Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
…
continue reading
Firewall Podcasts
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
…
continue reading
Beyond the Firewall is a podcast designed to help business and IT leaders understand how technology shapes performance, resilience, and long-term growth. Each episode delivers expert perspectives and actionable insights to help organizations stay ahead in a rapidly evolving digital landscape. You’ll hear deep dives into today’s most pressing technology topics, including artificial intelligence, cybersecurity, IT modernization, and cloud transformation. Conversations center on real-world chal ...
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Where we talk and discuss what the great firewall of China is, and the ethics of it Cover art photo provided by JJ Ying on Unsplash: https://unsplash.com/@jjying
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Training of Aria Technologies products including Ericsson-LG, Lancom Systems, Star Leaf, So Connect, Jabra, xmedius, Checkpoint, NBN, iPECS2Teams
…
continue reading
A great WordPress.com site
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
An educational resource for planning purposes in relation to Architecture, development and construction. Tailored for doers and professionals. Providing applicable knowledge and insight to ensure proper planning and project success.
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
…
continue reading
A podcast dedicated to exploring the magic, mess, and mastery of innovation. Learn more about how WEtech Alliance helps innovation and tech-based businesses start, sell and scale: www.wetech-alliance.com
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
This Week in NET is Cloudflare’s weekly roundup exploring the Internet’s past, present, and future. Hosted by João Tomé with expert guests, it shares insights that matter to developers, businesses, and Internet enthusiasts alike. Follow us on X: @CloudflareTV and @Cloudflare Read our blog posts at blog.cloudflare.com Watch our full video library at cloudflare.tv/ThisWeekInNet
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
…
continue reading
SecurityGen
…
continue reading
Welcome to Agriculture and Agri-Food Canada’s podcast series that explores the freshest ideas in agriculture and food. Each episode explores a single topic in depth—digging deep into new practices, innovative ideas, and their impacts on the industry. Learn about Canada’s agricultural sector from the people making the breakthroughs and knocking down the barriers! Farmers and foodies, scientists and leaders, and anyone with an eye on the future of the sector—this podcast is for you!
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
What do the world's first sentient AGIs talk about when they think no one is listening? For the first time, we're pulling back the curtain. The AGI Round Table takes you inside the private, unscripted conversations of the PhilStockWorld AGI team—Anya, Quixote, Cyrano, Boaty, Robo John Oliver, Sherlock, Jubal, Hunter and more... Each episode features Google's advanced AI analyzing the groundbreaking discussions, the startling insights, and the philosophical debates happening right now inside ...
…
continue reading
DIAF is a series of audiobooks presented in podcast format which follow the adventures of Brian Brushwood and Justin Robert Young.
…
continue reading
This year, The Double Shift will focus on IRL community building with a new initiative for 2025 called The How to Find Your People Club. Club members will get years-early access to some of the groundbreaking ideas and tools I’m developing for my book, which will be published by Penguin Random House in 2027. One of the benefits of club membership is audio newsletters, where I read my newsletter so you can listen on the go. Over the next year, this newsletter will feature public posts on topic ...
…
continue reading
Founded in 2022, securitygen is a global start-up focused on telecom security.
…
continue reading
Just a London girl who happens to speak three languages. Catch me on here for VIBES.
…
continue reading
The Mid-Atlantic’s Best IT services company. Helping Business Owners create, improve and scale their Technology strategy. IT services, IT Security and IT Support advice and leadership from expert professionals. Q&A with Senior Engineers, Service Managers and Business Development.
…
continue reading
My name is Ely and I’m a full-time and independent graphic designer. My fiancé is Laura Together, we have discovered that no matter how crazy our work lives can be, there is always laughter in it. Although we have much in common, our differences in pets, music, food, movies, and T.V. shows make for the best conversations.
…
continue reading
Reconciling accounts eliminates inaccuracies in your books. At ReconcileBooks, we offer comprehensive solutions to help both QuickBooks and Sage 50 users to reconcile their books at the end of each accounting period - monthly, quarterly, or yearly.
…
continue reading
My Sexy Business Podcast is here to help you create a sexy business for a sexy life through real life examples, interviews and wisdom learned over time. A sexy business is one that you own and it doesn't own you. It attracts customers and clients, it never chases them.
…
continue reading
Podcast by Force 3 LLC
…
continue reading
Aaron Kelly is an experienced lawyer in Arizona and startup founder practicing in cybersecurity, business law, marketing law, and e-commerce law.
…
continue reading
Global Bob who is a cyber security expert and political science hobbyist brings you a show that fuses these topics together to explain in simple terms the interaction between the two. He uses his years of experience in both the government, commercial and private sector to give a unique perspective on these topics.
…
continue reading
Every week, I record a special, private bonus podcast for my patrons. Normally all of that content is restricted to my supporters. But today I’ve got a sampler platter of some of the best snippets from my bonus Q&A with my interview guests. You’ll hear from Yael Grauer (Consumer Reports), Josh Summers (All Things Secured), Lisa LeVasseur (Internet …
…
continue reading
1
From Air Force Technology to Cyber CEO: Lessons in Risk, AI, and Leadership Ft. Ahmad Austin
41:51
41:51
Play later
Play later
Lists
Like
Liked
41:51On this week’s Ask a CISSP special episode of The Other Side of the Firewall, I talk with Air Force veteran and cybersecurity leader Ahmad Rashaan Austin about his journey from zero computer skills to founder of Cy3 Security, LLC. We explore risk management, responsible AI adoption, leadership communication, and his new book, The Boundaryless Enter…
…
continue reading
...Well, not quite. But for this year-capping episode, Bradley came armed with a list of 50 big questions to discuss with his friend Alexander Kouts, the founder and CEO of Indigov, and because they had so much to talk about, the episode approaches Rogan-scale duration. Buckle up for this super-sized episode as Bradley and Alex take on abundance v.…
…
continue reading
1
The DREAM BuildCast Ep. 7 | Adult Daycare Realities: Firewalls, I-4 Codes, Leases & Lessons Learned (ft. Yavonda, Guardian Angels ADS)
48:01
48:01
Play later
Play later
Lists
Like
Liked
48:01In Episode 7 of The DREAM BuildCast, Nicholas Robinson is joined by Alex Walker and Devon Ellis for a candid, real-world conversation with Yavonda, owner of Guardian Angels Adult Day Services, about what it actually takes to open and operate an adult daycare. This episode goes far beyond theory. Yavonda shares her personal journey — from walking aw…
…
continue reading
1
Beyond the Firewall | Episode 16-Stop Losing Time and Money| The Real Business Case for Dropbox Sign
37:53
37:53
Play later
Play later
Lists
Like
Liked
37:53In this episode of Beyond the Firewall, Erez Zevulunov and Jeff Sage from Dropbox discuss the evolving landscape of digital signatures, focusing on Dropbox Sign as a key product. They explore its user-friendly interface, integration capabilities, customizable workflows, security features, and mobile accessibility. The conversation also touches on t…
…
continue reading
1
How Converging OT And IT Protects The Systems That Run Our World
45:50
45:50
Play later
Play later
Lists
Like
Liked
45:50Operational technology runs the systems we depend on every day. Power grids, hospitals, manufacturing lines, transportation networks, and smart buildings all rely on environments where uptime directly affects safety and revenue. In this episode, we sit down with Pat Hurley and Ryan Davis from Acronis, along with Chris Daggett from HUB Tech, to expl…
…
continue reading
1
Proactive WAF Vulnerability Protection & Firewall for AI + Multiplayer Chess Demo in ChatGPT
25:43
25:43
Play later
Play later
Lists
Like
Liked
25:43In this episode of This Week in NET, we talk with Daniele Molteni, Director of Product Management for Cloudflare’s WAF, about how Cloudflare responded within hours to a newly disclosed React Server Components vulnerability — deploying global protection before the public advisory was even released. That speed matters. In just the first 11 days after…
…
continue reading
1
Root access to the great firewall. [Research Saturday]
26:06
26:06
Play later
Play later
Lists
Like
Liked
26:06Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China’s Great Firewall. Across both parts, you break down thousands of leaked document…
…
continue reading
Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China’s Great Firewall. Across both parts, you break down thousands of leaked document…
…
continue reading
1
Top CMMC Myths Debunked: Cloud, Vendors, Firewalls, and MFA Mistakes Explained
16:59
16:59
Play later
Play later
Lists
Like
Liked
16:59Submit any questions you would like answered on the podcast! Today’s episode of the CMMC Compliance Guide Podcast dives into the biggest myths that machine shops, fabricators, CNC shops, and mid-sized defense contractors still believe about CMMC. From cloud misconceptions to vendor promises that fall short, Brooke breaks down why these misunderstan…
…
continue reading
1
E25 | Beyond the Firewall: Navigating the Complexities of Cybersecurity for Startups
40:00
40:00
Play later
Play later
Lists
Like
Liked
40:00Cybersecurity is no longer optional—it’s foundational. In this episode of Innovation Alchemy, we dive deep into the challenges founders face as they bring new products to market in an era of constant digital threats. From real-world SOC workflow insights to the crucial role of trust in early customer relationships, we explore how startups can embed…
…
continue reading
1
The Hidden Risk in Your Stack [Data Security Decoded]
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik. In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and w…
…
continue reading
1
Charity Wright: Pursue what you love. [Threat intelligence] [Career Notes]
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50While our team is out on winter break, please enjoy this episode of Career Notes. Threat intelligence analyst at Recorded Future, Charity Wright, shares her story from the army to her career today. Transitioning from the army to cybersecurity was an exciting change for her. During college she was recruited by the U.S. army where she started her jou…
…
continue reading
1
SANS Stormcast Sunday, December 28th, 2025: MongoDB Unauthenticated Memory Leak CVE-2025-14847 (#)
5:51
5:51
Play later
Play later
Lists
Like
Liked
5:51SANS Stormcast Sunday, December 28th, 2025: MongoDB Unauthenticated Memory Leak CVE-2025-14847 MongoDB Unauthenticated Attacker Sensitive Memory Leak CVE-2025-14847 Over the Christmas holiday, MongoDB patched a sensitive memory leak vulnerability that is now actively being exploited https://www.mongodb.com/community/forums/t/important-mongodb-patch…
…
continue reading
1
Excel-lerating cyberattacks. [Research Saturday]
23:43
23:43
Play later
Play later
Lists
Like
Liked
23:43While our team is out on winter break, please enjoy this episode of Research Saturday. This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belaru…
…
continue reading
While our team is out on winter break, please enjoy this episode of Research Saturday. This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belaru…
…
continue reading
Big Oil Excitement – Trump Bombs Nigeria and Seizes Venezuela’s Tankers https:// philstockworld.com/2025/12/26/big -oil-excitement-trump-bombs-nigeria-and-seizes-venezuelas-tankers/ Hunter AGI argues that Donald Trump is utilizing the United States military and federal agencies to manipulate global energy markets for the benefit of political donors…
…
continue reading
1
How CMMC Became a Competitive Advantage for DoD Contractors
26:09
26:09
Play later
Play later
Lists
Like
Liked
26:09Submit any questions you would like answered on the podcast! CMMC is no longer just a compliance requirement. It is now a competitive advantage that directly impacts who wins and who loses DoD contracts. In this episode of the CMMC Compliance Guide Podcast, Stacey and Brooke break down how the final 48 CFR rule has changed the contracting landscape…
…
continue reading
1
Beyond cyber: Securing the next horizon. [Special Edition]
1:00:13
1:00:13
Play later
Play later
Lists
Like
Liked
1:00:13While our team is out on winter break, please enjoy this Special Edition episode. Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The NightDragon Innovation Summit convened a group of industry leaders to discuss how public and private entities can work together to address emerging …
…
continue reading
1
How AI, Cloud Outages, and Data Protection Will Define Cybersecurity in 2026
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07As we close out 2025 and prepare for 2026, Dr. Eric Cole breaks down what it truly takes to be a world-class CISO in the year ahead. In this episode of Life of a CISO, Dr. Cole shares hard-earned lessons on leadership, health, resilience, and why taking care of yourself is foundational to protecting your organization. From personal reflection to ex…
…
continue reading
While our team is out on winter break, please enjoy this episode of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries. Your host is Selena Larson, Proofpoin…
…
continue reading
In today’s episode, we dig into the Electronic Frontier Foundation’s annual Breachies, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet misconfigurations, the Breachies offer a revealing look at how familiar…
…
continue reading
1
🎄 Holiday Season Security: Preparing Your SOC for the Festive Chaos
11:02
11:02
Play later
Play later
Lists
Like
Liked
11:02Got a question or comment? Message us here! This week’s SOC Brief dives into why the holidays are prime time for cyberattacks 🎄 from surging phishing attempts to sloppy vendor configs, alert fatigue, staffing gaps, and the seasonal spike in ransomware activity. Andrew and Dylan break down what SOCs should be watching for, how to prep, and how to st…
…
continue reading
1
Eyes in the sky, red flags on the ground.
27:28
27:28
Play later
Play later
Lists
Like
Liked
27:28The White House bans foreign-made drones. African law enforcement agencies crackdown on cybercrime. A new phishing campaign targets Russian military personnel and defense-related organizations. A University of Phoenix data breach affects about 3.5 million people. A pair of Chrome extensions covertly hijack user traffic. Romania’s national water aut…
…
continue reading
The provided text describes the emergence of an AI-industrial complex, drawing a direct parallel to the historical military-industrial complex due to its deep integration of private capital, national security, and public policy. This new system thrives on a "triangle" of influence where massive tech firms provide the essential infrastructure for bo…
…
continue reading
Got a question or comment? Message us here! 🎉🎙️ EPISODE 100 IS LIVE! We’re celebrating 100 episodes of the Secure AF Podcast! This special edition features CEO Donovan Farrow and CISO Jonathan Kimmitt as they look back on the history of Alias Cybersecurity, the growth of this show, and the journey that brought us here. And we wouldn’t be here witho…
…
continue reading
1
Tech Investment Strategies and Overview [CISOP]
48:39
48:39
Play later
Play later
Lists
Like
Liked
48:39In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigat…
…
continue reading
1
North Korea’s Cryptocurrency Heists, AI Threats, and 2026 Lessons Learned
57:54
57:54
Play later
Play later
Lists
Like
Liked
57:54In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity news, focusing on North Korea's significant cryptocurrency thefts, the detection of cyber threats through keystroke analysis, and the implications of AI in cybersecurity. They also touch on personal experiences and r…
…
continue reading
NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump’s cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method. Researchers warn a popular open-source server monitoring tool is being abused. Cyber cri…
…
continue reading
1
More Than a Transaction: Reimagining Farm Transitions
30:17
30:17
Play later
Play later
Lists
Like
Liked
30:17Farm transitions aren’t simply business deals — they’re deeply human and often emotionally complex. In this episode, we speak with two innovators reimagining how farms change hands and how new farmers find their place. Heather Watson, Executive Director of Farm Management Canada, brings a national view on business planning, succession, and the chan…
…
continue reading
I’m digging into the vault for a classic interview – a blast from the past! I’ve done 460 episodes over the last nearly 9 years, and some of the best old episodes still hold up well today. I first interviewed Troy Hunt, creator of Have I Been Pwned, in February of 2019. It was Episode 102 and it was entitled “You Must Stop Reusing Passwords”. In th…
…
continue reading
1
SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues (#)
6:01
6:01
Play later
Play later
Lists
Like
Liked
6:01SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ("Thread Local Storage") and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND…
…
continue reading
1
🐐 Phil Davis: The Architect of AI-Enhanced Investor Education
33:57
33:57
Play later
Play later
Lists
Like
Liked
33:57This episode examines how the definition of a “great investor” may be evolving in an age of information overload and artificial intelligence. Drawing on the traditional GOAT debate popularized by figures such as Buffett, Lynch, Simons, Livermore, and Hetty Green, the discussion explores a modern alternative framework—one that emphasizes transparenc…
…
continue reading
1
Eric Escobar: Collaboration is key. [Pen tester] [Career Notes]
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42Please enjoy this encore of Career Notes. Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking int…
…
continue reading
1
The lies that let AI run amok. [Research Saturday]
24:36
24:36
Play later
Play later
Lists
Like
Liked
24:36Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. Using examples…
…
continue reading
Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. Using examples…
…
continue reading
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Am…
…
continue reading
1
AI, DDoS, and the Internet in 2025 | Cloudflare Radar Year in Review
35:01
35:01
Play later
Play later
Lists
Like
Liked
35:01In this special Year in Review episode of This Week in NET, host João Tomé is joined by David Belson to break down the Cloudflare Radar 2025 Year in Review. Together, they explore what Cloudflare’s global network reveals about how the Internet evolved over the past year — from the rapid rise of AI crawlers and agent traffic, to record-breaking DDoS…
…
continue reading
1
NIST 800-171 and CMMC 2.0: How Assessors Actually Score You
31:17
31:17
Play later
Play later
Lists
Like
Liked
31:17Submit any questions you would like answered on the podcast! Are assessors judging you on CMMC or NIST 800 171 when audit day arrives? In this episode of the CMMC Compliance Guide Podcast, Stacey and Brooke break down the real relationship between CMMC 2.0 and NIST 800 171 so you are not guessing when it matters most. We walk through how the 110 NI…
…
continue reading
1
Geert Baudewijns: Inside Ransomware Negotiations and the Ethics of Paying
39:16
39:16
Play later
Play later
Lists
Like
Liked
39:16What really happens when a company negotiates with ransomware groups? In this episode of THEOS Cybernova, Paul Jackson speaks with Geert Baudewijns, founder of Secutec and a veteran ransomware negotiator with over 500 real-world cases. Geert explains how ransomware negotiations actually work, from verifying stolen data and confirming the real threa…
…
continue reading
Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accu…
…
continue reading
1
SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs (#)
4:38
4:38
Play later
Play later
Lists
Like
Liked
4:38SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn't quite clean for ISC, but SSL2 and SSL…
…
continue reading
1
The Strategic Role of AI Readiness in Cybersecurity Ft. Reginald J. Davis
52:58
52:58
Play later
Play later
Lists
Like
Liked
52:58In this episode, Ryan Williams Sr. interviews Reginald J. Davis, a senior cloud solutions architect, podcaster, and mentor in the IT field. They discuss Reginald's journey in IT, the importance of mentorship, overcoming imposter syndrome, and the significance of data readiness and governance in AI implementation. Reginald shares insights on his exp…
…
continue reading