National security, unlocked. Each Thursday, host Mary Louise Kelly and a team of NPR correspondents discuss the biggest national security news of the week. With decades of reporting from battlefields and the halls of power, they bring you inside the Pentagon, State Department, and intelligence community to help you understand America's shifting role in the world, and how events in faraway places matter here at home. Additional episodes feature interviews with power players from the NatSec wo ...
…
continue reading
Security Weekly Podcasts
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
On Mondays, Jon Stewart hosts The Daily Show, but on Thursdays, he's back in your ears with The Weekly Show -- a podcast featuring in-depth conversations with a range of special guests. From experts and advocates, to stakeholders and thought leaders, we discuss the challenges, changes, and ideas that are shaping our world.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Your weekly fix of everything economics. Hosted by James Meadway.
…
continue reading
Off The Wall is a weekly show on WUSB radio, Stony Brook - Long Island, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Stories from the world of hacking, cybersecurity, and rogue AI. Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million dow ...
…
continue reading
A look at events making the news in Ireland over the last week, presented by Justin McCarthy. Listen live every Sunday at 1pm on RTÉ Radio 1.
…
continue reading
To defend democracy, one has to believe in it. To believe in democracy, one has to understand it. Where it came from. How it works. What’s true. What’s not. What others did before you. How it could be better. How to make a difference. Each week, The David Frum Show digs deep into the big questions people have about our society, explains the progress Americans have made together, and reminds us that the American idea is worth defending.
…
continue reading
The Long Game is a weekly national security podcast hosted by Jake Sullivan, President Biden’s National Security Advisor, and Jon Finer, his Principal Deputy—senior aides who sat in on the classified Presidential Daily Brief each morning and translated raw intelligence into policy advice. Each week, Jake and Jon will pull back the curtain on how power really works helping you make sense of the national security stories unfolding today. Part of the Vox Media Podcast Network.
…
continue reading
The original European current affairs podcast from Germany’s international broadcaster. Bringing you expert analysis and on-the ground reporting from the European capitals and beyond. Join host Kate Laycock and DW’s network of seasoned correspondents for your weekly dose of euro-politics and culture. Published every Thursday.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
With two new shows each week, our experts dig into the game-tape for analysis rich in detail and information. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Americast is the authoritative US news and politics podcast from the BBC. Each week we provide audiences with the best analysis from across the BBC, with on-the-ground observations and big picture insights about the stories which are defining America right now. The podcast is hosted by trusted BBC journalists including the BBC’s North America editor, Sarah Smith, BBC Radio 4 presenter, Justin Webb, the BBC’s disinformation and social media correspondent, Marianna Spring, and BBC North Americ ...
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Award-winning comedy panel game about weird questions with wonderful answers. Each week, Tom Scott is joined by three guests to ask each other questions with a sideways twist. There's no points or prizes - just reputation and bragging rights on the line. Enquiries and question submissions: https://www.lateralcast.com. Ad-free shows and bonus content: https://www.lateralcast.com/club.
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
True crime... casually done. Fact boy gives you new episodes on Mondays and Fridays. Also available on YouTube!
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
1
Building a Hacking Lab in 2025 - PSW #906
1:03:21
1:03:21
Play later
Play later
Lists
Like
Liked
1:03:21The crew makes suggestions for building a hacking lab today! We will tackle: What is recommended today to build a lab, given the latest advancements in tech Hardware hacking devices and gadgets that are a must-have Which operating systems should you learn Virtualization technology that works well for a lab build Using AI to help build your lab Visi…
…
continue reading
1
The CISO Holiday Party 2025: Leadership Lessons from the Year That Was - BSW #427
49:27
49:27
Play later
Play later
Lists
Like
Liked
49:27Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
…
continue reading
1
Holiday Special Part 1: You're Gonna Click the Link - Rob Allen - SWN #540
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34It's the holidays, your defenses are down, your inbox is lying to you, and yes—you're gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won't save you, and why the real job is surviving after the click. From phishing and sm…
…
continue reading
1
Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, Dustin Lehr, James Manico, Adam Shostack - ASW #362
1:07:52
1:07:52
Play later
Play later
Lists
Like
Liked
1:07:52Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
…
continue reading
1
Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, James Manico, Adam Shostack, Dustin Lehr - ASW #362
1:07:52
1:07:52
Play later
Play later
Lists
Like
Liked
1:07:52Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
…
continue reading
1
Internal threats are the hole in Cybersecurity's donut - Frank Vukovits - ESW #438
1:57:05
1:57:05
Play later
Play later
Lists
Like
Liked
1:57:05Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There's a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn't infringe on any individual organization's privacy. That's why we hear the i…
…
continue reading
PornHub extorted after hackers steal Premium member activity dataBy Carl Franklin
…
continue reading
1
Zelensky willing to drop NATO goal for security guarantees
4:58
4:58
Play later
Play later
Lists
Like
Liked
4:58US President Donald Trump's special envoy is due to meet Ukrainian President Volodymyr Zelensky and other European leaders in Berlin in the latest efforts to end Russia's war with Ukraine. Christopher Miller, Chief Ukraine Correspondent with the Financial Times, speaks to This Week.By RTÉ Radio 1
…
continue reading
1
Why Bath are Champions Cup contenders, World Cup draw, and securing Pro D2 broadcast rights with Tim Cocker
42:38
42:38
Play later
Play later
Lists
Like
Liked
42:38Broadcaster and broadcast rightsholder Tim Cocker, co-host of The Eggchasers pod, joins Gav for a wide-ranging rugby chat. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
1
Become an AI Security Engineer in 8 Weeks - Fast-Track Guide & Roadmap
13:43
13:43
Play later
Play later
Lists
Like
Liked
13:43Cybercrime drains trillions of dollars globally each year. Today's threat landscape is defined by smart, adaptable adversaries: 40% of all cyberattacks use AI to find hidden weaknesses, and nearly all companies (93%) now face these advanced threats daily. The Certified AI Security Professional (CAISP) course compresses the typical 2–4 years needed …
…
continue reading
Michelle Wong and Dani Siller & Bill Sunderland from 'Escape this Podcast' face questions about Soviet spats, spot situations and spoiled science. LATERAL is a comedy panel game podcast about weird questions with wonderful answers, hosted by Tom Scott. For business enquiries, contestant appearances or question submissions, visit https://lateralcast…
…
continue reading
1
Building a Hacking Lab in 2025 - PSW #906
1:03:21
1:03:21
Play later
Play later
Lists
Like
Liked
1:03:21The crew makes suggestions for building a hacking lab today! We will tackle: What is recommended today to build a lab, given the latest advancements in tech Hardware hacking devices and gadgets that are a must-have Which operating systems should you learn Virtualization technology that works well for a lab build Using AI to help build your lab Visi…
…
continue reading
This Living Planet takeover will take you on a magical journey into the world of fungi, the largely invisible organisms that are essential for our ecosystems but can also be dangerous. Then: How Norway has built a reputation as a climate leader while investing more than ever in its oil and gas industry.…
…
continue reading
1
Caveat Live: FBI and KU Cybersecurity Conference.
54:53
54:53
Play later
Play later
Lists
Like
Liked
54:53While our team is out on winter break, please enjoy this episode of Caveat. We've got something special for you this week! We are excited to share our very first Caveat Live event. Host Ben Yelin recently headed to the FBI and KU Cybersecurity Conference at the University of Kansas for a live session of Caveat. During the episode, Ben covered the…
…
continue reading
1
Defensive Security Podcast Episode 334
1:07:21
1:07:21
Play later
Play later
Lists
Like
Liked
1:07:21Want to be the first to hear our episodes each week? Become a Patreon donor here. Merry Christmas and Happy Holidays! Links to this week’s stories: https://krebsonsecurity.com/2025/12/most-parked-domains-now-serving-malicious-content/ https://thehackernews.com/2025/12/russia-linked-hackers-use-microsoft-365.html?m=1 https://cybersecuritynews.com/am…
…
continue reading
1
Luka Magnotta: The Butcher of Montreal
1:23:14
1:23:14
Play later
Play later
Lists
Like
Liked
1:23:14The disturbing true story of Luka Magnotta—how internet fame, obsession, and ignored warnings led to one of Canada’s shocking crimes, told through the online hunt that tried to stop him. Sponsor: shopify.com/casual - start your $1 per month trial period rocketmoney.com/casual - cancel your unwanted subscriptions today and reach your financial goals…
…
continue reading
1
Top 10 Emerging AI Security Roles in 2026
15:44
15:44
Play later
Play later
Lists
Like
Liked
15:44Secure your future in the most critical career path in tech by enrolling in the Certified AI Security Professional (CAISP) course today! In this episode, we explore the definitive guide to the Top 10 Emerging AI Security Roles for 2026. The shift toward AI-integrated operations is not a future concern—it is happening now, and it has opened a "chasm…
…
continue reading
1
Why Has Comedy Become So Right-Wing?
1:00:54
1:00:54
Play later
Play later
Lists
Like
Liked
1:00:54On this week’s episode of “The David Frum Show,” The Atlantic’s David Frum opens with his thoughts on the Trump administration’s hostility toward NATO. David discusses why NATO was created, what it does, and why we should care about it. He also analyzes the United State’s global leadership role and why so many bad actors advocate for isolationism. …
…
continue reading
1
The CISO Holiday Party 2025: Leadership Lessons from the Year That Was - BSW #427
49:27
49:27
Play later
Play later
Lists
Like
Liked
49:27Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
…
continue reading
1
The CISO Holiday Party 2025: Leadership Lessons from the Year That Was - BSW #427
49:27
49:27
Play later
Play later
Lists
Like
Liked
49:27Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Show Notes: https://securityweekly.com/bsw-427…
…
continue reading
What did the Americast team get right when they made their predictions for what the big news stories of 2025 might be? Justin, Anthony, Sarah and Marianna look back at a tumultuous year for Donald Trump in his second term, which include deportation raids, Elon Musk’s role, the war in Gaza, the US shutdown and more. It’s time to open up the Americas…
…
continue reading
1
SN 1057: GhostPoster - Free VPNs, Hidden Risks
2:20:19
2:20:19
Play later
Play later
Lists
Like
Liked
2:20:19What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer c…
…
continue reading
What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer c…
…
continue reading
By Emmanuel Goldstein
…
continue reading
1
Holiday Special Part 1: You’re Gonna Click the Link - Rob Allen - SWN #540
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34It’s the holidays, your defenses are down, your inbox is lying to you, and yes—you’re gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won’t save you, and why the real job is surviving after the click. From phishing and sm…
…
continue reading
1
Holiday Special Part 1: You're Gonna Click the Link - Rob Allen - SWN #540
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34It's the holidays, your defenses are down, your inbox is lying to you, and yes—you're gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won't save you, and why the real job is surviving after the click. From phishing and sm…
…
continue reading
Love a hot take? 🔥 You’re in luck! We’re back with a special end-of-year treat: a rapid-fire round of cybersecurity hot takes guaranteed to start arguments in your group chats and hijack at least one Slack thread. 💬 The team weighs in on bold claims like “Passwords will finally die in 2026” and “AI will solve more cybersecurity problems than it cau…
…
continue reading
1
Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, Dustin Lehr, James Manico, Adam Shostack - ASW #362
1:07:52
1:07:52
Play later
Play later
Lists
Like
Liked
1:07:52Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
…
continue reading
1
From CIA Officer to Governor: Abigail Spanberger on intelligence and politics
25:55
25:55
Play later
Play later
Lists
Like
Liked
25:55Virginia governor-elect Abigail Spanberger will be the first woman and the first former CIA officer to lead the commonwealth. Host Mary Louise Kelly talks to Spanberger about her unconventional career path that took her from Langley to D.C. and now to Richmond, and how some of her skills from gathering intelligence come in handy in politics. Email …
…
continue reading
1
Americanswers! What did we learn from the latest Epstein files?
35:00
35:00
Play later
Play later
Lists
Like
Liked
35:00The US justice department was forced by law to release documents relating to Jeffrey Epstein at the end of last week, but by Saturday, at least 13 files were removed, leading to accusations of the department violating its obligations. Deputy Attorney General Todd Blanche later said the decision was taken to protect victims' privacy, but how much is…
…
continue reading
1
Frawley to Connacht and Munster-Leinster look-ahead
1:01:58
1:01:58
Play later
Play later
Lists
Like
Liked
1:01:58Murray Kinsella, Bernard Jackman, and Gavan Casey discuss the provinces' efforts over the weekend, while Berch also breaks some Connacht transfer news. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
1
Internal threats are the hole in Cybersecurity’s donut - Frank Vukovits - ESW #438
1:57:05
1:57:05
Play later
Play later
Lists
Like
Liked
1:57:05Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There’s a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn’t infringe on any individual organization’s privacy. That’s why we hear the i…
…
continue reading
1
Crowds gather to celebrate Winter Solstice at Newgrange
3:30
3:30
Play later
Play later
Lists
Like
Liked
3:30Around 2,000 people have gathered at Newgrange to celebrate the Winter Solstice. The ancient passage tomb is aligned for the rising sun on the shortest day of the year to shine into the inner chamber. Colman O'Sullivan reports.By RTÉ Radio 1
…
continue reading
1
Santa makes an early stop to bring gifts to homeless children
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57There will be a record number of children in homelessness this Christmas in Ireland. For the kids living in a Focus Ireland-run centre in Finglas, Santa arrived a little early to give these homeless children the gift of a book. Eithne Dodd reports.By RTÉ Radio 1
…
continue reading
1
Memorial event held at Bondi Beach one week after mass shooting
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26In Australia, one week on from the attacks in which 15 people were killed, a national day of reflection was held. Phil Mercer, Sydney-based journalist, gives us the latest.By RTÉ Radio 1
…
continue reading
1
The effects of the foster care shortage on vulnerable children
9:22
9:22
Play later
Play later
Lists
Like
Liked
9:22With more than 5,000 children in the care of the state, there is a huge reliance on foster care. A shortage of foster carers remains a continuous problem however. We are joined by the Chief Executive of the Irish Foster Care Association, Corrinne Hasson.By RTÉ Radio 1
…
continue reading
1
High Court dismisses challenges on 'super junior' ministers
7:09
7:09
Play later
Play later
Lists
Like
Liked
7:09This week, two Opposition TDs lost their High Court challenge to the attendance of junior ministers at Cabinet meetings. James McDermott, barrister and lecturer at UCD's Sutherland School of Law, goes through the case for us.By RTÉ Radio 1
…
continue reading
1
Flu cases continue to rise with a possible surge over Christmas
6:15
6:15
Play later
Play later
Lists
Like
Liked
6:15Last week saw over 3,200 recorded cases of flu with some hospitals introducing visitor restrictions to restrict the spread. We hear from Dr. Sean Underwood, consultant in emergency medicine at Cork University Hospital.By RTÉ Radio 1
…
continue reading
1
The Trump administration receives a mixed reaction over drip-feed release of Epstein files
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18In the US, there is widespread reaction to the release of documents in the Jeffrey Epstein case. The previously sealed documents were made public for the first time on Friday by the US Department of Justice under the Epstein Transparency Act. We speak to Eric Hamm, political analyst with CTV in Washington.…
…
continue reading
1
Taoiseach visits Lebanon peacekeeping troops after recent attack
6:19
6:19
Play later
Play later
Lists
Like
Liked
6:19Taoiseach Michael Martin has been visiting Irish peacekeeping troops this weekend in Lebanon. Justin McCarthy reports from Camp Shamrock in Southern Lebanon where he has been speaking to Ltt Col Mark Lennon.By RTÉ Radio 1
…
continue reading
1
Defensive Security Podcast Episode 333
1:11:50
1:11:50
Play later
Play later
Lists
Like
Liked
1:11:50Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.theregister.com/2025/12/09/hypervisor_ransomware_attacks_increasing https://www.bleepingcomputer.com/news/security/react2shell-flaw-exploited-to-breach-30-orgs-77k-ip-addresses-vulnerable https://www.infosecurity-magazine.com/…
…
continue reading
1
What's behind US gov push to 'privatize' offensive cyber operations?
2:01:57
2:01:57
Play later
Play later
Lists
Like
Liked
2:01:57(Presented by ThreatLocker: Allow what you need. Block everything else by default, including ransomware and rogue code.) Three Buddy Problem - Episode 77: New React2Shell data from Microsoft, fresh Apple and Cisco zero-days already in the wild, and state-linked campaigns from Russia and China that show a merging of espionage, crime, and infrastruct…
…
continue reading