Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
…
continue reading
Firewall Podcasts
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Interviews with Scholars of East Asia about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/east-asian-studies
…
continue reading
Where we talk and discuss what the great firewall of China is, and the ethics of it Cover art photo provided by JJ Ying on Unsplash: https://unsplash.com/@jjying
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Training of Aria Technologies products including Ericsson-LG, Lancom Systems, Star Leaf, So Connect, Jabra, xmedius, Checkpoint, NBN, iPECS2Teams
…
continue reading
China Insider is a weekly podcast project from Hudson Institute's China Center, hosted by Miles Yu, who provides weekly news that mainstream American outlets often miss, as well as in-depth commentary and analysis on the China challenge and the free world’s future.
…
continue reading
A great WordPress.com site
…
continue reading
LIVE Call in Tuesdays 2:00-3:00 PMn (PST), www.drfutureshow.com/archives
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
A place for time travellers to consult records of the future during eternity
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Interviews with Scholars of China about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/chinese-studies
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
Twice per month, Peter House and Mike Chmielewski discuss current cyberthreats and issues. Internet Weather Report is recorded at the studios of Big Cabbage Radio in Palmer, Alaska.
…
continue reading
Interview with Scholars of Journalism about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/journalism
…
continue reading
Get the perspective you won't hear or read about anywhere else from Ohio Senate President Rob McColley. A weekly feature from "On The Record with The Ohio Senate-The Views, The News, Excludes."
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Politics may be dismal, but the ideas that swirl around it and shape it are fascinating. This is a show that looks not just at politics, but the deeper ideas from history, science, psychology, economics, and technology that are shaping our world. We feature smart, lively, upbeat discussions with people who know what they're talking about and can help us understand the world better. Hosted by Matt Robison: writer, former senior congressional staffer, and campaign manager.
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
The #1 Apple Music History Podcast Rootsland chronicles the extraordinary true story of Henry "K" Karyo - one of the first American producers to move to Kingston, Jamaica, immersing himself completely in reggae's underground scene. From disillusioned justice major to indie label owner, Henry navigates Jamaica's merciless music industry while building authentic friendship with legendary artists and finding unexpected love. This isn't just a music podcast - it's a raw, first-person account of ...
…
continue reading
Our most popular pods in one fat feed! Too much technology would never be enough. Includes Heavy Networking, Network Break, Day Two DevOps, Packet Protector, and Network Automation Nerds. Plus new shows when they launch so you know about fresh awesomeness.
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
SecurityGen
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Matt Stoller, author of the Substack newsletter BIG, joins Bradley to dig into how the rise of AI mirrors the early internet—when regulators failed to check the dominance of Google, Facebook, and others. Stoller argues that America’s political elites, especially under Obama, confused “freedom from restriction” with “freedom from mastery,” enabling …
…
continue reading

1
Every Government Shutdown is a National Cybersecurity Risk
55:53
55:53
Play later
Play later
Lists
Like
Liked
55:53In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams and Shannon Tynes discuss the latest cybersecurity news, including the implications of the government shutdown on cybersecurity operations, emerging threats like Comet Jacking, and China's severe penalties for cybercriminals. They also share personal updates and reflecti…
…
continue reading
There are literally billions of devices connected to the internet today – many of them cheap, insecure IoT devices… smart thermostats, doorbell cameras, webcams, cheap WiFi routers and other smart appliances. As we like to say, the “S” in “IoT” is for security. And when insecure devices are no longer supported, the security bugs will never be fixed…
…
continue reading
Major federal cybersecurity programs expire amidst the government shutdown. Global leaders and experts convene in Riyadh for the Global Cybersecurity Forum. NIST tackles removable media. ICE buys vast troves of smartphone location data. Researchers claim a newly patched VMware vulnerability has been a zero-day for nearly a year. ClickFix-style atta…
…
continue reading
Critical Vulnerabilities and AI Voice Cloning Risks in Cybersecurity In this episode of Cybersecurity Today, host Jim Love discusses key cybersecurity threats, including critical vulnerabilities in Sudo and Cisco firewalls, and a remote command flaw in Western Digital MyCloud devices. The show highlights efforts by national security agencies in the…
…
continue reading

1
NB545: CISA Orders Immediate Patch of Cisco Vulnerabilities; Firewall Upgrade Blocks Emergency Calls
22:30
22:30
Play later
Play later
Lists
Like
Liked
22:30There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federa…
…
continue reading

1
UK Gov $1.5B JLR Intervention, RTX Boarding Software Ransomware, Cisco Firewall Zero-Days
19:09
19:09
Play later
Play later
Lists
Like
Liked
19:09🎙️ UK Gov $1.5B JLR Intervention, RTX Boarding Software Ransomware, Cisco Firewall Zero-Days 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 985: Today's episode will discuss the latest news as UK Gov $1.5B JLR Intervention with more news below: · British Department Store Harrods Wa…
…
continue reading

1
Cisco firewall zero-days and bootkits in the wild
1:54:49
1:54:49
Play later
Play later
Lists
Like
Liked
1:54:49Three Buddy Problem - Episode 65: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco’s 5500-X series appliances, devices that sit at the h…
…
continue reading

1
242 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 1
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11By YusufOnSecurity.Com
…
continue reading
Rootsland: Resistance – Episode 1: “The Tan Umbrella” In the debut of Rootsland: Resistance, hosts Henry K and Sia explore what it truly means to “put up resistance” — in life, in music, and in the modern world. Inspired by Beres Hammond’s timeless anthem, their conversation weaves personal stories with social truths, showing how the fight to stay …
…
continue reading

1
HN800: Root Cause Analysis for the Entire Stack (Sponsored)
1:11:47
1:11:47
Play later
Play later
Lists
Like
Liked
1:11:47Today’s show is one of those “We’re living in the future” episodes, where we talk about using AI to perform root cause analysis of a performance issue. But not root cause analysis for just the networking part of the stack. The full stack. Why? Because it’s not good enough to say “it’s not the network”.... Read more »…
…
continue reading

1
Robert L. Worden and Jane Leung Larson, "A Chinese Reformer in Exile: Kang Youwei and the Chinese Empire Reform Association in North America, 1899-1911" (Brill, 2025)
2:14:03
2:14:03
Play later
Play later
Lists
Like
Liked
2:14:03A Chinese Reformer in Exile: Kang Youwei and the Chinese Empire Reform Association in North America, 1899-1911 is an encyclopaedic reference work documenting the exile years of imperial China’s most famous reformer, Kang Youwei, and the political organization he mobilized in North America and worldwide to transform China’s autocratic empire into a …
…
continue reading

1
Robert L. Worden and Jane Leung Larson, "A Chinese Reformer in Exile: Kang Youwei and the Chinese Empire Reform Association in North America, 1899-1911" (Brill, 2025)
2:14:03
2:14:03
Play later
Play later
Lists
Like
Liked
2:14:03A Chinese Reformer in Exile: Kang Youwei and the Chinese Empire Reform Association in North America, 1899-1911 is an encyclopaedic reference work documenting the exile years of imperial China’s most famous reformer, Kang Youwei, and the political organization he mobilized in North America and worldwide to transform China’s autocratic empire into a …
…
continue reading

1
Teenage Ransomware Arrest In Day Care Ransom
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Cybersecurity Today: Teenage Ransomware Arrests, GoAnywhere Critical Flaw, and Google AI Vulnerability In this episode of Cybersecurity Today, hosted by Jim Love, two teenagers were arrested in London for a ransomware attack on Kiddo International preschools, involving child data extortion. The show discusses a critical vulnerability in GoAnywhere …
…
continue reading

1
SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike “Issues”; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper)
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to…
…
continue reading

1
SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike “Issues”; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper) (#)
15:13
15:13
Play later
Play later
Lists
Like
Liked
15:13SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike “Issues”; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper) https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Defending against attacks like RedTail is more then blocking IoCs, but instead…
…
continue reading

1
Cyber defenders pulled into deportation duty.
29:49
29:49
Play later
Play later
Lists
Like
Liked
29:49DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment…
…
continue reading

1
The Ohio Senate's Strong Fall Agenda with Senate President Rob McColley
37:15
37:15
Play later
Play later
Lists
Like
Liked
37:15Property Tax Reform Veto Overrides to Ohio's Constitutional Redistricting Process. This week Ohio Senate President Rob McColley returns to the President's Podcast and delivers a straightforward conversation about why the General Assembly's property tax reforms are critical for Ohio homeowners. President McColley also describes the process Ohio vote…
…
continue reading

1
What's Happening Inside the #1 Bellwether Election in America?
37:48
37:48
Play later
Play later
Lists
Like
Liked
37:48***Please subscribe to Matt's Substack at https://worthknowing.substack.com/*** The one election race that gives the most insight into the state of politics in America right now is the campaign for Bucks County District Attorney in Pennsylvania. Bucks County is the true swingiest of swing counties in one of the few--and biggest--swing states in …
…
continue reading

1
Chinese Hackers Hit Law Firm Zero-Day, Discord 55M Users Breach, SonicWall All Configs Stolen
15:31
15:31
Play later
Play later
Lists
Like
Liked
15:31🎙️ Chinese Hackers Hit Law Firm Zero-Day, Discord 55M Users Breach, SonicWall All Configs Stolen 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 991: Today's episode will discuss the latest news as Chinese Hackers Hit Law Firm Zero-Day with more news below: · Hacktivists Target Crit…
…
continue reading

1
N4N040: Mock Interview for a Network Administration Job
1:03:15
1:03:15
Play later
Play later
Lists
Like
Liked
1:03:15The job interview is an inescapable part of a career journey. Today on N Is For Networking, we conduct a mock interview with a candidate who’s applying for a junior network administration role. The goal is to give Toni Mrowetz, our candidate, feedback. At the same time, we hope this helps anyone listening who might... Read more »…
…
continue reading

1
SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln;
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnerability A user cloning a git repository may be tricked into executing arbitrary code via…
…
continue reading

1
SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln; (#)
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln; Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnera…
…
continue reading

1
133 Future Now Show - Interstellar Object passes Mars as we watch closely, OpenAI Raises the Bar on AI Video & Agents, Interview - Max Van Praag takes us into his epic Wild Wild West tour.
1:25:27
1:25:27
Play later
Play later
Lists
Like
Liked
1:25:273I/ATLAS just passed Mars and all our Martian assets were tracking..Sadly, NASA is officially closed due to the federal government shutdown, but nonetheless, our orbiters and landers were tracking our visitor from the Milky Way’s thin disk, where the youngest and oldest stars of our galaxy meet. Be it sentient or not, it has tales to tell.. This we…
…
continue reading

1
133 Future Now Show - Interstellar Object passes Mars as we watch closely, OpenAI Raises the Bar on AI Video and Agents, Interview - Max Van Praag takes us into his epic Wild Wild West tour.
Listen Now to 133 Future Now Show 3I/ATLAS just passed Mars and all our Martian assets were tracking..Sadly, NASA is officially closed due to the federal government shutdown, but nonetheless, our orbiters and landers were tracking our visitor from the Milky Way’s thin disk, where the youngest and oldest stars of our galaxy meet. Be it sentient or n…
…
continue reading
Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setu…
…
continue reading

1
Avnet Breach Data Unreadable, Salesforce Refuses Ransom, North Korea Stole $2B Crypto
19:05
19:05
Play later
Play later
Lists
Like
Liked
19:05🎙️ Avnet Breach Data Unreadable, Salesforce Refuses Ransom, North Korea Stole $2B Crypto 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 990: Today's episode will discuss the latest news as Avnet Breach Data Unreadable with more news below: · DraftKings Warns Users of Credential Stu…
…
continue reading

1
D2DO284: AI, MCP, and the Identities that Tie Them All Together
45:07
45:07
Play later
Play later
Lists
Like
Liked
45:07AI is developing at an incredible pace. With that development comes questions. For instance, how do you connect your resources to agents? How do agents connect with each other? And how do you keep it all secure? Our guest Christian Posta is here to guide us through AI, MCP, and the concept of workload identities.... Read more »…
…
continue reading

1
Joshua Eisenman and David H. Shinn, "China's Relations with Africa: A New Era of Strategic Engagement" (Columbia UP, 2023)
1:42:23
1:42:23
Play later
Play later
Lists
Like
Liked
1:42:23Since Xi Jinping’s accession to power in 2012, nearly every aspect of China’s relations with Africa has grown dramatically. Beijing has increased the share of resources it devotes to African countries, expanding military cooperation, technological investment, and educational and cultural programs as well as extending its political influence. China'…
…
continue reading
By Jim Love
…
continue reading

1
SANS Stormcast Wednesday, October 8th, 2025: FreePBX Exploits; Disrupting Teams Threats; Kibana and QT SVG Patches
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57By Dr. Johannes B. Ullrich
…
continue reading

1
SANS Stormcast Wednesday, October 8th, 2025: FreePBX Exploits; Disrupting Teams Threats; Kibana and QT SVG Patches (#)
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57
…
continue reading

1
Legal Superstar Glenn Kirschner: Three Reasons I'm Now Optimistic About Trump Floundering
1:03:45
1:03:45
Play later
Play later
Lists
Like
Liked
1:03:45
…
continue reading

1
Snake Oilers: Realm Security, Horizon3 and Persona
45:40
45:40
Play later
Play later
Lists
Like
Liked
45:40
…
continue reading

1
Chris Eng on lessons learned from the NSA, @Stake, Veracode, and 20 years in cybersecurity
44:54
44:54
Play later
Play later
Lists
Like
Liked
44:54By Security Conversations
…
continue reading

1
More Cybersecurity Conversation Between Peter and Mike
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02By Big Cabbage Radio
…
continue reading

1
Critical GoAnywhere bug fuels ransomware wave.
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23By N2K Networks
…
continue reading