Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Journalists Carole Cadwalladr and Peter Jukes – with the help of Conservative party whistleblower Sergei Cristo – expose an alleged secret spy ring operating at the very heart of the British political system. This is the untold story of the most audacious Russian influence operation in British history. It involves honey traps, Russian agents and information warfare. Russian wealth and glamour collide with a wild west of new digital landscapes. And as Sergei tries and fails to raise the alarm ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Darwin Salazar.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Podcast by Alex Wood & Robb Reck
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading

101
DoD Secure-Working with National Industrial Security Program
jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC
Interviews and topics centering on security clearances and protecting classified information according to the National Industrial Security Clearance Operating Manual (NISPOM).
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
WAR ROOM: Pandemic is the first and most comprehensive program to bring the most up to the minute information on the news of the day. Stephen K. Bannon brings medical experts, politicians, business leaders, and those on the front lines for a comprehensive look at the latest news from all and provide their insider insights.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
What does it mean to live a good life? Is it about happiness, health, friendship, love, or meaning? What about work, wealth, purpose, service, or something else? Can you live a good life even when things are hard? These are the questions and topics we explore every week in conversation with leading voices from health, science, art, industry, mindset, and culture, like Brené Brown, Matthew McConaughey, Mel Robbins, Alex, Elle, Adam Grant, Elizabeth Gilbert, Yung Pueblo, Maya Shankar, Mitch Al ...
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Our Security in Focus webinars provide an insight into the latest Gallagher developments as well as inform and educate on the security solutions available. The webinars are hosted by members of the Gallagher team across the globe and provide you with an opportunity to ask questions to our experts.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
We Cover the Cyberspace.
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
continue reading
Across the world, from Europe to Asia, the Americas to the Middle East, tensions are rising between nation states. Traditional alliances and alignments are constantly evolving in the 21st century. An understanding of defence and security policy and the tides of political, social and economic changes is crucial for any informed understanding of our world. 2024 sees war in Europe and Israel, and elections in major economies, including the US, the UK, Taiwan, South Africa, and many others. Insu ...
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
…
continue reading
A free podcast about cybersecurity, vulnerability management, and the CVE Program.
…
continue reading
This podcast explores investment strategies, economics, personal finance, and stock analysis. It features real conversations and analysis to inform, educate, and entertain. Note that nothing in this podcast is investment advice and it is for entertainment & discussion purposes only. Do your own due diligence before making any investment. www.securityanalysis.org
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.
…
continue reading
00:00 - PreShow Banter™ — Fake Australian 04:17 - BHIS - Talkin’ Bout [infosec] News 2025-01-27 04:34 - Story # 1: DeepSeek sparks AI stock selloff; Nvidia posts record market-cap loss 30:50 - Story # 2: Tech giants are putting $500bn into ‘Stargate’ to build up AI in US 42:23 - Story # 3: DeepSeek Faces Large-scale Cyberattack, Halts New User Regi…
…
continue reading

1
Unsecurity Episode 233: HERoic Hacks - Women in InfoSec w/ Tonya Barnes
32:16
32:16
Play later
Play later
Lists
Like
Liked
32:16In this special Edition of Unsecurity, Key Account Manager Tonya Barnes speaks on the creation of HERoic Hacks, the infosec conference that empowers women in the field. About HERoic Hacks: Envisioned by Tonya, and supported by FRSecure, HERoic Hacks addresses the gap in representation by providing networking opportunities, expert speakers, and awar…
…
continue reading
Episode 4253: Persecution Of Christians; Oligarchs Paydays Are OverBy WarRoom.org
…
continue reading
Episode 4252: White House Creates The Trump Faith Office; Building A Christian CoalitionBy WarRoom.org
…
continue reading

1
The Ethereum Vulnerability That Almost Shook the Network
12:39
12:39
Play later
Play later
Lists
Like
Liked
12:39In this episode, we dive into the latest developments shaking the cryptocurrency world. We begin with a critical vulnerability in Ethereum's software that could have led to widespread network disruptions. Next, we cover a shocking case in the UK, where a gang received lengthy prison sentences for crypto-related torture and kidnapping. The conversat…
…
continue reading

1
Lawfare Daily: Nayna Gupta on the Laken Riley Act
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42On today’s podcast, Lawfare Associate Editor for Communications Anna Hickey spoke to Nayna Gupta, Director of Policy at the American Immigration Council, about the Laken Riley Act, the first piece of legislation signed by President Trump in his second term, its start as a messaging bill in the last Congress, and its impact on the immigration detent…
…
continue reading

1
Outlook RCE bug, Kimsuky forceCopy malware, Treasury tightens DOGE
7:48
7:48
Play later
Play later
Lists
Like
Liked
7:48Critical RCE bug in Microsoft Outlook now exploited in attacks Kimsuky uses forceCopy malware to steal browser-stored credentials Treasury agrees to block additional DOGE staff from accessing sensitive payment systems Huge thanks to our episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersec…
…
continue reading

1
Trump Edition: US president unleashed on Gaza, tariffs and China
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02In a shock announcement this week Donald Trump said he would ‘take over’ Gaza, ‘own’ it and called for Palestinians to be 'resettled' in neighbouring countries, prompting concerns over ethnic cleansing. Venetia Rainey catches up with The Telegraph’s woman in Washington Katie O'Neill about it and asks military expert Linda Robinson about the feasibi…
…
continue reading
WarRoom Battleground EP 702: Asleep At The Wheel While The Country Is OverrunBy WarRoom.org
…
continue reading
Episode 4251: The War On Christians Is Over Under The Trump AdministrationBy WarRoom.org
…
continue reading
If you’re enjoying Sergei & the Westminster Spy Ring, we think you’ll love The Spy Who, from Wondery. In this special episode, we’ll play you an extract from their season: The Spy Who Putin Poisoned. When the USSR falls apart, GRU officer Sergei Skripal finds himself adrift in the new Russia, having never asked for the country's new democracy. So w…
…
continue reading

1
Deepseek, AMD, and Forgotten Buckets - PSW #860
2:06:54
2:06:54
Play later
Play later
Lists
Like
Liked
2:06:54Deepseek troubles, AI models explained, AMD CPU microcode signature validation, what happens when you leave an AWS S3 bucket laying around, 3D printing tips, and the malware that never was on Ethernet to USB adapters. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-860…
…
continue reading

1
Deepseek, AMD, and Forgotten Buckets - PSW #860
2:06:54
2:06:54
Play later
Play later
Lists
Like
Liked
2:06:54Deepseek troubles, AI models explained, AMD CPU microcode signature validation, what happens when you leave an AWS S3 bucket laying around, 3D printing tips, and the malware that never was on Ethernet to USB adapters. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-860…
…
continue reading

1
The Wireless Pen Test Guide: Are Your Wi-Fi Networks Really Secure?
18:14
18:14
Play later
Play later
Lists
Like
Liked
18:14In this episode, we break down Wi-Fi security from the ground up, using a detailed pen testing guide as our roadmap. We explain key concepts like the differences between 2.4 GHz and 5 GHz bands, as well as why outdated protocols like WEP are still worth understanding in today’s security landscape. Learn about advanced threats, including monitor mod…
…
continue reading
Episode 4250: Absence Of Growth Domestic And Abroad Leading To Debt BombBy WarRoom.org
…
continue reading
Episode 4249: USAID Needs To Be PurgedBy WarRoom.org
…
continue reading

1
190 Million Breached: Inside the Cyber War on Healthcare
24:43
24:43
Play later
Play later
Lists
Like
Liked
24:43In this episode, we delve into the escalating threat of cyber attacks on healthcare systems, analyzing three high-profile data breaches that have impacted millions of patients and providers. From the North Bay Healthcare breach compromising over 569,000 individuals' sensitive information to the River Region Cardiology incident involving 1.2 terabyt…
…
continue reading

1
Leaders in Digital Trust/Blockchain: Aysegul Sensoy
53:05
53:05
Play later
Play later
Lists
Like
Liked
53:05Aysegul Sensoy has over 20 years of management experience with blockchain, emerging technologies, fintech, business development, marketing and sales. She is currently the chair of the Istanbul Blockchain Women Association and CIS Regional Manager of Fuze Finance. She received her bachelor's degree in economics from Istanbul University and her maste…
…
continue reading

1
Leading Neuroscientist: Turn Anxiety and Anger Into Peace and Power | Ethan Kross
1:04:44
1:04:44
Play later
Play later
Lists
Like
Liked
1:04:44Ever feel like your emotions are running the show? Learn breakthrough tools from Ethan Kross, PhD, leading expert on emotion regulation and author of Shift: Managing Your Emotions - So They Don't Manage You. Discover potent "sensory shifters," attention deployment tactics, and a step-by-step process to master your emotional world once and for all. …
…
continue reading

1
Lawfare Daily: Understanding the War in Sudan
28:47
28:47
Play later
Play later
Lists
Like
Liked
28:47Lawfare Foreign Policy Editor and Georgetown professor Daniel Byman sits down with Holly Berkley Fletcher, a former Senior Africa Analyst at the Central Intelligence Agency, to discuss the complex and tragic situation in Sudan and her recent Lawfare article on the subject, “The Sudan War and the Limits of American Power.” They talk about the initia…
…
continue reading

1
Spain arrests hacker, FCC Robocallers, Ransoms decrease 35%
8:48
8:48
Play later
Play later
Lists
Like
Liked
8:48Spain arrests hacker of U.S. and Spanish military agencies Robocallers called the FCC pretending to be from the FCC Ransomware payments decreased 35% year-over-year Huge thanks to our episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day at…
…
continue reading

1
The future of software security standards.
1:00:22
1:00:22
Play later
Play later
Lists
Like
Liked
1:00:22This week, we are joined by Jeff Williams, former Global Chairman of OWASP and Founder and CTO of Contrast Security, who is discussing what could happen to "Secure by Design" in the next administration and how to secure software through regs. Ben has the story of Elon Musk’s and DOGE’s incursion into federal databases. Dave's got the story of a man…
…
continue reading

1
The power of fiction and storytelling in understanding national security
42:34
42:34
Play later
Play later
Lists
Like
Liked
42:34How can fiction and storytelling effectively engage the public with the complex challenges of national security? How does storytelling bridge gaps in historical narratives and deepen our understanding of contemporary conflicts? How can fiction help project future scenarios and explore potential outcomes? In this episode, Misha Zelinsky and Mick Rya…
…
continue reading
WarRoom Battleground EP 702: Keeping Your Foot On The Gas With DeportationsBy WarRoom.org
…
continue reading
Episode 4248: Trump Signs EO Keeping Men Out Of Women's SportsBy WarRoom.org
…
continue reading
Episode 4247: Audit Of All Major InstitutionsBy WarRoom.org
…
continue reading
Episode 4246: Cleaning Out The Corruption In The Plumbing Of GovernmentBy WarRoom.org
…
continue reading

1
Rational Security: The "Law and Order: Executive Victims Unit" Edition
1:17:01
1:17:01
Play later
Play later
Lists
Like
Liked
1:17:01This week, Scott sat down with his Lawfare colleagues Benjamin Wittes, Molly Reynolds, and Anna Bower to talk through another big week of national security news, including: “Checked Out and Off Balance.” Over its first two weeks in office, the Trump administration has pushed against the traditional limits of congressional authority by unlawfully im…
…
continue reading

1
The "Law and Order: Executive Victims Unit" Edition
1:17:01
1:17:01
Play later
Play later
Lists
Like
Liked
1:17:01This week, Scott sat down with his Lawfare colleagues Benjamin Wittes, Molly Reynolds, and Anna Bower to talk through another big week of national security news, including: “Checked Out and Off Balance.” Over its first two weeks in office, the Trump administration has pushed against the traditional limits of congressional authority by unlawfully im…
…
continue reading

1
50 Episodes In: What We Learned About Building the Next Gen CISO
47:22
47:22
Play later
Play later
Lists
Like
Liked
47:22👉 Listen Now: A deep dive into the biggest cybersecurity lessons, trends, and leadership insights from 50 episodes of The Professional CISO Show! 🔍 Episode Summary In this Year in Review episode, host David Malicoat reflects on the biggest cybersecurity trends, challenges, and insights from 50 expert conversations in 2024. 🔥 What You’ll Learn: • Th…
…
continue reading

1
Enforcement of the Digital Operational Resilience Act (DORA) - Madelein van der Hout - BSW #381
1:02:04
1:02:04
Play later
Play later
Lists
Like
Liked
1:02:04From online banking to mobile payments, nearly every aspect of our financial lives relies on digital systems. This reliance has brought incredible convenience, but it also means that any disruption — whether due to cyberattacks, system failures, or operational incidents— can have severe consequences. The Digital Operational Resilience Act (DORA) pr…
…
continue reading

1
Lawfare Daily: The Legality of OPM's "Deferred Resignations”
47:30
47:30
Play later
Play later
Lists
Like
Liked
47:30On Jan. 28, the Office of Personnel Management (OPM) sent out an email offering a “deferred resignation program” to over 2 million federal employees, encouraging them to resign effective Sept. 30. The offer is only open until Feb. 6—and in the intervening days since OPM announced the program, federal employees have received a blizzard of followup e…
…
continue reading

1
Goodbye Password Stress, Hello Passkeys - Ep 135
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41In this episode, we dive into the world of passkeys and how they’re revolutionizing online security. Say goodbye to password fatigue and phishing scams—passkeys promise a more secure and seamless authentication experience. We discuss what passkeys are, how they work, and why major tech companies are adopting them. Topics Covered: What are passkeys …
…
continue reading

1
Brett Gardner: Buffett's Early Investments
52:09
52:09
Play later
Play later
Lists
Like
Liked
52:09Brett Gardner is author of the book Buffett’s Early Investments. The book analyzes key Buffett investments from the 1950’s and 1960’s, a period in which he had his most extraordinary returns. During the partnership years (1957-69), Buffett put together one of the greatest investment track records of all time, earning an astounding 29.5% CAGR withou…
…
continue reading

1
Automating Dynamic Application Security Testing at Scale
45:56
45:56
Play later
Play later
Lists
Like
Liked
45:56In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone are joined by Jason Geffner, Principal Security Architect at Microsoft, to discuss his groundbreaking work on scaling and automating Dynamic Application Security Testing (DAST). Following on from his BlueHat 2024 session, and outlined in this MSRC blog post, Jason explain…
…
continue reading

1
Meta identifies risky AI systems, Ferret malware joins 'Contagious Interview' campaign, credential theft rises as a target
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10Meta says it may stop development of AI systems it deems too risky Ferret Malware Added to 'Contagious Interview' Campaign Credential Theft Becomes Cybercriminals' Favorite Target Huge thanks to our episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses f…
…
continue reading

1
Risky Business #778 -- Musk's child soldiers seize control of FedGov IT systems
56:28
56:28
Play later
Play later
Lists
Like
Liked
56:28On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: DeepSeek leaves an unauthed database on the internet Russia hacked UK prime minister’s personal mail Australia sanctions a Telegram group… which is more sensible than it sounds Medical device backdoor turns out to be just poorly thought out upgrade f…
…
continue reading
WarRoom Battleground EP 701: Trump Meets With Netanyahu Cont.By WarRoom.org
…
continue reading
Episode 4245: Trump Meets With NetanyahuBy WarRoom.org
…
continue reading

1
Microsoft Entra ID Protection with Corissa Koopmans
38:20
38:20
Play later
Play later
Lists
Like
Liked
38:20How can Entra ID Protection help keep your organization resist security breaches? Richard talks to Corissa Koopmans about thinking beyond authentication and authorization and into conditional access - knowing what is normal and abnormal behavior for your users. Corissa recommends looking at the Entra ID Protection Dashboard - whether you have confi…
…
continue reading

1
DeepSeek, Nicolas Cage, OpenAI, Hackers, Ransomware, Canada, Joshua Marpet and More - SWN #448
29:33
29:33
Play later
Play later
Lists
Like
Liked
29:33Today, we've got: DeepSeek, Nicolas Cage, OpenAI, Hackers, Ransomware, Canada, Joshua Marpet and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-448
…
continue reading
Episode 4244: Live From Greenland; Organized Invasion Of Our Country Through USAIDBy WarRoom.org
…
continue reading
Episode 4243: RFK And MAHA Win Committee VoteBy WarRoom.org
…
continue reading

1
USAID Clearances Uncovered - Accusations of Corruption Pre-DOGE
25:03
25:03
Play later
Play later
Lists
Like
Liked
25:03Before Elon Musk and DOGE walked into the USAID security office, one former employee and whistleblower was already calling the USAID clearance process into question. From the archives: Mark Moyar joins the show to discuss his book, which sheds light on the complex relationship between security clearance eligibility and employment decisions. The aut…
…
continue reading
Host Shannon Sabens speaks with fellow CVE Board members Kent Landfield and Madison Oliver and CVE Program Lead Alec Summers about the 25th anniversary of the CVE Program. Topics include the history of the program, the program today, and what’s next.By CVE Program
…
continue reading

1
S32 Ep4: Sylvie de Giusto - The Power of Choice
29:49
29:49
Play later
Play later
Lists
Like
Liked
29:49In this episode, Steve sits down with author and leadership expert Sylvie di Giusto. Sylvie delineates five areas for everyone to consider in order to enhance their emotional intelligence. She and Steve also discuss how self-awareness and authenticity relate to situational awareness, and how improving in these areas can support career mobility. Key…
…
continue reading

1
Microsoft Fasttrack with Special Guest Thomas Finney
47:47
47:47
Play later
Play later
Lists
Like
Liked
47:47Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss Microsoft FastTrack with guest Thomas Finney. They explore the benefits and eligibility of FastTrack, which is designed to help organizations adopt and deploy Microsoft 365 services. The conversation covers various aspects of FastTrack, including various Mi…
…
continue reading

1
Lawfare Daily: What Is Happening with USAID?
56:28
56:28
Play later
Play later
Lists
Like
Liked
56:28Today’s episode is a recording of Feb. 3 livestream that Senior Editor Scott R. Anderson hosted with George Ingram and Tony Pipa, both Senior Fellows in Global Economy and Development at the Brookings Institution, and Jonathan Katz, Senior Director of the Anti-Corruption, Democracy, and Security project also at Brookings—all three of whom are also …
…
continue reading