Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Security Technology Podcasts
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job, there's always something fun to wrap up the show.
…
continue reading
Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
👋 Welcome to Bizionic Technology Pvt Ltd! We specialize in providing top-notch Hire Talent, Marketing, Technologies, Cloud Consulting Services, and Security Solutions. Don't forget to check out our podcast for valuable insights. Visit our website at https://www.bizionictech.com for more information. Let's innovate together! 💡 #BizionicTech #InnovateWithUs
…
continue reading
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 18:00 UTC.
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading
TV Tech Guy Rich DeMuro offers tech news, gadget reviews, helpful apps and answers your questions. richontech.tv
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
The United States is in the midst of a dramatic political realignment with shifting views on national security, economics, technology, and the role of government in our lives. Saagar Enjeti and Marshall Kosloff explore this with thinkers, policymakers, and more.
…
continue reading
Artificial Intelligence has too much hype. In this podcast, linguist Emily M. Bender and sociologist Alex Hanna break down the AI hype, separate fact from fiction, and science from bloviation. They're joined by special guests and talk about everything, from machine consciousness to science fiction, to political economy to art made by machines.
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
Welcome to covert actions and national security podcast. Welcome to covert and national security podcast. A podcast where we discuss a spectrum of activities concerning covert operations, intelligence, counterintelligence, unconventional warfare, assassination issues, espionage spy craft technology and more. Enter the operational world with Dr. Carlos
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI). Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers.
…
continue reading
Inside Java is a podcast for Java Developers brought to you directly from the people that make Java at Oracle. We'll discuss the language, the JVM, OpenJDK, platform security, innovation projects like Loom and Panama, and everything in between.
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
A Technology Geek Podcast with an EVER so Slight Macintosh Bias!
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
We're a couple of geeks discussing whatever comes to mind. We may talk about systems administration, public speaking, conventions, security news,...it's hard to tell what we're going to rant about next.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Get the edge with Hidden Forces where media entrepreneur and financial analyst Demetri Kofinas gives you access to the people and ideas that matter, so you can build financial security and always stay ahead of the curve.
…
continue reading

1
Counterfeit medicine, forensic frontiers and foreign interference with Dr Adrian De Grazia
41:52
41:52
Play later
Play later
Lists
Like
Liked
41:52By Dr Miah Hammond-Errey
…
continue reading

1
How to Proactively Manage Change in Security Technology Implementations
35:37
35:37
Play later
Play later
Lists
Like
Liked
35:37Your mindset makes a huge difference in proactively managing change at work, rather than just reacting to it, says Mohammed Shehzad in the October 2025 episode of SM Highlights. When security technology and processes get involved, resistance and confusion can impact the overall progression and success of the change. Also in this episode, Rachel Bri…
…
continue reading

1
Cybersecurity Fundamentals : Enterprise Security Architecture Chapter 5
23:54
23:54
Play later
Play later
Lists
Like
Liked
23:54[email protected] Dive deep into the essential building blocks of secure enterprise networks with Professor J. Rod in this comprehensive exploration of network architecture, security appliances, and remote access solutions. What makes a truly secure organizational network? It's more than just firewalls and fancy equipment—it's thoughtful desi…
…
continue reading

1
3426: Aura Technology at TechSummit25: XDR, Secure Edge, Real Outcomes
18:48
18:48
Play later
Play later
Lists
Like
Liked
18:48I recorded this episode at Barracuda TechSummit25 in Alpbach, Austria, a mountain village that looks like a postcard and hosts some of the most grounded security conversations you will hear all year. My guest is Richard Flanders, Commercial Director at Aura Technology, a managed service provider on the south coast of England that supports public se…
…
continue reading

1
Lawfare Archive: Justin Sherman on the FTC Settlement with Location Data Broker X-Mode
42:27
42:27
Play later
Play later
Lists
Like
Liked
42:27From January 19, 2024: Last week, the Federal Trade Commission (FTC) reached a settlement with location data broker X-Mode Social. X-Mode collects over 10 billion location data points from all over the world every day, and sells it to clients in a range of industries, like advertisers, consulting firms, and private government contractors. The FTC a…
…
continue reading

1
3450: Why Predictive AI Delivers Real ROI While Generative AI Struggles
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35What if the next big leap in business AI isn’t generative at all, but predictive? That’s the question at the heart of my conversation with Zohar Bronfman, CEO and co-founder of Pecan AI, a company helping business teams forecast outcomes with precision and turn historical data into future insights. Zohar explains why he believes predictive AI will …
…
continue reading

1
Windows 10's Extra Year of Updates Has a Catch...
35:23
35:23
Play later
Play later
Lists
Like
Liked
35:23Episode 242: Microsoft offers an extension for Windows 10 users to get security updates longer (but there's a catch), LinkedIn will start using your data to train AI (but you can opt out), OnePlus phones have a serious vulnerability, and more. Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest se…
…
continue reading

1
Lawfare Archive: Noah Efron on the Awful Quiet of This Moment
58:46
58:46
Play later
Play later
Lists
Like
Liked
58:46From October 10, 2023: This morning, Lawfare Editor-in-Chief Benjamin Wittes connected with his old friend Noah Efron about the weekend's events in Israel. Noah is a professor at Bar-Ilan University, a prolific essayist and writer, and the host of The Promised Podcast, a podcast on Israeli life, politics, and culture. In an interview punctuated twi…
…
continue reading

1
The Role and Evolution of Virtual CISOs with Craig Taylor
51:54
51:54
Play later
Play later
Lists
Like
Liked
51:54In this episode of Cybersecurity Today, Jim hosts Craig Taylor, a seasoned virtual Chief Information Security Officer (vCISO) with over 25 years of experience. They discuss the evolution and significance of the vCISO role, Taylor's career path, and the founding of his company, Cyber Hoot, which provides cybersecurity education and vCISO services. T…
…
continue reading
This was almost "The Quiet Episode" after some audio challenges, amazing what technology can hide... Eric gets back in town just in time to leave town. Jon goes to a bookstore. The UK is still trying to get Apple to create a backdoor. OpenAI talked about malicious use of AI. ShinyHunters are back. Pristine Stars are a thing and Powell's City of Boo…
…
continue reading

1
3449: How Urban SDK Is Using AI to Help Local Governments Save Lives
30:08
30:08
Play later
Play later
Lists
Like
Liked
30:08What happens when artificial intelligence meets the everyday heroes of local government? That’s the question driving my conversation with Justin Dennis, co-founder and COO of Urban SDK, a geospatial AI company helping more than 250 North American cities make faster, safer, and smarter decisions. Justin shares how a Smart Cities Challenge from the U…
…
continue reading

1
More Cl0p Clues and Huge Apple Bug Bounty Changes
14:17
14:17
Play later
Play later
Lists
Like
Liked
14:17This week brings some new insights into the origins and length of the Cl0p extortion attacks tied to the Oracle E-Business Suite vulnerability, big surges in scanning for Cisco ASA, Palo Alto, and Fortinet devices, and a huge upgrade to Apple bug bounty payouts. Plus: Does Dennis have a dog yet? https://security.apple.com/blog/apple-security-bounty…
…
continue reading

1
Personal data defined? Ulrich Baumgartner on the implications of the CJEU's SRB ruling
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37On 4 Sept., the Court of Justice of the European Union gave its highly anticipated decision in the EDPS v. SRB case. In its landmark ruling, the CJEU clarified the definition of personal data under the EU General Data Protection Regulation, and, in essence, the scope of EU data protection law. For Ulrich Baumgartner, a partner at Baumgartner Bauman…
…
continue reading

1
Scaling Laws: AI Safety Meet Trust & Safety with Ravi Iyer and David Sullivan
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29David Sullivan, Executive Director of the Digital Trust & Safety Partnership, and Rayi Iyer, Managing Director of the Psychology of Technology Institute at USC’s Neely Center, join Kevin Frazier, AI Innovation and Law Fellow at the University of Texas School of Law and a Senior Editor at Lawfare, to discuss the evolution of the Trust & Safety field…
…
continue reading

1
Teenage Ransomware Arrest In Day Care Ransom
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Cybersecurity Today: Teenage Ransomware Arrests, GoAnywhere Critical Flaw, and Google AI Vulnerability In this episode of Cybersecurity Today, hosted by Jim Love, two teenagers were arrested in London for a ransomware attack on Kiddo International preschools, involving child data extortion. The show discusses a critical vulnerability in GoAnywhere …
…
continue reading

1
SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike “Issues”; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper) (#)
15:13
15:13
Play later
Play later
Lists
Like
Liked
15:13SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike “Issues”; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper) https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Defending against attacks like RedTail is more then blocking IoCs, but instead…
…
continue reading

1
3448: Inside Kore.ai’s Mission to Make Agentic AI Accessible for Everyone
30:19
30:19
Play later
Play later
Lists
Like
Liked
30:19Agentic AI is only interesting when it leaves the lab and takes responsibility for real outcomes. In this episode, I reconnect with Raj Koneru, Founder and CEO of Kore.ai, to talk about what that shift looks like inside large enterprises. Raj has been building conversational systems long before chatbots became dinner table conversation, and he is c…
…
continue reading

1
TNW 408: OpenAI DevDay: ChatGPT OS? - Meet Casio's Smart AI-Powered Companion
1:10:56
1:10:56
Play later
Play later
Lists
Like
Liked
1:10:56Amanda Silberling joins Mikah Sargent on Tech News Weekly this week! Casio has a new smart toy companion powered by AI. The UK is still seeking to develop backdoor encryption for Apple users. ChatGPT is looking to act more like an operating system. And how the 'Buy Now, Pay Later' model has built a $120 billion industry. Amanda has her hands on a n…
…
continue reading

1
Cybersecurity Fundamentals : Cloud, Zero Trust, and You Chapter 6
23:24
23:24
Play later
Play later
Lists
Like
Liked
23:24[email protected] Cloud perimeters are fading, identities are multiplying, and threats move faster than patches. We dive into the real mechanics of securing a hybrid world—mapping cloud deployment choices, clarifying shared responsibility across SaaS, PaaS, and IaaS, and showing how Zero Trust reshapes defenses around identity, posture, and c…
…
continue reading

1
Lawfare Daily: The State of the Spyware Industry with Jen Roberts and Sarah Graham
37:58
37:58
Play later
Play later
Lists
Like
Liked
37:58Jen Roberts, Associate Director of the Atlantic Council’s Cyber Statecraft Initiative, and Sarah Graham, Research Consultant with the Atlantic Council’s Cyber Statecraft Initiative, who are coauthors along with Nitansha Bansal of the recent paper, “Mythical Beasts: Diving Into the Depths of the Global Spyware Market,” join Lawfare’s Justin Sherman …
…
continue reading

1
CR111: From mission-driven to tech-driven with Ben Sparke, Microsoft
46:45
46:45
Play later
Play later
Lists
Like
Liked
46:45The evolving role of technology in modern defense environments, highlighting innovations in communications, automation, and open-source frameworks. Drawing from personal experience, the conversation emphasizes how real-world conflicts are reshaping how tech is deployed, adopted, and understood across military operations. This week, Dave, Esmee, and…
…
continue reading

1
SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln; (#)
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln; Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnera…
…
continue reading

1
3447: How DXC Is Using AI to Outsmart Cybercriminals
28:36
28:36
Play later
Play later
Lists
Like
Liked
28:36In this episode, Mike Baker, Vice President and Global CISO at DXC Technology, says the cyber industry has been focusing on the wrong side of AI. He believes too many companies use it only to block threats instead of studying how criminals use it to scale phishing, bypass defenses, and deploy adaptive malware. Attackers are learning faster than eve…
…
continue reading

1
Visual Intelligence and the Future of Security Tech with Wesco’s Tara Dunning
34:56
34:56
Play later
Play later
Lists
Like
Liked
34:56In this episode of Security DNA, host Steve Lasky sits down with Tara Dunning, Vice President of Global Security and Network Infrastructure Sales and Strategy at Wesco, to explore how AI, IoT, and cloud technologies are transforming the role of today’s security integrators. Discover how cameras are evolving from simple surveillance tools to powerfu…
…
continue reading

1
Episode 20: Craig Newmark, Craigslist Founder and Philanthropist
17:39
17:39
Play later
Play later
Lists
Like
Liked
17:39In this episode of Code and Country, Ian L. Paterson speaks with Craig Newmark, Craigslist founder and philanthropist, about his $200 million commitment to U.S. cybersecurity. Craig outlines his vision for "cyber civil defense"—a World War II-style mobilization where every American helps protect against nation-state threats like China's Salt Typhoo…
…
continue reading

1
Rational Security: The “F*cked by Five” Edition
1:24:23
1:24:23
Play later
Play later
Lists
Like
Liked
1:24:23This week, Scott sat down with his Lawfare colleagues Managing Editor Tyler McBrien, Foreign Policy Editor Daniel Byman, and Public Service Fellow Loren Voss to talk through (somehow only three of) the week’s big national security news stories, including: “The Dream of the ‘90s is Alive in Portland.” This past week, the Trump administration made go…
…
continue reading
What you see on these screens up here is a fantasy; a computer-enhanced hallucination. WarGames may be 42 years old (!) but its prescience about our current technocracy and race to take humans out of the loop is as clear as ever. Dennis Fisher, Lindsey O-Donnell-Welch, Zoe Lindsey, and Pete Baker sit down in front of an IMSAI 8080 with some raw cor…
…
continue reading

1
3446: How Atlassian Is Redefining Teamwork with AI at Team 25
34:26
34:26
Play later
Play later
Lists
Like
Liked
34:26What happens when the future of teamwork collides with the power of AI? That’s the question at the heart of this episode as Tiffany from Atlassian joins me from Barcelona during Team 25, where Atlassian is showcasing how AI-powered collaboration is redefining how work gets done. We talk about how Atlassian’s mission to unleash the potential of ever…
…
continue reading
On today's podcast, Executive Editor Natalie Orpett is joined by Judge Philip Pro and Judge Jeremy Fogel. Both are retired federal court judges who are members of a new organization, the Article III Coalition, which advocates for an independent judiciary. They talk about how the courts are faring amidst the enormous stresses of the day: a huge numb…
…
continue reading
By Jim Love
…
continue reading

1
SANS Stormcast Wednesday, October 8th, 2025: FreePBX Exploits; Disrupting Teams Threats; Kibana and QT SVG Patches (#)
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57
…
continue reading

1
SN 1046: Google's Developer Registration Decree - The End of Free Android Apps?
2:31:21
2:31:21
Play later
Play later
Lists
Like
Liked
2:31:21By TWiT
…
continue reading

1
SN 1046: Google's Developer Registration Decree - The End of Free Android Apps?
2:31:51
2:31:51
Play later
Play later
Lists
Like
Liked
2:31:51By TWiT
…
continue reading

1
A+ Fundamentals: Boot to Brains Chapter 4
24:14
24:14
Play later
Play later
Lists
Like
Liked
24:14By Juan Rodriguez
…
continue reading

1
Lawfare Daily: ‘38 Londres Street,’ Impunity, and Immunity with Philippe Sands
1:04:02
1:04:02
Play later
Play later
Lists
Like
Liked
1:04:02
…
continue reading

1
Finding Large Bounties with Large Language Models - Nico Waisman - ASW #351
53:52
53:52
Play later
Play later
Lists
Like
Liked
53:52
…
continue reading

1
S36 Ep7: Dr. Amy Athey - Under Pressure: Leadership & High Performance
26:48
26:48
Play later
Play later
Lists
Like
Liked
26:48By Information Security Forum Podcast
…
continue reading

1
577 | Steve Teles: Why the Realignment Has Made Think Tanks More Relevant Than Ever
57:47
57:47
Play later
Play later
Lists
Like
Liked
57:47By Steve Teles, Marshall Kosloff
…
continue reading

1
SANS Stormcast Tuesday, October 7th, 2025: More About Oracle; Redis Vulnerability; GoAnywhere Exploited (#)
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34
…
continue reading
AI Browsers Turn Rogue, Discord Data Breach, and Surge in Palo Alto Scans In this episode of Cybersecurity Today, host David Shipley discusses several significant cybersecurity concerns. Firstly, researchers at Layer X have uncovered a flaw in the Perplexity Comet AI browser that allows malicious prompts to turn the browser into a data thief with j…
…
continue reading

1
3445: Why AI Won’t Replace Human Testers at Jalasoft
24:34
24:34
Play later
Play later
Lists
Like
Liked
24:34By Neil C. Hughes
…
continue reading

1
Proton Mail Account Suspensions Explained
1:17:25
1:17:25
Play later
Play later
Lists
Like
Liked
1:17:25
…
continue reading

1
From Florida to Cambridge: A USF Future Strategist Experience at Cambridge
24:18
24:18
Play later
Play later
Lists
Like
Liked
24:18
…
continue reading

1
Field Notes: Coffee, Gliders & Trademark Scams
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55Ever wonder what the hosts of The Audit talk about when the mics are rolling but the formal interview isn't happening? This Field Notes episode gives you exactly that—unfiltered conversations covering everything from coffee preferences and glider flying to trademark scams targeting cybersecurity professionals. Nick and Eric dive into Eric's latest …
…
continue reading

1
Lawfare Daily: The Trials of the Trump Administration, Oct. 3
1:39:53
1:39:53
Play later
Play later
Lists
Like
Liked
1:39:53In a live conversation on YouTube, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Senior Editors Scott Anderson, Anna Bower, Eric Columbus, and Roger Parloff to discuss a hearing in the litigation over the National Guard deployment in Portland, states suing the federal government over immigration enforcement conditions being placed o…
…
continue reading

1
The End of Neoliberalism and the Coming Storm | Viktor Shvets
54:34
54:34
Play later
Play later
Lists
Like
Liked
54:34In Episode 443 of Hidden Forces, Demetri Kofinas speaks with former investment banker turned global strategist Viktor Shvets, whose books The Great Rupture and The Twilight Before the Storm provide an audaciously comprehensive and compelling framework for understanding the forces shaping our world. These include technology and finance, amplified by…
…
continue reading