The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Security Experts Podcasts
National security, unlocked. Each Thursday, host Mary Louise Kelly and a team of NPR correspondents discuss the biggest national security news of the week. With decades of reporting from battlefields and the halls of power, they bring you inside the Pentagon, State Department, and intelligence community to help you understand America's shifting role in the world, and how events in faraway places matter here at home. Additional episodes feature interviews with power players from the NatSec wo ...
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Expert mode marketing technology, AI, and CX insights from top brands and Martech platforms fill every episode, focusing on what leaders need to know to build customer lifetime value and long-term business value. The Agile Brand with Greg Kihlström® features executives and thought leaders from top brands and tech platforms discussing the industry's trends, like AI adoption, first-party data strategies, artificial intelligence in the consumer journey, consumer data privacy, omnichannel custom ...
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Russia knows our weaknesses. But do you? A major five-part series from Sky News and Tortoise which imagines how a Russian attack on the UK could play out – and invites real-life former ministers, military chiefs and other experts to figure out how to defend the country. Written and presented by Sky News' security and defence editor, Deborah Haynes. This is Deborah's second podcast series for Sky News. In her first series, Into The Grey Zone, Deborah explores the murky evolution of warfare. W ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Decoding Geopolitics is a podcast that tries to make sense of today's dangerous world by talking with real experts on international relations, strategy and security.
…
continue reading
The original European current affairs podcast from Germany’s international broadcaster. Bringing you expert analysis and on-the ground reporting from the European capitals and beyond. Join host Kate Laycock and DW’s network of seasoned correspondents for your weekly dose of euro-politics and culture. Published every Thursday.
…
continue reading
On Mondays, Jon Stewart hosts The Daily Show, but on Thursdays, he's back in your ears with The Weekly Show -- a podcast featuring in-depth conversations with a range of special guests. From experts and advocates, to stakeholders and thought leaders, we discuss the challenges, changes, and ideas that are shaping our world.
…
continue reading
WAR ROOM: Pandemic is the first and most comprehensive program to bring the most up to the minute information on the news of the day. Stephen K. Bannon brings medical experts, politicians, business leaders, and those on the front lines for a comprehensive look at the latest news from all and provide their insider insights.
…
continue reading
U.S. foreign policy for the future. Security Dilemma brings you conversations with the experts, policymakers, and thinkers charting new paths forward from the wreckage of recent decades and toward a national security and defense policy guided by prudence and restraint. Cohosts John Allen Gay and A.J. Manuzzi bring you the information you need to shape a wiser approach. Security Dilemma is a podcast of the John Quincy Adams Society, an independent nonprofit organization dedicated to advancing ...
…
continue reading
Stay updated with the latest happenings in the world of stock markets with our expert analysts
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
CNA's experts understand today's complex and dynamic national security environments. On CNA Talks, you'll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today's national security landscape.
…
continue reading
Listen in as Michael DeLon, founder of Paperback Expert, speaks with business professionals in various industries about what makes them the true expert in their field.
…
continue reading
After 25 years helping litigators find the right expert witnesses, Round Table Group’s network contains some of the world’s greatest experts. On this podcast, we talk to some of them about what’s new in their field of study and their experience as expert witnesses.
…
continue reading
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference.
…
continue reading
Discussions over drinks with security, defense, and foreign policy insiders and experts. The original War on the Rocks podcast series.
…
continue reading
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Michael Colligan is joined by experts, advocates, and professionals to discuss creating better quality night skies.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Stay informed with Just Security: Out Loud. A selection of our written content, delivered daily, in a clear, automated voice for easy listening on the go. Each weekday, we bring you the Early Edition—your trusted, curated guide to the most important news and developments in national security, law, and global affairs over the past 24 hours. Plus, listen to select articles from Just Security’s expert authors. Whether you’re catching up on headlines or diving deeper into critical analysis, Just ...
…
continue reading
Twenty-Four Hour Expert is a podcast for anyone who likes learning about different topics or enjoys fun facts. Each week, Ali and Ami will become an “expert” on a random topic in just 24 hours. Come find out what we learn!
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Alastair Campbell and Rory Stewart break down current affairs in the UK and abroad. The Rest Is Politics analyses the latest international news, provides debate on global issues, and reveals secrets from Westminster, whilst bringing back the lost art of disagreeing agreeably. With insider perspectives and expert analysis, The Rest Is Politics is the go-to podcast for anyone seeking intelligent, engaging discussions on British and global politics. The Rest Is Politics Plus: Join with a FREE T ...
…
continue reading
Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
National Security Law Today brings legal experts discussing the hot topics and current issues in the world of national security law right to your phone. Get information and advice for lawyers, law students or interested parties who want to dig deeper into the law that protects the country.
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
GOALBUSTERS - Expert Productivity Tips: For solopreneurs, entrepreneurs, freelancers and work-from-home business people.
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we're experts. Because this is the internet, and that's how it works now.
…
continue reading
Elite Expert Insider podcast. Educate, inspire and motivate entrepreneurs, innovators and growth seekers. Hosts Melanie Johnson and Jenn Foster, owners of Elite Online Publishing, will bring you conversations from business, personal development to health and fitness. They will chat with special guests, industry leaders, authors, business and marketing experts and just darn interesting people. It's the show that will up your game!
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
1
#780: Third-party partner experience and security with Haider Iqbal, Thales
31:04
31:04
Play later
Play later
Lists
Like
Liked
31:04What if the biggest threat to your brand’s agility and security isn't a competitor, but the welcome mat you lay out for your own partners? Agility requires not just the ability to move quickly, but the confidence to do so securely. It’s about building a foundation of trust that enables seamless collaboration without introducing unnecessary risk. To…
…
continue reading
1
"Expert Q&A on the U.S. Boat Strikes" by Tess Bridgeman, Mike Schmitt, and Ryan Goodman
19:08
19:08
Play later
Play later
Lists
Like
Liked
19:08"Expert Q&A on the U.S. Boat Strikes" by Tess Bridgeman, Mike Schmitt, and Ryan Goodman Published on Dec. 3, 2025 on Just Security, an essential resource for those shaping a just and secure world.By Just Security
…
continue reading
1
EP 153 No Tech Just Cyber - Why Defensive Security Isn’t Enough Anymore with Terry Cutler International Award-Winning Cybersecurity Expert
52:14
52:14
Play later
Play later
Lists
Like
Liked
52:14Send us a text 🎧 Episode Summary — “Why Defensive Security Isn’t Enough Anymore” In this episode, cybersecurity author, keynote speaker and ethical hacker Terry Cutler joins The Security Circle to unpack the harsh realities of today’s cyber threat landscape. Terry discusses the shift organisations are experiencing as budgets tighten while attacks a…
…
continue reading
1
477. How Trump’s Security Strategy Destroys The Old World Order
51:00
51:00
Play later
Play later
Lists
Like
Liked
51:00Has Trump's 2025 National Security Strategy officially upended 80 years of American foreign policy? Why does it warn of Europe's "civilisational erasure" while downplaying threats from its traditional adversaries?And is it finally time for the UK and Europe to chart their own course? Join Rory and Alastair as they answer all these questions and mor…
…
continue reading
Episode 4985: Live Coverage From Trump's Rally In Mt. PocoBy WarRoom.org
…
continue reading
WarRoom Battleground EP 907: Selling Out American Intelligence To China; Cold War Over ChipsBy WarRoom.org
…
continue reading
1
Hypnotoad, AI Galore, Storm-0249, DocuSign, Broadside, Goldblade, Aaran Leyland... - SWN #536
34:50
34:50
Play later
Play later
Lists
Like
Liked
34:50We've got: Hypnotoad, AI Galore, Storm-0249, DocuSign, Broadside, Goldblade, Ships at Sea, Sora, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-536
…
continue reading
Predictions for the Managed Service Provider (MSP) cybersecurity landscape in 2026, with a focus on risk management, the continued importance of basic cyber hygiene, open-source adoption, and the strategic use of risk registers. Did I say Risk Register? Dom Kirby brings it home: the importance of the Risk Register and its role as we enter 2026. He …
…
continue reading
Organizations worldwide scramble to address the critical React2Shell vulnerability. Major insurers look to exclude artificial intelligence risks from corporate policies. Three Chinese hacking groups converge on the same Sharepoint flaws. Ransomware crews target hypervisors. A UK hospital asks the High Court to block publication of data stolen by th…
…
continue reading
1
Engaging with Estate and Tax Attorney, John Hartog
37:05
37:05
Play later
Play later
Lists
Like
Liked
37:05Want to know why the best experts rarely “win” a case—and why they still matter so much? We sit down with veteran estate and tax attorney and expert witness John Hartog to unpack the real value of expert testimony: confidence backed by facts, credibility that survives cross, and preparation that starts early enough to shape the entire strategy. Joh…
…
continue reading
1
Episode 4984: Trump Calls Out Weakness In Europe; Political Christian Infiltration Of Evangelicals
Episode 4984: Trump Calls Out Weakness In Europe; Political Christian Infiltration Of EvangelicalsBy WarRoom.org
…
continue reading
Episode 4983: Losing The Representative Republic; Victory Against Islam In AlabamaBy WarRoom.org
…
continue reading
1
How to secure your AI Agents: A CISOs Journey
54:52
54:52
Play later
Play later
Lists
Like
Liked
54:52Transitioning a mature organization from an API-first model to an AI-first model is no small feat. In this episode, Yash Kosaraju, CISO of Sendbird, shares the story of how they pivoted from a traditional chat API platform to an AI agent platform and how security had to evolve to keep up. Yash spoke about the industry's obsession with "Zero Trust,"…
…
continue reading
1
Episode 129: Toby Cubitt on Opportunities and Challenges
41:18
41:18
Play later
Play later
Lists
Like
Liked
41:18In Episode 129, Toby Cubitt, co-founder and CTO of Phasecraft, discusses the evolution and future of quantum computing. He emphasizes the importance of hybrid algorithms, the challenges in material science, and the need for efficient quantum algorithms. The discussion also highlights the significance of diverse educational backgrounds in the field …
…
continue reading
In this week's episode of Security Dilemma, A.J. Manuzzi and John Gay spoke with Sahar Khan, an independent national security analyst who focuses on nonproliferation, strategic stability, counterterrorism, and crisis management in Southern Asia. Previously, Dr. Khan was the Deputy Director and Senior Fellow of South Asia at the Stimson Center, a Re…
…
continue reading
1
Turn LinkedIn into Your Most Powerful Search Engine in just 7 minutes with Catherine B. Roy
12:53
12:53
Play later
Play later
Lists
Like
Liked
12:53In this fast-paced episode, business and personal growth coach Catherine B. Roy reveals how to combine visibility, business modelling, and technology to build holistic success. Learn why LinkedIn is your secret business search engine and how focused, structured productivity can set you free. https://getresultsology.com/podcast/catherine_b_roy/…
…
continue reading
Your curated weekday guide to the biggest national security and foreign policy developments over the past 24 hours. Compiled by the Just Security team and read by an automated voice, The Early Edition is an essential resource for anyone shaping a just and secure world. Published December 9th, 2025, on Just Security. ICYMI: yesterday on Just Securit…
…
continue reading
1
Making OAuth Scale Securely for MCPs - Aaron Parecki - ASW #360
1:07:43
1:07:43
Play later
Play later
Lists
Like
Liked
1:07:43The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a new…
…
continue reading
1
Lawfare Daily: Wikipedia, Ref-Working, and the Battle Over Reality
50:31
50:31
Play later
Play later
Lists
Like
Liked
50:31Wikipedia is more than an encyclopedia. It’s a key part of the internet’s information infrastructure—shaping what people know, what AI models learn, and what the public sees as true. But in an era of geopolitical conflict, AI disruption, and fracturing trust, Wikipedia has come under attack. In this episode, Renée DiResta talks with Wikipedia found…
…
continue reading
In this episode, host Kim Jones examines the rapid rise of enterprise AI and the tension between innovation and protection, sharing an RSA anecdote that highlights both excitement and concern. He outlines the benefits organizations hope to gain from AI while calling out often-overlooked risks like data quality, governance, and accountability. Kim i…
…
continue reading
1
#90: The Discord Breach – Could it Happen to You?
24:17
24:17
Play later
Play later
Lists
Like
Liked
24:17Complyance CEO Richa Kaul discusses how third parties can expose sensitive data (passports, IDs) and provides actionable steps to prevent loss and protect revenue.By Extra Something Media
…
continue reading
Opening Bell - Morning Commentary Pre-Fed Jitters Drive Global Market Decline, Indian Markets Tumble as Rupee breaches past 90 Wall Street's main indexes fell on Monday, with most S&P 500 sectors declining and Treasury yields rising as investors awaited Wednesday's Federal Reserve policy decision. Traders are pricing in 89% probability of a 25-basi…
…
continue reading
Episode 4982: SCOTUS To Restore Presidential Authority; Lies State Funded Of CapitalismBy WarRoom.org
…
continue reading
1
WarRoom Battleground EP 906: Bankruptcy Of Germany; Explosion Of Islam And Infiltration Of The West; Convert Fight Or Die
WarRoom Battleground EP 906: Bankruptcy Of Germany; Explosion Of Islam And Infiltration Of The West; Convert Fight Or DieBy WarRoom.org
…
continue reading
How might Trump’s new National Security Strategy impact cyber? The UK’s NCSC warns LLMs may never get over prompt injection. At least 18 U.S. universities were hit by a months-long phishing campaign. Russia blocks FaceTime. A bipartisan group of senators reviving efforts to strengthen protections across the health sector. Portugal provides legal sa…
…
continue reading
Episode 4981: Remembering Pearl Harbor 84 years Ago; Tina Peters Letter To President TrumpBy WarRoom.org
…
continue reading
1
Episode 4980: Ridding Illegal's From Manipulating American Social Programs; Stop Importing The Destruction Of Western World
Episode 4980: Ridding Illegal's From Manipulating American Social Programs; Stop Importing The Destruction Of Western WorldBy WarRoom.org
…
continue reading
1
EDR, XDR, or MDR - What’s the Real Difference and Why Does It Matter?
29:52
29:52
Play later
Play later
Lists
Like
Liked
29:52In the recent episode of The Security Strategist podcast, Jim Waggoner, VP of Product Strategy at N-able, and Joe Ferla, one of N-able’s Head Nerds, speak to host Chris Steffen, Vice President of Research at Enterprise Management Associates (EMA). They addressed one of cybersecurity’s biggest misconceptions – while organizations might be getting be…
…
continue reading
Your curated weekday guide to the biggest national security and foreign policy developments over the past 24 hours. Compiled by the Just Security team and read by an automated voice, The Early Edition is an essential resource for anyone shaping a just and secure world. Published December 8th, 2025, on Just Security. ICYMI: yesterday on Just Securit…
…
continue reading
1
"The Quiet Rebalance in Transatlantic Intelligence" by Brian O'Neill
27:32
27:32
Play later
Play later
Lists
Like
Liked
27:32"The Quiet Rebalance in Transatlantic Intelligence" by Brian O'Neill Published on Dec. 8, 2025 on Just Security, an essential resource for those shaping a just and secure world.By Just Security
…
continue reading
1
Fix your dumb misconfigurations, AI isn't people, and the weekly news - Wendy Nather, Danny Jenkins - ESW #436
1:34:58
1:34:58
Play later
Play later
Lists
Like
Liked
1:34:58Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security program quick wins. Everyone freaks out about vulnerabilities, patching, and exploits. Meanwhile, security tools are misconfigured. Thousands of unused software packages increase remediation effort and a…
…
continue reading
Opening Bell - Morning Commentary US Equities Advance on Softer Inflation, Fed Cut Expectations. Indian Equities Hold Steady Following RBI Rate Cut American equities posted modest, broad-based gains last week, supported by softer inflation data and resilient macroeconomic indicators that sustained expectations of Federal Reserve rate cuts. Investor…
…
continue reading
1
Lawfare Daily: The Trials of the Trump Administration, Dec. 5
1:37:47
1:37:47
Play later
Play later
Lists
Like
Liked
1:37:47In a live conversation on YouTube, Lawfare Executive Editor Natalie Orpett sat down with Lawfare Senior Editors Anna Bower, Michael Feinberg, Molly Roberts, Roger Parloff and Eric Columbus and Lawfare Contributing Editor James Pearce to discuss the arrest of a suspect in the attempted bombing on Jan. 6, 2021, a hearing in NPR’s lawsuit over the Tru…
…
continue reading
1
DevelopmentTools May Allow Remote Compromise
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08Explosive React Vulnerability and AI Tool Flaws Uncovered: Major Implications for Cybersecurity In this episode of Cybersecurity Today, host David Shipley discusses a new significant React vulnerability, React2Shell, that has caused widespread confusion and debate in the security community. This major flaw, affecting a widely used web framework, po…
…
continue reading
1
#781: CommerceIQ CMO Sai Koppala on retailer resilience through intelligent operations
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36What if the biggest threat to your brand’s profitability isn’t the next tariff or supply chain disruption, but an outdated playbook that forces you to choose between raising prices on loyal customers or sacrificing your margins? Agility requires more than just reacting quickly to market changes; it requires the intelligence to anticipate them and a…
…
continue reading
1
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 281 ~ Watch Now ~
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 281 ~ Watch Now ~ In this AMA edition of DailyCyber, I answer questions cybersecurity leaders face every day — from rebuilding income after a layoff to navigating account compromise scenarios. This episode is packed with insights on mindset, leadership, communication, and techni…
…
continue reading
1
Lawfare Archive: Lynzy Billing on Afghanistan's Zero Unit Night Raids
42:27
42:27
Play later
Play later
Lists
Like
Liked
42:27From January 24, 2023: In 2019, investigative journalist and photographer Lynzy Billing went to Afghanistan to investigate a very personal story: her own past. In the process, she discovered what she came to call a classified war, one with lines of accountability so obscured that no one had to answer publicly for operations that went wrong. Lawfare…
…
continue reading
1
Jon DiMaggio: Two roads diverged. [Strategy] [Career Notes]
9:19
9:19
Play later
Play later
Lists
Like
Liked
9:19Please enjoy this encore of Career Notes. Chief security strategist from Analyst1, Jon DiMaggio shares his story on how he grew to become a part of the cybersecurity world. He describes different jobs that paved the way to the knowledge he has in the industry right now, and he even shares about an experience that led him to a path that split and wh…
…
continue reading
Episode 4979: Corruption In The Brian Cole Case; Israel's SovereigntyBy WarRoom.org
…
continue reading
Episode 4978: Globalists Descend On Qatar; Underwriting Terrorism In AmericaBy WarRoom.org
…
continue reading
Ace investigative reporter Carol Leonnig talks about her latest scoop and new book on Trump’s DoJ, “Injustice: How Politics and Fear Vanquished America's Justice Department.” Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Karen Greenberg on Twitter https://x.com/KarenGreenberg3 Follow Michael Isikoff on Twitter: https://twitter.…
…
continue reading
1
Lawfare Archive: How Congressional Staffers Helped Our Afghan Allies
38:00
38:00
Play later
Play later
Lists
Like
Liked
38:00From April 5, 2024: A new report from the POPVOX Foundation focuses on a little-known and hugely under-appreciated congressional effort: that of congressional staffers helping Afghan allies flee the country during the U.S. withdrawal from Afghanistan. Lawfare Executive Editor Natalie Orpett sat down with the report’s author, Anne Meeker. They talke…
…
continue reading
1
#96 Chun Han Wong: China Is Entering a New Phase - And Nobody Knows Where It Leads
41:19
41:19
Play later
Play later
Lists
Like
Liked
41:19➡️ Watch the full interview ad-free, join a community of geopolitics enthusiasts and gain access to exclusive content on PATREON: https://www.patreon.com/DecodingGeopolitics ➡️ Sign up to my free geopolitics newsletter: https://stationzero.substack.com/ This is a conversation with Chun Han Wong, a reporter at the Wall Street Journal, author of the …
…
continue reading
1
When macOS gets frostbite. [Research Saturday]
24:40
24:40
Play later
Play later
Lists
Like
Liked
24:40Jaron Bradley, Director of Jamf Threat Labs, is sharing their work on "ChillyHell: A Deep Dive into a Modular macOS Backdoor." Jamf Threat Labs uncovers a newly notarized macOS backdoor called ChillyHell, tied to past UNC4487 activity and disguised as a legitimate applet. The malware showcases robust host profiling, multiple persistence mechanisms,…
…
continue reading