Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Security Conversations Podcasts
The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we’re experts. Because this is the internet, and that’s how it works now.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Bestselling author, professor and entrepreneur Scott Galloway combines business insight and analysis with provocative life and career advice. On Mondays and Fridays, Office Hours features Scott answering your questions about business, career, and life. On Tuesdays, China Decode co-hosts Alice Han and James Kynge discuss the latest economic, political and cultural news shaping China’s role on the global stage. On Wednesdays, Raging Moderates brings Scott together with political strategist and ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Canada's intelligence landscape is as unique as the country itself. In an evolving global threat environment, fostering informed discussions on intelligence has become increasingly vital to the national security discourse. Secure Line Podcast is designed to influence and inform the national dialogue on security and intelligence in Canada, and internationally. Secure Line is brought to you by the Canadian Association for Security & Intelligence Studies (CASIS).
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Shield of the Republic is a Bulwark podcast co-sponsored by the Miller Center of Public Affairs at the University of Virginia. We probe beyond the hive mind of Washington conventional wisdom on national security and foreign affairs.
…
continue reading
Teaching you all about IRAs & Roth IRAs, employer retirement plans, taxes, Social Security, Medicare, portfolio withdrawal strategies, annuities, estate planning and much more!
…
continue reading
U.S. foreign policy for the future. Security Dilemma brings you conversations with the experts, policymakers, and thinkers charting new paths forward from the wreckage of recent decades and toward a national security and defense policy guided by prudence and restraint. Cohosts John Allen Gay and A.J. Manuzzi bring you the information you need to shape a wiser approach. Security Dilemma is a podcast of the John Quincy Adams Society, an independent nonprofit organization dedicated to advancing ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Panel Discussions & Interviews
…
continue reading
Conversations with people shaping our world, from all around the globe. Listen to The Interview for the best conversations from the BBC, the world's most trusted international news provider. We hear from titans of business, politics, finance, sport and culture. Global leaders, decision-makers and cultural icons. Politicians, activists and CEOs. Each interview is around 20-minutes, packed full of insight and analysis, covering some of the biggest issues of our time. How does it work? Well, at ...
…
continue reading
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
…
continue reading
Redacted (verb): censor or obscure for legal or security purposes. [REDACTED] History is a show where we can have real, unfiltered conversations about the things that SOME FOLK don't want us to talk about. This is where we will huddle around the campfire and tell the stories of people that the textbooks forgot. Sit back, relax, and enjoy the show! If you want to support the show, come join the Patreon! https://www.patreon.com/Blackkout https://www.tiktok.com/@blackkout___ For all inquiries, ...
…
continue reading
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
…
continue reading
Unusually in-depth conversations about the world's most pressing problems and what you can do to solve them. Subscribe by searching for '80000 Hours' wherever you get podcasts. Hosted by Rob Wiblin and Luisa Rodriguez.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Forrest Hanson is joined by clinical psychologist Dr. Rick Hanson and a world-class group of experts to explore the practical science of lasting well-being. Conversations focus on the key insights from psychology, science, and contemplative practice that you need to build reliable inner strengths, overcome your challenges, and get the most out of life. New episodes every Monday.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
Carnegie Connects is our premier virtual event series hosted by Aaron David Miller. Every other week, he tackles the most pressing foreign policy issues of the day in conversations with journalists, policymakers, historians, and experts.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Love is more than you think. From the creators of Criminal. New episodes twice a month. Part of the Vox Media Podcast Network.
…
continue reading
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
…
continue reading
CyBytes is a podcast that features bite-sized conversations with tech and cybersecurity pros - sharing insights, stories, and actionable advice to help you navigate and thrive in the industry
…
continue reading
Safe Nation is an inaugural podcast curated to share insight and discussion about law enforcement, security and crime prevention with a focus on current events and honest data. Offering a fresh perspective on safety through interviews, opinions and great practical advice, join your host, retired, female state trooper Captain Nikki Renfroe. Listen as she interviews industry professionals, sharing information on how to protect yourself from danger and crimes while also bringing attention to un ...
…
continue reading
Join former House Speaker, professor, historian, and futurist Newt Gingrich as he shares his lifetime of knowledge and access to the world’s most interesting minds in a new series that covers all aspects of our society. From history to health, national security to science, Newt offers stories, conversations, and context to uncover new perspectives, knowledge and insight. This podcast isn’t about politics; it’s about exploring the past, present, and future to understand where we’ve been and w ...
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
The Irregular Warfare Podcast explores an important component of war throughout history. Small wars, drone strikes, special operations forces, counterterrorism, proxies—this podcast covers the full range of topics related to irregular war and features in-depth conversations with guests from the military, academia, and the policy community. The podcast is a collaboration between the Modern War Institute at West Point and Princeton University’s Empirical Studies of Conflict Project.
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast, and so are the conversations that shape it. Welcome to The Security Champions Podcast, the go-to resource for insights from the front lines of application security. The podcast is cohosted by Michael Burch, Director of Application Security for Security Journey, and Dustin Lehr, the Director of AppSec Advocacy. Each month, one of them shares a candid conversation with security leaders, engineering voic ...
…
continue reading
Conversations In Close Protection is a podcast about the Executive/Close Protection industry. We use the podcast to enhance discussions about the industry and promote values, information and education within the Close Protection Community and try to have fun doing it!
…
continue reading
Chain Reaction is the Foreign Policy Research Institute’s flagship network of podcast series examining the political, security, economic, and social trends shaping our world. Throughout the year we are talking with experts about developments in Russia’s war in Ukraine, the new European security order, defense and geopolitical issues in the Baltic States, as well as current and future national security challenges and opportunities in the technology and space sectors. Join us each month for: B ...
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading

1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
Play later
Play later
Lists
Like
Liked
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
continue reading

1
Gabriel Badea - Thought Leadership Interview
46:30
46:30
Play later
Play later
Lists
Like
Liked
46:30Gabriel Badea (MBA, MSc, FSyI, PSP) is a seasoned security professional, a serial entrepreneur, and high profile volunteer leader – of many leading groups in Romania and beyond. He is also a prolific researcher and author. His publications cover private security, criminology, and critical infrastructure protection. Sign up to the Security & Risk Th…
…
continue reading

1
PP080: The State of OT Risks in 2025 (and What to Do About Them)
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss ransomware impacts, ongoing risks of RDP traffic, directly exposed OT devices, and overall attack trends and the tools and processes that organizations... …
…
continue reading
In this episode of The Virtual CISO Moment, Greg Schaffer welcomes Brad Mathis, Senior Information Security Consultant at Keller Schroeder, for a wide-ranging discussion that spans four decades in technology and cybersecurity. From his early days repairing computers and catching his first virus, to leading security teams and serving as a virtual CI…
…
continue reading

1
How to protect yourself from digital identity theft with Eva Velasquez | VOICE CLONE IDENTITY THEFT
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03Identity theft affects millions of people every year — but do you really know how it works, or how to protect yourself? This week, we’re joined by Eva Velasquez, CEO of the Identity Theft Resource Center, who shares the latest trends in identity crime and what steps you can take if it ever happens to you. 🕵️♀️🔐 In Crash Course, we break down ident…
…
continue reading

1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
Play later
Play later
Lists
Like
Liked
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
continue reading

1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
Play later
Play later
Lists
Like
Liked
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
continue reading

1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
Play later
Play later
Lists
Like
Liked
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
continue reading

1
Lawfare Daily: The Justice Department as a Political Weapon
52:05
52:05
Play later
Play later
Lists
Like
Liked
52:05In a live conversation on September 29, Lawfare Senior Editor Kate Klonick spoke to Lawfare Editor in Chief Benjamin Wittes, Lawfare Senior Editor Anna Bower, and Professor of Practice at New York University Bob Bauer about the recent indictment of former FBI Director James Comey and what it says about the Trump administration’s ongoing politicizat…
…
continue reading

1
China Decode: How China Became a Tech Beacon
46:55
46:55
Play later
Play later
Lists
Like
Liked
46:55In this episode of China Decode, Scott Galloway joins Alice Han and James Kynge to break down how China’s new buzzword “involution” is shaking its economy. Then , Alice and James discuss why Beijing is courting global talent as Trump tightens U.S. visas and what it means that hip hop stars from Kanye to Travis Scott are now being welcomed onto Chin…
…
continue reading

1
3436: Tanium on People-First Cybersecurity
42:49
42:49
Play later
Play later
Lists
Like
Liked
42:49What if the biggest weakness in cybersecurity isn’t a missing tool, but a cultural blind spot? That’s the perspective of Dan Jones, Senior Security Advisor at Tanium, who joined me on Tech Talks Daily to share why he believes cybersecurity is fundamentally a people problem dressed up as a technology problem. Dan brings nearly three decades of exper…
…
continue reading

1
Designing Urban Spaces with Safety and Sustainability
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05In this episode, Leigh Harper (Associate Director for Security at Cundall), explores the link between security and sustainability in urban development. With experience across various regions, she stresses the need to integrate security measures early in master planning. Leigh discusses the importance of coordination with architects to balance aesth…
…
continue reading
Jess, Leah, and guest Michael (Mike) Nesbitt unpack Canada’s proposed Combating Hate Act: what it actually does, why it’s being introduced, and where it may overreach. They break down the bill’s key moves—creating a stand-alone hate-motivated offense, criminalizing intimidation or obstruction outside religious, cultural, educational and similar spa…
…
continue reading

1
Tomorrow is Yesterday: A Conversation With Robert Malley
51:39
51:39
Play later
Play later
Lists
Like
Liked
51:39Nearly two years into the Israel-Hamas war, the two-state solution is back in the news with the United Nations General Assembly voting in support. Unlike in years past, October 7 and the drawn-out conflict in Gaza has led to a wider and much more polarized conversation. European nations, Arab states, and much of the international community are advo…
…
continue reading

1
Live interviews from Oktane 2025: threats, AI in apps, and AI in cybersecurity tools - Brett Winterford, Shiv Ramji, Damon McDougald - ESW #426
1:35:13
1:35:13
Play later
Play later
Lists
Like
Liked
1:35:13How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today’s threat landscape has never been more complex. Malicious actors are leveraging tools like generative AI to develop more creative social engineering attacks that can have serious ramifications for businesses. Brett Winterford, VP of Okta Threat Intel…
…
continue reading

1
Live interviews from Oktane 2025: threats, AI in apps, and AI in cybersecurity tools - Brett Winterford, Shiv Ramji, Damon McDougald - ESW #426
1:35:13
1:35:13
Play later
Play later
Lists
Like
Liked
1:35:13How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today’s threat landscape has never been more complex. Malicious actors are leveraging tools like generative AI to develop more creative social engineering attacks that can have serious ramifications for businesses. Brett Winterford, VP of Okta Threat Intel…
…
continue reading

1
Government Pledges Remuneration for JLR Cyber Attack Victims
3:28
3:28
Play later
Play later
Lists
Like
Liked
3:28- Government Pledges Remuneration for JLR Cyber Attack Victims . - Dutch Cyber Attack: Latest Updates and Global Repercussions - African Banks Tighten Defenses Amid Rising Ransomware Threats. - UN Warns of Escalating Cybersecurity Risks in Developing Nations. - Experts Debate: Is Africa Ready for AI-Driven Cyber Threats? Support the show Remember..…
…
continue reading

1
Lawfare Daily: The Trials of the Trump Administration, Sept. 26
1:44:53
1:44:53
Play later
Play later
Lists
Like
Liked
1:44:53In a live conversation on YouTube, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Senior Editors Scott Anderson, Anna Bower, Eric Columbus, and Roger Parloff to discuss the Supreme Court granting certiorari in Rebecca Slaughter’s challenge to the president’s attempt to remove her as FTC commissioner, the indictment of James Comey, th…
…
continue reading

1
What if You Aren’t Broken? Carl Rogers and Humanistic Psychology
1:21:17
1:21:17
Play later
Play later
Lists
Like
Liked
1:21:17Dr. Rick and Forrest explore humanistic psychology, the mid-20th century movement that redefined how therapists relate to clients. It challenged the pessimism of Freud and the mechanism of behaviorism, offering a more hopeful alternative: that our nature is fundamentally good, and our job is to let it shine through. They discuss Carl Rogers’ work, …
…
continue reading

1
The Future of 401(k)s, Choosing Single Parenthood, and Caring for Aging Parents
18:28
18:28
Play later
Play later
Lists
Like
Liked
18:28Scott answers listener questions on the future of 401(k)s and how to approach funding your retirement, the decision to pursue single parenthood, and how to balance career ambitions with caring for aging parents from a distance. Want to be featured in a future episode? Send a voice recording to [email protected], or drop your question in th…
…
continue reading
Eliot and Eric welcome Anne Neuberger, former Deputy National Security Advisor for Cyber Affairs and currently the Payne Lecturer at Stanford's Freeman Spogli Center, to discuss her latest article in Foreign Affairs. They discuss Salt Typhoon, the Chinese hack of U.S. computer systems, and the fact that the Chinese sit astride key nodes of U.S. dom…
…
continue reading

1
3435: Pluralsight CEO on AI’s Role in Rewiring Human Intelligence
23:55
23:55
Play later
Play later
Lists
Like
Liked
23:55Some interviews stick because they take a noisy topic and bring it back to reality. This was one of them. I spoke with Erin Gajdalo, CEO of Pluralsight, about what it actually takes to upskill a workforce in an AI era that seems to change by the week. We compared boardroom intent with day-to-day practice, and Erin was refreshingly clear about both.…
…
continue reading

1
Hassan Sheikh Mohamud, President of Somalia : Somalia has a serious security challenge
22:59
22:59
Play later
Play later
Lists
Like
Liked
22:59Somalia has a serious security challenge Paul Njie speaks to Hassan Sheikh Mohamud, President of Somalia, about ongoing efforts to achieve security and stability in his country. While he says much progress has been made in tackling terror, he acknowledges that the insurgent groups al-Qaeda and, in particular, al-Shabab still pose a serious challeng…
…
continue reading

1
Episode 895: Rocket Dreams – The New, Trillion-Dollar Space Race
30:12
30:12
Play later
Play later
Lists
Like
Liked
30:12Newt talks with award-winning Washington Post reporter Christian Davenport, about his new book, “Rocket Dreams: Musk, Bezos, and the Inside Story of the New, Trillion-Dollar Space Race.” They discuss the new space race, focusing on the competition between countries and private companies to return humans to the moon and explore beyond. Davenport hig…
…
continue reading

1
Lawfare Archive: David Pozen on ‘The Constitution of the War on Drugs’
55:26
55:26
Play later
Play later
Lists
Like
Liked
55:26From May 10, 2024: David Pozen is the Charles Keller Beekman Professor of Law at Columbia Law School and the author of the new book, “The Constitution of the War on Drugs,” which examines the relationship between the Constitution and drug prohibitions. He joined Jack Goldsmith to talk about the constitutional history of the war on drugs and why the…
…
continue reading
In this episode team CiCP digs into the practical lessons from recent politically-motivated attacks and what they mean for protectors, event planners, and organizations. Chuck and Chris cover defense-in-depth at open-air events, the limits of crowd control, and why protective intelligence and thorough advance work (sector sketches, Google Earth, re…
…
continue reading

1
3434: t3rn, Interoperability, and the Next Wave of Real Adoption
31:34
31:34
Play later
Play later
Lists
Like
Liked
31:34Here’s the thing. We have had brilliant ideas in Web3 for years, along with better tooling and plenty of enthusiasm, yet adoption still feels slower than it should be. In my conversation with Maciej Baj, founder of t3rn, we got under the skin of why that is and what it might take to change the pace. His starting point is simple to state and hard to…
…
continue reading

1
Cisco firewall zero-days and bootkits in the wild
1:54:49
1:54:49
Play later
Play later
Lists
Like
Liked
1:54:49Three Buddy Problem - Episode 65: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco’s 5500-X series appliances, devices that sit at the h…
…
continue reading

1
No Mercy / No Malice: The End of the Blockbuster
16:37
16:37
Play later
Play later
Lists
Like
Liked
16:37As read by George Hahn. https://www.profgalloway.com/the-end-of-the-blockbuster/ Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy Vox Media Podcast Network
…
continue reading

1
Lawfare Archive: The Supreme Court Rules in Murthy v. Missouri
43:28
43:28
Play later
Play later
Lists
Like
Liked
43:28From June 28, 2024: On June 26, the Supreme Court handed down its decision in Murthy v. Missouri—the “jawboning” case, concerning a First Amendment challenge to the government practice of pressuring social media companies to moderate content on their platforms. But instead of providing a clear answer one way or the other, the Court tossed out the c…
…
continue reading

1
Episode 894: How the Jihadists Think and How to Defeat Them
33:25
33:25
Play later
Play later
Lists
Like
Liked
33:25Newt talks with former Army Captain Jesse Petrilla, about his new book, “If It Takes a Thousand Years: From Al-Qaeda to Hamas, How the Jihadists Think and How to Defeat Them.” They discuss the mindset and long-term strategies of jihadist groups, emphasizing their generational approach to conflict. Petrilla shares insights from his experiences in Af…
…
continue reading

1
3433: AI Trading Without Lag: EZ Trading Computers on Building the Right Setup342
37:36
37:36
Play later
Play later
Lists
Like
Liked
37:36When we think about what separates winning traders from those who struggle, we usually picture strategies, indicators, or a bit of insider know-how. But what if the biggest edge has been sitting on your desk all along? In this episode, I sit down with Eddie Z, also known as Russ Hazelcorn, the founder of EZ Trading Computers and EZBreakouts. With m…
…
continue reading

1
Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More. - SWN #515
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-515
…
continue reading

1
Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More. - SWN #515
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-515
…
continue reading

1
Inside the Biden admin’s AI policy approach | Jake Sullivan, Biden’s NSA | via The Cognitive Revolution
1:05:58
1:05:58
Play later
Play later
Lists
Like
Liked
1:05:58Jake Sullivan was the US National Security Advisor from 2021-2025. He joined our friends on The Cognitive Revolution podcast in August to discuss AI as a critical national security issue. We thought it was such a good interview and we wanted more people to see it, so we’re cross-posting it here on The 80,000 Hours Podcast. Jake and host Nathan Labe…
…
continue reading

1
Continued Conversation About Collaborative Combat Aircraft
38:17
38:17
Play later
Play later
Lists
Like
Liked
38:17Introducing our new monthly podcast series, Behind the Front, which features conversations with industry experts on challenges and opportunities facing the technology, space, and national security sectors. This week Aaron Stein sat down with Scott “FUG” Gilloon, who currently serves as the Sector Vice President of Air Force Strategic Development an…
…
continue reading

1
Lawfare Daily: Rethinking Deepfake Response with Gavin Wilde
36:13
36:13
Play later
Play later
Lists
Like
Liked
36:13Gavin Wilde, Nonresident Fellow at the Carnegie Endowment for International Peace, adjunct lecturer at Johns Hopkins University, and author of the recent paper, “Pyrite or Panic? Deepfakes, Knowledge and the Institutional Backstop,” joins Lawfare’s Justin Sherman to discuss worries about deepfakes and their impact on information and society, the hi…
…
continue reading

1
AI Hype vs. Reality, Plastic Surgery as Self-Investment, and the Future of Local Journalism
20:12
20:12
Play later
Play later
Lists
Like
Liked
20:12Scott answers listener questions on whether today’s AI boom mirrors the dot-com bubble, if plastic surgery can be considered an investment in yourself, and how to navigate (and survive) the collapse of local news. Want to be featured in a future episode? Send a voice recording to [email protected], or drop your question in the r/ScottGallo…
…
continue reading

1
3432: GoTo on Making AI Practical for Small and Mid Sized Businesses
41:33
41:33
Play later
Play later
Lists
Like
Liked
41:33Most conversations about AI are still caught up in the spectacle. We see demos, marvel at copilots, and argue about the latest big model. But what happens when you strip away the hype and focus on AI that simply works? That is exactly the perspective Olga Lagunova brings to this episode. As Chief Product and Technology Officer at GoTo, she has one …
…
continue reading

1
Broadcom, LastPass, SEO Poisoning, QR codes, H1B visas, Distributed Computing... - PSW #893
1:03:06
1:03:06
Play later
Play later
Lists
Like
Liked
1:03:06Broadcom, LastPass, Brickstone, SEO Poisoning, QR codes, H1B visas, Distributed Computing, and More... Show Notes: https://securityweekly.com/psw-893
…
continue reading

1
Broadcom, LastPass, SEO Poisoning, QR codes, H1B visas, Distributed Computing... - PSW #893
1:03:06
1:03:06
Play later
Play later
Lists
Like
Liked
1:03:06Broadcom, LastPass, Brickstone, SEO Poisoning, QR codes, H1B visas, Distributed Computing, and More... Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-893
…
continue reading

1
Why Cybersecurity Training Isn’t Working — And What To Do Instead | Human-Centered Cybersecurity Series with Co-Host Julie Haney and Guest Dr. Aunshul Rege | Redefining CyberSecurity with Sean Martin
45:26
45:26
Play later
Play later
Lists
Like
Liked
45:26⬥GUEST⬥ Aunshul Rege, Director at The CARE Lab at Temple University | On Linkedin: https://www.linkedin.com/in/aunshul-rege-26526b59/ ⬥CO-HOST⬥ Julie Haney, Computer scientist and Human-Centered Cybersecurity Program Lead, National Institute of Standards and Technology | On LinkedIn: https://www.linkedin.com/in/julie-haney-037449119/ ⬥HOST⬥ Host: S…
…
continue reading

1
Rational Security: The “I AM an Object Lesson” Edition
1:13:04
1:13:04
Play later
Play later
Lists
Like
Liked
1:13:04This week, Scott sat down with Senior Editors Kate Klonick and Eric Columbus to talk through the week’s big national security news stories, including: “An Un-Airing of Grievances.” Since the assassination of conservative activist Charlie Kirk, some supporters of his—including several figures within the Trump administration—have actively sought to h…
…
continue reading

1
Scaling Laws: AI and Young Minds: Navigating Mental Health Risks with Renée DiResta and Jess Miers
59:50
59:50
Play later
Play later
Lists
Like
Liked
59:50Alan Rozenshtein, Lawfare Senior Editor and Research Director; Renée DiResta, Lawfare Contributing Editor; and Jess Miers, visiting assistant professor of Law at the University of Akron School of Law, discuss the distinct risks that generative AI systems pose to children, particularly in relation to mental health. They explore the balance between t…
…
continue reading

1
Trump, Putin, and the End of American Power — with Dr. Fiona Hill
1:09:26
1:09:26
Play later
Play later
Lists
Like
Liked
1:09:26Scott speaks with Dr. Fiona Hill, senior fellow at Brookings and former U.S. National Security Council official, about Putin’s endgame and what it means for the West. They discuss Trump’s impact on the war in Ukraine, Europe’s test of unity, and how countries like India and Saudi Arabia are reshaping global power. Fiona also shares why America is l…
…
continue reading