The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Future Secured Podcasts
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
“Pod Save America” cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obama’s National Security Council. On “Pod Save the World,” he and former deputy national security adviser Ben Rhodes break down the latest global developments and bring you behind the scenes with the people who were there. New episodes every Wednesday. Subscribe to Friends of the Pod! Your subscription makes Crooked’s work possible and gives ...
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
…
continue reading
Host Russ Altman, a professor of bioengineering, genetics, and medicine at Stanford, is your guide to the latest science and engineering breakthroughs. Join Russ and his guests as they explore cutting-edge advances that are shaping the future of everything from AI to health and renewable energy. Along the way, “The Future of Everything” delves into ethical implications to give listeners a well-rounded understanding of how new technologies and discoveries will impact society. Whether you’re a ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
A non-partisan podcast brought to you by Geopolitical Futures, an online publication founded by internationally recognized geopolitical forecaster George Friedman. Geopolitical Futures tells you what matters in international affairs and what doesn’t. Go to https://geopoliticalfutures.com/podcast for details.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
The United States is in the midst of a dramatic political realignment with shifting views on national security, economics, technology, and the role of government in our lives. Saagar Enjeti and Marshall Kosloff explore this with thinkers, policymakers, and more.
…
continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
continue reading
Discover stories from real people who are living out their definition of a secure retirement.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
What exactly is a travel experience? A travel experience is more than just a destination. From the pulsating beats of a major music festival, to the adrenaline -fueled excitement of professional sports, to the legendary tours of music icons, these events are more than just spectacles. They are game changers affecting airfares, hotel room rates, restaurants, and growing local economies. Welcome to Tickets to Travel, the podcast that unlocks the stories, businesses, careers, and personalities ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
Carnegie Connects is our premier virtual event series hosted by Aaron David Miller. Every other week, he tackles the most pressing foreign policy issues of the day in conversations with journalists, policymakers, historians, and experts.
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Listen as Podcast host Joy Votrobek and Sr. Analyst Laurence Sanford bring you podcasts and briefs on national security with an emphasis on ”Peace through Strength.”
…
continue reading
Interviews and Discussions With Fascinating People Who are Creating A Better Tomorrow For All Of Us - Host - Ira S. Pastor
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading

1
Australia’s AI future—trust, opportunity, and human rights with Prof Ed Santow
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30In this episode of the Technology & Security podcast, Dr. Miah Hammond-Errey is joined by Professor Edward Santow, former Australian Human Rights Commissioner and co-director of the Human Technology Institute at UTS. The conversation is a candid exploration of Australia’s evolving AI landscape, diving into why Australians remain sceptical of AI des…
…
continue reading

1
Nuclear flashpoint: Iran strikes, non-proliferation, and future threats
35:00
35:00
Play later
Play later
Lists
Like
Liked
35:00What impact will US and Israeli air strikes on Iran have on global non-proliferation efforts? How is Trump reshaping the US's leadership in nuclear non-proliferation? Could shifting international security dynamics encourage countries like South Korea or Japan to pursue nuclear weapons programs? In this episode, Michael Cohen and Maria Rost Rublee j…
…
continue reading

1
Episode 14: AI Risks, Threat Modeling, and The Future of Vibe Coding
1:22:30
1:22:30
Play later
Play later
Lists
Like
Liked
1:22:30Episode 14 of the Distilled Security Podcast is here! This week, the team welcomes guest John Zeolla, a cybersecurity expert and AI enthusiast, for a deep dive into the risks, realities, and potential of artificial intelligence. Topics include: Shadow AI in the Enterprise: Why business leaders are adopting AI faster than CISOs can assess the risks—…
…
continue reading

1
Russia’s 16KB Curtain: Cloudflare Throttling and the Future of the RuNet
1:45:31
1:45:31
Play later
Play later
Lists
Like
Liked
1:45:31Russia has entered a new phase of digital authoritarianism. In a sweeping move, Russian Internet Service Providers (ISPs) have begun systematically throttling access to Cloudflare and other Western-backed services, including infrastructure giants Hetzner and DigitalOcean. This throttling is so severe that it restricts downloads to just 16 kilobytes…
…
continue reading

1
The Role of University, Bitcoin, AI & Cybersecurity - Future Secured EP 41
49:45
49:45
Play later
Play later
Lists
Like
Liked
49:45How do you protect a global research institution while embracing bleeding-edge tech like supercomputers, AI and even Bitcoin? Dan Maslin, Group CISO at Monash University, returns to Future Secured to unpack what’s changed in cybersecurity across higher education and why universities are fast becoming some of the most complex security environments i…
…
continue reading
Guest Lisa Goldman Rosas is an authority on public health who says that food insecurity goes deeper than hunger and can lead to chronic diabetes, heart disease, and even anxiety and depression. Rosas champions a concept she calls “nutrition security,” which focuses on food’s health value over mere calories. She discusses her work with “Recipe4Healt…
…
continue reading

1
AI, Zero Trust, And The Future Of DevSecOps In A Cloud-First World – Nivathan Athiganoor Somasundharam
19:35
19:35
Play later
Play later
Lists
Like
Liked
19:35In this episode of the Security Repo Podcast, we dive deep into the evolving role of DevSecOps with Nivathan Athiganoor Somasundharam, a technical account manager at Teleport. He shares his journey from cloud engineering to becoming a DevSecOps practitioner, emphasizing proactive security, the elimination of secrets, and the future of identity-base…
…
continue reading

1
Zuckerberg on Trial: The $8 Billion Data Privacy Reckoning
21:28
21:28
Play later
Play later
Lists
Like
Liked
21:28More than five years after the Cambridge Analytica scandal, the legal and financial consequences are still playing out—this time in Delaware’s Chancery Court, where Mark Zuckerberg and Meta executives are being sued by investors seeking over $8 billion in damages. This landmark class-action lawsuit argues that Meta’s leadership knowingly violated a…
…
continue reading

1
OT Emergency Preparedness: When Disaster Recovery Meets Real-World Safety | A Conversation with Tobias Halmans | Redefining CyberSecurity with Sean Martin
49:51
49:51
Play later
Play later
Lists
Like
Liked
49:51⬥GUEST⬥ Tobias Halmans, OT Incident Responder | GIAC Certified Incident Handler | Automation Security Consultant at admeritia GmbH | On LinkedIn: https://www.linkedin.com/in/tobias-halmans/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Websit…
…
continue reading

1
Operation Eastwood: Inside the Takedown of NoName057(16)
21:17
21:17
Play later
Play later
Lists
Like
Liked
21:17A major Europol-led crackdown—Operation Eastwood—has disrupted one of the most active pro-Russian hacktivist collectives in Europe: NoName057(16). Known for a relentless barrage of DDoS attacks targeting NATO allies and Ukraine-supporting nations, this ideologically driven group ran a global network powered by gamified recruitment, cryptocurrency i…
…
continue reading

1
Phished and Exposed: What the Co-op Hack Reveals About Retail Cybersecurity
21:37
21:37
Play later
Play later
Lists
Like
Liked
21:37In April 2025, The Co-op—one of the UK’s largest retailers—confirmed a data breach that exposed the personal information of 6.5 million members. No financial data was taken, but the attack hit at the core of trust, with CEO Shirine Khoury-Haq calling it a “personal attack on our members and colleagues.” This wasn’t just a technical failure—it was a…
…
continue reading

1
UL NO. 489: STANDARD EDITION | My personal toolchain updates, Google tracking through DuckDuckGo, Anthropic’s Pentagon Deal, Grok4 NSFW, Substack Crushes WSJ, and more...
22:01
22:01
Play later
Play later
Lists
Like
Liked
22:01UL NO. 489: STANDARD EDITION | My personal toolchain updates, Google tracking through DuckDuckGo, Anthropic’s Pentagon Deal, Grok4 NSFW, Substack Crushes WSJ, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclusive benefits here: htt…
…
continue reading

1
A decade at the helm: in conversation with Rory Medcalf
47:16
47:16
Play later
Play later
Lists
Like
Liked
47:16How has Australia’s security landscape changed over the last decade? How was the Indo-Pacific concept born, and how has it evolved? What are the biggest threats facing Australia right now? In this episode, Rory Medcalf joins David Andrews to look back on the past decade in which he has served as Head of the ANU National Security College (NSC). They…
…
continue reading

1
Dr. Marc Salzberg, MD - CEO, Airway Therapeutics - Novel Biologics For Severe Respiratory Diseases
38:58
38:58
Play later
Play later
Lists
Like
Liked
38:58Send us a text Dr. Marc Salzberg, MD is President, Chief Executive Officer & Chief Medical Officer of Airway Therapeutics ( https://www.airwaytherapeutics.com/ ), a biopharmaceutical company developing a new class of biologics to break the cycle of injury and inflammation for patients with respiratory and inflammatory diseases. Dr. Salzberg has mor…
…
continue reading

1
FileFix Attacks Are Here: How Interlock’s Ransomware is Skipping Your Defenses
21:52
21:52
Play later
Play later
Lists
Like
Liked
21:52In this episode, we break down how Interlock, a fast-moving ransomware group launched in late 2024, has evolved from using web injectors and clipboard tricks (like ClickFix) to an even more covert social engineering technique that abuses Windows File Explorer’s address bar to execute malicious code without triggering security prompts or downloads. …
…
continue reading

1
Ontinue Uncovers SVG-Based Phishing: Why Your Browser Could Be the Weak Link
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58Ontinue has uncovered a stealthy new phishing campaign that’s flipping conventional defenses on their head—weaponizing SVG image files to silently redirect victims to malicious websites, without requiring file downloads, macros, or even user clicks. In this episode, we break down how attackers are exploiting the JavaScript-capable structure of Scal…
…
continue reading
This episode covers the stability of Islamic Republic of Iran in the aftermath of the 12 Day War, and how the regime will adapt to its new reality. Guest Biographies Michael Connell is an expert in Persian-Gulf security-related issues, the armed forces of Iran, U.S.-GCC security cooperation, and adversary cyber policy and strategy. He has served as…
…
continue reading

1
Keeping Drupal Running With Static Code Analysis & Lessons From Drupalgeddon - Matt Glaman
20:00
20:00
Play later
Play later
Lists
Like
Liked
20:00In this episode of the Security Repo Podcast, we sit down with Matt Glaman, a veteran developer in the Drupal community, to explore the role of static code analysis in maintaining secure, performant, and upgrade-ready PHP applications. We dive into tools like PHPStan and DrupalCheck, and how they help identify deprecations and prevent security risk…
…
continue reading

1
Exein Raises €70M: Defending the IoT-AI Frontier with Embedded Security
17:35
17:35
Play later
Play later
Lists
Like
Liked
17:35Exein, the Italian cybersecurity company specializing in embedded IoT defense, has raised €70 million in Series C funding, marking a significant milestone in the race to secure AI-connected infrastructure. Backed by Balderton and a roster of prominent investors, this round pushes Exein’s total funding past $106 million and fuels its global expansio…
…
continue reading

1
Salt Typhoon Strikes Again: National Guard, Telecoms, and a Crisis in U.S. Cyber Defense
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58Salt Typhoon, a sophisticated Chinese state-sponsored cyber threat actor, is conducting one of the most aggressive and sustained espionage campaigns ever uncovered against U.S. critical infrastructure. This episode explores how the group—linked to China's Ministry of State Security—compromised a U.S. state’s Army National Guard, infiltrated telecom…
…
continue reading

1
299 - Lessons learned self-hosting small Docker-based services and utilities
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02In this week's episode, it's time to share insights and lessons learned from self-hosting stuff at home! We'll talk about the why and the what, and also some stuff that didn't work at all. You'll also hear about how to best service workloads from home, and what sort of equipment is needed. (00:00) - Intro and catching up. (04:04) - Show content sta…
…
continue reading

1
Paul Keable - CSO, Ashley Madison - Technology, Culture And Future Relationships
35:48
35:48
Play later
Play later
Lists
Like
Liked
35:48Send us a text Paul Keable is Chief Strategy Officer at Ashley Madison ( https://www.ashleymadison.com/ ) - the global online dating and social networking platform, specifically catering to individuals in committed relationships seeking discreet connections. As Chief Strategy Officer, Paul oversees the strategic direction of Ashley Madison, emphasi…
…
continue reading

1
Lily Hamourtziadou, "Body Count: The War on Terror and Civilian Deaths in Iraq" (Bristol UP, 2021)
31:00
31:00
Play later
Play later
Lists
Like
Liked
31:00Body Count: The War on Terror and Civilian Deaths in Iraq (Bristol University Press, 2021), Lily Hamourtziadou’s investigation into civilian victims during the conflicts that followed the US-led coalition’s 2003 invasion of Iraq provides important new perspectives on the human cost of the War on Terror. From early fighting to the withdrawal and ret…
…
continue reading

1
Was Jeffrey Epstein an Israeli Asset?
1:32:44
1:32:44
Play later
Play later
Lists
Like
Liked
1:32:44Tommy and Ben discuss Trump’s Ukraine policy announcement and try to unpack how much of it is style vs. substance. They also talk about the massive layoffs at the State Department, Trump’s bottom-of-the-barrel ambassador picks for crucial posts in Southeast Asia, the investigations into Pete Hegseth’s top aides at the Pentagon, and the president’s …
…
continue reading

1
DragonForce Ransomware Hits Belk: 150GB Data Leak and Operational Chaos
1:20:33
1:20:33
Play later
Play later
Lists
Like
Liked
1:20:33In this episode, we dive into the May 2025 ransomware attack on Belk, the iconic U.S. department store chain, orchestrated by the DragonForce ransomware group—a fast-rising player in the ransomware-as-a-service (RaaS) ecosystem. The cyberattack brought down Belk’s online and in-store operations for days, exfiltrated over 156GB of sensitive data, an…
…
continue reading
For this episode of Talking Geopolitics, we turn our attention to China, where President Xi Jinping has been busy intensifying a crackdown on high-ranking officials. But although China's president may seem like a permanent feature on the global stage, a shaky Chinese economy and circling rivals means that his rule is far from secure. Geopolitical F…
…
continue reading

1
NVIDIA Issues Urgent Rowhammer Warning: Enable ECC or Risk AI Integrity
40:39
40:39
Play later
Play later
Lists
Like
Liked
40:39In this episode, we dissect a major hardware-level cybersecurity warning issued by NVIDIA, one that directly affects data center operators, AI researchers, and enterprise IT teams using GPU infrastructure. The threat: Rowhammer—a physical DRAM vulnerability that’s now been successfully exploited on GPUs through a new attack method known as GPUHamme…
…
continue reading

1
Nick Andersen on national resilience, priorities, and leading with purpose
1:38:59
1:38:59
Play later
Play later
Lists
Like
Liked
1:38:59Nick Andersen, President and COO of Invictus, joins Andy Sauer to unpack the hard truths about cybersecurity, critical infrastructure, and government readiness. With experience spanning the Marine Corps, DOE, and White House, Nick offers a brutally honest take on what it will take to build real resilience—starting with ruthless prioritization. From…
…
continue reading

1
Zip Security Secures $13.5M to Simplify and Scale Cyber Defense
48:43
48:43
Play later
Play later
Lists
Like
Liked
48:43In this episode, we spotlight Zip Security, a rising New York-based cybersecurity startup that just closed a $13.5 million Series A funding round, led by Ballistic Ventures. This brings the company’s total raised to $21 million, underscoring growing investor confidence in Zip’s mission: to make enterprise-grade cybersecurity accessible, automated, …
…
continue reading

1
Century Support Services Breach: 160,000 Identities Compromised in Silent Cyberattack
32:03
32:03
Play later
Play later
Lists
Like
Liked
32:03In this episode, we examine the major data breach at Century Support Services—also operating under the name Next Level Finance Partners—that exposed the personal information of over 160,000 individuals. While the company discovered indicators of a cyberattack as early as November 2023, it wasn’t until May 2024 that investigators confirmed sensitive…
…
continue reading

1
Bringing Humanity to Cybersecurity with Lea Kissner, CISO of LinkedIn
18:43
18:43
Play later
Play later
Lists
Like
Liked
18:43Lea Kissner, CISO of LinkedIn, describes the dangers of perverse metrics, the importance of phishing-resistant technologies, and the ongoing challenge of recruiting and retaining top talent in the field. Lea also explains how she deals with complex privacy issues at scale every day. Lea and Blake also touch on LinkedIn's efforts to balance security…
…
continue reading

1
Ep. 45 - "Save Money, Party Smarter: How Discotech Blends Nightlife, Travel & Tech with Ian Chen"
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26In this episode of Tickets to Travel, Mario is joined by Ian Chen, CEO & co-founder of Discotech, the platform that lets users “save money, party smarter.” Ian shares the story behind Discotech’s rise from a frustrating Vegas club experience to becoming a powerhouse for nightlife, festivals, and travel experiences—now with over 1.9 million app down…
…
continue reading

1
561 | Jeff Hauser vs. Paul Williams - Debating What the Abundance Agenda Gets Right and Wrong
1:01:29
1:01:29
Play later
Play later
Lists
Like
Liked
1:01:29Abundance 2025 REALIGNMENT NEWSLETTER: https://therealignment.substack.com/ PURCHASE BOOKS AT OUR BOOKSHOP: https://bookshop.org/shop/therealignment Email Us: [email protected] Jeff Hauser, Paul E. Williams, Marshall Kosloff
…
continue reading

1
Introducing "Understood: Who Broke Internet"
37:40
37:40
Play later
Play later
Lists
Like
Liked
37:40An episode from "Understood: Who Broke the Internet" from CBC podcasts: We were promised a digital utopia. What we got was a pay-to-play hellscape of pop-ups, bots, and algorithmic sludge. Writer and internet contrarian Cory Doctorow charts the internet’s slow descent—from open commons to corporate enclosure—and lays out a path to take it back. Lea…
…
continue reading

1
William Ho - CEO, IN8bio - Next Generation Cell Therapies For Cancer
52:05
52:05
Play later
Play later
Lists
Like
Liked
52:05Send us a text William Ho is a Co-Founder, and has served as the President, Chief Executive Officer, and Director of IN8bio ( https://in8bio.com/ ), a biotech company with a mission of developing next-generation therapies for treating cancer, with a focus on gamma-delta T cells, since its inception. Mr. Ho has worked in the biotechnology industry f…
…
continue reading

1
From "dead-end job" to CEO: Building an IT consulting business | John Hansman
45:40
45:40
Play later
Play later
Lists
Like
Liked
45:40Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast John Hansman of Truit joins today's Cyber Work episode to share his journey from a "dead-end job" in electronic security to building a thriving managed IT services company. As…
…
continue reading

1
Utility Security Podcast - Disaster Response Security - Proven Strategies with VRP Group’s Ross Falisi
26:12
26:12
Play later
Play later
Lists
Like
Liked
26:12In this episode of the Utility Security Podcast, host Curtis Marquardt, Jr. sits down with Ross Falisi of VRP Group—a seasoned expert in utility and disaster security. As hurricane, flood, and wildfire seasons ramp up, utilities must prepare to protect both their people and their reputation in the face of increasing threats—from natural disasters t…
…
continue reading

1
What's Next for Afghanistan: U.S. Interests or Compromise with the Taliban?
44:38
44:38
Play later
Play later
Lists
Like
Liked
44:38Text the ATB Team! We'd love to hear from you! What’s the U.S. endgame in Afghanistan now—and what role does the Taliban really play? In this episode of At the Boundary, host Jim Cardoso speaks with Dr. Jonathan Schroden, a non-resident fellow at the Global and National Security Institute (GNSI), to explore how U.S. foreign policy toward Afghanista…
…
continue reading

1
Grassroots Cybersecurity: Protecting Communities Through Education
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01What does it take to build real cybersecurity skills in underserved communities? In this episode of The Audit, Rasheed Alowonle shares his journey from Chicago to becoming a cybersecurity educator and community advocate. This isn't your typical career advice—it's about fortifying communities through practical security hygiene and hands-on learning.…
…
continue reading

1
The Google Workspace Security Gap: Why Traditional Tools Fall Short
16:14
16:14
Play later
Play later
Lists
Like
Liked
16:14In this episode, we discuss the often overlooked security issues within Google Workspace. Rajan Kapoor, Field CISO at Material Security, joins us to talk about how Material Security is redefining the protection of documents, email accounts, and data in Google Workspace. We explore the unique challenges Workspace presents compared to traditional too…
…
continue reading