Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Intelligence Podcasts

show episodes
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Click Here

Recorded Future News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork

1
Secure Line

Jessica Davis, Stephanie Carvin, Leah West (A CASIS podcast)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Canada's intelligence landscape is as unique as the country itself. In an evolving global threat environment, fostering informed discussions on intelligence has become increasingly vital to the national security discourse. Secure Line Podcast is designed to influence and inform the national dialogue on security and intelligence in Canada, and internationally. Secure Line is brought to you by the Canadian Association for Security & Intelligence Studies (CASIS).
  continue reading
 
Artwork
 
“Pod Save America” cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obama’s National Security Council. On “Pod Save the World,” he and former deputy national security adviser Ben Rhodes break down the latest global developments and bring you behind the scenes with the people who were there. New episodes every Wednesday. Subscribe to Friends of the Pod! Your subscription makes Crooked’s work possible and gives ...
  continue reading
 
Artwork

1
Brussels Sprouts

Center for a New American Security | CNAS

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Small bites on Transatlantic Security, NATO, the EU, Russia, and all things Europe. Hosted by Andrea Kendall-Taylor and Jim Townsend at the Center for a New American Security.
  continue reading
 
Artwork

1
Mystery AI Hype Theater 3000

Emily M. Bender and Alex Hanna

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Artificial Intelligence has too much hype. In this podcast, linguist Emily M. Bender and sociologist Alex Hanna break down the AI hype, separate fact from fiction, and science from bloviation. They're joined by special guests and talk about everything, from machine consciousness to science fiction, to political economy to art made by machines.
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
  continue reading
 
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Entangled Things

Entangled Things

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
  continue reading
 
Artwork

1
Learn Online Security Podcast

Learn Online Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI). Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers.
  continue reading
 
Artwork

1
AI News Daily

brief.news

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to AI News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about machine learning, robotics, automation, natural language processing, AI ethics, and more. Whether you're a tech enthusiast, AI researcher, or simply curious about the future of technology, this podcast is your go-to source for AI news. T ...
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Artwork

1
Security Tech Talk

Steve Kenny, Axis Communications

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
  continue reading
 
Welcome to “Understandable Insights: Information to Intelligence with Sue Gordon” — the national security podcast that provides you an elemental understanding of the world as it is, not how you prefer it to be. Each week, Eric — a former Marine, father, and entrepreneur — sits down with the Honorable Sue Gordon, the nation’s former top career intelligence officer. Together, they break down the headlines shaping our world and ask what they really mean for citizens, leaders, and institutions. ...
  continue reading
 
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
  continue reading
 
Dive into the exciting world of web creation with artificial intelligence tools. In *"Developing My Website with Artificial Intelligence"*, we explore step by step how to design, optimize, and manage websites efficiently, even if you're a beginner. From choosing the best hosting and domain to implementing advanced strategies like SEO, security, and monetization, each episode is packed with practical tips, innovative tools, and techniques to transform your ideas into a successful website. Whe ...
  continue reading
 
Welcome to the Global Intelligence Knowledge Network Podcast, where real-world intelligence expertise meets insightful analysis. Join your host, Neil Bisson, a former Intelligence Officer with the Canadian Security Intelligence Service, for a weekly deep dive into the world of espionage, national security, foreign interference, terrorism, and all matters spy and intelligence related. With over 25 years of experience in intelligence and law enforcement, both domestically and internationally, ...
  continue reading
 
Artwork

1
At The Boundary

Global and National Security Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
  continue reading
 
Artwork

1
The Artificial Intelligence Show

Paul Roetzer and Mike Kaput

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Artificial Intelligence Show (formerly The Marketing AI Show) is the podcast that helps your business grow smarter by making AI approachable and actionable. The AI Show podcast is brought to you by the creators of the Marketing AI Institute, AI Academy for Marketers, and the Marketing AI Conference (MAICON). Hosts Paul Roetzer, founder and CEO of Marketing AI Institute, and Mike Kaput, Chief Content Officer, break down all the AI news that matters and give you insights and perspectives t ...
  continue reading
 
Artwork

1
SpyTalk

SpyTalk, Jeff Stein

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
  continue reading
 
Artwork

1
Technology and Security

Dr Miah Hammond-Errey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Held live every two weeks on Thursdays, the Global Security Briefing is now the industry's largest virtual event of its kind. We examine security threats, supply chain impacts and geopolitical developments for global security and risk intelligence professionals. Since the earliest days of COVID, Factal and Emergent Risk International have held an essential hour-long briefing for global security and resilience professionals.
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
  continue reading
 
The Long Game is a weekly national security podcast hosted by Jake Sullivan, President Biden’s National Security Advisor, and Jon Finer, his Principal Deputy—senior aides who sat in on the classified Presidential Daily Brief each morning and translated raw intelligence into policy advice. Each week, Jake and Jon will pull back the curtain on how power really works helping you make sense of the national security stories unfolding today. Part of the Vox Media Podcast Network.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
Next in Tech

S&P Global Market Intelligence

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what's new and what's next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
  continue reading
 
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
  continue reading
 
Artwork

1
EverydaySpy Podcast

Andrew Bustamante

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
  continue reading
 
Artwork
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
Loading …
show series
 
Most threat intelligence programs can't prove their value. Joe Rossi's team at Zions Bank did the opposite—preventing $3 million in fraud annually while actually attracting new customers to the bank. In this episode, former punk rock kid turned threat intelligence leader Joe Rossi reveals why your most valuable security intelligence isn't from expe…
  continue reading
 
In this episode of the Connected Intelligence Podcast, Jim McConnell shares insights from more than three decades in corporate and critical infrastructure security, exploring the evolution of converged security and safety metrics. Together with Manish, he discusses how organizations can move beyond silos to create unified, data-driven security stra…
  continue reading
 
In this episode of The Security Strategist podcast, host Jonathan Care, Lead Analyst at KuppingerCole Analysts, speaks with Sudhir Reddy, the Chief Technology Officer (CTO) of Esper, about how to build trust in ‘Zero Trust.’. They explore this paradox in Zero Trust systems, where human trust is essential for the system to function effectively. Redd…
  continue reading
 
What are the origins of the Australian Geospatial-Intelligence Organisation (AGO), and how has the organisation developed within the National Intelligence Community? How does AGO contribute to the broader remit of Australian statecraft, the work done by other NIC agencies, and the Five Eyes partnership? What makes innovation in the geospatial intel…
  continue reading
 
Send us a text 🎙️ Episode Summary AI changes the game — but humans still write the rules with Julian Fisher & Gavin Stone In this powerful episode of The Security Circle, former British intelligence specialists Julian Fisher and Gavin Stone pull back the curtain on the shifting landscape of espionage, AI, and global security. We explore the critica…
  continue reading
 
Question? Text our Studio direct. Can Brett Johnson Help You SPOT Fraud Before it's Too Late? Brett Johnson joins us to talk about spotting fraud before its too late. We discuss how to limit cyber risk for small business, ways to identify refund fraud, AI implications in cyber security today, best policies to limit cyber liability and how can we sp…
  continue reading
 
From October 18, 2024: Following Ukrainian President Volodymyr Zelensky’s speech to the Ukrainian Parliament outlining his victory plan, Lawfare Editor-in-Chief Benjamin Wittes sat down with Lawfare Ukraine Fellow Anastasiia Lapatina and Eric Ciaramella of the Carnegie Endowment for International Peace. They talked about the components of the plan,…
  continue reading
 
Washington is trimming budgets… and bleeding digital expertise. So what happens when national security is run by agencies living in the past? Sue Gordon, former Principal Deputy Director of National Intelligence, helps us break it down. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
  continue reading
 
Please enjoy this encore of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠. Inspired by the r…
  continue reading
 
The Intersection of Espionage Techniques and Cybersecurity Threats This episode explores the parallels between espionage and cybersecurity, particularly focusing on social engineering tactics used in both domains. Hosted by Jim Love, the podcast features insights from Neil Bisson, a retired intelligence officer from CSIS, and David Shipley, CEO of …
  continue reading
 
This is today’s cyber news for November 28th, 2025. Today’s brief opens with millions of phones still following abandoned calendar links that attackers can quietly reclaim, turning old sync feeds into tracking and phishing channels. We move through an analytics vendor breach exposing OpenAI developer account details, a ransomware hit on Asahi affec…
  continue reading
 
(0:10): HP Inc. to Cut 6,000 Jobs in AI-Driven Restructuring by 2028 (1:45): Italy Expands Meta Probe Over Alleged AI Chatbot Competition Clampdown on WhatsApp (3:55): Wipro and IISc Join Forces to Propel AI and Quantum Innovations for 6G and Beyond (6:04): Viral Fake GTA 6 Leaks Highlight Urgent Need for AI Content Regulation and Clearer Labeling …
  continue reading
 
*Declassified Club exclusive: ⁠⁠⁠SUBSCRIBE⁠⁠⁠⁠⁠⁠ to listen to the full series* Vladimir Putin is on the cusp of becoming Russia's all-powerful leader, but how did a humble boy from St Petersburg reach such elite heights? Listen as David and Gordon are once again joined by one of the world's leading experts on Russian organised crime, Mark Galeotti,…
  continue reading
 
Summary:- The episode introduces Hostinger’s AI website builder that lets you create a functional, fast, SEO-friendly site with minimal effort. It guides users from defining goals and keywords to generating a complete draft, then refining content and visuals. The approach emphasizes clear design, quick performance, trust signals, and the option to …
  continue reading
 
In this episode of Secure Line, Leah West and Stephanie Carvin break down the most consequential defence budget Canada has seen in generations—joined by special guest Philippe Lagassé, Chair in International Affairs at NPSIA and author of Debating Canadian Defence. With Jess Davis away this week, Leah and Stephanie dive into the headline-grabbing $…
  continue reading
 
From November 25, 2024: At a recent conference co-hosted by Lawfare and the Georgetown Institute for Law and Technology, Georgetown law professor Paul Ohm moderated a conversation on "AI Regulation and Free Speech: Navigating the Government’s Tightrope,” between Lawfare Senior Editor Alan Rozenshtein, Fordham law professor Chinny Sharma, and Eugene…
  continue reading
 
We dive into a nostalgic yet revealing journey through classic hacker films, from WarGames to The Net and beyond, to assess what they got right, what they wildly imagined, and what those stories say about culture, fears, and cyber reality today. David Moulton, Senior Director of Thought Leadership for Unit 42 talks with Ben Hasskamp, Global Content…
  continue reading
 
Please enjoy this encore of T-Minus Deep Space. BigBear.ai is at the forefront of innovation for national security, and is committed to supporting the critical infrastructure driving America’s competitive edge. The company deploys cutting-edge Al, machine learning, and computer vision solutions to defend critical operations and win with decision ad…
  continue reading
 
In this episode, the host addresses a previous mistake in naming a company involved in a breach, correcting SitusAMC for Ascensus, and extends apologies. Key topics include US banks assessing a breach fallout from financial tech vendor SitusAMC, ransomware group CioP targeting Broadcom through Oracle's vulnerabilities, a new malware campaign hiding…
  continue reading
 
Report sheds light on cyber activity targeting space-related organizations during the Gaza War. Russian threat actor targets US civil engineering firm. FBI says $262 million has been stolen in account takeover scams this year. HashJack attack tricks AI browser assistants. London councils disrupted by cyberattacks. Russia’s Gamaredon and North Korea…
  continue reading
 
Investigative reporter Ron Kessler and retired former senior CIA officer John Sipher on the GOP plan to give Tulsi Gabbard control of neutralizing spies and terrorists. John Sipher https://www.thecipherbrief.com/ Risking a National Security Disaster by Ronald Kessler https://www.spytalk.co/p/risking-a-national-security-disaster Follow Jeff Stein on…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Do you really need predictions to tackle cyber threats? Join host Kim along with intelligence analyst John & special guest CISO Rafal Baran as they discuss: New NPM Supply Chain Threat (1:13) China Manipulates AI for Initial Access (4:46) Cloud Gaps Bring IoT Takeover (7:29) 2026 Cyber-Threat Predic…
  continue reading
 
The Virginia Republican discusses the Pentagon's acquisition reforms, the defense secretary's legislative-affairs bottleneck, and his priorities for the upcoming spending bills. Guest: Rep. Rob Wittman, R-Va., chairman of the House Armed Services Subcommittee on Tactical Air and Land Forces, in conversation with Defense One Executive Editor Bradley…
  continue reading
 
On this episode of the Connected Intelligence Podcast, Manish Mehta sits down with Chris Wingfield, SVP of Innovations at 360Privacy, to explore the evolving landscape of digital targeting and executive protection. Chris shares how his background in intelligence and signals analysis informs his approach to building proactive, AI-driven cyber threat…
  continue reading
 
This is today’s cyber news for November 26th, 2025. Today’s rundown connects a cyberattack that silenced emergency alerts, critical flaws in a tiny cloud logging agent, and fresh warnings that secure messaging apps can still be turned into surveillance tools when phones are compromised. We also cover long-running credential leaks from online code h…
  continue reading
 
Lawfare Ukraine Fellow Anastasiia Lapatina and Eric Ciaramella of the Carnegie Endowment for International Peace join Editor in Chief Benjamin Wittes to discuss the last week's machinations surrounding a potential Russia-Ukraine peace deal. What is the actual American position? Is the United States abandoning Ukraine? Or is it now backing off the 2…
  continue reading
 
Send us a text 🎧 Episode Summary — “Why Defensive Security Isn’t Enough Anymore” In this episode, cybersecurity author, keynote speaker and ethical hacker Terry Cutler joins The Security Circle to unpack the harsh realities of today’s cyber threat landscape. Terry discusses the shift organisations are experiencing as budgets tighten while attacks a…
  continue reading
 
Tommy and Ben unpack Trump’s rapidly changing “peace deal” to end the war between Russia and Ukraine. They explain how the plan has changed since the first draft leaked last week, the confusion over where the plan came from and why many people believe the Russians authored it, what it tells us about which Trump officials are actually driving the po…
  continue reading
 
In today's episode of Cybersecurity Today, hosted by Jim Love, several major cybersecurity incidents are discussed. US banks are assessing the impact of a security breach at SitusAMC, where the ALFV ransomware group claimed to have stolen three terabytes of data. CIOP has targeted Broadcom through Oracle's E-Business Suite vulnerabilities. A new ma…
  continue reading
 
(0:10): NaviSense App Revolutionizes Real-Time Object Recognition for Visually Impaired (2:17): Felo's LiveDoc Launches: AI-Powered Document Workspace Promises Tenfold Productivity Boost (4:35): AI-Powered Vision Platform Revolutionizes Autonomous Mobile Robots in Industrial Settings (6:36): Michael Burry Debuts 'Cassandra Unchained', Critiques AI …
  continue reading
 
Could this have been the day when Putin fell from power? In June 2023, Prigozhin marched on Moscow, threatening to bring Putin’s authoritarian regime to its knees. In their final episode on the dramatic rise and fall of Yevgeny Prigozhin, David and Gordon take us back to the coup that almost toppled Putin and how the autocratic leader carried out t…
  continue reading
 
The seasonal gift show is back - Joey Snow and Rick Claus bring their lists of great gifts for sysadmins. You know they're impossible to buy for, so we are making it easier for you with a range of prices and seriousness for your favorite sysadmin. Useful gadgets, upgrades to older devices, and some fun stuff that reminds the sysadmins in your life …
  continue reading
 
This episode focuses on a security incident that prompts an honest discussion about transparency, preparedness, and the importance of strong processes. Sean Martin speaks with Viktor Petersson, Founder and CEO of Screenly, who shares how his team approaches digital signage security and how a recent alert from their bug bounty program helped validat…
  continue reading
 
CISA warns of spyware targeting messaging apps. CodeRED, this is not a test. Infostealer campaign spreads via malicious Blender files. Shai-Hulud’s second coming. Real estate finance firm SitusAMC investigates breach. Dartmouth College discloses Oracle EBS breach. Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the…
  continue reading
 
⬥EPISODE NOTES⬥ Understanding the Startup Engine Behind Cybersecurity This episode brings Sean Martin together with Ross Haleliuk, author, investor, product leader, and creator of Venture Insecurity, for a candid look at the forces shaping cybersecurity startups today. Ross shares how his decade of product leadership and long involvement in the sec…
  continue reading
 
Question? Text our Studio direct. We discuss How ransomware can kill and ways to build security resilience with Chris Loehr, SVP of Solis Security. Ransomware Attacks Can Be DEADLY What Makes You SAFE? Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done with full cyber chaos: 🔥 Int…
  continue reading
 
In this episode of Understandable Insights, Sue and Eric trace how seemingly ordinary deals can reshape American security, starting with a Chinese-linked insurance acquisition that offers a window into the “holy grail” of intelligence—intent. Some foreign capital is about substitution, not partnership. From there, they turn to energy in the AI era,…
  continue reading
 
Modern enterprises face a growing challenge in managing thousands of devices, applications, and identities across increasingly complex IT environments. Unmanaged assets, shadow IT, and inconsistent processes can quietly create security gaps that expose organisations to significant risk. In this episode of Security Strategist, Syed Ali, Chief Execut…
  continue reading
 
Black Friday season is upon us! 🛍️ This week, we’re joined by Simon Miller from Cifas, the UK’s leading fraud prevention service, to unpack the latest online scams. He shares essential tips to help you stay safe online and protect your hard-earned cash while shopping online this holiday season. 💳🔒 In Watchtower Weekly, we dive into why weak passwor…
  continue reading
 
Google released Gemini 3, its most advanced model yet, along with Nano Banana Pro, a leading image generation and editing model. On this week's episode, Paul and Mike go deeper on those topics and other top news this week, including GPT-5.1 Pro, controversy around a popular AI book, Nvidia earnings, and more. Show Notes: Access the show notes and s…
  continue reading
 
Lawfare Editor-in-Chief Benjamin Wittes talks with Executive Editor Natalie Orpett and Senior Editor Michael Feinberg about their recent Lawfare article examining a little-noticed piece of legislation that was slipped into the deal to end the government shutdown—one that gives senators a civil right of action to sue the U.S. government when their p…
  continue reading
 
This is today’s cyber news for November 25th, 2025. The brief follows a sweeping set of stories: a self-spreading JavaScript supply-chain attack leaking developer secrets, AI clusters hijacked through exposed orchestration tools, and quiet flaws in cloud logging and Windows update infrastructure that can turn basic plumbing into a takeover path. We…
  continue reading
 
We tend to picture cyberattacks as distant battles—state hackers, big targets, glowing maps of global chaos. But often, the frontlines are more local: a water plant, a 911 system, the power lines outside your window. In this CyberMonday crossover with WAMU’s 1A, we examine a small-town breach, the fragility of our digital infrastructure—and what it…
  continue reading
 
In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from a security standpoint and from an attacker's view. Whether you're catc…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play