E-Com secrets for brands over your favorite brew.
…
continue reading
Engineering Com Podcasts
WSJ’s Bold Names brings you conversations with the leaders of the bold-named companies featured in the pages of The Wall Street Journal. Hosts Tim Higgins and Christopher Mims speak to CEOs and business leaders in interviews that challenge conventional wisdom and take you inside the decisions being made in the C-suite and beyond.
…
continue reading
Welcome to Lean6leadership that is Lean with the number six leadership dot com. Where I discuss the ins and outs of Quality Engineering/management, Program/Project management, and how to apply it to your life. I am a certified Six Sigma Master Black Belt, and a recovering Project Management Professional. I have been in manufacturing in one role or another for the last 20 years.
…
continue reading
I’m Anthony Desnos, a security engineer specializing in Android apps and malware analysis. Date of birth: 18/02/1985 Web: https://anthonydesnos.com/ Address: 4117 David Dr, CA California, US Gmail: [email protected] Social: https://gravatar.com/anthonydesnos522 https://www.facebook.com/anthonydesnos/ https://www.instagram.com/anthonydesnos552/ https://x.com/AnthonyDes19261 https://www.reddit.com/user/Crazy-Mousse-4053/ https://www.scoop.it/u/anthonydesnos522-gmail-com https://www.pi ...
…
continue reading
The Twilight Saga took over the world—briefly. Whether you thought it was the bomb dot com or . . . well . . . not that, admit it: You had a Twilight phase. Join us as we reread, relive, overanalyze, roast and defend, and try to figure out what made Stephenie Meyer's Twilight Saga so powerful that we're still talking about it. We're publishing insiders who want to give you the behind the scenes scoop. Don’t let us go into this forest alone. Contact us at [email protected] Patreo ...
…
continue reading
The Cyber Resilience Brief is your 15-minute pulse on how organizations can build stronger defenses and achieve true cyber resilience. Each episode dives into the practical realities of Breach and Attack Simulation (BAS), adversarial exposure validation, and the evolving strategies that keep modern enterprises secure. Hosted by Tova Dvorin and brought to you by SafeBreach — the leader in Adversarial Exposure Validation — this podcast features insights from cybersecurity leaders, integration ...
…
continue reading
Listen to Interview about USPS on WZRD 88.3 fm radio Chicago Karen M. Nielsen USPS Employee Also see: UnemployDeJoy.com and google: Dominick VS Louis DeJoy (The Guardian). Also IWP DeJoy. Hi I'm KaRi. I started TPSradio in 1999, podcasting Feb 2005. The rage became "Live Internet TV" (mogulus, etc.) in 2008 and in 2012 TPS returned to cable access TV. TPS college radio was heard on campus at CSULB via the internet, live webcast with simultaneous audio broadcast over Community Television. TPS ...
…
continue reading
1
Ep. 32 - Inside “The Com”: The Social-Engineering Supergroup Behind Global Ransomware Attacks
17:12
17:12
Play later
Play later
Lists
Like
Liked
17:12In this episode of The Cyber Resilience Brief, host Tova Dvorin and offensive security expert Adrian Culley expose The Com—the decentralized cybercrime collective behind threat groups like Lapsus$, Scattered Spider (UNC 3944 / Octo Tempest), and ShinyHunters. Together, they break down how this teenage-to-young-adult adversary ecosystem has weaponiz…
…
continue reading
1
Encore: This CEO Says Humanoid Robots Are The "Space Race" of Our Time
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Who will take care of you in old age? Jeff Cardenas, the CEO and co-founder of Apptronik, says the answer is robots. The startup founder set out to build a smart, dexterous robot after watching his grandfathers grow old and dependent in their later years. Beyond healthcare, Cardenas sees robots as essential to U.S. economic growth and national secu…
…
continue reading
1
Ep. 36 - TIBER-EU Explained: How Threat-Led Red Teaming Is Redefining Cyber Resilience
13:14
13:14
Play later
Play later
Lists
Like
Liked
13:14Threat-led red teaming is no longer optional in Europe — it’s becoming the foundation of cyber resilience. In this episode of The Cyber Resilience Brief, host Tova Dvorin is joined by Adrian Culley, SafeBreach’s offensive security expert for Europe and the UK, to break down the TIBER-EU framework and why it’s reshaping how financial institutions an…
…
continue reading
1
SPECIAL WSJ’s Take On the Week: How This Fed Hawk Views the Economy, Inflation, AI and Jobs
39:39
39:39
Play later
Play later
Lists
Like
Liked
39:39As a special bonus, we’re bringing you an episode of WSJ’s Take On the Week. Co-host Telis Demos and guest host WSJ Chief Economics Correspondent Nick Timiraos are joined by Beth Hammack, president of the Federal Reserve Bank of Cleveland, to discuss the state of the U.S economy, interest rates and the central bank itself. Hammack shares her views …
…
continue reading
1
The Boldest Ideas of 2025 — And What’s in Store for 2026
24:03
24:03
Play later
Play later
Lists
Like
Liked
24:03In this special episode, Tim Higgins and Christopher Mims revisit some of their favorite moments from the first year of Bold Names. We look back on conversations with guests including Microsoft AI CEO Mustafa Suleyman and former Secretary of State Condoleezza Rice on the explosive growth of AI and the complexities of the U.S.-China trade war. Then,…
…
continue reading
1
Ep. 35 - BAS, APTs, AEV, and CTEM Explained: A Practical Guide to Cybersecurity Acronyms
17:55
17:55
Play later
Play later
Lists
Like
Liked
17:55In this episode of the Cyber Resilience Brief, hosts Tova Dvorin and Adrian Culley clearly and practically explain some of the most commonly used — and most commonly misunderstood — terms in modern cybersecurity. Together, they break down: What Breach and Attack Simulation (BAS) actually means in practice How Advanced Persistent Threats (APTs) oper…
…
continue reading
1
Inside PlayStation's Plans to Lead a $200 Billion Industry
26:05
26:05
Play later
Play later
Lists
Like
Liked
26:05Gaming is a $200 billion industry that dwarfs Hollywood — and PlayStation is at the center of it all. On this week’s episode of Bold Names, Sony Interactive Entertainment SVP Eric Lempel joins WSJ’s Christopher Mims and Tim Higgins to discuss how the company plans to compete in a mobile-first gaming world. We talk about keeping the “soul” of game d…
…
continue reading
1
Ep. 34 - Inside the Jaguar Land Rover Cyberattack: Supply Chain Failure, Scattered Spider, and the New Threat Ecosystem
14:38
14:38
Play later
Play later
Lists
Like
Liked
14:38The Jaguar Land Rover cyberattack has already cost the UK billions — and exposed a critical weakness in modern cybersecurity: supply chain risk. In this episode of The Cyber Resilience Brief, SafeBreach hosts Tova Dvorin and Adrian Culley sit down with Steve Cobb, CISO of SecurityScorecard, to unpack what really happened, why groups like Scattered …
…
continue reading
1
Ep. 33 - BRICKSTORM Reemerges: CISA & NSA Warn of New Persistence Tactics and Cyber Resilience Gaps
12:31
12:31
Play later
Play later
Lists
Like
Liked
12:31In Episode 33 of The Cyber Resilience Brief, hosts Tova Dvorin and Adrian Culley revisit the BRICKSTORM threat—this time through the lens of the new CISA, NSA, and Canadian Cyber Centre joint advisory. While Episode 24 explored BRICKSTORM’s origin, stealth techniques, and UNC5221’s long-term espionage campaign, this episode focuses on what’s change…
…
continue reading
1
McLaren CEO Zak Brown On F1 And Business Strategy At 200 Miles Per Hour
30:55
30:55
Play later
Play later
Lists
Like
Liked
30:55What business lessons are forged at 200 miles per hour? On this week’s Bold Names, McLaren Racing CEO Zak Brown joins Christopher Mims and Tim Higgins to talk about his new book, “Seven Tenths of a Second.” A racecar driver turned executive, Brown leads a global racing organization worth hundreds of millions of dollars. We talk about the pressure a…
…
continue reading
1
SPECIAL WSJ Tech Live: The Man Leading Trump’s AI Charge Against China (The Journal Podcast)
22:59
22:59
Play later
Play later
Lists
Like
Liked
22:59This week, we’re bringing you an episode of The Journal, produced by Spotify and the Wall Street Journal. In this episode, recorded at WSJ’s Tech Live, host Jessica Mendoza sits down with Michael Kratsios, Director of the White House Office of Science and Technology Policy, to discuss everything from chips to chatbots, how Kratsios thinks AI should…
…
continue reading
1
Ep. 31 - From Exercise to Efficacy: Resilience as a Measurement
7:52
7:52
Play later
Play later
Lists
Like
Liked
7:52In this final episode of our November Critical Infrastructure series, The Cyber Resilience Brief host Tova Dvorin and SafeBreach offensive engineer Adrian Culley explore what it truly means to measure resilience — not just talk about it. They break down how the CISA resilience framework (“Know, Assess, Plan, and Continuously Improve”) connects dire…
…
continue reading
1
Biden’s Antitrust Architect on How Big Tech Threatens U.S. Prosperity
36:23
36:23
Play later
Play later
Lists
Like
Liked
36:23Are we becoming a nation mined for our money, data, and attention? Author and legal scholar Tim Wu certainly thinks so. A key architect of President Joe Biden’s antitrust policy, Wu joins WSJ’s Christopher Mims and Tim Higgins on Bold Names to explain how a handful of tech platforms conquered the economy and why he fears Silicon Valley could become…
…
continue reading
1
Ep. 30 - Bridging IT and OT - A Unified Red Team View
7:31
7:31
Play later
Play later
Lists
Like
Liked
7:31As IT and OT environments converge, critical infrastructure faces an evolving threat landscape where cyberattacks can have real-world, physical consequences. In this episode of The Cyber Resilience Brief, host Tova Dvorin and Adrian Culley, Offensive Cybersecurity Engineer at SafeBreach, explore how Continuous Automated Red Teaming (CART) delivers …
…
continue reading
1
The World’s Tech Giants Are Running Out of Power. This CEO Plans to Deliver.
31:21
31:21
Play later
Play later
Lists
Like
Liked
31:21Electricity demand is exploding, fueled by the rise of artificial intelligence and an unprecedented wave of data center construction. Some experts warn the U.S. grid won’t be able to handle it. But Scott Strazik, the CEO of GE Vernova, says his company can deliver. On this episode of Bold Names, Strazik joins the WSJ’s Christopher Mims and Tim Higg…
…
continue reading
1
Ep. 29 - The Domino Effect: Validating Supply Chain and Dependencies
10:28
10:28
Play later
Play later
Lists
Like
Liked
10:28In this episode of The Cyber Resilience Brief, hosts Tova Dvorin and Adrian Culley explore the domino effect of supply chain vulnerabilities within critical infrastructure. Using real-world examples like SolarWinds, MOVEit, and Log4j, they unpack how a single compromised vendor can ripple across entire sectors—and how Adversary Exposure Validation …
…
continue reading
1
How Uber Plans to Win the Self-Driving Car Race
31:03
31:03
Play later
Play later
Lists
Like
Liked
31:03Driverless cars are no longer in the realm of science fiction. Nearly a decade after abandoning its own self-driving car unit, Uber is taking a hybrid approach, partnering with more than a dozen autonomous vehicle firms, including Alphabet’s Waymo and Chinese robotaxi company WeRide. But as the robotaxi market heats up, can Uber stay in the race? O…
…
continue reading
1
Ep. 28: Critical Infrastructure’s Unique Validation Challenge
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54In this episode of The Cyber Resilience Brief, host Tova Dvorin and SafeBreach offensive security engineer Adrian Culley explore the high-stakes world of critical infrastructure cybersecurity. November marks Critical Infrastructure Security and Resilience Month, and the discussion dives deep into why continuous validation — not periodic testing — i…
…
continue reading
1
Inside Visa’s Tech-Charged Future: From Crypto to AI
28:18
28:18
Play later
Play later
Lists
Like
Liked
28:18Every second, tens of thousands of transactions cross Visa’s global network. Last year alone, the company processed more than $13 trillion in purchases – nearly triple the size of Japan’s economy. Now, one of the largest payment networks in the world wants to become even bigger. On this episode of Bold Names, Rajat Taneja, Visa’s president of techn…
…
continue reading
1
Ep. 27 - The Evolution of ShinyHunters: From Data Theft to Weaponized Trust
17:19
17:19
Play later
Play later
Lists
Like
Liked
17:19The ShinyHunters threat group has transformed from a dark-web data broker into one of the most dangerous alliances in modern cybercrime. In this episode of The Cyber Resilience Brief, host Tova Dvorin and Adrian Culley, Offensive Security Engineer at SafeBreach, break down how the group’s merger with Scattered Spider marks a new era of as-a-service…
…
continue reading
In the finale of our Cybersecurity Awareness Month series, SafeBreach’s Cyber Resilience Brief delivers its most powerful episode yet — The Cyber Resilience Playbook. Join hosts Tova Dvorin and Adrian Culley as they connect the dots between Breach and Attack Simulation (BAS), Adversarial Exposure Validation (AEV), and Continuous Automated Red Teami…
…
continue reading
1
This Tech Founder's $1.3 Billion Company Is Taking On Apple and Samsung
29:42
29:42
Play later
Play later
Lists
Like
Liked
29:42Can a startup beat Apple and Samsung on their own turf? Carl Pei, the founder and CEO of Nothing, is betting on it. Growing up in Sweden, Pei was captivated by American gadgets like Apple’s first iPod. But over time, he says, those products lost their edge. On the latest episode of Bold Names, Pei joins WSJ’s Christopher Mims and Tim Higgins to exp…
…
continue reading
1
Ep. 25: Beyond the Drill: The Power of Continuous Automated Red Teaming (CART)
10:40
10:40
Play later
Play later
Lists
Like
Liked
10:40How can security teams stay truly proactive in a world where adversaries never stop? In this episode of The Cyber Resilience Brief, hosts Tova Dvorin and Adrian Culley explore Continuous Automated Red Teaming (CART) — the next evolution in proactive security validation. They break down how CART extends beyond traditional red teaming and breach simu…
…
continue reading
1
Ep. 24 - BrickStorm: From LoTL to "Living Off the Blind Spot"
12:52
12:52
Play later
Play later
Lists
Like
Liked
12:52In this episode of The Cyber Resilience Brief, host Tova Dvorin and SafeBreach offensive security expert Adrian Culley unpack BrickStorm — a highly sophisticated espionage operation attributed to China-nexus group UNC5221. With an average dwell time of 393 days, this campaign redefines stealth and persistence in cyber warfare. Discover how attacker…
…
continue reading
1
Why This Investor Says the AI Boom Isn’t the Next Dot-Com Crash
31:06
31:06
Play later
Play later
Lists
Like
Liked
31:06The artificial intelligence boom has sparked one of the costliest building sprees in history. By 2028, investment in chips, servers and data centers could hit nearly $3 trillion, according to Morgan Stanley. To help fund the build-out, tech companies are taking on huge amounts of debt, raising concerns of a possible bubble. On the latest episode of…
…
continue reading
1
Ep. 23 - Zeroing In on Adversary Exposure Validation (AEV): Moving Beyond Vulnerability Management
9:54
9:54
Play later
Play later
Lists
Like
Liked
9:54In episode 2 of our special 4-part Cybersecurity Awareness Month series, The Cyber Resilience Brief hosts Tova Dvorin and Adrian Culley dive deep into Adversary Exposure Validation (AEV) — the next evolution of Breach and Attack Simulation (BAS) and Continuous Threat Exposure Management (CTEM). Learn how AEV helps organizations move beyond endless …
…
continue reading
1
Ep. 22 - Scattered Spider's Declaration of War: Deconstructing the Threat
12:00
12:00
Play later
Play later
Lists
Like
Liked
12:00In this urgent episode of The Cyber Resilience Brief, host Tova Dvorin and Adrian Culley, Offensive Security Engineer at SafeBreach, break down the shocking manifesto released by Scattered Spider — also known as Lapsus$ and ShinyHunters — the same threat group now linked to the Jaguar Land Rover cyberattack that’s suspected to have Russian ties. As…
…
continue reading
1
The Google Exec Reinventing Search in the AI Era
33:56
33:56
Play later
Play later
Lists
Like
Liked
33:56Every day, billions of searches flow through Google, making it not just the world’s most popular search engine, but one of history’s most valuable products. Yet for the first time in nearly 30 years, the company’s dominance is under threat. Generative artificial intelligence tools like Open AI’s ChatGPT and Perplexity are changing how people find i…
…
continue reading
1
Ep. 21 - The October Wake-Up Call: Awareness is Not Enough
6:43
6:43
Play later
Play later
Lists
Like
Liked
6:43October may be Cybersecurity Awareness Month, but as SafeBreach experts Tova Dvorin and Adrian Culley reveal, awareness alone doesn’t stop attackers. In this kickoff episode of our special four-part Cyber Month series, we explore why traditional awareness training and annual penetration tests aren’t enough in today’s rapidly evolving threat landsca…
…
continue reading
1
Ep. 20 - Changing Faces: Inside the BianLian Cybercrime Operation
9:23
9:23
Play later
Play later
Lists
Like
Liked
9:23In this episode of The Cyber Resilience Brief, we expose the tactics of one of today’s most agile and financially motivated threat groups: BianLian. Originally known for double extortion ransomware, BianLian rapidly pivoted to pure data theft and extortion—making them harder to stop and faster to profit. SafeBreach offensive security engineer Adria…
…
continue reading
1
Condoleezza Rice on Beating China in the Tech Race: 'Run Hard and Run Fast'
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05Condoleezza Rice’s experience navigating geopolitical tensions and uncertainty gives her a background few people have. The former secretary of state currently leads the Hoover Institution at Stanford University and is a founding partner at Rice, Hadley, Gates & Manuel LLC, a strategic consulting firm. On this week’s episode of Bold Names, she speak…
…
continue reading
1
Easy Fixes! Keeping Gov't Going, Safer Mail Delivery, Live Taps at Military Funerals
8:47
8:47
Play later
Play later
Lists
Like
Liked
8:47This is a bit longer than my last podcast ie. "Don't Pay China, Use that Money to Prevent US Shut Down. Visit nUSPS.com and ImpeachthePres.com Facebook.com/StateoftheUSPS My youtube page was deleted when I connected DeJoy to boEing part supplies and was going to connect with Whistleblower John Barnett who was found dead. RIP but it was YouTube.com/…
…
continue reading
1
Keep Gov't Open with Moeney MArked for China; create our own TikTok (PicPocketUSA) using Laid Off Engineers and AI
4:07
4:07
Play later
Play later
Lists
Like
Liked
4:07Ask yourselves... WHY would T'rump want to GIVE China money? Reimbursement for Tariffs paid to the USA? (562)804-5625 KaRi from ThePrimeSpot.com nUSPS.com ImpeachthePres.com URL is For Sale but see where it leads!
…
continue reading
1
Ep. 19 (Special) - The US Government Shutdown and CISA: Erosion of Alert Capabilities
9:32
9:32
Play later
Play later
Lists
Like
Liked
9:32As the US government shutdown begins, critical questions emerge about how funding instability threatens the nation’s cyber defense. In this urgent episode of The Cyber Resilience Brief, Tova and Adrian unpack the “dual threat” facing CISA: the looming expiration of the Cybersecurity Information Sharing Act of 2015, and deep budget cuts that could d…
…
continue reading
1
Ep. 18 - From Logs to Insights: The Power of Parsers in Detection Engineering
12:28
12:28
Play later
Play later
Lists
Like
Liked
12:28In this episode of the Cyber Resilience Brief, we dive into detection engineering and one of its most powerful tools: parsers. SafeBreach experts Jonathan Tillman and Shachaf Raviv share how parsers transform raw logs into actionable insights, enabling organizations to scale detection engineering, customize security validation, and integrate seamle…
…
continue reading
1
The Google-Backed Startup Taking on Elon Musk in Humanoid Robotics
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46Who will take care of you in old age? Jeff Cardenas, the CEO and co-founder of Apptronik, says the answer is robots. The startup founder set out to build a smart, dexterous robot after watching his grandfathers grow old and dependent in their later years. Beyond healthcare, Cardenas sees robots as essential to U.S. economic growth and national secu…
…
continue reading
1
Ep. 17 - Inside the Dark Web: Lessons Hackers Teach Us About Cyber Resilience
14:36
14:36
Play later
Play later
Lists
Like
Liked
14:36Step inside the hidden world of the dark web with SafeBreach’s Cyber Resilience Brief. In this episode, Senior Sales Engineer Hudney Piquant shares eye-opening stories from his explorations into hacker forums and ransomware recruitment pipelines. Discover: How cybercrime groups like Conti operate more like corporations than chaos-driven collectives…
…
continue reading
1
How the U.S. Stacks Up to China’s ‘Engineering State’
38:25
38:25
Play later
Play later
Lists
Like
Liked
38:25The relationship between the U.S. and China is typically framed as competitive and even adversarial. Each superpower brings strengths and weaknesses to how it approaches its society, business and growth. In his new book "Breakneck: China's Quest to Engineer the Future," author and China expert Dan Wang, frames the key differences between the two su…
…
continue reading
1
Ep 16. - Malicious Listeners in Ivanti EPMM: Breaking Down CISA’s AR25-261A Report
8:58
8:58
Play later
Play later
Lists
Like
Liked
8:58In this urgent episode of The Cyber Resilience Brief, host Tova Dvorin and SafeBreach’s Adrian Culley analyze the brand-new CISA AR25-261A report detailing malicious listeners in Ivanti Endpoint Manager Mobile (EPMM). We break down how attackers are exploiting CVE-2025-4427 and CVE-2025-4428, using sophisticated base64-encoded payload delivery to e…
…
continue reading
1
Ep 15 - Inside the Web of Scattered Spider: Social Engineering at Scale
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47Scattered Spider — also known as UNC3944, Oktapus, and Muddled Libra — has quickly become one of today’s most notorious cybercriminal groups. From high-profile breaches at MGM Resorts and Caesars Entertainment to attacks on retailers and airlines, their tactics show that the biggest threat isn’t always malware — it’s social engineering. In this epi…
…
continue reading
1
Why IBM's CEO Thinks His Company Can Crack Quantum Computing
35:19
35:19
Play later
Play later
Lists
Like
Liked
35:19After spending much of the 2010s in the doldrums, IBM has made something of a comeback in the past five years under the leadership of CEO Arvind Krishna. That's thanks to a lot of the success in its hybrid cloud business, as well as its consulting services. All of this has led to a surge in the company's share price. Now, IBM is betting that quantu…
…
continue reading
1
Ep. 14 - NIS2 Directive Explained: Strengthening Cyber Resilience Across Europe and Beyond
18:45
18:45
Play later
Play later
Lists
Like
Liked
18:45The EU’s NIS2 Directive is reshaping the global cybersecurity landscape with sweeping requirements for essential and important entities, strict reporting obligations, and substantial penalties for non-compliance. In this episode of Cyber Resilience Brief, host Tova Dvorin is joined by Adrian Culley, Senior Sales Engineer at SafeBreach and EU/UK reg…
…
continue reading
Every day, Wall Street Journal journalists talk with the most powerful, influential and interesting people. WSJ columnists Christopher Mims and Tim Higgins are bringing some of those conversations directly to you. Bold Names returns with new episodes on Fridays starting September 12 on YouTube and wherever you get your podcasts. Let us know what yo…
…
continue reading
1
Ep. 13 - Proactive Security vs. Dragonfly: Using BAS, AEV & CART to Outpace Adversaries
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45In this episode of the Cyber Resilience Brief, co-hosts Tova Dvorin and Adrian Culley dive into the FBI’s recent PSA 25820 alert on Dragonfly (a.k.a. Energetic Bear, Static Tundra) — one of the most persistent, state-sponsored Russian cyber espionage groups targeting critical infrastructure and industrial control systems (ICS). We break down Dragon…
…
continue reading
1
Ep 12 - Women in Cyber: Voices of Resilience and Change
24:21
24:21
Play later
Play later
Lists
Like
Liked
24:21What’s it really like to be a woman in cybersecurity in 2025? In this special International Women in Cyber Day episode, SafeBreach leaders and team members share candid stories of resilience, representation, and mentorship. Hear how they balance career and family, tackle technical challenges, and empower future generations to step into cyber with c…
…
continue reading
1
Ep. 166: The One Where Maya Goes to Forks
1:04:41
1:04:41
Play later
Play later
Lists
Like
Liked
1:04:41FORKS, WASHINGTON. Can you believe it?! Write to us at [email protected]. Join the Coven! Follow us to catch our updates or subscribe for bonus eps and stickers over at Patreon.com/TwilightPhasePodcast. Please rate, review, and subscribe, and follow us @Twilight_Phase on Twitter and Instagram, Twilightphasepodcast.tumblr.com…
…
continue reading
1
From AI and Defense Tech, to Tariffs and the New Streaming Wars: The Best of Bold Names
48:03
48:03
Play later
Play later
Lists
Like
Liked
48:03WSJ’s Christopher Mims and Tim Higgins take a trip into the Bold Names podcast archives. They’ve covered everything from artificial intelligence and humanoid robots, to the online sports betting industry and the new streaming wars. Check out highlights from some of their favorite interviews. Plus, Tim and Christopher look back on what made these co…
…
continue reading
1
Ep 11 - Salt Typhoon Exposed: Breaking Down CISA Advisory AA25-239
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55In this special episode of The Cyber Resilience Brief, hosts Tova Dvorin and Adrian Culley unpack the newly released CISA Advisory AA25-239, a joint warning from CISA, NSA, FBI, and international partners on the persistent Chinese state-sponsored threat group known as Salt Typhoon. Salt Typhoon has been quietly infiltrating critical infrastructure …
…
continue reading
1
Ep. 10 - Beyond CVEs: Why Patching Isn’t Enough to Stop Breaches
19:20
19:20
Play later
Play later
Lists
Like
Liked
19:20Most security teams are laser-focused on patching CVEs, but does that guarantee protection? In this episode, SafeBreach Co-Founder & CTO Itzik Kotler and VP of Sales Engineering Michael De Groat unpack the real risks that slip through even the most rigorous vulnerability management programs. From misconfigurations and overly-permissioned identities…
…
continue reading
1
Ep 9 - Inside Volt Typhoon: Defending Against Chinese State-Sponsored Cyber Threats
13:55
13:55
Play later
Play later
Lists
Like
Liked
13:55In this episode of The Cyber Resilience Brief, host Tova Dvorin and SafeBreach Senior Sales Engineer Adrian Culley dissect the stealthy tactics of Volt Typhoon, a Chinese state-sponsored cyber group targeting critical infrastructure worldwide. Learn how their “living off the land” techniques bypass traditional defenses, what indicators of compromis…
…
continue reading