National security, unlocked. Each Thursday, host Mary Louise Kelly and a team of NPR correspondents discuss the biggest national security news of the week. With decades of reporting from battlefields and the halls of power, they bring you inside the Pentagon, State Department, and intelligence community to help you understand America's shifting role in the world, and how events in faraway places matter here at home. Additional episodes feature interviews with power players from the NatSec wo ...
…
continue reading
Security Weekly Podcasts
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
On Mondays, Jon Stewart hosts The Daily Show, but on Thursdays, he's back in your ears with The Weekly Show -- a podcast featuring in-depth conversations with a range of special guests. From experts and advocates, to stakeholders and thought leaders, we discuss the challenges, changes, and ideas that are shaping our world.
…
continue reading
Off The Wall is a weekly show on WUSB radio, Stony Brook - Long Island, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
The Long Game is a weekly national security podcast hosted by Jake Sullivan, President Biden’s National Security Advisor, and Jon Finer, his Principal Deputy—senior aides who sat in on the classified Presidential Daily Brief each morning and translated raw intelligence into policy advice. Each week, Jake and Jon will pull back the curtain on how power really works helping you make sense of the national security stories unfolding today. Part of the Vox Media Podcast Network.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Join in on weekly podcasts that aim to illuminate how AI transforms cybersecurity—exploring emerging threats, tools, and trends—while equipping viewers with knowledge they can use practically (e.g., for secure coding or business risk mitigation).
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The world is changing and we’re gonna watch it together.
…
continue reading
Your weekly fix of everything economics. Hosted by James Meadway.
…
continue reading
The original European current affairs podcast from Germany’s international broadcaster. Bringing you expert analysis and on-the ground reporting from the European capitals and beyond. Join host Kate Laycock and DW’s network of seasoned correspondents for your weekly dose of euro-politics and culture. Published every Thursday.
…
continue reading
Stories from the world of hacking, cybersecurity, and rogue AI. Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million dow ...
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
With two new shows each week, our experts dig into the game-tape for analysis rich in detail and information. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Your Weekly Source for Linux GNews from the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
True crime... casually done. Fact boy gives you new episodes on Mondays and Fridays. Also available on YouTube!
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Award-winning comedy panel game about weird questions with wonderful answers. Each week, Tom Scott is joined by three guests to ask each other questions with a sideways twist. There's no points or prizes - just reputation and bragging rights on the line. Enquiries and question submissions: https://www.lateralcast.com. Ad-free shows and bonus content: https://www.lateralcast.com/club.
…
continue reading
Americast is the authoritative US news and politics podcast from the BBC. Each week we provide audiences with the best analysis from across the BBC, with on-the-ground observations and big picture insights about the stories which are defining America right now. The podcast is hosted by trusted BBC journalists including the BBC’s North America editor, Sarah Smith, BBC Radio 4 presenter, Justin Webb, the BBC’s disinformation and social media correspondent, Marianna Spring, and BBC North Americ ...
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
Join Senator Ted Cruz and co-host Ben Ferguson as they break down the most important news stories of the day and reveal what they mean for you. On "Verdict with Ted Cruz,” you will go behind the scenes of the political debates that define our country. "Verdict with Ted Cruz" is being brought to you by Jobs, Freedom, and Security PAC, a political action committee dedicated to supporting conservative causes, organizations, and candidates across the country. In 2022, Jobs, Freedom, and Security ...
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
1
CISO Lessons from a Children's Novel as Cybersecurity Outgrows IT and Building Talent - Tom Arnold - BSW #429
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you're a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
…
continue reading
1
CISO Lessons from a Children’s Novel as Cybersecurity Outgrows IT and Building Talent - Tom Arnold - BSW #429
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you’re a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
…
continue reading
1
Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy , Aaran Leyland, and More - SWN #544
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy in Rhode Island, Aaran Leyland, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-544
…
continue reading
1
The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364
1:10:12
1:10:12
Play later
Play later
Lists
Like
Liked
1:10:12Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
…
continue reading
1
Why are cybersecurity predictions so bad? - ESW #440
1:29:41
1:29:41
Play later
Play later
Lists
Like
Liked
1:29:41For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In th…
…
continue reading
MongoDB warns admins to patch severe vulnerability immediatelyBy Carl Franklin
…
continue reading
1
Breaking Into Cybersecurity - PSW #907
1:05:11
1:05:11
Play later
Play later
Lists
Like
Liked
1:05:11Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that wo…
…
continue reading
This is an excerpt from my podcast This Week in Geopolitics. I record new episodes every Monday so give me a follow if you would like to see more!
…
continue reading
1
How far will Trump go to seize Greenland?
26:20
26:20
Play later
Play later
Lists
Like
Liked
26:20Few in Washington took Donald Trump seriously when he first floated the idea of the US acquiring Greenland during his first term as president. Even last year when JD Vance and Donald Trump Jr (the US president’s eldest son) made whistle stop visits to the semi-autonomous island, most observers viewed the trips as an example of the administration’s …
…
continue reading
1
Champions Cup preview, Connacht's D, and policing the breakdown
57:11
57:11
Play later
Play later
Lists
Like
Liked
57:11James Tracy joins Murray Kinsella and Gavan Casey to run the rule over Leinster and Munster's Christmas performances ahead of their respective Champions Cup meetings with French opposition this weekend. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
1
CISO Lessons from a Children's Novel as Cybersecurity Outgrows IT and Building Talent - Tom Arnold - BSW #429
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you're a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
…
continue reading
1
Venezuela Victory part 2-Historically Transforming Latin America & What Happens Next
43:21
43:21
Play later
Play later
Lists
Like
Liked
43:21Cilia Flores’ Role: Far from being a symbolic first lady, Flores is a mastermind behind corruption and drug trafficking. She was sanctioned by the U.S. Treasury and linked to major criminal activities, including her nephews’ cocaine smuggling. Western Hemisphere Strategy: The discussion emphasizes the Monroe Doctrine and its modern interpretation u…
…
continue reading
Live from Dubai with Scott Helme! My Changing View on Sponsorships; Scott on Moving to Dubai; On the Overhead of Support https://www.troyhunt.com/weekly-update-485/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading
1
Venezuela, Greenland, and the New Resource Colonialism
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47For the first Macrodose episode of 2026, James Meadway takes a look at US President Donald Trump's operation in Venezuela and the seizure of the nation's leader Nicolas Maduro (1:26). Plus Trump's posturing about his desires to annex Greenland (7:39). Subscribe to support the show at patreon.com/Macrodose. Your pledge is a donation supporting…
…
continue reading
1
SN 1059: MongoBleed - Code Signing Under Siege
3:16:33
3:16:33
Play later
Play later
Lists
Like
Liked
3:16:33Why are code signing certificates suddenly getting shorter, pricier, and more restrictive? Steve Gibson and Leo Laporte expose the "cabal" rewriting the rules for everyone who builds software—and what it means for your security and your wallet. Code-signing certificate lifetimes shortened by two years. Sadly, ChatGPT is heading toward an advertisin…
…
continue reading
1
SN 1059: MongoBleed - Code Signing Under Siege
3:16:33
3:16:33
Play later
Play later
Lists
Like
Liked
3:16:33Why are code signing certificates suddenly getting shorter, pricier, and more restrictive? Steve Gibson and Leo Laporte expose the "cabal" rewriting the rules for everyone who builds software—and what it means for your security and your wallet. Code-signing certificate lifetimes shortened by two years. Sadly, ChatGPT is heading toward an advertisin…
…
continue reading
Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.bleepingcomputer.com/news/security/webrat-malware-spread-via-fake-vulnerability-exploits-on-github/ https://cybersecuritynews.com/mongobleed-poc-exploit-mongodb/ https://cybersecuritynews.com/fortigate-firewall-vulnerability/ …
…
continue reading
By Emmanuel Goldstein
…
continue reading
1
Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy , Aaran Leyland, and More - SWN #544
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy in Rhode Island, Aaran Leyland, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-544
…
continue reading
1
Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy , Aaran Leyland, and More - SWN #544
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy in Rhode Island, Aaran Leyland, and More, on the Security Weekly News. Show Notes: https://securityweekly.com/swn-544
…
continue reading
1
Bonus: Daily Review with Clay and Buck - Jan 6 2026
1:03:46
1:03:46
Play later
Play later
Lists
Like
Liked
1:03:46Meet my friends, Clay Travis and Buck Sexton! If you love Verdict, the Clay Travis and Buck Sexton Show might also be in your audio wheelhouse. Politics, news analysis, and some pop culture and comedy thrown in too. Here’s a sample episode recapping four takeaways. Give the guys a listen and then follow and subscribe wherever you get your podcasts.…
…
continue reading
1
How the World Got Owned Episode 1: The 1980s
1:03:36
1:03:36
Play later
Play later
Lists
Like
Liked
1:03:36In this special documentary episode, Patrick Gray and Amberleigh Jack take a historical dive into hacking in the 1980s. Through the words of those that were there, they discuss life on the ARPANET, the 414s hacking group, the Morris Worm, the vibe inside the NSA and a parallel hunt for German hackers happening at a similar time to Cliff Stoll’s fam…
…
continue reading
1
Cybersecurity resolutions you’ll actually stick to in 2026
40:14
40:14
Play later
Play later
Lists
Like
Liked
40:14Happy New Year! 🎉✨ We’re kicking off 2026 with cybersecurity resolutions you’ll actually stick to — no cold plunges, no green juice cleanse, just a handful of tiny ten-minute wins that make a big difference to your privacy and security. We’ve turned the best advice from last season’s guests into a simple, practical checklist. On this episode, you’l…
…
continue reading
1
Navigating the DSOMM Roadmap and the DevSecOps Revolution
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01This episode focuses on how these principles fit into the DevSecOps Maturity Model (DSOMM), a structured framework that enables organisations to embed security practices from the start, ensuring that rapid delivery does not come at the cost of protection. Ready to take the first step? The Certified DevSecOps Professional (CDP) course is the ultimat…
…
continue reading
1
The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364
1:10:12
1:10:12
Play later
Play later
Lists
Like
Liked
1:10:12Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
…
continue reading
1
The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364
1:10:12
1:10:12
Play later
Play later
Lists
Like
Liked
1:10:12Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
…
continue reading
1
BONUS POD: Trump’s Plan to Rebuild Venezuela’s Broken Oil Empire plus Maduro in the Big Apple
14:59
14:59
Play later
Play later
Lists
Like
Liked
14:59Trump’s stance on Venezuela’s oil and U.S. role Trump is asserting the U.S. will “run” or strongly direct efforts in Venezuela, with U.S. oil companies going in to rebuild the country’s “broken” oil infrastructure. Trump is quoted saying elections should occur “at the right time” after stabilization. Venezuela’s oil reserves are worth trillions of …
…
continue reading
1
Americanswers... On 5 Live! Could Venezuela's Nicolas Maduro be found not guilty in a US court?
29:55
29:55
Play later
Play later
Lists
Like
Liked
29:55Venezuela's Nicolás Maduro proclaimed "I am still president" and pleaded not guilty to drug trafficking and other charges as he appeared in court in New York for the first time. In this episode, we answer your questions, which include looking at the evidence against Maduro, and whether it’s possible a court could find him not guilty. We also answer…
…
continue reading
This is an excerpt from my podcast This Week in Geopolitics. I record new episodes every Monday so give me a follow if you would like to see more!
…
continue reading
This is an excerpt from my podcast This Week in Geopolitics. I record new episodes every Monday so give me a follow if you would like to see more!
…
continue reading
This is an excerpt from my podcast This Week in Geopolitics. I record new episodes every Monday so give me a follow if you would like to see more!
…
continue reading
1
The Donroe Doctrine Comes to Venezuela
3:06:02
3:06:02
Play later
Play later
Lists
Like
Liked
3:06:02In today’s episode we talk about, China's military drills around Taiwan. Then we'll cover the unrest in Iran and whether it may spell the end of the Islamic Republic. Afterwards we'll go in depth about the kidnapping of Nicolas Maduro and the new strategic realities surrounding this situation Venezuela. All that and more!…
…
continue reading
1
330: Arch, Bazzite, elementary, Mint, Kali, Parrot OS, Qubes OS, & more 2026 Linux news
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27video: https://youtu.be/wFDzItN6Ags Download as MP3 Support the Show Become a Patron = tuxdigital.com/membership Store = tuxdigital.com/store Chapters: 00:00 Intro 00:55 Arch Linux Kicks Off 2026 with New Release 02:59 Universal Blue Year in Review 03:39 Bazzite End of Year Update 04:49 Aurora Year in Review 05:46 Project Bluefin Year in Review 07:…
…
continue reading
1
Ward bros and Ulster trounce muddled Munster; Leinster satisfy their need for speed against Connacht
1:12:33
1:12:33
Play later
Play later
Lists
Like
Liked
1:12:33Murray Kinsella, Bernard Jackman and Gavan Casey review the Round 9 interpros. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
1
Why are cybersecurity predictions so bad? - ESW #440
1:29:41
1:29:41
Play later
Play later
Lists
Like
Liked
1:29:41For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In th…
…
continue reading
1
Maduro Arrested-Why Trump Ordered this Historic Attack & the Detailed Legal Basis for his Authority to Do So
52:19
52:19
Play later
Play later
Lists
Like
Liked
52:19Event Summary (WATCH: PRESIDENT TRUMP PRESS CON HERE) The U.S. military executed a highly complex and precise operation in Caracas, Venezuela, to apprehend Maduro. The mission involved over 150 aircraft, advanced coordination across multiple military branches, and cyber and space operations. The operation was completed without any American casualti…
…
continue reading
1
Trump’s Venezuela takeover... everything you need to know
31:49
31:49
Play later
Play later
Lists
Like
Liked
31:49How did the US capture the Venezuelan President Nicolas Maduro and how exactly will the US “run the country” until there is a “proper transition of power”?In this episode, Anthony and Justin unpack an extraordinary weekend, with more details on exactly how the US military were able to storm Maduro’s home, and what kind of intelligence the CIA had.T…
…
continue reading
1
Venezuela leader captured. Trump says U.S. to 'run' the country. Here’s what we know
20:14
20:14
Play later
Play later
Lists
Like
Liked
20:14After months of threats, warnings and seizing of alleged drug boats – tensions between the United States and Venezuela have now come to this: the arrest of Venezuelan president Nicolás Maduro. Now, President Trump says the United States is “running the country.” In this special episode of Sources & Methods, host Mary Louise Kelly speaks with nation…
…
continue reading
1
Fake Autism Centers in Fraudesota, Elon Musk's Warning & Will we See Jail Time for High Lvl Officials Week In Review
33:02
33:02
Play later
Play later
Lists
Like
Liked
33:02Daycare & Autism Centers Fraud Numerous daycare centers and autism facilities have received millions in state funding but have no children enrolled. Example: A daycare shut down for violations reopened under a new name and continued receiving funds. Home Healthcare Fraud A single building allegedly housed 14 Somali-owned healthcare companies, all b…
…
continue reading
1
Defending the Boundaryless Cloud: Understanding Threats That Matter - Cameron Sipes, Steve Stone - SWN #543
36:39
36:39
Play later
Play later
Lists
Like
Liked
36:39Cloud breaches don't always start in the cloud, but they do end there. To defeat an attacker you need to understand their mission target along with the access points available to them, regardless of whether they reside within or beyond the cloud. SentinelOne is purpose-built to stop attacks wherever they originate - from within and beyond the cloud…
…
continue reading
1
Defending the Boundaryless Cloud: Understanding Threats That Matter - Cameron Sipes, Steve Stone - SWN #543
36:39
36:39
Play later
Play later
Lists
Like
Liked
36:39Cloud breaches don’t always start in the cloud, but they do end there. To defeat an attacker you need to understand their mission target along with the access points available to them, regardless of whether they reside within or beyond the cloud. SentinelOne is purpose-built to stop attacks wherever they originate - from within and beyond the cloud…
…
continue reading
1
Defending the Boundaryless Cloud: Understanding Threats That Matter - Cameron Sipes, Steve Stone - SWN #543
36:39
36:39
Play later
Play later
Lists
Like
Liked
36:39Cloud breaches don't always start in the cloud, but they do end there. To defeat an attacker you need to understand their mission target along with the access points available to them, regardless of whether they reside within or beyond the cloud. SentinelOne is purpose-built to stop attacks wherever they originate - from within and beyond the cloud…
…
continue reading