Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Where we talk and discuss what the great firewall of China is, and the ethics of it Cover art photo provided by JJ Ying on Unsplash: https://unsplash.com/@jjying
…
continue reading
…
continue reading
Training of Aria Technologies products including Ericsson-LG, Lancom Systems, Star Leaf, So Connect, Jabra, xmedius, Checkpoint, NBN, iPECS2Teams
…
continue reading
Learn how to think not what to think.
…
continue reading
In a world marked by wicked social problems, The Minefield helps you negotiate the ethical dilemmas, contradictory claims and unacknowledged complicities of modern life.
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
A weekly programme that examines and dissects the world's media, how they operate and the stories they cover.
…
continue reading
Hosted by planetary scientist and astrobiologist Dr. Michael L. Wong, Strange New Worlds examines science, technology, and culture through the lens of Star Trek!
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Where timely and relevant security meets puns and witty banter. Our goal is to keep defenders apprised of pertinent news and trends in under forty-five minutes.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
An exploration of the UAP - UFO phenomenon and the associated "high strangeness" which accompanies it from the standpoint of analysts and researchers. Fortean Winds is a collective of data and research professionals who began a project in 2020 to better understand the UFO/UAP phenomenon from the perspective of existing research and evidence. After a few years study and note taking (which you can see at our website https://www.forteanwinds.com) , we're ready to discuss our notes and insights ...
…
continue reading
We break down how events like Russia's war in Ukraine and European security shifts are shaping Germany - and the world. Whether you’re a student, journalist, or policymaker, hosts Nina Haase, Michaela Küfner, and Richard Walker deliver the insights you need to understand where Germany is headed and why it matters, with a hint of Berlin's distinct energy. Published every Friday. Find us also on YouTube: @dwnews. Subscribe to our newsletter: dw.com/berlinbriefing. Leave us a comment here: news ...
…
continue reading
This podcast feed for The Minefield is closing soon because it's a duplication of our main program but you won't miss an episode. Search iTunes for The Minefield - ABC RN or use this RSS feed: http://www.abc.net.au/radionational/feed/6344904/podcast.xml
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
The Keefer Brothers have spent over 20 years mastering the art of survival- not just in the wild, but in the world of storytelling, business and life. Now, these pioneers make Wilder Minds their new home. Each episode, epic stories collide with unfiltered truth and personal evolution- to uncover what it takes to live life against the grain. Awake your soul with Wilder Minds.
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
Join us as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peek behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | Co-Host Twitter Handle: Andy @andylapteff
…
continue reading
SecurityGen
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
The Internet Explorer's Podcast is a comedy-ish, science-ish, history-ish, popculture-ish parody podcast where curiosity meets absurdity. Each week, self-proclaimed "internet explorer" Jimmy dives headfirst into the wildest, weirdest, and most questionable corners of the internet. He “researches” topics like DIY invisibility cloaks, medieval alchemy, and whether plants can feel pain—then confidently explains his findings to a real expert, who sets the record straight while humoring Jimmy’s m ...
…
continue reading
Hi there! I'm Doug Noll, an award-winning author, speaker, and trainer. I am, among many other things, a lawyer-turned-peacemaker, mediator, and expert in deep, empathic listening. I left a 22-year career as a trial lawyer, earned my Masters Degree in Peacemaking and Conflict Studies, and have helped thousands of companies and organizations with internal conflicts and poor communication. I am the co-founder of the award-winning Prison of Peace Project. I have trained mediators and leaders in ...
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
DIAF is a series of audiobooks presented in podcast format which follow the adventures of Brian Brushwood and Justin Robert Young.
…
continue reading
What if your breath was as important as your interface design? A podcast at the crossroads of mindful movement and meaningful tech. Hosted by Eric Infanti — Marine Corps veteran, UX design leader, and spiritual practitioner — Human by Design explores what it means to build systems, bodies, and lives that support human flourishing. From samadhi to strongman, wireframes to warrior breathwork — Eric's episodes bridge ancient wisdom with modern design. Human by Design explores the terrain where ...
…
continue reading
Founded in 2022, securitygen is a global start-up focused on telecom security.
…
continue reading
Just a London girl who happens to speak three languages. Catch me on here for VIBES.
…
continue reading

1
Click. Crawl. Conquer. Rise of the ByteSpider Bot
13:49
13:49
Play later
Play later
Lists
Like
Liked
13:49In this episode, Ryan Williams Sr. and Shannon Tynes discuss the growing threat of bad bots in cybersecurity, particularly in the context of AI advancements. They explore the statistics surrounding bot traffic, the implications for consumer behavior, and the challenges of legislation in regulating bot activity. The conversation also dives into the …
…
continue reading

1
Inside the Human Firewall: Phishing, Deepfakes & the Rise of Social Engineering with Heather Benwell
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21In this eye-opening episode, we sit down with Heather Benwell, Chief Marketing Officer at Challengeword, to explore one of the fastest-growing threats in cybersecurity: social engineering. From phishing to deepfakes, and the evolving complexity of human-targeted attacks, Heather shares stories, statistics, and insights that highlight just how vulne…
…
continue reading

1
Would You Eat At An Empty Restaurant?
1:04:47
1:04:47
Play later
Play later
Lists
Like
Liked
1:04:47The concept of “norm cascades” influences everything from why we wouldn’t eat at an empty restaurant to why Bradley’s son was unimpressed with the recent NFL draft. On this episode of Firewall, Bradley is joined by guest co-host Cory Epstein where they dive deeper into norm cascades, Trump’s plunging approval rating, and an intriguing new AI regula…
…
continue reading

1
318 - Beyond the Firewall: The Human Element That Keeps Your Business Safe with Simple Salt's Dylan Evans
32:20
32:20
Play later
Play later
Lists
Like
Liked
32:20Your host, Doug Noll, talks with the Founder of Simple Salt, Dylan Evans. Dylan shares his journey in the security industry, emphasizing the critical role of human behavior alongside technical measures. He discusses the common misconceptions that cybersecurity is purely technical, highlighting the importance of training and developing personnel. Dy…
…
continue reading

1
59. Why Everyone Needs an Outbound Firewall
41:35
41:35
Play later
Play later
Lists
Like
Liked
41:35Helpful episodes to listen to first Episode 40 - Website and Email Filtering Episode 56 - Home Network Attacks From Within Episode 57 - How Firewalls Protect You And What You Might Be Missing Questions we answer in this episode What is a trojan horse? What are two ways an outbound firewall protects you? What is an outbound firewall's greatest frust…
…
continue reading

1
Beaver Fever, Bullshit Buck, and Dominican Firewalls
46:47
46:47
Play later
Play later
Lists
Like
Liked
46:47Split across the map for spring break, Chris, Casey, and JB reunite with wild stories and even wilder takes. From thundersnow in Midland to Chris losing a phone, a mask, and possibly his sanity in Mexico. They pour one out for Val Kilmer, crown Doc Holliday the undisputed GOAT, and entertain the theory that Jim Morrison might still be breathing. Ad…
…
continue reading

1
How the Great Wall of China Inspired Modern Firewalls
26:28
26:28
Play later
Play later
Lists
Like
Liked
26:28Send us a text In this week’s episode, Jimmy takes on the unexpected connection between ancient fortifications and modern cybersecurity. With his signature mix of humor, curiosity, and overconfidence, he explores how the Great Wall of China wasn’t just a wall—it was a symbol, a system, and a psychological statement. Drawing parallels to today’s fir…
…
continue reading

1
Finance to Firewall: Avanna Huynh's Security Breakthrough
47:41
47:41
Play later
Play later
Lists
Like
Liked
47:41In this episode of the Cyber Coffee Hour, we're joined by Avanna Huynh, whose journey from financial spreadsheets to security frameworks proves that the best hackers don't always come from traditional tech backgrounds! Avanna shares how her financial risk analysis skills gave her a unique edge in cybersecurity, leading to her selection as a Top 20 …
…
continue reading

1
Episode 3 - Tech, Business, and the Future of AI with Scott Sinclair
1:05:22
1:05:22
Play later
Play later
Lists
Like
Liked
1:05:2200:00 Introduction to Scott Sinclair and His Journey in Tech 03:04 The Evolution of IT and Sustainability in Technology 06:10 Foodtastic's Growth and Brand Acquisitions 09:00 Technology's Role in Enhancing Customer Experience 11:48 The Future of Dining: Automation vs. Human Interaction 14:55 The Impact of Internet Speed on Restaurant Operations 17:…
…
continue reading

1
Inside Morphing Meerkat and Proton66: How Cybercrime Is Getting Easier
39:39
39:39
Play later
Play later
Lists
Like
Liked
39:39In this episode of Breaking Badness, the crew investigates two escalating threats in the cybercrime ecosystem: the cleverly named phishing-as-a-service platform Morphing Meerkat, and the bulletproof hosting provider Proton66, a favorite among amateur cybercriminals.First, they dig into how Morphing Meerkat uses DNS-over-HTTPS (DoH) and clever phish…
…
continue reading

1
288 - Review your environments with checklists!
30:46
30:46
Play later
Play later
Lists
Like
Liked
30:46This week, we take a look at Azure Review Checklists. Relatively unbeknownst to us, this interesting capability allows you to really supercharge the reviews on your Azure environments! (00:00) - Intro and catching up. (03:03) - Show content starts. Show links - Azure Review Checklists - Azure Resource Inventory - Give us feedback!…
…
continue reading
Send us a text In this episode, Jimmy welcomes back John Fike, a podcaster and YouTuber who’s spent years immersed in the Bigfoot community, interviewing people who claim to have had encounters. But this isn’t a debate about whether Bigfoot exists—John already believes he does. Instead, we’re diving into something even bigger: the culture of Bigfoo…
…
continue reading

1
Risky Business #789 -- Apple's AirPlay vulns are surprisingly awful
1:02:31
1:02:31
Play later
Play later
Lists
Like
Liked
1:02:31On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: British retail stalwart Marks & Spencer gets cybered South Korean telco sets out to replace all its subscriber SIMs after (we assume) it lost the keymat It’s a good exploit week! Bugs in Apple Airplay, SAP webservers, Erlang SSH and CommVault backups Juice jack…
…
continue reading

1
Risky Business #789 -- Apple's AirPlay vulns are surprisingly awful
1:02:31
1:02:31
Play later
Play later
Lists
Like
Liked
1:02:31On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: British retail stalwart Marks & Spencer gets cybered South Korean telco sets out to replace all its subscriber SIMs after (we assume) it lost the keymat It’s a good exploit week! Bugs in Apple Airplay, SAP webservers, Erlang SSH and CommVault backups Juice jack…
…
continue reading

1
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities (#)
8:52
8:52
Play later
Play later
Lists
Like
Liked
8:52SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people’s credentials. https://isc.…
…
continue reading

1
Modern Work in 2025 with Karoliina Kettukari
34:55
34:55
Play later
Play later
Lists
Like
Liked
34:55So what does modern work look like today? Richard talks to Karoliina Kettukari about her new role as the Head of Modern Work for a financial services company in Finland, and what modern work has evolved. Karoliina talks about how the pandemic accelerated modern work, such as being able to work anywhere and collaborating with whomever you need to. P…
…
continue reading

1
319 - Changing the Game: How AI is Shaping Modern Communication Strategies with Axia Public Relations' Jason Mudd
30:07
30:07
Play later
Play later
Lists
Like
Liked
30:07Your host, Doug Noll, talks with the CEO and Managing Partner of Axia Public Relations, Jason Mudd. Jason shares his journey from journalism to public relations, emphasizing the transformative impact of the internet and AI on communication. He discusses his early experiences with web development, the evolution of media, and the strategic use of AI …
…
continue reading
In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a significant data leak involving an employee monitoring app, Work Composer, which leaked 21 million screenshots of user activity. They explore the implications of such leaks, the shared responsibility model in cloud security, and the need f…
…
continue reading

1
The Art of the Innocent Ask: How Threat Actors Use Benign Conversations
58:09
58:09
Play later
Play later
Lists
Like
Liked
58:09Hello to all our Cyber Spring Chickens! Join host Selena Larson and guest hosts, Tim Kromphardt and Sarah Sabotka, both Senior Threat Researchers at Proofpoint. These top sleuths crack open Proofpoint’s new Human Factor series and explore one of the most deceptively dangerous tactics in a threat actor’s playbook: the benign conversation. What exact…
…
continue reading

1
SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC (#)
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows’ System Resource Usage Monitor (SRUM). This database logs how much resources software used…
…
continue reading

1
Unpacking the UK Cyber Governance Code of Practice
12:40
12:40
Play later
Play later
Lists
Like
Liked
12:40Tune into this episode for a deep dive into the UK government's Cyber Governance Code of Practice. This Code is a crucial resource designed specifically for boards and directors. Understanding it can significantly benefit your organisation. By listening, you will gain insights into: • Why cyber governance is essential for modern businesses and orga…
…
continue reading
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss alarming statistics regarding cybercrime, including a record loss of $16.6 billion in 2024. They highlight the vulnerability of older Americans to cyber scams and the potential underreporting of these crimes. The conversation also touches on…
…
continue reading

1
Snake Oilers: LimaCharlie, Honeywell Cyber Insights, CobaltStrike and Outflank
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50In this edition of the Snake Oilers podcast, three sponsors come along to pitch their products: LimaCharlie: A public cloud for SecOps Honeywell Cyber Insights: An OT security/discovery solution Fortra’s CobaltStrike and Outflank: Security tooling for red teamers This episode is also available on Youtube. Show notes…
…
continue reading

1
Snake Oilers: LimaCharlie, Honeywell Cyber Insights, CobaltStrike and Outflank
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50In this edition of the Snake Oilers podcast, three sponsors come along to pitch their products: LimaCharlie: A public cloud for SecOps Honeywell Cyber Insights: An OT security/discovery solution Fortra’s CobaltStrike and Outflank: Security tooling for red teamers This episode is also available on Youtube. Show notes…
…
continue reading

1
SANS Stormcast Monday, April 27th: Image Steganography; SAP Netweaver Exploited (#)
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56SANS Stormcast Monday, April 27th: Image Steganography; SAP Netweaver Exploited Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use…
…
continue reading
As tech billionaires infiltrate the White House, the question looms, “Who really rules us, the government or Silicon Valley?" This film examines the influence and ideology of technocrats over the last century, and asks whether they pose a threat to democracy. Contributors: Gil Duran – Tech journalist Siva Vaidhyanathan – Professor of Media Studies,…
…
continue reading

1
The Security Wizard's Toolkit: Versatility as a Cyber Superpower with Devrryn Jenkins
1:04:42
1:04:42
Play later
Play later
Lists
Like
Liked
1:04:42From bench tech to business owner, Devrryn Jenkins brings his multifaceted journey in offensive security to this week's episode. We explore how his experience across organizations of all sizes shaped his unique approach to red team operations and his philosophy that being a "jack of all trades is oftentimes better than a master of one." Devrryn sha…
…
continue reading
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a variety of topics ranging from personal updates and weather experiences to media consumption, including movies and documentaries. They delve into the phenomenon of romantic scams and share insights on the film 'Sinners,' highlighting its c…
…
continue reading

1
Gangrene, Gobblers & the King of Snickers
59:41
59:41
Play later
Play later
Lists
Like
Liked
59:41A throwback turkey hunt, TSS loads strong enough to deport a gobbler, and permission stories that sound like fever dreams—gangrene feet, dogs eating roofing nails, and three innings of Tigers baseball with an old dude in his undies. The 989 Gobbler Club is handing out its finest (and most shameful) awards, including a wooden gun you really don’t wa…
…
continue reading

1
Why Ukraine can't sign off on Trump's 'deal'
33:30
33:30
Play later
Play later
Lists
Like
Liked
33:30Is Crimea the key to peace in Ukraine? On today’s episode, we break down Donald Trump’s claim that President Zelenskyy is prolonging the war by resisting calls to cede the Ukrainian peninsula Crimea to Russia. Our guests have updates on a devastating attack in Kyiv and on Friedrich Merz' controversial Taurus missile hint.…
…
continue reading
Questions we answer in this episode What is a DDoS attack? What social media platform was recently the target of a DDoS attack? How can your home network be impacted by one? What can you do to protect your home network? Episode summary DDoS attacks are growing faster than the squash in my garden - seriously, it's wild! The slaves in the army? Devic…
…
continue reading

1
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues; (#)
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues; Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Tel…
…
continue reading
Next up on The Race to Gracie Mansion is Queens Assemblymember Zohran Mamdani, who shares his socialist vision for a fairer, faster, and more functional New York—starting with rent freezes, universal childcare, and fast, free buses. Real leadership, he argues, means empowering experts, not micromanaging. A reimagined, newly empowered public sector …
…
continue reading

1
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco (#)
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP addr…
…
continue reading
This year marks the 100th anniversary of the first federal election to be held in Australia after the passage of Senator Herbert Payne’s private member’s bill, which made voting compulsory. In 1922, only 57.95 per cent of registered voters turned out. Payne’s home state of Tasmania had the poorest showing (45.93 per cent), whereas Queensland — wher…
…
continue reading
This year marks the 100th anniversary of the first federal election to be held in Australia after the passage of Senator Herbert Payne’s private member’s bill, which made voting compulsory. In 1922, only 57.95 per cent of registered voters turned out. Payne’s home state of Tasmania had the poorest showing (45.93 per cent), whereas Queensland — wher…
…
continue reading

1
From Fun to Phishing: The Dangers of AI-Generated Action Figures
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48In this episode of The Other Side of the Firewall podcast, Ryan Williams Sr. and Shannon Tynes discuss the intersection of cybersecurity and emerging trends in technology, particularly focusing on the risks associated with AI-generated action figures and the implications of social media on personal privacy. They explore how seemingly harmless fun c…
…
continue reading