Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Where we talk and discuss what the great firewall of China is, and the ethics of it Cover art photo provided by JJ Ying on Unsplash: https://unsplash.com/@jjying
…
continue reading
Learn how to think not what to think.
…
continue reading
Training of Aria Technologies products including Ericsson-LG, Lancom Systems, Star Leaf, So Connect, Jabra, xmedius, Checkpoint, NBN, iPECS2Teams
…
continue reading
A great WordPress.com site
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Hosted by planetary scientist and astrobiologist Dr. Michael L. Wong, Strange New Worlds examines science, technology, and culture through the lens of Star Trek!
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Where timely and relevant security meets puns and witty banter. Our goal is to keep defenders apprised of pertinent news and trends in under forty-five minutes.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
A live podcast show, that’s like a morning radio show, just much better. Live from 6h00-8h00 Monday, Wednesday and Friday. Clever, funny, outrageous and sometimes very silly. Come for the guests, stay for the laughter. Also check out our other shows on The Real Network for more entertainment.
…
continue reading
Join Jason Esposito and Ben Cartland as they explore the deeper questions behind Jason's sermons at Crossway Church, a "community for the curious".
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
An exploration of the UAP - UFO phenomenon and the associated "high strangeness" which accompanies it from the standpoint of analysts and researchers. Fortean Winds is a collective of data and research professionals who began a project in 2020 to better understand the UFO/UAP phenomenon from the perspective of existing research and evidence. After a few years study and note taking (which you can see at our website https://www.forteanwinds.com) , we're ready to discuss our notes and insights ...
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
The Keefer Brothers have spent over 20 years mastering the art of survival- not just in the wild, but in the world of storytelling, business and life. Now, these pioneers make Wilder Minds their new home. Each episode, epic stories collide with unfiltered truth and personal evolution- to uncover what it takes to live life against the grain. Awake your soul with Wilder Minds.
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Join us as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peek behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | Co-Host Twitter Handle: Andy @andylapteff
…
continue reading
SecurityGen
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
The Internet Explorer's Podcast is a comedy-ish, science-ish, history-ish, popculture-ish parody podcast where curiosity meets absurdity. Each week, self-proclaimed "internet explorer" Jimmy dives headfirst into the wildest, weirdest, and most questionable corners of the internet. He “researches” topics like DIY invisibility cloaks, medieval alchemy, and whether plants can feel pain—then confidently explains his findings to a real expert, who sets the record straight while humoring Jimmy’s m ...
…
continue reading
Hi there! I'm Doug Noll, an award-winning author, speaker, and trainer. I am, among many other things, a lawyer-turned-peacemaker, mediator, and expert in deep, empathic listening. I left a 22-year career as a trial lawyer, earned my Masters Degree in Peacemaking and Conflict Studies, and have helped thousands of companies and organizations with internal conflicts and poor communication. I am the co-founder of the award-winning Prison of Peace Project. I have trained mediators and leaders in ...
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
DIAF is a series of audiobooks presented in podcast format which follow the adventures of Brian Brushwood and Justin Robert Young.
…
continue reading
Founded in 2022, securitygen is a global start-up focused on telecom security.
…
continue reading
Just a London girl who happens to speak three languages. Catch me on here for VIBES.
…
continue reading
What if your breath was as important as your interface design? A podcast at the crossroads of mindful movement and meaningful tech. Hosted by Eric Infanti — Marine Corps veteran, UX design leader, and spiritual practitioner — Human by Design explores what it means to build systems, bodies, and lives that support human flourishing. From samadhi to strongman, wireframes to warrior breathwork — Eric's episodes bridge ancient wisdom with modern design. Human by Design explores the terrain where ...
…
continue reading
The Mid-Atlantic’s Best IT services company. Helping Business Owners create, improve and scale their Technology strategy. IT services, IT Security and IT Support advice and leadership from expert professionals. Q&A with Senior Engineers, Service Managers and Business Development.
…
continue reading
My name is Ely and I’m a full-time and independent graphic designer. My fiancé is Laura Together, we have discovered that no matter how crazy our work lives can be, there is always laughter in it. Although we have much in common, our differences in pets, music, food, movies, and T.V. shows make for the best conversations.
…
continue reading
I have a unique way of looking at things and I'd like to share that view with you. I believe faith and technology have a lot in common and I can teach both at the same time during one little byte. Join me today and find out how. I'm a strong Christian and have been sharing my faith since being saved in 1993. You can read my personal testimony here: http://www.amylynn.org/testimony I'm a computer geek, programming since the age of seven so I have a lot of things to share. All my businesses ar ...
…
continue reading
Reconciling accounts eliminates inaccuracies in your books. At ReconcileBooks, we offer comprehensive solutions to help both QuickBooks and Sage 50 users to reconcile their books at the end of each accounting period - monthly, quarterly, or yearly.
…
continue reading
Almost exactly two years ago, “Five Eyes” intelligence agencies discovered a successful and ongoing cyber attack on critical US infrastructure by a state-sponsored actor based in China. This group, associated with the People’s Liberation Army and known as Volt Typhoon, was tasked with quietly gaining persistent remote access to critical systems inc…
…
continue reading
In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a variety of topics ranging from personal updates and family life to their media consumption habits, including TV shows and movies. They also delve into the video game industry, sharing insights on upcoming releases and trends. Additionally,…
…
continue reading
09.05.25 Pt 1 - Gareth Cliff and Ben Karpinski weigh in on the election of the new Pope and why preserving tradition still holds value in a fast-changing world. They also unpack the controversy around Julius Malema being denied entry into the UK, and what it says about South Africa's global standing and political self-respect. Plus, in an era where…
…
continue reading

1
The Once and Future Greatness of New York City
46:42
46:42
Play later
Play later
Lists
Like
Liked
46:42Elizabeth Glazer, the founder of Vital City, joins Bradley to discuss the condition of our civic culture, what she is doing to inject big ideas into policymaking debates, and how Vital City's work can inspire New Yorkers to make the city a better place to live. This episode was taped at P&T Knitwear at 180 Orchard Street — New York City’s only free…
…
continue reading

1
Faith and Firewalls (title brought to you by Chat GPT)
40:10
40:10
Play later
Play later
Lists
Like
Liked
40:10Jason and Ben discuss the difficulties of how to engage technology and what it means to be human.By Jason Esposito & Ben Cartland
…
continue reading

1
Episode 4 - The Future of Cybersecurity: AI, Threats, and Business Resilience with Dan Havens
1:08:23
1:08:23
Play later
Play later
Lists
Like
Liked
1:08:2300:00 Introduction to Cybersecurity and Acronis 03:01 The Evolution of Acronis and Cyber Protection 06:10 Understanding Cyber Threats and Ransomware 09:04 Common Mistakes in Data Protection 11:57 The Importance of Business Continuity 15:02 The Role of Managed Service Providers 17:58 Best Practices for Cybersecurity 21:11 The Human Factor in Cyberse…
…
continue reading

1
Inside the Human Firewall: Phishing, Deepfakes & the Rise of Social Engineering with Heather Benwell
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21In this eye-opening episode, we sit down with Heather Benwell, Chief Marketing Officer at Challengeword, to explore one of the fastest-growing threats in cybersecurity: social engineering. From phishing to deepfakes, and the evolving complexity of human-targeted attacks, Heather shares stories, statistics, and insights that highlight just how vulne…
…
continue reading
Firewalls protect computers by blocking unauthorized access while allowing safe traffic, but poor configuration can slow performance or leave vulnerabilities. Default settings may not suit unique needs (e.g., gamers, remote workers), requiring tweaks for balance. Firewalls are like the "Armor of God" (Ephesians 6:10-17), where six spiritual element…
…
continue reading

1
318 - Beyond the Firewall: The Human Element That Keeps Your Business Safe with Simple Salt's Dylan Evans
32:20
32:20
Play later
Play later
Lists
Like
Liked
32:20Your host, Doug Noll, talks with the Founder of Simple Salt, Dylan Evans. Dylan shares his journey in the security industry, emphasizing the critical role of human behavior alongside technical measures. He discusses the common misconceptions that cybersecurity is purely technical, highlighting the importance of training and developing personnel. Dy…
…
continue reading

1
59. Why Everyone Needs an Outbound Firewall
41:35
41:35
Play later
Play later
Lists
Like
Liked
41:35Helpful episodes to listen to first Episode 40 - Website and Email Filtering Episode 56 - Home Network Attacks From Within Episode 57 - How Firewalls Protect You And What You Might Be Missing Questions we answer in this episode What is a trojan horse? What are two ways an outbound firewall protects you? What is an outbound firewall's greatest frust…
…
continue reading

1
Cyber Resilience and Global Adoption From Josh Chitwood, Senior Sales Engineer’s POV
39:14
39:14
Play later
Play later
Lists
Like
Liked
39:14In this episode, our Talent Delivery Consultant Rosie Larter sits down with Josh Chitwood, a seasoned Senior Sales Engineer, to explore the everything cyber resilience. Together, they dive into the global adoption of cybersecurity practices, what it really takes to build lasting resilience, and how to navigate the inevitable dips that come with inn…
…
continue reading
Guest: Prof. Lisa Kaltenegger Professor Lisa Kaltenegger, Director of the Carl Sagan Institute at Cornell University, beams aboard to talk about her book, Alien Earths, the search for life in the cosmos, what exoplanets teach us about our home world, and her love for Star Trek.Alien Earths: The New Science of Planet Hunting in the Cosmos, by Lisa K…
…
continue reading
12.05.25 Pt 2 - Gareth Cliff and Mash dive into the Influencer Revolution — from AI babies taking over social media to the future of content creation. Things get spicy as they debate what their “price” would be to sell their bodies. Plus, Jonathan Fine joins the conversation to unpack everything you need to know about the Finance Magnates Africa Su…
…
continue reading
12.05.25 Pt 1 - Gareth Cliff is joined by Mash in a wild ride of revelations — from America’s sudden love for South African farmers to Mash’s own unexpected farming ambitions. Gareth digs into Joburg’s crumbling chaos and asks the real question: where’s all the money going? Plus, Dr Hanan steps in to help a self-proclaimed “illiterate” man navigate…
…
continue reading

1
SANS Stormcast Monday, May 11th: Steganography Challenge; End-of-Life Routers; ASUS Driverhub; RV-Tools SEO Poisoning (#)
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39SANS Stormcast Monday, May 11th: Steganography Challenge; End-of-Life Routers; ASUS Driverhub; RV-Tools SEO Poisoning Steganography Challenge Didier revealed the solution to last weekend’s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums…
…
continue reading

1
Bob the Blower, Beard Draggers & the Metallica Drive-By
1:00:25
1:00:25
Play later
Play later
Lists
Like
Liked
1:00:25Turkey camp went full throttle—mud-soaked crawls, beard-dragging longbeards, and neighbors firing up blowers mid-stalk. Becky gets her first bird. Casey gets denied permission so hard he needed a Busch Light. And Will Brantley rolls in fresh off a Metallica concert and tags out in 25 minutes. This one has it all—strutters, safes, and the legend of …
…
continue reading
09.05.25 Pt 2 - Gareth Cliff is joined by international wealth coach JT Foxx for a candid conversation that bridges continents. JT shares his American perspective on what it’s like walking through South African malls, dives into his ever-growing list of high-profile connections, and unpacks why Donald Trump—love him or hate him—is one of the greate…
…
continue reading

1
62. Even a Security Expert Can Get Phished
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16Questions we answer in this episode Who is Troy Hunt? How did he get phished? What are some lessons we can learn from his story? Who will we be inviting as a guest to the podcast? Episode summary Troy Hunt, a security expert, got phished. He clicked a link in an email, and entered his password into a fake website. The hackers logged into his Mailch…
…
continue reading

1
SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch (#)
4:57
4:57
Play later
Play later
Lists
Like
Liked
4:57SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%…
…
continue reading

1
Wide World of Cyber: How state adversaries attack security vendors
52:42
52:42
Play later
Play later
Lists
Like
Liked
52:42In this edition of the Wide World of Cyber podcast Patrick Gray talks to SentinelOne’s Steve Stone and Alex Stamos about how foreign adversaries are targeting security vendors, including them. From North Korean IT workers to Chinese supply chain attacks, SentinelOne and its competitors are constantly fending off sophisticated hacking campaigns. Thi…
…
continue reading

1
How to fast-track the UK Cyber Governance Code of Practice using IASME Cyber Assurance
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20Implementing the UK Cyber Governance Code of Practice with IASME Cyber Assurance In this episode, we discuss the crucial topic of cyber governance for business leaders. With 74% of large businesses and 70% of medium businesses in the UK experiencing a cyber breach in the past year, boards are now clearly expected to lead on cyber risk. In response,…
…
continue reading

1
322 - The Bold Leap: Transitioning from Corporate Stability to Entrepreneurial Success with LearnUpon's Brendan Noud
24:33
24:33
Play later
Play later
Lists
Like
Liked
24:33Your host, Doug Noll, talks with the Co-founder and CEO of LearnUpon, Brendan Noud. Brendan shares his journey from a business degree at University College Dublin and a consulting career at KPMG to founding LearnUpon, an LMS platform. He discusses the challenges of entrepreneurship, the importance of empathy and listening in leadership, and the imp…
…
continue reading

1
SANS Stormcast Thursday, May 8th: Modular Malware; Sysaid Vuln; Cisco Wireless Controller Patch; Unifi Protect Camera Patch (#)
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42SANS Stormcast Thursday, May 8th: Modular Malware; Sysaid Vuln; Cisco Wireless Controller Patch; Unifi Protect Camera Patch Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%…
…
continue reading

1
Hacking the Stage: John Donovan on RSAC, BSides SF, and the Human Side of Cybersecurity
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13In this episode of Breaking Badness, we sit down with John Donovan of ZEDEDA to unpack thelighter and more profound sides of cybersecurity’s biggest gatherings. From RSA’s unexpectedbaby goats and vendor booth antics to BSides San Francisco’s community-driven keynotestage, John shares personal stories, industry insights, and valuable advice on how …
…
continue reading
In this episode of The Other Side of the Firewall podcast, Ryan Williams and Shannon Tynes discuss the latest developments in cybersecurity, focusing on Microsoft's shift to passwordless accounts and the implications for users. They explore the challenges of password management, the benefits of passkeys and biometric authentication, and the future …
…
continue reading

1
289 - Expectations on Microsoft Build 2025
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35In this week's episode, we ponder what to expect from Microsoft Build 2025. Is it worth traveling to Seattle for the event, that takes place May 19-22? We reflect on the possible announcements, the breakout session topics, as well as the keynotes. (00:00) - Intro and catching up. (04:56) - Show content starts. Show links - Microsoft Build 2025 - DE…
…
continue reading
Send us a text Consulting Engineers (CEs) at networking vendors blend deep technical expertise with customer-facing skills to bridge the gap between account managers and specialized solution design. They operate as specialists who support Sales Engineers when customer requirements demand deeper technical knowledge. • CEs often join from traditional…
…
continue reading

1
Power Moves & Pretty Boys: Disrupting the Norms
50:16
50:16
Play later
Play later
Lists
Like
Liked
50:167.05.25 Pt 2 - Gareth and Kyle Worde unpack why Donald Trump might just be the ultimate case study in brand disruption — love him or hate him, the man changed the game. They also dig into the surprising story behind the most famous photo ever taken and what it sold for. Plus, a heated (and hilarious) debate: should men wear makeup, or is it still c…
…
continue reading

1
Status, Shelter & Snacks: What Really Counts?
1:09:47
1:09:47
Play later
Play later
Lists
Like
Liked
1:09:477.05.25 Pt 1 - Gareth is joined by Kyle Worde for a deep dive into the strange ways we measure ourselves against others — from status symbols to social media scorecards — and how that comparison becomes its own kind of currency. They also tackle a tough but eye-opening topic: why simply giving homeless people a house doesn’t always mean they can re…
…
continue reading
Send us a text In this episode of The Internet Explorer’s Podcast, Jimmy finally delivers on his promise from the Sun Gazing episode and dives into the bizarre world of DNA activation through sound therapy. What starts as a reflection on a late-night moment of desperation quickly spirals into a hilarious breakdown of how pseudoscientific claims tak…
…
continue reading

1
Risky Business #790 -- Bye bye Signal-gate, hello TeleMessage-gate
56:12
56:12
Play later
Play later
Lists
Like
Liked
56:12On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: White House’s off-brand Israeli Signal fork logs cleartext messages with hard coded creds while getting hacked (twice). Just … Wow. Ransomware attacks on UK retailers are linked, and Marks & Spencer has it extra bad After six years dormant, a Magento eCommerce …
…
continue reading

1
SANS Stormcast Wednesday, May 7th: Infostealer with Webserver; Android Update; CISA Warning (#)
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45SANS Stormcast Wednesday, May 7th: Infostealer with Webserver; Android Update; CISA Warning Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that, in addition to implementing typical infostealer functionality, includes a web server suitable to create local phishing sites. https://isc.sans.edu/diary/Python%…
…
continue reading

1
TikTok Caught Sending Data To China, Fined $600M
14:46
14:46
Play later
Play later
Lists
Like
Liked
14:46In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss the recent $600 million fine imposed on TikTok for violating GDPR regulations by sending European user data to China. They explore the implications of data privacy laws, particularly in the context of the EU's strict regulations and Californ…
…
continue reading

1
The Hidden Thread – Part 2: Occult Warfare and Fortean Fronts
50:32
50:32
Play later
Play later
Lists
Like
Liked
50:32Send us a text As World War II erupts across Europe, the occult undercurrents seeded in Nazi ideology begin to manifest in darker, more structured forms. In this episode, we follow the secret arcane projects that evolved behind SS walls — from Himmler’s ritual fortress at Wewelsburg to the shadowy halls of the Ahnenerbe. Follow along with the timel…
…
continue reading

1
321 - Mastering the Balancing Act: Entrepreneurial Strategies for Work-Life Harmony with Bahia AI's Danika Chilibeck
23:53
23:53
Play later
Play later
Lists
Like
Liked
23:53Your host, Doug Noll, talks with the Co-Founder and CEO of Bahia AI, Danika Chilibeck. Danika shares her transition from a finance career in mergers and acquisitions to the tech industry, working at Shopify and Rewind before founding Bahia AI. The platform automates talent sourcing for HR professionals. Danika discusses recruitment challenges, the …
…
continue reading
The Chinese government could hardly do a better job of attacking our key assets than what Trump is doing himself, argues Bradley. Will this really turn out well for his base? Plus, he reflects on what was better about New York City in the 1990s, why Tesla's board cannot afford to replace Elon Musk as CEO, and how strip malls are the key to LA's exc…
…
continue reading

1
BONUS INTERVIEW: Senator Mark Warner on Signalgate, Volt Typhoon and tariffs
49:44
49:44
Play later
Play later
Lists
Like
Liked
49:44In this extended interview the Vice Chair of the Senate Select Committee on Intelligence, Senator Mark Warner, joins Risky Business host Patrick Gray to talk about: The latest developments in the Signalgate scandal Why America needs to be more aggressive in responding to Volt Typhoon How tariffs are affecting American alliances Why the Five Eyes al…
…
continue reading

1
SANS Stormcast Tuesday, May 6th: Mirai Exploiting Samsung magicInfo 9; Kali Signing Key Lost; (#)
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57SANS Stormcast Tuesday, May 6th: Mirai Exploiting Samsung magicInfo 9; Kali Signing Key Lost; Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung’s MagicInfo 9 CMS, was patched last August but attracted …
…
continue reading
As we learned last week from Zach Edwards, our smartphones have a globally unique mobile ad ID, or MAID, that is automatically associated with everything we do on our phones… unless we take explicit steps to turn this off. Today I’ll tell you how this works and why you should disable this insidious form of tracking. In other news: the FTC warns us …
…
continue reading