Comin' at cha!
…
continue reading
The ukulele podcast from the uke nerds for the uke nerds!
…
continue reading
A podcast about the unsung - sometimes unjustly, sometimes very fittingly - miniature wargames. Follow the creators of Fortified niche on social media! JcDent: https://www.barreldrill.com/ https://bit.ly/grognardia Cassa: https://www.instagram.com/cassasshots/
…
continue reading
Kyle and Cody, two small-town Saskatchewan film critics ask the question of what makes a film, a bad film. They travel through a highly unorthodox list of films- some box office hits and some flops, to get the answer they are looking for. In their quest, they have found some hidden and not so well hidden gems.
…
continue reading
Wild ‘n holy is a podcast hosted by two matriarch mammas merging life with elements of comedy and dry British African wit. Be ready for brutally honest natters on everything - we have no filter!
…
continue reading
🎙️ Hosted by @JoeyJoy 🎧 Chatting on the 1's and 2's 🆕 Episodes Every Thursday!
…
continue reading
Jawa and Emplate will bring you mixes from themselves and dj's/producers worldwide, covering all aspects of D&B, Jungle, Hardcore, and the like. The Everyday Junglist Podcast!!
…
continue reading
I motivate you, I answer questions you ask, I cash app money, I speak about topics you give me, I speak about what most black people care about, I talk about sports, TV shows, celebrities... the best thing is Its a different podcast ✊🏾 TEXT the Podcast (478) 888-1808
…
continue reading
The Mitchell Institute hosts some of the most senior leaders and thought influencers of the U.S. Air Force, U.S. Space Force, and Department of Defense for an intimate hour-long discussion on the pressing issues of the hour as well as long-term strategic visions. The live sessions are attended by a broad swath of individuals from the Department of Defense, Capitol Hill, defense industry, and academia who influence defense policy and budget, and they receive wide press coverage.
…
continue reading
Welcome to "Flyin' with the Hits: Classic Rock and Coming of Age in the Air Force," a captivating podcast that takes you on a nostalgic journey through the lives of those who grew up in the Air Force, navigating the skies and discovering the magic of classic rock in a small town. Join us as we explore the unique experiences, challenges, and adventures of individuals who found their passion for music while soaring through the clouds, and how it shaped their coming-of-age journey in the tightl ...
…
continue reading
The "In The Black Podcast" is a light hearted and educated podcast dedicated to covering the current events, social issues, and hot topics going on in your black world, and covering it all from the perspective of 3 Black, working-class professionals, fathers, and family men. Informed. Intelligent. In The Black.
…
continue reading
Proverbs 31:8-9, Speak up for those who cannot speak for themselves, for the rights of all who are destitute (distressed, adversity). Speak up and judge fairly; defend the rights of the poor and needy. P4MF (Parents 4 Military Freedom) will stand with and support our sons and daughtes who are serving in the United States Miltary that are being coerced, pressured and punished for refusing to take the E-U-A C-O-V-I-D 1-9 v-a-c-c-i-n-e for religious or medical reasoning or choose not to. The ve ...
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Black History is more than the common names we always hear. Join Shaakira White, an HBCU grad and Black history enthusiast, as she recounts the stories of those little known or forgotten in Black History. If you want to learn more about Black history, are curious about all things Black, or just want to hear a great narrative, this is the podcast for you. Support this podcast: https://podcasters.spotify.com/pod/show/blackhistorymoments/support
…
continue reading
In this episode, Shannon, Chris, and Daniel discuss their week and share their thoughts on movies, TV shows, and the Olympics. They talk about the extreme heat in Japan and other parts of the world, their media consumption, and their excitement for the upcoming Deadpool vs. Wolverine movie. They also mention their love for anime and manga, with a f…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 28 - Take 2: Ghost Writing in Hip-Hop, Cultural Shocks, and Miami Vibes
47:09
47:09
Play later
Play later
Lists
Like
Liked
47:09
Dive into the world of ghostwriting in hip-hop, explore mind-bending cultural shocks, and soak up those Miami vibes! 🌴🎶 Join us for a fresh take on the music industry's best-kept secrets and the cultural melting pot that is Miami. Don't miss this eye-opening episode!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Dr. Tim Grayson, Special Assistant to the Secretary of the Air Force | Aerospace Nation
1:00:55
1:00:55
Play later
Play later
Lists
Like
Liked
1:00:55
Operational Imperatives, re-optimizing for great power competition, and a security environment experiencing massive change—these are just a portion of the challenges Dr. Grayson has focused on over the past few years. Given his time at DARPA, the Intelligence Community, and the technology world, Dr. Grayson brings an incredibly unique perspective. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CrowdStrike Incident Casts Shadow On Cyber Insurance
17:12
17:12
Play later
Play later
Lists
Like
Liked
17:12
In this episode, Shannon and Chris discuss the recent article about CrowdStrike's cybersecurity insurance losses and the warning from Warren Buffett. They explore the challenges of cybersecurity insurance, including the difficulty of obtaining coverage and the potential for disputes over potential losses. They also highlight the need for organizati…
…
continue reading
The airmen at U.S. Air Forces in Europe and Air Forces Africa are charged with addressing some of the most complex security challenges on the globe. Russia’s aggression in Ukraine has dramatically altered the security calculus in the region and beyond. At the same time, in Africa, the U.S. is facing a complex mix of challenges: everything from viol…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How Did Russia Shutoff Ukrainian Heat During The Winter?
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48
In this episode, Shannon, Chris, and Daniel discuss a cyber attack carried out by Russia on Ukraine, where they used malware to sabotage the heating utility of 600 buildings in the middle of winter. This affected 100,000 people and was a deliberate attempt to break the will of the Ukrainian people. The hosts highlight the evolving nature of warfare…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Gen James C. Slife, Vice Chief of Staff of the U.S. Air Force | Aerospace Nation
59:28
59:28
Play later
Play later
Lists
Like
Liked
59:28
The Air Force is at the epicenter of generational transformation. The security environment is posing severe risks the likes of which have not been seen in decades; the force is in the middle of a massive modernization cycle—including two legs of the nuclear triad and NC3; the information age is radically redefining elements of how missions are exec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
N. Korean Hacker Infiltrates Cybersecurity Company
14:57
14:57
Play later
Play later
Lists
Like
Liked
14:57
In this episode, Shannon, Chris, and Daniel discuss an article about a North Korean fake IT worker who duped, KnowBe4, a security firm. The person used AI and facial recognition to pretend to be someone else and successfully got hired as a software engineer. The hosts discuss the sophistication of the attack and the importance of verification measu…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Teaching and Sharing Expertise Ft. Professor Roger Whyte's Passion
46:15
46:15
Play later
Play later
Lists
Like
Liked
46:15
In this conversation, Ryan Williams Sr. interviews Professor Roger Whyte, a cybersecurity solutions architect and founder of Professor Roger Cyber Lounge. They discuss Professor Roger's mission to increase diversity in cybersecurity, particularly among African Americans. Professor Roger shares his experience as a mentor and coach, helping individua…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Small Satellites: Answering the Call for Space Superiority | Policy Paper Release
52:59
52:59
Play later
Play later
Lists
Like
Liked
52:59
Key Takeaways: - SmallSats will be an essential element to deliver space superiority within the construct of Competitive Endurance - Improvements in space domain awareness and responsible counterspace operations are possible with SmallSats - The low cost, rapid development timelines, and versatility of SmallSats can keep the Space Force ahead of co…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 27 - Tonio: Behinds the Scenes of Wild N’ Out, TikTok Censorship, and His Journey in Hollywood
40:26
40:26
Play later
Play later
Lists
Like
Liked
40:26
Join us as Tonio dishes on his Wild N' Out experience, tackles TikTok censorship, and shares his journey through Hollywood. Get ready for laughs, insights, and behind-the-scenes stories you won't want to miss!
…
continue reading
In this episode, the hosts discuss the recent news that Microsoft laid off its diversity, equity, and inclusion (DEI) lead. They express their disappointment and concern about the future of DEI initiatives in companies. They highlight the importance of representation and diversity in the workplace and question why a trillion-dollar company like Mic…
…
continue reading
Kaspersky is shutting down its business in the United States after being sanctioned by the U.S. Treasury Department. The Department of Industry and Security also banned the company from selling software and delivering antivirus updates. This move is part of a trend where the U.S. is cutting ties with foreign companies due to concerns about data sec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CrowdStrike & “The Update Heard ‘Round The World”
28:23
28:23
Play later
Play later
Lists
Like
Liked
28:23
In this episode, the hosts discuss the recent CrowdStrike EDR update that crashed Windows systems worldwide. They highlight the impact of the update on various industries, including airlines and healthcare. The hosts also discuss the potential long-term consequences for CrowdStrike and Microsoft, as well as the need for better testing and quality c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How Did Crowdstrike Take Down The Internet?
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14
In this episode, Ryan Williams and Elizabeth Stephens discuss the recent IT outage caused by a bad patch from CrowdStrike that impacted Microsoft systems. They emphasize the importance of investing in people, processes, and tools to prevent such incidents and highlight the need for digital resilience. They also address the role of AI in cybersecuri…
…
continue reading
In this episode, the hosts discuss their recent activities and media consumption. They mention watching documentaries, TV shows, and movies, as well as their experiences with family activities like bowling. They also talk about exploring different cuisines and cooking healthier meals. Additionally, they mention their interest in Japanese culture an…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
FBI Special Agent To Cybersecurity & GRC Evangelist Ft. Miguel Clarke
1:10:50
1:10:50
Play later
Play later
Lists
Like
Liked
1:10:50
In this conversation, Ryan Williams Sr. interviews Miguel Clarke, a retired Supervisory Special Agent from the FBI, now a Cybersecurity and GRC Evangelist, at Armor Defense. Miguel shares his background in law enforcement and his transition into cybersecurity. He discusses the early days of cyber investigations and the collaboration between differe…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Russia Using AI-Enhanced Troll Farms To Spread Disinformation
20:18
20:18
Play later
Play later
Lists
Like
Liked
20:18
The podcast discusses a recent article about a Russian troll farm that uses AI-enhanced software to spread disinformation. The hosts highlight the importance of verifying information and diversifying news sources to combat the spread of fake news. They also discuss the need for social media platforms to implement better troll detection and verifica…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Mask (1961) Canada's First Horror Film
1:16:19
1:16:19
Play later
Play later
Lists
Like
Liked
1:16:19
KCCCC Season 004, Episode 25 100th Episode Special! In 1961 Julian Roffman Directs the film that started the proud tradition of Canadian Horror Cinema when he defied the odds and made one of the first Canadian films to make a profit in the United States with Canada's first 3-D film. Facebook:https://www.facebook.com/Kyle-and-Codys-Cult-Cinema-Cast-…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
62 - The Battlefield: Miniature Modern Warfare
1:02:07
1:02:07
Play later
Play later
Lists
Like
Liked
1:02:07
The pod clan scrounges up some dough for AEK-971 season pass in The Battlefield: Miniature Modern Warfare, Brent Spivey's game that mushes together multiplayer FPS and RTS. Find The Battlefield: Miniature Modern Warfare rules here: https://www.wargamevault.com/product/102355/The-Battlefield%3A-Miniature-Modern-Warfare Find the companion post here: …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Is The New RADIUS Vulnerability A Blast? Everything You Need To Know About The Blast Radius Attack
15:29
15:29
Play later
Play later
Lists
Like
Liked
15:29
The conversation discusses a recent article about a new attack on a 30-year-old protocol called RADIUS. The protocol is widely used in networks for client-server interactions, including VPN access, DSL and fiber connections, and 5G authentication. The attack, called Blast Radius, exploits vulnerabilities in the MD5 hash used in the protocol. The at…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Aerospace Nation: Lt Gen Andrew J. Gebara
57:07
57:07
Play later
Play later
Lists
Like
Liked
57:07
With China engaged in a nuclear break-out, Russia upgrading its nuclear capabilities, plus Iran and North Korea aggressively pursuing their nuclear ambitions—a credible, capable, and safe U.S. nuclear deterrent is more important than ever. The imperatives are clear: to deter adversaries, reassure allies, and provide national leaders with key option…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Did The Major AT&T Breach Impact National Security?
19:24
19:24
Play later
Play later
Lists
Like
Liked
19:24
AT&T experiences another major data breach, exposing call and text records of millions of customers, including non-AT&T users. The breach highlights the vulnerability of personal information and the potential for location tracking and targeted attacks. Snowflake, a third-party platform, was involved in the breach, but investigations suggest user er…
…
continue reading
In this conversation, Ryan and Shannon discuss various topics, including cybersecurity news, movies, and TV series. They mention OpenAI being victims of espionage, the impact of password compilations, and the role of CISOs. They also talk about the movies they watched, such as 'The Beekeeper' and 'Clipped,' and the TV series 'Barbershop.' They shar…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Policy Paper Release: Fighting the Air Base: Ensuring Decisive Combat Sortie Generation Under Enemy Fire
1:01:32
1:01:32
Play later
Play later
Lists
Like
Liked
1:01:32
Brig Gen Michael “Jekyll” Winkler, USAF (Ret.), the Deputy Director for Air and Cyberspace Operations of the Pacific Air Forces, and Mitchell's J. Michael Dahm explore how the Department of Defense and Congress can and must prepare the Air Force to fight from their forward air bases to generate combat effects while under attack. Link to the report…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 26 - Davo: Growing Up with Tory Lanez, Rap Beefs, and Starring in Bob Marley Movie
49:51
49:51
Play later
Play later
Lists
Like
Liked
49:51
🎙️ EP 26 - Davo: Growing Up with Tory Lanez, Rap Beefs, and Starring in Bob Marley Movie 🎬 Join us in this episode as we dive into the life of Davo, and discover his close friendship with Tory Lanez. Plus, hear the incredible story of how Davo landed a role in the Bob Marley biopic, One Love. Don't miss this inspiring episode!…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Why The “S” In CISO Is Becoming “Scapegoat”
18:27
18:27
Play later
Play later
Lists
Like
Liked
18:27
The conversation discusses the increasing scrutiny of CISOs by the government after a major breach. It highlights the challenges faced by CISOs, including being the fall guy for breaches and lacking decision-making power in the C-suite. The importance of communication, collaboration, and documentation is emphasized as a way for CISOs to protect the…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Aerospace Nation: Gen Kenneth S. Wilsbach
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52
The Mitchell Institute for Aerospace Studies invites you to enjoy our Aerospace Nation with Gen Kenneth S. Wilsbach, Commander, Air Combat Command. Whether discussing missions like air superiority, air battle management, electromagnetic spectrum operations, intelligence, surveillance and reconnaissance, or combat search and rescue—the airmen of ACC…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
10 Billion Passwords Leaked Online: Was Yours?
12:03
12:03
Play later
Play later
Lists
Like
Liked
12:03
In this episode, Ryan and Shannon discuss a recent security alert about a hacker who uploaded 10 billion passwords to a crime forum. They explain the concept of credential stuffing and the risks of using the same password for multiple accounts. They emphasize the importance of enabling multi-factor authentication and suggest that biometrics may be …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Dealing With Family Drama - Does Biden Need To Drop Out? |ITBP S8E13
1:56:29
1:56:29
Play later
Play later
Lists
Like
Liked
1:56:29
In this episode we tackle the battles of dealing with family drama and generational curses. And we ask the question; "Does Joe Biden need to drop out of the race for President?" All that and much more.By Bold Ventures Media LLC
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Schriever Spacepower Series: Lt Gen David N. Miller, Jr., Commander, Space Operations Command
59:00
59:00
Play later
Play later
Lists
Like
Liked
59:00
The Mitchell Institute for Aerospace Studies invites you to enjoy our Schriever Spacepower Series with Lt Gen David N. Miller, Jr., Commander, Space Operations Command, United States Space Force. As part of Great Power Competition, the United States today confronts numerous threats to our space capabilities and infrastructure. China has demonstrate…
…
continue reading
OpenAI's internal AI details were stolen in a 2023 breach, but the company did not disclose it until now. The hacker gained access to the internal messaging systems and stole details about the design of OpenAI's artificial intelligence technologies. Although the actual technologies were not compromised, the breach raises concerns about the lack of …
…
continue reading
In this episode, the hosts discuss their week and what they've been watching. Shannon talks about his week and shares his thoughts on the TV show 'My Adventures with Superman' and the Netflix movie 'A Family Affair'. Chris talks about watching local news and streaming anime on Crunchyroll. Daniel shares his experience with stomach problems and his …
…
continue reading
In this episode, Ryan and Shannon discuss a recent article about a massive HTTP DDoS attack that reached a record high of 71 million requests per second. They highlight the increasing sophistication and frequency of DDoS attacks, as well as the potential life-threatening effects of such attacks in the future. They also discuss the role of IoT devic…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Why The American Privacy Rights Act Is Doomed?
21:34
21:34
Play later
Play later
Lists
Like
Liked
21:34
The conversation revolves around the lack of comprehensive privacy legislation in the United States and the need for stronger data protection measures. The discussion highlights the failure of the American Privacy Rights Act and the removal of civil rights protections from the bill. The hosts express frustration with the slow progress in implementi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Aerospace Nation: Want Better Results in Ukraine? Senior Leader Views
1:02:34
1:02:34
Play later
Play later
Lists
Like
Liked
1:02:34
It’s no secret: whether considering the relative scale of Russia’s military power or confining rules of engagement, Ukraine’s fight to reclaim territory is challenging. Lt Gen David A. Deptula, USAF (Ret.), Dean of the Mitchell Institute for Aerospace Studies, and co-author Dr. Christopher Bowie released a new solution-oriented report on the confli…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Understanding the Evolve Bank Hack and Federal Reserve Hoax
15:38
15:38
Play later
Play later
Lists
Like
Liked
15:38
The conversation discusses a recent cybersecurity attack on Evolve Bank, which was initially mistaken for an attack on the Federal Reserve. The hackers, known as Lockbit, threatened to release sensitive information unless a ransom was paid. However, it was later revealed that the Federal Reserve was not hacked, and it was actually Evolve Bank that …
…
continue reading
The conversation discusses the article titled 'TikTok confirms it offered US government a kill switch' from BBC.com. The hosts express concerns about data sharing and the potential infiltration of Chinese companies. They question the effectiveness of a kill switch in protecting user data and highlight the need for transparency and regulation in soc…
…
continue reading
In this episode, Ryan, Shannon, and Chris discuss their week and share their experiences. They talk about family time, vacations, and their favorite TV shows and games. They also mention their podcast content and ask for feedback. The conversation touches on topics like cybersecurity, movies, and pop culture. Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Th…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Building Technical Skills and Community: Ft. Rebekah Skeete, COO, BlackGirlsHack
57:13
57:13
Play later
Play later
Lists
Like
Liked
57:13
Rebekah Skeete, COO of BlackGirlsHack, discusses the organization's mission and initiatives in the cybersecurity field. The organization was founded by Tennisha Martin to provide support and resources for black women interested in cybersecurity. BlackGirlsHack offers a monthly book club, weekly trainings, and cohorts for technical skill development…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Preventing AI from Generating Exact Images (Podcast Cover)
21:10
21:10
Play later
Play later
Lists
Like
Liked
21:10
The conversation discusses the use of AI in art and the impact it has on artists. Artists are using anti-AI poison to create images that confuse and disrupt AI-generated art. While AI makes it easier for people to create art, it also threatens the livelihood of artists. The use of poisoning tools like Glaze and Nightshade can prevent AI from genera…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cleveland Rocked But Not Rolled By Cyberattack
12:04
12:04
Play later
Play later
Lists
Like
Liked
12:04
The city of Cleveland refuses to pay a ransom demand by cyber attackers, which is a positive sign. The team speculates that the city of Cleveland likely have good cyber hygiene and a recovery plan in place. It's important to not pay ransom demands as it encourages more attacks. Cleveland's segmentation of networks and adherence to best practices is…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Schriever Spacepower Series: Gen Stephen Whiting
57:58
57:58
Play later
Play later
Lists
Like
Liked
57:58
The Mitchell Institute for Aerospace Studies invites you to enjoy our Schriever Spacepower Series with Gen Stephen N. Whiting, Commander, United States Space Command, United States Space Force. Space capabilities, services, and effects are now an indispensable part of daily life and foundational to the structure and operation of the U.S. military. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
15K Car Dealerships Shutdown By Ransomware
15:40
15:40
Play later
Play later
Lists
Like
Liked
15:40
A software company called CDK was hacked, causing 15,000 car dealerships across North America to be crippled. The dealerships relied on CDK's software for various operations, including car sales and maintenance. Some dealerships had to resort to pen and paper, while others were unable to perform any tasks. The attack had a significant impact on the…
…
continue reading
In this episode, Ryan and Daniel discuss Daniel's experiences in Japan. Daniel talks about house hunting and the unique architecture of houses in Japan, exploring the city of Yokosuka and the abundance of food options. Daniel shares his arcade and lounge experiences in Tokyo, highlighting the social aspect of arcades in Japan. They also mention TV …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Throw Back Thursday - Hackers Weaponized TikTok Challenge
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48
In this lost episode from December 4, 2022, Ryan and Shannon how hackers are using the trending TikTok invisible challenge to spread malware. Threat actors are tricking users into downloading malware by capitalizing on the invisible challenge, where users apply a filter that leaves behind a silhouette of their body. The malware is hidden inside Pyt…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 24 - Clejan: the trap violinist, Andrew Tate and Romania, and being forced to learn violin
37:43
37:43
Play later
Play later
Lists
Like
Liked
37:43
Join us in this episode as we delve into the intriguing world of trap violin with Clejan, explore the captivating tales of Andrew Tate and Romania, and uncover the compelling narratives of individuals forced to learn the violin. Don't miss out - hit subscribe and be a part of this enriching journey!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Microsoft & Google Plan To Rescue Rural Hospitals
12:07
12:07
Play later
Play later
Lists
Like
Liked
12:07
Microsoft and Google are offering cyber help to rural hospitals in an initiative by the Biden administration. The hospitals, which are critical for surrounding areas, often lack proper cybersecurity measures and are vulnerable to cyber-attacks. Microsoft is offering discounts on security products and free licenses to upgrade their systems, while Go…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Pre Crime? Law Enforcement in Minority Report - PoliSciFiPod
50:20
50:20
Play later
Play later
Lists
Like
Liked
50:20
The Washington D.C. police depart has gained access to the power of prophecy, I'm sure nothing will go, or has gone wrong. Artwork by Scribblejay YouTube https://www.youtube.com/channel/UCqT09vDU2CFmTDJxaR-XVnQBy Kyle Brokenshire and Cody Utman
…
continue reading
The conversation discusses the trend of regulated industries adopting military-grade cyber defenses and the importance of information sharing and collaboration in the cybersecurity field. It emphasizes the need for a collective approach to cybersecurity and the adoption of strategies like zero trust. The conversation also highlights the significanc…
…
continue reading