Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
…
continue reading
Firewall Podcasts
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Where we talk and discuss what the great firewall of China is, and the ethics of it Cover art photo provided by JJ Ying on Unsplash: https://unsplash.com/@jjying
…
continue reading
Stay up to date with the Go community in about 15 minutes per week
…
continue reading
Training of Aria Technologies products including Ericsson-LG, Lancom Systems, Star Leaf, So Connect, Jabra, xmedius, Checkpoint, NBN, iPECS2Teams
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
A great WordPress.com site
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
In a world marked by wicked social problems, The Minefield helps you negotiate the ethical dilemmas, contradictory claims and unacknowledged complicities of modern life.
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Hosted by planetary scientist and astrobiologist Dr. Michael L. Wong, Strange New Worlds examines science, technology, and culture through the lens of Star Trek!
…
continue reading
5 Bytes Podcast features some of the highlights in enterprise IT for the last week as well as some useful resources for IT Pros and more!
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
A weekly podcast about life, technology, entertainment, and business in general. Things in our focus: deep tech, mental health, community initiatives, artificial intelligence, blockchain, gaming and gambling, esports, augmented reality, virtual reality, marketing, creative thinking, fintech, and many more. The talks are hosted by Zoltan "Hawkie".
…
continue reading
Join Jason Esposito and Ben Cartland as they explore the deeper questions behind Jason's sermons at Crossway Church, a "community for the curious".
…
continue reading
Crypto Weekly Recap is your go-to podcast for the latest news, trends, and developments in the cryptocurrency world. From major market moves to emerging projects and regulatory updates, we break it all down. Stay informed, stay ahead, and join us as we navigate the fast-paced world of crypto!
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
👋 Welcome to Bizionic Technology Pvt Ltd! We specialize in providing top-notch Hire Talent, Marketing, Technologies, Cloud Consulting Services, and Security Solutions. Don't forget to check out our podcast for valuable insights. Visit our website at https://www.bizionictech.com for more information. Let's innovate together! 💡 #BizionicTech #InnovateWithUs
…
continue reading
David Bombal interviews people in the networking world to learn about life, hacks, technology and networking and ways to improve your life!
…
continue reading
An exploration of the UAP - UFO phenomenon and the associated "high strangeness" which accompanies it from the standpoint of analysts and researchers. Fortean Winds is a collective of data and research professionals who began a project in 2020 to better understand the UFO/UAP phenomenon from the perspective of existing research and evidence. After a few years study and note taking (which you can see at our website https://www.forteanwinds.com) , we're ready to discuss our notes and insights ...
…
continue reading
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
…
continue reading
Global Bob who is a cyber security expert and political science hobbyist brings you a show that fuses these topics together to explain in simple terms the interaction between the two. He uses his years of experience in both the government, commercial and private sector to give a unique perspective on these topics.
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Presented by Henry K, The #1 Apple Music History Podcast Rootsland is a series that explores the story of two friends who take a musical and spiritual journey from the suburbs of Long Island to the streets of Kingston, Jamaica. Narrated by the man himself, Henry “K” Karyo, Rootsland tells musical stories of landscapes that span styles and genres, and transport the listeners to exotic locations. The story follows Henry, a disillusioned justice major at American University, and Brian, an aspir ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
VCD Roundtable is a currently monthly Web-/Podcast where a group of VMware Cloud Director experts from VMware, Partners and Service Providers get together to discuss technical challenges, industry trends and how to build a better cloud platform.
…
continue reading
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
…
continue reading

1
ServiceNow, APTs & McDonald’s?! Cyber Madness
54:23
54:23
Play later
Play later
Lists
Like
Liked
54:23In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss various cybersecurity topics, including a vulnerability in ServiceNow that allowed unauthorized data access, the implications of North American APTs attacking China using Exchange Zero Day exploits, and a significant security flaw in McDonal…
…
continue reading
Your cell phone number uniquely identifies you. Many companies rely on this 1-to-1 relationship to authenticate you to their systems. So if someone were to somehow manage to steal your mobile phone number – a hack called SIM swapping – they could use that to impersonate you and compromise any of your accounts that are validated via SMS or phone cal…
…
continue reading
Fortinet patches a critical flaw in its FortiWeb web application firewall. Hackers are exploiting a critical vulnerability in Wing FTP Server. U.S. Cyber Command’s fiscal 2026 budget includes a new AI project. Czechia’s cybersecurity agency has issued a formal warning about Chinese AI company DeepSeek. The DoNot APT group targets Italy’s Ministry o…
…
continue reading

1
OCI Web Application Firewall for Detroit Security
6:50
6:50
Play later
Play later
Lists
Like
Liked
6:50OCI Web Application Firewall is the top choice in this episode as Bizionic Tech compares it with AWS and Azure to determine what's best for Detroit’s cybersecurity needs. Tune in to explore why OCI WAF stands out for local enterprises—from performance and scalability to pricing and compliance. 🔒 Don’t miss this crucial insight—Listen now and secure…
…
continue reading

1
Beyond the Firewall | Episode 7 - Training the Next Generation of Electricians
48:31
48:31
Play later
Play later
Lists
Like
Liked
48:31Join us in this episode of "Beyond the Firewall" as we dive into the world of construction and electrical contracting with Eli Posnikoff, President of Spark Forward. With over 25 years of experience, Eli shares his journey from aspiring electrician to business owner, discusses current industry trends, and explores the challenges and opportunities i…
…
continue reading
It’s hard to imagine anything less glamorous than government procurement, but that’s exactly why August Chen was drawn to it. The CEO and co-founder of Hazel talks to Bradley about the power of AI to modernize the purchase of billions upon billions of goods and services every year. Chen, who cut his teeth at Palantir, explains why legacy systems ar…
…
continue reading

1
Scam Season: Fake Cops, AI Crooks & Crypto Firewalls
10:17
10:17
Play later
Play later
Lists
Like
Liked
10:17This week, the dark side of crypto goes global. From call center scammers posing as police to deepfake voice cons and a $540M Europol takedown, it is open season on your digital wallet. We break down the latest tactics, real-life horror stories, and why smart self-custody is your only shield.Plus, how $HUNDRED’s 100-hour lock saved a wallet from be…
…
continue reading

1
Emotional Firewalls: Mastering EQ to Outsmart Global Cyber Threats
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10Cybercrime Junkies Podcast interviews former NATO specialist and international intelligence expert, Nadja El Fertasi, about the role played by emotional intelligence in cyber security and Emotional Intelligence in AI. We discuss emotional firewalls, learning EQ (emotional intelligence) and how it can stop social engineering attacks, how internation…
…
continue reading

1
Windows Update Causing Firewall Error! Patch Tuesday News! Grok Goes Crazy!
19:15
19:15
Play later
Play later
Lists
Like
Liked
19:15I cover the latest Patch Tuesday news, more metrics on Windows 11 adoption, some InfoSec stories and much more!Reference Links:https://www.rorymon.com/blog/windows-update-causing-firewall-error-patch-tuesday-news-grok-goes-crazy/By Rory Monaghan
…
continue reading

1
Episode 27 - Strengthening Your Human Firewall: How to Spot and Avoid Online Scams
33:02
33:02
Play later
Play later
Lists
Like
Liked
33:02Send us a text Navigating today's digital landscape requires more than just technical knowledge—it demands a vigilant "human firewall" to protect yourself from increasingly sophisticated scams. With cyber attacks occurring every 39 seconds and scam operations projected to reach a staggering $12 trillion by 2025, understanding these threats has neve…
…
continue reading

1
#499: Your firewall won't save you from this 😱
43:40
43:40
Play later
Play later
Lists
Like
Liked
43:40Big thanks to Radware for sponsoring this video and sharing technical insights with us! David Bombal talks with Michael Geller (Radware) and Tim Sherman (Cisco) about how smart devices like fridges, cars, and cameras are being hijacked for DDoS attacks. They explain Web DDoS, encrypted Layer 7 threats, and how attackers bypass traditional firewalls…
…
continue reading

1
Firewalls, Real Threats & Why Cybersecurity Isn’t Just for IT Anymore
48:06
48:06
Play later
Play later
Lists
Like
Liked
48:06Send us a text Cybersecurity isn’t just IT’s problem anymore—it's everyone’s business. In this episode, we’re joined by Martin Stoefler, Co-Founder of OSM Solutions, to unpack why the human element is just as critical as the tech in today’s security landscape. From building tailored defense strategies to translating Capture The Flag training into r…
…
continue reading

1
NB534: Arista Late to SD-WAN Party but Ready to Dance; CoreWeave Acquires GPUs, Gigawatts for $9 Billion
50:31
50:31
Play later
Play later
Lists
Like
Liked
50:31Take a Network Break! We start with listener follow-up on Arista market share in the enterprise, and then sound the alarm about a remote code execution vulnerability in Adobe Experience Manager. On the news front, Arista buys VeloCloud to charge into the SD-WAN market, CoreWeave acquires a cryptominer to get access to GPUs and electricity... Read m…
…
continue reading

1
CYFIRMA Research- GitHub Abused to Spread Malware Disguised as Free VPN
5:19
5:19
Play later
Play later
Lists
Like
Liked
5:19CYFIRMA Research's latest report explores a fake "Free VPN for PC" app hosted on GitHub, delivering a packed DLL payload using obfuscated Base64 hidden in junk strings. It uses P/Invoke to load a hidden DLL, executes GetGameData, and injects into legit processes like MSBuild.exe. Packed, evasive, and anti-debug. Link to the Research Report: https:/…
…
continue reading

1
Epstein’s Web: Mapping the Crime, Influence & Disinfo Machine
38:17
38:17
Play later
Play later
Lists
Like
Liked
38:17Send us a text In Episode 35 of Fortean Winds, we take you deep into the Jeffrey Epstein saga—one of the most brazen cover-ups of our time—and show how money, influence, and raw power build a misinformation machine: The Infrastructure of Corruption We discuss Epstein’s inner circle—lawyers, bankers, powerful friends—and reveal the financial arterie…
…
continue reading

1
SANS Stormcast Monday, July 14th, 2025: Suspect Domain Feed; Wing FTP Exploited; FortiWeb Exploited; NVIDIA GPU Rowhammer (#)
6:54
6:54
Play later
Play later
Lists
Like
Liked
6:54SANS Stormcast Monday, July 14th, 2025: Suspect Domain Feed; Wing FTP Exploited; FortiWeb Exploited; NVIDIA GPU Rowhammer Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspi…
…
continue reading

1
LIVE: They’re Stealing You with AI 😳 | AI Risks to Identity & How to Fight Back
1:27:24
1:27:24
Play later
Play later
Lists
Like
Liked
1:27:24If you manage care about protecting yourself, your loved ones—and your organization-- this episode offers actionable takeaways you can use today. This is part of our official Cyber Crime Junkies podcast series—subscribe wherever you listen! ✅ **Don’t forget to like, subscribe, and hit the bell 🔔.** 💬 Comment your “worst phishing attempt” below—I’ll…
…
continue reading

1
Building a Cybersecurity Mindset: AI, Culture, & Governance Explained
43:43
43:43
Play later
Play later
Lists
Like
Liked
43:43David Mauro and DeWayne Hart explore the critical aspects of building a cyber security mindset, understanding cyber security awareness, internet governance in cyber security, and importance of culture in cybersecurity. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 …
…
continue reading

1
🤌 The Gopherfather: Go 1.25, slog multihandlers, and more, capisce?
35:49
35:49
Play later
Play later
Lists
Like
Liked
35:49Go 1.24.5 and Go 1.23.11 are released Go 1.25 Release Candidate 2 is released 🇿🇦 GopherCon South Africa, Aug 6-7 Online Go Blog: Generic Interfaces by Axel Wagner Proposals 🪵 New: log/slog: add multiple handlers support for logger 👉 New: spec: expression to create pointer to simple types Video: 10 Things I Hate About Go urfave/cli: a declarative, s…
…
continue reading

1
MK Palmore: Lead from where you stand. [CISO] [Career Notes]
9:10
9:10
Play later
Play later
Lists
Like
Liked
9:10Please enjoy this encore of Career Notes. Director of Google Cloud's Office of the CISO, MK Palmore, dedicated much of his life to public service and now brings his experience working for the greater good to the private sector. A graduate of the US Naval Academy, including the Naval Academy Prep School that he calls the most impactful educational e…
…
continue reading
Today we are joined by Selena Larson, Threat Researcher at Proofpoint, and co-host of Only Malware in the Building, as she discusses their work on "Amatera Stealer - Rebranded ACR Stealer With Improved Evasion, Sophistication." Proofpoint researchers have identified Amatera Stealer, a rebranded and actively developed malware-as-a-service (Maa…
…
continue reading
Scott Augenbaum, retired FBI Agent in the Cyber Division shares his truths framework about the FBI vs Cyber Crime and the fbi perspective of cyber crime. Topics: fbi perspective of cyber crime, fbi view of cyber crime, explaining the fbi stance on cyber crime, lessons learned from fbi on cyber crime, lessons on cyber crime from fbi, war between the…
…
continue reading

1
SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches; (#)
5:49
5:49
Play later
Play later
Lists
Like
Liked
5:49SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches; SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this partic…
…
continue reading
UK police make multiple arrests in the retail cyberattack case. French authorities arrest a Russian basketball player at the request of the U.S. A German court declares open season on Meta’s tracking pixels. The European Union unveils new rules to regulate artificial intelligence. London’s Iran International news confirms cyberattacks from Banished…
…
continue reading

1
Episode 28 - Weather Wizards: The Science and Controversy of Climate Manipulation
32:32
32:32
Play later
Play later
Lists
Like
Liked
32:32Send us a text Weather manipulation has long been a fascinating intersection of science, politics, and controversy. From the ambitious Project Storm Fury of the 1960s, which attempted to weaken hurricanes by seeding them with silver iodide, to modern cloud seeding operations across the American West, humans have persistently sought ways to control …
…
continue reading

1
From Mechanic to Cybersecurity Boss Ft. Edgar Vanterpool
41:12
41:12
Play later
Play later
Lists
Like
Liked
41:12In this episode of The Other Side of the Firewall, Ryan Williams Sr. and Edgar Vanterpool discuss Edgar's unique journey from the automotive industry to becoming a Business Information Security Officer (BISO). They explore the skills required for the role, the importance of understanding business needs in cybersecurity, and the balance between tech…
…
continue reading

1
SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches; (#)
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches; Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20…
…
continue reading
Patch Tuesday. An Iranian ransomware group puts a premium on U.S. and Israeli targets. Batavia spyware targets Russia’s industrial sector. HHS fines a Texas Behavioral Health firm for failed risk analysis. The Anatsa banking trojan targets financial institutions in the U.S. and Canada. Hackers abuse a legitimate commercial evasion framework to pack…
…
continue reading