Palace Park’s iconic Victorian dinosaur sculptures get a long-overdue restoration glow-up. After the break, we dip into seasonal gaming with Fortnite Wint…
  continue reading
 
The White House bans foreign-made drones. African law enforcement agencies crackdown on cybercrime. A new phishing campaign targets Russian military personnel and defense-related organizations. A University of Phoenix data breach affects about 3.5 million people. A pair of Chrome extensions covertly hijack user traffic. Romania’s national water aut…
  continue reading
 
In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigat…
  continue reading
 
Curiosity can rewrite a career—and change how an investigation ends. We sit down with Valeri Soloninka, a Russian-speaking cybersecurity professional now protecting government entities in the UAE, to trace a path from hands-on engineering to enterprise SOC work and into the high-impact world of operational and tactical cyber threat intelligence. Al…
  continue reading
 
On today’s Tech and Science Daily from The Standard, we look at plans for robotaxi trials in London in 2026, plus the surprising UK science story being dubbed the “year of the octopus” after a boom in sightings and catches off England’s south coast. Then Alan Leer drops into an interview with Johannes Maunz, Senior Vice President of AI at Hexagon, …
  continue reading
 
Host: Alexandria May, PharmD, BCPS Guest: Jennifer Cluett, MD Accurate home blood pressure monitoring is vital for effective hypertension care, and the AMA’s Validated Device Listing (VDL) helps clinicians and patients confidently select devices that meet rigorous international accuracy standards. Learn more about how the VDL ensures device reliabi…
  continue reading
 
NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump’s cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method. Researchers warn a popular open-source server monitoring tool is being abused. Cyber cri…
  continue reading
 
On Tech and Science Daily from The Standard, we lead with an extended interview package on claims from former Vodafone franchisees — with 62 ex-partners taking legal action and Vodafone denying wrongdoing. Plus, a London commute upgrade: South Western Railway trials Starlink-powered “super Wi-Fi” on routes in and out of London Waterloo, and we wrap…
  continue reading
 
In this episode, we're revisiting some of the most magical moments and scientific milestones of 2025 - including the incredible legacy of Dame Jane Goodall, the brain-wave reading bionic-knee, why labradors are so greedy, and the beer that doesn't give you a hangover... Like this podcast? Please help us by supporting the Naked Scientists…
  continue reading
 
On our sister podcast Brave New World, Host Evgeny Lebedev is joined by Professor Tim Spector and Dr Federica Amati — two of the leading scientific voices behind personalised nutrition company ZOE — to rethink everything we’ve been told about food. From the myths around “good” and “bad” fats to calorie-counting obsessions, they explain why so much …
  continue reading
 
Please enjoy this encore of Career Notes. Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking int…
  continue reading
 
Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. Using examples…
  continue reading
 
Watch this episode on YouTube here. China isn’t just competing economically — it’s coercing strategically. Drawing on the U.S.-China Economic and Security Review Commission’s latest report, guest host Craig Singleton is joined by Commission Vice Chair Randy Shriver and Commissioner Mike Kuiken to unpack how Beijing weaponizes its economic power — a…
  continue reading
 
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Am…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play