show episodes
 
The ITPro Podcast is a weekly show for technology professionals and business leaders. Each week hosts Rory Bathgate (@rorybathgate) and Jane McCallion (@JaneMcCallion) are joined by an expert guest to take a deep dive into the most important issues for the IT community. New episodes premiere every Friday. Visit itpro.com/uk/the-it-pro-podcast for more information, or follow ITPro on LinkedIn for regular updates.
  continue reading
 
Artwork

1
Security Dilemma

The John Quincy Adams Society

Unsubscribe
Unsubscribe
Weekly
 
U.S. foreign policy for the future. Security Dilemma brings you conversations with the experts, policymakers, and thinkers charting new paths forward from the wreckage of recent decades and toward a national security and defense policy guided by prudence and restraint. Cohosts John Allen Gay and Patrick C. Fox bring you the information you need to shape a wiser approach. Security Dilemma is a podcast of the John Quincy Adams Society, an independent nonprofit organization dedicated to advanci ...
  continue reading
 
Loading …
show series
 
In a recent episode I interviewed author Dan Lawton about his book focusing on the fallout from the murder of dept Governor, Albert Miles, of the infamous Maze Prison in November 1978 in which an innocent man was convicted. Alan Miles witnessed his father’s brutal murder as a young man at the hands of the IRA but almost immediately got to a place i…
  continue reading
 
This week on Security Dilemma, Patrick Carver Fox and A.J. Manuzzi spoke about Haiti with Jake Johnston, Senior Research Associate at the Center for Economic and Policy Research in Washington DC. Jake is the lead author of CEPR's Haiti: Relief and Reconstruction blog and the author of the book Aid State: Elite Panic, Disaster Capitalism and the Bat…
  continue reading
 
While the private sector makes a lucrative target for threat actors, the public sector is also under constant threat of cyber attacks. In October 2023, the British Library was hit by a major ransomware attack and the founder and CEO of the National Cyber Security Centre (NCSC) Ciaran Martin told the BBC that recent attacks on the UK’s National Heal…
  continue reading
 
Jonathan Trigg’s book “Death In The Fields” examines, in great detail, the infamous East-Tyrone IRA and how this rural group complied some of the republican’s biggest wins and conversely, their most devastating losses. We examine the early days of the unit and how they were formed, the autonomy they enjoyed, the Jim Lynagh “A-Team” era and their de…
  continue reading
 
When it comes to some of the tech world’s most impressive offerings, high performance computing, also known as supercomputing, often rises to the top of the list. Referring to powerful systems used to crunch the most complex calculations or run incredibly demanding workloads, it’s a rapidly expanding field backed by significant investment. But what…
  continue reading
 
William Matchett is an ex-RUC officer who spent years working in the secretive and murky world of informants and agents during his time in Special Branch while “the troubles” raged on. William shares with us his motivations for joining the RUC during such dangerous times, the techniques they utilized to recruit informants, death threats he’s receiv…
  continue reading
 
This week on Security Dilemma, Patrick Carver Fox and John Allen Gay spoke with Mike DiMino and Dan Caldwell of Defense Priorities. Mike is a fellow at Defense Priorities, a former career CIA military analyst and counterterrorism officer who’s worked on everything from operational assignments overseas to the EUCOM to the President’s Daily Brief. Da…
  continue reading
 
This week on Security Dilemma, Patrick Carver Fox and A.J. Manuzzi spoke with Dr. Nathaniel Powell, West Africa Analyst at Oxford Analytica. Dr. Powell is the author of France’s Wars in Chad: Military Intervention and Decolonization in Africa, an honorary researcher at Lancaster University’s Centre for War and Diplomacy. Our conversation today rang…
  continue reading
 
Every business will, at some point, be impacted by cyber attacks. Companies task security teams to prepare the first line of defense against cyber attacks, and most have plans in place for the damage they leave behind – be it data loss, encryption by ransomware operators, or large-scale service disruptions. But something that often goes unremarked …
  continue reading
 
This week on Security Dilemma, Patrick Carver Fox and AJ Manuzzi spoke with Ali Wyne, Senior Research and Advocacy Advisor on U.S.-China at International Crisis Group. Ali analyzes the development of U.S. policy toward China and formulates ICG recommendations for managing crises and preventing conflicts between Washington and Beijing. He has previo…
  continue reading
 
This classic episode of the ITPro Podcast was first published on 14 July 2023. When you consider the roles that hold influence over business decisions and operations, which come to mind? Doubtless, the CEO and CFO, as well as the COO if you have one. The CMO may also be there – but what about the CIO or CTO? The advent of cloud computing, bring you…
  continue reading
 
**Sorry for the late upload my good people.. feel free to follow on YouTube where I'm a bit more on top of things** Fr Sean McManus hails from Co. Fermanagh but was sent, by his superiors in the Catholic, to America early in his career where he continued his fight for Irish freedom. Fr McManus’ tells us about his early life, his older brother who w…
  continue reading
 
June has been a month filled with tech conferences. ITPro has covered events including HPE Discover, Splunk .conf24, Snowflake Data Summit, Cisco Live, Pegasystems Inspire, and Pure Accelerate, all held in Las Vegas, amid a busy season for the industry. But throughout the many hours of these events, with tens of thousands of attendees and swathes o…
  continue reading
 
Mick Hawkes is an ex-SAS soldier and 14th intel company (the Det.) operator who worked against the IRA and Loyalist paramilitaries in Northern Ireland as part of his military career. Mick tells us about the daily ins and outs of carrying out surveillance on dangerous insurgents, the differences between republican and loyalist paramilitaries, how he…
  continue reading
 
With the generative AI gold rush continuing at speed in enterprise IT. Ranging from chatbots to AI training services, every provider is looking for that killer use case that makes it indispensable for AI. At HPE Discover 2024, the story has been no different. In collaboration with Nvidia, the company believes it has something unique to offer its en…
  continue reading
 
This week on Security Dilemma, Patrick Carver Fox and John Allen Gay spoke with Dr. James Acton, co-director of the Carnegie Endowment’s Nuclear Policy Program. Dr. Acton has a PhD in theoretical physics from Cambridge and he’s testified to the House Armed Services Committee, House Appropriations Committee and US-China Economic and Security Review …
  continue reading
 
My guest this week is Dr Michael Flavin, child to Irish parents who grew up in Birmingham, England during the IRA’s bombing campaign in England during the troubles. Michael speaks to us about being a part of the Irish diaspora in England, anti-Irish discrimination at the time as well Michael’s writings on IRA leadership and INLA splits. 00:00 “NO B…
  continue reading
 
When Cisco announced it would be buying Splunk, doubts were raised over the company's future within its new home. Splunk .conf24, the company's annual conference, was a proving ground to see if these fears were well founded. According to ITPro's intrepid features editor, however, Splunk's brand is as strong as it ever was, with both Cisco's CEO and…
  continue reading
 
This week on Security Dilemma, Patrick Carver Fox and John Allen Gay spoke with Julia Gledhill, a Research Associate at the Stimson Center and a former JQAS chapter leader who's a rising star in DC tracking Pentagon spending, military contracting and weapons acquisition. She's appeared on NPR, More Perfect Union and she's now a co-host on the newes…
  continue reading
 
Today’s guest is screenwriter Dave Callaham, and our conversation revolves around one of his early screenwriting assignments: the adaptation of the influential video game DOOM by id Software, turned into an action movie starring The Rock in 2005. Dave quickly became an in-demand writer in Hollywood, and his credits include a ton of high-profile act…
  continue reading
 
Today’s guest is Irish filmmaker Enda McCallion, and our interview was prompted by his involvement in the 2005 horror film DOOM starring The Rock, an adaptation of the influential video game by id Software. Enda was attached to the project in its initial stages and during pre-production, but was then fired and replaced by Andzrej Bartkowiak as the …
  continue reading
 
Today’s guest is filmmaker Tony Giglio, and our conversation revolves around his 2019 film DOOM: ANNIHILATION which he wrote and directed. Unlike the 2005 DOOM movie starring The Rock, this newer adaptation of the infamous and influential ego shooter video game by id Software was made on a very small budget, and it’s not a sequel or remake, but bas…
  continue reading
 
One of the most unexpected things to happen in May was a sudden outage at the Australian pension fund UniSuper. After days of confusion and concern that the fund may have been hit by a cyber attack among its customer base, it emerged that Google Cloud had accidentally deleted UniSuper’s entire cloud subscription. We dive into what lessons businesse…
  continue reading
 
This week on Security Dilemma, Patrick Carver Fox and John Allen Gay spoke with Dr. Brandon Valeriano, a professor at Seton Hall University. Dr. Valeriano is a Distinguished Senior Fellow at Marine Corps University as a Senior Advisor to the Cyberspace Solarium Commission 2.0 and he’s additionally written a number of books on the subject, including…
  continue reading
 
For this episode I’m joined by author and lecturer, Thomas Leahy, whose book “The Intelligence War against the IRA” gives a through and detailed account of Britain’s attempts to disrupt and defeat the IRA by way of intel gathering. We discuss the various methods of intel collection, what “intel” is and can be used for in this context, the various t…
  continue reading
 
Dan Lawton’s thrilling new book “The Hunted” explores the story of Kevin Barry Artt and how he was false-convicted of the IRA murder of deputy Maze prison governor, Albert Miles. We speak about the so-called “confession factory” Castlereagh, Long Kesh’s Maze prison, the horrors of the “blanket”/“no-wash” protests and how Kevin Barry Artt took part …
  continue reading
 
As the tech sector creates data at greater rates than ever before, using more cloud and on premise workloads, it’s more important than ever that firms consider their sustainability strategy and carbon footprint. Until the world has achieved net zero energy, every watt that goes into powering hardware and software adds to overall global emissions, w…
  continue reading
 
Harry McCallion is an ex-paratrooper and SAS solider who served in the north during some of the troubles’ most violent years. Harry tells us about the brutal training regime they underwent before deployment, his thoughts on the mistakes that the British army made, his views on the “Ballymurphy Massacre”, his emotional state while policing violent r…
  continue reading
 
This week on Security Dilemma, Patrick Carver Fox and John Allen Gay spoke with Dr. Joshua Shifrinson, a professor at the University of Maryland, non-resident senior fellow at the Cato Institute and author of Rising Titans, Falling Giants. This was a great conversation about the rise and fall of great powers, American involvement in the war in Ukra…
  continue reading
 
As enterprise AI becomes more widely adopted, businesses are being forced to examine whether their architecture is up to the task. The feverish hype around AI in the public cloud that started in November 2022 has given way to greater investment in open ecosystems for AI and smaller models run at a business’s edge. From chatbots stored on a laptop f…
  continue reading
 
Author, lawyer and past guest of the show, David Burke reveals a previously unreleased statement from ex-Tara member and close-friend of Robin 'the jackal" Jackson, Charlie Simpson uncovering Jackson and the British Army's involvement in one of the trouble's most heinous attacks. We talk through the events of the tragic day, the logistics of the UV…
  continue reading
 
The LockBit ransomware group recently suffered another major blow at the hands of international law enforcement, as the UK’s NCA revealed the name and face of the group’s long-sought-after leader. Dmitry Khoroshev, known as ‘LockBitSupp’ on the dark web, was unmasked by the UK’s National Crime Agency (NCA) while the US Department of Justice announc…
  continue reading
 
On this episode of Security Dilemma, we have our first return guest on the show - Dr. Stephen Wertheim. Patrick Carver Fox and John Allen Gay joined him at his offices at the Carnegie Endowment for International Peace to discuss Ukraine, NATO, restraint, "retrenchment" and the foreign policy implications of the 2024 elections. After the release of …
  continue reading
 
Brendan Hughes (not to be confused with the deceased Brendan ‘The Dark” Hughes) shares his truly extraordinary life story, a life shaped by his membership of the East-Tyrone PIRA in the early days of the conflict in the North. Brendan tells us about his time ambushing British soldiers in the countryside and robbing banks to fund raise for the IRA a…
  continue reading
 
Some experts will tell you the first step in adopting AI is making sure your data is in order. But what about your skills? When it comes time to put AI in the hands of their workforce, leaders need to know that they’ll be able to hit the ground running and unlock productivity benefits without delay. Achieving this will involve investing in AI skill…
  continue reading
 
This week on Security Dilemma, Patrick Carver Fox and John Allen Gay spoke with Reid Smith, Vice President of Foreign Policy at StandTogether. Reid is an important advocate for realism and restraint in U.S. foreign policy, coordinating support for many of the researchers, and academics featured on this show. This episode dives into the premises of …
  continue reading
 
My guest this week is ex-b*mb disposal man, Steve Smith. Steve worked as a EOD officer in Belfast during the early 80s and worked to rid the city of IRA & Loyalist b*mbs. Steve gives us his insight into the various types of explosives used throughout the conflict, the differences between IRA & Loyalist b*mb-makers, how it feels to put on the b*mb-s…
  continue reading
 
Loading …

Quick Reference Guide