Experience the Cold War like never before with Cold War Conversations — an award-winning podcast recommended by The New York Times. Each week, host Ian Sanders brings you raw, firsthand accounts from the people who lived through one of history’s most tense and transformative eras — soldiers, spies, civilians, and more. These aren’t stories from textbooks. They’re unfiltered voices from the frontlines of history — emotional, gripping, and deeply human. This is Cold War history, told from the ...
…
continue reading
OSINT Podcasts
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
…
continue reading
Here at Cyber Sector 7 our main goal is to Inform you and give you Security Tips, Digital Privacy Tips, OSINT Methods, and to teach you about hacker methods, culture, and news. We want to inform you of how important security and privacy is. This is for everyone, even if you know nothing about computers, we want you to stay informed.
…
continue reading
Welcome to OSINT Cocktail - a podcast about tools for investigators. Kirby Plessas and Cynthia Navarro interview investigators of all types on the tools of their trades. The purpose is to illustrate the variety of setups for investigators of all types. What do you really need to do a thorough investigation? Pick up some tips here!
…
continue reading
Military news and defence podcast hosted by @DefenceGeek, @Osinttechnical, @AnAustinThing2 and @geoallison in collaboration with the UK Defence Journal. www.theosintbunker.org
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
…
continue reading
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
…
continue reading
The OSINT Curious Project is a source of quality, actionable, Open Source Intelligence news, original blogs, instructional videos, and a bi-weekly webcast/podcast. Most of all, we want to inspire people to look outside of their OSINT-comfort zones and pursue their OSINT passions. We try to keep people curious about exploring web applications for bits of information or trying out new techniques to access important OSINT data. We are an OSINT-learning catalyst. Support this podcast: https://po ...
…
continue reading
1
OSINT with ShadowDragon & Digital Tools For Modern Investigations
Daniel Clemens from ShadowDragon, LLC
This podcast covers a variety of cyber security topics, with a focus on candor, and zero b.s. Topics may include OSINT, PAI, Tailored Monitoring, Investigations, Offensive Disciplines, AI/ML, Object Recognition, Forensics, Historical Industry Lore, All things considered in Cyber.
…
continue reading
Cloak & Dagger is a podcast about OSINT, technology, global conflict, and the practitioners and investigators who work in these fields. Join host and journalist MJ Banias as he explores the stories that shape the worlds of intelligence, security, and technology. Cloak & Dagger is powered by Sapper Labs Group. For more information, https://sapperlabs.com/blogs/podcast
…
continue reading
1
The NDS Show - An Intelligence Community Podcast covering Geospatial Intelligence, Open Source Intelligence OSINT, Human Intelligence HUMINT, Military & National Security
The NDS Show
Unlock a world of valuable insights and thought-provoking discussions related to the Special Forces, Military, and Intelligence Community (CIA, NSA, NGA, FBI, Military Intelligence). Things we discuss: GEOINT, OSINT, HUMINT, SIGINT, SOF, Special Forces, Military, Veterans Issues, Army, Navy, Marines, Air Force, Entrepreneurship, Geopolitics, News, Politics, Technology, Artificial Intelligence, Augmented Reality, Cloud Computing, Data Analytics, Government Contracting, Defense Contracting, Bu ...
…
continue reading
In the Arena is a podcast about building products that matter for America’s future. Hosted by Vannevar CEO Brett Granberg and Hayley Menser, the series goes inside the fight to modernize U.S. defense and outcompete authoritarian adversaries. From product bets and mission wins to the people and principles behind them, In the Arena is a blueprint for builders on the frontlines of strategic competition.
…
continue reading
Welcome to the Layer 8 Podcast season 5! This season we’ll have conversations with social engineers and OSINT investigators who will tell their stories. We hope you enjoy them.
…
continue reading
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
…
continue reading
Step into the world of digital forensics, mobile forensics, OSINT, and cybersecurity with The Cyber Sleuth Show! Hosted by Kevin DeLong, this podcast dives deep into the ever-evolving landscape of digital investigations, featuring expert guests, cutting-edge tools, real-world case insights, and, of course, the occasional terrible dad joke. From law enforcement investigators and forensic analysts to OSINT specialists and cybersecurity pros, we uncover the latest trends, techniques, and challe ...
…
continue reading
David Bombal interviews people in the networking world to learn about life, hacks, technology and networking and ways to improve your life!
…
continue reading
U.S. foreign policy for the future. Security Dilemma brings you conversations with the experts, policymakers, and thinkers charting new paths forward from the wreckage of recent decades and toward a national security and defense policy guided by prudence and restraint. Cohosts John Allen Gay and A.J. Manuzzi bring you the information you need to shape a wiser approach. Security Dilemma is a podcast of the John Quincy Adams Society, an independent nonprofit organization dedicated to advancing ...
…
continue reading
When the threats are real and the stakes are high — what actually works? Right now, as you're reading this, someone's watching your family, your business rivals are digging through your digital history, and a disgruntled employee knows exactly where your vulnerabilities are. While you're focused on your day job, they're building a plan. This podcast exists because ignoring threats doesn't make them disappear. I'm Philip Grindell — former Scotland Yard detective, behavioural threat specialist ...
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
…
continue reading
The podcast that explores everything related to disinformation and online networks. To help us make sense of the global town square that is social media, in every episode, our host speaks to a fresh voice to uncover the good, bad, and fake online. This podcast believes that we are at a pivotal moment in the fight against disinformation. Many people apply the word disinformation to everything from fake news, bot networks, malicious actors, influence operations, manipulation, inauthentic accou ...
…
continue reading
A skilled individual can effortlessly blend into any environment without drawing attention, effectively hiding their true capabilities and intentions. They seamlessly mingle, remain unmemorable, and forge relationships to gather vital information for their objectives. Every move they make is calculated and intended to keep them inconspicuous. Originating from espionage, the term "gray man" refers to incorporating spy tradecraft into one's daily life. This involves honing skills essential for ...
…
continue reading
WYWM #BeFierce Podcast - Our Audio Archive for the Future Military veterans discussing hot topics such as recruitment, talent, skills, transition, and the market. Are you a current/ex-serving military member or immediate family member? Sign up today for free courses to IT Careers including Cyber Security, Robotic Process Automation, Data Analytics. Simply visit our website and sign up! https://www.withyouwithme.com
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
Want to learn about all of the latest security tools and techniques? This is the show for you! We show you how to install, configure and use a wide variety of security tools for both offense and defense. Whether you are a penetration tester or defending enterprise networks, this show will help you
…
continue reading
CyberSpeaksLIVE is an InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeakslive.
…
continue reading
”Bright Brainz” is an engaging podcast that brings together fascinating individuals to delve into captivating subjects, catering to the curiosity of inquisitive minds. Join us as we explore a wide array of intriguing topics, featuring insightful conversations with experts, enthusiasts, and innovators from various fields. Whether you’re a lifelong learner or simply curious about the world around you, ”Bright Brainz” is your ticket to a journey of discovery, where the intellectually curious ga ...
…
continue reading
Owl Talks is a new adventure where we try to highlight user's unique areas of interest and expertise to help everyone gain a more well rounded understanding of events, cultures, and experiences.
…
continue reading
Security Headlines is a podcast about the latest security vulnerabilities with in the cyber security field. So if your interested about the latest security holes no mather if you are a tech savy penetration tester, a devops person, a programmer or just generally interested in the latest technology security news. Security headlines is here for you Security headlines is perfect to listen on when you want a quick update, on the way to work or when you are taking a walk out side The podcast is p ...
…
continue reading
1
The Rise of Citizen OSINT, and What to Do About It
42:43
42:43
Play later
Play later
Lists
Like
Liked
42:43In this episode, hosts Robert Vamosi and AJ Nash engage with Neil Ysart, a seasoned expert in cyber investigations and open source intelligence (OSINT). They discuss the Coalition of Cyber Investigators, its role in promoting OSINT, and the importance of establishing standards in the field. The conversation delves into the challenges and risks asso…
…
continue reading
1
#519: Build Your First OSINT Bookmarklet in 5 Minutes
49:06
49:06
Play later
Play later
Lists
Like
Liked
49:06Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen - You’ll also get 20% off and annual premium subscription Two veteran OSINT investigators show how they pull hidden data from TikTok, Telegram, X, Cash App and WordPress using simple brows…
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. In this episode, Senior Pentester Duncan Wooselybreaks down open source intelligence (OSINT) and how hackers use it to their advantage. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Threats nev…
…
continue reading
1
The Berlin Airlift - Victories, Myths, and the Berlin Blockade (432)
1:08:42
1:08:42
Play later
Play later
Lists
Like
Liked
1:08:42The Berlin Blockade was one of the first major international crises of the Cold War when the Soviet Union blocked the Western Allies' railway, road, and canal access to the sectors of Berlin under Western control. I speak with Joseph Pearson, the author of “The Airlift Victories, Myths, and the Berlin Blockade. This is not your standard military hi…
…
continue reading
1
Surrounded and outnumbered 8-1 : A forgotten story of the Korean War (431)
59:43
59:43
Play later
Play later
Lists
Like
Liked
59:43This is the largely untold story of Task Force Faith, the U.S. Army soldiers who although outnumbered 8-1 by Chinese troops fought valiantly during the Battle of Chosin Reservoir in the Korean War. Author Steve Fogel has written a new book called A Task Force Called Faith - The Untold Story of the U.S. Army Soldiers Who Fought for Survival at Chosi…
…
continue reading
1
#523: Why We Are MASSIVELY Underestimating AI Infrastructure Demand
21:44
21:44
Play later
Play later
Lists
Like
Liked
21:44Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partner Summit San Diego 2025. This video is a deep dive with Jeetu Patel on why the real AI revolution is happening in infrastructure and networking, not just in GPUs or chatbots. Jeetu explains that we are massively underestimating how much AI infrastructure the world w…
…
continue reading
1
#522: Does Traditional Encryption End in 2027?
15:24
15:24
Play later
Play later
Lists
Like
Liked
15:24Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partner Summit 2025. Is your encryption safe? Cisco’s Vijoy Pandey reveals why distributed quantum computing is coming in 2-3 years, not 10. Learn about the 'Store Now, Harvest Later' threat and how quantum networking changes everything, including the security of your VPN…
…
continue reading
1
What is an "America First" Nuclear Strategy? with Sumantra Maitra
1:00:49
1:00:49
Play later
Play later
Lists
Like
Liked
1:00:49In this week's episode of Security Dilemma, A.J. Manuzzi and John Gay spoke with Dr. Sumantra Maitra about what an "America First" nuclear strategy might look like. Dr. Maitra is the Director of Research and Outreach at the American Ideas Institute and a Senior Fellow at the Center for Renewing America. He is also the author of The Sources of Russi…
…
continue reading
1
80% Lie on Dating Apps — Here’s How to Know the Truth
6:49
6:49
Play later
Play later
Lists
Like
Liked
6:49They said they love hiking, jazz, and meditation—but their socials say otherwise. In a world where 80% of dating profiles contain lies or omissions, how can you know who you’re really talking to? In this episode of Ask Socialprofiler, Tony and Dave unpack the truth about online dating in 2025. From fake identities to billion-dollar scams, they show…
…
continue reading
1
Episode 49 - Interview With Zach w/ Developing Coze JS - Encryption, & Cryptography Chat
2:34:03
2:34:03
Play later
Play later
Lists
Like
Liked
2:34:03Show Notes - https://forum.closednetwork.io/t/episode-49-interview-with-zach-w-developing-coze-js-encryption-cryptography-chat/168 Website / Donations / Support - https://closednetwork.io/support/ BTC Lightning Donations - [email protected] / [email protected] Thank You Patreons! - https://www.patreon.com/closednetwork Michael Bates - Privac…
…
continue reading
1
#521: Why GrapheneOS is Almost Impossible to Crack (Forensic Teams Have Tried)
1:05:35
1:05:35
Play later
Play later
Lists
Like
Liked
1:05:35GrapheneOS expert MetropleX joins David Bombal to bust myths. We cover banking apps, notifications, Play Services, and why GrapheneOS is more secure than iOS's lockdown mode. // Sponsored Segment A big thank you to Proton VPN for sponsoring this video. This Black Friday, Save 75% on Proton VPN on the 24 month plan with my link.https://protonvpn.com…
…
continue reading
1
Trading with the Enemy with Mariya Grinberg
54:00
54:00
Play later
Play later
Lists
Like
Liked
54:00In this week's episode of Security Dilemma, A.J. Manuzzi and John Gay spoke with Mariya Grinberg about her new book Trade in War: Economic Cooperation Across Enemy Lines (https://www.cornellpress.cornell.edu/book/9781501782442/trade-in-war/), why states may trade with their adversaries during wartime, and the relationship between economic interdepe…
…
continue reading
1
Protecting Your Kids Online. What Every Parent Needs to Know
8:18
8:18
Play later
Play later
Lists
Like
Liked
8:18Your child is online—and so are the people influencing them. From games to group chats, social media to secret accounts, the digital world is shaping your kids in real time. Are you part of that conversation? In this episode of Ask Socialprofiler, Tony and Dave dive into what modern parenting really looks like in 2025—and how AI-powered tools like …
…
continue reading
1
Fundamentals first: The case for foundational intelligence today
27:17
27:17
Play later
Play later
Lists
Like
Liked
27:17Recorded live from DSEI 2025. Join host Kate Cox and a panel of Janes experts including Sean Corbett, Dylan Lehrke, and Tom Barton, as they unpack the essentials of intelligence, from foundational data to cutting-edge military insights. Discover what goes on behind the scenes in crafting the intelligence that informs global defence strategies and d…
…
continue reading
1
Shaking Hands with China’s Second Most Powerful Man (430)
54:25
54:25
Play later
Play later
Lists
Like
Liked
54:25Bill Hodes was an American school child in 1950s Revolutionary China and this is the second part of his story. Among many stories we hear how he had the unique opportunity to meet one of China's most revered leaders, Zhou Enlai, the first Premier of the People's Republic of China and how he played softball with US and British POWs from the Korea Wa…
…
continue reading
1
The Trillion Dollar War Machine with William Hartung and Ben Freeman
58:48
58:48
Play later
Play later
Lists
Like
Liked
58:48In this week's edition of Security Dilemma, A.J. Manuzzi and John Gay spoke with William Hartung and Ben Freeman of the Quincy Institute for Responsible Statecraft about their new book The Trillion Dollar War Machine: How Runaway Military Spending Drives America into Foreign Wars and Bankrupts Us at Home. You can buy the book here: https://www.amaz…
…
continue reading
Show Notes: The Monitoring and Enforcement Episode KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. In this episode, Vice President of Privacy Assurance Services, Mark Hinely shares the importance of monitoring and enforcement. Join Our Cybersecurity Mission: https://www.linkedin.com/sho…
…
continue reading
In this episode, Michael DeBolt joins Robert Vamosi and AJ Nash to dive into the world of Cyber HUMINT — the application of traditional human intelligence (HUMINT) tradecraft in cyberspace. They discuss how investigators use digital personas (sometimes called “sock puppets”) to infiltrate online threat actor communities, collect intelligence, and e…
…
continue reading
1
#520: Watch Your WiFi: One Infected Phone Takes Over Your Life
50:22
50:22
Play later
Play later
Lists
Like
Liked
50:22Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen - You’ll also get 20% off and annual premium subscription Apple says iPhone is extremely hard to hack. OTW says he keeps finding real malware on normal people's iPhones. We talk Pegasus sp…
…
continue reading
1
Special: Why World War I Matters for Realists
1:07:55
1:07:55
Play later
Play later
Lists
Like
Liked
1:07:55On this special Armistice Day/Veterans Day episode of Security Dilemma, the Society's John Gay, Scott McCann, and Julie Thompson-Gomez discussed their experience as part of the Society's Strategic Leaders Fellowship study trip to World War I sites in France, as well as what lessons the First World War has for contemporary statecraft. Listeners can …
…
continue reading
1
Policing, Politics and Prejudice – A Conversation with Neil Basu QPM
1:13:12
1:13:12
Play later
Play later
Lists
Like
Liked
1:13:12Send us a text In this compelling and straight-talking episode, Philip sits down with Neil Basu QPM, one of the UK’s most respected and outspoken former senior police leaders. Neil shares the lessons, frustrations, and hard truths from over 30 years in policing — from the Stephen Lawrence inquiry to counter-terrorism, leadership under political pre…
…
continue reading
1
An American Childhood in 1950s Revolutionary China (429)
57:21
57:21
Play later
Play later
Lists
Like
Liked
57:21Bill Hodes was a red diaper baby, a baby born to Communist parents. Bill shares stories about his parents, Bob and Jane Hodes, both convinced communists who were active in civil rights movements during the McCarthy period. He recounts their life in New Orleans, his father's groundbreaking research in neurophysiology, and the family's eventual move …
…
continue reading
1
Episode 48 - Chilling with The Hated One - Solidarity In Privacy & Freedom Tech
2:16:29
2:16:29
Play later
Play later
Lists
Like
Liked
2:16:29Website / Donations / Support - https://closednetwork.io/support/ BTC Lightning Donations - [email protected] / [email protected] Thank You Patreons! - https://www.patreon.com/closednetwork Michael Bates - Privacy Bad Ass David - Privacy Bad Ass Daniel J Martin - Privacy Bad Ass TK - Privacy Bad Ass David - Privacy Bad Ass MrMilkMustache - P…
…
continue reading
1
Losing a Taiwan War? with Lyle Goldstein
1:13:31
1:13:31
Play later
Play later
Lists
Like
Liked
1:13:31On this week's episode of Security Dilemma, A.J. Manuzzi and John Gay spoke with Lyle Goldstein of Defense Priorities and the Watson Institute at Brown University about his recent paper series "Target Taiwan," which argues that a U.S.-China conflict over Taiwan could be costlier and less winnable for the United States than conventional wisdom asses…
…
continue reading
1
The German Democratic Republic The Rise and Fall of a Cold War State (428)
1:11:47
1:11:47
Play later
Play later
Lists
Like
Liked
1:11:47Ned Richardson- Little has written a new book titled The German Democratic Republic: The Rise and Fall of a Cold War State. It offers a differentiated picture of the communist state with a sophisticated analysis of life under dictatorship which candidly confronts the abuses of the East German Communist Party and the Stasi. The GDR was also entangle…
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. In this episode, Alan Wilemon dives deep into the world of privacy practices, shedding light on why reading the fine print isn’t just a chore—it’s a crucial step in protecting your digital life. He explores the vital role of Choice and Con…
…
continue reading
1
Dealing with AI Slop in OSINT Investigations
57:44
57:44
Play later
Play later
Lists
Like
Liked
57:44In this episode, AJ Nash and Robert Vamosi discuss the challenges posed by misinformation and the rise of AI-generated content. They explore the evolution of journalism, the impact of social media on information consumption, and the importance of critical thinking and media literacy. The conversation also touches on the role of AI in content creati…
…
continue reading
On this week's episode of Security Dilemma, A.J. Manuzzi and John Gay spoke with Emma Ashford, a Senior Fellow at the Stimson Center's Reimagining U.S. Grand Strategy program, about her new book First Among Equals: U.S. Foreign Policy in a Multipolar World. In this episode, we discussed the new book and why realism is necessary in an era of multipo…
…
continue reading
1
Trust but Verify: When the Soviets Came to South Dakota (427)
1:03:12
1:03:12
Play later
Play later
Lists
Like
Liked
1:03:12I continue chatting with Dennis Greene about his incredible journey from a challenging childhood in segregated Savannah, Georgia to a distinguished military career. Dennis is made Senior Flight Commander responsible for 50 Minuteman nuclear missiles. Dennis shares his firsthand experiences of the intense pressure, the psychological toll of nuclear …
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. In this episode, Lead Practitioner Shannon Lane dives into Configuration Management and how audits can keep your systems strong and secure. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission We beli…
…
continue reading
I am trying to win an award for Cold War Conversations inthe Discover Pods Awards for best history podcast 2025 and I need your nomination to get me into the finals. All I need you to do is to nominate Cold War Conversations inthe history category using this link. https://discoverpods.com/2025-podcast-awards/ Podcast Name: Cold War Conversations Po…
…
continue reading
1
Knowledge to understanding and how to get there - part two
31:55
31:55
Play later
Play later
Lists
Like
Liked
31:55In the second part of this podcast, Lt Gen (retd) Mike Groen, Harry Kemsley, and Sean Corbett continue to explore how decision making is evolving in the age of data overload. They discuss the concept of data tribalism within military and intelligence communities and the hurdles and potential of integrating diverse data types for enhanced decision m…
…
continue reading
1
From Racially Segregated Savannah to Nuclear Missile Crew Commander (426)
56:53
56:53
Play later
Play later
Lists
Like
Liked
56:53Dennis Greene, is a former Air Force officer, who shares his incredible journey from a challenging childhood in segregated Savannah, Georgia to a distinguished military career. He reflects on his early inspirations, the realities of growing up in a segregated South, and the lessons learned throughout his US military service. Dennis discusses the si…
…
continue reading
1
#518: How Cisco Links Data Centers: 64x800G at 51.2 Tbps Securely
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55Big thanks to Cisco for Sponsoring this video. For more information about the topic being discussed follow the following link: https://blogs.cisco.com/news/the-thir... Cisco’s Martin Lund joins David Bombal to unpack how AI-scale networking really works - and why a 51.2 Tbps, 64×800G, post-quantum–ready router matters. We break down scale-up vs sca…
…
continue reading
In this episode of NeedleStack, hosts AJ Nash and Robert Vamosi engage with James Villenueve, a geospatial intelligence expert, to explore the world of GEOINT and its intersection with open source intelligence (OSINT). They discuss the importance of understanding geospatial data, the ethical implications of its use, and the challenges of protecting…
…
continue reading
1
The Data Use, Retention and Disposal Episode
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48Show Notes: The Data Use, Retention and Disposal Episode KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. In this episode, Vice President of Privacy Assurance Services, Mark Hinely shares the ins and outs of data use, retention and disposal. Join Our Cybersecurity Mission: https://www.li…
…
continue reading
1
Knowledge to understanding and how to get there - part one
36:27
36:27
Play later
Play later
Lists
Like
Liked
36:27In this two-part episode, Lieutenant General Mike Groen (retd) joins Harry Kemsley and Sean Corbett to share his experience in the US intelligence and operational communities and how decision making is evolving in the age of data overload. They explore the transition from drowning in data to achieving clear thinking and decisive action in military …
…
continue reading
1
The KGB defector who saved MI5 and changed the Cold War (425)
1:03:15
1:03:15
Play later
Play later
Lists
Like
Liked
1:03:15Oleg Lyalin, was a KGB officer whose actions would provide British intelligence with pivotal information during the Cold War. I speak with Richard Kerbaj, the author of a new book, 'The Defector,' which chronicles Lyalin's story. Lyalin was trained with The KGB’s Department V, which was their sabotage and assassinations department. He was …
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. In this episode, founder and President Joseph Kirkpatrick shares the why behind the mission of delivering quality audits and what sets KirkpatrickPrice apart. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecur…
…
continue reading
1
How Have Allies Responded to U.S. Retrenchment? with Miranda Priebe
46:17
46:17
Play later
Play later
Lists
Like
Liked
46:17On this week's episode of Security Dilemma, A.J. Manuzzi and Adam Abdel-Qader spoke with Miranda Priebe, the Director of the Center for Analysis of U.S. Grand Strategy at RAND. Dr. Priebe's work has focused on grand strategy, the future of the international order, and the effects of U.S. forward presence. In this episode, we discussed the implicati…
…
continue reading
1
The Omnipresence of Fear: Understanding Stalker Psychology with Kerry Daynes
59:27
59:27
Play later
Play later
Lists
Like
Liked
59:27By Philip Grindell MSc CSyP
…
continue reading
1
#517: Have you been hacked? Advanced detection method
39:51
39:51
Play later
Play later
Lists
Like
Liked
39:51Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription. Think you’ve been hacked? In this video, David Bombal and OTW (OccupyTheWeb)walk you through OSQuery - a free, open-source tool th…
…
continue reading
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombalIn this interview from Black Hat 2025, David Bombal sits down with two cybersecurity legends: David Cowen (Digital Forensics Expert) and Evan Anderson (Red Team Operat…
…
continue reading
1
Cold War Kids: The Unique Life of US Military BRATs (424)
1:07:13
1:07:13
Play later
Play later
Lists
Like
Liked
1:07:13Author Tom Hapgood is a US military BRAT aka the child of a parent or parents serving full-time in the United States Armed Forces. He talks about his 5 years in West Germany during the Cold War. He shares the challenges of moving every few years, adapting to new cultures, and the rich tapestry of friendships formed along the way. The term "BRAT" of…
…
continue reading
In this final episode of The Lockdown, I reflect on the journey of the podcast, and explaining why I’m redirecting my energy to other projects. I discuss the importance of practical privacy measures, measures over an ‘all-or-nothing’ approach, as well as sharing my thoughts on threat modeling, and address several listener questions about privacy to…
…
continue reading
Jason Baker from the Guidepoint Research & Intelligence Team (GRIT) shares his background and provides insights into ransomware attribution, the challenges of defending against ransomware, and the implications of AI in ransomware operations.
…
continue reading
1
Episode 47 - I Don’t Need Permission - You Can Just Do Things
1:11:52
1:11:52
Play later
Play later
Lists
Like
Liked
1:11:52** SHOWNOTES ** https://forum.closednetwork.io/t/episode-47-i-dont-need-permission-you-can-just-do-things/163 Website / Donations / Support - https://closednetwork.io/support/ BTC Lightning Donations - [email protected] / [email protected] Thank You Patreons! - https://www.patreon.com/closednetwork Michael Bates - Privacy Bad Ass David…
…
continue reading